期刊論文

  • 111A Loyalty System Incorporated with Blockchain and Call Auction,Journal of Theoretical and Applied Electronic Commerce Researchvol. 17, no. 3pp. 1107-1123 2022/09/01 ( SSCI )
  • 111Design of an e-diploma system based on consortium blockchain and facial recognition,Education and Information TechnologiesVol.27 No.45495–5519 2022/05/01 ( SSCI )
  • 110Improving RE-SWOT analysis with sentiment classification: A case studyof travel agencies,Future InternetVol.13 No.9 2021/08/30 ( EI )
  • 109Enhancing the Robustness of Image Watermarking against Cropping Attacks with Dual Watermarks,Multimedia Tools and Applicationsvol. 79, no.1711297-11323 2020/05/01 ( SCI )
  • 109Design of an E-Voucher System for Supporting Social Welfare Using Blockchain Technology,Sustainabilityvol. 12, no. 83362 2020/04/21 ( SSCI )
  • 108Digital Watermarking Scheme for Copyright Protection and Tampering Detection,International Journal on Information Technologies and SecurityVol.11 No.1107-119 2019/03/01 ( )
  • 105Image tamper detection and recovery using adaptive embedding rules,MeasurementVol.88287-296 2016/05/01 ( SCI )
  • 103Protecting secret documents via a sharing and hiding scheme,Information SciencesVol. 279, No. 2052-59 2014/09/01 ( SCI )
  • 102Constructing HVS-Based Optimal Substitution Matrix Using Enhanced Differential Evolution,Mathematical Problems in EngineeringVol. 20131-10 2013/12/01 ( SCI )
  • 102Application of Threshold Secret Sharing to Image Authentication and Recovery,The SIJ Transactions on Computer Science Engineering & its ApplicationsVol. 1, No. 4174-180 2013/10/01 ( )
  • 101A Joint Ownership Protection Scheme for Digital Images Based on Visual Cryptography,The International Arab Journal of Information TechnologyVol. 9, No. 3276-283 2012/05/01 ( SCI )
  • 100Optimal Vector Quantization based Image Hiding Scheme Using Genetic Algorithm,Energy ProcediaVol.133374-3380 2011/12/09 ( EI )
  • 99Probability-based tampering detection scheme for digital images,Optics CommunicationsVol. 283, No.91737-1743 2010/05/01 ( SCI )
  • 98A Document Protection Scheme Using Innocuous Messages as Camouflage,WSEAS Transactions on Information Science and ApplicationsVol.6, No.4694-703 2009/04/01 ( EI )
  • 97An Imperceptible Watermarking Scheme Using Variation and Modular Operations,International Journal of Hybrid Information TechnologyVol.1 No.48 / 9-16 2008/10/01 ( EI )
  • 96Design of visual cryptographic methods with smooth-looking decoded images of invariant size for grey-level images,The Imaging Science JournalVol.55 No.290-101 2007/06/01 ( SCI )
  • 95A DCT-based Ownership Identification Method with Gray-Level and Colorful Signatures,Pattern Analysis & ApplicationsVol. 9, No. 2-3229-242 2006/10/01 ( SCI )
  • 95An Optimization Model for Visual Cryptography Schemes with Unexpanded Shares,Foundations of Intelligent SystemsLNAI 420358-67 2006/09/27 ( SCI )
  • 95A Statistical Approach for Ownership Identification of Digital Images,Advanced Concepts for Intelligent Vision SystemsLNCS 4179666-674 2006/09/18 ( SCI )
  • 94A digital rights management approach for gray-level images,Lecture Notesin Computer ScienceVol. 3687 No.29/39-47 2005/08/22 ( SCI )

研討會論文

  • 109區塊鏈技術應用於飯店競合聯盟忠誠度計畫之探討,2020國際智慧觀光‧旅遊新創研討會第13-23頁 2020/05/01 ( )
  • 109應用文字探勘技術於台灣體驗行程評價之情緒分析,2020國際智慧觀光‧旅遊新創研討會第24-33頁 2020/05/01 ( )
  • 106Digital watermarking scheme enhancing the robustness against cropping attack,The 6th International Conference on Frontier Computing (FC 2017)143-152 2017/07/12 ( )
  • 105Image Authentication based on QR Decomposition and Sinusoid,The 11th International Conference on Computer Science & Education479-482 2016/08/23 ( )
  • 104Mobile Recommendation System for Cosmeceutical Products,The seventh International Conference on Ubiquitous and Future Networks (ICUFN 2015)無973-976 2015/07/07 ( )
  • 103應用遺傳演算法之易碎型浮水印方法,第十屆知識社群國際研討會433-440 2014/05/17 ( )
  • 103Image Tampering Detection Scheme Using Conflict Watermarks,4th International Conference on Global Business Environment (ICGBE-2014) 1-5 2014/02/01 ( )
  • 102Digital image authentication and recovery based on secret sharing,2013 International Congress on Engineering and Information254-262 2013/01/26 ( )
  • 101基於不變小波域的強韌型浮水印方法,第八屆知識社群國際研討會488-496 2012/06/08 ( )
  • 101Block Correlation-Based Image Verification and Restoration Method,2012 Asia Pacific Conference on Environmental Science and Technology599-605 2012/02/01 ( )
  • 100差分演化法在最佳化向量量化式資訊隱藏之應用,第十七屆資訊管理暨實務研討會 2011/12/10 ( )
  • 100Image tamper detection and recovery using differential embedding strategy,2011 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing399-402 2011/08/23 ( )
  • 100Constructing optimal substitution matrix using Enhanced Differential Evolution,The Eighth International Symposium on Management Engineering 2011143-148 2011/08/22 ( )
  • 100應用差分演化法建構以人類視覺系統為基礎的置換矩陣,2011 電子商務與數位生活研討會論文集(ECDL 2011)1108-1121 2011/03/04 ( )
  • 100Optimal Vector Quantization based Image Hiding Scheme Using Genetic Algorithm,2011 3rd International Conference on Machine Learning and ComputingVol.1466-469 2011/02/27 ( )
  • 99Finding optimal LSB substitution using Ant Colony Optimization Algorithm,2010 Second International Conference on Communication Software and Networks293-297 2010/02/27 ( EI )
  • 99An Imperceptible Frequency-Domain Watermarking Scheme without Resorting to the Original Image,2010 Second International Conference on Communication Software and Networks360-364 2010/02/27 ( EI )
  • 98Digital Watermarking Method Based on Image Size Invariant Visual Cryptographic Scheme,The International Workshop on Pervasive Media (PerMedia2009) 362-366 2009/07/07 ( EI )
  • 98應用像素不擴展之視覺密碼方法於數位浮水印技術,KC2009知識社群研討會 2009/05/23 ( )
  • 97An Imperceptible Watermarking Scheme Using Variation and Modular Operations,The 2nd International Conference on Multimedia and Ubiquitous Engineering (MUE2008)233-237 2008/04/25 ( )
  • 97Digital Watermarking Scheme with Visual Cryptography,International MultiConference of Engineers and Computer Scientists 2008659-662 2008/03/20 ( )
  • 96以視覺式秘密分享為基礎之共同著作權保護機制,2007全國計算機會議第3卷8/421-428 2007/12/21 ( )
  • 96以視覺式祕密分享與小波轉換為基礎之數位浮水印機制,第十三屆資訊管理暨實務研討會 2007/12/08 ( )
  • 96結合資訊隱藏與祕密分享之機密影像保護機制,第十三屆資訊管理暨實務研討會 2007/12/08 ( )
  • 96A VC-Based Copyright Protection Scheme for Digital Images of Multi-Authorship,The World Congress on Engineering 2007 (WCE 2007) 2007/07/03 ( )
  • 95基於小波轉換與模數運算的浮水印方法,第十二屆資訊管理暨實務研討會 2006/12/09 ( )
  • 95結合小波轉換與統計特性提昇不可察覺性的數位影像著作權保護方法,2006「網際空間:資安、犯罪與法律社會」學術研究暨實務研討會151-157 2006/11/20 ( )
  • 94On the design of a document protection scheme based on steganography and secret sharing,2005 Fifth International Conference on Information, Communications and Signal Processing (ICICS 2005)1016-1019 2005/12/06 ( )

學術會議

  • 111第十六屆創新、管理與知識社群國際研討會第十六屆創新、管理與知識社群國際研討會
  • 1092020國際智慧觀光‧旅遊新創研討會智慧觀光‧旅遊新創
  • 1092020國際智慧觀光‧旅遊新創研討會智慧觀光‧旅遊新創
  • 107第十四屆創新、管理與知識社群國際研討會創新、管理與知識社群
  • 107第十四屆創新、管理與知識社群國際研討會創新、管理與知識社群
  • 107第十四屆創新、管理與知識社群國際研討會創新、管理與知識社群
  • 107第十二屆池田大作和平思想研究論壇通往人權世紀的民眾洪流
  • 107第十二屆池田大作和平思想研究國際論壇和平、文化與教育「掀起民眾潮流 走向人權時代」
  • 106The 6th International Conference on Frontier Computing (FC 2017)Security and Privacy
  • 106第十三屆知識社群國際研討會知識社群
  • 10511th International Conference on Computer Science & Education (ICCSE 2016)Image Authentication based on QR Decomposition and Sinusoid
  • 1052016知識社群國際研討會知識社群
  • 104The seventh International Conference on Ubiquitous and Future Networks (ICUFN 2015)ubiquitous and future networks
  • 104SAS VA&VS 實戰講堂巨量資料分析
  • 1042015追求高教卓越國際學術研討會資訊科技與管理之理論與應用
  • 103第十屆知識社群國際研討會行動商務
  • 103第十屆知識社群國際研討會知識社群
  • 1034th International Conference on Global Business Environment (ICGBE-2014) TECHNICAL SESSION
  • 1034th International Conference on Global Business Environment (ICGBE-2014)TECHNICAL SESSION
  • 102第九屆知識社群國際研討會資訊安全 、個人資料保護
  • 102第九屆知識社群國際研討會知識社群
  • 1022013 International Congress on Engineering and InformationEngineering and Information
  • 101第八屆知識社群國際研討會資訊安全 、個人資料保護
  • 1012012 Asia Pacific Conference on Environmental Science and Technology (APEST 2012)Environmental Science and Technology
  • 100第十七屆資訊管理暨實務研討會資訊時代與健康生活
  • 100The Eighth International Symposium on Management Engineering 2011Artificial Intelligence
  • 100第九屆多國籍企業國際學術研討會
  • 1002011電子商務與數位生活研討會
  • 100第五屆池田大作和平思想研究論壇和平文化與教育
  • 1002011 3rd International Conference on Machine Learning and Computing
  • 992010商業智慧與客戶關係管理暨資訊服務人才研討會
  • 99第六屆知識社群研討會
  • 992010多國籍企業學術研討會
  • 992010 International Conference on Communication Software and Networks
  • 98The Sixth International Conference on Ubiquitous Intelligence and Computing (UIC2009)
  • 972008知識社群與系統發展研討會
  • 97The 2nd International Conference on Multimedia and Ubiquitous Engineering (MUE2008)
  • 96The World Congress on Engineering 2007
  • 94The Fifth International Conference on Information, Communications and Signal Processing (ICICS 2005)
  • 94Third International Conference on Advances in Pattern Recognition (ICAPR 2005)

研究計畫

  • 106製作IPv6釣魚王互動遊戲計畫
  • 102結合整數線性規劃與改良式LBP之半易碎型浮水印方法
  • 101結合二維條碼與向量模型之藥妝品推薦系統
  • 100國科會研究計劃「應用基因演算法之最佳化向量量化式資訊隱藏方法」
  • 100100年度國科會計畫「基於差異式嵌藏策略之數位影像篡改偵測與復原方法」
  • 97數位影像之共同著作權保護機制之設計
  • 97以多目標非線性規劃建構多機密影像視覺式秘密分享方法之研究
  • 97數位影像之共同著作權保護機制之設計
  • 97以多目標非線性規劃建構多機密影像視覺式秘密分享方法之研究
  • 96數位影像之共同著作權保護機制之設計
  • 96結合小波轉換、統計理論與模數運算之影像著作權保護系統之研究
  • 96數位影像之共同著作權保護機制之設計
  • 96結合小波轉換、統計理論與模數運算之影像著作權保護系統之研究
  • 95多點加密式的視覺式秘密分享機制

榮譽獎賞

  • 111109學年度學術研究獎勵
  • 1092020國際智慧觀光旅遊新創研討會優秀論文
  • 108108學年度院教學特優教師
  • 107106學年度院教學傑出教師
  • 105103學年度學術研究成果獎勵
  • 104學術研究成果獎勵
  • 103102學年度績優導師
  • 102101學年度全校輔導績優導師
  • 100全校輔導績優導師
  • 9998學年度全校輔導績優導師
  • 97世界名人錄(Who's Who in the World)
  • 9796學年度績優導師
  • 96研究論文獎
  • 96Merit for the International Conference of Signal and Image Engineering (Best Paper Award)
  • 9694學年度研究論文獎

授課資料

  • 108下學期行動資訊巨量資料挖掘與分析
  • 108上學期數位科技數位匯流與科技治理發展與趨勢
  • 108上學期數位科技數位匯流與科技治理應用研討
  • 103下學期資管商務資管實務研究專題