Chinese | English
學歷   專業背景   研究領域  發表論文  上課內容  成績查詢   實驗室成員  

       行動通信,電信技術,視覺式秘密分享(MPS Player),資訊安全 ,電子商務資料下載

東華大學資訊工程學系實驗電子商店平台

(採用HiTrust HiShop平台技術,此商店平台由東華大學資工系資訊安全實驗室所維護,

讓使用者試用SSL線上付款機制。)


Department of Computer Science and Information Engineering National Dong Hwa University Shoufeng ,  Hualien 974, TAIWAN

Email address: cnyang@mail.ndhu.edu.tw
    Fax: +886-3-8634010

Phone: +886-3-8634025


   Resume of Professor James C.N. Yang (james_resume.pdf)


Education :

國立交通大學電信工程系 (民國689~民國727)

國立交通大學電信研究所碩士 (民國729~民國747)

國立成功大學電機研究所博士 (民國829~民國8612)  


Research :   

密碼學 資訊與網路安全  編碼理論

目前研究題目方向:

(1) 視覺式的秘密分享技術

(2) 影像秘密分享技術

(3) 資訊隱藏

(4) 數位浮水印技術

(5) 數位多媒體安全

(6) 無線安全

(7) 電子商務安全

(8) 量子密碼

(9) 計算機記憶體編碼

計畫:

(1)"中央健康保險局南區分局醫療費用連線申報電子簽章雛型系統" 協同主持人

(2)" 階層式架構的視覺式秘密分享技術 " 主持人(89年度)

(3)"視覺式(包含多重秘密、高畫質、動態影像)及聽覺式秘密分享技術之研究",主持人 (89年度)

(4)"子圖片大小不擴張以及子圖片檔案具有錯誤更正與檢測能力的視覺式秘密分享技術之研究 (90年度)

(5)" 可寫一次光碟防竄改保護技術之研究", 主持人 (91年度)

(6)"不變動IV及秘密金鑰長度下讓IEEE 802.11b無線網路抵抗 keystream 重複使用攻擊以及RC4破密研究" (92年度)

(7)"台灣學術網路北區不當資訊防制計畫-高速網路下提高不當資訊偵測成功率技術之研究",計畫主持人 (92.4.~ 94.12.)

(8)"環狀被動光纖網路上量子密鑰交換協定之研究",計畫主持人(92.12.~ 93.10.)

(9)" NICI IPv6計畫-IPv6網路之安全性系統之開發研究",協同計畫主持人( 93.1.~ 93.12.)

(10)"高性能與多功能的WebGrid系統的設計與製作-WebGrid下的安全服務(1/2)",計畫主持人(93年度)

(11) "高性能與多功能的WebGrid系統的設計與製作-WebGrid下的安全服務(2/2)",計畫主持人(94年度)

(12) "植基於JAVA智慧卡上的手機仿真器憑證申請系統",計畫主持人(94年度)

(13)"植基於光學字元辨識與多重像素擴張的高實用性視覺式秘密分享系統之研製",計畫主持人(95年度)

(14)"嵌入指紋特徵比對技術於智慧卡的高安全性憑證存取系統之研製",計畫主持人(95年度)

(15)"應用視覺式秘密分享技術將私密資料嵌入二維條碼系統之研製",計畫主持人(96年度)

(16)"應用RFID技術於校園電腦教室之滑鼠使用權限與網際網路存取控管",計畫主持人(96年度)

(17)"結合RFID技術(電子通道)與二維條碼技術(光接觸通道)的兩種新型RFID應用系統研製:

      (1)防追蹤之產品保證書機制 (2)高安全性之紙鈔防衛機制",多年期計畫主持人(97、98年度)

(18)產業交易安全環境評估與推動研究,工研院計畫98年4月-98年11月,計畫主持人


Courses :         

數據通訊 (2008)

密碼學 (2008)

資訊安全 (2007)

錯誤控制碼理論 (2007)


Publications :

(A)期刊論文: (Use 2008 Impact Factor from Journal Citation Reports)

001. C.N. Yang, A.G. Peng and T.S. Chen, "MTVSS: (M)isalignment (T)olerant (V)isual (S)ecret (S)haring on Resolving Alignment Difficulty," Signal Processing, Vol. 89, Issue 8, pp. 1602-1624, Aug., 2009. [SCI IF: 1.256].

002. C.N. Yang, C.B. Ciou, "A Comment on "Sharing Secrets in Stego Images with Authentication","Pattern Recognition, Vol. 42, Issue 7, pp. 1615-1619, July, 2009. [SCI IF: 3.279].

003. C.N. Yang, and Y.Y Yang, and C.Y. Chiu, "Image Library Systems: A Novel Installment Payment for Buying Images on the Web," Journal of Computers, Vol. 20, No.1, pp. 43-49, April 2009.

004. C.N. Yang and B.L. Lu, "Improved Tracing Algorithm for Random-Error-Resilient Collusion-Secure Fingerprinting Codes," JISE Journal of Information Science and Engineering, Vol. 25 No. 1, pp. 1-10, January 2009. [SCI IF: 0.242].

005. C.N. Yang, A.G. Peng and T.S. Chen, "Secret Image Sharing: DPVCS A Two-in-One Combination of (D)eterministic and (P)robabilistic (V)isual (C)ryptography (S)chemes," Journal of Imaging Science and Technology, Vol. 52, No. 6, pp. 060508-1-060508-12, Nov./Dec., 2008. [SCI IF: 0.619].

006. C.N. Yang, C.C. Wang and T.S. Chen "Visual Cryptography Schemes with Reversing," The Computer Journal, Vol. 51 No. 6, pp. 710-722, Nov. 2008.(doi:10.1093/comjnl/bxm118). [SCI IF: 1.000].

007. C.N. Yang and T.S. Chen "Colored Visual Cryptography Scheme Based on Additive Color Mixing," Pattern Recognition, Vol. 41, Issue 10, pp. 3114-3129, October, 2008. [SCI IF: 3.279].

008. C.N. Yang  "Efficient Encoding Algorithm for Second-Order Spectral-Null Codes Using Cyclic Bit-Shift," IEEE Trans. on Computers, Vol. 57, No. 7, pp. 876-888, July, 2008. [SCI IF: 2.611].

009. C.N. Yang and T.S. Chen "Security Analysis on Authentication of Images Using Recursive Visual Cryptography," Cryptologia, Volume 32, Issue 2, pp. 131-136, April 2008. [SCI IF: 0.074].

010. C.N. Yang and T.S. Chen,  "Visual Secret Sharing Scheme: Prioritizing the Secret Pixels with Different Pixel Expansions to Enhance the Image Contrast," Optical Engineering, Vol. 46, Issue 9, pp. 097005-1 - 097005-19, Sep., 2007. [SCI IF: 0.722].

011. C.N. Yang, M.Y. Chen and C.S. Laih, "Applying RFID Technology in Warranty Service Information System," International Journal of Services Operations and Informatics, Vol. 2, No. 3, pp. 267-277, 2007.

012. C.N. Yang and T.S. Chen,  "Extended Visual Secret Sharing Schemes: Improving the Shadow Image Quality," International Journal of Pattern Recognition and Artificial Intelligence, Vol. 21, No. 5, pp. 879-898, Aug., 2007. [SCI IF: 0.660].

013. C.N. Yang, G.J. Chen, T.S. Chen, and R. Lukac, "Error Spreading Control in Image Steganographic Embedding Schemes Using Unequal Error Protection," Journal of Imaging Science and Technology, Vol. 51, No. 4, pp. 380-385, July/August, 2007. [SCI IF: 0.619].

014. M.Y. Chen, C.N. Yang and C.S. Laih,  "Authorized Tracking and Tracing for RFID Tags," International Journal of Security and Its Applications, Vol. 1, No. 1, pp. 1-13, July, 2007.

015. C.N. Yang, T.S. Chen, K.H. Yu and C.C. Wang, “Improvements of image sharing with steganography and authentication,” Journal of Systems and software, Vol. 80, Issue 7, pp. 1070-1076, July, 2007.[SCI IF: 1.241].

016. C.N. Yang, K.H. Yu and R. Lukac, "User-Friendly Image Sharing Using Polynomials with Different Primes,"  International Journal of Imaging Systems and Technology, Vol. 17, Issue 1, pp. 40-47, June, 2007. . [SCI IF: 0.415].

017. C.N. Yang and D.J. Lee, “Some New Efficient Second-Order Spectral-Null Codes with Small Lookup Tables,”  IEEE Trans. on Computers., Vol. 55, Issue 7, pp. 924-927, July, 2006. [SCI IF: 2.611].

018. C.N. Yang and T.S. Chen, “Reduce Shadow Size in Aspect Ratio Invariant Visual Secret Sharing Schemes using a Square Block-wise Operation,” Pattern Recognition, Vol. 39, Issue 7, pp. 1300-1314, July, 2006. [SCI IF: 3.279].

019. C.N. Yang, T.S. Chen and M.H. Ching, “Embed Additional Private Information into Two-Dimensional Bar Codes by the Visual Secret Sharing Scheme,”  Integrated Computer-Aided Engineering, Volume 13, Number 2, pp. 189-199, 2006. [SCI IF: 0.617].

020. C.N. Yang and T.S. Chen, “New Size-Reduced Visual Secret Sharing Schemes with Half Reduction of Shadow Size,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,Vol.E89-A, No.2, pp. 620-625, Feb., 2006. [SCI IF: 0.437].

021. C.N. Yang and T.S. Chen, “Size-Adjustable Visual Secret Sharing Schemes,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E88-A, No.9, pp. 2471-2474, Sep., 2005. [SCI IF:0.437].

022. C.N. Yang, “Design of Efficient Second-Order Spectral-Null Codes, IEEE Trans. on Information Theory, Vol. 51, No. 4, pp. 1580-1584, April, 2005. [SCI IF: 3.793].

023. C.N. Yang and G.J. Chen, “A Comment on “Systematic Single Asymmetric Error-Correcting Codes, IEEE Trans. on Information Theory, Vol. 51, No. 3,pp. 1214-1217, March, 2005. [SCI IF: 3.793].

024. C.N. Yang, S.H. Chu and B.L. Lu, “Failure of Kak-Quantum Key Distribution Protocol,” Pramana - journal of physics, Vol.64, No.1, pp. 1-4, Jan. 2005. [SCI IF: 0.274].

025. C.N. Yang and T.S. Chen, “Aspect Ratio Invariant Visual Secret Sharing Schemes with Minimum Pixel Expansion,” Pattern Recognition Letters, Vol. 26, Issue 2, pp. 193-206, 2005. [SCI IF: 1.559].

026. C.N. Yang, “New Visual Secret Sharing Schemes Using Probabilistic Method,” Pattern Recognition Letters, Vol. 25, Issue 4, pp. 481-494, 2004. [SCI IF: 1.559].

027. C.C. Lin, C.S. Laih and C.N. Yang, New Audio Secret Sharing Schemes with Time Division Technique,”Journal of Information Science and Engineering, Vol.19 No.4, pp.605-614, July 2003.  [SCI  IF: 0.242].

028. C.N. Yang, A Note on Efficient Color Visual Encryption,” JISE Journal of Information Science and Engineering, Volume 18, Number 3, pp.367-372, May 2002.  [SCI  IF: 0.242].

029. C.N. Yang, Improvements on Audio and Optical Cryptography, JISE Journal of Information Science and Engineering, Volume 18, Number 3, pp.381-391, May 2002. [SCI  IF:0.242].

030. C.N. Yang and C.S. Laih, "New Colored Visual Secret Sharing Schemes." Designs Codes and Cryptography, Volume 20, Issue 3, pp.325~336, July, 2000.  [SCI IF: 0.745]

031. C.N. Yang and C.S. Laih, “DCm Codes for Constructing t-EC/AUED Codes,” IEEE Trans. Computers, vol. C-47,NO. 4, April 1998. [SCI IF:2.611].

032. C.N. Yang and C.S. Laih, “A Systematic Construction of Inner Codes in Generalized Concatenated Codes for Correcting Unidirectional Byte Errors,” IEICE Trans. on Fundamentals of Electronics, Communications, and Computer Sciences, pp. 351-354, Feb., 1998. [SCI IF: 0.437].

033. C.N. Yang and C.S. Laih, “Generating Functions for Asymmetric/ Unidirectional Error Correcting and Detecting Codes,” IEICE Trans. on Fundamentals of Electronics, Communications, and Computer Sciences, pp. 1135-1143, June, 1997. [SCI IF: 0.437].

034. C.N. Yang and C.S. Laih, “A Note On Error-correcting Codes for Authentication and Subliminal Channels,” Information Processing Letters, vol. 62, pp.141-143, 1997. [SCI IF:0.706].

035. C.S. Laih and C.N. Yang, “Deign of Efficient Balanced Codes with Minimum Distance 4,” IEE Proceedings-Communications, vol. 143, pp. 177-181, Aug. 1996. [SCI IF: 0.788].

036. C.S. Laih and C.N. Yang, “On The Analysis and Design of Group Theoretical t-syEC/AUED Codes,” IEEE Trans. Computers, vol. C-45, pp. 103-108, Jan. 1996. [SCI IF: 2.611].

 

(B)研討會論文:
Some modified version
s of conference papers also appear in Journal papers.
Authors' names may be different according to their contributions in journal versions, and the changes are under an agreement of all authors.

International Conference Papers:

001. C.N. Yang, C.C. Wu, C.Y. Chiu, S.Y. Chiou, and W.C. Liao, "Micropayment Schemes with Ability to Return Changes," accepted and to be published at the 11th International Conference on Information Integration and Web-based Applications & Services (iiWAS2009), Kuala Lumpur, Malaysia, Dec., 2009.

002. C.N. Yang, C.S. Laih, C.C. Wu, and G.C. Wu, "RWSIS: (R)FID-enabled (W)arranty (S)ervice (I)nformation (S)ystem on Resolving Security and Privacy," accepted and to be published at The 2009 International Symposium on IT and its Applications (ITA-09) in conjunction with IEEE CSA 2009, Jeju Island, Korea, Dec., 2009.

003. C.N. Yang, J.R. Chen, C.Y. Chiu, G.C. Wu, and C.C. Wu, "Enhancing Privacy and Security in RFID-Enabled Banknotes," the 2009 IEEE International Workshop on Security in e-Science and e-Research (ISSR2009) in conjunction with IEEE ISPA2009, pp 439-444, Chengdu, China, August 2009.

004. C.N. Yang, Jia-Sing Su and Shun-Yu Cheng, "A Multilevel Secure Key Predistribution Scheme in Wireless Sensor Networks," The 4th International Conferences on Information Security and Cryptology (Inscrypt 2008), Beijing, China, Dec. 2008.

005. C.N. Yang, Y.Y. Yang, T.S. Chen and G.C. Ye, "New Steganography Scheme in Halftone Images," 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2008), pp. 1520–1523, Harbin, China, Aug. 2008.

006. C.N. Yang, C.Y. Chiu, T.S. Chen and G.C. Ye, "Wireless Image Transmission Using Burst Error Correction Codes," The 5th IET Visual Information Engineering 2008 Conference (VIE'08) , pp. 331–336, Xi'an, China, July 2008.

007. C.N. Yang, A.G. Peng and T.S. Chen, " Reducing Shadow Size for Visual Cryptography Scheme," The Ninth International Conference on Information and Communications Security (ICICS 2007), Zhengzhou, China, Dec. 2007.

008. C.N. Yang and T.S. Chen, "An Image Secret Sharing Scheme with the Capability of Previewing the Secret Image," IEEE ICME 2007 International Conference on Multimedia & Expo (ICME'07), pp. 1535-1538, Beijing, China, July 2007.

009. C.N. Yang, K.H. Yu and R. Lukac, "User-Friendly Image Sharing in Multimedia Database Using Polynomials with Different Primes", LNCS 4352, pp. 443-452, MMM 2007 (International MultiMedia Modeling Conference), Singapore, January, 2007.

010. C.N. Yang and T.S. Chen, "Visual Secret Sharing Scheme: Improving the Contrast of a Recovered Image via Different Pixel Expansions," LNCS 4141, pp.468–479, 2006.,ICIAR (International Conference on Image Analysis and Recognition) 2006, Portugal, Sep., 2006.

011. M.Y. Chen, C.N. Yang and C.S. Laih, "Authorized Tracking and Tracing for RFID Tags," LNCS 4097, pp. 435–444, EUC 2006 Workshops: RFID and Ubiquitous Sensor Networks, Korea, Aug., 2006.

012. C.N. Yang, C.C. Wang and T.S. Chen, "Real Perfect Contrast Visual Secret Schemes with Reversing," LNCS 3989, pp. 433–447, ACNS (Applied Cryptography and Network Security) 2006, Singapore, June, 2006.

013. C.N. Yang and B.L. Lu, "Improved Tracing Algorithm for Random-Error-Resilient Collusion-Secure Fingerprinting Codes," P2P workshop in InfoScale2006, Hong Kong, May, 2006.

014. C.N.  Yang  and T.S. Chen, "Extended Visual Secret Sharing Schemes with High-Quality Shadow Images Using Gray Sub Pixels", LNCS 3656, pp. 1184–1191, ICIAR (International Conference on Image Analysis and Recognition) 2005, Canada, September, 2005.

015. C.N. Yang  and T.S. Chen, "New Aspect Ratio Invariant Visual Secret Sharing Schemes Using Square Block-wise Operation", LNCS 3656, pp. 1167–1174, ICIAR (International Conference on Image Analysis and Recognition) 2005,Canada, September, 2005.

016. C.N.  Yang, T. Lin, and T.S. Chen, "Enhanced Fair Micropayment Scheme Based on Hash Chain To Avoid Merchant Collusion", pp. 39 - 42, ISCE 2005, Macau, June, 2005.

017. C.N. Yang  and T.S. Chen,,"New Size-Reduced Visual Secret Sharing Schemes with Half Reduction of Shadow Size", LNCS 3480, pp. 19–28, ICCSA (International Conference on Computational Science and its Applications) 2005, Singapore, May, 2005.

018. C.N. Yang, and G.J. Chen, “Error Spreading Control in Steganography Embedding Scheme Using Unequal Error Protection,” 2004 International Computer Symposium(ICS2004), pp.443-448, Dec., 2004. 

019. C.N. Yang and T.S. Chen, “An Algorithm to Enumerate Codewords for Third-Order Spectral-Null Codes,” Proceedings, 2004 IEEE International Symposium on Information Theory, pp.88, June 27-July 2, 2004.

020. C.N. Yang, H.T. Teng and T.S. Chen, “Using One-way Hash Function to Solve the Reusable Unit Key Problem in Bluetooth Security,” The 8th World Multi-Conference on SYSTEMICS, CYBERNETICS AND INFORMATICS, SCI 2004, pp.29-32, July, 2004.

021. C.N. Yang and H.T. Teng,An Efficient Method for Finding Minimum Hash Chain of Multi-Payword Chains in Micropayment,IEEE Conference on E-Commerce, pp.45-48, June, 2003.

022. C.N. Yang, T.Y. Cheng and C.C. Kuo, Enhanced Wireless IEEE 802.11b Protocols Resistant to the Keystream Reuse Attack, Proceedings of the 2002 International Computer Symposium, Volume 2, pp.1035-1039, Dec., 2002.

023. C.N. Yang and C.C. Kuo, Enhanced Quantum Key Distribution Protocols Using BB84 and B92, Proceedings of the 2002 International Computer Symposium, Volume 2, pp.951-959, Dec., 2002.

024.  C.N. Yang and C.C. Kuo, A New Efficient Quantum Key Distribution Protocal,” Proceedings of SPIE, Vol. 4917, pp.54-58, Oct., 2002.

025. C.N. Yang, “An improvement on code for detection of tampering in write-once optical disks,” 2000 International Computer Symp.Proceedings(ICS 2000), Workshop on cryptology and information security,pp.84-90, Dec., 2000.

026. C.S. Laih, C.C. Lin, and C.N. Yang, “The Recent Development of E-government and PKI in ROC,” SSGRR 2000 Computer & eBusiness Conference, Italy, July 31~August 6, 2000.  

027.  C.N. Yang and C.S. Laih, “New (k,k) visual secret sharing schemes using hierarchical structure technique,” 1998 International Computer Symp. Proceedings(ICS'98), Workshop on cryptology and information security, pp.148-154, Dec., 1998.

028. C.N. Yang, Y.B. Yeh, and C.S. Laih, “A dynamic password visual authentication scheme through Internet,” 16-th International Telecommunication Symp. (ITS'98), vol. III, pp.163-167, Sep., 1998.

029.  C.N. Yang and C.S. Laih, “On the design of t-EC/AUED codes,” IEEE International Symposium on Information Theory, June 29-July 4, 1997.

030.  Y.C. Lee, C.N. Yang, and C.S. Laih, “An authentication protocol for the GSM,” 15-th International Telecommunication Symp.(ITS‘96),   vol. I, pp.173-176,Nov.,1996.

 

Local Conference Papers:

001. C.N. Yang, S.H. Lin, C.S. Shu, S. Huang and C.Y. Chiu, "Combing SiB and QR Code for Multi-Authority Wireless Authentications," 2008 Workshop on Consumer Electronics, pp. 544-548, Dec 2008.

002. C.N. Yang, S.U. Cheng, Y.C. Kun, G.C. Wu and T.H. Chung, "RFID Enabled Passenger with Bicycle Transit Auto-Payment Scheme in MRT, " TANET 2008, Oct. 2008.

003. C.N. Yang and T. S. Chen "On The Analysis of Visual Cryptography Scheme Underlying XOR Operation," Cryptology and Information Security Conference 2008 (CISC2008), pp. 16-30, May 2008.

004. C.N. Yang, S.H. Chang, T.S. Chen, and C.H. Su, "A New Pixel-Value Differencing Steganography Scheme Based on Space Filling Curve," Cryptology and Information Security Conference 2008 (CISC2008), pp. 462-474, May 2008..

005. C.N. Yang, J. S. Su, T. S. Chen, and S. H. Chang "Implementation of A High-Security Certificate Service By Embedding Fingerprint In Smart Cards," Open Source Code 2007, Nov, 2007.

006. C.N. Yang, C. E. Yen, C. H. Wang, C. M. Chen, T. S. Chen, and Y. F. Lee "Campus Micropayment System by Mobile Barcode," TANET 2007, Oct, 2007.

007. C.N. Yang, A.G. Peng and  T.S. Chen,  "Registration Tolerant Visual Secret Sharing Schemes Using Two-Sized Subpixels," Information Security Conference, pp.13-23, June, 2007.

008. C.N. Yang, F.R. Zhou, J.R. Lu, T. Zheng and T.S. Chen, "Applying CAPTCHA Technology to Prevent Click Fraud in E-Commercials," ECDL2007, pp. 492-499, March, 2007.

009. C.N. Yang, T.S. Chen and A.G. Peng,  "Certificate Services for Cellular Phone Emulator Based on JAVA Card,"OpenSource Code 2006, Nov. 2006.

010. C.N. Yang, T.S. Chen, Y.C. Lin, Y.F. Yu, Y.F. Chen, C.Y. Chiu and U.F. Lee "Access Control for Mouse and Network Functions in Computer Classroom Using RFID Technique," TANET 2006, Nov. 2006.

011. C.N. Yang, T.S. Chen, K.H. Yu and C.C. Wang, "Cheating-Immune Secret Image Sharing Scheme with Steganography," Information Security Conference, pp.250-257, June, 2006.

012. C.N. Yang, K. N. Chen and A.G. Peng ,  “A Reliable Tree-Based Revocation Scheme in Grid Computing System”, The Second Workshop on Grid Technologies and Applications WOGTA 2005, pp. 44-50, Dec. 2005.

013. Y.F. Lee, B.F. Liou, C.N. Yang, H.C. Chi, "Automatic IP Management," Proc. TANET 2005, Taichung , Oct. 2005.

014. C.N. Yang, Z.W. Chen and C.C. Chiang,  “A Slight Secret Key Storage Requirement Watermarking Scheme For Image Authentication”, 18th IPPR Conference on Computer Vision, Graphics and Image Processing (CVGIP 2005), pp. 1038-1041, Aug. 2005.

015. C.N. Yang and S.H. Chu A Simple and Efficient Quantum Dense Key Distribution Protocol Using Single Polarized Photon,  Information Security Conference, pp. 382-388, June 2004.

016. C.N. Yang and T.S. Chen Image Size Invariant Visual Secret Sharing Schemes for Gray Level Image,  Information Security Conference, pp.464-471, June 2003.

017. C.N. Yang, C.C. Kuo, and T.Y. Cheng Enhancement of Known IV attack for WEP-like Systems,  National Computer Symposium on Information Security, pp.1205-1212, Dec 2003.

018. C.C. Lin, C.S. Laih and C.N. Yang, “Audio Cryptography Schemes based on the time division technique, 2002 Proceedings of the Eleventh National Conference on Information Security, pp.407-414, May 2002.

019.  C.N. Yang ,Y.H. Liang ,and W.H. Chou, New Visual Secret Sharing Scheme with Non-Expansible Shadow Size Using Non-binary Sub Pixel, National Computer Symposium on Information Security, pp.F074~F085.

020.  C.N. Yang and T.L. Wu, “Visual Secret Sharing Schemes with Multiple Shared Secrets, 2000 Proceedings of the Eleventh National Conference on Information Security,pp. 99-105, May 2001.

021. C.H. Shi, S.L. Peng, and C.N. Yang, Efficient Generation of Constant Weight Codes in Cryptosystem,” 2000 Proceedings of the Tenth National Conference on Information Security, pp. 149-160, May, 2000.

022. C.N. Yang and T.L. Wu, “A Colored Visual Secret Sharing Scheme Based on the Additive Color Mixing of Light,” 2000 Proceedings of the Tenth National Conference on Information Security, pp. 180-189, May, 2000.

023. C.N. Yang and C.S. Laih, “Some new types of visual secret sharing schemes,” 1999 National Computer Symp. (NCS'99), vol. III, pp.260-268, Dec., 1999.

 

(C)著作、專書、專章:

001. R. Lukac, K.N. Plataniotis, and C.N. Yang, Image Secret Sharing. In Encyclopedia of Multimedia, (ed.) B. Furth, Springer-Verlag, pp. 328-335, January 2006. Including short articles: Compression  in Image Secret Sharing (pp. 86-87), Halftoning-Based Visual Secret Sharing (pp. 363-364), Image Watermarking Using Visual Cryptography (pp. 337-338), Private-Key Cryptosystem (pp. 712- 714), Threshold Schemes with Minimum Pixel Expansion (pp. 849-850), Visual Cryptography (pp. 950-951). ISBN 0-387-24395-X .

002. 楊慶隆數據編碼與錯誤控制 ,中華電信訓練所訓練叢書,編號:T311,1995。

003. 楊慶隆新型感應器與保全電路 ,全華書局,1994。

中華民國專利 :

(1) 距離等於4平衡碼編碼/解碼器

(2) 視覺式秘密分享技術 


Serve in International Conferences:

• BIFE 2010-  Program Committee Member of 2010 International Conference on Business Intelligence and Financial Engineering

• ICIC 2010- Program Committee Member of 2010 International Conference on Intelligent Computing

• GPC2010- Publication Chair of 2010 5th International Conference on Grid Pervasive Computing

• ITA 2009- Session Chair of the 2009 International Symposium on IT and its Applications (ITA-09) in conjunction with IEEE CSA 2009

• ISSR2009- Session Chair of IEEE International Workshop on Security in e-Science and e-Research (ISSR2009) in conjunction with IEEE ISPA2009.

• MPIS 2009- Program Committee Member of the Second International Workshop on Multimedia, Information Privacy and Intelligent Computing Systems in conjunction with CSA 2009

• ICPADS'09- Program Committee Member of Security and Trustworthy Computing for The Fifteenth International Conference on Parallel and Distributed Systems

• BIFE 2009- Program Committee Member of 2009 International Conference on Business Intelligence and Financial Engineering

• FIP 2009- Program Committee Member of 2009 International Symposium on Financial Information Processing

• ICIC 2009- Program Committee Member of 2009 International Conference on Intelligent Computing

• JWIS 2009- Program Committee Member of 2009 Joint Workshop on Information Security

• Inscrypt 2008- Session Chair of 2008 International Conference on Information Security and Cryptology

• MPIS 2008- Program Committee Member of The First International Workshop on Multimedia, Information Privacy and Intelligent Computing Systems in conjunction with IEEE APSCC 2008

• CLD 2008- Program Committee Member of ACM International Workshop on Cross Layer Design

• ICIC 2008- Program Committee Member of 2009 International Conference on Intelligent Computing

• ICIC 2007- Program Committee Member of 2009 International Conference on Intelligent Computing


  LAB  Members:

 

 
 
  • 88級

 畢業校友

 

 

吳宗霖

 

 


兩種新式的視覺密碼機制:視覺式多重秘密分享和彩色視覺式秘密分享

Two New Visual Cryptography Schemes: Visual Multi-Secrets Sharing Scheme And Colored Visual Secret Sharing Scheme

 

梁蘊翔

 非擴張的視覺式秘密分享及動態的視覺式秘密分享技術之研究

A Study Of Non-Expansible And Motion Picture Visual Secret Sharing Schemes

  • 89級

畢業校友

 

周萬祥 

可寫一次光碟防竄改保護技術之研究

Detection Of Tampering In Noisy Environment For Write-Once Optical Disks

 

鄧旭敦 

植基於數位傳輸內容保護標準的兩項研究議題: 設計具備安全認證機制的隨選視訊和會議金鑰之通訊協定

Implementation Of Secure Video On Demand System And Conference Key Establishment Based On Digital Trandmission Content Protection
  •  90級

 畢業校友

 

 

郭振欽  無線網路WEP-like系統已知IV攻擊法的增強研究
Enhancement of Known IV Attack for WEP-like Systems

 

孫維婕 

新型非二元聽覺式秘密分享系統

New Nonbinary Audio Secret Sharing Schemes

 

鄭琮元  不變動IV和秘密金鑰長度下讓IEEE 802.11b 無線網路協定抵抗keystream重複使用攻擊以及己知IV攻擊
      Enhanced Wireless IEEE 802.11b Protocols Resistant to the Keystream Reuse Attack and Known IV Attack
 
  •  91級

 畢業校友

 

 

 

林曉偉 

 

資料探勘技術應用於網路入侵偵測特徵值搜尋之研究

Data Mining Techniques For Signature Search In Network Intrusion Detection

 

 

陳國詔

 

以不效效保護碼在隱藏學加密過程中防止錯誤擴散之技術研究

Error Spreading Control In Steganographic Embedding Scheme Based On UEP Codes

 

 

簡銘宏 

 

 視覺秘密分享技術應用在二維條碼嵌入私密訊息之研究
 Embed Additional Private Information Into Two-Dimensional Bar Codes Based Cards By Using The Visual Secret Sharing Scheme

 

 

陳坤男 

 

使用霍夫曼樹建立具實用性的憑證廢止機制
A Practical Certificate Revocation Scheme By Using Huffman Tree
   

 

  •  92級

畢業校友

 

 

陳澤世

(博士生) 

具有較小子影像的視覺密碼研究

Visual Cryptography Schemes with Small Shadow Size

 

 

呂秉霖  可容錯誤與共謀攻擊的指紋碼之溯演算法的改進
Enhanced Tracing Algorithms For Random-Error-Resilient Collusion-Secure Fingerprinting codes

 

朱書玄   一個簡單且有麥率的單量子金鑰交換協定和對於 Kak 量子交換協定的攻擊
A Simple And Efficient Quantum Dense Key Distribution Protocol Using Single Polarized Photon And The Failure of Kak Quantum Key Distribution Protocol

 

吳胤鋒   RS 碼在 IP 路徑回溯上的應用
Reed-Solomon code Marking Scheme For IP Traceback

 

丁士峯   新一代無線網路通訊安全定 TKIP 的破密分析
Cryptanalysis Of The Key Mixing Function In TKIP
 
  •  93級

畢業校友 

   李東璟 

新型有效率的無二階頻譜成份的平衡碼設計 

Design Of Some New Efficient Second-Order Spectral-Null Codes

   林    宗 

植基於小額付款技術之行動隨意網路的封包計費機制

Packet Pricing In Mobile Ad Hoc Networks Based On Micropayment Scheme
   余崑玄   秘密影像分享機制:可顯示秘密子影像及可預覽秘密影像的兩種機制之研究
Secret Image Sharing: User-Friendly And Preview-Secret Schemes
   王鐘諄   以反相運算達成完美對比之視覺式秘密分享機制
Real Perfect Contrast Visual Secret Sharing Schemes With Reversing
 
  •  94級

畢業校友 

   彭安國 

具偏移容忍性之視覺式秘密分享系統

Reducing the Alignment Problem of Visual Secret Sharing Scheme Using Two-Sized Subpixels

   陳潔如 

應用無線射頻認證技術之紙鈔防偽機制

Enhancing Privacy and Security in RFID Banknote Protection Scheme

 

 

 蕭輔中  

植基於影像分佈統計之快速指紋分類

Fast Fingerprint Classification Based on Normalized Histogram Statistic  

 
  •  95

畢業校友 

  蘇嘉興 

多階層安全的無線感測網路金鑰分配機制 

A Multilevel Secure Key Predistribution Scheme in Sensor Networks

  張仕翰 

基於空間填充曲線之像素差異資訊隱藏技術 

A New Pixel-Value Differencing Steganography Scheme Based on Space Filling Curve

 
  •  96級

畢業校友 

 
鄭順友 

結合RFID(電子通道)與二維條碼技術(光接觸通道)於防追蹤之產品保證書機制

Combining RFID and Two-Dimensional Barcode Effectively for Privacy Protection in Warranty Service Information System

 
邱志揚 

植基於新式鴿家原理之有效率無二階頻譜成份的平衡碼設計 

Efficient Second-Order Spectral-Null Codes Based on the New Pigeon Home Principle

 
楊燿宇 
具高清晰度子影像的新型擴展式視覺密碼技術
New Extended Visual Cryptography Schemes with Clearer Shadow Images
 
 
黃信銘 
新型的(k, n)比例式秘密影像分享機制
A New k-out-of-n Scalable Secret Image Sharing Scheme 
 
葉國勤 

植基於XOR區塊運算差異最小化的新半色調影像秘密分享 

New XOR-Based Image Secret Sharing in Halftone Images with Difference Minimization Using Block-wise Operation

     
邱垂邦  

具有無失真恢復以及預覽雙重解碼功能的秘密影像分享

Image Secret Sharing Method with Two-Decoding-Options: LosslessRecovery and Previewing Capability

 
  • 博士生
 
吳志成 
 
     
邱志揚 
 
 
  •  研二
 
龔郁晴
 
 
鍾庭顥
 
 
吳根丞
 
 
  •  研一

  李佳侯 

  何駿彥 

 
  朱瑀瑩   
 
   陳品維