Author:
Shiu Hung-Jr,Leu Fang-Yie,Lai Chun-Ming,Huang Yu-Chun
Publisher
Springer International Publishing
Reference25 articles.
1. Lecture Notes in Computer Science;HJ Shiu,2018
2. Hsu, H.Z., Lee, R.C.T.: DNA based encryption methods. In: The 23rd workshop on combinatorial mathematics and computation theory, pp. 545 (2006)
3. Shiu, H.J., Lin, B.S., Huang, C.H., Chiang, P.Y., Lei, C.L.: Preserving privacy of online digital physiological signals using blind and reversible steganography. Comput. Methods Programs Biomed. 151, 159–170 (2017)
4. Bender, W., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(3/4), 313–336 (1996)
5. Swanson, M.D., Zhu, B., Tewfik, A.H., Boney, L.: Robust watermarking using perceptual masking. Sig. Process. 66(3), 337–355 (1998)