default search action
Ji-Hwei Horng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j46]Kai Gao, Ji-Hwei Horng, Chin-Chen Chang:
Dual mode data hiding in fully encrypted images with pixel-shuffling for cloud applications. Displays 81: 102609 (2024) - [j45]Jiang-Yi Lin, Ji-Hwei Horng, Chin-Chen Chang:
Secret image sharing with distinct covers based on improved Cycling-XOR. J. Vis. Commun. Image Represent. 104: 104282 (2024) - [j44]Kai Gao, Ji-Hwei Horng, Chin-Chen Chang:
Reversible Data Hiding for Encrypted 3D Mesh Models With Secret Sharing Over Galois Field. IEEE Trans. Multim. 26: 5499-5510 (2024) - 2023
- [j43]Shuying Xu, Chin-Chen Chang, Ji-Hwei Horng:
A Steganography Based on Optimal Multi-Threshold Block Labeling. Comput. Syst. Sci. Eng. 44(1): 721-739 (2023) - [j42]Jiang-Yi Lin, Chin-Chen Chang, Ji-Hwei Horng:
Crypto-space image steganography based on blind flipping. J. Inf. Secur. Appl. 79: 103660 (2023) - [j41]Shuying Xu, Chin-Chen Chang, Ji-Hwei Horng:
Image Covert Communication With Block Regulation. IEEE Signal Process. Lett. 30: 1217-1221 (2023) - [j40]Shuying Xu, Ji-Hwei Horng, Ching-Chun Chang, Chin-Chen Chang:
Reversible Data Hiding With Hierarchical Block Variable Length Coding for Cloud Security. IEEE Trans. Dependable Secur. Comput. 20(5): 4199-4213 (2023) - 2022
- [j39]Kai Gao, Ching-Chun Chang, Ji-Hwei Horng, Isao Echizen:
Steganographic secret sharing via AI-generated photorealistic images. EURASIP J. Wirel. Commun. Netw. 2022(1): 119 (2022) - [j38]Kai Gao, Ji-Hwei Horng, Chin-Chen Chang:
High-capacity reversible data hiding in encrypted images based on adaptive block encoding. J. Vis. Commun. Image Represent. 84: 103481 (2022) - [j37]Jiang-Yi Lin, Ji-Hwei Horng, Chin-Chen Chang:
A reversible and authenticable secret sharing scheme using dual images. Multim. Tools Appl. 81(13): 17527-17545 (2022) - [j36]Heng-Xiao Chi, Ji-Hwei Horng, Chin-Chen Chang, Yung-Hui Li:
Embedding Biometric Information in Interpolated Medical Images with a Reversible and Adaptive Strategy. Sensors 22(20): 7942 (2022) - [j35]Jiang-Yi Lin, Ji-Hwei Horng, Chin-Chen Chang, Yung-Hui Li:
Asymmetric Orientation Combination for Reversible and Authenticable Data Hiding of Dual Stego-images. Symmetry 14(4): 819 (2022) - [c9]Chih-Hung Lee, Kun-Sheng Sun, Yun-Qiao Wang, Ji-Hwei Horng, Chin-Chen Chang:
Secret Message CDMA Multiplexing via QR Codes. ASSE 2022: 52-59 - 2021
- [j34]Kai Gao, Ji-Hwei Horng, Chin-Chen Chang:
An Authenticatable (2, 3) Secret Sharing Scheme Using Meaningful Share Images Based on Hybrid Fractal Matrix. IEEE Access 9: 50112-50125 (2021) - [j33]Shuying Xu, Ji-Hwei Horng, Chin-Chen Chang:
Reversible Data Hiding Scheme Based on VQ Prediction and Adaptive Parametric Binary Tree Labeling for Encrypted Images. IEEE Access 9: 55191-55204 (2021) - [j32]Xiao-Zhu Xie, Chin-Chen Chang, Ji-Hwei Horng:
An EMD-based data hiding scheme for JPEG images. Connect. Sci. 33(3): 515-531 (2021) - [j31]Chin-Chen Chang, Ji-Hwei Horng, Chia-Shou Shih, Xu Wang:
VQ-oriented data hiding based on adjustable error compensation strategy. Connect. Sci. 33(4): 835-853 (2021) - [j30]Chin-Chen Chang, Jui-Feng Chang, Wei-Jiun Kao, Ji-Hwei Horng:
Two-Layer Reversible Data Hiding for VQ-Compressed Images Based on De-Clustering and Indicator-Free Search-Order Coding. Future Internet 13(8): 215 (2021) - [j29]Chinchen Chang, Ji-Hwei Horng, Wei-Jiun Kao:
A secure extended LBP data hiding scheme based on octagon-shaped shell. Int. J. Embed. Syst. 14(5): 497-508 (2021) - [j28]Ji-Hwei Horng, Chin-Chen Chang, Kun-Sheng Sun:
A Two-Layer Steganography for Mosaic Images. KSII Trans. Internet Inf. Syst. 15(9): 3298-3321 (2021) - [j27]Hua Wu, Ji-Hwei Horng, Chin-Chen Chang:
Adaptive data hiding scheme based on magic matrix of flexible dimension. KSII Trans. Internet Inf. Syst. 15(9): 3348-3364 (2021) - [j26]Juan Lin, Ji-Hwei Horng, Yanjun Liu, Chin-Chen Chang:
An anisotropic reference matrix for image steganography. J. Vis. Commun. Image Represent. 74: 102969 (2021) - [j25]Jiang-Yi Lin, Ji-Hwei Horng, Chin-Chen Chang:
A Novel (2, 3)-Threshold Reversible Secret Image Sharing Scheme Based on Optimized Crystal-Lattice Matrix. Symmetry 13(11): 2063 (2021) - [j24]Juan Lin, Chin-Chen Chang, Ji-Hwei Horng:
Asymmetric Data Hiding for Compressed Images with High Payload and Reversibility. Symmetry 13(12): 2355 (2021) - [c8]Chin-Chen Chang, Ji-Hwei Horng, Jui-Feng Chang:
High-Payload Data Hiding Scheme Based on Ordered Shifting of AC Coefficients for JPEG Images. iFUZZY 2021: 1-6 - [c7]Kunpeng Sun, Ji-Hwei Horng, Chin-Chen Chang:
Reversible Data Hiding for SMVQ Compressed Images Based on De-Clustering Rules. SNPD 2021: 191-197 - 2020
- [j23]Ji-Hwei Horng, Chin-Chen Chang, Guanlong Li:
Steganography Using Quotient Value Differencing and LSB Substitution for AMBTC Compressed Images. IEEE Access 8: 129347-129358 (2020) - [j22]Kai Gao, Ji-Hwei Horng, Yanjun Liu, Chin-Chen Chang:
A Reversible Secret Image Sharing Scheme Based on Stick Insect Matrix. IEEE Access 8: 130405-130416 (2020) - [j21]Kai Gao, Ji-Hwei Horng, Chin-Chen Chang:
A Novel (2, 3) Reversible Secret Image Sharing Based on Fractal Matrix. IEEE Access 8: 174325-174341 (2020) - [j20]Ji-Hwei Horng, Xiao-Zhu Xie, Chin-Chen Chang:
The analysis of stego image visual quality for a data hiding scheme based on two-layer turtle shell matrix. Int. J. Comput. Sci. Eng. 23(4): 336-340 (2020) - [j19]Ji-Hwei Horng, Shuying Xu, Ching-Chun Chang, Chinchen Chang:
An Efficient Data-Hiding Scheme Based on Multidimensional Mini-SuDoKu. Sensors 20(9): 2739 (2020) - [j18]Ching-Chun Chang, Ji-Hwei Horng, Chia-Shou Shih, Chin-Chen Chang:
A Maze Matrix-Based Secret Image Sharing Scheme with Cheater Detection. Sensors 20(13): 3802 (2020)
2010 – 2019
- 2019
- [j17]Chin-Chen Chang, Xu Wang, Ji-Hwei Horng:
A Hybrid Data Hiding Method for Strict AMBTC Format Images with High-Fidelity. Symmetry 11(10): 1314 (2019) - [c6]Ji-Hwei Horng, Shan-Cheng Yang, Chih-Hung Lee, Hsuan-Ming Feng:
A Permutation-Based 3D-Sudoku Model for Image Steganography. iFUZZY 2019: 1-5 - 2018
- [j16]Hsuan-Ming Feng, Ching-Chang Wong, Ji-Hwei Horng, Li-Yun Lai:
Evolutional RBFNs image model describing-based segmentation system designs. Neurocomputing 272: 374-385 (2018) - 2012
- [j15]Hsuan-Ming Feng, Ji-Hwei Horng, Shiang-Min Jou:
Bacterial Foraging Particle Swarm Optimization Algorithm Based Fuzzy-VQ Compression Systems. J. Inf. Hiding Multim. Signal Process. 3(3): 227-239 (2012) - 2011
- [c5]Hsuan-Ming Feng, Ji-Hwei Horng:
VQ-Based Fuzzy Compression Systems Designs through Bacterial Foraging Particle Swarm Optimization Algorithm. ICGEC 2011: 256-259 - 2010
- [j14]Hsuan-Ming Feng, Chih-Yung Chen, Ji-Hwei Horng:
Intelligent omni-directional vision-based mobile robot fuzzy systems design and implementation. Expert Syst. Appl. 37(5): 4009-4019 (2010)
2000 – 2009
- 2008
- [j13]Jenq-Der Chen, Chyi-Da Yang, Chang-Hua Lien, Ji-Hwei Horng:
New delay-dependent non-fragile H. Inf. Sci. 178(24): 4699-4706 (2008) - [c4]Tian-Luu Wu, Ji-Hwei Horng:
Object-Based Image Retrieval Using Perceptual Grouping. ISDA (1) 2008: 71-76 - 2003
- [j12]Ji-Hwei Horng:
An adaptive smoothing approach for fitting digital planar curves with line segments and circular arcs. Pattern Recognit. Lett. 24(1-3): 565-577 (2003) - 2002
- [j11]Ji-Hwei Horng, Johnny Tienyi Li:
Vehicle path planning by using adaptive constrained distance transformation. Pattern Recognit. 35(6): 1327-1337 (2002) - [j10]Ji-Hwei Horng, Johnny Tienyi Li:
An automatic and efficient dynamic programming algorithm for polygonal approximation of digital curves. Pattern Recognit. Lett. 23(1-3): 171-182 (2002) - [j9]Ji-Hwei Horng:
Improving fitting quality of polygonal approximation by using the dynamic programming technique. Pattern Recognit. Lett. 23(14): 1657-1673 (2002) - [j8]Soo-Chang Pei, Ji-Hwei Horng:
Design of FIR bilevel Laplacian-of-Gaussian filter. Signal Process. 82(4): 677-691 (2002) - 2001
- [j7]Ji-Hwei Horng, Johnny Tienyi Li:
A dynamic programming approach for fitting digital planar curves with line segments and circular arcs. Pattern Recognit. Lett. 22(2): 183-197 (2001)
1990 – 1999
- 1999
- [j6]Soo-Chang Pei, Ji-Hwei Horng:
A moment-based approach for deskewing rotationally symmetric shapes. IEEE Trans. Image Process. 8(12): 1831-1834 (1999) - 1998
- [j5]Soo-Chang Pei, Ji-Hwei Horng:
Finding the optimal driving path of a car using the modified constrained distance transformation. IEEE Trans. Robotics Autom. 14(5): 663-670 (1998) - 1996
- [j4]Soo-Chang Pei, Ji-Hwei Horng:
Optimum approximation of digital planar curves using circular arcs. Pattern Recognit. 29(3): 383-388 (1996) - [c3]Soo-Chang Pei, Ji-Hwei Horng:
A moment-based approach for deskewing rotationally symmetric shapes. ICPR 1996: 248-252 - [c2]Soo-Chang Pei, Ji-Hwei Horng:
A low complexity algorithm for detecting rotational symmetry based on the Hough transform technique. ICPR 1996: 492-496 - 1995
- [j3]Soo-Chang Pei, Ji-Hwei Horng:
Fitting digital curve using circular arcs. Pattern Recognit. 28(1): 107-116 (1995) - [j2]Soo-Chang Pei, Ji-Hwei Horng:
Circular arc detection based on Hough transform. Pattern Recognit. Lett. 16(6): 615-625 (1995) - 1994
- [j1]Soo-Chang Pei, Ji-Hwei Horng:
Corner point detection using nest moving average. Pattern Recognit. 27(11): 1533-1537 (1994) - [c1]Soo-Chang Pei, Ji-Hwei Horng:
Determination of Circular Arc Length and Midpoint by Hough Transform. ISCAS 1994: 1-4
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-18 01:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint