國立嘉義大學LOGO * ::: *回首頁*| *國立嘉義大學*| *網站導覽*| *常見問答*| *連絡我們*| *雙語詞彙*| *RSS訂閱*| *行動版*| *English*
*
English *

*
* 校友及各界捐款
*
嘉大電子郵件WebMail
*
全民資安素養自我評量
*
嘉大合作社
*
大專校院高等教育人力躍升培訓及媒合平臺
*
畢業生流向調查問卷
*
推廣教育專區
*
檢驗分析及技術推廣服務中心
*
校園徵才
*
國際交流花絮
*

  更多banner
*

* *
*

瀏覽人次 61047926
*
最後更新 2024/03/04
*
隱私權政策
*
* 網路安全政策

蘭花 蜘蛛百合 金英樹
* :::* 你現在的位置:首頁 > Research 研究成果 > Chih-Hung Lin
*  
 
* Research 研究成果 *
友善列印

Chih-Hung Lin Assistant professor [Publication Lists]

A.Journal Articles
1.Chih-Hung Lin* and Ching-Yu Yang, “Multipurpose Watermarking Based on Blind

    Vector Quantization (BVQ),” Journal of Information Hiding and Multimedia Signal

    Processing, 2010. (in press)

2.Ching-Yu Yang, Chih-Hung Lin and Wu-Chih Hu, “Reversible Data Hiding By Adaptive

   IWT-coefficient Adjustment,” Journal of Information Hiding and Multimedia Signal

   Processing, 2010. (in press)

3.Chih-Hung Lin* , ”Multi-Purpose Digital Watermarking Method – Integrating Robust,

   Fragile and Semi-Fragile  Watermarking,” to appear in International Journal of
   Innovative
Computing, Information and Control, Vol.6, No.7, pp. 3023-3036, July 2010
   (SCI, EI)

4.Ching-Yu Yang, Wu-Chih Hu and Chih-Hung Lin, “Reversible Data Hiding by
   Coefficient-bias Algorithm,” Journal of  Information Hiding and Multimedia Signal
   Processing, Vol.1, No.2, pp. 91-100, April 2010 (ISSN 2073-4212)

5.Chih-Hung Lin*, Yu-Chiang Li, Hsiao-Fen Chien and Sheng-Lung Chien, “Multipurpose

   Image Authentication Method Based on Vector Quantization”, International Journal of

   Innovative Computing, Information and Control, Vol.6, No.3, pp.1435-1446, March 2010

   (SCI, EI)

6.Chih-Hung Lin*, Tung-Shih Su and Wen-Shyong Hsieh, "Semi-Fragile Watermarking

   Scheme for Authentication of JPEG Images," Tamkang Journal of Science and

   Engineering, An International Journal, Vol. 10, No 1, pp. 57-66, Mar.2007 (EI)

7.Chih-Hung Lin* and Wen-Shyong Hsieh, ”Image Authentication Scheme for Resisting

   JPEG, JPEG2000 Compression and Scaling,” IEICE Transactions on Information and

   Systems, Vol. E90-D, No. 1, pp. 126-136, Jan. 2007 (SCI, EI)

8.Chih-Hung Lin* and Wen-Shyong Hsieh, ”Applying Statistics Ogive to Semi-Fragile

   Authentication of JPEG Images for Communication System,” Tamkang Journal of

   Science and Engineering, An International Journal, Vol. 9, No. 2, pp.81-88, Jun.
   2006 (EI)


B.Conference Papers
(a) International Conference
1.Chih-Hung Lin, Ching-Yu Yang and Chia-Wei Chang, "Authentication and Protection
   for
 
Medical Image," The 2nd International Conference on Computational Collective
   Intelligence (ICCCI) - Technology and Applications, Springer-Verlag, Kaohsiung,
   Taiwan,
 Nov. 10-12, 2010 (EI) (Accepted)
2.Yung-Chen Chou, Chih-Hung Lin, Po-Chin Li, and Yu-Chiang Li, "A (2, 3) Threshold
   Secret Sharing Scheme Using Sudoku," The Sixth International Conference on

   Intelligent Information Hiding and Multimedia Signal Processing, IEEE  IIHMSP2010,

   Darmstadt, Germany, Oct. 15-17, 2010 (EI) (Accepted)

3.Ching-Yu Yang, Chih-Hung Lin, and Wu-Chih Hu, "Coefficient Adjustment Method for

   Reversible Watermarking", The Sixth International Conference on Intelligent Information
   Hiding and Multimedia Signal Processing, IEEE IIHMSP2010,Darmstadt, Germany,
   Oct.
15-17, 2010 (EI) (Accepted)
4.Chih-Hung Lin, Yu-Chiang Li, Ming-Ni Wu, Shun-Sheng Yang and Kuan-Ju Chen,

   "Multipurpose Watermarking Method Based on Blind Vector Quantization," The Fifth

   International Conference on Intelligent Information Hiding and Multimedia Signal

   Processing, IEEE IIHMSP2009, Kyoto, Japan, pp. 636-639, Sep. 12-14, 2009 (EI) (ISBN
   978-0-7695-3762-7)
5.Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh and Chien-Ting Huang, "Palette
   Partition Based Data Hiding for  Color Images, " The Fifth International Conference on

   Intelligent Information Hiding and Multimedia Signal Processing, IEEE IIHMSP2009,

   Kyoto, Japan, pp. 620-623, Sep. 12-14,2009 (EI) (ISBN 978-0-7695-3762-7)

6.Chih-Hung Lin and Hsiao-Fen Chien, "Multipurpose Image Authentication Method
   based
on Vector Quantization," The Fourth International Conference on Intelligent
   Information
Hiding and Multimedia Signal Processing, IEEE IIHMSP2008,Harbin,
   China, pp. 1186-
1189, Aug. 15-17, 2008 (EI) (ISBN 978-0-7695-3278-3)
7.Chih-Hung Lin and Sheng-Lung Chien, "Multi-Purpose Image Watermarking Method

    Based on Wavelet Transform," The Fourth International Conference on Intelligent
 
    Information Hiding and Multimedia Signal Processing, IEEE IIHMSP2008, Harbin,
    China,
pp. 1182-1185, Aug. 15-17, 2008 (EI) (ISBN 978-0-7695-3278-3)
8.Chih-Hung Lin, Chin-Shan Ho, Ten-Chuan Hsiao, Sheng-Lung Chien and Hsiao-Fen
 
   Chien, "The Shortest Movement Path System of Vehicles based on Image," Ming
   Chuan
University International Academic  Conference, Taoyuan, Mar. 2007.
9.Chih-Hung Lin, Chin-Shan Ho, Ten-Chuan Hsiao, Hsiao-Fen Chien, Che-Chia Ho and

   Sheng-Lung Chien, Semi-Fragile Image Authentication Scheme that robust to

   Compression and Scaling," Ming Chuan University International  Academic
   Conference,
Taoyuan, Mar. 2007.
10.Chin-Shan Ho, Hsien-TsaiWu, Jian-Jung Chen, Chu-Chang Tyan, Ten-Chuan Hsiao,

   Chih-Hung Lin and Chi-Kang Ho, “Design of Pulse Wave DataBase,” 2006 International

   Symposium on Biomedical Engineering (ISOBME), Taiwan.

 11.Chin-Shan Ho, Hsien-TsaiWu, Chih-Hung Lin, Ten-Chuan Hsiao, Chia-Nian Shyi and

    Jiun-Liang Cheng, “Calculation of Continuous Heart rate during JOG and Recovery,”

    2006 International Symposium on Biomedical Engineering (ISOBME), Taiwan.

12.Tung-Shih Su, Chih-Hung Lin, Wen-Shyong Hsieh, “A Novel QoS-Aware Routing for
    Ad
Hoc Networks,” The 2006 International Conference on Wireless Networks (ICWN'06:
    June 26-29,2006, Las Vegas, USA)

13.Hsien-Tsai Wu, Chin-Shan Ho, Wei-Chuan Tsai, Ming-Chun Wang, Chih-Hung Lin and

    Hsuan-Kuang Chen, “Design of Portable Instrument for Physiological Pulse,”

    Proceedings of 2005 CACS Automatic Control Conference, Nov. 2005.

14.Chin-Shan Ho, Hsien-Tsai Wu, Deng-Maw Lu, Chih-Hung Lin, Shing-Hua Ho and Kun-
    Hsien Chou, “Development of a Measurement System for Electrocardiograms and Its 
    Application to Remote Home Care,” Proceedings of 2005 CACS Automatic Control
 
   Conference, Nov. 2005.

15.Chin-Shan Ho, Hsien-Tsai Wu, Chih-Hung Lin, Ten-Chuan Hsiao, Shing-Hua Ho and
    Yi-
Zhi Huang, “A DSP  Application for Measurement of Pulse Wave Velocity by
     Photoplethysmography and Electrocardiogram,” IEEE
     ICSS2005 International
Conference on Systems & Signals, pp. 1477-1480, Apr. 2005.
16.Chih-Hung Lin, Ten-Chuan Hsiao, Hsien-Tsai Wu, Chin-Shan Ho and Che-Chia Ho, “A

     Novel Semi-Fragile Scheme for Image Authentication and Recover,” IEEE ICSS2005

     International Conference on Systems & Signals, pp.365-369, Apr. 2005.

17.Chih-Hung Lin, Ten-Chuan Hsiao, Hsien-Tsai Wu, Chin- Shan Ho and Cheng-Chien
    
Hsu, A Novel Semi-Fragile Image Authentication Method for JPEG Compression,
     " IEEE
  ICSS2005 International Conference on Systems & Signals, pp.519-523, Apr.
     2005.


(b) National Conference
1.Chih-Hung Lin, Tien-Chuan Hsiao, and Chia-Wei Chang, “The Improvement of
   Multipurpose Watermarking Method Based on Blind Vector Quantization (BVQ)”, The
   17th National Conference on Fuzzy Theory and Its Application, Kaohsiung, Taiwan,
 
   pp.1235-1240, Dec. 18-19, 2009.

2.林志鴻, 蕭天泉, 何金山, 簡聖龍, 陳冠儒, “運動影像中球員移動追蹤之統計與分析- 以羽球
   運動
為例”, 2008台灣運動生物力學學會及台灣生物力學學會聯合年會暨學術研討會, pp.
   45-46,
Nov 1, 2008.
3.Chih-Hung Lin, Chin-Shan Ho, Ten-Chuan Hsiao, Hsiao-Cheng Lu, Pei-Yao Lin and
   Jiun-
Liang Cheng, “Design of Telemedical System for Healthcare”, International
   Symposium
on Biomedical Engineering,  Chang Gung University,Tao-Yuan, Taiwan,
   Dec 12-13 2008.

4.Ten-Chuan Hsiao, Chin-Shan Ho, Chih-Hung Lin, Chih-Chin Wang, Pei-Yao Lin and
   Jiun-
Liang Cheng, “Comparison of Arteriosclerosis Parameters in Young and Old
   Groups”,
International Symposium on Biomedical Engineering, Chang Gung
   University, Tao-Yuan,
Taiwan, Dec 12-13 2008.
5.Chih-Hung Lin and Hsiao-Fen Chien , "A Semi-Fragile Image Authentication Method
   for
Resisting JPEG and JPEG2000 Compression," 20th Computer Vision, Graphics and
   Image Processing Conference, pp. 722-725, Aug 19-21 2007.

6.Chih-Hung Lin and Sheng-Lung Chien , "A Semi-Fragile Image Authentication Method

    based on Wavelet Transform,"20th Computer Vision, Graphics and Image Processing

    Conference, pp. 726-731, Aug 19-21 2007.

*

*


到頁面頂端
*
* * *
回上一頁


* 國立嘉義大學LOGO 國立嘉義大學 版權所有 Copyright © 2008 All Rights Reserved.
[ A+無障礙標章 ][ GOV標章 ] ][ QRcode ]