Publication List
International Journal:
- 1. Changchien, S. W. and Lu, T. C., (2001): "Mining Association Rules Procedure to Support On-line Recommendation by Customers and Products Fragmentation," Expert Systems with Applications, Vol. 20, No. 4, pp. 325-335, 2001. (字數:5318) [ISSN: 0957-4174] (SCI, Impact Factor: 3.928, Journal Ranking: 18/133, COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE) (SJR: 1.433, Journal Ranking: 5/265=2%, Engineering)
- 2. Changchien, S. W., Lin, Y. T. and Lu, T. C., (2004): "Modeling of Inter-Organizational Workflow and Agent-Based Implementation," Asian Journal of Information Technology, Vol. 3, No. 9, pp.781-800, 2004. [ISSN: 1682-3915]
- 3. Changchien, S. W., Lu, T. C. and Chang, C. C., (2004): "An Efficient Data Structure for Automatic Knowledge Discovery from Database," International Journal of Computational and Numerical Analysis and Applications, Vol. 5, No. 2, pp. 143-171, 2004. (字數:7019)
- 4. Lu, T. C. and Chang, C. C., (2005): "Data Compressor for VQ Index Tables," Fundamenta Informaticae, Vol. 65, No. 4, pp. 353-371, 2005. (字數:5823) [ISSN: 0169-2968] (SCI/EI, Impact Factor: 0.687, Journal Ranking: 91/106, COMPUTER SCIENCE, SOFTWARE ENGINEERING) (SJR: 0.396, Journal Ranking: 16/74 = 21% , Algebra and Number Theory)
- 5. Chang, C. C., Hu, Y. S. amd Lu, T. C., (2006): "A Watermarking-Based Image Ownership and Tampering Authentication Scheme," Pattern Recognition Letters, Vol. 27, No. 5 , pp. 439-446, 2006. (字數:4022) [ISSN: 0167-8655] (SCI/EI, Impact Factor: 1.995, Journal Ranking: 58/133, COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE) (SJR: 0.82, Journal Ranking: 65/368=18%, Software)
- 6. Chang, C. C. and Lu, T. C., (2006): "Reversible Index-domain Information Hiding Scheme Based on Side-Match Vector Quantization," Journal of Systems and Software, Vol. 79, No. 8, pp. 1120-1129, 2006. (字數:6154) [ISSN: 0164-1212]
- 7. Chang, C. C. and Lu, T. C.*, (2006): "A Difference Expansion Oriented Data Hiding Scheme for Restoring the Original Host Images," Journal of Systems and Software, Vol. 79, No. 12, pp. 1754-1766, Dec. 2006. (字數:6672) [ISSN: 0164-1212]
- 8. Lu, T. C.*, Chang, C. C. and Liu, Y. L., (2006): "A Content-based Image Authentication Scheme Based on Singular Value Decomposition," Pattern Recognition and Image Analysis: Advances in Mathematical Theory and Applications, Vol. 16, No. 3, pp. 506-522, Jul. 2006. [ISSN: 1054-6618] (字數:4891)
- 9. Chang, C. C., Lu, T. C. and Ya, J. B., (2007): "VQ Codebook Searching Algorithm Based on Correlation Property," Fundamenta Informaticae, Vol. 76, No. 1-2, pp. 39-57, 2007. (字數:5737) [ISSN: 0169-2968] (SCI/EI, Impact Factor: 0.687, Journal Ranking: 91/106, COMPUTER SCIENCE, SOFTWARE ENGINEERING) (SJR: 0.396, Journal Ranking: 16/74 = 21% , Algebra and Number Theory)
- 10. Lu, T. C.* and Chang, C. C., (2007): "Color Image Retrieval Technique based on Color Features and Image Bitmap," Information Processing & Management, Vol. 43, No. 2, pp. 461-472, Mar. 2007. (字數:4268) [ISSN: 0306-4573] (SCI/EI, Impact Factor: 2.391, Journal Ranking: 50/146, COMPUTER SCIENCE, INFORMATION SYSTEMS) (SJR: 0.717, Journal Ranking: 14/194=7%, Library and Information Sciences)
- 11. Chang, C. C., Lu, T. C.*, Chang, Y. F. and Lee, R. C. T., (2007): "Reversible Data Hiding Schemes for Deoxyribonucleic Acid (DNA) Medium," International Journal of Innovative Computing, Information and Control (IJICIC), Vol. 3, No. 5, pp. 1145-1160, Oct. 2007. [ISSN: 1349-4198] (字數:6965)
- 12. Lu, T. C.* and Chang, C. C., (2007): "A Progressive Image Transmission Technique Using Haar Wavelet Transformation," International Journal of Innovative Computing, Information and Control (IJICIC), Vol. 3, No. 6, pp. 1449-1461, Dec. 2007. [ISSN: 1349-4198] (字數:4798)
- 13. Lu, T. C.* and Chang, C. C., (2008): "Lossless Nibbled Data Embedding Scheme Based on Difference Expansion," Image and Vision Computing, Vol. 26, No. 5, pp. 632-638, May 2008. (字數:3669) [ISSN: 0262-8856] (SCI/EI, Impact Factor: 2.671, Journal Ranking: 17/106, COMPUTER SCIENCE, SOFTWARE ENGINEERING) (SJR: 1.087, Journal Ranking: 11/66=16%, Computer Vision and Pattern Recognition)
- 14. Lu, T. C.* and Wu, K. Y., (2009): "A Transaction Pattern Analysis System Based on Neural Network," Expert Systems with Applications, Vol. 36, No. 3, Part 2, pp. 6091-6099, April 2009. (字數:5643) [ISSN: 0957-4174] (SCI, Impact Factor: 3.928, Journal Ranking: 18/133, COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE) (SJR: 1.433, Journal Ranking: 5/265=2%, Engineering)
- 15. Lu, T. C.* and Chang, C. C., (2009): "An Improved Full-search Scheme for the Vector Quantization Algorithm Based on Triangle Inequality," International Journal of Innovative Computing, Information and Control (IJICIC), Vol. 5, No. 6, pp. 1625-1632, June 2009. [ISSN: 1349-4198] (字數:3468)
- 16. Lu, T. C.* and Tsai, C. H., (2009), "An Improved Lossless Hiding Technique Using Integer Transform Function," International Journal of Innovative Computing, Information and Control (IJICIC), Vol. 5, No. 9, pp. 2645-2656, Sep. 2009. [ISSN: 1349-4198] (字數:3901)
- 17. Lu, T. C.*, Chang, C. C., and Liu, Y. L., (2009): "An Information-Hiding Scheme Based on Quantization-Based Embedding Technique," Fundamenta Informaticae, Vol. 91, No. 3-4, pp. 597-610, Feb. 2009. (字數:4197) [ISSN: 0169-2968] (SCI/EI, Impact Factor: 0.687, Journal Ranking: 91/106, COMPUTER SCIENCE, SOFTWARE ENGINEERING) (SJR: 0.396, Journal Ranking: 16/74 = 21% , Algebra and Number Theory)
- 18. Chang, C. C. and Lu, T. C.*, (2009): "Lossless Information Hiding Scheme Based on Neighboring Correlation," International Journal of Signal Processing, Image Processing and Pattern Recognition (IJSIP), Vol. 2, No. 1, pp. 49-56, Mar. 2009. [ISSN: 2005-4254] (字數:2397)
- 19. Lu, T. C.* and Chang, C. Y., (2010): "A Survey of VQ Codebook Generator," Journal of Information Hiding and Multimedia Signal Processing (IJIHMSP), Vol. 1, No. 3, pp. 190-203. (EI) [ISSN: 2073-4212 (Print) ISSN: 2073-4239 (Online)] (字數:5212)
- 20. Lin, C. N., Buehrera, D. J., Chang, C. C., and Lu, T. C., (2010): "Using Quad Smoothness to Efficiently Control Capacity–Distortion of Reversible Data Hiding," Journal of Systems and Software, Vol. 83, No. 10, pp. 1805-1812, October 2010. (字數:6229) [ISSN: 0164-1212]
- 21. Wang, Z. H., Chang, C. C., Li, M. C. and Lu, T. C.*, (2011): "A Simple Image Encoding Method with Data Lossless Information Hiding," Journal of Networks, (Special issue on Recent Network Technologies and its Advanced Applications of Journal of Networks), Vol. 6, No. 3, pp. 400-407, Mar. 2011. (字數:4879) [ISSN: 1796-2056](SJR:0.165, Journal Ranking:473/1397)
- 22. Lu, T. C.*, Liao, S. R. and Chang, C. M., (2012), "The Information Hiding Technology Based on the Similar Sample Blocks," Journal of Communication and Computer, Vol. 9, pp. No. 9, pp. 434-443, April 2012. [ISSN: 1548-7709] (字數:4879)
- 23. Lu, T. C.* and Tseng, C. Y., (2012), "Hemodialysis Key Features Mining and Patients Clustering Technologies," Advances in Artificial Neural Systems Special Issue on Advances in Unsupervised Learning Techniques Applied to Biosciences and Medicine, Vol. 2012, Article ID 835903, 11 pages, June 2012. doi:10.1155/2012/835903. [ISSN: 1687-7594] (字數:7483)
- 24. Lu, T. C., Chang, C. C.*, Huang, Y. H., (2014),"High Capacity Reversible Hiding Scheme Based on Interpolation, Difference Expansion and Histogram Methods," Multimedia Tools and Applications, Vol. 72, No. 1, pp. 417-435, Sep. 2014. doi: 10.1007/s11042-013-1369-0 (字數:5478) (2014 SJR: 0.45, Journal Ranking: 11/39 = 28%, Media Technology) [ISSN:1380-7501] (SCI/EI, Impact Factor: 1.530, Journal Ranking: 48/106, COMPUTER SCIENCE, SOFTWARE ENGINEERING) (SJR: 0.335, SJR Ranking: 17/54 = 31%, Media Technology)
- 25. Lu, T. C.*, Tseng, C. Y. and Deng, K. M., (2014): "Reversible Data Hiding Using Local Edge Sensing Prediction Methods and Adaptive Thresholds," Signal Processing, Vol. 104, pp. 152-166, Nov. 2014. (字數:7321)[ISSN: 0165-1684] (SCI/EI, Impact Factor: 3.110, Journal Ranking: 58/260 =22%, ENGINEERING, ELECTRICAL & ELECTRONIC) (SJR: 1.119, Journal Ranking: 81/567 =14% Electrical and Electronic Engineering)ok
- 26. Lu, T. C.*, Tseng, C. Y. and Wu, J. H., (2015): "Dual Imaging-based Reversible Hiding Technique using LSB Matching," Signal Processing, Vol. 108, pp. 77-89, Mar. 2015. DOI: 10.1016/j.sigpro.2014.08.022 (字數:7031) [ISSN: 0165-1684] (SCI/EI, Impact Factor: 3.110, Journal Ranking: 58/260 =22%, ENGINEERING, ELECTRICAL & ELECTRONIC) (SJR: 1.119, Journal Ranking: 81/567 =14% Electrical and Electronic Engineering)ok
- 27. Chang, C. C.*, Lu, T. C., Horng, G. B. and Huang, Y. H., (2016): "Very Efficient Variable-length Codes for the Lossless Compression of VQ Indices," Multimedia Tools And Applications, Vol. 75, No. 6, pp. 3537-3552, March 2016. Doi: 10.1007/s11042-015-2463-2 (字數:6049) [ISSN:1380-7501] (SCI/EI, Impact Factor: 1.530, Journal Ranking: 48/106, COMPUTER SCIENCE, SOFTWARE ENGINEERING) (SJR: 0.335, SJR Ranking: 17/54 = 31%, Media Technology) ok
- 28. Chang, C. C.*, Lu, T. C., Horng, G., Huang, Y. H. and Hsu, T. J., (2015): "Dual-Histograms Reversible Data Hiding Capable of Avoiding Underflow/Overflow Problems," Journal of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 5, pp. 956-967, 2015. (EI) [ISSN: 2073-4212 (Print) ISSN: 2073-4239 (Online)] (SJR: 0.364, Journal Ranking: 21/60 =35
- 29. Lu, T. C.*, Lai, S. H. and Tseng, C. Y., (2015): "Inventory Management and Demand Prediction System for Reagents and Consumables," AISS: Advances in Information Sciences and Service Sciences, Vol. 7, No. 1, pp. 79 -88, 2015 (EI) (IS3C轉投) (字數:4136)[ISSN: 1976-3700] (SJR:0.11, Journal Ranking: 205/219 = 93%, 2015 not included) 有 Scopus no
- 30. Lu, T. C.*, Wu, J. H. and Huang, C. C., (2015): "Dual-image based Reversible Data Hiding Method using Center Folding Strategy," Signal Processing, Vol. 115, pp. 195-213, Oct. 2015. (doi: 10.1016/j.sigpro.2015.03.017) (字數:9489) (Accepted 2015/4) [ISSN: 0165-1684] (SCI/EI, Impact Factor: 3.110, Journal Ranking: 58/260 =22%, ENGINEERING, ELECTRICAL & ELECTRONIC) (SJR: 1.119, Journal Ranking: 81/567 =14% Electrical and Electronic Engineering) ok
- 31. Lu, T. C.*, Tseng, C. Y. and Wu, J. H., (2016): "Asymmetric-Histogram Based Reversible Information Hiding Scheme using Edge Sensitivity Detection," Journal of Systems and Software, Vol. 116, pp. 2–21, June 2016. (字數:8252) [ISSN: 0164-1212] ok
- 32. Lu, T. C.*, (2017): "Adaptive (k, F1) Interpolation-based Hiding Scheme using Center Folding Strategy," Multimedia Tools and Applications, Vol. 76, No. 2, pp 1827–1855, January 2017. (字數:8252) [ISSN:1380-7501] (SCI/EI, Impact Factor: 1.530, Journal Ranking: 48/106, COMPUTER SCIENCE, SOFTWARE ENGINEERING) (SJR: 0.335, SJR Ranking: 17/54 = 31%, Media Technology) ok
- 33. Lu, T. C.*, Lin, M. C., Huang, C. C. and Deng, K. M., (2016) "Reversible Data Hiding Based on Image Interpolation with a Secret Message Reduction Strategy," International Journal of Computer and Software Engineering, Vol. 1, No. 1, IJCSE-102, 2016. (Accepted 2016/4/13) (字數:5798)
- 34. Chang, C. C., Huang, Y. H. and Lu, T. C., (2017): “A Difference Expansion Based Reversible Information Hiding Scheme with High Stego Image Visual Quality,” Multimedia Tools and Applications, Vol. 76, No. 10, pp. 12659–12681, May 2017. [ISSN:1380-7501] (SCI/EI, Impact Factor: 1.530, Journal Ranking: 48/106, COMPUTER SCIENCE, SOFTWARE ENGINEERING) (SJR: 0.335, SJR Ranking: 17/54 = 31%, Media Technology) ok
- 35. Lu, T. C.*, Chen, C. M., Lin, M. C. and Huang, Y. H., (2017): "Multiple Predictors Hiding Scheme using Asymmetric Histograms," Multimedia Tools and Applications, Vol. 76, No. 3, pp. 3361-3382, Feb. 2017. [ISSN:1380-7501] (SCI/EI, Impact Factor: 1.530, Journal Ranking: 48/106, COMPUTER SCIENCE, SOFTWARE ENGINEERING) (SJR: 0.335, SJR Ranking: 17/54 = 31%, Media Technology) (字數:7172) ok
- 36. Lu, T. C.*, Chi, L. P., Wu, C. H., and Chang, H. P., (2017): "Reversible Data Hiding in Dual Stego-Images Using Frequency-Based Encoding Strategy," Multimedia Tools and Applications, Vol. 76, No. 22, pp. 23903-23929, 2017. [ISSN:1380-7501] (SCI/EI, Impact Factor: 1.530, Journal Ranking: 48/106, COMPUTER SCIENCE, SOFTWARE ENGINEERING) (SJR: 0.335, SJR Ranking: 17/54 = 31%, Media Technology) (字數:5,472) ok
- 37. Lu, T. C.*, (2017): "An Interpolation-based Lossless Hiding Scheme based on Message Recoding Mechanism," Optik - International Journal for Light and Electron Optics, Vol. 130, pp. 1377–1396, Feb. 2017. (字數:7,553) [ ISSN: 0030-4026] (SCI, Impact Factor: 0.835, Journal Ranking: 74/92, OPTICS) (SJR:0.307, SJR Ranking: 279/567=49%, Engineering, Electrical and Electronic Engineering ) ok
- 38. Lu, T. C.*, (2018): "Interpolation-based Hiding Scheme using the Modulus Function and Re-encoding Strategy," Signal Processing, Vol. 142, pp. 244-259, January 2018. (字數:7568) [ISSN: 0165-1684] (SCI/EI, Impact Factor: 3.110, Journal Ranking: 58/260 =22%, ENGINEERING, ELECTRICAL & ELECTRONIC) (SJR: 1.119, Journal Ranking: 81/567 =14% Electrical and Electronic Engineering)ok
- 39. Lu, T. C.* and Leng, H. S., (2017): “Reversible Dual-image Based Hiding Scheme Using Block Folding Technique,” Symmetry - Special Issue on Information Technology and Its Applications, Vol. 9, No. 10, pp. 223-248. [ISSN: 2073-8994] (SCIE, Impact Factor: 1.457, Journal Ranking: 25/64, MULTIDISCIPLINARY SCIENCES) (SJR: 0.325, SJR Ranking: 77/252 = 30.5% , Computer Science) ok
- 40. Chang, C. C, Lu, T. C.*, Zhu, Z. H, Tian, H., (2018): "An Effective Authentication Scheme Using DCT for Mobile Devices," Symmetry - Special Issue on Information Technology and Its Applications, Vol. 10, No. 13, pp. 1-16. [ISSN: 2073-8994] (SCIE, Impact Factor: 1.457, Journal Ranking: 25/64, MULTIDISCIPLINARY SCIENCES) (SJR: 0.325, SJR Ranking: 77/252 = 30.5% , Computer Science) ok
- 41. Lu, T. C.*, Tseng, C. Y., Huang, S. W., and Thanh Nhan Vo. (2018): "Pixel-Value-Ordering based Reversible Information Hiding Scheme with Self-Adaptive Threshold Strategy," Symmetry - SI: Information Technology and Its Applications 2018, Vol. 10, No. 764, pp. 1 – 27. [ISSN: 2073-8994] (SCIE, Impact Factor: 1.457, Journal Ranking: 25/64, MULTIDISCIPLINARY SCIENCES) (SJR: 0.325, SJR Ranking: 77/252 = 30.5% , Computer Science) $
- 42. Lu, T. C.*, Lu, Y. C., Nhan, T., (2019): "Dual-image based High Image Quality Reversible Hiding Scheme with Multiple Folding Zones," Multimedia Tools and Applications, Vol. 78, 34397-34435, 2019. [ISSN:1380-7501] (SCI/EI, Impact Factor: 1.530, Journal Ranking: 48/106, COMPUTER SCIENCE, SOFTWARE ENGINEERING) (SJR: 0.335, SJR Ranking: 17/54 = 31%, Media Technology) $
- 43. Lu, T. C*, Vo, T. N., Huang, S. R., (2019): "Interpolation Data Hiding Using Dual Folding Methodology," accepted by International Journal of Applied Science and Engineering (IJASE) (SJR: 0.16, SJR Ranking: 1999/2717 = 0.73% , Engineering) "Interpolation Data Hiding Using Dual Folding Methodology," Proceedings of the 13th International Conference on Advanced Information Technologies, Taichung, Taiwan, pp. 236-241, 2019. [ISBN Code:(PDF):9789865631444] (轉投 IJASE)
- 44. Xia, T. T., Lin, J., Chang, C. C. and Lu, T. C., "Reversible Data Hiding Scheme Based on the AMBTC Compression Technique and Huffman Coding," International Journal of Computational Science and Engineering. (SJR: 0.415, SJR Ranking: 131/328 = 0.40% , Engineering)
- 45. Lu, T. C., Shen, J. J. and Chang, T. C., (2020):"An Effective Lossless Dual-images based Hiding Method using Block Complexity and Adopted Thresholds," accepted by International Journal of Applied Science and Engineering. (Submitted 2020/3/4) iCast 2019 轉投 (Effective Dual-images based Reversible Information Hiding Scheme based on Complexity Analysis and Thresholds Controlling)International Journal of Applied Science and Engineering (IJASE) (SJR: 0.16, SJR Ranking: 1999/2717 = 0.73% , Engineering)
- 46. Lu, T. C., Chang, T. C., and Shen, J. J.*, (2020) "An Effective Maximum Distortion Controlling Technology in the Dual-image-based Reversible Data Hiding Scheme," IEEE Access. [ISSN: 2169-3536] (SJR: 0.609, Journal Ranking: 71/474=14%, Engineering(miscellaneous))
- Lu, T. C., Huang, S. R, Huang, S. W.* (2021): “Reversible Hiding Method for Interpolation Images Featuring a Multi-layer Center Folding Strategy,” Soft Computing, Vol. 25, pp. 161–180. [ISSN:14327643, 14337479] (SJR: 0.705, Journal Ranking: 90/346=26%, Computer Science/Software)
- Xia, T. T., Lin, J., Chang, C. C. and Lu, T. C. (2020): "A Novel Reversible Data Hiding Scheme Based on the AMBTC Compression Technique and Hamming Distance," to appear in International Journal of Embedded Systems (IJES) (Accepted in 2020/7/4) [ISSN:17411076] (SJR:0.223, Journal Ranking:108/144=75%, Computer Science/Hardware and Architecture)
- Lu, T. C.*, Yang, N., Vo, T. H., (2021): “Dual stego-images based Lossless Steganographic Scheme with Interval Scale Table,” Journal of Computers, Vol. 32, No. 2, pp. 1-7, 2021.
- Lu, T. C., Yang, P. C., Jana, B., (2021): “Improving the Reversible LSB Matching Scheme based on the Entropy Re-encoding Strategy, ” Entropy, Vol. 23, No. 577, pp. 1-23, 2021.
- Lu, T. C.*, Li, Y. Y., You, M. R., Chen, C. C., Chai, J. W., Wu, Y. Y., (2021): "MRI examination teaching system by using Virtual Reality (VR)," International Journal of Applied Science and Engineering, Vol. 18, No. 5. (2021/8/30)
- Xia, T.T., Lin, J., Chang, C.C. and Lu, T. C., (2021): "A novel adjustable reversible data hiding method for AMBTC-compressed codes using Hamming distance," International Journal of Embedded Systems, Vol. 14, No. 4, 23 Sep 2021.
- Li, Y. Y, Lu, T. C.*, (2022): “JLcoding Language Tool for Early Programming Learning,” Symmetry Special Issue entitled "Information Technology and Its Applications 2021." Symmetry, Vol. 14 (7), 2022.
- Jana, B., Jana, S.H., and Lu, T. C.*, Vo, Y. N. (2022): "Reversible Data Hiding Scheme Exploiting Center Folding with Fuzzy Weight Strategy,” Journal of Information Security and Applications, Volume 69, September 2022, 103276.
- Priyanka C. B. and Lu, T. C.*, (2023): "Identifying firm significance and positions in the patent innovation based on centrality measures’ clustering approach," IEEE ACCESS, Vol. 11, pp. 30515-30528. (10.1109/ACCESS.2023.3261331)
- Li, W. Y. and Lu, T. C.*, (2023): "Effect of an OwlSpace Programming Course on the Computational Thinking of Elementary School Students," to appear in Informatics in Education. (accepted in 2023/8/9)
Meikap, S., Jana, B., and Lu, T. C., (2023):"Context pixel-based reversible data hiding scheme using pixel value ordering," The Visual Computer, 2023.
- Li, W. Y., Lu, T. C.*, and Wei, H. X., (2023): "Serious Gaming: User Acceptance of the Simulated Motorbike License Training System" Multimedia Tools and Applications. DOI:10.1007/s11042-023-17532-x
Book Chapter:
- 1. Chang, C. C. and Lu, T. C., (2004): "A Chinese Remainder Theorem Oriented Information Hiding Scheme," The 7th Eurographics Workshop on Multimedia 2004 (EGMM04), (Correia, N., Jorge, J., Chambel, T. and Pan Z. Eds.), Eurographics Association, Switzerland, pp. 181-190, 2004. [ISSN: 1812-7118, ISBN: 3-905673-17-7]
- 2. Chang, C. C., Lu, T. C. and Liu, Y. L., (2005): "A Secret Information Hiding Scheme Based on Switching Tree Coding," Computer Security in the 21st Century, (Lee, D. T., Shieh, S. P., and Tygar, J. D. Eds.), Springer Science and Business Media, Inc., NY, USA, pp. 255-263, 2005. [ISBN: 0-387-24005-5]
- 3. Chang, C. C. and Lu, T. C., (2005): "Method for Searching Similar Images Using Quality Index Measurement," Knowledge-Based Intelligent Information and Engineering Systems: 9th International Conference (KES 2005), (R. Khosla, R.J. Howlett, and L.C. Jain Eds.), Springer Berlin / Heidelberg, Melbourne, Australia, Part II, Lecture Notes in Computer Science LNAI 3682, Vol. 3682, pp. 1224-1230, 2005. [ISSN: 03029743, ISBN: 3-540-28895-3]
- 4. Chang, C. C., Lu, T. C. and Yeh, J. B., (2005): "A Bandwidth Efficiency of Lempel-Ziv Scheme for Data Authentication," Knowledge-Based Intelligent Information and Engineering Systems: 9th International Conference (KES 2005), (R. Khosla, R.J. Howlett, and L.C. Jain Eds.), Springer Berlin / Heidelberg, Melbourne, Australia, Part IV, Lecture Notes in Computer Science LNAI 3684, Vol. 3684, 2005, pp. 249-256. [ISSN: 0302-9743, ISBN: 3-540-28895-3]
- 5. Chang, C. C. and Lu, T. C., (2005): "A Color-based Image Retrieval Method Using Color Distribution and Common Bitmap," Information Retrieval Technology - Second Asia Information Retrieval Symposium, AIRS 2005, (Lee, G. G., Yamada, A., Meng, H. and Myaeng, S. H.), Springer-Verlag Berlin Heidelberg, Germany, Vol. 3689, pp. 56-71, 2005. [ISSN: 0302-9743, ISBN: 3-540-29186-5]
- 6. Chang, C. C., Lu, T. C. and Fan, Y. H., (2007): "A Bit-Level Visual Secret Sharing Scheme for Multi-Secret Images Using Rotation and Reversion Operations," Intelligent Multimedia Data Hiding (J. S. Pan, W. C. Fang, H. C. Huang, and L. C. Jain, eds), Vol. 58, Chapter 4, pp. 83-101, Springer-Verlag, Berlin-Heidelberg, 2007. [ISBN: 978-3-540-71168-1]
- 7. Chang, C. C., Chou, Y. C. and Lu, T. C., (2007): "A Semi-blind Watermarking Based on Discrete Wavelet Transform," Information and Communications Security--Proceedings of the 9th International Conference on Information and Communications Security (ICICS 2007), (Qing, S. Imai, H., and Wang, G. Eds.), Springer Verlag, Zhengzhou, China, pp. 164-176, 2007. (字數:4124)
- 8. Lu, T. C.* and Huang, Y. H., (2008): "The Distortion Control Method of Reversible Contrast Mapping Hiding Scheme," Proceedings of the Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2008), Harbin, China, pp. 1133-1136, 2008. (EI) (字數:2003)
- 9. Lu, T. C.*, Huang, C. C. and Liao, S. L., (2009), "Lossless Information Hiding Scheme Based on Predictive Coding," Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, September 12 - 14, 2009, Kyoto, Japan, pp. 374-377, 2009. (EI) [ISBN: 978-1-4244-4717-6]
- 10. Lu, T. C.*, Tseng, C. Y., and Liao, S. R., (2014): “Dual Gene Sequences Hiding Scheme,” Proceedings of Progress on Cryptography - 20 Years of Cryptography in Taiwan by McGraw-Hill, pp. 3-21, 2014. [ISBN: 978-986-641-147-5] (字數:7061)
- 11. Chou, Y. C., Lu, T. C.* and Wu, J. H., (2016): "A Data Hiding Method based on Multi-predictor and Pixel Value Ordering," Smart Innovation, Systems and Technologies, Advances in Intelligent Information Hiding and Multimedia Signal Processing, Proceeding of the Twelfth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kaohsiung, Taiwan, Vol. 63, pp.75-82, November 21-23, 2016. (EI, Spring Verlag). (字數: 3203) [ISSN:2190-3018] [ISBN: 978-3-319-50208-3] (SJR:0.157, Journal Ranking:155/191=83%, Computer Science) ok
- 12. Lu, T. C.* and Lu, Y. C., (2016):, "An Improved Data Hiding Method of Five Pixel Pair Differencing and LSB Substitution Hiding Scheme," Smart Innovation, Systems and Technologies, Advances in Intelligent Information Hiding and Multimedia Signal Processing, Proceeding of the Twelfth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kaohsiung, Taiwan, Vol. 63, pp.67-74, November 21-23, 2016. (EI, Spring Verlag). (字數: 3123) [ISSN:2190-3018] [ISBN: 978-3-319-50208-3] (SJR:0.157, Journal Ranking:155/191=83%, Computer Science) ok
- 13. Lu, T. C.*, Lin, C. Q., Liu, J. W. and Chen, Y. C., (2016): "Advanced Center-Folding based Reversible Hiding Scheme with Pixel Value Ordering," Systems and Technologies, Advances in Intelligent Information Hiding and Multimedia Signal Processing, Proceeding of the Twelfth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kaohsiung, Taiwan, Vol. 63, pp. 83-90, November 21-23, 2016. (EI, Spring Verlag). (字數: 4102) [ISSN:2190-3018] [ISBN: 978-3-319-50208-3] (SJR:0.157, Journal Ranking:155/191=83%, Computer Science) ok
- 14. Lu, T. C.* , Li, W. Y., Chen, P. F., Ren, R. J., Shi, Y. I., Wang, H. Q., and Zhang, P. C. (2017): "Integrated Health Check Report Analysis and Tracking Platform," Smart Innovation, Systems and Technologies book series (SIST, volume 81), International Conference on Intelligent Information Hiding and Multimedia Signal Processing IIH-MSP 2017: Advances in Intelligent Information Hiding and Multimedia Signal Processing, pp. 44-52, Matsue, Shimane, Japan, August 12-15, 2017. (字數: 2832) ok
- 15. Liang, X. Q., Li, W. Y. and Lu, T. C.*, (2017): "A Study of the Multi-Organization Integrated Electronic Attendance System," Smart Innovation, Systems and Technologies book series (SIST, volume 81), International Conference on Intelligent Information Hiding and Multimedia Signal Processing IIH-MSP 2017: Advances in Intelligent Information Hiding and Multimedia Signal Processing, pp. 53-61, Matsue, Shimane, Japan, August 12-15, 2017. (字數: 3599) ok
- 16. Lu, T. C.* and Vo, T.N., (2020) "Reversible Steganography Technologies: A Survey," to appear in Digital Media Steganography: Principles, Algorithms, Advances, ELSEVIER, 2020.
- 17. Bhatt, P. C., Kumar, V.*, Lu, T. C., Cho, L. T., Lai, K. K., (2019), "Rise and Rise of Blockchain: A Patent Statistics Approach to Identify the Underlying Technologies," Proceedings of Sitek P., Pietranik M., Krótkiewicz M., Srinilta C. (eds) Intelligent Information and Database Systems, ACIIDS 2020. Communications in Computer and Information Science, Vol. 1178, Springer, Singapore, pp. 456-466. Phuket, Thailand, Mar 23, 2020 - Mar 26, 2020.
International Conference:
- 18. Changchien, S. W. and Lu, T. C., (2000): "A Data Mining Procedure Using Neural Network - Self Organization Map and Rough Set to Discover Association Rules," Proceedings of the 2000 International Computer Symposium Workshop on Software Engineering and Database Systems (ICS 2000), No. 3, pp. 83-90, 2000.
- 19. Changchien, S. W. and Lu, T. C., (2000): "An Agent-Based Virtual Enterprise Data Management Architecture Supporting Concurrent Engineering and Agile Manufacturing," Proceedings of the 5th Annual International Conference of Industrial Engineering Theory, Applications and Practice, Hsinchu, Taiwan, 2000.
- 20. Changchien, S. W. and Lu, T. C., (2001): "A New Efficient Association Rules Mining Method Using Class Inheritance Tree (CIT)," Proceedings of the 12th International Conference on Information Management (ICIM 2001), Taipei, Taiwan, p. A-6, 2001.
- 21. Changchien, S. W. and Lu, T. C., (2001): "An Efficient Association Rules Mining Method and Agent-Based Implementation in Supply Chain," Proceedings of the 4th Pacific Rim International Workshop on Multi-Agents in Cooperation with ACM (PRIMA 2001), Taipei, Taiwan, pp. 269-280, 2001.
- 22. Changchien, S. W. and Lu, T. C., (2001): "Knowledge Discovery from Object-Oriented Databases Using an Association Rules Mining Algorithm," Proceedings of the 5th International Conference on Knowledge-Based Intelligent Information Engineering Systems (KES) & Allied Technologies, Osaka, Japan, 2001.
- 23. Lu, T. C., Chang, C. C. and Changchien, S. W., (2002): "A Mining Frequent Itemsets Procedure Using a Classification Network," Proceedings of the 1st International Conference on Information and Management Science (IMS 2002), China, Xi'an, pp. 76-82, 2002.
- 24. Lu, T. C., Chang, C. C. and Changchien, S. W., (2002): "An Association Rule Mining Method for Spatial Database," Proceedings of IASTED International Conference of Information Systems and Databases (ISDB 2002), Tokyo, Japan, pp. 281-286, 2002.
- 25. Chang, C. C. and Lu, T. C., (2002): "An Image Database Retrieval Scheme Based Upon Multivariate Analysis and Data Mining," Proceedings of the International Computer Symposium: Database and Software Engineering Workshop (ICS 2002), Hualien, Taiwan, Session 4, p. E4, 2002. (Keynote Speech Paper).
- 26. Lu, T. C., Changchien, S. W. and Chang, C. C., (2003): "A Characteristic Rules Mining Scheme Based on Weighted Incidence Matrices," Proceedings of the 2nd International Conference on Information and Management Science (IMS 2003), Chengdu, China, pp. 316-322, 2003.
- 27. Lu, T. C. and Chang, C. C., (2003): "A Calligraphic Images Retrieval Scheme (CIRS) Based on Color and Ink Density," Proceedings of the 20th International Conference on Computer Processing of Oriental Languages (ICCPOL 2003), Shenyang, China, pp. 385-391, 2003.
- 28. Chang, C. C., Lu, T. C., and Chen, G. M., (2003): "An Efficient Promoter Prediction Scheme Based on Principal Component Analysis," Proceedings of the 2003 International Conference on Informatics, Cybernetics and Systems (ICICS 2003), Kaohsiung, Taiwain, pp. 1498-1504, 2003.
- 29. Chang, C. C., Lu, T. C. and Liu, Y. L., (2004): "A Bandwidth Efficiency of the Image Compression Method for Information Hiding," Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA2004), Fukuoka, Japan, 2004, pp. 426-432, 2004.
- 30. Chang, C. C. and Lu, T. C., (2005): "A Content-based Color Image Retrieval System Using Gradient Information," Proceedings of the 4th International Conference on Information and Management Sciences (IMS), Kunming & Dali & Shangrila, China, pp. 379-384, 2005.
- 31. Chang, C. C. and Lu, T. C.*, (2006): "A Wavelet-based Progressive Digital Image Transmission Scheme," Proceedings of 2006 International Conference on Innovative Computing, Information and Control (ICICIC2006), Vol. 2, Beijing, China, pp. 681-684, 2006.
- 32. Lu, T. C.* and Chang, C. C., (2006): "A Bandwidth Efficiency of the Locally Adaptive Compression Method for Hiding Secret Messages," Proceedings of the 9th Joint Conference on Information Sciences (JCIS 2006), Advances in Intelligent Systems Research, Taiwan, pp. 1065-1068, 2006. [ISBN: 978-90-78677-01-7] (EI)
- 33. Lu, T. C.* and Huang, C. C., (2007): "Lossless Information Hiding Scheme Based on Pixels Complexity Analysis," Proceedings of Third International Conference on Signal Image Technology & Internet-based Systems (SITIS 2007), Shanghai, China, pp. 934-941, 2007. (NSC 96-2221-E-324-048-) (字數:3224)
- 34. Lu, T. C.* and Hsu, L. L., (2008): "Hierarchical Watermarking Technique of Distortion Control Mechanism," Proceedings of the Second International Conference on Ubiquitous Information Management and Communication (ICUIMC 2008), Suwon, Korea, pp. 356-363, 2008. (字數:4240)
- 35. Lu, T. C.* and Hsu, L. L., (2008): "The Technique of Information Hiding based on Modification Function and LSB Matching," Proceedings of Eighth International Conference on Intelligent Systems Design and Applications (ISDA), pp. 626-631, 2008. [ISBN - 978-0-7695-3382-7/08] (字數:2538)
- 36. Lu, T. C.* and Huang, Y. H., (2009): "An Efficient Block-based Lossless Information Hiding Technique," Proceedings of the Third International Conference on Ubiquitous Information Management and Communication (ICUIMC 2009), SKKU, Suwon, Korea, 2009. (字數:2549)
- 37. Lu, T. C.* and Huang, Y. H., (2009), "An Effective Lossless Hiding Technique based on Reversible Contrast Mapping and Histogram Embedding Methods," Proceedings of Fifth International Conference on Information Assurance and Security (IAS09), Vol. 2, pp. 599-602, August 18-20, 2009, Xi'an, China. [ISBN: 978-0-7695-3744-3]
- 38. Lu, T. C.*, Liao, S. R., Chen, P. L., Chang, C. C. and Wang, Z. H., (2009): "Information Hiding Technology Based on Block-Sigmentation Strategy," Proceedings of 2009 Second ISECS International Colloquium on Computing, Communication, Control, and Management(CCCM 2009), Sanya, China, Aug. 8-9, 2009, Vol. I, pp. 500-506.
- 39. Lu, T. C.* and Liao, S. R., (2011), "Application of Information Hiding Technique to Biological Gene Sequences," International Conference on Business and Information, Vol. 8, July 4-6 2011, Bangkok, Thailand. [ISSN: 1729-9322]
- 40. Chang, C. C., Lu, T. C., Horng, G., Huang, Y. H and Hsu, Y. M., (2013), "A High Payload Data Embedding Scheme Using Dual Stego-images with Reversibility," Proceedings of ICICS 2013 Special Session on “Advances in Information Security”, Taina, Taiwan, Dec. 10-13, 2013.
- 41. Lu, T. C.*, Lai, S. H. and Tseng, C. Y., (2014): "Reagents and Consumables Management and Demand Decision Support System," Proceedings of International Symposium on Computer, Consumer and Control (IS3C), 2014, Taichung, Taiwan, pp. 1167-1170, 2014. (2014/6/10-12) [ISBN: 978-1-4799-5277-9] (doi>10.1109/IS3C.2014.303) (EI) (字數: 3302) (IS3C) (SJR: 0.12, Journal Ranking:714/1143, Computer Science, Computer Science Applications)
- 42. Lu, T. C.*, Tseng, C. Y., Leng H. S. and Huang, C. C., (2014):"Data Hiding Scheme Based on Edge Detection and Triangular Mirroring," Proceedings of 10th Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP), pp.142-145, Kitakyushu, Japan, August 27-29, 2014. (IIHMSP-2014-IS06-06) [ISBN: 978-1-4799-5390-5] (字數: 2211) (EI) (SJR:0.111, Journal Ranking:165/270, Computer Science, Signal Processing)
- 43. Lu, T. C.*, Tseng, C. Y., Chen, C. M., Leng H. S. and Huang, Y. H., (2014):"An Efficient and Simplified Data Hiding Technique based on 2's Complement," Proceedings of 10th Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP), pp126-129, Kitakyushu, Japan, August 27-29, 2014. (IIHMSP-2014-IS06-02) [ISBN: 978-1-4799-5390-5] (字數: 2332) (EI) (SJR:0.111, Journal Ranking:165/270, Computer Science, Signal Processing)
- 44. Lu, T. C.*, Tseng, C. Y., Huang, C. C. and Deng, K. M., (2014):"16-bit DICOM Medical Images Lossless Hiding Scheme based on Edge Sensing Prediction Mechanism," Proceeding of the Eighth International Conference on Genetic and Evolutionary Computing (ICGEC), October 18-20, 2014, Nanchang, China, pp. 189-196, 2014 (EI, Spring Verlag). [ISBN: 978-3-319-12286-1] (DOI 10.1007/978-3-319-12286-1_19) (字數: 5094) (Book)
- 45. Lu, T. C.*, Hsueh, S. C., Tseng, C. Y. and Chen, P. L., (2014): "Information Hiding Scheme based on Replace Function and Wavelet Transform," Frontiers in Artificial Intelligence and Applications, Proceedings of International Computer Symposium (ICS) Workshop on Cryptography and Information Security, Intelligent Systems and Applications, Taiwan, Dec. 2014, pp. 885 - 893. [ISBN: 978-1-61499-484-8] (字數: 3127) (SJR:0.177, Journal Ranking: 135/153, Artificial Intelligence) (Book)
- 46. Lu, T. C.* and Huang, Y. H., (2015) "Combined Prediction-based Reversible Data Embedding Methods for High Image Quality," Proceedings of The Eleventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP), Adelaide, Australia, September 23-25, 2015, pp. 109-112. (字數: 2014) ok
- 47. Lu, T. C.* and Lu, Y. C., (2017): "Data Hiding Method based on Center Folding Strategy and Pixel-based Pixel Value Ordering on Dual Image," Proceedings of International Conference on Innovation and Management (IAM 2017), Tokyo, Japan, Feb. 7-10, 2017. (字數: 3878)
- 48. Lu, T. C.* and Chen, Y. C., Wang, C. H., (2017): "Using Interactive Multimedia Games to Introduce Knowledge of Sewage Treatment: A Case Study of Taichung Futian Water Reclamation Center," Proceedings of International Conference on Innovation and Management (IAM 2017), Tokyo, Japan, Feb. 7-10, 2017. (字數: 2640)
- 49. Liang, S. C., Chen, Y. C., Lu, T. C.*, (2017): "Using Pictorial Story Based English to Improve English Words Underachievers Learning in Remedial Teaching," Proceedings of the 8th International Conference on Awareness Science and Technology (iCAST 2017), Nov. 8-10, 2017, Taichung, Taiwan. ok
- 50. Liu, J. W., Lu, T. C. and Zhao, Q. F., (2017): "Improving the Performance of Lossless Reversible Steganography via Data Sharing," Proceedings of the 8th International Conference on Awareness Science and Technology (iCAST 2017), Nov. 8-10, 2017, Taichung, Taiwan.
- 51. Lu, Y. C. Chakraborty, G. T.*, Lu, T. C., (2017): "Hidden Content Quality Aware Stego-Image Hiding Method using Re-Encoding Strategy," Proceedings of the 8th International Conference on Awareness Science and Technology (iCAST 2017), Nov. 8-10, 2017, Taichung, Taiwan. (轉投"Hidden Content Quality Aware Stego-Image Hiding Method Using Re-Encoding Strategy" submitted to International Journal of High Performance Computing and Networking (IJHPCN), (IJHPCN-213966).)
- 52. Lu, T. C.*, Chang, T. C. and Shen, Z. J., (2018): “Water Resource Center Digital Tour and Pre-test and Post-test Systems,” International Conference on Mobile and Wireless Technology 2018, Proceedings of International Conference on Mobile and Wireless Technology (ICMWT 2018), Springer, Lecture Notes in Electrical Engineering, Vol. 513, pp. 169-179.ok
- 53. Lu, T. C., Chen, R. C., Hsuen, G. E, and Hang, S. W., "A Study on CNC Machine Training Based on Virtual Reality Technology," Smart Innovation, Systems and Technologies, Vol. 110, pp. 257-265, 2019. (IIH-MSP 2018: The 14th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Sendai, Japan, Nov 26-28, 2018) ok
- 54. Lu, T. C., Wang, Q. W., Zhuo, Y. X., You, M. R., Zhang, J. R., "Use technology acceptance model to analyze the acceptance of the older people for exergame," Proceedings of the 13th International Conference on Advanced Information Technologies, Taichung, Taiwan, pp. 124-129, 2019. [ISBN Code:(PDF):9789865631444] $
- 55. Lu, T. C. and Yang, N. (2019) "Dual-image Based Lossless Hiding Scheme using Adaptive Interval Scale Table," Proceedings of International Conference on Innovative Computing and Management Science (ICMS) 2019, July 19-22, 2019, Osaka, Japan.
- 56. Lu, T. C., Shen, J. J. and Chang, T. C., (2019), "Effective Dual-images based Reversible Information Hiding Scheme based on Complexity Analysis and Thresholds Controlling," Proceedings of The 10th International Conference on Awareness Science and Technology (iCAST 2019), October 23 - 25, 2019, Morioka, Japan.
- 57. Lu, T. C. and Lan, T. N., (2019), "Introduction of Reversible Data Hiding Schemes," Proceedings of 2019 3rd International Conference on Security with Intelligent Computing and Big-data Services (SICBS), Dec. 4-6, 2019, Chihlee University of Technology, New Taipei City, TAIWAN. (submitted 2019/10/14)
- 58. Bhatt, P. C., Kumar, V.*, Lu, T. C., Cho, L. T., Lai, K. K., (2019), "Rise and Rise of Blockchain: A Patent Statistics Approach to Identify the Underlying Technologies," to appear in Proceedings of Asian Conference on Intelligent Information and Database Systems (ACIIDS 2020), Phuket, Thailand, Mar 23, 2020 - Mar 26, 2020.
- Vo, T. N, Lu, T. C.*, Agrawal, S. and Jana, B., (2021): "Interpolation based reversible hiding scheme by using center folding strategy and flexibly adjusting hiding operator," Proceedings of 2021 International Conference on Technologies and Applications of Artificial Intelligence, 2021. [ISBN:978-986-5631-57-4]
- Jana, S., Jana, B. and Lu, T. C.*, (2021): "Secured Steganographic Scheme Utilizing Fuzzy Threshold with Weighted Matrix," Proceedings of 2021 International Conference on Technologies and Applications of Artificial Intelligence, 2021. [ISBN:978-986-5631-57-4]$
- Lu, T. C., Vo, T. N. and Jana, B. (2023) "Dual-image reversible data hiding based on encoding the numeral system of concealed information," Proceedings of 15th International Conference on Advanced Computational Intelligence (ICACI2023).
- Lu, T. C.*, Chen, Y. Q., and Huang, S. M., (2023): "Sewage Treatment Interactive Learning Game Design," Proceedings of IEEE ICCE-TW 2023, July 17-19, 2023, PingTung, Taiwan.
- Lu, T. C.*, Lin, S. Y., Zhou, Y. X., Jana, B., (2023): "Serious games applied to the study of the “Substance Structure and Atom” units in chemistry," submitted to The 12th International Conference on Awareness Science and Technology (icast 2023). (submitted 2023/6/19)
- Lu, T. C.*, and Vo, Y. N., (2023): “Image Interpolation Utilizing Neighboring Pixels as References in Conjunction with Multilayer perceptron neural networks,” Proceedings of International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications (SITAIBA 2023). (submitted 2023/9/15)
Local Journal:
- 1. 呂慈純和張真誠,(2007): "適用於壓縮機制之資訊隱藏技術",資訊安全通訊雜誌 (Communications of the CCISA),第十三卷、第一期,pp. 56-73,2007年1月。[ISSN:1729-6056]
- 2. 呂慈純*和許儷齡,(2008): "階層式浮水印技術之失真控制機制",International Journal of Advanced Information Technologies (IJAIT), Vol. 1, No. 2, pp. 16-29, June 2008. [ISSN: 1996-2568] (字數:7200)
- 3. 呂慈純*和蔡承翰,(2009): "多重預測編碼之差異擴張與無失真資訊隱藏技術",資訊安全通訊雜誌 (Communications of the CCISA) , 第十五卷、第4期,2009年10月。(字數:7741) [ISSN:1729-6056]
- 4. 呂慈純*和陳培倫,廖湘如,(2009): "植基於灰階影像區塊分割之隱藏技術",資訊安全通訊雜誌 (Communications of the CCISA),第十五卷、第3期,pp. 103-115, 2009年7月。(字數:5284) [ISSN:1729-6056]
- 5. 呂慈純*和黃英軒,(2009): "有效結合可逆式對照映像方法與直方圖藏入技術之無失真資訊隱藏技術",朝陽學報 (The Journal of Chaoyang University of Technology),第十四期,pp. 193-210,2009年8月。[ISSN: 1026-244X] (字數:7504)
- 6. Lu, T. C.* and Huang, Y. H., (2010): "Improved Lossless Data Hiding Mechanisms Based on Block-based Hiding Algorithm, Double Hiding Strategy and Variable Control Technique," Journal of Computers, Vol. 20, No. 4, pp. 63-69, Jan. 2010. (字數: 3377) (EI) [ISSN: 1796-203X]
- 7. 呂慈純*和廖湘如,(2010): "植基於雙生物基因序列之可恢復式資訊隱藏技術",朝陽學報 (The Journal of Chaoyang University of Technology),第十五期,頁數307-320,2010。[ISSN: 1026-244X] (字數:10445)
- 8. 李碧雲、陳俊維、陳佩琦、呂慈純*、賴仕杰、薛欽璜,(2010): "中央實驗室試劑耗材管理資訊系統",醫檢會報,第二十五卷,第四期,Vol. 25, No. 4, pp. 10-21, Dec. 2010. (字數:3680)
- 9. 呂慈純*和張鈞名,(2011): "以灰階影像模數函式為基礎之區塊差異值隱藏技術",International Journal of Advanced Information Technologies (IJAIT), Vol. 5, No. 1, pp. 158-166 , June, 2011. [ISSN: 1996-2568] (字數:5077)
- 10. Lu, T. C.*, (2012), "Diagonal Watermark Scheme for Image Manipulation Detection and Recovering," 資訊安全通訊雜誌 (Communications of the CCISA), Vol. 18, No. 1, pp. 41-58, 2012. [ISSN: 1729-6056] (字數:4609)
- 11. 呂慈純*、林唯歆,(2012): "有效利用鄰近像素預測法之資訊隱藏技術",International Journal of Advanced Information Technologies (IJAIT), Vol. 6, No. 2, pp. 186-194, 2012. [ISSN: 1996-2568] (字數:6608)
- 12. 呂慈純*、林致錕,(2012),"對角線雙重浮水印嵌入及偵測復原方法",資訊安全通訊雜誌 (Communications of the CCISA),第十八卷、第四期,pp. 69-83,2012. [ISSN: 1729-6056] (字數:7024)
- 13. Lu, T. C., Chou, Y. C., Lin, W. H. and Yu, Y. J.,(2012),"A Data Hiding Scheme Using Neighboring Pixels Prediction",資訊安全通訊雜誌 (Communications of the CCISA),第十八卷、第四期,pp.56-68,2012. (字數:3943) [ISSN:1729-6056]
- 14. 呂慈純*、曾俊雅,(2013):"植基於邊緣敏感度分析預測方法之可逆式資訊隱藏技術及自適性門檻設定",Journal of Information, Technology and Society,『資訊、科技與社會』學報,2013年 第十三卷,pp.49-63,2013。 [ISSN 1682-8054] (字數:7903)
- 15. 呂慈純*、許永明、黃英軒,(2013): "高藏入效率的雙影像可逆式資訊隱藏技術",International Journal of Advanced Information Technologies (IJAIT), Vol. 7, No. 2, pp. 63-70, Dec. 2013. (2013年資訊科技國際研討會暨第三屆網路智能與應用研討會轉投,台灣,台中)。(字數:5869) [ISSN: 1996-2568]
- 16. 呂慈純*、冷輝世、黃俊智,(2014): "植基於邊緣偵測法及鏡射三角定位概念之資訊隱藏技術",International Journal of Advanced Information Technologies (IJAIT), Vol. 8, No. 2, pp. 35-41, 2014. ( 2014 Proceedings of 2014年資訊科技國際研討會暨第四屆網路智能與應用研討會(AIT) 轉投,台灣,台中。(2014/4/19)) (字數:5385) [ISSN: 1996-2568]
- 17. 呂慈純*、曾俊雅、吳致輝,(2015): "不對稱直方圖位移技術之可逆式資訊隱藏方法",International Journal of Advanced Information Technologies (IJAIT), Vol. 9, No. 1, 2015. ( 2014 Proceedings of 2014年資訊科技國際研討會暨第四屆網路智能與應用研討會(AIT) 轉投,台灣,台中。(2014/4/19)) (字數:8018) [ISSN: 1996-2568]
- 18. 呂慈純*、林美辰、黃俊智,(2015): "可逆式資訊隱藏方法使用影像內插技術與機密訊息縮減策略",International Journal of Advanced Information Technologies (IJAIT), Vol. 9, No. 2, pp. 50-57, 2015. (會議要求轉投) (字數:6290) [ISSN: 1996-2568]
- 19. 呂慈純*、吳致暉、黃俊智,(2015): "中間對折策略之雙影像可逆式資訊隱藏方法",International Journal of Advanced Information Technologies (IJAIT), Vol. 9, No. 2, pp. 23-33, 2015.. (會議要求轉投) (字數:10027)
- 20. 呂慈純*、林美辰、呂侑靜,(2016): "內插影像隱藏方法應用中間對折變動藏入位元策略", International Journal of Advanced Information Technologies (IJAIT), Vol. 10, No. 2, pp. 1-10, Dec. 2016. "中間對折變動藏入位元內插技術",Proceedings of The 10th International Conference on Advanced Information Technologies/Consumer Electronics Forum (AIT/CEF 2016), Taiwan, Taichung, 2016. [ ISBN: 978-986-5631-16-1] (字數: 7497) (會議要求轉投) ok
- 21. 呂慈純*、劉家維,(2016): "可逆式雙影像資訊隱藏技術使用訊息重編碼策略," International Journal of Advanced Information Technologies (IJAIT), Vol. 10, No. 2, pp. 33-43, Dec. 2016. "機密訊息重編碼技術應用於雙影像無失真資訊隱藏方法",Proceedings of The 10th International Conference on Advanced Information Technologies/Consumer Electronics Forum (AIT/CEF 2016), Taiwan, Taichung, 2016. (獲得Best Paper Award) [ ISBN: 978-986-5631-16-1] (字數: 9689) (會議要求轉投)
- 22. 呂慈純*、吳致暉、劉家維,(2017): "像素值排序藏入技術使用多預測器策略" , International Journal of Advanced Information Technologies (IJAIT), Vol. 11, No. 1, pp. 1-9, Jun. 2017. [ISSN:1996-2568] (會議要求轉投) "以多預測器為基礎之像素值排序藏入技術",Proceedings of The 10th International Conference on Advanced Information Technologies/Consumer Electronics Forum (AIT/CEF 2016), Taiwan, Taichung, 2016. [ ISBN: 978-986-5631-16-1] (字數: 9098)
- 23. 梁錫卿、李韋穎、呂慈純*,"整合多公務機關特性之電子差勤系統研究—以臺南市政府為例",International Journal of Advanced Information Technologies (IJAIT), Vol. 11, No. 2, pp. 41-47, 2018. (會議要求轉投) Proceedings of The 11th International Conference on Advanced Information Technologies/Consumer Electronics Forum (AIT/CEF 2017), Taiwan, Taichung, 2017.
- 24. 呂慈純、楊甯、張庭綺,(2018):“植基於雙影像之可逆式藏入法使用中間對折策略與區間量表,”資訊安全通訊(Communications of the CCISA),Vol. 23,No. 3,頁數1-17,Jul. 2018。
Local Conference:
- 1. 呂慈純*和許儷齡,(2007) : "階層式浮水印技術之失真控制機制",Proceedings of International Conference on Advanced Information Technologies (AIT), Taichung, Taiwan, 2007, p. 93。 [ISBN: 978-986-7043-03-0]
- 2. 呂慈純*和黃政釣,(2007): "植基於複雜度分析之無失真資訊隱藏技術", Proceedings of International Conference on Advanced Information Technologies (AIT), Taichung, Taiwan, 2007, p. 132。 [ISBN: 978-986-7043-03-0]
- 3. 呂慈純*和吳昆益,(2008): "植基於類神經網路之顧客交易特徵分析機制",Proceedings of International Conference on Advanced Information Technologies (AIT), Taichung, Taiwan, p. 7, 2008。 [ISBN: 978-986-7043-05-4]
- 4. 呂慈純*和蔡承翰,(2008): "植基於整數轉換函式之可逆式資訊隱藏技術",Proceedings of International Conference on Advanced Information Technologies (AIT), Taichung, Taiwan, p. 168, 2008。 [ISBN: 978-986-7043-05-4]
- 5. 呂慈純*和陳培倫,(2008): "有效應用區間間隔之可逆式資訊隱藏技術",Proceedings of International Conference on Advanced Information Technologies (AIT), Taichung, Taiwan, p. 122, 2008。 [ISBN: 978-986-7043-05-4]
- 6. 呂慈純*和黃英軒,(2008): "可逆式對照映像隱藏機制之失真控制方法",Proceedings of International Conference on Advanced Information Technologies (AIT), Taichung, Taiwan, p. 169, 2008。 [ISBN: 978-986-7043-05-4]
- 7. 呂慈純*和黃英軒,(2008): "有效的區塊式無失真資訊隱藏方式",2008管理與技術國際學術研討會,Proceedings of 2008 International Conference on Management & Technology,雲林科技大學,台灣,p. 142,2008。
- 8. 呂慈純*和許儷齡,(2008): "植基於模數函式及LSB匹配法之資訊隱藏技術",2008管理與技術國際學術研討會,Proceedings of 2008 International Conference on Management & Technology,雲林科技大學,台灣,p. 140,2008。
- 9. 呂慈純*和陳培倫,(2008): "有效利用整數小波轉換及取代函式之資訊隱藏方法",Proceedings of 第十四屆資訊管理暨實務研討會,台北,台灣,東吳大學,p. 110,2008。
- 10. Lu, T. C.* and Chen, P. L., (2008): "A Reversible Information Hiding Scheme Based on Interval Expansion," Proceedings of 2008 International Conference on Digital Content (ICDC),台灣,桃園,2008。
- 11. 呂慈純*和黃政鈞,(2008): "植基於直方圖預測編碼之無失真資訊隱藏方法",Proceedings of 2008數位內容學術研討會 - 2008 International Conference on Digital Content (ICDC),台灣,桃園,2008。
- 12. 呂慈純*和廖湘如,(2009): "有效應用於生物基因序列之資訊隱藏方法",第十四屆人工智慧與應用研討會(TAAI2009),台灣,台中,2009。
- 13. 呂慈純*、張鈞名、廖湘如,(2009) : "以灰階影像相似樣本區塊為基準之資訊隱藏技術",第十四屆人工智慧與應用研討會(TAAI2009),台灣,台中,p. 103-115,2009。
- 14. 呂慈純*和張鈞名,(2010): "以灰階影像模數函式為基礎之區塊差異值隱藏技術", Proceedings of International Conference on Advanced Information Technologies (AIT), Taichung, Taiwan,2010。
- 15. Lu, T. C.*, Tsai, C. H., Lin, C. Q., (2011): "A Multi-level Lossless Data Hiding Scheme Based on Adaptive Block Processing Algorithm,"中華民國第一屆網路智能與應用研討會The First National Conference on Web Intelligence and Applications, Apr. 2011.
- 16. 呂慈純*和曾俊雅, "血液透析關鍵因子分析及透析病患分群技術" ,第 22 屆國際資訊管理學術研討會(ICIM),台中,台灣,May 21, 2011.[ISBN: 978-986-7034-44-3]
- 17. Lu, T. C.* and Liao, S. R., (2011):"A Biological Gene Sequences Hiding Scheme Based on Run-Length Encoding," 第二十一屆資訊安全會議(CISC 2011),雲林,台灣,May 26-27, 2011.
- 18. 呂慈純*和賴仕杰, (2011): "醫檢實驗室試劑耗材管理資訊系統及需求預測模型",2011 民生電子研討會,台中,台灣,2011。
- 19. 呂慈純*、陳昌睦和黃秋寧,(2012): "健檢資料關聯規則探勘暨決策支援系統",2012年資訊科技國際研討會暨第二屆網路智能與應用研討會,台灣,台中。 [ISBN:978-986-7043-58-0]
- 20. 呂慈純*、林唯歆,(2012): "有效利用鄰近像素預測法之資訊隱藏技術", 2012年資訊科技國際研討會暨第二屆網路智能與應用研討會,台灣,台中。
- 21. 呂慈純*、蕭毓德、丁文泓、邱智勇、簡宏儒、陳鳴詠,(2013): "教學品保系統建構", 2013年資訊科技國際研討會暨第三屆網路智能與應用研討會,台灣,台中。
- 22. 呂慈純*、黃英軒和許永明,(2013):"多層式可逆資訊隱藏技術應用邊緣敏感度分析方法", TANET 2013 臺灣網際網路研討會,台中,台灣。
- 23. 呂慈純*、曾俊雅和黃俊智,(2013):"醫療影像之可逆式資訊隱藏技術應用邊緣敏感度分析預測方法", TANET 2013 臺灣網際網路研討會,台中,台灣。
- 24. 呂慈純*、冷輝世、陳昌睦,(2013):"可調節式資訊隱藏方法", Proceedings of 2013第十九屆資訊管理暨實務研討會(IMP2013), pp. 2437-2447 ,台中,台灣。
- 25. 呂慈純*、陳昌睦和林美辰,(2015):"多預測器可逆式資訊隱藏方法",Proceedings of The 9th International Conference on Advanced Information Technologies/Consumer Electronics Forum (AIT/CEF 2015), pp. 117-125, Taiwan, Taichung, Apr. 2015. [ISBN:9789865631055]
- 26. 呂慈純*、林美辰、呂侑靜,(2016): "中間對折變動藏入位元內插技術",Proceedings of The 10th International Conference on Advanced Information Technologies/Consumer Electronics Forum (AIT/CEF 2016), Taiwan, Taichung, 2016. [ ISBN: 978-986-5631-16-1] (字數: 7497) $
- 27. 呂慈純*、呂侑靜,(2016): "改良五像素配對差異擴張技術之資訊隱藏方法",Proceedings of The 10th International Conference on Advanced Information Technologies/Consumer Electronics Forum (AIT/CEF 2016), Taiwan, Taichung, 2016. [ ISBN: 978-986-5631-16-1] (字數: 7232) ok
- 28. 呂慈純*、吳致暉、劉家維,(2016): "以多預測器為基礎之像素值排序藏入技術",Proceedings of The 10th International Conference on Advanced Information Technologies/Consumer Electronics Forum (AIT/CEF 2016), Taiwan, Taichung, 2016. [ ISBN: 978-986-5631-16-1] (字數: 9098) ok
- 29. 呂慈純*、劉家維,(2016): "機密訊息重編碼技術應用於雙影像無失真資訊隱藏方法",Proceedings of The 10th International Conference on Advanced Information Technologies/Consumer Electronics Forum (AIT/CEF 2016), Taiwan, Taichung, 2016. (獲得Best Paper Award) [ ISBN: 978-986-5631-16-1] (字數: 9689) ok
- 30. 呂慈純*、陳育騏、方譽程、廖芃羿、江坤儒、張家華、王阡驊,(2016): "廍子水資源處理中心互動多媒體遊戲",Proceedings of The 10th International Conference on Advanced Information Technologies/Consumer Electronics Forum (AIT/CEF 2016), Taiwan, Taichung, 2016. [Poster] [ ISBN: 978-986-5631-16-1] $
- 31. 呂慈純*、陳品帆、任潤晶、石依婷、王宏騏、張珮慈,"整合型健康檢查報告分析及追蹤平台",Proceedings of The 11th International Conference on Advanced Information Technologies/Consumer Electronics Forum (AIT/CEF 2017), Taiwan, Taichung, 2017.
- 32. 梁錫卿、馬小敏、李韋穎、呂慈純*,"採用科技接受模型進行使用者滿意度研究─以臺南市政府推行政府推行電子差勤系統為例",Proceedings of The 11th International Conference on Advanced Information Technologies/Consumer Electronics Forum (AIT/CEF 2017), Taiwan, Taichung, 2017.
- 33. Liang, X. Q., Li, W. Y., Lu, T. C.*, Yap, W. S., (2018): "Acceptability Study of Technological-based Acceptability Model with the Tainan City Government’s Promotion of Electronic Attendance Management," Proceedings of The 12th International Conference on Advanced Information Technologies/Consumer Electronics Forum (AIT/CEF 2018).
- 34. 呂慈純*、張庭綺、余典翰、楊竣翔、彭惠芬、張維娟、王阡驊,(2018): "水資源中心數位導覽暨前後測系統", ITAOI 2018 第十七屆離島資訊技術與應用研討會,澎湖,台灣,5/25/2018 - 5/27/2018,頁數570-579。
- 35. 呂慈純*、卓宜萱、游明融、王阡驊、張君如,(2018): "長者健康促進之互動式體感遊戲開發", ITAOI 2018 第十七屆離島資訊技術與應用研討會,澎湖,台灣,5/2018,頁數580-585。
- 36. 呂慈純、林若安、陳建良、陳智彥、蘇沛淨、蔡茂豐,(2018): "校園導覽系統以朝陽科技大學為例", ITAOI 2018 第十七屆離島資訊技術與應用研討會,澎湖,台灣,5/2018,頁數589-591。
- 37. 呂慈純*、龍佩筠、戴廷軒、楊秉中、楊益聖、李慧筠,(2018): "Farm73放輕鬆─體感互動健康促進遊戲",2018數位生活科技研討會 Symposium on Digital Life Technologies (DLT-2018),2018年6月30日~ 7月1日,台中市,台灣
- 38. 呂慈純、王阡驊、卓宜萱、游明融、張君如,(2018): “使用科技接受模型分析長者對體感健康促進遊戲之接受度”,TANET 2018-台灣網際網路研討會暨資訊工程X智慧計算學門成果發表會,民國107年10月24日至26日,國立中央大學
- 39. 呂慈純,楊寗,(2019),“使用自適應區間量表於雙影像可逆式資訊隱藏方法",第二十九屆全國資訊安全會議,台灣,台中。
- 40. 呂慈純, 王阡驊, 龍佩筠, 戴廷軒, 楊益聖, 李慧筠, 楊秉中, (2019), "使用TAM2調查銀髮族對體感健康促進遊戲之使用意願," 2019 數位生活科技研討會 Innovative Technology on Health Promotion and Digital Living,2019/06/21-22,台灣,台中。
Book :
- 1. 挑戰 Java 程式語言 (A Challenge to Java Programming Language),全華圖書公司,2005年12月。(合著者:蔡文輝、張真誠) [ISBN: 9572151975]
- 2. C程式語言導論與實例設計(Introduction to C Programming Language and Design Examples),全華圖書公司,2006年5月。(合著者:蔡文輝、張真誠) [ISBN: 9572154389]
- 3. 多媒體安全技術 (Multimedia Security Techniques) ,全華圖書公司,2007年10月。(合編者:陸哲明、張真誠) [ISBN: 9572160184]
- 4. C程式語言導論與實例設計(第二版) (Introduction to C Programming Language and Design Examples),全華圖書公司,2013年1月。(合著者:蔡文輝、張真誠) [ISBN: 9789572187029]