陳宜惠 副教授

ImgDesc

姓名:陳宜惠
職稱:副教授
分機:(03)2118800 轉 5866
信箱:cyh@mail.cgu.edu.tw
個人網頁:https://chenyh.neocities.org/
學歷:中正大學資訊工程博士
專長領域:資訊安全、影像處理

 

經歷:
2019.08~迄今        長庚大學資訊管理學系副教授
2014.02~2019.07  亞洲大學行動商務與多媒體應用學系副教授 
2010.08~2014.02  亞洲大學資訊多媒應用學系助理教授
2010.02~2010.07  IBM Collaboratory Research Center研究員
2009.07~2010.01  中央研究院 資訊創新中心 博士後研究 

教授課程:
 資訊安全導論、圖像程式設計

專案計畫:

 科技部專題研究計畫:

  • 民107年:「細緻化可存取之影像加密與密文搜尋技術用於影像保護及管理上」(MOST 107-2221-E-182-081-MY3),2018/08/01~2021/07/31。
  • 民106年:「區塊鏈智能合約於共享經濟之研究--子計畫二:區塊鏈智能合約於競標系統技術之研發」(MOST 106-2221-E-468 -001),2016/08/01~2017/09/30。
  • 民104年:「隱私權保護為基準之影像加密既浮水印技術」(MOST 104-2221-E-468 -005),2015/08/01~2016/10/31。
  • 民103年:「可存取控制之祕密影像分享」(MOST 103-2221-E-468 -017),2014/08/01~2015/09/30。
  • 民102年:「細緻化影像之存取控制機制」(NSC 102-2221-E-468-009),2013/08/01~2014/07/31。
  • 民100年:「有效且安全的XML存取控制機制」(NSC 100-2221-E-468-010-MY2),2011/08/01~2013/07/31
  • 民100年:「可驗證及還原之秘密影像分享機制」(NSC 100-2218-E-468-002-MY2),2011/1/1-2012/9/30

 其他研究計畫:

  • 民105年:「電子書雲端分級存取及隱私保護技術之研究」(MOST 105-2410-H-005 -023 -MY2),共同主持人,2016/08/01~ 2018/07/31。
  • 民104年:「電子書影像安全保護機制之研發」(MOST 104-2221-E-009 -109),共同主持人,2015/08/01~2016/09/30。

期刊論文:
 SCI index:

  1. Y. H. Chen, E. J. L. Lu* and P. J. Chen, "Fine-grained Image Authorization Mechanism for Image Management Systems," Journal of Internet Technology, Vol. 19, No. 6, pp. 1919-1927, 2018.
  2. P. Y. Lin and Y. H. Chen*, "High Payload Secret Hiding Technology for QR Codes," EURASIP Journal on Image and Video Processing, Vol. 14, pp. 1-8, Feb. 2017.
  3. Y. H. Huang, C. C. Chang and Y. H. Chen*, "Hybrid Secret Hiding Schemes Based on Absolute Moment Block Truncation Coding," Multimedia Tools and Applications, Vol. 76, No. 5, pp. 6159–6174, March 2017.
  4. Y. H. Chen, E. J. L. Lu*, S. Y. Huang, and Y. T. Chang, "RDF-Chord: A hybrid PDMS for P2P Systems," Computer Standards & Interfaces, Vol. 43, pp. 53-67, 2016.
  5. I. C. Chang, E. J. L. Lu*, S. Y. Huang, Y. H. Chen*, "An RDF-based P2P Overlay Network Supporting Range and Wildcard Queries," Journal of Network and Computer Applications, Vol. 46, pp.124-138, 2014.
  6. Y. H. Chen, E. J. L. Lu* and M. F. Tsai, "Finding Keywords in Blogs: Efficient Keyword Extraction in Blog Mining via User Behaviors," Expert Systems with Applications, Vol. 41, No. 2, pp. 663-670, 2014.
  7. J. H. Yang*, Y. F. Chang, Y. H. Chen, "An Efficient Authenticated Encryption Scheme Based on ECC and its Application for Electronic Payment," Information Technology and Control, Vol. 42, No. 4, pp. 315-324, 2013.
  8. Y. J. Chiang, P. Y. Lin*, R. Z. Wang and Y. H. Chen, "Blind QR Code Steganographic Approach Based upon Error Correction Capability," KSII Transactions on Internet and Information System, Vol. 7, No. 10, pp. 2527-2543, Oct. 2013.
  9. P. Y. Lin, Y. H. Chen, C. C. Chang* and J. S. Lee, "Contrast-Adaptive Removable Visible Watermarking (CARVW) Mechanism," Image and Vision Computing, Vol. 31, No. 4. pp. 311-321, April 2013.
  10. C. C. Chang, Y. H. Chen* and H. C. Wang, “Meaningful Secret Sharing Technique with Authentication and Remedy Abilities,” Information Sciences, Vol. 181, No. 14, pp. 3073–3084, 2011.

  EI index:

  1. Y. H. Chen, E. J. L. Lu*, C. F. Wang, "Light-weight Selective Image Encryption for Privacy Preservation," Accepted by Journal of Electron Science and Technology, 2018.
  2. Y. H. Chen*, C. S. Chan and Y. Y. Tsai, "Access Control Mechanism for Blog Posts with Fine-grained Ability Using Simple Operations," Journal of Electronic Science and Technology, Vol. 15, No. 2, pp. 194-198, 2017.
  3. Y. H. Chen, C. Y. Lin*, W. S. and I. C. Weng, "Repairable Image Authentication Scheme," International Journal of Network Security, Vol.17, No.4, PP.439-444, July 2015.
  4. Y. H. Chen, P. Prangjarote and C. Y. Lin*, "Self-verifiable Secret Sharing Scheme with Locatability for Halftone Images," International Journal of Network Security, Vol.16, No.6, pp. 536-540, Nov. 2014.
  5. Y. H. Chen and P. Y. Lin*, "Authentication Mechanism for Secret Sharing Using Boolean Operation," Journal of Electronic Science and Technology, Vol. 10, No. 3, pp. 195-198, 2012.
  6. Y. H. Chen and C. C. Chang*, "Image Tamper Detection and Recovery Based on Dual Watermarks Sharing Strategy," Journal of Digital Information Management, Vol. 10, No. 1, pp.39-49, Feb. 2012.
  7. Y. H. Chen*, C. C. Huang and C. S. Chan, “Double-Layer Data Embedding Scheme Based on Three-Pixel Differences,” Journal of Electronic Science and Technology, Vol. 9, No. 4, pp. 297-300, Dec. 2011.