Chin-Feng Lee

Professor

Over the past five years, Professor Lee's NSTC projects have focused on information security for digital images. Her research has enhanced the embedding capacity, image quality, and applicability of reversible information hiding techniques. She further integrated Variational Autoencoders (VAE) and Generative Adversarial Networks (GAN) to develop authentication frameworks capable of tampering detection, localization, and recovery. By introducing deep learning and self-referential imaging, she also developed a semi-blind watermarking technique that significantly strengthens the robustness and security of copyright protection. These projects are highly continuous and complementary, establishing a comprehensive image security framework encompassing data hiding, anomaly verification, and intelligent protection, while advancing AI applications in cybersecurity and digital content protection. In teaching, Professor Lee emphasizes a balance between theory and practice, and is committed to cultivating students’ skills in information application and data analysis. Through peer teaching observations, student feedback, and collaboration with industry, she continually refines course content and instructional strategies, actively promoting digital transformation and educational innovation.


Education:

  • National Chung Cheng University
  • National Taiwan University

Research Interest:

  • Database Information System Design
  • Electronic Imaging Security Technology
  • Computer Cryptography
  • Information Hiding and Watermarking
  • Data Mining and Machine Learning
  1. Lee, Chin-Feng, Li, Tong-Ming, Lin, Iuon-Chang*, Anis Ur Rehman*, "A Novel Self-Recovery Fragile Watermarking Scheme Based on Convolutional Autoencoder," Electronics, https://doi.org/10.3390/electronics14183595, 2025-09. (SCIE,EI,Scopus)
  2. Chin-Ling Chen, Kuang-Wei Zeng, Hsing-Chung Chen∗, Yong-Yuan Deng∗, Chin-Feng Lee, Der-Chen Huang and Ling-Chun Liu*, "Secure and Efficient Graduate Employment: A Consortium Blockchain Framework with InterPlanetary File System for Privacy-Preserving Resume Management and Efficient Talent-Employer Matching," PLoS One, doi: 10.1371/journal.pone.0315277, 2025-08. (SCIE,Scopus)
  3. Lin, Jiang-Yi, Chang, Ching-Chun, Chang, Chin-Chen, and Lee, Chin-Feng*, "Highly Secure and Adaptive Multisecret Sharing for Reversible Data Hiding in Encrypted Images," IET Information Security, https://doi.org/10.1049/ise2/6695380., 2025-08. (SCIE,Scopus)
  4. Lee, Chin-Feng*, Chen, Yu-Chuan, Shen, Jau-Ji, and Rehman, Anis Ur, "Lightweight Leather Surface Defect Inspection Model Design for Fast Classification and Segmentation," Symmetry, https://doi.org/10.3390/sym17030358, 2025-02. (SCIE,Scopus)
  5. Lee, Chin-Feng, Chao, Zih-Cyuan, Shen, Jau-Ji, and Rehman, Anis Ur, "A Robust Semi-Blind Watermarking Technology for Resisting JPEG Compression Based on Deep Convolutional Generative Adversarial Networks," Symmetry, https://doi.org/10.3390/sym17010098, 2025-01. (SCIE,Scopus)
  6. Ur Rehman, Anis and Lee, Chin-Feng*, "CNN-Based Intelligent Disease Detection and Identification Technique through Chest X-rays," Journal of Information Hiding and Multimedia Signal Processing, Vol 15, No 4, pp. 319-333, 2024-12. (EI)
  7. Lee, Chin-Feng and Chan, Kuo-Chung, "A Novel Dual Image Reversible Data Hiding Scheme Based on Vector Coordinate With Triangular Order Coding," IEEE Access, doi: 10.1109/ACCESS.2024.3421545, 2024-07. (SCIE,Scopus)
  8. Chin-Feng Lee, Chin-Ting Yeh, Jau-Ji Shen, and Taeshik Shon, "Image Authentication and Restoration Using Block-Wise Variational Automatic Encoding and Generative Adversarial Networks," Electronics, Vol.12, Issue 16,, 2023-10. (SCIE,SCOPUS)
  9. Yung-She Lin and Chin-Feng Lee, "Ransomware Detection and Prevention through Strategically Hidden Decoy File," International Journal of Network Security, Vol. 25, No. 2, pp. 212-220,, 2023-01. (EI)
  10. Chin-Feng Lee, Jau-Ji Shen, and Chin-Yung Wu, "Overlapping Difference Expansion Reversible Data Hiding," International Journal of Network Security, Vol. 25, No. 2, pp. 201-211, 2023-01. (EI)
  11. Chin-Feng Lee, *Kuo-Chung Chan, "Improve Image Quality of Dual-image Reversible Data Hiding Based on Translocation and Switching Strategy," Computer Systems Science and Engineering, Vol.44, No.2, pp. 1551-1566, 2022-06. (SCIE,SCOPUS)
  12. Chin-Feng Lee*, Chi-Yao Weng, Chih-Hung Wang, Goutam Chakraborty, Kouichi Sakurai, and Kuo-Yu Tsai, "Research on Multimedia Application on Information Hiding Forensics and Cybersecurity," International Journal of Network Security, Vol. 23, No. 6, pp. 1093-1107, 2021-11. (EI)
  13. Chin-Feng Lee*, Hua-Zhe Wu, "High-capacity and high-quality reversible data hiding method using recurrent round-trip embedding strategy in quotient image," Applied Sciences-Basel (Appl. Sci.), vol. 11, Issue 21, pp.10157, 2021-10. (SCIE,SCOPUS)
  14. Chin-Feng Lee, Chin-Chen Chang*, Zhi-Hui Wang & Ya-Feng Di, "A High Robust and Blind Image Watermarking Using Arnold Transform Mapping in the DCT Domain of YCbCr Color Space," Journal of Network Intelligence, vol. 6, no. 3, pp.624-636, 2021-08. (EI,Scopus)
  15. Hsing-Yu Hou*, Yu-Lung Lo, Chin-Feng Lee*, "Predicting Network Behavior Model of e-learning Partner Program in PLS-SEM," Applied Sciences (Appl. Sci.), 10(13), 4656, 2021-07. (SCIE, SCOPUS)
  16. Chin-Feng Lee, Jau-Ji Shen*, Somya Agrawal*, and Yen-Hsi Li, "High-Capacity Embedding Method Based on Double-Layer Octagon-Shaped Shell Matrix," Symmetry, 13(4), 583, 2021-04. (SCIE,EI,SCOPUS)
  17. Hsing-Yu Hou*, Somya Agrawal, and Chin-Feng Lee, "Computational Thinking Training with Technology for Non-Information Undergraduate," Thinking Skills and Creativity, 38:100720., 2020-09. (SSCI, SCOPUS)
  18. Jau-Ji Shen, Chin-Feng Lee*, Fang-Wei Hsu, and Somya Agrawal, "A Self-Embedding Fragile Image Authentication Based on Singular Value Decomposition," Multimedia Tools and Applications, 79,35–36, pp. 25969–25988, 2020-08. (SCIE, EI, SCOPUS)
  19. Qiu, Guohua, Lee, Chin-Feng, Chang, Chin-Chen*, "Greedy Algorithm for Image Quality Optimization Based on Turtle-Shell Steganography," International Journal of Computational Science and Engineering, Vol. 23, No. 1, pp. 50-62, 2020-08. (EI Compendex, Scopus)
  20. Chin-Feng Lee, Jau-Ji Shen*, Yi-Jhen Wu, & Somya Agrawal*., "PVO-Based Reversible Data Hiding Exploiting Two-Layer Embedding for Enhancing Image Fidelity," Symmetry, 12(7), pp.1164, 2020-07. (SCIE)
  21. Chin-Feng Lee*, Chin-Chen Chang, Guan-Long Li, "A Data Hiding Scheme Based on Turtle-shell for AMBTC Compressed Images," KSII Transactions on Internet and Information Systems, vol. 14, no. 6, pp. 2554-2575, 2020-06. (SCIE, SCOPUS)
  22. Chin-Feng Lee, Jau-Ji Shen, Somya Agrawal*, Yu-Ju Tseng, and Yu-Chi Kao, "A generalized pixel value ordering data hiding with adaptive embedding capability," Journal of Supercomputing, 76, 2683–2714, 2020-04. (SCI, SCIE, EI, Scopus)
  23. Lee, Chin-Feng and Ying-Xiang Wang, "Secure Image Hiding Scheme Based on Magic Signet," Journal of Electronic Science and Technology (JEST), Vol.18, No. 1, pp. 93- 101, 2020-03. (Ei, INSPEC , Scopus)
  24. Lee, Chin-Feng, Jau-Ji Shen, Somya Agrawal*, Ying-Xiang Wang and Yen-Hsi Lee, "Data Hiding Method Based on 3D Magic Cube," IEEE ACCESS, Vol.8, pp. 39445- 39453, 2020-02. (SCI, EI, Scopus)
  25. Qiu, Guohua, Lee, Chin-Feng, Chang, Chin-Chen*, "Turtle-shell Data Embedding Method with High Image Fidelity," International Journal of Embedded Systems, Vol 14, pp 149-159, 2020-02. (EI Compendex, Scopus)
  26. Chin-Ling Chen, Yue-Xun Chen, Yong-Yuan Deng, Chin-Feng Lee, Chi-Hua Chen*, "An Efficient and Secure Key Agreement Protocol for Sharing Emergency Events in VANET Systems," IEEE Access, Vol. 7, No. 1, pp. 148472-148484, 2019-10. (SCI)
  27. Jian-Jun Li, Chin-Feng Lee, Chin-Chen Chang*, Jiang-Yi Lin, and Yun-He Wu, "Reversible Data Hiding Scheme Based on Quad-tree and Pixel Value Ordering," IEEE ACCESS, Vol. 7 , pp. 142947- 142962, 2019-10. (SCI, EI, Scopus)
  28. Chin-Ling Chen, Yue-Xun Chen, Chin-Feng Lee, Yong-Yuan Deng, CHI-HUA CHEN*, "An Efficient and Secure Key Agreement Protocol for Sharing Emergency Events in VANET Systems," IEEE ACCESS, Vol. 7 , pp. 148472- 148484, 2019-10. (SCI, EI, Scopus)
  29. Lee, Chin-Feng, Weng, Chi-Yao*, and Kao, Cheng-Yu, "Reversible Data Hiding using Lagrange Interpolation for Prediction-error Expansion Embedding," Soft Computing, Vol. 23, Issue 19, pp. 9719–9731, 2019-10. (EI,SCI, SCOPUS)
  30. Lee, Chin-Feng, Jau-Ji Shen*, Kun-Liang Hou, Fang-Wei Hsu, "A High-performance Computing Method for Photographic Mosaics upon the Hadoop Framework," Journal of Internet Technology (JIT), Vol. 20, No.5, pp. 1343-1358, 2019-09. (SCIE,Scopus)
  31. Chin-Ling Chen, Dong-Peng Lin, Hsing-Chung Chen*, Yong-Yuan Deng*, and Chin-Feng Lee*, "Design of a Logistics System with Privacy and Lightweight Verification," Energies, 12(16), 3061, 2019-08. (SCIE, EI)
  32. Chin-Feng Lee, Jau-Ji Shen, Yu-Chi Kao, and Somya Agrawal, "Overlapping pixel value ordering predictor for high-capacity reversible data hiding," Journal of Real-Time Image Processing, Vol. 16, No. 4, pp. 835–855, 2019-08. (SCIE,EI,Scopus)
  33. Chin-Ling Chen, Dong-Peng Lin, Hsing-Chung Chen*, Yong-Yuan Deng*, and Chin-Feng Lee*, "Design of a Logistics System with Privacy and Lightweight Verification," Energies, 12(16), 3061, 2019-08. (SCIE, EI, Scopus)
  34. Chin-Feng Lee, Jau-Ji Shen, Zhao-Ru Chen, and Somya Agrawal*, "Self-Embedding Authentication Watermarking with Effective Tampered," Sensors, Vol. 19, No. 10, pp. 2267-2284, 2019-05. (SCIE,EI,Scopus)
  35. Chin-Ling Chen, Yong-Yuan Deng*, Chin-Feng Lee, Shunzhi Zhu*, Yi-Jui Chiu, Chih-Ming Wu, "An Internet-of-Things-based Sensing Rural Medical Care System," Sensors and Materials Science, Vol. 31, No. 3, 2019, p. 1037-1063., 2019-03. (SCI)
  36. Lee, Chin-Feng, Yi-Jia Wang, S. C. Chu, and J. F. Roddick, "An Adaptive Content-Based Image Retrieval Method Exploiting an Affine Invariant Region Based on a VQ-applied Quadtree Robust to Geometric Distortions," Journal of Network Intelligence, vol.3, no.3, pp. 214-234, 2018-08. (Scopus, EI)
  37. Lee, Chin-Feng, *Chang, Chin-Chen, Xie, Xiaozhu, Mao, Ke, and Shi, Run-Hua, "An adaptive high-fidelity steganographic scheme using edge detection and hybrid hamming codes," Displays, Vol. 53, pp. 30-39, 2018-07. (SCI, SCOPUS)
  38. Lee, Chin-Feng, Ya- Chen Li, Shu-Chuan Chu, and John F. Roddick, "Data Hiding Scheme Based on a Flower-Shaped Reference Matrix," Journal of Network Intelligence, Vol. 3, No. 2, pp. 138-151, 2018-05. (EI, SCOPUS)
  39. Li, Jian-Jun, Wu, Yun-He, Lee, Chin-Feng, and *Chang, Chin-Chen, "Generalized PVO-K Embedding Technique for Reversible Data Hiding," International Journal of Network Security, Vol.20, No.1, PP.65-77, 2018-01. (EI)
  40. Mao, Ke, *Lee, Chin-Feng, Chang, Chin-Chen, Shi, Run-Hua, "Study of Difference-Expansion Embedding Schemes," Journal of Electronic Science and Technology, VOL. 15, NO. 3, pp. 211-216, 2017-09. (EI,scopus)
  41. Chan, Yung-Kuan, Hsieh, Ming-Yuan*, Lee, Chin-Feng, Huang, Chih-Cheng, and Ho, Li-Chih, "Inquiring the most critical teacher’s technology education competences and in the highest efficient technology education learning organization," Eurasia Journal of Mathematics, Science & Technology Education, Vol.13, No.6, pp. 2645–2664, 2017-06. (SSCI,SCOPUS)
  42. Lee, Chin-Feng, *Weng, Chi-Yao, and Chen, Kai-Chin, "An Efficient Reversible Data Hiding with Reduplicated Exploiting Modification Direction using Image Interpolation and Edge Detection," MULTIMEDIA TOOLS AND APPLICATIONS, Volume 76, Issue 7, pp 9993–10016, 2017-04. (SCI)
  43. Lee, Chin-Feng, *Weng, Chi-Yao, and Li, Kuan-Ting, "VQ-based Image Embedding Scheme Using Adaptive Codeword Grouping Strategy," JOURNAL OF INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, Vol. 8, No. 1, pp. 54-67, 2017-01. (EI)
  44. Di, Ya-Feng, Lee, Chin-Feng, Wang, Zhi-Hui, *Chang, Chin-Chen, Li, Jianjun, "A Robust and Removable Watermarking Scheme Using Singular Value Decomposition," KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, Vol. 10, No. 12, pp. 5831-5848, 2016-12. (SCIE,SCOPUS)
  45. Lee, Chin-Feng, *Weng, Chi-Yao, Sharma, A, "Steganographic access control in data hiding using run-length encoding and modulo-operations," Security and Communication Networks, 9 (2), pp. 139-148, 2016-01. (SCOPUS)
  46. Lee, Chin-Feng, *Chang, Chin-Chen, Pai, Pei-Yan, and Liu, Chia-Ming, "Adjustment Hiding Method Based on Exploiting Modification Direction," International Journal of Network Security, Vol. 17, No. 5, September 2015, pp. 607-618, 2015-09. (EI)
  47. Lee, Chin-Feng, *Chang, Chin-Chen, Pai, Pei-Yan, and Liu, Chia-Ming, "An Adjustable and Reversible Data Hiding Method Based on Multiple-base Notational System without Location Map," Journal of Information Hiding and Multimedia Signal Processing, Volume 6, Number 1, 2015-01. (SCOPUS)
  48. Chang, Ya-Ting, Huang, Cheng-Ta, Lee, Chin-Feng, and Wang, Shiuh-Jeng*, "Image interpolating based data hiding in conjunction with pixel-shifting of histogram," Journal of Supercomputing, Vol.66, Issue 2, pp.1093–1110, 2013-11. (EI,SCI)
  49. Lee, Chin-Feng and Yu-Lin Huang, "Reversible data hiding scheme based on dual stegano-images using orientation combinations," Telecommunication Systems, Volume 52, Issue 4, pp 2237–2247, 2013-04. (SCIE,scopus)
  50. Lee, Chin-Feng* and Shih, Ming-Chi, "A Lossless Data Hiding Scheme Based on VQ Index Coding," Journal of Electronic Science and Technology, VOL. 11, NO. 1, pp.27-32, 2013-03. (EI,Scopus)
  51. Wang, Zhi-Hui, Lee, Chin-Feng*, and Chang, Ching-Yun, "Histogram-Shifting-Imitated Reversible Data Hiding," Journal of Systems and Software, Vol. 86, Issue 2, Pages 315-323, 2013-02. (EI,SCI)
  1. Lee, Chin-Feng and Yeh, Yu-Yun,"A Novel Pattern-based Dual-Image Reversible Data Hiding Scheme (最佳論文獎) ," 8th International Conference on Knowledge Innovation and Invention 2025, ICKII 2025 (2025 年第八屆國際知識創新與發明會議), na, 2025-08. Hilton Fukuoka Sea Hawk, Fukuoka, Japan Address: 2-2-3 Jigyohama, Chuo-ku, Fukuoka-shi, Japan 810-8650 .
  2. Chen, Chin-Ling, Lin, Yung-She, Lee, Chin-Feng, Liu, Ling-Chun, and Zeng, Kuang-Wei,"Human resource management task tracking management system based on blockchain technology ," 2025 IEEE Artificial Intelligence and Smart Technology Applications Symposium (IEEE AISTA 2025), Paper No.:H250070, 2025-07. 龍華科技大學 .
  3. Chen, Chin-Ling*, Peng, Zhen-Hong, Liu, Ling-Chun*, Lee, Chin-Feng, and Deng, Yong-Yuan,"CVE Data Analysis and Visualization: Building Cybersecurity Awareness and Validating Risks ," 2025 IEEE Artificial Intelligence and Smart Technology Applications Symposium (IEEE AISTA 2025), Paper No.:H250068, 2025-07. 龍華科技大學 .
  4. Chen, Chin-Ling*, Zeng, Kuang-Wei, Li, Wei-Ying, Lee, Chin-Feng, Liu, Ling-Chun, and Deng, Yong-Yuan,"Lightweight Post-Quantum Cryptography: Applications and Countermeasures in the Internet of Things, Blockchain, and E-Learning ," Proceedings of the 8th Eurasian Conference on Educational Innovation 2025 (ECEI 2025), na, 2025-02. Discovery Kartika Plaza Hotel .
  5. Lee, Chin-Feng and Huang, Zi-Yi,"Review of the Reversible Data Hiding in Encrypted Image ," Proceedings of the 20th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2024), Volume 1, 2024-10. Matsue Terrsa .
  6. Lee, Chin-Feng, Li, Tong-Ming, and Lin, Iuon-Chang,"Impact of Fragile Watermarking on Object Detection Accuracy under Image Tampering-- A YOLOv7-Based Study ," Proceedings of the 20th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2024), Volume 1, 2024-10. Matsue Terrsa .
  7. Lee, Chin-Feng, TSAI, Tzu-Ching, and Lin, Iuon-Chang,"The Study of Reversible Data Hiding with Contrast Enhancement for Medical Images ," 2024 the 8th International Conference on Medical and Health Informatics (ICMHI 2024), na, 2024-05. Yokohama .
  8. Lee, Chin-Feng, Kang, Ting-Yu, and Lin, Iuon-Chang,"Dual Medical-Image Reversible Data Embedding Method with Vector Directions ," 2024 the 8th International Conference on Medical and Health Informatics (ICMHI 2024), na, 2024-05. Yokohama .
  9. Lee, Chin-Feng, Chang, Shih-Chia, and Shen, Jau-Ji,"Enhancing Project Programming Hour Prediction with Regression Analysis Techniques – A Case Study of Company D ," Proceedings of Security and Information Technologies with AI, Internet Computing and Big-data Applications (SITAIBA 2023), na, 2023-12. 致理科技大學 .
  10. Wu, Wei-Chen, Cai, Zhi-Xun, and Lee, Chin-Feng,"A Text to Human-like Speech Using Tacotron -based TTS Model ," Proceedings of Security and Information Technologies with AI, Internet Computing and Big-data Applications (SITAIBA 2023), na, 2023-12. 致理科技大學 .
  11. Lee, Chin-Feng, Kang, Tz-Ruei, and Hou, Hsing-Yu,"Investigating Factors Influencing the Retention Intention of Digital Companion for Learning Project: Case of a Technology University in Taiwan ," 2023 12th International Conference on Awareness Science and Technology (iCAST), pp. 321-325, 2023-11. 朝陽科大 .
  12. Lee, Chin-Feng, and Chan, Kuo-Chung,"Dual Image Reversible Data Hiding Based on Coordinate Vector Directions via Communication Networking ," Proceedings of 2023 8th International Conference on Cloud Computing and Internet of Things (CCIOT 2023), pp.10-16, 2023-09. University of Ryukyu .
  13. Lee, Chin-Feng, Huang, Yu-Ming, and Huang, Zi-Yi,"Healthcare Material Review with Online Chatbot and Care-receiver Sentiment Analysis Information System ," 2023 7th International Conference on Medical and Health Informatics (ICMHI 2023), na, 2023-05. InterContinental Lyon - Hotel Dieu .
  14. Lee, Chin-Feng, Hsu, Chung-Wei, and Lin, Iuon-Chang,"A Novel Reversible Data Hiding Method with Contrast Enhancement for Color Medical Image ," 2023 7th International Conference on Medical and Health Informatics (ICMHI 2023), na, 2023-05. InterContinental Lyon - Hotel Dieu .
  15. Hou, Hsing-Yu, Lee, Chin-Feng, Chen, Chih-Teng, and Wu, Pei-Jung,"E-learning behavior analytics in the curriculum of big data visualization application ," 2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications (SITAIBA 2021), na, 2021-11. 國立中興大學 .
  16. Lee, Chin-Feng, Shen, Jau-Ji, and Lin, Zong-Ye,"Bin Reservation Based on IVPO Reversible Data Hiding Using Smoothness Mode Selection Strategy ," The 17th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. And 14th International Conference on Frontiers of Information Technology, Applications and Tools. [IIH-MSP 2021 & FITAT 2021 ], na, 2021-10. 高雄市 .
  17. Lee, Chin-Feng, Shen, Jau-Ji, and Wu, Chin-Yung,"Hiding Scheme Based on Improved Reduced Difference Expansion in Multi-Block Shape ," The 17th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. And 14th International Conference on Frontiers of Information Technology, Applications and Tools. [IIH-MSP 2021 & FITAT 2021 ], na, 2021-10. 高雄市 .
  18. Lee, Chin-Feng, Shen, Jau-Ji, and Tsai, Yun-Chin,"Improved Dynamic Embedding Scheme with Adaptive Pixel Replacement ," The 17th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. And 14th International Conference on Frontiers of Information Technology, Applications and Tools. [IIH-MSP 2021 & FITAT 2021 ], na, 2021-10. 高雄市 .
  19. Lee, Chin-Feng, Shen, Jau-Ji, and Ye, Yu-Yun,"Dual Image Reversible Information Hiding Scheme Using Staggered Turtle Shells ," The 17th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. And 14th International Conference on Frontiers of Information Technology, Applications and Tools. [IIH-MSP 2021 & FITAT 2021 ], na, 2021-10. 高雄市 .
  20. Shen, Jau-Ji, Lee, Chin-Feng, Yeh, Chin-Ting, and Somya Agrawal,"An Image Authentication Method Based on Deep Convolutional Generative Adversarial Network ," 6th International Conference on Frontiers of Educational Technologies, ICFET 2020 and its Workshop 2020 5th International Conference on Knowledge Engineering and Applications, ICKEA 2020, na, 2020-06. Tokyo .
  21. Lee, Chin-Feng, Shen, Jau-Ji, Chao, Zih-Cyuan, and Somya Agrawal,"An Improved lossless information Hiding in SMVQ Compressed Images ," 6th International Conference on Frontiers of Educational Technologies, ICFET 2020 and its Workshop 2020 5th International Conference on Knowledge Engineering and Applications, ICKEA 2020, na, 2020-06. Tokyo .
  22. Shen, Jau-Ji, Lee, Chin-Feng, Chen, Yu-Chuan, and Somya Agrawal,"Unsupervised Defect Detection based on Boundary Equilibrium Generative Aadversarial Network ," 6th International Conference on Frontiers of Educational Technologies, ICFET 2020 and its Workshop 2020 5th International Conference on Knowledge Engineering and Applications, ICKEA 2020, na, 2020-06. Tokyo .
  1. 深度學習技術在半盲型浮水印數位影像版權保護機制之研究(2/2)/2025-08~2026-07/ NSTC113-2221-E-035-078-MY2/主持人
Last update:2025-10-9, 午夜 Next update:2025-10-9, 9 a.m.