default search action
Tzu-Chuen Lu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j41]Wei-Ying Li, Tzu-Chuen Lu, Hui-Xun Wei:
Serious gaming: user acceptance of the simulated motorbike license training system. Multim. Tools Appl. 83(17): 52763-52794 (2024) - [j40]Sudipta Meikap, Biswapati Jana, Tzu-Chuen Lu:
Context pixel-based reversible data hiding scheme using pixel value ordering. Vis. Comput. 40(5): 3529-3552 (2024) - 2023
- [j39]Priyanka C. Bhatt, Tzu-Chuen Lu:
Identifying Firm Significance and Positions in the Patent Innovation Based on Centrality Measures' Clustering Approach. IEEE Access 11: 30515-30528 (2023) - [c38]Tzu-Chuen Lu, Thanh Nhan Vo, Biswapati Jana:
Dual-image reversible data hiding based on encoding the numeral system of concealed information. ICACI 2023: 1-7 - [c37]Thao-Trang Huynh-Cam, Long-Sheng Chen, Thong Van Ho, De Van Nguyen, Tzu-Chuen Lu:
Identifying Crucial Factors for E-students' Satisfaction in Vietnamese Emengency Remote Learning Using Machine Learning Methods. iCAST 2023: 16-21 - [c36]Tzu-Chuen Lu, Shi-Yao Lin, Yu-Xuan Zhou, Biswapati Jana:
Serious games applied to the study of the "Substance Structure and Atom" units in chemistry. iCAST 2023: 124-128 - [c35]Tzu-Chuen Lu, Sheng-Ming Huang, Yu-Qi Chen:
Sewage Treatment Interactive Learning Game Design. ICCE-Taiwan 2023: 247-248 - 2022
- [j38]Sharmistha Jana, Biswapati Jana, Tzu-Chuen Lu, Thanh Nhan Vo:
Reversible data hiding scheme exploiting center folding with fuzzy weight strategy. J. Inf. Secur. Appl. 69: 103276 (2022) - [j37]Wei-Ying Li, Tzu-Chuen Lu:
JLcoding Language Tool for Early Programming Learning. Symmetry 14(7): 1405 (2022) - 2021
- [j36]Tzu-Chuen Lu, Ping-Chung Yang, Biswapati Jana:
Improving the Reversible LSB Matching Scheme Based on the Likelihood Re-Encoding Strategy. Entropy 23(5): 577 (2021) - [j35]Ting-Ting Xia, Juan Lin, Chin-Chen Chang, Tzu-Chuen Lu:
A novel adjustable reversible data hiding method for AMBTC-compressed codes using Hamming distance. Int. J. Embed. Syst. 14(4): 313-323 (2021) - [j34]Tzu-Chuen Lu, Shiru Huang, Shu-Wen Huang:
Reversible hiding method for interpolation images featuring a multilayer center folding strategy. Soft Comput. 25(1): 161-180 (2021) - [c34]Thanh Nhan Vo, Tzu-Chuen Lu, Somya Agrawal, Biswapati Jana:
Interpolation based reversible hiding scheme by using center folding strategy and adjusting hiding operator. TAAI 2021: 90-95 - [c33]Sharmistha Jana, Biswapati Jana, Tzu-Chuen Lu:
Secured Steganographic Scheme Utilizing Fuzzy Threshold with Weighted Matrix. TAAI 2021: 101-106 - 2020
- [j33]Tzu-Chuen Lu, Ting-Chi Chang, Jau-Ji Shen:
An Effective Maximum Distortion Controlling Technology in the Dual-Image-Based Reversible Data Hiding Scheme. IEEE Access 8: 90824-90837 (2020) - [j32]Ting-Ting Xia, Juan Lin, Chin-Chen Chang, Tzu-Chuen Lu:
Reversible data hiding scheme based on the AMBTC compression technique and Huffman coding. Int. J. Comput. Sci. Eng. 22(4): 383-393 (2020) - [c32]Priyanka C. Bhatt, Vimal Kumar, Tzu-Chuen Lu, Rico Lee-Ting Cho, Kuei-Kuei Lai:
Rise and Rise of Blockchain: A Patent Statistics Approach to Identify the Underlying Technologies. ACIIDS (Companion) 2020: 456-466
2010 – 2019
- 2019
- [j31]Tzu-Chuen Lu, Yuching Lu, Thanh Nhan Vo:
Dual-image based high image quality reversible hiding scheme with multiple folding zones. Multim. Tools Appl. 78(24): 34397-34435 (2019) - [j30]Tzu-Chuen Lu:
Editorial of Special Issue "Information Technology and Its Applications". Symmetry 11(1): 109 (2019) - [c31]Tzu-Chuen Lu, Jau-Ji Shen, Ting-Chi Chang:
Effective Dual-images based Reversible Information Hiding Scheme based on Complexity Analysis and Thresholds Controlling. iCAST 2019: 1-4 - 2018
- [j29]Tzu-Chuen Lu:
Interpolation-based hiding scheme using the modulus function and re-encoding strategy. Signal Process. 142: 244-259 (2018) - [j28]Chin-Chen Chang, Tzu-Chuen Lu, Zhao-Hua Zhu, Hui Tian:
An Effective Authentication Scheme Using DCT for Mobile Devices. Symmetry 10(1): 13 (2018) - [j27]Tzu-Chuen Lu, Chun-Ya Tseng, Shu-Wen Huang, Thanh Nhan Vo:
Pixel-Value-Ordering based Reversible Information Hiding Scheme with Self-Adaptive Threshold Strategy. Symmetry 10(12): 764 (2018) - [c30]Tzu-Chuen Lu, Rong-Chung Chen, Guang-En Hsuen, Shu-Wen Huang:
A Study on CNC Machine Training Based on Virtual Reality Technology. IIH-MSP (2) 2018: 257-265 - 2017
- [j26]Tzu-Chuen Lu:
Adaptive (k, F 1) interpolation-based hiding scheme. Multim. Tools Appl. 76(2): 1827-1855 (2017) - [j25]Tzu-Chuen Lu, Chang-Mu Chen, Mei-Chen Lin, Ying-Hsuan Huang:
Multiple predictors hiding scheme using asymmetric histograms. Multim. Tools Appl. 76(3): 3361-3382 (2017) - [j24]Chin-Chen Chang, Ying-Hsuan Huang, Tzu-Chuen Lu:
A difference expansion based reversible information hiding scheme with high stego image visual quality. Multim. Tools Appl. 76(10): 12659-12681 (2017) - [j23]Tzu-Chuen Lu, Li-Pin Chi, Chang-Han Wu, Hsung-Pin Chang:
Reversible data hiding in dual stego-images using frequency-based encoding strategy. Multim. Tools Appl. 76(22): 23903-23929 (2017) - [j22]Tzu-Chuen Lu, Hui-Shih Leng:
Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique. Symmetry 9(10): 223 (2017) - [c29]Yuching Lu, Goutam Chakraborty, Tzu-Chuen Lu:
Hidden content quality aware stego-image hiding method using re-encoding strategy. iCAST 2017: 1-6 - [c28]Jia-Wei Liu, Tzu-Chuen Lu, Qiangfu Zhao:
Improving the performance of lossless reversible steganography via data sharing. iCAST 2017: 7-12 - [c27]Shyi-Ching Liang, Yu-Chien Chen, Tzu-Chuen Lu:
Using pictorial story based english to improve English words underachievers learning in remedial teaching. iCAST 2017: 238-243 - [c26]Tzu-Chuen Lu, Wei-Ying Li, Pin-Fan Chen, Run-Jing Ren, Yit-Ing Shi, Hongqi Wang, Pei-Ci Zhang:
Integrated Health Check Report Analysis and Tracking Platform. IIH-MSP (1) 2017: 44-52 - [c25]Xi-Qing Liang, Wei-Ying Li, Tzu-Chuen Lu:
A Study of the Multi-Organization Integrated Electronic Attendance System. IIH-MSP (1) 2017: 53-61 - 2016
- [j21]Tzu-Chuen Lu, Chun-Ya Tseng, Jhih-Huei Wu:
Asymmetric-histogram based reversible information hiding scheme using edge sensitivity detection. J. Syst. Softw. 116: 2-21 (2016) - [j20]Chin-Chen Chang, Tzu-Chuen Lu, Gwoboa Horng, Ying-Hsuan Huang:
Very efficient variable-length codes for the lossless compression of VQ indices. Multim. Tools Appl. 75(6): 3537-3552 (2016) - 2015
- [j19]Chin-Chen Chang, Tzu-Chuen Lu, Gwoboa Horng, Ying-Hsuan Huang, Tai-Jung Hsu:
Dual-Histograms Reversible Data Hiding Capable of Avoiding Underflow/Overflow Problems. J. Inf. Hiding Multim. Signal Process. 6(5): 956-967 (2015) - [j18]Tzu-Chuen Lu, Chun-Ya Tseng, Jhih-Huei Wu:
Dual imaging-based reversible hiding technique using LSB matching. Signal Process. 108: 77-89 (2015) - [j17]Tzu-Chuen Lu, Jhih-Huei Wu, Chun-Chih Huang:
Dual-image-based reversible data hiding method using center folding strategy. Signal Process. 115: 195-213 (2015) - [c24]Tzu-Chuen Lu, Ying-Hsuan Huang:
Combined Prediction-Based Reversible Data Embedding Methods for High Image Quality. IIH-MSP 2015: 109-112 - 2014
- [j16]Tzu-Chuen Lu, Chin-Chen Chang, Ying-Hsuan Huang:
High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting. Multim. Tools Appl. 72(1): 417-435 (2014) - [j15]Tzu-Chuen Lu, Chun-Ya Tseng, Kuang-Mao Deng:
Reversible data hiding using local edge sensing prediction methods and adaptive thresholds. Signal Process. 104: 152-166 (2014) - [c23]Tzu-Chuen Lu, Chun-Ya Tseng, Chun-Chih Huang, Kuang-Mao Deng:
16-Bit DICOM Medical Images Lossless Hiding Scheme Based on Edge Sensing Prediction Mechanism. ICGEC 2014: 189-196 - [c22]Tzu-Chuen Lu, Chun-Ya Tseng, Chang-Mu Chen, Hui-Shih Leng, Ying-Hsuan Huang:
An Efficient and Simplified Data Hiding Technique Based on 2's Complement. IIH-MSP 2014: 126-129 - [c21]Tzu-Chuen Lu, Chun-Ya Tseng, Hui-Shih Leng, Chun-Chih Huang:
Data Hiding Scheme Based on Edge Detection and Triangular Mirroring. IIH-MSP 2014: 142-145 - [c20]Tzu-Chuen Lu, Sue-Chen Hsueh, Chun-Ya Tseng, Pei-Lun Chen:
Information Hiding Scheme based on Replace Function and Wavelet Transform. ICS 2014: 885-893 - 2013
- [c19]Chin-Chen Chang, Tzu-Chuen Lu, Gwoboa Horng, Ying-Hsuan Huang, Yung-Ming Hsu:
A high payload data embedding scheme using dual stego-images with reversibility. ICICS 2013: 1-5 - 2012
- [j14]Tzu-Chuen Lu, Chun-Ya Tseng:
Hemodialysis Key Features Mining and Patients Clustering Technologies. Adv. Artif. Neural Syst. 2012: 835903:1-835903:11 (2012) - 2011
- [j13]Zhi-Hui Wang, Chin-Chen Chang, Mingchu Li, Tzu-Chuen Lu:
A Simple Image Encoding Method with Data Lossless Information Hiding. J. Networks 6(3): 400-407 (2011) - 2010
- [j12]Tzu-Chuen Lu, Chin-Chen Chang:
A Survey of VQ Codebook Generation. J. Inf. Hiding Multim. Signal Process. 1(3): 190-203 (2010) - [j11]Chi-Nan Lin, Daniel J. Buehrer, Chin-Chen Chang, Tzu-Chuen Lu:
Using quad smoothness to efficiently control capacity-distortion of reversible data hiding. J. Syst. Softw. 83(10): 1805-1812 (2010) - [c18]Zhi-Hui Wang, Chin-Chen Chang, Mingchu Li, Tzu-Chuen Lu:
A simple image encoding method with data lossless information hiding. ICUIMC 2010: 44 - [c17]Tzu-Chuen Lu, Siang-Ru Liao, Chun-Ming Chang:
The Information Hiding Technology Based on the Similar Sample Blocks of Grayscale Image. IIH-MSP 2010: 17-20
2000 – 2009
- 2009
- [j10]Tzu-Chuen Lu, Kun-Yi Wu:
A transaction pattern analysis system based on neural network. Expert Syst. Appl. 36(3): 6091-6099 (2009) - [j9]Tzu-Chuen Lu, Chin-Chen Chang, Yi-Long Liu:
An Information-Hiding Scheme Based on Quantization-Based Embedding Technique. Fundam. Informaticae 91(3-4): 597-610 (2009) - [c16]Tzu-Chuen Lu, Ying-Hsuan Huang:
An Effective Lossless Hiding Technique Based on Reversible Contrast Mapping and Histogram Embedding Methods. IAS 2009: 599-602 - [c15]Tzu-Chuen Lu, Ying-Hsuan Huang:
An efficient block-based lossless information hiding technique. ICUIMC 2009: 342-347 - [c14]Tzu-Chuen Lu, Cheng-Chun Huang, Siang-Ru Liao:
Lossless Information Hiding Scheme Based on Predictive Coding. IIH-MSP 2009: 374-377 - 2008
- [j8]Tzu-Chuen Lu, Chin-Chen Chang:
Lossless nibbled data embedding scheme based on difference expansion. Image Vis. Comput. 26(5): 632-638 (2008) - [c13]Tzu-Chuen Lu, Li-Ling Hsu:
Hierarchical watermarking technique of distortion control mechanism. ICUIMC 2008: 339-346 - [c12]Tzu-Chuen Lu, Ying-Hsuan Huang:
The Distortion Control Method of Reversible Contrast Mapping Hiding Scheme. IIH-MSP 2008: 1133-1136 - [c11]Tzu-Chuen Lu, Li-Ling Hsu:
The Technique of Information Hiding Based on Modification Function and LSB Matching. ISDA (3) 2008: 626-631 - 2007
- [j7]Chin-Chen Chang, Tzu-Chuen Lu, Jun-Bin Ya:
VQ Codebook Searching Algorithm Based on Correlation Property. Fundam. Informaticae 76(1-2): 39-57 (2007) - [j6]Tzu-Chuen Lu, Chin-Chen Chang:
Color image retrieval technique based on color features and image bitmap. Inf. Process. Manag. 43(2): 461-472 (2007) - [c10]Chin-Chen Chang, Yung-Chen Chou, Tzu-Chuen Lu:
A Semi-blind Watermarking Based on Discrete Wavelet Transform. ICICS 2007: 164-176 - [c9]Tzu-Chuen Lu, Cheng-Chun Huang:
Lossless Information Hiding Scheme Based on Pixels Complexity Analysis. SITIS 2007: 934-941 - [p1]Chin-Chen Chang, Tzu-Chuen Lu, Yi-Hsuan Fan:
A Bit-Level Visual Secret Sharing Scheme for Multi-Secret Images Using Rotation and Reversion Operatations. Intelligent Multimedia Data Hiding: New Directions 2007: 83-101 - 2006
- [j5]Chin-Chen Chang, Tzu-Chuen Lu:
Reversible index-domain information hiding scheme based on side-match vector quantization. J. Syst. Softw. 79(8): 1120-1129 (2006) - [j4]Chin-Chen Chang, Tzu-Chuen Lu:
A difference expansion oriented data hiding scheme for restoring the original host images. J. Syst. Softw. 79(12): 1754-1766 (2006) - [j3]Chin-Chen Chang, Yih-Shin Hu, Tzu-Chuen Lu:
A watermarking-based image ownership and tampering authentication scheme. Pattern Recognit. Lett. 27(5): 439-446 (2006) - [c8]Chin-Chen Chang, Tzu-Chuen Lu:
A Wavelet-Based Progressive Digital Image Transmission Scheme. ICICIC (2) 2006: 681-684 - [c7]Tzu-Chuen Lu, Chin-Chen Chang:
A Bandwidth Efficiency of the Locally Adaptive Compression Method for Hiding Secret Messages. JCIS 2006 - 2005
- [j2]Tzu-Chuen Lu, Chin-Chen Chang:
Data Compressor for VQ Index Tables. Fundam. Informaticae 65(4): 353-371 (2005) - [c6]Chin-Chen Chang, Tzu-Chuen Lu:
A Color-Based Image Retrieval Method Using Color Distribution and Common Bitmap. AIRS 2005: 56-71 - [c5]Chin-Chen Chang, Tzu-Chuen Lu, Jun-Bin Yeh:
A Bandwidth Efficiency of Lempel-Ziv Scheme for Data Authentication. KES (4) 2005: 249-256 - [c4]Chin-Chen Chang, Tzu-Chuen Lu:
Method for Searching Similar Images Using Quality Index Measurement. KES (2) 2005: 1224-1230 - 2004
- [c3]Chin-Chen Chang, Tzu-Chuen Lu, Yi-Long Liu:
Bandwidth Efficiency of an Image Compression Method for Information Hiding. AINA (1) 2004: 426-432 - [c2]Chin-Chen Chang, Tzu-Chuen Lu:
A Chinese Remainder Theorem Oriented Information Hiding Scheme. Eurographics Multimedia Workshop 2004: 181-190 - 2002
- [c1]Tzu-Chuen Lu, Chin-Chen Chang, S. Wesley Changchien:
An Association Rule Mining Method for Spatial Database. ISDB 2002: 281-286 - 2001
- [j1]S. Wesley Changchien, Tzu-Chuen Lu:
Mining association rules procedure to support on-line recommendation by customers and products fragmentation. Expert Syst. Appl. 20(4): 325-335 (2001)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint