Chinese English
Education  Research Publications

Department of Computer Science and Information Engineering
National Dong Hwa University,
Hualien 974, TAIWAN

Email address: cnyang@gms.ndhu.edu.tw

Phone: +886-3-8634025


   Resume of Professor James C.N. Yang (james_resume.pdf)


Education :

B.S., Dept. of Telecommunication Engineering, NCTU, Taiwan  ( 1983 )

M.S. , Dept. of Telecommunication Engineering, NCTU, Taiwan  ( 1985 )

P h.D., Dept. of Electrical Engineering, NCKU, Taiwan ( 1997 )  


Research :    

Cryptography, Information & Network Security, Coding Theory  

(1) Visual Secret Sharing Scheme

(2) Image Secret Sharing Scheme

(3) Information Hiding

(4) Digital Watermark

(5) Digital Multimedia Security

(6) Wireless Security

(7) E-Commerce Security

(8) Quantum Cryptography

(9) Computer Memory Coding


Publications :

(A) Journal Papers: (Use 2016 Impact Factor from Journal Citation Reports)

 

001 . C.N. Yang, X. Wu, Y.C. Chou, and Z. Fu, "Constructions of General (k, n) Reversible AMBTC-based Visual Cryptography with Two Decryption Options," Journal of Visual Communication and Image Representation, Vol. 48, pp. 182-194, Oct., 2017. [SCI 5-year IF: 2.215].

002 . Y.X. Liu and C.N. Yang, "Scalable Secret Image Sharing Scheme with Essential Shadows," Signal Processing: Image Communication, Vol. 58, pp. 49-55, Oct., 2017. [SCI 5-year IF: 2.346].

003 . C. Kim, D. Shin, and C.N. Yang, "Self-embedding Fragile Watermarking Scheme to Restoration of A Tampered Image Using AMBTC," Personal and Ubiquitous Computing (doi: 10.1007/s00779-017-1061-x) published online July, 2017. [SCI 5-year IF: 2.512].

004 . C.N. Yang, C.H. Wu, Z.X. Yeh, D. Wang, and C. Kim, “A New Sharing Digital Image Scheme with Clearer Shadow Images,” Computer Standards & Interfaces, Vol. 51, pp. 118-131, Mar., 2017. [SCI 5-year IF: 1.524].

005 . C. Kim, D. Shin, B. Kim, and C.N. Yang, "Secure Medical Images Based on Data Hiding Using A Hybrid Scheme with The Hamming Code, LSB, and OPAP," Journal of Real-Time Image Processing (doi: 10.1007/s11554-017-0674-7) published online Feb., 2017. [SCI 5-year IF: 2.098].

006 . C.N. Yang, S.C. Hsu, and C. Kim, “Improving Stego Image Quality in Image Interpolation Based Data Hiding,” Computer Standards & Interfaces, Vol. 50, pp. 209-215, Feb., 2017. [SCI 5-year IF: 1.524].

007 . Z. Zhou, Y. Wang, Q.M. Wu, C.N. Yang, and X. Sun, "Effective and Efficient Global Context Verification for Image Copy Detection," IEEE Transactions on Information Forensics and Security, Vol. 12, No. 1, pp. 48-63, Jan., 2017. [SCI 5-year IF: 4.824].

008 . C.N. Yang, J.K. Liao, and D. Wang, "New Privilege-based Visual Cryptography with Arbitrary Privilege Levels," Journal of Visual Communication and Image Representation, Vol. 42, pp. 121-131, Jan. 2017. [SCI 5-year IF: 2.215].

009 . C.N. Yang, T.C. Tung, F.H. Wu, and Z. Zhou, “Color Transfer Visual Cryptography with Perfect Security,” Measurement, Vol. 95, pp. 480-493, Jan., 2017. [SCI 5-year IF: 2.255].

010 . C. Kim and C.N. Yang, "Data Hiding Based on Overlapped Pixels Using Hamming Code," Multimedia Tools and Applications, Vol. 75, Issue 23, pp 15651-15663, Dec., 2016. [SCI 5-year IF: 1.572].

011 . F. Huang, Z. Fu, X. Sun, and C.N. Yang, “Privacy-preserving Outsourced Gene Data Search in Encryption Domain,” Security and Communication networks Vol. 9, Issue 18, pp. 5178-5186, Dec. 2016. [SCI 5-year IF: 1.022].

012 . C. Kim, Dongkyoo Shin, Dongil Shin, and C.N. Yang, "Secure Protection of Video Recorder Video in Smart Car," International Journal of Distributed Sensor Networks (doi: 10.1177/1550147716681792), Vol. 12(12), Dec., 2016. [SCI 5-year IF: 1.315].

013 . Z. Fu, F. Huang, X. Sun, A. Vasilakos, and C.N. Yang, “Enabling Semantic Search based on Conceptual Graphs over Encrypted Outsourced Data,” IEEE Transactions on Services Computing (doi: 10.1109/TSC.2016.2622697), published online Oct., 2016. [SCI 5-year IF: 4.245].

014 . C. Kim, D. Shin, L. Leng, and C.N. Yang, "Lossless Data Hiding for Absolute Moment Block Truncation Coding Using Histogram Modification," Journal of Real-Time Image Processing (doi: 10.1007/s11554-016-0641-8) published online Oct., 2016. [SCI 5-year IF: 2.098].

015 . Z. Zhou, C.N. Yang, and C. F. Chen, "Reducing Computations in Chang et al.’s on-line Electronic Check," International Journal of Security and Its Applications, Vol. 10, No. 10, pp. 271-288, Oct., 2016. [EI].

016 . Z. Zhou, Y. Mu, C.N. Yang, and N. Zhao, "Coverless Multi-keywords Information Hiding Method Based on Text," International Journal of Security and Its Applications, Vol. 10, No. 9, pp. 309-320, Sep., 2016. [EI].

017 . C.N. Yang, L.Z. Sun, X. Yan, and C. Kim, "Design a New Visual Cryptography for Human-verifiable Authentication in Accessing a Database," Journal of Real-Time Image Processing, Vol. 12, Issue 2, pp. 483–494, Aug., 2016. [SCI 5-year IF: 2.098].

018 . P. Li, C.N. Yang, and Q. Kong, "A Novel Two-in-one Image Secret Sharing Scheme Based on Perfect Black Visual Cryptography," Real-Time Image Processing (doi: 10.1007/s11554-016-0621-z) published online July, 2016. [SCI 5-year IF: 2.098].

019 . C.N. Yang, C.H. Chen, and S.R. Cai, "Enhanced Boolean-based Multi Secret Image Sharing Scheme," Journal of Systems and software, Vol. 116, pp. 22-34, June 2016. [SCI 5-year IF: 2.619].

020 . Z. Zhou, C.N. Yang, B. Chen, X. Sun, Q. Liu, and Q.M. Wu, "Effective and Efficient Image Copy Detection with Resistance to Arbitrary Rotation," IEICE Transactions on Information and Systems, Vol. E99-D, No. 6, pp. 1531-1540, June, 2016. [SCI 5-year IF: 0.332].

021 . P. Li, C.N. Yang, and Z. Zhou, "Essential Secret Image Sharing Scheme with the Same Size of Shadows," Digital Signal Processing, Vol. 50, pp. 51-60, Mar., 2016. [SCI 5-year IF: 2.174].

022 . C.N. Yang, L.Z. Sun, and S.R. Cai, "Extended Color Visual Cryptography for Black and White Secret Image," Theoretical Computer Science, , Vol. 609, Part 1, pp. 143-161, Jan., 2016. [SCI 5-year IF: 0.815].

023 . C.N. Yang, C. Kim, and Y.H. Lo "Adaptive Real-time Reversible Data Hiding for JPEG Images," Journal of Real-Time Image Processing (doi: 10.1007/s11554-015-0555-x), published online Dec., 2015. [SCI 5-year IF: 2.098].

024 . C.N. Yang, J.B. Lai, and Z. Fu, "Protecting User Privacy for Cloud Computing by Bivariate Polynomial Based Secret Sharing," Journal of Computing and Information Technology, Vol. 23, No. 5, pp. 341–355, Dec., 2015. [EI]

025 . L.Q. Hoa, N.H. Truong, C. Kim, and C.N. Yang, "(1,7,4) Data Hiding Scheme for Searching in Hidden Text with Automata," Vietnam Journal of Computer Science, Vol. 2, Issue 4, pp. 257-265, Nov., 2015. [indexed by Google Scholar and DBLP].

026 . X. Yan, X. Liu, and C.N. Yang, "An enhanced threshold visual secret sharing based on random grids," Journal of Real-Time Image Processing(doi:10.1007/s11554-015-0540-4), published online Oct., 2015. [SCI 5-year IF: 2.098].

027 . C.N. Yang, C.C. Wu, Y.C. Lin, and C. Kim, "Constructions and Properties of General (k, n) Block-Based Progressive Visual Cryptography," ETRI Journal, Vol. 37, No. 5, pp. 979-989, Oct., 2015. [SCI 5-year IF: 0.918]

028 . C.N. Yang and C.Y. Lin, "Almost-aspect-ratio-invariant Visual Cryptography without Adding Extra Subpixels," Information Sciences, Vol 312, pp. 131–151, Aug., 2015. [SCI 5-year IF: 4.732].

029 . C. Kim and C.N. Yang, "Watermark with DSA Signature Using Predictive Coding," Multimedia Tools and Applications, Vol. 74, Issue 14, pp. 5189-5203, July 2015. [SCI 5-year IF: 1.572].

030 . C.N. Yang , S.R. Cai, and L.Z. Sun, “Parallel Response Ternary Query Tree for RFID Tag Anti-Collision,” Journal of Computer and Communications, Vol. 3, No. 5, pp. 72-79, May 2015. [indexed by Google Scholar].

031 . X. Yan, S. Wang, X. Niu, and C.N. Yang, "Generalized Random Grids-based Threshold Visual Cryptography with Meaningful Shares," Signal Processing, Vol. 109, pp. 317–333, April, 2015. [SCI 5-year IF: 3.001].

032 . X. Yan, S. Wang, X. Niu, and C.N. Yang, "Halftone Visual Cryptography with Minimum Auxiliary Black Pixels and Uniform Image Quality," Digital Signal Processing, Vol. 38, pp. 53–65, March, 2015. [SCI 5-year IF: 2.174].

033 . C.N. Yang, Z.Y. Lin, and S.L. Peng, "Reducing Code Length of Second-Order Spectral-Null Code," IEEE Transactions on Computers, Vol. 64, No. 2, pp. 492-503, Feb., 2015. [SCI 5-year IF: 3.102].

034 . C.N. Yang, P. Li, C.C. Wu, and S.R. Cai, "Reducing Shadow Size in Essential Secret Image Sharing by Conjunctive Hierarchical Approach," Signal Processing- Image Communication,Vol. 31, pp. 1–9, Feb., 2015. [SCI 5-year IF: 2.346].

035 . X. Yan, S. Wang, X. Niu, and C.N. Yang, "Random Grid-based Visual Secret Sharing with Multiple Decryptions," Journal of Visual Communication and Image Representation, Vol. 26, pp. 94–104, Jan., 2015. [SCI 5-year IF: 2.215].

036 . Y.X. Liu, C.N. Yang, P.H. Yeh, "Reducing Shadow Size in Smooth Scalable Secret Image Sharing," Security and Communication Networks, Vol. 7, Issue 12, pp. 2237–2244, Dec., 2014.[SCI 5-year IF: 1.022].

037 . C.N. Yang, C.L. Hsieh, and S.R. Cai, "Secret Image Sharing Schemes by Using Maximum Distance Separable Codes," International Journal of Machine Learning and Computing, Vol. 4, No. 6, pp. 522-526, Dec., 2014. [indexed by Google Scholar].

038 . C.N. Yang , C.C. Wu, and D. Wang, "A Discussion on the Relationship between Probabilistic Visual Cryptography and Random Grid," Information Sciences, Vol. 278, pp. 141-173, Sep., 2014. [SCI 5-year IF: 4.732].

039 . C.N. Yang and Y.Y. Yang, "New Extended Visual Cryptography Schemes with Clearer Shadow Images," Information Sciences, Vol. 271, pp. 246-263, July, 2014. [SCI 5-year IF: 4.732].

040 . C. Kim, D. Shin, Dongil Shin, R. Tso, and C.N. Yang, "A secret sharing scheme for EBTC using steganography," Journal of Intelligent Manufacturing, Vol. 25, Issue 2, pp 241-249, April, 2014 [SCI 5-year IF: 2.798].

041 . C.N. Yang and D. Wang, "Property Analysis of XOR Based Visual Cryptography," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 24, No. 2, pp. 189-197, Feb., 2014. [SCI 5-year IF: 4.552].

042 . S. Cimato, C.N. Yang, and C.C. Wu, "Visual Cryptography Based Watermarking," LNCS Transactions on Data Hiding and Multimedia Security, Vol. IX, pp. 91-109, 2014.

043 . F. Liu, T. Guo, C. Wu, and C.N. Yang, "Flexible Visual Cryptography Scheme Without Distortion and Its Application," LNCS Transactions on Data Hiding and Multimedia Security, Vol. IX, pp. 110-130, 2014.

044 . D. Wang, T. Song, L. Dong, and C.N. Yang, "Optimal Contrast Greyscale Visual Cryptography Schemes with Reversing," IEEE Transactions on Information Forensics and Security, Vol. 8, No. 12, pp. 2059-2072, Dec., 2013. [SCI 5-year IF: 4.824].

045 . P. Li, C.N. Yang, Q. Kong, Y. Ma, and Z. Liu, "Sharing more information in gray visual cryptography scheme," Journal of Visual Communication and Image Representation, Vol. 24, Issue 8, pp. 1380-1393, Nov., 2013.[SCI 5-year IF: 2.215].

046 . P. Li, C.N. Yang, C.C. Wu, Q. Kong, and Y. Ma, "Essential Secret Image Sharing Scheme with Different Importance of Shadows," Journal of Visual Communication and Image Representation, Vol. 24, Issue 7, pp. 1106–1114, Oct., 2013. [SCI 5-year IF: 2.215].

047 . C.N. Yang, and Chih-Cheng Wu, "MSRC: (M)icropayment (S)cheme with Ability to (R)eturn (C)hanges," Mathematical and Computer Modelling, Vol. 58, pp. 96-107, July, 2013. [SCI 5-year IF: 1.602].

048 . C.N. Yang, P.W. Chen, H.W. Shih, and C. Kim, "Aspect Ratio Invariant Visual Cryptography by Image Filtering and Resizing," Personal and Ubiquitous Computing, Vol. 17, Issue 5, pp. 843-850, June, 2013. [SCI 5-year IF: 2.512].

049 . H.C. Lin, C.N. Yang, C.S. Laih, and H.T. Lin," Natural language letter based visual cryptography scheme," Journal of Visual Communication and Image Representation, Vol. 24, Issue 3, pp. 318-331, April, 2013. [SCI 5-year IF: 2.215].

050 . C.N. Yang and T.H. Chung, "Cryptanalysis of Chen et al.'s multi-secret visual cryptography scheme," Imaging Science Journal, Vol. 61, No. 3, pp. 334-340, March 2013. [SCI 5-year IF: 0.440].

051 . C. Kim, Y. Choi, H. Kim, D. Shin, D. Shin, and C.N. Yang, "Reversible Data Hiding for Halftone Images Using Histogram Modification," Information-An International Interdisciplinary Journal, Vol.16, No.3(A), pp.1861-1872, March, 2013. [indexed by Scopus].

052 . P. Trung Huy, N. Thanh, C. Kim, and C.N. Yang, "Data-Hiding for Halftone Images Using an Improved CPT scheme," KSII Transactions on Internet and Information Systems, Vol.7, Issue 7, pp. 405-424, Feb., 2013. [SCI 5-year IF: 0.467].

053 . C.N. Yang, C.C. Wu, Y.C. Lin, and C. Kim, "Enhanced Matrix-Based Secret Image Sharing Scheme," IEEE Signal Processing Letters, Vol. 19, Issue 12, pp. 789-792, Dec., 2012. [SCI 5-year IF: 2.684].

054 . C.N. Yang, L.J. Hu and J.B. Lai, "Query Tree Algorithm for RFID Tag with Binary-Coded Decimal EPC," IEEE Communications Letters, Vol. 16, No. 10, pp. 1616-1619, Oct., 2012. [SCI 5-year IF: 2.081].

055 . Y.X. Liu, L. Harn, C.N. Yang, and Y.Q. Zhang, "Efficient (n, t, n) Secret Sharing Schemes," Journal of Systems and Software, Vol. 85, Issue 6, pp. 11325-1332, Jun., 2012. [SCI 5-year IF: 2.619].

056 . C.N. Yang, H.W. Shih, C.C. Wu, and L. Harn, "k out of n Region Incrementing Scheme in Visual Cryptography," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 22, No. 6, pp. 779-810, May, 2012. [SCI 5-year IF: 4.552].

057 . P. Li, P.J. Ma, X.H. Su, and C.N. Yang, "Improvements of a Two-in-one Image Secret Sharing Scheme based on Gray Mixing Model," Journal of Visual Communication and Image Representation, Vol. 23, Issue 3, pp. 441-453, Apr, 2012. [SCI 5-year IF: 2.215].

058 . C.N. Yang, J.F. Ouyang, and L. Harn, "Steganography and Authentication in Image Sharing without Parity Bits," Optics Communications, Vol. 285, Issue 7, pp. 1725-1735, Apr., 2012. [SCI 5-year IF: 1.448].

059 . C.N. Yang and C.C. Wu, and F. Liu, "Construction of General (k, n) Probabilistic Visual Cryptography Scheme," Journal of Electronic Science and Technology, Vol. 9, Issue 4, pp. 317-324, Dec., 2011.[indexed by INSPEC].

060 . C.N. Yang, C.Y. Chiu, and G.C. Wu, "Efficient Encoding/Decoding for Second-Order Spectral-Null Codes by Reducing Random Walks," IEEE Transactions on Computers, Vol. 60, No. 10, pp. 1503-1510, Oct., 2011. [SCI 5-year IF: 3.102].

061 . C.N. Yang and Y.Y. Chu, "A general (k, n) scalable secret image sharing scheme with the smooth scalability," Journal of Systems and Software, vol. 84, pp. 1726-1733, 2011. [SCI 5-year IF: 2.619].

062 . C.N. Yang, J.Y. He, "An Effective 16-bit Random Number Aided Query Tree Algorithm for RFID Tag Anti-Collision," IEEE Communications Letters, Vol. 15, No. 5, pp. 539-541, May, 2011. [SCI 5-year IF: 2.081].

063 . C.N. Yang, G.C. Ye, and C. Kim, "Data Hiding in Halftone Images by XOR Block-Wise Operation with Difference Minimization," KSII Transactions on Internet and Information Systems, Vol. 5, Issue 2, pp. 457-476, Feb., 2011. [SCI 5-year IF: 0.467].

064 . C.N. Yang and T.H. Chung, "A general multi-secret visual cryptography scheme," Optics Communications Vol. 283, Issue 24, pp. 4949-4962, Dec., 2010. [SCI 5-year IF: 1.448].

065 . C.N. Yang, C.B. Ciou, "Image Secret Sharing Method with Two-Decoding-Options: Lossless Recovery and Previewing Capability", Image and Vision Computing, Vol. 28, Issue 12, pp. 1600-1610, Dec., 2010. [SCI 5-year IF: 2.939].

066 . C.N. Yang and Sin-Ming Huang, "Constructions and Properties of k out of n Scalable Secret Image Sharing," Optics Communications, Vol. 283, Issue 9, pp. 1750–1762, May, 2010. [SCI 5-year IF: 1.448].

067 . C.N. Yang, A.G. Peng and T.S. Chen, "MTVSS: (M)isalignment (T)olerant (V)isual (S)ecret (S)haring on Resolving Alignment Difficulty," Signal Processing, Vol. 89, Issue 8, pp. 1602-1624, Aug., 2009. [SCI 5-year IF: 3.001].

068 . C.N. Yang, C.B. Ciou, "A Comment on "Sharing Secrets in Stego Images with Authentication"," Pattern Recognition, Vol. 42, Issue 7, pp. 1615-1619, Jul., 2009. [SCI 5-year IF: 4.991].

069 . C.N. Yang, and Y.Y Yang, and C.Y. Chiu, "Image Library Systems: A Novel Installment Payment for Buying Images on the Web," Journal of Computers, Vol. 20, No.1, pp. 43-49, Apr., 2009. [EI].

070 . C.N. Yang and B.L. Lu, "Improved Tracing Algorithm for Random-Error-Resilient Collusion-Secure Fingerprinting Codes," Journal of Information Science and Engineering, Vol. 25 No. 1, pp. 1-10, Jan., 2009. [SCI 5-year IF: 0.524].

071 . C.N. Yang, A.G. Peng and T.S. Chen, "Secret Image Sharing: DPVCS A Two-in-One Combination of (D)eterministic and (P)robabilistic (V)isual (C)ryptography (S)chemes," Journal of Imaging Science and Technology, Vol. 52, No. 6, pp. 060508-1-060508-12, Nov./Dec., 2008. [SCI 5-year IF: 0.460].

072 . C.N. Yang, C.C. Wang and T.S. Chen, "Visual Cryptography Schemes with Reversing," Computer Journal, Vol. 51 No. 6, pp. 710-722, Nov. 2008. [SCI 5-year IF: 0.930].

073 . C.N. Yangand T.S. Chen, "Colored Visual Cryptography Scheme Based on Additive Color Mixing," Pattern Recognition, Vol. 41, Issue 10, pp. 3114-3129, Oct., 2008. [SCI 5-year IF: 4.991].

074 . C.N. Yang "Efficient Encoding Algorithm for Second-Order Spectral-Null Codes Using Cyclic Bit-Shift," IEEE Trans. on Computers, Vol. 57, No. 7, pp. 876-888, Jul., 2008. [SCI 5-year IF: 3.102].

075 . C.N. Yang and T.S. Chen, "Security Analysis on Authentication of Images Using Recursive Visual Cryptography," Cryptologia, Vol. 32, Issue 2, pp. 131-136, Apr., 2008. [SCI 5-year IF: 0.196].

076 . C.N. Yang and T.S. Chen,"Visual Secret Sharing Scheme: Prioritizing the Secret Pixels with Different Pixel Expansions to Enhance the Image Contrast," Optical Engineering, Vol. 46, Issue 9, pp. 097005-1 - 097005-19, Sep., 2007. [SCI 5-year IF: 1.018].

077 . C.N. Yang, M.Y. Chen and C.S. Laih, "Applying RFID Technology in Warranty Service Information System," International Journal of Services Operations and Informatics, Vol. 2, No. 3, pp. 267-277, 2007. [EI].

078 . C.N. Yang and T.S. Chen, "Extended Visual Secret Sharing Schemes: Improving the Shadow Image Quality," International Journal of Pattern Recognition and Artificial Intelligence, Vol. 21, No. 5, pp. 879-898, Aug., 2007. [SCI 5-year IF: 0.914].

079 . C.N. Yang, G.J. Chen, T.S. Chen, and R. Lukac, "Error Spreading Control in Image Steganographic Embedding Schemes Using Unequal Error Protection," Journal of Imaging Science and Technology, Vol. 51, No. 4, pp. 380-385, Jul./Aug., 2007. [SCI 5-year IF: 0.460].

080 . M.Y. Chen, C.N. Yang and C.S. Laih,, "Authorized Tracking and Tracing for RFID Tags," International Journal of Security and Its Applications, Vol. 1, No. 1, pp. 1-13, Jul., 2007. [EI].

081 . C.N. Yang, T.S. Chen, K.H. Yu and C.C. Wang, "Improvements of image sharing with steganography and authentication," Journal of Systems and software, Vol. 80, Issue 7, pp. 1070-1076, Jul., 2007. [SCI 5-year IF: 2.619].

082 . C.N. Yang, K.H. Yu and R. Lukac, "User-Friendly Image Sharing Using Polynomials with Different Primes," International Journal of Imaging Systems and Technology, Vol. 17, Issue 1, pp. 40-47, Jun., 2007. [SCI 5-year IF: 1.200].

083 . C.N. Yang and D.J. Lee, "Some New Efficient Second-Order Spectral-Null Codes with Small Lookup Tables," IEEE Trans. on Computers., Vol. 55, Issue 7, pp. 924-927, Jul., 2006. [SCI 5-year IF: 3.102].

084 . C.N. Yang and T.S. Chen, "Reduce Shadow Size in Aspect Ratio Invariant Visual Secret Sharing Schemes using a Square Block-wise Operation," Pattern Recognition, Vol. 39, Issue 7, pp. 1300-1314, Jul., 2006. [SCI 5-year IF: 4.991].

085 . C.N. Yang, T.S. Chen and M.H. Ching, "Embed Additional Private Information into Two-Dimensional Bar Codes by the Visual Secret Sharing Scheme," Integrated Computer-Aided Engineering, Volume 13, Number 2, pp. 189-199, 2006. [SCI5-year IF:3.060].

086 . C.N. Yang and T.S. Chen, "New Size-Reduced Visual Secret Sharing Schemes with Half Reduction of Shadow Size," IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences,Vol.E89-A, No.2, pp. 620-625, Feb., 2006. [SCI 5-year IF: 0.261].

087 . C.N. Yang and T.S. Chen, "Size-Adjustable Visual Secret Sharing Schemes," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E88-A, No.9, pp. 2471-2474, Sep., 2005. [SCI 5-year IF:0.261].

088 . C.N. Yang, "Design of Efficient Second-Order Spectral-Null Codes," IEEE Trans. on Information Theory, Vol. 51, No. 4, pp. 1580-1584, Apr., 2005. [SCI 5-year IF: 3.228].

089 . C.N. Yang and G.J. Chen, "A Comment on "Systematic Single Asymmetric Error-Correcting Codes", IEEE Trans. on Information Theory, Vol. 51, No. 3,pp. 1214-1217, Mar., 2005. [SCI 5-year IF:3.228].

090 . C.N. Yang, S.H. Chu and B.L. Lu, "Failure of Kak-Quantum Key Distribution Protocol," Pramana - journal of physics, Vol.64, No.1, pp. 1-4, Jan. 2005. [SCI 5-year IF:0.592].

091 . C.N. Yang and T.S. Chen, "Aspect Ratio Invariant Visual Secret Sharing Schemes with Minimum Pixel Expansion," Pattern Recognition Letters, Vol. 26, Issue 2, pp. 193-206, 2005. [SCI 5-year IF: 2.164].

092 . C.N. Yang, "New Visual Secret Sharing Schemes Using Probabilistic Method," Pattern Recognition Letters, Vol. 25, Issue 4, pp. 481-494, 2004. [SCI 5-year IF: 2.164].

093 . C.C. Lin, C.S. Laih and C.N. Yang, "New Audio Secret Sharing Schemes with Time Division Technique," Journal of Information Science and Engineering, Vol.19 No.4, pp.605-614, Jul., 2003. [SCI5-year IF: 0.524].

094 . C.N. Yang, "A Note on Efficient Color Visual Encryption," Journal of Information Science and Engineering, Volume 18, Number 3, pp.367-372, May, 2002. [SCI5-year IF: 0.524].

095 . C.N. Yang, "Improvements on Audio and Optical Cryptography," Journal of Information Science and Engineering, Volume 18, Number 3, pp.381-391, May, 2002. [SCI5-year IF:0.524].

096 . C.N. Yang and C.S. Laih, "New Colored Visual Secret Sharing Schemes," Designs Codes and Cryptography, Volume 20, Issue 3, pp.325~336, Jul., 2000. [SCI 5-year IF: 0.977]

097 . C.N. Yang and C.S. Laih, "DCm Codes for Constructing t-EC/AUED Codes," IEEE Trans. on Computers, vol. C-47,NO. 4, pp. 492-495, Apr., 1998. [SCI 5-year IF:3.102].

098 . C.N. Yang and C.S. Laih, "A Systematic Construction of Inner Codes in Generalized Concatenated Codes for Correcting Unidirectional Byte Errors," IEICE Trans. on Fundamentals of Electronics, Communications, and Computer Sciences, pp. 351-354, Feb., 1998. [SCI 5-year IF: 0.261].

099 . C.N. Yang and C.S. Laih, "Generating Functions for Asymmetric/ Unidirectional Error Correcting and Detecting Codes," IEICE Trans. on Fundamentals of Electronics, Communications, and Computer Sciences, pp. 1135-1143, Jun., 1997. [SCI 5-year IF: 0.261].

100 . C.N. Yang and C.S. Laih, "A Note On Error-correcting Codes for Authentication and Subliminal Channels," Information Processing Letters, vol. 62, pp.141-143, 1997. [SCI 5-year IF:0.688].

101 . C.S. Laih and C.N. Yang, "Deign of Efficient Balanced Codes with Minimum Distance 4," IEE Proceedings-Communications (IET Communications), vol. 143, pp. 177-181, Aug., 1996. [SCI 5-year IF:1.023].

102 . C.S. Laih and C.N. Yang, “On The Analysis and Design of Group Theoretical t-syEC/AUED Codes,” IEEE Trans. on Computers, vol. C-45, pp. 103-108, Jan., 1996. [SCI 5-year IF: 3.102].


(B) Conference Papers:
Some modified versions of conference papers also appear in Journal papers. Authors' names may be different according to their contributions in journal versions, and the changes are under an agreement of all authors.
International Conference Papers:

 

001 . S.Y. Tsai, C.C. Wu, C.N. Yang, and Y. C. Chou, “Development and Field Trial of Electronic Medical Record with Picture Processing Capabilities,” Healthcare’17 (The 2017 International Conference on Healthcare Science and Engineering), Zhengzhou, China, June, 2017.

002 . C.N. Yang, Z.X. Yeh, S.C. Hsu, and Z. Fu, “Enhancing Security for Two-Party Comparison over Encrypted Data,” ICSAI 2016 (the 3rd International Conference on Systems and Informatics), pp. 439-443, Shanghai, China, Nov., 2016.

003 . T.K. Chang, C.N. Yang, and F.H. Yeh, “Using the Same PayWord Chains of a Single Account from Multiple Devices,” JCSSE2016 (The 13th International Joint Conference on Computer Science and Software Engineering), Khon Kaen, Thailand, July, 2016.

004 . S. Cimato, E. Damiani, S. Mella, and C.N. Yang, “Key Recovery in Public Clouds: A Survey on Cross-VM Side Channel Attacks,” LNCS 10039, pp. 456-467, ICCCS 2016 (International Conference on Cloud Computing and Security), Nanjing, China, July, 2016.

005 . C.N. Yang, J.K. Liao, F.H. Wu, and Y. Yamaguchi, “Developing Visual Cryptography for Authentication on Smartphones,” LNICST 173, pp. 189-200, Industrial IoT 2016 (EAI International Conference on Industrial IoT Technologies and Applications), Guangzhou, China, Mar., 2016.

006 . C.N. Yang, S. Cimato, J.H. Wu, and S.R. Cai, “3-out-of-n Cheating Prevention Visual Cryptographic Schemes,” ICISSP 2016 (International Conference on Information Systems Security and Privacy), Proc. of ICISSP 2016 , pp. 400-406, Rome, Italy, Feb., 2016.

007 . C.N. Yang, F.H Wu, S.Y. Tsai, and W.C. Kuo, “E-health Services for Elderly Care Based on Google Cloud Messaging,” IEEE Smart City 2015 (International Conference on Smart City), pp. 9-12 (doi: 10.1109/SmartCity.2015.39), Chengdu, China, Dec., 2015.

008 . X. Yan, S. Wang,X. Niu, and C.N. Yang, “Essential Visual Cryptographic Scheme with Different Importance of Shares,” LNCS 8836, pp. 636-643, ICONIP 2014 (the 21st International Conference on Neural Information Processing), Kuching, Sarawak, Malaysia, Nov., 2014.

009 . X. Yan, G. Chen, and C.N. Yang, “Random Girds-based Threshold Visual Secret Sharing with Improved Contrast by Boolean Operations,” LNCS 9023, pp. 319-332, IWDW 2014 (13-th International Workshop on Digital-forensics and Watermarking), Taipei, Taiwan, Oct., 2014.

010 . P. Li, C.N. Yang, and Q. Kong, “Two-in-one Image Secret Sharing Scheme Based on Boolean Operations,” LNCS 9023, pp. 305-318, IWDW 2014 (13-th International Workshop on Digital-forensics and Watermarking), Taipei, Taiwan, Oct., 2014.

011 . C. Kim and C.N. Yang, “Steganography Based on Grayscale Images Using (5, 3) Hamming Code,” LNCS 9023, pp. 588-598, IWDW 2014 (13-th International Workshop on Digital-forensics and Watermarking), Taipei, Taiwan, Oct., 2014.

012 . D. Wang, F. Yi, and C.N. Yang,“Visual Cryptography Scheme with Autostereogram,” LNCS 9023, pp. 364-375, IWDW 2014 (13-th International Workshop on Digital-forensics and Watermarking), Taipei, Taiwan, Oct., 2014.

013 . Y.C. Huang, W.C. Kuo, and C.N. Yang, “Data Hiding Based on Radix-2,” pp. 170-174, AsiaJCIS 2014 (the 9th Asia Joint Conference on Information Security), Wuhan, China, Sep., 2014.

014 . C.N. Yang, W.J. Chang, S.R. Cai, and C.Y. Lin, "Secret Image Sharing without Keeping Permutation Key," pp. 410-416, ICT 2014 (International Conference on Information and Communications Technologies), Nanjing, China, May, 2014.

015 . C. Kim and  C.N. Yang, “Steganography based on low density parity check (LDPC),” LNEE 309, pp. 25-30, FutureTech 2014 (The 9th FTRA International Conference on Future Information Technology), Zhangjiajie, China, May 2014.

016 . C. Kim and  C.N. Yang, “Improving Data Hiding Capacity Based on Hamming Code,” LNEE 301, pp. 697-706, FCC 2014 (FTRA Frontier and Innovation in Future Computing and Communications), Auckland, New Zealand, Jan., 2014.

017 . T. Guo, F. Liu, C. Wu, C.N. Yang, and W. Wang,“Threshold Secret Image Sharing,” LNCS 8233, pp. 404-412, ICICS 2013 (The 15th International Conference on Information and Communications Security), Beijing, China, Nov., 2013.

018 .  C.N. Yang and Y.C. Lin, “Cheating Immune Block-based Progressive Visual Cryptography,” LNCS 8389, pp 95-108, IWDW 2013 (12-th International Workshop on Digital-forensics and Watermarking), Auckland, New Zealand, Oct., 2013.

019 . C.N. Yang, C.C. Wu, and C.W. Chou, “A comment on "sharing secret images using Blakley’s concept",” The Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2013), pp. 383-386, Beijing, China, Oct., 2013.

020 . X.F. Xu, D. Wang, S.D. Li, and C.N. Yang, “An anti-cheating block secret sharing scheme based-on cyclic codes,” The Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2013), pp. 369-372, Beijing, China, Oct., 2013.

021 . C.N. Yang and J.B. Lai, “Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing,” International Symposium on Biometrics and Security Technologies (ISBAST’13), pp. 259-266, Chengdu, China, July, 2013.

022 . P.T. Huy, C. Kim, N. T. Anh, L.Q. Hoa, and C.N. Yang, “Data Hiding Based on Palette Images Using Weak Bases of Z2-Modules,” LNCS 7861, pp 649-658, GPC 2013, (8th International Conference, 2013 Grid and Pervasive Computing 2013 and Colocated Workshops), Seoul, Korea, May, 2013.

023 . C.N. Yang,Y.C. Lin, and C.C. Wu, “Region-in-Region Incrementing Visual Cryptography Scheme,” LNCS 7809, pp. 449-463, IWDW 2012, (11-th International Workshop on Digital-forensics and Watermarking), Shanghai, China, Oct., 2012.

024 . S. Cimato, C.N. Yang, and C.C. Wu, “Visual Cryptography based Watermarking:Definition and Meaning,” LNCS 7809, pp. 435-448, IWDW 2012, (11-th International Workshop on Digital-forensics and Watermarking), Shanghai, China, Oct., 2012.

025 . C. Kim, D. Shin, D, Shinn, and C.N. Yang, “A (2, 2) Secret Sharing Scheme Based on Hamming Code and AMBTC,” LNCS 7197, pp. 129-139, ACIIDS 2012, (Asian Conference on Intelligent Information and Database Systems), Taiwan, March, 2012.

026 . C.N. Yang, T.Y. Wu, L.J. Hu, P. Wang, and C.H. Lee, “Applying Dynamic Partition in IRC-Based Botnet Detection,” 2011 IEEE International Conference on Information Theory and Information Security (ICITIS 2011), Vol. II, pp. 655-660, Hangzhou, China, Nov., 2011.

027 . F. Liu, T. Guo, C. Wu, and C.N. Yang, “Flexible Visual Cryptography Scheme Without Distortion,” LNCS 7128, pp. 211–227, IWDW 2011, (10th International Workshop on Digital-forensics and Watermarking), Atlantic City, USA, Oct., 2011.

028 . C.N. Yang H.W. Shih, Y.Y. Chu, and L. Harn, "New Region Incrementing Visual Cryptography Scheme," The 2011 International Conference on Image Processing, Computer Vision, and Pattern Recognition (IPCV 2011) in conjunction with WORLDCOMP 2011, pp. 323-329, Las Vegas, USA, July, 2011.

029 . C.N. Yang, G.C. Wu, and C.C. Wu, "Certificate-in-Certificate: Designing A New Certificate Extension for Mobile-Commerce," The 2011 International Conference on e-Commerce, e-Administration, e-Society, e-Education, and e-Technology (e-CASE & e-Tech 2011), pp. 554-564, Tokyo, Japan, Jan., 2011.

030 . C.N. Yang, Y.C. Kun, J.Y. He, and C.C. Wu, "A Practical Implementation of Ternary Query Tree for RFID Tag Anti-Collision," The 2010 IEEE International Conference on Information Theory and Information Security (ICITIS 2010), pp. 283-286, Beijing, China, Dec., 2010.

031 . C.N. Yang, Y.C. Kun, C.Y. Chiu, and Y.Y. Chu, "A New Adaptive Query Tree on Resolving RFID Tag Collision," The IEEE International Conference on RFID-Technology and Applications 2010 (IEEE RFID-TA2010), pp. 153-158, Guangzhou, China, June, 2010.

032 . C.N. Yang, C.C. Wu, C.Y. Chiu, S.Y. Chiou, and W.C. Liao, "Micropayment Schemes with Ability to Return Changes," The 11th International Conference on Information Integration and Web-based Applications & Services (iiWAS2009), pp. 354-361, Kuala Lumpur, Malaysia, Dec., 2009.

033 . C.N. Yang, C.S. Laih, C.C. Wu, and G.C. Wu, "RWSIS: (R)FID-enabled (W)arranty (S)ervice (I)nformation (S)ystem on Resolving Security and Privacy," The 2009 International Symposium on IT and its Applications (ITA-09) in conjunction with IEEE CSA 2009, pp. 452-456, Jeju Island, Korea, Dec., 2009.

034 . C.N. Yang, J.R. Chen, C.Y. Chiu, G.C. Wu, and C.C. Wu, "Enhancing Privacy and Security in RFID-Enabled Banknotes," the 2009 IEEE International Workshop on Security in e-Science and e-Research (ISSR2009) in conjunction with IEEE ISPA2009, pp439-444, Chengdu, China, August 2009.

035 . C.N. Yang, Jia-Sing Su and Shun-Yu Cheng, "A Multilevel Secure Key Predistribution Scheme in Wireless Sensor Networks," The 4th International Conferences on Information Security and Cryptology (Inscrypt 2008), Beijing, China, Dec. 2008.

036 . C.N. Yang, Y.Y. Yang, T.S. Chen and G.C. Ye, "New Steganography Scheme in Halftone Images," The 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2008), pp 331-336, Harbin, China, Aug. 2008.

037 . C.N. Yang, C.Y. Chiu, T.S. Chen and G.C. Ye, "Wireless Image Transmission Using Burst Error Correction Codes," The 5th IET Visual Information Engineering 2008 Conference (VIE'08) , pp 331-336, Xi'an, China, July 2008.

038 . C.N. Yang, A.G. Peng and T.S. Chen, " Reducing Shadow Size for Visual Cryptography Scheme," The Ninth International Conference on Information and Communications Security (ICICS 2007), Zhengzhou, China, Dec. 2007.

039 . C.N. Yang and T.S. Chen, "An Image Secret Sharing Scheme with the Capability of Previewing the Secret Image," IEEE ICME 2007 International Conference on Multimedia & Expo (ICME'07), pp. 1535-1538, Beijing, China, July 2007.

040 . C.N. Yang, K.H. Yu and R. Lukac, "User-Friendly Image Sharing in Multimedia Database Using Polynomials with Different Primes," LNCS 4352, pp. 443-452, MMM 2007 (International MultiMedia Modeling Conference), Singapore, January, 2007.

041 . C.N. Yang and T.S. Chen, "Visual Secret Sharing Scheme: Improving the Contrast of a Recovered Image via Different Pixel Expansions," LNCS 4141, pp.468–479, 2006.,ICIAR (International Conference on Image Analysis and Recognition) 2006, Portugal, Sep., 2006.

042 . M.Y. Chen, C.N. Yang and C.S. Laih, "Authorized Tracking and Tracing for RFID Tags," LNCS 4097, pp. 435–444, EUC 2006 Workshops: RFID and Ubiquitous Sensor Networks, Korea, Aug., 2006.

043 . C.N. Yang, C.C. Wang and T.S. Chen, "Real Perfect Contrast Visual Secret Schemes with Reversing," LCNS 3989, pp. 433–447, ACNS (Applied Cryptography and Network Security) 2006, Singapore, June, 2006.

044 . C.N. Yang and B.L. Lu, "Improved Tracing Algorithm for Random-Error-Resilient Collusion-Secure Fingerprinting Codes," P2P workshop in InfoScale2006, Hong Kong, May, 2006.

045 . C.N. Yang and T.S. Chen, "Extended Visual Secret Sharing Schemes with High-Quality Shadow Images Using Gray Sub Pixels", LNCS 3656, pp. 1184–1191, ICIAR (International Conference on Image Analysis and Recognition) 2005, Canada, September, 2005.

046 . C.N. Yang  and T.S. Chen, "New Aspect Ratio Invariant Visual Secret Sharing Schemes Using Square Block-wise Operation," LNCS 3656, pp. 1167–1174, ICIAR (International Conference on Image Analysis and Recognition) 2005,Canada, September, 2005.

047 . C.N. Yang, T. Lin, and T.S. Chen, "Enhanced Fair Micropayment Scheme Based on Hash Chain To Avoid Merchant Collusion", pp. 39 - 42, ISCE 2005, Macau, June, 2005.

048 . C.N. Yang  and T.S. Chen,,"New Size-Reduced Visual Secret Sharing Schemes with Half Reduction of Shadow Size," LNCS 3480, pp. 19–28, ICCSA (International Conference on Computational Science and its Applications) 2005, Singapore, May, 2005.

049 . C.N. Yang, and G.J. Chen, “Error Spreading Control in Steganography Embedding Scheme Using Unequal Error Protection,” 2004 International Computer Symposium(ICS2004), pp.443-448, Taiwan, Dec., 2004. 

050 . C.N. Yang and T.S. Chen, “An Algorithm to Enumerate Codewords for Third-Order Spectral-Null Codes,” Proceedings, 2004 IEEE International Symposium on Information Theory, pp.88, Chicago, USA, June 27-July 2, 2004.

051 . C.N. Yang, H.T. Teng and T.S. Chen, “Using One-way Hash Function to Solve the Reusable Unit Key Problem in Bluetooth Security,” The 8th World Multi-Conference on SYSTEMICS, CYBERNETICS AND INFORMATICS, SCI 2004, pp.29-32, Florida, USA, July, 2004.

052 . C.N. Yang and H.T. Teng,An Efficient Method for Finding Minimum Hash Chain of Multi-Payword Chains in Micropayment,IEEE Conference on E-Commerce, pp.45-48, Califonia, USA, June, 2003.

053 . C.N. Yang, T.Y. Cheng and C.C. Kuo, “Enhanced Wireless IEEE 802.11b Protocols Resistant to the Keystream Reuse Attack,”Proceedings of the 2002 International Computer Symposium, Volume 2, pp.1035-1039, Taiwan, Dec., 2002.

054 . C.N. Yang and C.C. Kuo, “Enhanced Quantum Key Distribution Protocols Using BB84 and B92,”Proceedings of the 2002 International Computer Symposium, Volume 2, pp.951-959, Taiwan, Dec., 2002.

055 . C.N. Yang and C.C. Kuo,“New Efficient Quantum Key Distribution Protocol,”SPIE's Photonic Asia 2002, Vol. 4917, pp.54-58, Shanghai, China, Oct., 2002.

056 . C.N. Yang, “An improvement on code for detection of tampering in write-once optical disks,” 2000 International Computer Symp.Proceedings(ICS 2000), Workshop on cryptology and information security,pp.84-90, Taiwan, Dec., 2000.

057 . C.S. Laih, C.C. Lin, and C.N. Yang, “The Recent Development of E-government and PKI in ROC,” SSGRR 2000 Computer & eBusiness Conference, Italy, July 31~August 6, 2000.  

058 . C.N. Yang and C.S. Laih, “New (k,k) visual secret sharing schemes using hierarchical structure technique,” 1998 International Computer Symp. Proceedings(ICS'98), Workshop on cryptology and information security, pp.148-154, Taiwan, Dec., 1998.

059 . C.N. Yang, Y.B. Yeh, and C.S. Laih, “A dynamic password visual authentication scheme through Internet,” 16-th International Telecommunication Symp. (ITS'98), vol. III, pp.163-167, Taiwan, Sep., 1998.

060 . C.N. Yang and C.S. Laih, “On the design of t-EC/AUED codes,” IEEE International Symposium on Information Theory, Ulm, Germany, June 29-July 4, 1997.

061 . Y.C. Lee, C.N. Yang, and C.S. Laih, “An authentication protocol for the GSM,” 15-th International Telecommunication Symp.(ITS‘96),   vol. I, pp.173-176, Taiwan, Nov.,1996


Local Conference Papers:

 

001 . C.N. Yang, Y.T. Zhuang, S.C. Hsu, "Google Map Graphical One-time Password," TANET 2016, Oct. 2016.

002 . C.N. Yang, Z.N. Lin, J.K. Liao, and Y.F. Lee, “A Study of Intrusion Detection Tool Snort on Digital Forensics,” 2015 Conference on Information Technology and Applications in Outlying Islands (ITAOI 2015), pp. 815-819, May, 2015.

003 . C.N. Yang, H.C. Yang, J.Y. Chen, T.C. Tung, and L.Z. Sun, "A Multilevel Security Google Map Graphical Passwor," TANET 2014, Oct. 2014.

004 . C.N. Yang, C.C. Wu, Y.C. Lin, C.Y. Lin, and S.R. Cai, "Block-based Progressive Visual Cryptography," The Fourth National Conference on Web Intelligence and Applications (NCWIA 2014), May, 2014.

005 . C.N. Yang, C.Y. Chiu, and S.R. Cai, "Mobile Authentication Based on Google Cloud Messaging," TANET 2013, Oct. 2013.

006 . C.N. Yang, S.Y. Tsai, C.C. Wu, C.Y. Lin, S.R. Cai, T.H. Chen, and C.L. Sheih, "Android Push Notification on Health Information Services for Elderly Seniors Based on Google Cloud Messaging," TANET 2013, Oct. 2013.

007 . C.N. Yang and J.B. Lai, “Enhancing Security in Google Map Based Graphical Passwords by Coordinate Shifting Approach,” 2013 Conference on Information Technology and Applications in Outlying Islands, pp. 1253-1258, May, 2013.

008 . C.N. Yang, L.W. Hang, W.J. Chang, and C.W. Chiang, "Enhancing Security in Google Map Based Graphical Passwords," TANET 2012, Oct. 2012.

009 . C.N. Yang, S.H. Lin, G.C. Huang, Y.L. Chang, H.W. Shih, and Y.C. Lin, “A Text-in-Picture Steganographic Method using Android Platform,” TANET 2011, Oct. 2011.

010 . C.N. Yang, C.H. Wu, P.Y. Liao, and C.C. Wu, “ROI/NROI Data Hiding of Medical Images, with Application on Blood Capillary Images,” 2011 6th International Symposium on Healthcare Information Management (UHIMA 2011), April, 2011.

011 . C.N. Yang, C.Y. Lin, S.L. Chen, H.C. Huang and Y.Y. Chu, "A Secure Digital Photo Frame to Share Photos Using DE2-70," 2010 Workshop on Consumer Electronics, pp. 925-928, Nov., 2010.

012 . C.N. Yang, S.H. Lin, C.S. Shu, S. Huang and C.Y. Chiu, "Combing SiB and QR Code for Multi-Authority Wireless Authentications," 2008 Workshop on Consumer Electronics, pp. 544-548, Dec 2008.

013 . C.N. Yang, S.U. Cheng, Y.C. Kun, G.C. Wu and T.H. Chung,"RFID Enabled Passenger with Bicycle Transit Auto-Payment Scheme in MRT, " TANET 2008, Oct. 2008.

014 . C.N. Yang and T. S. Chen "On The Analysis of Visual Cryptography Scheme Underlying XOR Operation," Cryptology and Information Security Conference 2008 (CISC2008), pp. 16-30, May 2008.

015 . C.N. Yang, S.H. Chang, T.S. Chen, and C.H. Su, "A New Pixel-Value Differencing Steganography Scheme Based on Space Filling Curve," Cryptology and Information Security Conference 2008 (CISC2008), pp. 462-474, May 2008.

016 . C.N. Yang, J. S. Su, T. S. Chen, and S. H. Chang "Implementation of A High-Security Certificate Service By Embedding Fingerprint In Smart Cards," Open Source Code 2007, Nov, 2007.

017 . C.N. Yang, C. E. Yen, C. H. Wang, C. M. Chen, T. S. Chen, and Y. F. Lee "Campus Micropayment System by Mobile Barcode," TANET 2007, Oct, 2007.

018 . C.N. Yang, A.G. Peng and T.S. Chen, "Registration Tolerant Visual Secret Sharing Schemes Using Two-Sized Subpixels," Information Security Conference, pp.13-23, June, 2007.

019 . C.N. Yang, F.R. Zhou, J.R. Lu, T. Zheng and T.S. Chen, "Applying CAPTCHA Technology to Prevent Click Fraud in E-Commercials," ECDL2007, pp. 492-499, March, 2007.

020 . C.N. Yang, T.S. Chen and A.G. Peng,  "Certificate Services for Cellular Phone Emulator Based on JAVA Card,"OpenSource Code 2006, Nov. 2006.

021 . C.N. Yang, T.S. Chen, Y.C. Lin, Y.F. Yu, Y.F. Chen, C.Y. Chiu and U.F. Lee "Access Control for Mouse and Network Functions in Computer Classroom Using RFID Technique," TANET 2006, Nov. 2006.

022 . C.N. Yang, T.S. Chen, K.H. Yu and C.C. Wang, "Cheating-Immune Secret Image Sharing Scheme with Steganography," Information Security Conference, pp.250-257, June, 2006.

023 . C.N. Yang, K. N. Chen and A.G. Peng ,  “A Reliable Tree-Based Revocation Scheme in Grid Computing System”, The Second Workshop on Grid Technologies and Applications WOGTA 2005, pp. 44-50, Dec. 2005.

024 . Y.F. Lee, B.F. Liou, C.N. Yang,H.C. Chi, "Automatic IP Management," Proc. TANET 2005,Taichung, Oct. 2005.

025 . C.N. Yang, Z.W. Chen and C.C. Chiang,  “A Slight Secret Key Storage Requirement Watermarking Scheme For Image Authentication”, 18th IPPR Conference on Computer Vision, Graphics and Image Processing (CVGIP 2005), pp. 1038-1041, Aug. 2005.

026 . C.N. Yang and S.H. Chu A Simple and Efficient Quantum Dense Key Distribution Protocol Using Single Polarized Photon,   I nfo rmation Secu rity Conference, pp. 382-388, June 200 4.

027 . C.N. Yang and T.S. Chen Image Size Invariant Visual Secret Sharing Schemes fo r Gray Level Image”,  Information Security Conference, pp.464-471, June 2003.

028 . C.N. Yang, C.C. Kuo, and T.Y. Cheng Enhancement of Known IV attack for WEP Systems,  National Computer Symposium on Information Security, pp.1205-1212, Dec 2003

029 . C.C. Lin, C.S. Laih and C.N. Yang,“Audio Cryptography Schemes based on the time division technique,” 2002 Proceedings of the Eleventh National Conference on Information Security, pp.407-414, May 2002.

030 . C.N. Yang ,Y.H. Liang ,and W.H. Chou, New Visual Secret Sharing Scheme with Non-Expansible Shadow Size Using Non-binary Sub Pixel, National Computer S ymposium on Information Security, pp.F074~F085, Dec 2001.

031 . C.N. Yang and T.L. Wu, “Visual Secret Sharing Schemes with Multiple Shared Secrets,2000 Proceedings of the Eleventh National Co nference on Information Security,pp. Jan-99 05, May 2001.

032 . C.H. Shi, S.L. Peng, and C.N. Yang, Efficient Generation of Constant Weight Codes in Cryptosystem,” 2000 Proceedings of th e Tenth National Conference on Informat ion S ecur ity, pp. -149 160 , May, 2000.

033 . C.N. Yang and T.L. Wu, “A Colored Visual Secret Sharing Scheme Based on the Additive Color Mixing of Light,” 2000 Proceedings of the Tenth National Conference on Information Security, pp. 180-189, May, 2000.

034 . C.N. Yang and C.S. Laih, “Some new types of visual secret sharing schemes,” 1999 National Computer Symp. (NCS'99), vol. III, pp.260-268, Dec., 1999. 



 

(C)Books and Book Chapters :

001. Book Editor- Y.Q. Shi, H.J. Kim, H.J., F. Pérez-González, and C.N. Yang, Digital-Forensics and Watermarking (Springer, ISBN: 978-3-319-19320-5), 2015.

002. Book- C.N. Yang, C.C. Lin, and C.C. Chang, Steganography and Watermarking, Nova Science Publishers, Inc., ISBN: 978-1-62618-317-9, Number of pages: 412, Publication Date: 2013 - 3rd Quarter.

003. Book - Chapter- C.N. Yang, W.C. Kuo, and S. H. Chang, Chapter 5: A High Steganographic Scheme with Pixel-Value Differencing, in the book Steganography and Watermarking, 2013.

004. Book Editor- J.S. Pan, C.N. Yang, and C.C. Lin, Advances in Intelligent Systems and Applications -Volume 2 (Springer. ISBN: 978-3-642-35472-4), Dec., 2012.

005. Book Chapter- C.N. Yang, J.Y. He, and Y.C. Kun, Chapter: RFID Tag Anti-Collision Protocols, in the book Advanced RFID Systems, Security, and Applications (IGI Global, ISBN13: 9781466620803), 2012.

006. Book- S. Cimato and C.N. Yang, Visual Cryptography and Secret Image Sharing, Publisher: CRC Press/Taylor & Francis, ISBN: 9781439837214, Number of Pages: 501, Publication Date: August 10, 2011.

007. Book Chapter- C.N. Yang, C.B. Ciou, and T.S. Chen, Chapter 17: Two-Decoding-Option Image Sharing Method, in the book Visual Cryptography and Secret Image Sharing, Aug, 2011.

008. Book Chapters- R. Lukac, K.N. Plataniotis, and C.N. Yang, Image Secret Sharing. In Encyclopedia of Multimedia, (ed.) B. Furth, Springer-Verlag, pp. 328-335, January 2006. Including short articles: Compression in Image Secret Sharing (pp. 86-87), Halftoning-Based Visual Secret Sharing (pp. 363-364), Image Watermarking Using Visual Cryptography (pp. 337-338), Private-Key Cryptosystem (pp. 712-714), Threshold Schemes with Minimum Pixel Expansion (pp. 849-850), Visual Cryptography (pp. 950-951). ISBN 0-387-24395-X.


Academic Awards:

 

‧ Fine Advising Award in the Thesis of PhD of Science awarded by Institute of Information & Computer Machinery year of 2014. The title of thesis is “Visual Cryptography and Secret Image Sharing”.

‧ Fine Advising Award in the Thesis of Master of Science awarded by Institute of Information & Computer Machinery year of 2012. The title of thesis is “k out of n Region Incrementing Scheme in Visual Cryptography”.

‧ Fine Teaching Award in the College of Science and Engineering of National Dong Hwa University year of 2011.

‧ Fine Advising Award in the Thesis of Master of Science awarded by Institute of Information & Computer Machinery year of 2010. The title of thesis is “A New (k, n) Multi-secret Visual Cryptography”.

‧ RFID-TA 2010 Best Student Paper Award Competition in IEEE International Conference on RFID-Technology and Applications 2010. The title of paper is “A New Adaptive Query Tree on Resolving RFID Tag Collision”.

‧ iiWAS 2009 Best Paper Award in the 11th International Conference on Information Integration and Web-based Applications & Services (iiWAS2009). The title of paper is “Micropayment Schemes with Ability to Return Changes”.

‧ Fine Teaching Award in the College of Science and Engineering of National Dong Hwa University year of 2008.

‧One of the top ten most cited papers among all the papers published by Journal of System and Software in 2007. The paper is C.N. Yang, T.S. Chen, K.H. Yu and C.C. Wang, "Improvements of image sharing with steganography and authentication," Journal of Systems and software, Vol. 80, Issue 7, pp. 1070-1076, Jul., 2007.

‧ Fine Advising Award in the Thesis of Master of Science awarded by Institute of Information & Computer Machinery year of 2006. The title of thesis is “Design of Some New Efficient Second-Order Spectral-Null Codes”.

‧ Fine Teaching Award in the Whole Campus of National Dong Hwa University year of 2004.

‧ Fine Advising Award in the Thesis of Master of Science awarded by Institute of Information & Computer Machinery year of 2002. The title of thesis is “Detection of Tampering In Noisy Environment For Write-Once Optical Disks”.

 


Serve in International Journals and Conferences:

Journals:

‧ Guest Editor- Special Issue on "Advanced Technology for Smart Home Automation and Entertainment" for Personal and Ubiquitous Computing (PAUC, springer journal).

‧ Guest Editor- Special Issue on "Mobile and Smartphone Forensics in Mobile System" for Mobile Information Systems.

‧ Guest Editor- Special Issue on "Real-Time data Hiding and Visual Cryptography" for the Journal of Real-Time Image Processing (JRTIP).

‧ Editorial Board- International Journal of Knowledge Engineering (IJKE).

‧ Lead Guest Editor- Special Issue on "Multimedia and Image Processing: Security, Forensics, and Applications" for the Journal of Electrical and Computer Engineering (Hindawi Publishing Corporation).

‧ Editorial Board- Mobile Computing (The World Academic Publishing).

‧ Editorial Board- Journal of Advanced Computing (Columbia International Publishing).

‧ Editorial Board- Information Technology and Applications (The World Academic Publishing).

Conferences:

‧ SIGNAL 2018- Technical Program Committee Member of The Third International Conference on Advances in Signal, Image and Video Processing (SIGNAL 2018).

‧ KESA 2018- Technical Program Committee Chair of The International Workshop on Knowledge Extraction and Semantic Annotation (KESA 2018) in conjunction with ALLDATA 2018.

‧ ICISSP 2018- Program Committee Member of the International Conference on Information Systems Security and Privacy (ICISSP 2018).

‧ ICCNS 2017- Technical Committee Member of 2017 the 7th International Conference on Communication and Network Security (ICCNS 2017).

‧ ICCTS 2017- Technical Program Committee Member of 2017 6th International Conference on Computer Technology and Science (ICCTS 2017).

‧ ICCCS 2017- Keynote Speaker of The 3rd International Conference on Cloud Computing and Security (ICCCS 2017).

‧ ICCT 2017- International Technical Committee Member of 2017 17th IEEE International Conference on Communication Technology (ICCT 2017).

‧ ICEDUIT 2017- Program Committee Member of 2017 2nd International Conference on Education and Information Technologies (ICEDUIT 2017).

‧ ICWIP 2017- Conference Committee Member of 2017 International Conference on Watermarking and Image Processing (ICWIP 2017).

‧ TMCM 2017- International Scientific Committee Member of 2017 2nd International Conference on Test, Measurement and Computational Method (TMCM 2017).

‧ ICSIP 2017- Conference Technical Committee Member of 2017 2nd International Conference on Signal and Image Processing (ICSIP 2017).

‧ SAPSE 2017- Program Committee Member of 8th IEEE International Workshop on Security Aspects of Process and Services Engineering (SAPSE 2017) in conjunction with COMPSAC 2017.

‧ ICMSSP 2017- Conference Chair of 2017 International Conference on Multimedia Systems and Signal Processing (ICMSSP 2017).

‧ ISIC'17- Program Committee Chair of The 2017 International Conference on Information Security and Intelligent Computing (ISIC'17).

‧ CST2017- Technical Program Committee Member of The 2nd International Conference on Computer Science and Technology (CST 2017).

‧ SIGNAL 2017- Technical Program Committee Member of The First International Conference on Advances in Signal, Image and Video Processing (SIGNAL 2017).

‧ KESA 2017- Technical Program Committee Chair of The International Workshop on Knowledge Extraction and Semantic Annotation (KESA 2017) in conjunction with ALLDATA 2017.

‧ ICISSP 2017- Program Committee Member of the International Conference on Information Systems Security and Privacy (ICISSP 2017).

‧ IWSBT 2016- Program Committee Chair of International Workshop on Secure Biometric Technologies (IWSBT 2016).

‧ CSCT 2016- International Technical Committee Member of Computer Science and Communication Technology (CSCT2016).

‧ 2INTECH 2016- Advisory Committee Member of The 2'nd International Conference on Intelligent Information Technology (2INTECH 2016).

• GDC 2016- Program Committee Member of The 2016 Conference on Grid and Distributed Computing (GDC 2016).

• IWDW 2016- Session Chair of 15th International Workshop on Digital-Forensics and Watermarking (IWDW 2016).

• IWDW 2016- Program Committee Member of 15th International Workshop on Digital-Forensics and Watermarking (IWDW 2016).

• ICMSSP 2016- Keynote Speaker of 2016 International Conference on Multimedia Systems and Signal Processing (ICMSSP 2016).

• TSA 2016- Program Committee Member of Third International Conference on Trustworthy Systems and Their Applications (TSA 2016).

• Workshop on Cryptography and Information Security of ICS 2016- Program Committee Member of Workshop on Cryptography and Information Security 2016 in conjunction with ICS 2016.

• ICNISC 2016- Keynote Speaker of 2nd Annual International Conference on Network and Information Systems for Computers (ICNISC 2016).

• ICCCS 2016- Technical Program Committee Member of The 2nd International Conference on Cloud Computing and Security (ICCCS 2016).

‧ SAPSE 2016- Program Committee Member of 8th IEEE International Workshop on Security Aspects of Process and Services Engineering (SAPSE 2016) in conjunction with COMPSAC 2016.

‧ SIGNAL 2016- Technical Program Committee Member of The First International Conference on Advances in Signal, Image and Video Processing (SIGNAL 2016).

‧JCKE 2016 1st- Technical Committee Member of JCKE 2016 1st (2016 1st Journal Conference on Knowledge Engineering).

‧ ICISSP 2016- Program Committee Member of The International Conference on Information Systems Security and Privacy (ICISSP 2016).

‧ WCSN 2015- Co-Chair of 2nd International Conference on Wireless Communication and Sensor Network (WCSN 2015).

‧ GDC 2015- Program Committee Member of The 2015 Conference on Grid and Distributed Computing (GDC 2015).

‧ SITIS 2015- Program Committee Member of The 11th International Conference on Signal Image Technology & Internet Based Systems (SITIS 2015).

‧ 3PGCIC 2015- Program Committee Member of 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC 2015).

‧ TSA 2015- Program Committee Member of Second International Conference on Trustworthy Systems and Their Applications (TSA 2015).

‧ CoHeB 2015- Program Committee Member of International Workshop on Collaboration Technologies and Systems in Healthcare and Biomedical Fields (CoHeB 2015) in conjunction with CTS 2015.

‧ IWDW 2015- Program Committee Member of 14th International Workshop on Digital-Forensics and Watermarking (IWDW 2015).

‧ SAPSE 2015- Program Committee Member of 7th IEEE International Workshop on Security Aspects of Process and Services Engineering (SAPSE 2015) in conjunction with COMPSAC 2015.

‧ ICISSP 2015- Program Committee Member of The International Conference on Information Systems Security and Privacy (ICISSP 2015).

‧ CEEIT 2015- International Technical Committee Member of 2015 International Conference on Electrical Engineering and Information Technology (CEEIT 2015).

‧ GDC 2014- Program Committee Member of The 2014 Conference on Grid and Distributed Computing (GDC 2014).

‧ CSEIT 2014- Program Committee Member of International Conference on Computer Science, Engineering and Information Technology (CSEIT 2014).

‧ IWDW 2014- General Chair of 13th International Workshop on Digital-Forensics and Watermarking (IWDW 2014).

‧ ADCO 2014- Program Committee Member of International Conference on Advanced Computing (ADCO 2014).

‧ICCIA 2014- Session Chair of The 2014 International Conference on Computational Intelligence and Applications (ICCIA 2014).

‧ICCIA 2014- Technical Committee Member of The 2014 International Conference on Computational Intelligence and Applications (ICCIA 2014).

‧SITIS 2014- Program Committee Member of The 10th International Conference on Signal Image Technology & Internet Based Systems (SITIS 2014).

‧ ICT 2014- Session Chair of International Conference on Information and Communications Technologies (ICT 2014).

‧ EICE 2014- Technical Program Committee Member of International Conference on Electrical, Instrumentation and Control Engineering (EICE 2014).

‧ CoHeB 2014- Program Committee Member of International Workshop on Collaboration Technologies and Systems in Healthcare and Biomedical Fields (CoHeB 2014) in conjunction with CTS 2014.

‧ CEEIT 2014- International Technical Committee Member of 2014 International Conference on Electrical Engineering and Information Technology (CEEIT 2014).

‧SITIS 2013- Program Committee Member of The 9th International Conference on Signal Image Technology & Internet Based Systems (SITIS 2013).

‧GDC 2013- Program Committee Member of The 2013 Conference on Grid and Distributed Computing (GDC 2013).

‧ IIH-MSP 2013- Special Session Chair on Visual Cryptography and Secret Image Sharing in conjunction with Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2013).

‧ EUC 2013- Program Committee Member of The 11th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2013).

‧ UMAS 2013- General Chair of 2013 International Symposium on Research in Ubiquitous and Multimedia Application Systems (UMAS 2013) in conjunction with NPC 2013.

‧ CoHeB 2013- Program Committee Member of International Workshop on Collaboration Technologies and Systems in Healthcare and Biomedical Fields (CoHeB 2013) in conjunction with CTS 2013.

‧ WCNC 2013- Technical Program Committee Member of IEEE Wireless Communications and Networking Conference (WCNC 2013).

‧ CRC 2012- Program Committee Member of International Workshop on Cloud Computing for Research Collaborations (CRC 2012) in conjunction with IEEE CloudCom 2012.

‧ ICS 2012- Program Committee Chair of International Computer Symposiums (ICS 2012).

‧ Workshop on Cryptography and Information Security 2012- Program Committee Co-Chair of Workshop on Cryptography and Information Security 2012 in conjunction with ICS 2012.

‧ UMAS 2012- General Chair of 2012 International Symposium on Research in Ubiquitous and Multimedia Application Systems (UMAS 2012) in conjunction with NPC 2012.

‧ GDC 2012- Program Committee Member of The 2012 Conference on Grid and Distributed Computing.

‧ iiWAS2012- Program Committee Member of 14th International Conference on Information Integration and Web-based Applications & Services (iiWAS2012).

‧ WPS 2012- Program Committee Co-Chair of the 5th FTRA International Workshop on Web and Pervasive Security (WPS 2012) in conjunction with CSA 2012.

‧ ACSA 2011- Session Chair of 2011 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA-11).

‧ ICITIS2011- Session Chair of 2011 IEEE International Conference on Information Theory and Information Security.

‧ IPCV 2011- Session Chair of International Conference on Image Processing, Computer Vision, and Pattern Recognition (IPCV 2011)) in conjunction with WORLDCOMP 2011.

‧ GDC 2011- Program Committee Member of The 2011 Conference on Grid and Distributed Computing.

‧ 2011 International Workshop on Network & System Security- Program Committee Member of the workshop in Conjunction with IEEE ICPADS 2011.

‧ ICITIS2011- Program Committee Member of 2011 IEEE International Conference on Information Theory and Information Security.

‧ iiWAS2011- Program Committee Member of 13th International Conference on Information Integration and Web-based Applications & Services (iiWAS2011).

‧ CSO 2011- Program Committee Member of Fourth International Joint Conference on Computational Sciences and Optimization

‧ CHINACOMM 2011- Program Committee Member of 6th International ICST Conference on Communications and Networking in China

‧ ICIC 2011- Program Committee Member of 2011 International Conference on Intelligent Computing

‧ iiWAS2010- Program Committee Member of 12th International Conference on Information Integration and Web-based Applications & Services (iiWAS2010)

‧ BIFE 2010-  Program Committee Member of 2010 International Conference on Business Intelligence and Financial Engineering

‧ ICIC 2010- Program Committee Member of 2010 International Conference on Intelligent Computing

‧ GPC2010- Publication Chair of 2010 5th International Conference on Grid Pervasive Computing

‧ ITA 2009- Session Chair of the 2009 International Symposium on IT and its Applications (ITA-09) in conjunction with IEEE CSA 2009

‧ ISSR2009- Session Chair of IEEE International Workshop on Security in e-Science and e-Research (ISSR2009) in conjunction with IEEE ISPA2009.

‧ MPIS 2009- Program Committee Member of the Second International Workshop on Multimedia, Information Privacy and Intelligent Computing Systems in conjunction with CSA 2009

‧ ICPADS'09- Program Committee Member of Security and Trustworthy Computing for The Fifteenth International Conference on Parallel and Distributed Systems

‧ BIFE 2009- Program Committee Member of 2009 International Conference on Business Intelligence and Financial Engineering

‧ FIP 2009- Program Committee Member of 2009 International Symposium on Financial Information Processing

‧ ICIC 2009- Program Committee Member of 2009 International Conference on Intelligent Computing

‧ JWIS 2009- Program Committee Member of 2009 Joint Workshop on Information Security

‧ Inscrypt 2008- Session Chair of 2008 International Conference on Information Security and Cryptology

‧ MPIS 2008- Program Committee Member of The First International Workshop on Multimedia, Information Privacy and Intelligent Computing Systems in conjunction with IEEE APSCC 2008

‧ CLD 2008- Program Committee Member of ACM International Workshop on Cross Layer Design

‧ ICIC 2008- Program Committee Member of 2008 International Conference on Intelligent Computing

‧ ICIC 2007- Program Committee Member of 2007 International Conference on Intelligent Computing