Efficient multi-secret image sharing based on Boolean operations TH Chen, CS Wu Signal Processing 91 (1), 90-97, 2011 | 244 | 2011 |
Threshold visual secret sharing by random grids TH Chen, KH Tsao Journal of Systems and Software 84 (7), 1197-1208, 2011 | 238 | 2011 |
Visual secret sharing by random grids revisited TH Chen, KH Tsao Pattern recognition 42 (9), 2203-2217, 2009 | 225 | 2009 |
Cheating in visual cryptography G Horng, T Chen, DS Tsai Designs, Codes and Cryptography 38, 219-236, 2006 | 213 | 2006 |
User-friendly random-grid-based visual secret sharing TH Chen, KH Tsao IEEE Transactions on Circuits and Systems for Video Technology 21 (11), 1693 …, 2011 | 137 | 2011 |
A publicly verifiable copyright-proving scheme resistant to malicious attacks TH Chen, G Horng, WB Lee IEEE Transactions on industrial electronics 52 (1), 327-334, 2005 | 137 | 2005 |
A cheating prevention scheme for binary visual cryptography with homogeneous secret images DS Tsai, TH Chen, G Horng Pattern Recognition 40 (8), 2356-2366, 2007 | 106 | 2007 |
A novel secret image sharing scheme for true-color images with size constraint DS Tsai, G Horng, TH Chen, YT Huang Information Sciences 179 (19), 3247-3254, 2009 | 103 | 2009 |
Cryptanalysis and improvement of two hyper-chaos-based image encryption schemes FG Jeng, WL Huang, TH Chen Signal processing: Image communication 34, 45-51, 2015 | 96 | 2015 |
A self-verification authentication mechanism for mobile satellite communication systems TH Chen, WB Lee, HB Chen Computers & Electrical Engineering 35 (1), 41-48, 2009 | 95 | 2009 |
Multi-image encryption by circular random grids TH Chen, KC Li Information Sciences 189, 255-265, 2012 | 84 | 2012 |
Multiple-image encryption by rotating random grids TH Chen, KH Tsao, KC Wei 2008 Eighth International Conference on Intelligent Systems Design and …, 2008 | 74 | 2008 |
A round-and computation-efficient three-party authenticated key exchange protocol TH Chen, WB Lee, HB Chen Journal of Systems and Software 81 (9), 1581-1590, 2008 | 74 | 2008 |
Compression-unimpaired batch-image encryption combining vector quantization and index compression TH Chen, CS Wu Information Sciences 180 (9), 1690-1701, 2010 | 70 | 2010 |
Owner–customer right protection mechanism using a watermarking scheme and a watermarking protocol TH Chen, DS Tsai Pattern Recognition 39 (8), 1530-1541, 2006 | 61 | 2006 |
Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks HB Chen, TH Chen, WB Lee, CC Chang Computer Standards & Interfaces 30 (1-2), 95-99, 2008 | 56 | 2008 |
A new method for using hash functions to solve remote user authentication TH Chen, WB Lee Computers & Electrical Engineering 34 (1), 53-62, 2008 | 52 | 2008 |
On generating meaningful shares in visual secret sharing scheme DS Tsai, T Chen, G Horng The Imaging Science Journal 56 (1), 49-55, 2008 | 49 | 2008 |
On the security of a copyright protection scheme based on visual cryptography TH Chen, CC Chang, CS Wu, DC Lou Computer Standards & Interfaces 31 (1), 1-5, 2009 | 47 | 2009 |
Yet another multiple-image encryption by rotating random grids TH Chen, KH Tsao, YS Lee Signal Processing 92 (9), 2229-2237, 2012 | 46 | 2012 |