default search action
Der-Chyuan Lou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j50]Tian-Fu Lee, Der-Chyuan Lou, Chien-Hung Chang:
Enhancing lightweight authenticated key agreement with privacy protection using dynamic identities for Internet of Drones. Internet Things 23: 100877 (2023) - 2021
- [j49]Wien Hong, Jie Wu, Der-Chyuan Lou, Xiaoyu Zhou, Jeanne Chen:
An AMBTC Authentication Scheme With Recoverability Using Matrix Encoding and Side Match. IEEE Access 9: 133746-133761 (2021)
2010 – 2019
- 2018
- [j48]Wien Hong, Xiaoyu Zhou, Der-Chyuan Lou, Tung-Shou Chen, Yuyang Li:
Joint image coding and lossless data hiding in VQ indices using adaptive coding techniques. Inf. Sci. 463-464: 245-260 (2018) - [j47]Wien Hong, Xiaoyu Zhou, Der-Chyuan Lou, Xiaoqin Huang, Cancan Peng:
Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images. Symmetry 10(8): 318 (2018) - 2015
- [j46]Der-Chyuan Lou, Tian-Fu Lee, Tsung-Hung Lin:
Efficient biometric authenticated key agreements based on extended chaotic maps for telecare medicine information systems. J. Medical Syst. 39(5): 58 (2015) - 2014
- [j45]Der-Chyuan Lou, Hui-Feng Huang:
An efficient t-out-of-n oblivious transfer for information security and privacy protection. Int. J. Commun. Syst. 27(12): 3759-3767 (2014) - [j44]Peter Mueller, Der-Chyuan Lou, Xinyi Huang:
Special issue on applied cryptography for information and communication networks. Secur. Commun. Networks 7(2): 397-398 (2014) - 2013
- [j43]Fong-Hao Liu, Hsiang-Fu Lo, Chun-Te Su, Der-Chyuan Lou, Wei-Tsong Lee:
High Performance Reversible Data Hiding for Mobile Applications and Human Interaction. Int. J. Technol. Hum. Interact. 9(4): 41-57 (2013) - [j42]Der-Chyuan Lou, Kuo-Ching Liu, Hui-Feng Huang:
Efficient Mobile Conference Scheme for Wireless Communication. Informatica 24(1): 59-70 (2013) - [j41]Der-Chyuan Lou, Chao-Lung Chou, Hung-Yuan Wei, Hui-Feng Huang:
Active steganalysis for interpolation-error based reversible data hiding. Pattern Recognit. Lett. 34(9): 1032-1036 (2013) - 2012
- [j40]Der-Chyuan Lou, Chen-Hao Hu:
LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis. Inf. Sci. 188: 346-358 (2012) - [c10]Hao-Kuan Tso, Der-Chyuan Lou:
Medical image protection using secret sharing scheme. ICUIMC 2012: 93:1-93:4 - 2011
- [j39]Der-Chyuan Lou, Hong-Hao Chen, Hsien-Chu Wu, Chwei-Shyong Tsai:
A novel authenticatable color visual secret sharing scheme using non-expanded meaningful shares. Displays 32(3): 118-134 (2011) - [j38]Der-Chyuan Lou, Hui-Feng Huang:
Efficient three-party password-based key exchange scheme. Int. J. Commun. Syst. 24(4): 504-512 (2011) - 2010
- [j37]Chia-Long Wu, Der-Chyuan Lou, Te-Jen Chang:
Fast modular multiplication based on complement representation and canonical recoding. Int. J. Comput. Math. 87(13): 2871-2879 (2010) - [j36]Der-Chyuan Lou, Nan-I Wu, Chung-Ming Wang, Zong-Han Lin, Chwei-Shyong Tsai:
A novel adaptive steganography based on local complexity and human vision sensitivity. J. Syst. Softw. 83(7): 1236-1248 (2010)
2000 – 2009
- 2009
- [j35]Te-Jen Chang, Chia-Long Wu, Der-Chyuan Lou, Ching-Yin Chen:
A low-complexity LUT-based squaring algorithm. Comput. Math. Appl. 57(9): 1494-1501 (2009) - [j34]Tzungher Chen, Chin-Chen Chang, Chang-Sian Wu, Der-Chyuan Lou:
On the security of a copyright protection scheme based on visual cryptography. Comput. Stand. Interfaces 31(1): 1-5 (2009) - [j33]Der-Chyuan Lou, Ming-Chiang Hu, Jiang-Lung Liu:
Multiple layer data hiding scheme for medical images. Comput. Stand. Interfaces 31(2): 329-335 (2009) - [j32]Der-Chyuan Lou, Chiang-Lung Liu, Chih-Lin Lin:
Message estimation for universal steganalysis using multi-classification support vector machine. Comput. Stand. Interfaces 31(2): 420-427 (2009) - [j31]Chia-Long Wu, Der-Chyuan Lou, Te-Jen Chang:
Computational Reduction of Wilson's Primality Test for Modern Cryptosystems. Informatica (Slovenia) 33(4): 453-458 (2009) - [c9]Hao-Kuan Tso, Der-Chyuan Lou, Dah-Lih Jeng, Chao-Lung Chou:
Secret Sharing Method for Gray-level Images. IIH-MSP 2009: 295-298 - 2008
- [c8]Chia-Long Wu, Der-Chyuan Lou, Te-Jen Chang:
Fast Modular Multiplication for E-Commerce Cryptosystem. ISDA (3) 2008: 457-461 - [c7]Hao-Kuan Tso, Der-Chyuan Lou, Kai-Ping Wang, Chiang-Lung Liu:
A Lossless Secret Image Sharing Method. ISDA (3) 2008: 616-619 - [c6]Chia-Long Wu, Der-Chyuan Lou, Te-Jen Chang:
An efficient Montgomery exponentiation algorithm for public-key cryptosystems. ISI 2008: 284-285 - 2007
- [j30]Der-Chyuan Lou, Jui-Chang Lai, Chia-Long Wu, Te-Jen Chang:
An efficient Montgomery exponentiation algorithm by using signed-digit-recoding and folding techniques. Appl. Math. Comput. 185(1): 31-44 (2007) - [j29]Chia-Long Wu, Der-Chyuan Lou, Jui-Chang Lai, Te-Jen Chang:
Fast modular multi-exponentiation using modified complex arithmetic. Appl. Math. Comput. 186(2): 1065-1074 (2007) - [j28]Chia-Long Wu, Der-Chyuan Lou, Te-Jen Chang:
Fast binary multiplication by performing dot counting and complement recoding. Appl. Math. Comput. 191(1): 132-139 (2007) - [j27]Ming-Chiang Hu, Der-Chyuan Lou, Ming-Chang Chang:
Dual-wrapped digital watermarking scheme for image copyright protection. Comput. Secur. 26(4): 319-330 (2007) - [j26]Der-Chyuan Lou, Hao-Kuan Tso, Jiang-Lung Liu:
A copyright protection scheme for digital images using visual cryptography technique. Comput. Stand. Interfaces 29(1): 125-131 (2007) - [j25]Chia-Long Wu, Der-Chyuan Lou, Te-Jen Chang, Shih-Yun Chen:
Integer factorization for RSA cryptosystem under a PVM environment. Comput. Syst. Sci. Eng. 22(1-2) (2007) - [c5]Chiang-Lung Liu, Der-Chyuan Lou, Chien-Chung Lee:
Reversible Data Embedding Using Reduced Difference Expansion. IIH-MSP 2007: 433-436 - [c4]Der-Chyuan Lou, Chiang-Lung Liu, Chih-Lin Lin, Shin-Her Wang:
Length Estimation for Embedded Message Using Support Vector Machine. IIH-MSP 2007: 437-440 - 2006
- [j24]Jiang-Lung Liu, Der-Chyuan Lou, Ming-Chang Chang, Hao-Kuan Tso:
A robust watermarking scheme using self-reference image. Comput. Stand. Interfaces 28(3): 356-367 (2006) - [j23]Jieh-Ming Shieh, Der-Chyuan Lou, Ming-Chang Chang:
A semi-blind digital watermarking scheme based on singular value decomposition. Comput. Stand. Interfaces 28(4): 428-440 (2006) - [j22]Der-Chyuan Lou, Jieh-Ming Shieh, Hao-Kuan Tso:
A robust buyer-seller watermarking scheme based on DWT. Int. J. Pattern Recognit. Artif. Intell. 20(1): 79-90 (2006) - [j21]Chia-Long Wu, Der-Chyuan Lou, Jui-Chang Lai, Te-Jen Chang:
Fast Parallel Exponentiation Algorithm for RSA Public-Key Cryptosystem. Informatica 17(3): 445-462 (2006) - [j20]Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang:
On the security of the Yen-Guo's domino signal encryption algorithm (DSEA). J. Syst. Softw. 79(2): 253-258 (2006) - [j19]Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang:
Erratum to "On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)" [The Journal of Systems and Software 79 (2006) 253-258]. J. Syst. Softw. 79(12): 1789 (2006) - 2005
- [j18]Chia-Long Wu, Der-Chyuan Lou, Te-Jen Chang:
An Efficient Montgomery Exponentiation Algorithm for Cryptographic Applications. Informatica 16(3): 449-468 (2005) - [c3]Yan-Xiang Deng, Chao-Jang Hwang, Der-Chyuan Lou:
A two-stage reconfigurable image processing system. ISSPA 2005: 315-318 - [c2]Jieh-Ming Shieh, Der-Chyuan Lou, Hao-Kuan Tso:
A robust watermarking scheme for digital image using self similarity. ITRE 2005: 115-119 - [i1]Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang:
On the security of the Yen-Guo's domino signal encryption algorithm (DSEA). CoRR abs/cs/0501013 (2005) - 2004
- [j17]Der-Chyuan Lou, Chia-Long Wu:
Parallel exponentiation using common-multiplicand-multiplication and signed-digit-folding techniques. Int. J. Comput. Math. 81(10): 1187-1202 (2004) - [j16]Der-Chyuan Lou, Chia-Long Wu:
Parallel Modular Exponentiation Using Signed-Digit-Folding Technique. Informatica (Slovenia) 28(2): 197-205 (2004) - [j15]Der-Chyuan Lou, Chia-Hung Sung:
A steganographic scheme for secure communications based on the chaos and euler Theorem. IEEE Trans. Multim. 6(3): 501-509 (2004) - 2003
- [j14]Der-Chyuan Lou, Chia-Long Wu, Ching-Yin Chen:
Fast exponentiation by folding the signed-digit exponent in half. Int. J. Comput. Math. 80(10): 1251-1259 (2003) - [j13]Kuang-Bor Wang, Tsorng-Lin Chia, Zen Chen, Der-Chyuan Lou:
Parallel Execution of a Connected Component Labeling Operation on a Linear Array Architecture. J. Inf. Sci. Eng. 19(2): 353-370 (2003) - 2002
- [j12]Der-Chyuan Lou, Jiang-Lung Liu:
Steganographic Method for Secure Communications. Comput. Secur. 21(5): 449-460 (2002) - [j11]Der-Chyuan Lou, Te-Lung Yin, Ming-Chang Chang:
An efficient steganographic approach. Comput. Syst. Sci. Eng. 17(4/5): 281-291 (2002) - [j10]Der-Chyuan Lou, Chia-Long Wu, Rong-yi Ou:
Application of Parallel Virtual Machine Framework to the Strong Prime Problem. Int. J. Comput. Math. 79(7): 797-806 (2002) - [j9]Tsorng-Lin Chia, Kuang-Bor Wang, Zen Chen, Der-Chyuan Lou:
Parallel distance transforms on a linear array architecture. Inf. Process. Lett. 82(2): 73-81 (2002) - 2001
- [j8]Der-Chyuan Lou, Te-Lung Yin:
Spatial database with each picture self-contained multiscape and access control in a hierarchy. J. Syst. Softw. 56(2): 153-163 (2001) - 2000
- [j7]Der-Chyuan Lou, Jiang-Lung Liu:
Fault resilient and compression tolerant digital signature for image authentication. IEEE Trans. Consumer Electron. 46(1): 31-39 (2000) - [c1]Chang-Tsun Li, Der-Chyuan Lou, Tsung-Hsu Chen:
Image Authentication and Integrity Verification via Content-Based Watermarks and a Public Key Cryptosystem. ICIP 2000: 694-697
1990 – 1999
- 1998
- [j6]Der-Chyuan Lou, Chin-Chen Chang:
An adaptive exponentiation method. J. Syst. Softw. 42(1): 59-69 (1998) - 1997
- [j5]Chin-Chen Chang, Der-Chyuan Lou:
Parallel computation of the multi-exponentiation for cryptosystems. Int. J. Comput. Math. 63(1-2): 9-26 (1997) - [j4]Der-Chyuan Lou, Chin-Chen Chang:
A Cost Optimal Search Technique for the Knapsack Problem. Int. J. High Speed Comput. 9(1): 1-12 (1997) - [j3]Chin-Chen Chang, Der-Chyuan Lou, Tzong-Chen Wu:
A Binary Access Control Method Using Prime Factorization. Inf. Sci. 96(1&2): 15-26 (1997) - [j2]Der-Chyuan Lou, Chin-Chen Chang:
A Parallel Two-List Algorithm for the Knapsack Problem. Parallel Comput. 22(14): 1985-1996 (1997) - 1991
- [j1]C. S. Yang, W. S. Hsieh, Der-Chyuan Lou, J. S. Tzeng:
A regular interconnection network. Microprocessing and Microprogramming 32(1-5): 583-587 (1991)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint