column
Guest Editorial: Special Issue on Information Security
Chin-Chen Chang, Chia-Chen Lin
2011, 9(4): 289-290. DOI: 10.3969/j.issn.1674-862X.2011.04.001
Abstract PDF
Block-Based Adaptive Image Steganography Using LSB Matching Revisited
Wei Huang, Yao Zhao, Rong-Rong Ni
2011, 9(4): 291-296. DOI: 10.3969/j.issn.1674-862X.2011.04.002
Abstract PDF
Double-Layer Data Embedding Scheme Based on Three-Pixel Differences
Yi-Hui Chen, Chiao-Chih Huang, Chi-Shiang Chan
2011, 9(4): 297-300. DOI: 10.3969/j.issn.1674-862X.2011.04.003
Abstract PDF
A Novel Scheme for Compression of Cash Images
Li Li, Feng Wang, Jian-Feng Lu, Da-Xing Zhang
2011, 9(4): 301-305. DOI: 10.3969/j.issn.1674-862X.2011.04.004
Abstract PDF
Robust Watermarking with Kernels-Alternated Error Diffusion and Weighted Lookup Table in Halftone Images
Jing-Ming Guo
2011, 9(4): 306-311. DOI: 10.3969/j.issn.1674-862X.2011.04.005
Abstract PDF
Steganalysis Using Fractal Block Codes and AP Clustering in Grayscale Images
Guang-Yu Kang, Yu-Xin Su, Shi-Ze Guo, Rui-Xu Guo, Zhe-Ming Lu
2011, 9(4): 312-316. DOI: 10.3969/j.issn.1674-862X.2011.04.006
Abstract PDF
Construction of General (k, n) Probabilistic Visual Cryptography Scheme
Ching-Nung Yang, Chih-Cheng Wu, Feng Liu
2011, 9(4): 317-324. DOI: 10.3969/j.issn.1674-862X.2011.04.007
Abstract PDF
A Visual Secret Sharing Scheme for Progressively Restoring Secrets
Chin-Chen Chang, Yi-Pei Hsieh, Chi-Cheng Liao
2011, 9(4): 325-331. DOI: 10.3969/j.issn.1674-862X.2011.04.008
Abstract PDF
Media Sharing Scheme with Cheater Identification and Content Reconstruction
Pei-Yu Lin
2011, 9(4): 332-338. DOI: 10.3969/j.issn.1674-862X.2011.04.009
Abstract PDF
A Photo Certificate-A Framework for Generating Visualized Public Key Certificates
Wei-Bin Lee, Chien-Chen Huang, Chia-Chen Lin
2011, 9(4): 339-344. DOI: 10.3969/j.issn.1674-862X.2011.04.010
Abstract PDF
Enhanced Delegation Based Authentication Protocol for Secure Roaming Service with Synchronization
Hsing-Bai Chen, Yung-Hsiang Lai, Kuei-Wan Chen, Wei-Bin Lee
2011, 9(4): 345-351. DOI: 10.3969/j.issn.1674-862X.2011.04.011
Abstract PDF
An Improved User Authentication and Key Agreement Scheme Providing User Anonymity
Ya-Fen Chang, Pei-Yu Chang
2011, 9(4): 352-358. DOI: 10.3969/j.issn.1674-862X.2011.04.012
Abstract PDF
A Novel Shopping Protocol for Ubiquitous Commerce
Iuon-Chang Lin, Hsiao-Chi Chiang
2011, 9(4): 359-363. DOI: 10.3969/j.issn.1674-862X.2011.04.013
Abstract PDF
Security Architecture on the Trusting Internet of Things
Bing Zhang, Xin-Xin Ma, Zhi-Guang Qin
2011, 9(4): 364-367. DOI: 10.3969/j.issn.1674-862X.2011.04.014
Abstract PDF
Cross-Layer Design Based Optimized Link State Routing Protocol for Wireless Mesh Networks
Huai-Yu Wen, Guang-Chun Luo
2011, 9(4): 368-372. DOI: 10.3969/j.issn.1674-862X.2011.04.015
Abstract PDF
Optimal Static Partition Configuration in ARINC653 System
Sheng-Lin Gui, Lei Luo, Sen-Sen Tang, Yang Meng
2011, 9(4): 373-378. DOI: 10.3969/j.issn.1674-862X.2011.04.016
Abstract PDF