C.C. Chen, C. Chang, C. S. Lin, Y.T. Chen, W.H. Chen, C.H. Chen, I.C. Chen, “Intelligent performance evaluation in rowing sport using a graph-matching network,” Journal of Imaging, vol. 9, no. 9, pp. 181–195, 2023. (SCI)
C.C. Chen, C. Chang, C. S. Lin, C.H. Chen, I.C. Chen, “Video based basketball shooting prediction and pose suggestion system,” Multimedia Tools and Applications, vol. 82, pp. 27551–27570, 2023. (SCI)
C. C. Chen, C. S. Lin, J. Z. Chen, “Boolean-based (k, n, m) multi-secret image sharing,” Axioms, vol. 11, no. 5, pp. 197, 2022. (SCI)
C. S. Lin, C. C. Chen, Y. C. Chen, “XOR-Based Progressively Secret Image Sharing,” Mathematics, vol. 9, no. 6, pp. 612, 2021. (SCI)
C. S. Lin and C. Y. Lin, “Constructing a network evaluation framework for improving the financial ecosystem in small-medium size firms,” Technological and Economic Development of Economy, vol. 24, no. 3, pp.893-913, 2018. (SSCI)
C. S. Lin and C. Y. Lin, “An empirical study of efficiency evaluation with dynamic strategy trajectory based on DEA algorithm and BCG model: A case study of securities industry,” Journal of Social Sciences, vol. 14, no. 1, pp.91-106, 2018.
C. C. Chen, H. Wang, and C. S. Lin, “An efficiency enhanced cluster expanding block algorithm for copy-move forgery detection,” Multimedia Tools and Applications, vol. 76, no. 24, pp. 26503–26522, 2017. (SCI)
C. S. Lin and J. J. Tsay, “Passive forgery detection using DCT coefficient analysis in JPEG compressed images,” Journal of Electronic Imaging, vol. 25, no. 3, 033010, 2016. (SCI)
C. S. Lin and J. J. Tsay, “Passive forgery detection for JPEG compressed image based on block size estimation and consistency analysis,” Applied Mathematics & Information Sciences, vol. 9, no. 2, pp. 1015–1028, 2015. (SCI) 【Project Demo】
C. S. Lin and J. J. Tsay, “A passive approach for effective detection and localization of region-level video forgery with spatio-temporal coherence analysis,” Digital Investigation, vol. 11, no. 2, pp. 120–140, 2014. (SCI) 【Project Demo】
C. C. Chen and C. S. Lin, “A GA-based nearly optimal image authentication approach,” International Journal of Innovative Computing, Information and Control, vol.3, no.3, pp. 631–640, 2007. (SCI)
C. C. Chen and C. S. Lin, “Toward a robust image authentication method surviving JPEG lossy compression,” Journal of Information Science and Engineering, vol. 23, no. 2, pp. 511–524, 2007. (SCI)
※Conference Papers
C.C. Chen, W.K. Duan, C. S. Lin, “A Hybrid Deep Fusion Neural Network for Copy-Move Forgery Detection,” in Proc. of Int. Conf. on Recent Advancements in Computing in AI, IoT and Computer Engineering Technology, 2020.
C.C. Chen, C. Chang, C.H. Chen, I.C. Chen, C. S. Lin, “Shooting Estimation Technique Based on the OpenPose System,” in Proc. of Int. Conf. on Recent Advancements in Computing in AI, IoT and Computer Engineering Technology, 2020.
C.C. Chen, J.H. Chang, C. S. Lin, J.C. Hung, F.C. Lin, and Y.H. Wang, “Comparison of forecasting ability between back-propagation network and ARIMA in the prediction of bitcoin Price,” in Proc. of IEEE Int. Conf. on Intelligent Signal Processing and Communication Systems, 2019.
C. S. Lin, C. C. Chen, and Y. C. Chang, “An efficiency enhanced cluster expanding block algorithm for copy-move forgery detection,” in Proc. of IEEE Int. Conf. on Intelligent Networking and Collaborative Systems, pp. 228–231, 2015.
C. S. Lin and J. J. Tsay, “Passive approach for video forgery detection and localization,” in Proc. of Int. Conf. on Cyber Security, Cyber Peacefare and Digital Forensic, pp. 107–112, 2013.
C. S. Lin and J. J. Leou, “Image Inpainting using multiscale salient structure propagation,” in Proc. of IEEE Int. Conf. on Multimedia and Signal Processing, pp. 201–204, 2011.
H. F. Hsin, J. J. Leou, C. S. Lin, and H. Y. Chen, “Image inpainting using structure-guided priority belief propagation and label transformations,” in Proc. of IEEE Int. Conf. on Pattern Recognition, Istanbul, Turkey, pp. 4492-4495, 2010. (EI)
T. K. Chiang, J. J. Leou, and C. S. Lin, “An improved mean shift algorithm based tracking system for soccer game analysis,” in Proc. of IEEE Int. Conf. on APSIPA Annual Summit and Conference, Sapporo, Japan, pp. 380-385, 2009. (EI)
H. C. Mo, J. J. Leou, and C. S. Lin, “Haman behavior analysis using multiple 2D features and multicategory support vector machine” in Proc. of IAPR Int. Conf. on Machine Vision Applications, Keio University, Yokohama, Japan, pp. 46-49, 2009.
S. T. Wang, J. J. Leou, and C. S. Lin, “A new hierarchical particle filter based tracking system for soccer game analysis,” in Proc. of Pacific-Rim Conference on Multimedia, Tainan, Taiwan, pp. 358–367, 2008.
C. C. Chen and C. S. Lin, “Image authentication improvement by genetic algorithm,” in Proc. of IPPR Int. Conf. on Computer Vision, Graphics, and Image Processing, 2005.
C. C. Chen and C. S. Lin, “Toward a robust image authentication method surviving JPEG lossy compression,” in Proc. of IPPR Int. Conf. on Computer Vision, Graphics, and Image Processing, 2004.