T
Tzung-Her Chen
Researcher at National Chiayi University
Publications - 74
Citations - 2169
Tzung-Her Chen is an academic researcher from National Chiayi University. The author has contributed to research in topics: Visual cryptography & Secret sharing. The author has an hindex of 23, co-authored 74 publications receiving 2007 citations. Previous affiliations of Tzung-Her Chen include National Chung Hsing University.
Papers
More filters
Journal ArticleDOI
Threshold visual secret sharing by random grids
Tzung-Her Chen,Kai-Hsiang Tsao +1 more
TL;DR: A threshold RG-based VSS scheme aiming at providing the wide-use version is presented, and the experimental results and theoretically analysis in visual quality and security show that the proposed scheme performs well.
Journal ArticleDOI
Visual secret sharing by random grids revisited
Tzung-Her Chen,Kai-Hsiang Tsao +1 more
TL;DR: This paper is the first attempt in the literature to develop new RG-based VSS schemes by means of extending the basic 2- out-of-2 scheme to the n-out- of-n as well as 2-out -of-n ones.
Journal ArticleDOI
Cheating in Visual Cryptography
TL;DR: The experimental results demonstrate that cheating is possible when the cheaters form a coalition in order to deceive honest participants, and a simple cheating prevention visual cryptographic schemes are proposed.
Journal ArticleDOI
Efficient multi-secret image sharing based on Boolean operations
Tzung-Her Chen,Chang-Sian Wu +1 more
TL;DR: An efficient (n+1, n+1) multi-secret image sharing scheme based on Boolean-based VSS is proposed to not only keep the secret images confidential but also increase the capacity of sharing multiple secrets.
Journal ArticleDOI
A publicly verifiable copyright-proving scheme resistant to malicious attacks
TL;DR: A wavelet-based copyright-proving scheme that does not require the original image for logo verification is proposed and is strong enough to resist malicious manipulations of an image including blurring, JPEG compression, noising, sharpening, scaling, rotation, cropping, scaling-cropping, and print-photocopy-scan attacks.