1. Related Papers of “Image Authentication” in International Journal of Network Security [IJNS-IMAUTH].
2.Te-Yu Chen, Min-Shiang Hwang, and Jinn-Ke Jan, “A Secure Image Authentication Scheme for Tamper Detection and Recovery”, Imaging Science Journal, Volume 60, Number 4, pp. 219-233, August 2012. (SCIE) P299.pdf
3.Chia-Chun Wu, Shang-Juh Kao, and Min-Shiang Hwang, “A High Quality Image Sharing with Steganography and Adaptive Authentication Scheme”, Journal of Systems and Software, vol. 84, no. 12, pp. 2196-2207. (SCIE) P302.pdf
4. Te-Yu Chen, Min-Shiang Hwang and Jinn-Ke Jan, “Adaptive Authentication Schemes for 3D Mesh Models”, International Journal of Innovative Computing, Information and Control, Vol. 5, No. 12, pp. 4561-4572, Dec. 2009. (SCI) P289.ps P289.pdf
5. Chia-Chun Wu, Min-Shiang Hwang, and Shang-Juh
Kao, "A New Approach to the Secret Image Sharing with Steganography and
Authentication", Imaging Science Journal, Vol. 57, Num. 3, pp. 140-151,
June 2009. (SCI) P263.pdf
6. Yuan-Liang
Tang, Min-Shiang Hwang, Ching-Rong Yang, "An Image Authentication Scheme Based
On Digital Signatures", Pakistan Journal of Applied Sciences, vol. 2, no.
5, pp. 553-557, May 2002. P060.ps P060.pdf
7. Chin-Chen Chang, Kuo-Feng Hwang,
Min-Shiang Hwang, “A Robust
Authentication Scheme for Protecting Copyrights of Images and Graphics”, IEE
Proceedings Vision, Image and Signal Processing, vol. 149, no. 1, pp. 43-50,
Feb. 2002. [SCI] P059.ps P059.pdf