Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Chia-Chun Wu is active.

Publication


Featured researches published by Chia-Chun Wu.


Journal of Systems and Software | 2011

A high quality image sharing with steganography and adaptive authentication scheme

Chia-Chun Wu; Shang-Juh Kao; Min-Shiang Hwang

With the rapid growth of numerous multimedia applications and communications through Internet, secret image sharing has been becoming a key technology for digital images in secured storage and confidential transmission. However, the stego-images are obtained by directly replacing the least-significant-bit planes (LSB) of cover-images with secret data and authentication code in most schemes, which will result in the distortion of the stego-images. In this paper, we proposed a novel secret image sharing scheme by applying optimal pixel adjustment process to enhance the image quality under different payload capacity and various authentication bits conditions. The experimental results showed that the proposed scheme has improved the image quality of stego images by 4.71%, 9.29%, and 11.10%, as compared with the schemes recently proposed by Yang et al., Chang et al., and Lin and Tsai. We also provide several experiments to demonstrate the efficacy of authentication capability of the proposed scheme. In other words, our scheme maintains the secret image sharing and authentication ability while enhances the image quality.


intelligent information hiding and multimedia signal processing | 2008

Enhance the Image Sharing with Steganography and Authentication

Chia-Chun Wu; Shang-Juh Kao; Wen-Chung Kuo; Min-Shiang Hwang

Yang et al. (2007) showed that the Lin-Tsai scheme has three weaknesses and further proposed improvements in 2007. They are not only improve authentication ability and image quality of stego-image, but also introduce a lossless image sharing scheme for secret image. Unfortunately, the embedding algorithm in their scheme is obviously not optimal. To enhance Yang et al.psilas scheme, a novel secret image sharing scheme based on the simple LSB substitution and an optimal pixel adjustment process will be proposed in this paper. The experimental results show that the proposed scheme has significantly better image quality than others. In other words, our scheme not only maintains secret image sharing and authentication ability but also enhances the image quality.


intelligent information hiding and multimedia signal processing | 2009

Reversible Secret Image Sharing Based on Shamir's Scheme

Chia-Chun Wu; Shang-Juh Kao; Wen-Chung Kuo; Min-Shiang Hwang

A novel secret image sharing scheme was proposed by Lin and Tsai in 2004. They claimed that their scheme can achieve the goal of secret image sharing with the additional capabilities of steganography and authentication. After that, Yang et al. indicated that the Lin-Tsai scheme has three weaknesses, and further proposed an improved scheme in 2007. This scheme not only achieved authentication ability and improved stego-image quality but also introduced a lossless image sharing scheme for secret images. However, none of these stego-images can be recovered in their original state in these schemes. In this paper, we propose a new scheme which not only maintains all advantages in Lin-Tsai’s and Yang et al.’s schemes, but also overcomes this problem. According to the experimental simulations and discussions, we can prove that the proposed scheme has significantly better performance than the others.


International Journal of Network Security | 2005

A Scheme for Key Management on Alternate Temporal Key Hash

Song-Kong Chong; Hsien-Chu Wu; Chia-Chun Wu

Wired equivalent privacy encryption of IEEE 802.11 standard is based on the RC4 stream cipher, but the weakness in its Initialization Vector (IV) derivation causes the Key Scheduling Algorithm (KSA) of RC4 to leak out the information about the secret key. It is shared among the particular participants in the Wireless LAN (WLAN). Housley et al. proposed an Alternate Temporal Key Hash (ATKH) to solve the weakness of the KSA; they defeated the particular IV may make the KSA to leak out the information about the shared secret key. However, the ATKH did not solve the key management in WLAN. Since a robust key management is a critical factor to prevent the eavesdropping from attackers. Therefore, in this paper, we shall propose a scheme to make key management feasible in their solution without changing the framework of the ATKH and the existing 802.11 standards.


international conference on advanced materials for science and engineering | 2016

A novel electronic lock using ultrasound Morse code based on FIR filter

Chin-Tan Lee; Chia-Chun Wu; Bo-Rui Su; Tung-Chun Shen

This study was based on the Internet of Things (IoT) architecture to propose an ultrasonic Morse code electronic lock for a home access control and safety system. Audio components of a smartphone were employed for ultrasonic Morse coding. Once the password of the receiver is confirmed to be correct through a microphone and micro-controller decoding, the details about the unlocking personnel and unlocking actions are uploaded to cloud server via Wi-Fi. In addition, because noise frequency of an environment influences ultrasonic Morse code determination, this study proposed the use of Moving Average of Median Filter to process microphone sound signals so that the unlocking device is free from environmental noise influences. This study consists of four sections: 1. Ultrasonic Morse code generator; 2. Ultrasonic Morse code decoder; 3. Digital filter; and 4. MediaTek Cloud Sandbox integrated cloud monitoring system. The experimental results indicated that the proposed electronic lock can remain fully functional in a noisy environment, including coding, transmitting, receiving, filtering, decoding, uploading, and remote monitoring processes. Moreover, the operating interface is simple and user friendly, making it applicable to users of varying ages.


Archive | 2019

An Improvement of Tseng–Wu Group Key Exchange Protocol

Min-Shiang Hwang; Yung-Chen Chou; Chia-Chun Wu; Cheng-Ying Yang

Based on the group Diffie–Hellman technique, a contributory group key exchange protocol has been proposed by Biswas. Although Biswas claimed the protocol belongs to a contributory group key exchange, Tseng and Wu did not agree with. Then, they proposed an improved group key exchange protocol with a character of verifiably contributory and claimed the proposed protocol could not provide a secure scheme against passive attacks. However, Ling et al. pointed out that it is vulnerable to a man-in-the-middle attack with Tseng–Wu’s protocol. The attackers could intercept and modify the messages among the group members. In this article, we will propose an improvement of Tseng–Wu group key exchange protocol. Our protocol could against remedy the man-in-the-middle attack.


international conference on applied system innovation | 2017

An implementation of a particle detective mobile device to solve the problem of collecting PM2.5 data without Internet-connection

Yung-Chung Tsao; Tung-Chun Shen; Chia-Chun Wu

The particle pollution around China & Taiwan has become an increasing fatal problem at recent years. Facing such critical issues, the governance of both must give priority to dealing with their people health crisis as soon as possible. In spite that the more and more particle detective devices are developed and delivered into market to people recently. But the fundamental solutions should be focused on those industrial pollutions all over the country. That is a big problem with extensive and unlimited territory concerned with collecting sensor data and sending data to administrative center.


international conference on applied system innovation | 2017

An implementation of a distributed sound sensing system to visualize the noise pollution

Yung-Chung Tsao; Bo-Rui Su; Chin-Tan Lee; Chia-Chun Wu

The noise pollution is still a troubling problem for us, especial in hospital, library, baby-care center, etc. Although many decibel-meters are applied to those environment, which indeed must be kept quit, but the decibel-meters can only detect the noise pollution limited to nearest area around the device. We will face the incorrect measuring data from the decibel-meters in bigger space like library. According such problems mentioned above, maybe we use more decibel-meters around different areas to a better solution.


Archive | 2014

The Computer-Aided System for Promoting Judgments of Umpires

Chin-Fa Chen; Chia-Chun Wu; Duc-Tai Dang; Iuon-Chang Lin

Basketball is one of the most popular sports, and it’s also popular in Taiwan because of fierce competition among SBL, UBL and HBL. Umpires are the pivots who can let games to proceed smoothly. Basketball games are played in quick progress and changing all the time. As an umpire, being calm and just in such a tense situation can be difficult. Therefore, how to train an experienced umpire is especially important. But till now the check-up system without aid of computer is not suitable for training umpires. For this reason, using the new technique to help training and assessing is necessary. We want to propose a computer-aided system based on video database for promoting judgments of umpire in order not to influence the game results by erroneous judgments and misses of judgment. Training by simulation instead just by statement of situation can let umpires be more familiar to real situations and do better judgments in real games. Also, we will do reliability and validity tests to prove our scheme.


international conference on innovative computing, information and control | 2008

A Robust-Fragile Watermarking Scheme for Image Authentication

Chia-Chun Wu; Shang-Juh Kao; Wen-Chung Kuo; Min-Shiang Hwang

Collaboration


Dive into the Chia-Chun Wu's collaboration.

Top Co-Authors

Avatar

Shang-Juh Kao

National Chung Hsing University

View shared research outputs
Top Co-Authors

Avatar

Chin-Tan Lee

National Quemoy University

View shared research outputs
Top Co-Authors

Avatar

Bo-Rui Su

National Quemoy University

View shared research outputs
Top Co-Authors

Avatar

Wen-Chung Kuo

National Formosa University

View shared research outputs
Top Co-Authors

Avatar

Chin-Fa Chen

National Chung Hsing University

View shared research outputs
Top Co-Authors

Avatar

Tung-Chun Shen

National Quemoy University

View shared research outputs
Top Co-Authors

Avatar

Yung-Chung Tsao

National Quemoy University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Duc-Tai Dang

National Chung Hsing University

View shared research outputs
Top Co-Authors

Avatar

Iuon-Chang Lin

National Chung Hsing University

View shared research outputs
Researchain Logo
Decentralizing Knowledge