吳憲珠【教授】
學    歷 : 國立中正大學資訊工程系博士
電子信箱 : wuhc@nutc.edu.tw
學校分機 : 04-22196604、04-22196302
專       長 : 多媒體技術、多媒體巨量資料分析與應用、多媒體安全、醫學影像技術

論文期刊

1. C. M. Chen, C. M. Chen, H. C. Wu, C. S. Tsai, "Common Carotid Artery Recognition Technology Using Effective Waveform Features Extracted from Ultras", Journal of Systems and Software 86, 1, 38-46, January, 2013
2. Y. A. Ho, Y. K. Chan, C. S. Tsai, Y. P. Chu and H. C. Wu, "A Binary Image Hiding-Compression Method Using BFT Linear Quadtree and Logic-Spectra", International Journal of Innovative Computing, Information and Control 8, 1(A) , 329-345, January, 2013
3. C. S. Tsai, H. C Wang, H. C. Wu and C. M. Wang, "A Cheat-Preventing Visual Cryptography Scheme by Referring the Special Position", International Journal of Innovative Computing, Information and Control 7, 7, 3923-3938, July, 2011
4. Y. C. Liu, H. C. Wu, S. S. Yu, "Adaptive DE-based Reversible Steganographic Technique Using Bilinear Interpolation and Simplified Lo", Multimedia Tools and Applications 52, 2-3, 263-276, April, 2011
5. H. C. Wu, H. C Wang, C. M. Wang, and C. S. Tsai, "Colored Visual Cryptography Using Fixed Size Meaningful Share", International Journal of Computer Mathematics 88, 6, 1239-1255, February, 2011
6. D. C. Lou, H. H. Chen, H. C. Wu, and C. S. Tsai, "A Novel Authenticatable Color Visual Secret Sharing Scheme using Non-expanded Meaningful Shares", Displays 32, 8, 118-134, February, 2011
7. C. S. Tsai, H. C Wang, H. C. Wu and C. M. Wang, "A Cheat-Preventing Visual Cryptography Scheme by Referring the Special Position", International Journal of Innovative Computing, Information and Control 7, 4, 1-15, January, 2011
8. H. C. Wu, H. C Wang, C. M. Wang, and C. S. Tsai, "Colored Visual Cryptography Using Fixed Size Meaningful Share", International Journal of Computer Mathematics 88, 6, 1239 - 1255, January, 2011
9. H. C Wang, H. C. Wu, C. M. Wang and C. S. Tsai , "A Robust Image Hiding Scheme based on Vector Quantization", Journal of Computers 21, 1, 74-82, April, 2010
10. H. C. Wu, H. C. Wang, C. S. Tsai and C. M. Wang, "Reversible Image Steganographic Scheme via Predictive Coding", Displays 31, 1, 35-43, January, 2010
11. Y. A. Ho, Y. K Chan, H. C. Wu, and Y. P Chu, "High-capacity Reversible Data Hiding in Binary Images Using Pattern Substitution", Computer Standards & Interfaces 31, 4, 787-794, June, 2009
12. C. C. Lee, H. C. Wu, C. S. Tsai, Y. P. Chu and H. R. Chen, "A High Capacity Reversible Data Hiding Scheme with Edge Prediction and Difference Expansion,", Journal of Systems and Software 82, 12, 1966-1973, December, 2009
13. R. M. Chao, H. C. Wu, C. C. Lee, Y. P Chu, "A Novel Image Data Hiding Scheme with Diamond Encoding", EURASIP Journal on Information Security 2009, 42-50, January, 2009
14. C. C. Lee, H. C. Wu, C. S. Tsai, and Y. P. Chu, "Adaptive Lossless Steganographic Scheme with Centralized Difference Expansion", Pattern Recognition 41, 6, 2097-2106, June, 2008
15. J. B. Feng, H. C. Wu, C. S. Tsai, Y. F. Chang, and Y. P. Chu, "Visual Secret Sharing for Multiple Secrets", Pattern Recognition 41, 12, 3572-3581, December, 2008
16. H. C. Wu and C. C. Chang, "An Image Retrieval Method Based on Color-Complexity and Spatial-Histogram Features", Fundamenta Informaticae 73, 1-13, December, 2006
17. H. C. Wu, H. C. Wang and C. S. Tsai, "Multiple Images Sharing Based on Color Visual Cryptography", Imaging Science Journal 54, 3, 164-177, December, 2006
18. H. C. Wu, J. D. Chang and Y. H. Lai, "Compressed Image Watermarking Scheme Based on Block Truncation Coding", GESTS International Transactions on Communication and Signal Processing 9, 1, 11-20, December, 2006
19. H. C. Wu, S. Y. Shih and Y. H. Lai, "A Dual Database Watermarking Scheme for Malicious Tampering Detection and Copyright Protection", GESTS International Transactions on Computer Science and Engineering 34, 1, 151-163, December, 2006
20. Y. K. Chan, D. L. Liau, Y. F. Chen, H. C. Wu and Y. P. Chu, "Minute Lossy Methodfor 2D-Gel Images Compression", International Journal of Imaging Systems and Technology 16, 1, 1-8, December, 2006
21. H. C. Wu, C. P. Yeh and C.S. Tsai, "A Semi-fragile Watermarking Scheme Based on SVD and VQ Techniques", Lecture Notes in Computer Science 3982, 406-415, December, 2006
22. H. C. Wu, N. I. Wu, C. S. Tsai and M. S. Hwang, "Image Steganographic Scheme Based on Pixel-value Differencing and LSB Replacement Methods", IEE Proceedings-Vision, Image & Signal Processing 152, 5, 611-615, October, 2005
23. H. C. Wu, C. Y. Liu and S. F. Chiou, "Cryptanalysis of a Secure One-Time Password Authentication Scheme with Low-Communication for Mobile ", International Journal of Network Security 1, 1, 32-34, October, 2005
24. S. K. Chong, H. C. Wu and C. C. Wu, "A Scheme for Key Management on Alternate Temporal Key Hash", International Journal of Network Security 1, 1, 8-13, October, 2005
25. H. C. Wu and C. C. Chang, "A Novel Digital Image Watermarking Scheme Based on the Vector Quantization Technique", Computers and Security 24, 460-471, October, 2005
26. H. C. Wu and C. C. Chang, "Sharing Visual Multi-secrets Using Circle Shares", Computer Standards & Interfaces 28, 123-135, October, 2005
27. H. C. Wu, M. S. Hwang and C. H. Liu, "A Secure Strong-Password Authentication Protocol", Fundamenta Informaticae 68, 4, 399-406, October, 2005
28. J. B. Feng, H. C. Wu, C. S. Tsai and Y. P. Chu, "A New Multi-Secret Images Sharing Scheme Using Largranges Interpolation", Journal of Systems and Software 76, 327-339, October, 2005
29. H. C. Wu and C. C. Chang, "Embedding Invisible Watermarks into Digital Images Based on Side-Match Vector Quantization", Fundamenta Informaticae 63, 89-106, October, 2004
30. H. C. Wu, C. S. Tsai and C. H. Lai, "A License Plate Recognition System in E-Government", International Journal of Information & Security 15, 2, 199-210, October, 2004
31. H. C. Wu and C. C. Chang, "An Image Watermarking Scheme Based on Fractal Compression Technique", Fundamenta Informaticae 58, 189-202, October, 2003
32. H. C. Wu and C. C. Chang, "Detection and Restoration of Tampered JPEG Compressed Images", Journal of Systems and Software 64, 151-161, October, 2002
33. C. C. Chang and H. C. Wu, "A Copyright Protection Scheme of Images Based on Visual Cryptography", Imaging Science Journal 49, 141-150, October, 2001
34. C. C. Chang and H. C. Wu, "A Secure and Robust Digital Image Copyright Protection Scheme", Journal of Applied System Studies 2, 3, October, 2001

國際研討會論文

1. J. H. Chao and H. C. Wu, "Content Based Image Retrieval Using Directional Local Patterns", The 2nd. International Conference on Applied and Theoretical Information Systems Research (ATISR2012, February, 2013
2. H. Y. Ho and H. C. Wu, "MR Image Segmentation Based on Fuzzy C-Means Clustering with Automatic Parameter Adjustment", The 2nd. International Conference on Applied and Theoretical Information Systems Research (ATISR2012, December, 2013
3. S. W. Lee and H. C. Wu , "Effective Multiple-features Extraction for Off-line SVM-Based Handwritten Numeral Recognition", The Third International Conference on Information Security and Intelligent Control (ISIC 2012), August, 2012
4. S. H. Hsueh and H. C. Wu , "Building Specified Web-Searching Image Database Using Quantization-Color-Size Histogram", the 2012 International Symposium on Computer, Consumer and Control (IS3C2012), 694-697, June, 2012
5. J. N. Chang and H. C. Wu, "Reversible Fragile Database Watermarking Technology using Difference Expansion Based on SVR Predicti", the 2012 International Symposium on Computer, Consumer and Control (IS3C2012), 690-693, June, 2012
6. J. B. Lai and H. C. Wu, "A Fragile Watermarking Scheme Based on Local Binary Pattern for Image Tamper Detection and Recovery", The 2nd. International Conference on Applied and Theoretical Information Systems Research (ATISR2012, December, 2012
7. Y. T. Chu, Y. C. Liu, Y. F. Lou and H. C. Wu, "Adaptive Prediction-based Reversible Information Hiding", The 2nd. International Conference on Applied and Theoretical Information Systems Research (ATISR2012, December, 2012
8. S. S. Yu, S. Y. Huang, Y. H. Pan, and H. C. Wu, "An Easy Dominant Color Extraction and Edge Valley Histogram for Image Retrieval", International Computer Symposium 2010 (ICS2010), December, 2010
9. H. C. Wu and J. H Lu, "Effective Distance Measure for Unusual FacialExpression Detection of Human Face Images", 2010 2nd International Symposium on Aware Computing (ISAC2010), December, 2010
10. H. C. Wu, R. J. Jang, and Y. C. Liu, "A Robust Watermarking Scheme Based on Singular Value Decomposition", International Computer Symposium 2010 (ICS2010), January, 2010
11. H. H. Chen, C. C. Lee, C. C. Lee, H. C. Wu, and C. S. Tsai , "Multi-level Visual Secret Sharing Scheme with Smooth-looking", The 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human(, 403155-160, November, 2009
12. R. M. Chou, H. C. Wu and Z. C. Chen, "Image Segmentation by Automatic Histogram Thresholding", Tthe 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human, 403136-141, November, 2009
13. K. C. Liu, H. C. Wu and J. Y Shiu, "A Novel Hierarchical K-means Clustering for White Blood Cells Segmentation", International Forum on Medical Imaging in Asia 2009, 10838569-74, January, 2009
14. H. C. Wu, Y.C. Liu, K.C. Liu, and C.S. Tsai , "A Block-based Authentication Watermarking Technique for Binary Images", The Eighth International Conference on Intelligent Systems Design and Applications (ISDA 2008), 513-518, November, 2008
15. H. C. Wu, H.C. Wang and R.W. Yu, "Color Visual Cryptography Scheme Using Meaning Shares", The Eighth International Conference on Intelligent Systems Design and Applications (ISDA 2008), 173-178, November, 2008
16. H. C. Wu, F.Y. Hsu and H.Y. Chen, "Tamper Detection of Relational Database Based on SVR Predictive Difference", The Eighth International Conference on Intelligent Systems Design and Applications (ISDA 2008), 403-408, November, 2008
17. H. C. Wu, K.C. Liu, J.D. Chang and C.H. Huang, "An Image Steganographic Scheme Based on Support Vector Regression", The Eighth International Conference on Intelligent Systems Design and Applications (ISDA 2008), 519-524, November, 2008
18. C. H. Hwang, C.C. Lee, H.C. Wu and C.M. Wang , "Lossless Data Hiding for Color Images", The Eighth International Conference on Intelligent Systems Design and Applications (ISDA 2008), 632-637, November, 2008
19. M. H. Tsai, F. Y. Hsu, J. D. Chang and H. C. Wu, "Fragile Database Watermarking for Malicious Tamper Detection Using Support Vector Regression", The Third International conference on Intelligent Information Hiding and Multimedia Signal Processin, 493-497, November, 2007
20. H. C. Wu, C. P. Yeh and C. S. Tsai, "A Robust Grayscale Watermarking Scheme Using Angle Quantization", Proceedings of International Workshop on Web Technologies and Information Security of International , December, 2006
21. H. C. Wu, C. C. Chang and T. W. Yu, "A DCT-based Recoverable Image Authentication", Proceedings of the 9th Joint Conference on Information Sciences (JCIS2006), 701-704, October, 2006
22. H. C. Wu, H. C. Lin and C. C. Chang, "Reversible Palette Image Steganography Based on De-clustering and Predictive Coding", Proceedings of the 9th Joint Conference on Information Sciences (JCIS2006), 705-708, October, 2006
23. H. C. Wu, C. S. Tsai and S. C. Huang, "Colored Digital Watermarking Technology Based on Visual Cryptography", Proceedings of 2005 IEEE-EURASIP Workshop on Nonlinear Signal and Image Processing, May, 2005
24. T. S. Chen, H. C. Wu and C. H. Lai, "Multi-Target Car License Plate Detection from Complex Environment", Proceedings of 2005 IEEE-EURASIP Workshop on Nonlinear Signal and Image Processing, May, 2005
25. T. S. Chen, H. C. Wu, H. F. Tsai, M. L. Hsieh and S. F. Chiou, "Progressive Transmission of Two-Dimensional gel Electrophoresis Image Based on Context Features and ", Proceedings of 2004 IEEE International Conference on Networking, Sensing and Control, March, 2004
26. Y. P. Chu, S. W. Guo, Y. K. Chan and H. C. Wu, "Image Hiding Based on a Hybrid Technique of VQ Compression and Discrete Wavelet Transformation", Proceedings of International Computer Symposium 2004 (ICS2004), 313-317, December, 2004
27. C. C. Chang and H. C. Wu,, "A (t, n)-threshold Secret Sharing Scheme for Hidden Images Based on a Watermarking Technique", Proceedings of the Seventh International Conference on Distributed Multimedia Systems, 281-288, September, 2001
28. C. C. Chang and H. C. Wu, "An Image Protection Scheme Based on Discrete Cosine Transformation", Advances in Software Engineering and Multimedia Applications, 290-94, August, 2000
29. C. C. Chang and H. C. Wu, "Computing Watermarks from Images Using Quadtrees", Proceedings of the Seventh International Conference on Parallel and Distributed Systems: Workshops, 123-128, July, 2000
30. H. C. Wu and C. C. Chang, "A Fast Chinese Words Accessing Scheme", Proceedings of 3rd International Conference in Chinese Information Processing, 13-19, October, 1992

國際專書論文

1. Y. K. Chan, Y. A. Ho, H. C. Wu and Y. P. Chu, "A Duplicate Chinese Document Image Based Retrieval System", Encyclopedia of Information Science and Technology, January, 2005
2. H. C. Wu and H. C. Lin, "Tree Growth Based Watermarking Technique", Encyclopedia of Information Science and Technology, 2nd ed., January, 2005
Exit >>