default search action
Pei-Yu Lin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j26]Pei-Yu Lin, Wen-Shao Lan, Yi-Hui Chen, Wen-Chuan Wu:
A Confidential QR Code Approach with Higher Information Privacy. Entropy 24(2): 284 (2022) - 2021
- [c20]Yi-Hui Chen, Pei-Yu Lin:
Integrated Hamming Coding Operation to Reversible Data Hiding Scheme for Encrypted Images. SNPD 2021: 198-201 - 2020
- [j25]Pourya Pourhejazy, Shih-Wei Lin, Chen-Yang Cheng, Kuo-Ching Ying, Pei-Yu Lin:
Improved Beam Search for Optimizing No-Wait Flowshops With Release Times. IEEE Access 8: 148100-148124 (2020)
2010 – 2019
- 2019
- [c19]Hui-Tzu Chen, Pei-Yu Lin, Chi-Yi Lin:
A Smart Roadside Parking System Using Bluetooth Low Energy Beacons. AINA Workshops 2019: 471-480 - 2017
- [j24]Pei-Yu Lin, Bin You, Xiaoyong Lu:
Video exhibition with adjustable augmented reality system based on temporal psycho-visual modulation. EURASIP J. Image Video Process. 2017: 7 (2017) - [j23]Pei-Yu Lin, Yi-Hui Chen:
High payload secret hiding technology for QR codes. EURASIP J. Image Video Process. 2017: 14 (2017) - 2016
- [j22]Wen-Hsiung Huang, Yung-Yao Chen, Pei-Yu Lin, Che-Hao Hsu, Kai-Lung Hua:
Efficient and accurate document image classification algorithms for low-end copy pipelines. EURASIP J. Image Video Process. 2016: 32 (2016) - [j21]Jen-Ho Yang, Pei-Yu Lin:
A mobile payment mechanism with anonymity for cloud computing. J. Syst. Softw. 116: 69-74 (2016) - [j20]Pei-Yu Lin:
Distributed Secret Sharing Approach With Cheater Prevention Based on QR Code. IEEE Trans. Ind. Informatics 12(1): 384-392 (2016) - [c18]Pei-Yu Lin, Yi-Hui Chen:
QR code steganography with secret payload enhancement. ICME Workshops 2016: 1-5 - [c17]Xiaoyong Lu, Bin You, Pei-Yu Lin:
Augmented reality via temporal psycho-visual modulation. ICME Workshops 2016: 1-4 - 2015
- [j19]Pei-Yu Lin, Ran-Zan Wang, Yu-Jie Chang, Wen-Pinn Fang:
Prevention of cheating in visual cryptography by using coherent patterns. Inf. Sci. 301: 61-74 (2015) - [j18]Pei-Yu Lin:
Double Verification Secret Sharing Mechanism Based on Adaptive Pixel Pair Matching. ACM Trans. Multim. Comput. Commun. Appl. 11(3): 36:1-36:17 (2015) - [c16]Pei-Yu Lin, Chin-Hung Teng, Yi-Hui Chen:
Diverse augmented reality exhibitions for differential users based upon private quick response code. APSIPA 2015: 1121-1125 - [c15]Pei-Yu Lin, Yuan-Yu Tsai, Yin-Chi Kuo, Yi-Hui Chen, Chi-Shiang Chan:
Embedding information on search-order codes of VQ indices by rearranging the indicators. ICCE-TW 2015: 504-505 - [c14]Wen-Chuan Wu, Huai-Fan Hsu, Pei-Yu Lin:
Active tamper detection of digital images using VQ compression. ICCE-TW 2015: 508-509 - 2014
- [j17]Pei-Yu Lin:
Imperceptible visible watermarking based on postcamera histogram operation. J. Syst. Softw. 95: 194-208 (2014) - [j16]Pei-Yu Lin, Wei-Fan Hsieh:
Media pattern exhibition mechanism via mobile devices. J. Vis. Commun. Image Represent. 25(8): 1856-1864 (2014) - [c13]Jen-Ho Yang, Pei-Yu Lin:
An ID-Based User Authentication Scheme for Cloud Computing. IIH-MSP 2014: 98-101 - [c12]Chi-Shiang Chan, Yi-Hui Chen, Pei-Yu Lin:
An Image Hiding Method by Applying Tree Structure on Linking Pixels. IIH-MSP 2014: 110-113 - [c11]Pei-Yu Lin, Yi-Hui Chen, Jun-Chou Chuang:
A (n, n)-threshold Secret Sharing Scheme for Barcode Application. ICS 2014: 1023-1028 - 2013
- [j15]Yin-Jen Chiang, Pei-Yu Lin, Ran-Zan Wang, Yi-Hui Chen:
Blind QR Code Steganographic Approach Based upon Error Correction Capability. KSII Trans. Internet Inf. Syst. 7(10): 2527-2543 (2013) - [j14]Pei-Yu Lin, Yi-Hui Chen, Chin-Chen Chang, Jung-San Lee:
Contrast-Adaptive Removable Visible Watermarking (CARVW) mechanism. Image Vis. Comput. 31(4): 311-321 (2013) - [c10]Pei-Yu Lin, Yi-Hui Chen, Ming-Chieh Hsu, Fu-Ming Juang:
Secret sharing mechanism with cheater detection. APSIPA 2013: 1-4 - [c9]Pei-Yu Lin, Yi-Hui Chen, Eric Jui-Lin Lu, Ping-Jung Chen:
Secret Hiding Mechanism Using QR Barcode. SITIS 2013: 22-25 - 2012
- [c8]Wei-Fan Hsieh, Pei-Yu Lin:
Analyze the Digital Watermarking Security Demands for the Facebook Website. ICGEC 2012: 31-34 - [c7]Wei-Fan Hsieh, Pei-Yu Lin:
Imperceptible Visible Watermarking Scheme Using Color Distribution Modulation. UIC/ATC 2012: 1002-1005 - 2011
- [j13]Pei-Yu Lin, Chin-Chen Chang:
Cheating resistance and reversibility-oriented secret sharing mechanism. IET Inf. Secur. 5(2): 81-92 (2011) - [j12]Pei-Yu Lin, Jung-San Lee, Chin-Chen Chang:
Protecting the content integrity of digital imagery with fidelity preservation. ACM Trans. Multim. Comput. Commun. Appl. 7(3): 15:1-15:20 (2011) - [c6]Pei-Yu Lin, Chi-Shiang Chan:
A Verifiable and Recoverable Secret Image Sharing Mechanism. ISPA 2011: 288-293 - [c5]Pei-Yu Lin:
Verifiable and Lossless Distributed Media Content Sharing. UIC 2011: 79-93 - 2010
- [j11]Chin-Chen Chang, Pei-Yu Lin, Zhi-Hui Wang, Mingchu Li:
A Sudoku-based Secret Image Sharing Scheme with Reversibility (Invited Paper). J. Commun. 5(1): 5-12 (2010) - [j10]Chin-Chen Chang, Pei-Yu Lin, Jun-Chou Chuang:
A Grayscale Image Steganography Based upon Discrete Cosine Transformation. J. Digit. Inf. Manag. 8(2): 88-94 (2010) - [j9]Pei-Yu Lin, Chi-Shiang Chan:
Invertible secret image sharing with steganography. Pattern Recognit. Lett. 31(13): 1887-1893 (2010) - [j8]Jung-San Lee, Pei-Yu Lin, Chin-Chen Chang:
Lightweight Secure Roaming Mechanism Between GPRS/UMTS and Wireless LANs. Wirel. Pers. Commun. 53(4): 569-580 (2010)
2000 – 2009
- 2009
- [j7]Chin-Chen Chang, Pei-Yu Lin, Jieh-Shan Yeh:
Preserving robustness and removability for digital watermarks using subsampling and difference correlation. Inf. Sci. 179(13): 2283-2293 (2009) - [j6]Pei-Yu Lin, Jung-San Lee, Chin-Chen Chang:
Distortion-free secret image sharing mechanism using modulus operator. Pattern Recognit. 42(5): 886-895 (2009) - [j5]Pei-Yu Lin, Jung-San Lee, Chin-Chen Chang:
Dual Digital Watermarking for Internet Media Based on Hybrid Strategies. IEEE Trans. Circuits Syst. Video Technol. 19(8): 1169-1177 (2009) - [c4]Chin-Chen Chang, Pei-Yu Lin, Jung-San Lee:
A Self-Reference Watermarking Scheme Based on Wet Paper Coding. HIS (1) 2009: 228-233 - 2008
- [j4]Chin-Chen Chang, Pei-Yu Lin:
A Color Image Authentication Method Using Partitioned Palette and Morphological Operations. IEICE Trans. Inf. Syst. 91-D(1): 54-61 (2008) - [j3]Chin-Chen Chang, Pei-Yu Lin:
Adaptive watermark mechanism for rightful ownership protection. J. Syst. Softw. 81(7): 1118-1129 (2008) - 2007
- [j2]Ya-Fen Chang, Chin-Chen Chang, Pei-Yu Lin:
A Concealed t-out-of-n Signer Ambiguous Signature Scheme with Variety of Keys. Informatica 18(4): 535-546 (2007) - [c3]Chin-Chen Chang, Pei-Yu Lin:
Significance-Preserving Codebook Using Generic Algorithm. FSKD (3) 2007: 660-664 - 2005
- [c2]Chin-Chen Chang, Jun-Chou Chuang, Pei-Yu Lin:
Sharing a Secret Two-Tone Image in Two Gray-Level Images. ICPADS (2) 2005: 300-304 - 2004
- [j1]Chin-Chen Chang, Chih-Yang Lin, Pei-Yu Lin:
An Efficient Graph-Based Method for Parallel Mining Problems. J. Inf. Knowl. Manag. 3(2): 143-154 (2004) - [c1]Chin-Chen Chang, Pei-Yu Lin:
A Compression-Based Data Hiding Scheme Using Vector Quantization and Principle Component Analysis. CW 2004: 369-375
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint