Follow
Cheng-Ta Huang
Cheng-Ta Huang
Department of Information Management, Yuan Ze University
Verified email at saturn.yzu.edu.tw
Title
Cited by
Cited by
Year
A benchmark for comparison of dental radiography analysis algorithms
CW Wang, CT Huang, JH Lee, CH Li, SW Chang, MJ Siao, TM Lai, ...
Medical image analysis 31, 63-76, 2016
3312016
Fully automatic system for accurate localisation and analysis of cephalometric landmarks in lateral cephalograms
C Lindner, CW Wang, CT Huang, CH Li, SW Chang, TF Cootes
Scientific reports 6 (1), 33581, 2016
1822016
Evaluation and Comparison of Anatomical Landmark Detection Methods for Cephalometric X-Ray Images: A Grand Challenge
CW Wang, CT Huang, MC Hsieh, CH Li, R Vandaele, SW Chang, WC Li, ...
IEEE Transactions on Medical Imaging 34 (9), 1-11, 2015
1732015
Robust and blind image watermarking in DCT domain using inter-block coefficient correlation
HJ Ko, CT Huang, G Horng, W Shiuh-Jeng
Information Sciences 517, 128-147, 2020
1042020
VQ applications in steganographic data hiding upon multimedia images
WJ Wang, CT Huang, SJ Wang
IEEE Systems Journal 5 (4), 528-537, 2011
772011
Image interpolating based data hiding in conjunction with pixel-shifting of histogram
YT Chang, CT Huang, CF Lee, SJ Wang
The Journal of Supercomputing 66, 1093-1110, 2013
662013
Reversible steganography based on side match and hit pattern for VQ-compressed images
CH Yang, WJ Wang, CT Huang, SJ Wang
Information Sciences 181 (11), 2218-2230, 2011
632011
Data embedding for vector quantization image processing on the basis of adjoining state-codebook mapping
WJ Wang, CT Huang, CM Liu, PC Su, SJ Wang
Information Sciences 246, 69-82, 2013
442013
Landmark detection in 2D bioimages for geometric morphometrics: a multi-resolution tree-based approach
R Vandaele, J Aceto, M Muller, F Péronnet, V Debat, CW Wang, ...
Scientific reports 8 (1), 538, 2018
432018
iPhone social networking for evidence investigations using iTunes forensics
YC Tso, SJ Wang, CT Huang, WJ Wang
Proceedings of the 6th International Conference on Ubiquitous information …, 2012
382012
VQ-based data hiding in IoT networks using two-level encoding with adaptive pixel replacements
CT Huang, MY Tsai, LC Lin, WJ Wang, SJ Wang
The Journal of Supercomputing 74, 4295-4314, 2018
302018
A scheme of reversible information hiding based on SMVQ
CT Huang, WJ Wang, CH Yang, SJ Wang
The Imaging Science Journal 61 (2), 195-203, 2013
192013
Steganography of data embedding in multimedia images using interpolation and histogram shifting
WJ Wang, YH Zhang, CT Huang, SJ Wang
2013 Ninth International Conference on Intelligent Information Hiding and …, 2013
132013
VirtualMicroscopy: ultra-fast interactive microscopy of gigapixel / terapixel images over internet
CW Wang, CT Huang, CM Hung
Scientific Reports 5, 14069, 2015
122015
Mobile Forensics for Cloud Storage Service on iOS Systems
CT Huang, HJ Ko, ZW Zhuang, PC Shih, SJ WANG
The International Symposium on Information Theory and Its Applications …, 2018
102018
A New Adaptive Steganographic Method Based on Gradient Adjacent Prediction and Side-Match Vector Quantization.
SR Tsui, CT Huang, WJ Wang
J. Inf. Hiding Multim. Signal Process. 4 (4), 215-224, 2013
102013
DCT-based compressed image with reversibility using modified quantization
CY Weng, CT Huang, HW Kao
Advances in Intelligent Information Hiding and Multimedia Signal Processing …, 2018
92018
Mutual authentications to parties with QR-code applications in mobile systems
CT Huang, YH Zhang, LC Lin, WJ Wang, SJ Wang
International Journal of Information Security 16, 525-540, 2017
92017
A Rapid Deployment Indoor Positioning Architecture based on Image Recognition
JH Wu, CT Huang, ZR Huang, YB Chen, SC Chen
2020 IEEE 7th International Conference on Industrial Engineering and …, 2020
82020
File changes with security proof stored in cloud service systems
CY Yang, CT Huang, YP Wang, YW Chen, SJ Wang
Personal and Ubiquitous Computing 22 (1), 45-53, 2018
72018
The system can't perform the operation now. Try again later.
Articles 1–20