A modified remote user authentication scheme using smart cards
JJ Shen, CW Lin, MS Hwang - IEEE Transactions on Consumer …, 2003 - ieeexplore.ieee.org
Hwang and Li (see IEEE Trans. Consumer Electron., vol.46, no.1, p.28-30, 2000) proposed
a new remote authentication scheme using smart cards. Their scheme is based on the …
a new remote authentication scheme using smart cards. Their scheme is based on the …
Recover the tampered image based on VQ indexing
CW Yang, JJ Shen - Signal Processing, 2010 - Elsevier
In this paper, a tampered image recovery scheme is proposed by creating an index table of
the original image via vector quantization (VQ) and embedding it into the original image as a …
the original image via vector quantization (VQ) and embedding it into the original image as a …
[PDF][PDF] Challenges in e-government and security of information
Due to the advances made in Information and Communication Technologies (ICT), e-Government
users can easily use the available services from places and at time that are …
users can easily use the available services from places and at time that are …
Security enhancement for the timestamp-based password authentication scheme using smart cards
JJ Shen, CW Lin, MS Hwang - Computers & Security, 2003 - Elsevier
In 1999, Yang and Shieh proposed a timestamp-based password authentication scheme with
smart cards. However, Chan and Cheng showed that it was insecure because the scheme …
smart cards. However, Chan and Cheng showed that it was insecure because the scheme …
An adaptive image compression method based on vector quantization
JJ Shen, HC Huang - 2010 First International Conference on …, 2010 - ieeexplore.ieee.org
With the growth of Internet, Image compression has become a popular issue. Since the
traditional Vector Quantization (VQ) produces compressed images with a quality at about 27 to …
traditional Vector Quantization (VQ) produces compressed images with a quality at about 27 to …
A robust associative watermarking technique based on vector quantization
JJ Shen, JM Ren - Digital Signal Processing, 2010 - Elsevier
In this paper, the concepts of vector quantization (VQ) and association rules in data mining
are employed to propose a robust watermarking technique. Unlike ordinary or traditional …
are employed to propose a robust watermarking technique. Unlike ordinary or traditional …
Features classification forest: a novel development that is adaptable to robust blind watermarking techniques
CS Chang, JJ Shen - IEEE Transactions on Image Processing, 2017 - ieeexplore.ieee.org
A novel watermarking scheme is proposed that could substantially improve current watermarking
techniques. This scheme exploits the features of micro images of watermarks to build …
techniques. This scheme exploits the features of micro images of watermarks to build …
A self-embedding fragile image authentication based on singular value decomposition
JJ Shen, CF Lee, FW Hsu, S Agrawal - Multimedia Tools and Applications, 2020 - Springer
Nowadays, image authentication techniques are widely applied to digital multimedia to
address their fraudulent and illegal use. Digital multimedia plays a vital role in various real time …
address their fraudulent and illegal use. Digital multimedia plays a vital role in various real time …
Self-embedding authentication watermarking with effective tampered location detection and high-quality image recovery
CF Lee, JJ Shen, ZR Chen, S Agrawal - Sensors, 2019 - mdpi.com
Recently, sensor networks have emerged as a high-impact research area, and a number of
high profile applications have been proposed. Although significant progress has already …
high profile applications have been proposed. Although significant progress has already …
Security enhancement for optimal strong-password authentication protocol
CW Lin, JJ Shen, MS Hwang - ACM SIGOPS Operating Systems Review, 2003 - dl.acm.org
In 2001, Lin et al. proposed an optimal strong-password authentication protocol called the
OSAP protocol. However, Chen and Ku pointed out that it is vulnerable to the stolen-verifier …
OSAP protocol. However, Chen and Ku pointed out that it is vulnerable to the stolen-verifier …