scispace - formally typeset
T

Tzung-Her Chen

Researcher at National Chiayi University

Publications -  74
Citations -  2169

Tzung-Her Chen is an academic researcher from National Chiayi University. The author has contributed to research in topics: Visual cryptography & Secret sharing. The author has an hindex of 23, co-authored 74 publications receiving 2007 citations. Previous affiliations of Tzung-Her Chen include National Chung Hsing University.

Papers
More filters
Journal ArticleDOI

Multi-image encryption by circular random grids

TL;DR: A novel RG-based VSS scheme that encodes multiple secret images at a time that has no pixel expansion, a higher capacity for secret sharing, and no need for a complex VC codebook to be redesigned is proposed.
Journal ArticleDOI

Compression-unimpaired batch-image encryption combining vector quantization and index compression

TL;DR: A novel batch-image encryption algorithm that combines Vector Quantization (VQ) and additional index-compression process to benefit from their computational efficiency and low transmission bandwidth without affecting the original compression rate is presented.
Journal ArticleDOI

A round- and computation-efficient three-party authenticated key exchange protocol

TL;DR: A round- and computation-efficient three-party authenticated key exchange protocol is proposed which fulfils all of the above mentioned requirements.
Proceedings ArticleDOI

Multiple-Image Encryption by Rotating Random Grids

TL;DR: The authors present the new scheme which encrypts two secret images into two random grids without any pixel expansion and decrypts the original secrets by directly stacking tworandom grids in an additional way of rotating one random grid at 90, 180 or 270 degrees.
Journal ArticleDOI

Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol

TL;DR: The authors combine cryptography with watermarking to simultaneously address the problems of protecting the owner's copyright and the legal customer's ownership and proposed schemes are resistant to counterfeit, collusion, averaging, and copy attacks.