au.\*:("WANG, Shiuh-Jeng")
Results 1 to 5 of 5
Selection :
Threshold verification scheme to a valid-signature using identity only on specialized approvalWANG, Shiuh-Jeng.Applied mathematics and computation. 2004, Vol 152, Num 2, pp 373-383, issn 0096-3003, 11 p.Article
Hierarchy-oriented searching algorithms using alternative duplicate codewords for vector quantization mechanismWANG, Shiuh-Jeng; YANG, Cheng-Hsing.Applied mathematics and computation. 2005, Vol 162, Num 2, pp 559-576, issn 0096-3003, 18 p.Article
Digitized forensic investigation at P2P copyright controversy, infringementKAO, Da-Yu; WANG, Shiuh-Jeng; HUANG, Frank Fu-Yuan et al.Lecture notes in computer science. 2006, pp 644-646, issn 0302-9743, isbn 3-540-34478-0, 1Vol, 3 p.Conference Paper
Reversible data hiding using side-match predictions on steganographic imagesHSU, Fu-Hau; WU, Min-Hao; WANG, Shiuh-Jeng et al.Multimedia tools and applications. 2013, Vol 67, Num 3, pp 571-591, issn 1380-7501, 21 p.Article
Visual-based embedding systems with targeted secret disclosures and applicationsWANG, Shiuh-Jeng; LIN, Jian-Yi; KE, Hung-Jui et al.International journal of ad hoc and ubiquitous computing (Print). 2009, Vol 4, Num 1, pp 44-53, issn 1743-8225, 10 p.Article