A modified remote user authentication scheme using smart cards

JJ Shen, CW Lin, MS Hwang - IEEE Transactions on Consumer …, 2003 - ieeexplore.ieee.org
Hwang and Li (see IEEE Trans. Consumer Electron., vol.46, no.1, p.28-30, 2000) proposed
a new remote authentication scheme using smart cards. Their scheme is based on the …

Recover the tampered image based on VQ indexing

CW Yang, JJ Shen - Signal Processing, 2010 - Elsevier
In this paper, a tampered image recovery scheme is proposed by creating an index table of
the original image via vector quantization (VQ) and embedding it into the original image as a …

[PDF][PDF] Challenges in e-government and security of information

MS Hwang, CT Li, JJ Shen, YP Chu - Information & Security, 2004 - procon.bg
Due to the advances made in Information and Communication Technologies (ICT), e-Government
users can easily use the available services from places and at time that are …

Security enhancement for the timestamp-based password authentication scheme using smart cards

JJ Shen, CW Lin, MS Hwang - Computers & Security, 2003 - Elsevier
In 1999, Yang and Shieh proposed a timestamp-based password authentication scheme with
smart cards. However, Chan and Cheng showed that it was insecure because the scheme …

An adaptive image compression method based on vector quantization

JJ Shen, HC Huang - 2010 First International Conference on …, 2010 - ieeexplore.ieee.org
With the growth of Internet, Image compression has become a popular issue. Since the
traditional Vector Quantization (VQ) produces compressed images with a quality at about 27 to …

A robust associative watermarking technique based on vector quantization

JJ Shen, JM Ren - Digital Signal Processing, 2010 - Elsevier
In this paper, the concepts of vector quantization (VQ) and association rules in data mining
are employed to propose a robust watermarking technique. Unlike ordinary or traditional …

Features classification forest: a novel development that is adaptable to robust blind watermarking techniques

CS Chang, JJ Shen - IEEE Transactions on Image Processing, 2017 - ieeexplore.ieee.org
A novel watermarking scheme is proposed that could substantially improve current watermarking
techniques. This scheme exploits the features of micro images of watermarks to build …

A self-embedding fragile image authentication based on singular value decomposition

JJ Shen, CF Lee, FW Hsu, S Agrawal - Multimedia Tools and Applications, 2020 - Springer
Nowadays, image authentication techniques are widely applied to digital multimedia to
address their fraudulent and illegal use. Digital multimedia plays a vital role in various real time …

Self-embedding authentication watermarking with effective tampered location detection and high-quality image recovery

CF Lee, JJ Shen, ZR Chen, S Agrawal - Sensors, 2019 - mdpi.com
Recently, sensor networks have emerged as a high-impact research area, and a number of
high profile applications have been proposed. Although significant progress has already …

Security enhancement for optimal strong-password authentication protocol

CW Lin, JJ Shen, MS Hwang - ACM SIGOPS Operating Systems Review, 2003 - dl.acm.org
In 2001, Lin et al. proposed an optimal strong-password authentication protocol called the
OSAP protocol. However, Chen and Ku pointed out that it is vulnerable to the stolen-verifier …