Chinese
English
Research Fellow  |  Lu, Chun-Shien  
 
contact
vita
education
experience
interests
descriptions
activities
invited_talk
honors
publications
patents
supervised
 
 
 
 
 
Publications
 
Journal Articles
 
1. Yao-Tung Tsou, Chun-Shien Lu, and Sy-Yen Kuo, "MoteSec-Aware: A Practical Secure Mechanism for Wireless Sensor Networks," IEEE Trans. on Wireless Communications, volume 12, number 6, pages 2817-2829, June 2013. :::icon
2. Chia-Mu Yu, Yao-Tung Tsou, Chun-Shien Lu, and Sy-Yen Kuo, "Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks," IEEE Trans. on Information Forensics and Security, volume 8, number 5, pages 754-768, May 2013. :::icon
3. Chao-Yung Hsu, Chun-Shien Lu, and Soo-Chang Pei, "Image Feature Extraction in Encrypted Domain with Privacy-Preserving SIFT," IEEE Trans. on Image Processing, volume 21, number 11, pages 4593-4607, November 2012. :::icon
4. Chia-Mu Yu, Sung-Hsien Hsieh, Han-Wen Liang, Chun-Shien Lu, Wei-Ho Chung, Sy-Yen Kuo, and Soo-Chang Pei, "Compressed Sensing Detector Design for Space Shift Keying in MIMO Systems," IEEE Communications Letters, volume 16, number 10, pages 1556-1559, October 2012. :::icon
5. Li-Wei Kang, Chao-Yung Hsu, Hung-Wei Chen, Chun-Shien Lu, Chih-Yang Lin, and Soo-Chang Pei, "Feature-based Sparse Representation for Image Similarity Assessment," IEEE Transactions on Multimedia, volume 13, number 5, pages 1019-1030, October 2011. :::icon
6. Chao-Yung Hsu, Chun-Shien Lu, and Soo-Chang Pei, "Temporal Frequency of Flickering-Distortion Optimized Video Halftoning for Electronic Paper," IEEE Trans. on Image Processing, volume 20, number 9, pages 2502-2514, September 2011. :::icon
7. Chia-Mu Yu, Yao-Tung Tson, Chun-Shien Lu, and Sy-Yen Kuo, "Practical and Secure Multidimensional Queries in Tiered Sensor Networks," IEEE Trans. on Information Forensics and Security, volume 6, number 2, pages 241-255, June 2011. :::icon
8. Chia-Mu Yu, Yao-Tung Tsou, Chun-Shien Lu, and Sy-Yen Kuo, "Constrained Function based Message Authentication for Sensor Networks," IEEE Trans. on Information Forensics and Security, volume 6, number 2, pages 407-425, June 2011. :::icon
9. Chia-Mu Yu, Chun-Shien Lu, and Sy-Yen Kuo, "Non-Interactive Pairwise Key Establishment for Sensor Networks," IEEE Trans. on Information Forensics and Security, volume 5, number 3, pages 556-569, September 2010. :::icon
10. Yu-Chen Huang, Chun-Shien Lu, and Hsiao-Kuang Wu, "JitterPath: Probing Noise Resilient One-Way Delay Jitter-based Available Bandwidth Estimation," IEEE Transactions on Multimedia, volume 9, number 4, pages 798-812, June 2007. :::icon
11. Chun-Shien Lu and Chao-Yung Hsu, "Optimal Watermark Estimation and its Countermeasure, Anti-Disclosure Watermark for Multiple Watermark Embedding," IEEE Transactions on Circuits and Systems for Video Technology, volume 17, number 4, pages 454-467, April 2007. :::icon
12. Chun-Shien Lu, Shih-Wei Sun, Chao-Yong Hsu, and Pao-Chi Chang, "Media Hash-dependent Image Watermarking Resilient Against Both Geometric Attacks and Estimation Attacks Based on False Positive-Oriented Detection," IEEE Transactions on Multimedia, volume 8, number 4, pages 668-685, August 2006. :::icon
13. Chun-Shien Lu and Chao-Yong Hsu, "Geometric Distortion-Resilient Image Hashing Scheme and Its Applications on Copy Detection and Authentication," ACM Multimedia Systems Journal, special issue on Multimedia and Security, volume 11, number 2, pages 159-173, December 2005. :::icon
14. H. Y. Lin, H. Y. Mark Liao, Chun-Shien Lu, and J. C. Lin, "Fragile Watermarking for Authenticating 3-D Polygonal Meshes," IEEE Transactions on Multimedia, volume 7, number 6, pages 997-1006, December 2005. :::icon
15. Chun-Shien Lu and Hong-Yuan Mark Liao, "Structural Digital Signature for Image Authentication: An Incidental Distortion Resistant Scheme," IEEE Transactions on Multimedia, volume 5, number 2, pages 161-173, 2003. :::icon
16. Chun-Shien Lu, Hong-Yuan Mark Liao, and Martin Kutter, "Denoising and Copy Attacks Resilient Watermarking by Exploiting Knowledge at Detector," IEEE Trans. on Image Processing, volume 11, number 3, 2002. :::icon
17. Chun-Shien Lu and Hong-Yuan Mark Liao, "Multipurpose Watermarking for Image Authentication and Protection," IEEE Trans. on Image Processing, volume 10, number 10, pages 1579-1592, 2001. :::icon
18. Chun-Shien Lu, Shih-Kun Huang, Chwen-Jye Sze, and Hong-Yuan Mark Liao, "Cocktail Watermarking for Digital Image Protection," IEEE Transactions on Multimedia, volume 2, number 4, pages 209-224, 2000. :::icon
19. Wen-Liang Hwang, Chun-Shien Lu, and Pau-Choo Chung, "Shape From Texture: Estimation of Planar Surface Orientation Through the Ridge Surfaces of Continuous Wavelet Transform," IEEE Transactions on Image Processing, volume 7, number 5, pages 773-780, May 1998. :::icon
20. Chun-Shien Lu, Pau-Choo Chung and Chih-Fan Chen, "Unsupervised Texture Segmentation Via Wavelet Transform," Pattern Recognition, volume 5, pages 729-742, 1997. :::icon
 
 
Conference Papers
 
1. Chun-Shien Lu and Da-Chun Lin, "Optimal Sensing Matrix Design with Hardware Friendliness," Proc. Int. Conf. on Wireless Communications and Signal Processing (WCSP), October 2013.
2. Sung-Hsien Hsieh, Chun-Shien Lu, and Soo-Chang Pei, "Sparse Fast Fourier Transform by Downsampling," Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP), pages 5637-5641, May 2013. :::icon
3. Yao-Tung Tsou, Chun-Shien Lu, and Sy-Yen Kuo, "Privacy- and Integrity-Preserving Range Query in Wireless Sensor Networks," IEEE Globecom, pages 346-352, December 2012. :::icon
4. Chun-Shien Lu, Hung-Wei Chen, and Sung-Hsien Hsieh, "Compressive Image Sensing with Turbo Fast Recovery," Proc. Asilomar Conference on Signals, Systems, and Computers, pages 369-372, November 2012. :::icon
5. Huan-Cheng Hsu, Chun-Rong Huang, and Chun-Shien Lu, "Sparsity Cue in Image Copy Detection," ACM Multimeida Conference (ACM MM), pages 937-940, Nara, Japan, October 2012, (short paper) :::icon
6. Chun-Shien Lu and Chao-Yung Hsu, "Constraint-Optimized Keypoint Removal/Insertion Attack: Security Threat to Scale-Space Image Feature Extraction," ACM Multimedia Conference (ACM MM), pages 629-638, Nara, Japan, October 2012, (Full paper with acceptance rate 20%). :::icon
7. Chao-Yung Hsu, Chun-Shien Lu, and Soo-Chang Pei, "Content Authentication of Halftone Video via Flickering as Sparse Signal," Proc. IEEE Int. Conf. on Image Processing (ICIP), pages 265-268, September 2012. :::icon
8. Sung-Hsien Hsieh, Chun-Shien Lu, and Soo-Chang Pei, "Fast OMP: Reformulating OMP via Iteratively Refining L2-Norm Solutions," Proc. IEEE Statistical Signal Processing Workshop (SSP), pages 189-192, August 2012. :::icon
9. Chia-Mu Yu, Chun-Shien Lu, and Sy-Yen Kuo, "CSI: Compressed Sensing-Based Clone Identification in Sensor Networks," Proc. 8th IEEE International Workshop on Sensor Networks and Systems for Pervasive Computing (in corporation with IEEE Int. Conf .on Pervasive Computing and Communications (PerCom)), pages 296-301, March 2012. :::icon
10. Li-Wei Kang, Chin-Yang Lin, Hung-Wei Chen, Chia-Mu Yu, Chun-Shien Lu, Chao-Yung Hsu, and Soo-Chang Pei, "Secure Transcoding for Compressive Multimedia Sensing," IEEE Int. Conf. on Image Processing (ICIP), pages 933-936, Brussels, Belgium, September 2011. :::icon
11. Hung-Wei Chen, Chun-Shien Lu, and Soo-Chang Pei, "Fast Compressive Sensing Recovery with Transform-based Sampling," Proc. 4th Workshop on Signal Processing with Adaptive Sparse Structured Representations (SPARS), pages 110, June 2011. :::icon
12. Chao-Yung Hsu, Chun-Shien Lu, and Soo-Chang Pei, "Homomorphic Encryption-based Secure SIFT for Privacy-Preserving Feature Extraction," Proc. IS&T/SPIE Media Watermarking, Forensics, and Security, volume 7880, pages 788005-1-788005-17, 2011. :::icon
13. Hung-Wei Chen, Li-Wei Kang and Chun-Shien Lu, "Dictionary Learning-based Distributed Compressive Video Sensing," Proc. 28th Picture Coding Symposium (PCS), pages 210-213, December 2010. :::icon
14. Chao-Yung Hsu, Chun-Shien Lu, and Soo-Chang Pei, "Secure and Robust SIFT with Resistance to Chosen-Plaintext Attack," Proc. IEEE Int. Conf. on Image Processing (ICIP), Hong Kong, China, September 2010. :::icon
15. Hung-Wei Chen, Li-Wei Kang, and Chun-Shien Lu, "Dynamic Measurement Rate Allocation for Distributed Compressive Video Sensing," Proc. IEEE/SPIE Visual Communications and Image Processing (VCIP): special session on Random Projection and Compressive Sensing, July 2010, (invited paper) :::icon
16. Li-Wei Kang, Chao-Yung Hsu, Hung-Wei Chen, and Chun-Shien Lu, "Secure SIFT-based Sparse Representation for Image Copy Detection and Recognition," Proc. IEEE Int. Conf. on Multimedia and Expo (ICME), Singapore, July 2010, (accepted as oral paper)(ICME 2010 has an acceptance rate of 30% for regular submissions, of which the top 15% are accepted for lecture presentation and additional 15% are for poster presentation) :::icon
17. Chao-Yung Hsu, Chun-Shien Lu, and Soo-Chang Pei, "Secure Image Hashing via Minimum Distortion Estimation," Proc. IEEE Int. Conf. on Image Processing (ICIP), pages pp. 1281-1284, November 2009. :::icon
18. Li-Wei Kang and Chun-Shien Lu, "Compressive Sensing-based Image Hashing," Proc. IEEE Int. Conf. on Image Processing (ICIP), pages pp. 1285-1288, November 2009. :::icon
19. Chao-Yung Hsu, Chun-Shien Lu, and Soo-Chang Pei, "Secure and Robust SIFT," ACM Multimedia Conference, October 2009, (short paper in the Content track with acceptance rate: 58/204=28.4%) :::icon
20. Chia-Mu Yu, Chun-Shien Lu, and Sy-Yen Kuo, "Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks," IEEE 70th Vehicular Technology Conference: VTC2009-Fall, September 2009. :::icon
21. Chia-Mu Yu, Chun-Shien Lu, and Sy-Yen Kuo, "A Simple Non-Interactive Pairwise Key Establishment Scheme in Sensor Networks," The 6th IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), June 2009, (acceptance rate 81/437=18.5%) :::icon
22. Chia-Mu Yu, Chun-Shien Lu, and Sy-Yen Kuo, "A DoS-Resilient En-route Filtering Scheme for Sensor Networks," The 10th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pages pp. 343-344, May 2009, (poster session) :::icon
23. Li-Wei Kang and Chun-Shien Lu, "Power-Rate-Distortion Model for Low-Complexity Video Coding," 27th Picture Coding Symposium (PCS), May 2009. :::icon
24. Chia-Mu Yu, Chun-Shien Lu, and Sy-Yen Kuo, "A Constrained Function Based Message Authentication Scheme for Sensor Networks," Proc. IEEE Wireless Communications and Networking Conf. (WCNC), April 2009. :::icon
25. Li-Wei Kang and Chun-Shien Lu, "Distributed Compressive Video Sensing," Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP), pages pp. 1169-1172, 2009. :::icon
26. Chao-Yong Hsu, Chun-Shien Lu, and Soo-Chang Pei, "Compression of Halftone Video for Electronic Paper," Proc. IEEE Int. Conf. on Image Processing (ICIP), pages pp. 1600-1603, October 2008. :::icon
27. Jan-Ru Chen and Chun-Shien Lu, "Unequal Authenticity Protection of Video Multicasting," Proc. IEEE Int. Conf. on Multimedia and Expo (ICME), June 2008.
28. Chao-Yung Hsu, Chun-Shien Lu, and Soo-Chang Pei, "Scalable Multi-Layer Halftone Video Display for Electronic Paper," IEEE Int. Conf. on Multimedia and Expo (ICME), pages pp. 1445-1448, June 2008. :::icon
29. Chia-Mu Yu, Chun-Shien Lu, and Sy-Yen Kuo, "Mobile Sensor Network Resilient Against Node Replication Attack," Proc. IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), pages pp. 597-599, June 2008, (poster paper) :::icon
30. Chia-Mu Yu, Ting-Yun Chi, Chun-Shien Lu, and Sy-Yen Kuo, "A Constrained Random Perturbation Vector-Based Pairwise Key Establishment Scheme for Wireless Sensor Networks," ACM MobiHoc (poster session), pages pp. 449-450, May 2008. :::icon
31. Li-Wei Kang and Chun-Shien Lu, "Low-Complexity Power-Scalable Multi-View Distributed Video Encoder," Proc. Picture Coding Symposium (PCS), November 2007. :::icon
32. Shih-Wei Sun, Chun-Shien Lu, and Pao-Chi Chang, "Joint Multimedia Fingerprinting and Encryption: Security Issues and Some Solutions," Proc. IEEE Int. Conf. on Multimedia and Expo (ICME), pages 1531-1534, Beijing, China, 2007. :::icon
33. Chao-Yung Hsu, Chun-Shien Lu, and Soo-Chang Pei, "Video Halftoning Preserving Temporal Consistency," Proc. IEEE Int. Conf. on Multimedia and Expo (ICME), pages 1938-1941, Beijing, China, 2007. :::icon
34. Li-Wei Kang and Chun-Shien Lu, "Multi-View Distributed Video Coding with Low-Complexity Inter-Sensor Communication Over Wireless Video Sensor Networks," IEEE Int. Conf. on Image Processing (ICIP), pages pp. III-13~III-16, 2007, Special Sessions - Distributed Source Coding II: Distributed Image and Video Coding and Their Applications (invited paper) :::icon
35. Li-Wei Kang and Chun-Shien Lu, "Low-Complexity Wyner-Ziv Video Coding Based on Robust Media Hashing," IEEE Int. Workshop on Multimedia Signal Processing (MMSP), 2006.
36. Chao-Yong Hsu and Chun-Shien Lu, "Informed Authentication Watermarking via Stego Data Reconstruction," IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP), 2006. :::icon
37. Yu-Chen Huang, Chun-Shien Lu, and Hsiao-Kuang Wu, "Available Bandwidth Estimation via One-Way Delay Jitter and Queuing Delay Propagation Model," Proc. IEEE Wireless Communications and Networking Conference (WCNC), 2006. :::icon
38. Li-Wei Kang and Chun-Shien Lu, "Wyner-Ziv Video Coding with Coding Mode Hiding-based Motion Compensation," Proc. IEEE Int. Conf. on Image Processing (ICIP), 2006.
39. Chao-Yong Hsu, Chun-Shien Lu, and Soo-Chang Pei, "Joint Screening Halftoning and Visual Cryptography for Image Protection," Int. Workshop on Digital Watermarking (IWDW), Lecture Notes in Computer Science, 2006, (invited paper) :::icon
40. Chun-Shien Lu, Shih-Wei Sun, and Pao-Chi Chang, "Robust Mesh-based Content-dependent Image Watermarking with Resistance to Both Geometric Attack and Watermark-Estimation Attack," Proc. IS&T/SPIE International Symposium on Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents VII (EI120), San Jose, California, 2005. :::icon
41. Chao-Yong Hsu and Chun-Shien Lu, "Near-Perfect Cover Image Recovery Anti-Multiple Watermark Embedding Approaches," Proc. IEEE Int. Symposium on Circuits and Systems (ISCAS): special session on Information Assurance and Data Hiding, Kobe, Japan, 2005, (invited paper) :::icon
42. Chao-Yong Hsu and Chun-Shien Lu, "Joint Image Halftoning and Watermarking in High-Resolution Digital Form," Proc. IEEE Int. Conf. on Multimedia and Expo (ICME), the Netherlands, 2005. :::icon
43. Chun-Shien Lu and Chia-Mu Yu, "On the Security of Mesh-based Media Hash-dependent Watermarking Against Protocol Attacks," Proc. IEEE Int. Conf. on Multimedia and Expo (ICME), the Netherlands, 2005. :::icon
44. Chia-Mu Yu and Chun-Shien Lu, "Robust Non-Interactive Zero-Knowledge Watermarking Scheme Against Cheating Prover," Proc. ACM Multimedia and Security Workshop, NY, USA, 2005. :::icon
45. Chun-Shien Lu, Chao-Yong Hsu, Shih-Wei Sun, and Pao-Chi Chang, "Robust Mesh-based Hashing for Copy Detection and Tracing of Images," Proc. IEEE Int. Conf. on Multimedia and Expo (ICME): special session on Media Identification, Taipei, Taiwan, January 2004. :::icon
46. Yu-Chen Huang, Chun-Shien Lu, and Hsiao-Kuang Wu, "Reliable Available Bandwidth Estimation Based on Distinguishing Queuing Regions and Resolving False Estimations," IEEE Global Communications Conference (Globecom), Dallas, Texas, USA, January 2004. :::icon
47. Jan-Ru Chen, Chun-Shien Lu, and Kuo-Chin Fan, "A Significant Motion Vector Protection-based Error-Resilient Scheme in H.264," Proc. IEEE Int. Workshop on Multimedia Signal Processing (MMSP), January 2004. :::icon
48. Chao-Yong Hsu and Chun-Shien Lu, "A Geometric-Resilient Image Hashing System and Its Application Scalability," Proc. ACM Multimedia and Security Workshop, pages 81-92, Magdeburg, Germany, January 2004. :::icon
49. Chun-Shien Lu and Chao-Yong Hsu, "Content-Dependent Multipurpose Watermarking Resistant Against Generalized Copy Attack," Proc. IEEE Int. Conf. on Multimedia and Expo (ICME), Taipei, Taiwan, January 2004. :::icon
50. Chun-Shien Lu, "On the Security of Structural Information Extraction/Embedding for Images," Proc. IEEE Int. Symposium on Circuits and Systems (ISCAS), volume II, Vancouver, Canada, January 2004. :::icon
51. Chun-Shien Lu, Jan-Ru Chen, and Kuo-Chih Fan, "Resistance of Content-dependent Video Watermarking to Watermark-Estimation Attacks," Proc. IEEE Int. Conf. on Communications (ICC), pages 1386-1390, Paris, France, 2004. :::icon
52. Chun-Shien Lu and Chao-Yong Hsu, "Content-Dependent Anti-Disclosure Image Watermark," Proc. 2nd Int. Workshop on Digital Watermarking (IWDW), Seoul, Korea, 2003. :::icon
53. Chun-Shien Lu, "Dual Security-based Image Steganography," Proc. 4th IEEE Int. Conf. on Multimedia and Expo (ICME), volume II, pages 489-490, Baltimore, USA, 2003.
54. Chun-Shien Lu, "Audio Fingerprinting based on Analyzing Time-Frequency Localization of Signals," 5th IEEE Int. Workshop on Multimedia Signal Processing (MMSP): special session on Media Recognition, US Virgin Islands, USA, December 2002.
55. Chun-Shien Lu, "Wireless Multimedia Error Resilience via A Data Hiding Technique," Proc. 5th IEEE Int. Workshop on Multimedia Signal Processing (MMSP), US Virgin Islands, USA, December 2002.
56. Chun-Shien Lu, Jan-Rue Chen, Hong-Yuan Mark Liao, and Kuo-Chih Fan,, "Real-Time MPEG2 Video Watermarking in the VLC Domain," Proc. 16th Int. Conf. on Pattern Recognition (ICPR), volume 2, Quebec, Canada, August 2002.
57. Chun-Shien Lu, "Block DCT-based Robust Watermarking Using Side Information Extracted by Mean Filtering," Proc. 16th Int. Conf. on Pattern Recognition (ICPR), volume 2, Quebec, Canada, August 2002.
58. Chun-Shien Lu, "Characterization of Abrupt/Gradual Video Shot Transitions as Unsmoothed/Smoothed Singularity," Proc. 5th IEEE Int. Workshop on Multimedia Signal Processing (MMSP), US Virgin Islands, USA, January 2002.
59. Gwo-Jung Yu, Chun-Shien Lu and Hong-Yuan Mark Liao, "Message-based Cocktail Watermarking System," Proc. 8th IEEE Int. Conf. on Image Processing (ICIP), volume 3, pages 971-974, Thessaloniki, Greece, October 2001.
60. Chun-Shien Lu, Hong-Yuan Mark Liao, and Martin Kutter, "A New Watermarking Scheme Resistant to Denoising and Copy Attacks," Proc. 4th IEEE Workshop on Multimedia Signal Processing (MMSP), pages 505-510, Cannes, France, October 2001.
61. Chun-Shien Lu and Hong-Yuan Mark Liao, "Video Object-based Watermarking: A Rotation and Flipping Resilient Scheme," Proc. 8th IEEE Int. Conf. on Image Processing (ICIP), volume 2, pages 483-486, Thessaloniki, Greece, October 2001.
62. Chun-Shien Lu and Hong-Yuan Mark Liao, "An Oblivious and Robust Watermarking Scheme Using Communications-with-Side-Information Mechanism," Proc. 2nd IEEE Int. Conf. Information Technology: Coding and Computing (ITCC): Special Session on Multimedia Security and Watermarking Applications, pages 103-107, Las Vegas, Nevada, USA, April 2001.
63. Chun-Shien Lu and Hong-Yuan Mark Liao, "Structural Digital Signature for Image Authentication: An Incidental Distortion Resistant Scheme," Proc. ACM Multimedia and Security Workshop at the 8th ACM Int. Conf. on Multimedia, 115-118, Los Angeles, California, USA, November 2000.
64. Chun-Shien Lu, Hong-Yuan Mark Liao, and Liang-Hua Chen, "Multipurpose Audio Watermarking," Proc. 15th Int. Conf. on Pattern Recognition (ICPR), volume 3, pages 282-285, Barcelona, Spain, September 2000.
65. Chun-Shien Lu and Hong-Yuan Mark Liao, "Oblivious Cocktail Watermarking by Sparse Code Shrinkage: A Regional- and Global-based Approach," Proc. 7th IEEE Int. Conf. on Image Processing (ICIP), volume 3, pages 13-16, Vancouver, BC, Canada, September 2000.
66. Gwo-Jong Yu, Chun-Shien Lu, Hong-Yuan Mark Liao, and Jang-Ping Sheu, "Mean Quantization Blind Watermarking for Image Authentication," Proc. 7th IEEE Int. Conf. on Image Processing (ICIP), volume 3, pages 706-709, Vancouver, BC, Canada, September 2000.
67. Chun-Shien Lu, Hong-Yuan Mark Liao, and Chwen-Jye Sze, "Combined Watermarking for Image Authentication and Protection," Proc. 1st IEEE Int. Conf. on Multimedia and Expo (ICME), pages 1415-1418, New York City, NY, USA, July 2000.
68. Chun-Shien Lu, Hong-Yuan Mark Liao, Shih-Kun Huang, and Chwen-Jye Sze, "Cocktail Watermarking on Images," Proc. 3rd International Workshop on Information Hiding (IHW), Lecture Notes in Computer Science, 1768, pages 333-347, Dresden, Germany, September 1999.
69. Chun-Shien Lu, Wen L. Hwang, and Pau-Choo Chung, "Segmentation of 3D Textured Image Using Continuous Wavelet Transform," Proc. 4th IEEE Int. Conf. on Image Processing (ICIP), volume 1, pages 235-238, USA, 1997.
70. Chun-Shien Lu, Wen L. Hwang, Hong-Yuan Mark Liao, and Pau-Choo Chung, "Shape from texture based on the ridge of continuous wavelet transform," Proc. 3rd IEEE Int. Conf. on Image processing (ICIP), volume 1, pages 295-298, Swiss, 1996.
 
 
 
Book & Book Chapters
 
1. Chun-Shien Lu, "Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property," Chun-Shien Lu, editor, Idea Group Publishing, January 2004.
 
 
Others
 
1. Sung-Hsien Hsieh and Chun-Shien Lu, "Fast Compressed Sensing Recovery Via Iteratively Refining L2-Norm Solution,", 24th CVGIP conference, Taiwan, R.O.C. August 2011, (CVGIP 佳作論文獎)
2. Chun-Shien Lu, Hung-Wei Chen, and Soo-Chang Pei, "Compressive Image Sensing: Turbo Fast Recovery With Lower-Frequency Measurement Sampling,", 24th CVGIP conference, Taiwan, R.O.C. August 2011, (CVGIP 佳作論文獎)
3. Chao-Yung Hsu, Chun-Shien Lu, and Soo-Chang Pei, "Security Threat To Media Security Applications Based on Scale-Space Feature Extraction,", 24th CVGIP conference, Taiwan, R.O.C. August 2011, (CVGIP 優良論文獎)
4. Yao-Tung Tsou, Chun-Shien Lu, and Sy-Yen Kuo, "MoteSec-Aware: An Adaptive Secure Mechanism for Wireless Ad-Hoc Sensor Networks,", 數位生活科技研討會 July 2011, (數位生活科技研討會 最佳論文獎)
5. Chih-Yang Lin and Chun-Shien Lu, "A New Joint Fingerprinting and Decryption Scheme Resistant to Content leakage and Tampering Attacks,", 22nd CVGIP conference, Taiwan, ROC August 2009, (優良論文獎)
6. Li-Wei Kang and Chun-Shien Lu, "Low-Complexity Power-Scalable Multi-View Distributed Video Coding for Wireless Video Sensor Networks,", 20th CVGIP conference, Taiwan, ROC August 2007, (佳作論文獎)
7. Chia-Mu Yu, Cheng-Chung Li, Chun-Shien Lu, Der-Tsai Lee, and Sy-Yen Kuo, "Attack Probability Based Deterministic Key Predistribution Mechanism for Non-Uniform Sensor Deployment,", The 3rd Workshop on Wireless Ad Hoc and Sensor Networks July 2007, (最佳論文獎)
 
 
bg