Follow
Gwoboa Horng
Gwoboa Horng
Department of Computer Science and Engineering, National Chung Hsing University
Verified email at cs.nchu.edu.tw
Title
Cited by
Cited by
Year
Cheating in visual cryptography
G Horng, T Chen, DS Tsai
Designs, Codes and Cryptography 38, 219-236, 2006
2132006
Encrypted signal-based reversible data hiding with public key cryptosystem
YC Chen, CW Shiu, G Horng
Journal of Visual Communication and Image Representation 25 (5), 1164-1170, 2014
2122014
A publicly verifiable copyright-proving scheme resistant to malicious attacks
TH Chen, G Horng, WB Lee
IEEE Transactions on industrial electronics 52 (1), 327-334, 2005
1372005
A cheating prevention scheme for binary visual cryptography with homogeneous secret images
DS Tsai, TH Chen, G Horng
Pattern Recognition 40 (8), 2356-2366, 2007
1062007
Robust and blind image watermarking in DCT domain using inter-block coefficient correlation
HJ Ko, CT Huang, G Horng, W Shiuh-Jeng
Information Sciences 517, 128-147, 2020
1042020
A novel secret image sharing scheme for true-color images with size constraint
DS Tsai, G Horng, TH Chen, YT Huang
Information Sciences 179 (19), 3247-3254, 2009
1032009
Comment on “cheating prevention in visual cryptography”
YC Chen, G Horng, DS Tsai
IEEE transactions on image processing 21 (7), 3319-3323, 2012
762012
A high payload data embedding scheme using dual stego-images with reversibility
CC Chang, TC Lu, G Horng, YH Huang, YM Hsu
2013 9th International Conference on Information, Communications & Signal …, 2013
692013
Automatic contrast enhancement of brain MR images using hierarchical correlation histogram analysis
CM Chen, CC Chen, MC Wu, G Horng, HC Wu, SH Hsueh, HY Ho
Journal of medical and biological engineering 35, 724-734, 2015
652015
A new authentication based cheating prevention scheme in Naor–Shamir’s visual cryptography
YC Chen, DS Tsai, G Horng
Journal of Visual Communication and Image Representation 23 (8), 1225-1233, 2012
612012
Password authentication without using a password table
H Gwoboa
Information Processing Letters 55 (5), 247-250, 1995
571995
Certificateless aggregate signature with efficient verification
YC Chen, R Tso, M Mambo, K Huang, G Horng
Security and Communication Networks 8 (13), 2232-2243, 2015
502015
Cryptanalysis of a key management scheme for secure multicast communications
G Horng
IEICE transactions on communications 85 (5), 1050-1051, 2002
502002
On generating meaningful shares in visual secret sharing scheme
DS Tsai, T Chen, G Horng
The Imaging Science Journal 56 (1), 49-55, 2008
492008
Key authentication scheme for cryptosystems based on discrete logarithms
G Horng, CS Yang
Computer Communications 19 (9-10), 848-850, 1996
471996
Adversarial attacks on SDN-based deep learning IDS system
CH Huang, TH Lee, L Chang, JR Lin, G Horng
Mobile and Wireless Technology 2018: International Conference on Mobile and …, 2019
422019
Secure SAS-like password authentication schemes
TH Chen, WB Lee, G Horng
Computer Standards & Interfaces 27 (1), 25-31, 2004
412004
Weakness in the Helsinki protocol
G Horng, CK Hsu
Electronics Letters 34 (4), 354-354, 1998
341998
An efficient and secure protocol for multi-party key establishment
G Horng
The Computer Journal 44 (5), 463-470, 2001
332001
Visual secret sharing with cheating prevention revisited
YC Chen, DS Tsai, G Horng
Digital Signal Processing 23 (5), 1496-1504, 2013
282013
The system can't perform the operation now. Try again later.
Articles 1–20