A benchmark for comparison of dental radiography analysis algorithms CW Wang, CT Huang, JH Lee, CH Li, SW Chang, MJ Siao, TM Lai, ... Medical image analysis 31, 63-76, 2016 | 337 | 2016 |
Fully automatic system for accurate localisation and analysis of cephalometric landmarks in lateral cephalograms C Lindner, CW Wang, CT Huang, CH Li, SW Chang, TF Cootes Scientific reports 6 (1), 33581, 2016 | 184 | 2016 |
Evaluation and Comparison of Anatomical Landmark Detection Methods for Cephalometric X-Ray Images: A Grand Challenge CW Wang, CT Huang, MC Hsieh, CH Li, R Vandaele, SW Chang, WC Li, ... IEEE Transactions on Medical Imaging 34 (9), 1-11, 2015 | 174 | 2015 |
Robust and blind image watermarking in DCT domain using inter-block coefficient correlation HJ Ko, CT Huang, G Horng, W Shiuh-Jeng Information Sciences 517, 128-147, 2020 | 109 | 2020 |
VQ applications in steganographic data hiding upon multimedia images WJ Wang, CT Huang, SJ Wang IEEE Systems Journal 5 (4), 528-537, 2011 | 77 | 2011 |
Image interpolating based data hiding in conjunction with pixel-shifting of histogram YT Chang, CT Huang, CF Lee, SJ Wang The Journal of Supercomputing 66, 1093-1110, 2013 | 67 | 2013 |
Reversible steganography based on side match and hit pattern for VQ-compressed images CH Yang, WJ Wang, CT Huang, SJ Wang Information Sciences 181 (11), 2218-2230, 2011 | 63 | 2011 |
Landmark detection in 2D bioimages for geometric morphometrics: a multi-resolution tree-based approach R Vandaele, J Aceto, M Muller, F Péronnet, V Debat, CW Wang, ... Scientific reports 8 (1), 538, 2018 | 44 | 2018 |
Data embedding for vector quantization image processing on the basis of adjoining state-codebook mapping WJ Wang, CT Huang, CM Liu, PC Su, SJ Wang Information Sciences 246, 69-82, 2013 | 44 | 2013 |
iPhone social networking for evidence investigations using iTunes forensics YC Tso, SJ Wang, CT Huang, WJ Wang Proceedings of the 6th International Conference on Ubiquitous information …, 2012 | 38 | 2012 |
VQ-based data hiding in IoT networks using two-level encoding with adaptive pixel replacements CT Huang, MY Tsai, LC Lin, WJ Wang, SJ Wang The Journal of Supercomputing 74, 4295-4314, 2018 | 29 | 2018 |
A scheme of reversible information hiding based on SMVQ CT Huang, WJ Wang, CH Yang, SJ Wang The Imaging Science Journal 61 (2), 195-203, 2013 | 19 | 2013 |
Steganography of data embedding in multimedia images using interpolation and histogram shifting WJ Wang, YH Zhang, CT Huang, SJ Wang 2013 Ninth International Conference on Intelligent Information Hiding and …, 2013 | 13 | 2013 |
VirtualMicroscopy: ultra-fast interactive microscopy of gigapixel / terapixel images over internet CW Wang, CT Huang, CM Hung Scientific Reports 5, 14069, 2015 | 12 | 2015 |
Mobile Forensics for Cloud Storage Service on iOS Systems CT Huang, HJ Ko, ZW Zhuang, PC Shih, SJ WANG The International Symposium on Information Theory and Its Applications …, 2018 | 10 | 2018 |
Mutual authentications to parties with QR-code applications in mobile systems CT Huang, YH Zhang, LC Lin, WJ Wang, SJ Wang International Journal of Information Security 16, 525-540, 2017 | 10 | 2017 |
A New Adaptive Steganographic Method Based on Gradient Adjacent Prediction and Side-Match Vector Quantization. SR Tsui, CT Huang, WJ Wang J. Inf. Hiding Multim. Signal Process. 4 (4), 215-224, 2013 | 10 | 2013 |
DCT-based compressed image with reversibility using modified quantization CY Weng, CT Huang, HW Kao Advances in Intelligent Information Hiding and Multimedia Signal Processing …, 2018 | 9 | 2018 |
A Rapid Deployment Indoor Positioning Architecture based on Image Recognition JH Wu, CT Huang, ZR Huang, YB Chen, SC Chen 2020 IEEE 7th International Conference on Industrial Engineering and …, 2020 | 8 | 2020 |
File changes with security proof stored in cloud service systems CY Yang, CT Huang, YP Wang, YW Chen, SJ Wang Personal and Ubiquitous Computing 22 (1), 45-53, 2018 | 7 | 2018 |