Chang-Lung Tsai
Chinese Culture University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Chang-Lung Tsai.
Pattern Recognition | 2005
Chang-Lung Tsai; Huei-Fen Chiang; Kuo-Chin Fan; Char-Dir Chung
The purpose of data hiding is to embed relating textural description into an image. The textural description and original host image can be extracted and reconstructed from the stego-image in the data extraction process. However, the reconstructed host image will more or less be damaged or distorted by using traditional data hiding methods. In this paper, we propose a novel data hiding mechanism by hiding data based on pair-wise logical computation (PWLC). The proposed mechanism can achieve the benefits of reversible hidden data extraction and lossless reconstruction of host image without utilizing any information from the original host image. Furthermore, the task of tampering detection can also be accomplished in the proposed mechanism. Experimental results demonstrate the feasibility and validity of our proposed mechanism in the data hiding of binary images.
international carnahan conference on security technology | 2004
Chang-Lung Tsai; Kuo-Chin Fan; Char-Dir Chung; T. Chiang Chuang
Recently, the development of data hiding techniques to hide annotations, confidential data, or side information into multimedia attracts the attention of researchers in various fields, especially in digital library. One of the essential tasks in digital library is the digitization of arts together with the corresponding textural descriptions. The purpose of data hiding is to embed relating textural description into the image to form an embedded image instead of two separate files (text file and image file). The hidden textural description and the original host image can be extracted and reconstructed from the embedded image in the reverse data extraction process. However, the reconstructed host image will more or less be distorted by utilizing traditional data hiding methods. In this paper, we propose a novel lossless data hiding method based on pixel decomposition and pair-wise logical computation. In addition to the lossless reconstruction of original host images, the results generated by the proposed method can also obtain high data hiding capacity and good visual quality. Furthermore, the task of tampering detection can also be achieved in the proposed method to ensure content authentication. Experimental results demonstrate the feasibility and validity of our proposed method.
Journal of Medical Systems | 2012
Shih-Sung Lin; Min-Hsiung Hung; Chang-Lung Tsai; Li-Ping Chou
The study aims to provide an ease-of-use approach for senior patients to utilize remote healthcare systems. An ease-of-use remote healthcare system (RHS) architecture using RFID (Radio Frequency Identification) and networking technologies is developed. Specifically, the codes in RFID tags are used for authenticating the patients’ ID to secure and ease the login process. The patient needs only to take one action, i.e. placing a RFID tag onto the reader, to automatically login and start the RHS and then acquire automatic medical services. An ease-of-use emergency monitoring and reporting mechanism is developed as well to monitor and protect the safety of the senior patients who have to be left alone at home. By just pressing a single button, the RHS can automatically report the patient’s emergency information to the clinic side so that the responsible medical personnel can take proper urgent actions for the patient. Besides, Web services technology is used to build the Internet communication scheme of the RHS so that the interoperability and data transmission security between the home server and the clinical server can be enhanced. A prototype RHS is constructed to validate the effectiveness of our designs. Testing results show that the proposed RHS architecture possesses the characteristics of ease to use, simplicity to operate, promptness in login, and no need to preserve identity information. The proposed RHS architecture can effectively increase the willingness of senior patients who act slowly or are unfamiliar with computer operations to use the RHS. The research results can be used as an add-on for developing future remote healthcare systems.
intelligent information hiding and multimedia signal processing | 2009
Wei-Lieh Hsu; Chang-Lung Tsai; Po-Lun Chang
The occurrence of accidents on the freeway/highway has a significant impact on normal traffic manipulations and the reasons that cause accidents are admitted primarily due to the introduction of traffic incidents. Hence, automatic traffic monitoring system gradually attracts the attention of researchers in the field of intelligent transportation system. In this paper, a vision-based approach for automatic detection of traffic incident is proposed. Entropy-based features are extracted to create a cellular model that simulates the dynamic behavior of the traffic flow. When an unusual event happens on the vehicular lane, the system can detect it immediately and send out signals to the approaching vehicles to prevent accidents from happening. Experiments were conducted on various simulations and the results demonstrate the validity and effectiveness of the proposed approach on traffic incident detection.
international conference on multimedia and expo | 2004
Chang-Lung Tsai; Kuo-Chin Fan; Char-Dir Chung; Thomas C. Chuang
Due to the emergence of digital libraries and the fast development of multimedia, more and more people use data hiding techniques to hide annotations or side information in images. We propose a novel data hiding mechanism based on pair-wise logical computation. The proposed mechanism can achieve the benefits of reversible and lossless reconstruction of the hidden data and the host image without utilizing any information from the original host image. It does not degrade the visual quality of the recovered host image after extracting the hidden data. Moreover, satisfactory data hiding capacity can be obtained simultaneously. The proposed data hiding mechanism is suitable for applying to the data hiding of images, scanned texts, figures, and signatures, especially for side information and annotation data embedding
intelligent information hiding and multimedia signal processing | 2010
Chang-Lung Tsai; Allen Y. Chang; Ming-Szu Huang
Distributed denial of service (DDoS) is one of the most persecution network attack techniques to be confronted in recent years. From the definition of DDoS, thousands of network attacks must initiate simultaneously and continuously to achieve a successful DDoS attacking. Therefore, almost all of the information system cannot survive as they confront the DDoS attacks. Although there are a lot of intrusion detection system (IDS) developed, preventing DDoS attack is still difficult and perplexing. In this paper, an early warning system for detecting DDoS attacking has been mounted to a traditional IDS to form a completely system. This early warning system is developed based on the rationale of time delay neural network. In the networking topology, each node is monitored with the deployment of detectors to establish a multilayer architecture. In addition, the activities of each node will be monitored by their neighboring nodes to check whether it is still survival or not mutually. After then, all of the attacking information will be collected and transferred to the expert module for integrating analysis. As those nodes dispatched on the DMZ or between the first and second layer of firewall face some attacking similar as the pattern of DDoS, the kernel expert module which dispatched behind the second firewall will take some feasible actions and initiate the defense strategies to protect the kernel information system. In the meanwhile, those failed nodes will be restarted and act as the role of vanguard to assure the networking under normal operation.
international carnahan conference on security technology | 2009
Allen Y. Chang; Dwen-Ren Tsai; Chang-Lung Tsai; Yong-Jiang Lin
Due to rapid advance of the RFID systems, there is sufficient computing power to implement the encryption and decryption required for the authentication during transactions nowadays. In addition, RFID tags have enough capacity to store the corresponding information. Therefore, RFID enabled credit card can be used to improve the potential security issues occurred while using the traditional credit card, however, the limitation of the production cost of RFID tag, its computing power and storage capacity is limited. Thus, it cannot perform sophisticated computation needed for the authentication mechanism, i.e., security technologies adopted from traditional wireless network cannot be transplanted to the contactless RFID transmission directly. Many solutions have been proposed to improve the RFID security issues raised in the research. Most of these studies assume the communication infrastructure between the RFID reader and the back-end database are based wired enterprise networking environment which is usually defined as the secured communication channel. However, there are many applications that users need to use RFID enabled handheld devices such as mobile phones or PDAs to link with the back-end database via wireless communication protocols like GSM, GPRS or wi-fi. These communication channels are exposed to unsafe environments and the security issues must be taken into account. In this paper, we construct an RFID system based on mobile communication devices such as cellular phones. We propose an effective and secured certificate mechanism using mobile devices as RFID readers together with the credit cards containing RFID tags. The result shows it can improve the existing RFID security issues under the premise of safety, efficiency and compatibility of the EPC network.
intelligent information hiding and multimedia signal processing | 2011
Wei-Lieh Hsu; Kun-Fong Lin; Chang-Lung Tsai
Numerous accidents from crowd stampedes have been recorded in human history, Therefore, the public has set high priority on the safety of public places. Surveillances systems aim to use artificial intelligence to address this problem, so that the crowd accident can be significantly reduced. We adopt a low cost camera to gather visual data and propose a cellular model for data interpretation. Based on the model, the motion status of the measured area can be represented as a dynamic state matrix, so the proposed method can save a lot of computing time. We adopted the Discrete Cosine Transformation to transform the motion status of the measured area into the frequency domain to recognize the frequency distribution. Then the feature values are extracted based on different frequency bands and distinct directional information to form a feature vector for training and classification. Finally, the Support Vector Machine is used to classify the feature vector into five classes of crowd density, with the results showing the proposed system is highly effective in crowd monitoring.
international carnahan conference on security technology | 2009
Chang-Lung Tsai; Chun-Chi Tseng; Chin-Chuan Han
In this paper, a novel intrusion behavior analysis mechanism based on the design of honey pot and the diagnosis of ant colony algorithm has been proposed. In which, there are monitor module, track module, and analysis module developed. The intrusive behavior is then analyzed through the above modules. In the developed honey pot, all of the architecture, database, directory, security parameters are updated dynamically and timely to evade the probe test from the intruders. To record the traverse of an intrusion, the pheromone will be deposited as discovered. In addition, in order to exactly and correctly measure the capability of the intruders, the content of those discovered file, path and database will be updated and the security setting will also be enhanced timely to raise the difficulty of visiting or access again. All of the traverse of intruders and the corresponding behavior will be analyzed based on ant colony algorithm. Experimental results demonstrate that the proposed IDS mechanism possesses good efficiency and performance.
2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing | 2012
Chang-Lung Tsai; Chun-Jung Chen; Deng-Jie Zhuang
Recently, according to the emerging development of smart mobile phones and tablet PC, mobile e-commerce has dramatically increased due to the reason that the function of smart mobile phone and tablet PC are combined together. M-banking is thus become more convenient, effective and timely through the new mobile communication systems. In order to raise the security of M-banking, some banks adopt the one-time password (OTP) to remedy the possible M-banking stealing risk. In the past, the OTP is sent to personal mobile phone. But, currently most of the smart mobile phone can performing M-banking easily. Thus, it gains higher risk of information security due to mobile phone hacking. In order to provide a reliable and secure M-banking process without decrease the convenience concurrently, in the paper one-time password (OTP) and personal biometric have been combined with personal identification and password for verification while M-banking. As the client side initiates a request for M-banking to the server side of a bank that provides M-banking service, the server side will generate an OTP with limited period for registration the M-banking and transmit to the client side. After receiving the OTP message, the client side must verify if the OTP message is validation and provided by the desired real server side. After then, the client side will register the on-line M-banking with the OTP in the specified short period. After receiving the service request, the server side will then request the client side to capture personal biometric such as fingerprint, iris, photo, and etc. immediately for further verification with the existed data stored in the server side to prevent the M-banking embezzling. If the personal biometric has been verified as an old one, the M-banking will immediately terminated by the server side. As the verification is finally done by the server side, the client side then can perform transaction via M-banking smoothly. The proposed scheme not only can provide secure M-banking, but also can clearly define the process. Therefore, if there are any M-banking arguments occurred due to Internet hacking or mobile phone stealing for M-banking, both of the server side and client side could protect their rights and interests.