【盡其在己 聽其在天】
認清楚自己所扮演的角色,對自己而言什麼事才是最重要的。人生許多不同的階段,每個階段的目標不盡相同,重點也不一樣。盡自己最大的努力將現階段的目標完成,你會發現,走的每一步路都格外有意義,最後的結果將會超出你的期待。


 

姓  名: 林珮瑜

電子郵件: Email住址會使用灌水程式保護機制。你需要啟動Javascript才能觀看它

聯絡方式: 研究室:5420R
分機號碼:2130

最高學歷: 國立中正大學 資訊工程研究所博士

研究領域: 數位媒體保護、數位影像處理、資訊安全

重要著作: A. International Journal Papers
  1. Pei-Yu Lin, Ran-Zan Wang*, Yu-Jie Chang and Wen-Pinn Fang, "Prevention of Cheating in Visual Cryptography by Using Coherent Patterns," Information Sciences, vol. 301, pp. 61-74, April 2015. [SCI]
  2. Chi-Shiang Chan* and Pei-Yu Lin, "Image Authentication Method using Multiple Mapping Codebooks," Imaging Science Journal, vol. 63, no. 2, pp. 85-94, February 2015. [SCI]
  3. Pei-Yu Lin*, "Double Verification Secret Sharing Mechanism Based on Adaptive Pixel Pair Matching," ACM Transactions on Multimedia Computing Communications and Applications, vol. 11, no. 3, article 36, January 2015. [SCI]
  4. Pei-Yu Lin* and Wei-Fan Hsieh, "Media Pattern Exhibition Mechanism via Mobile Devices," Journal of Visual Communication and Image Representation, vol. 25, no. 8, pp. 1856-1864, November 2014. [SCI]
  5. Pei-Yu Lin*, "Imperceptible Visible Watermarking Based on Postcamera Histogram Operation," Journal of Systems and Software, vol. 95, pp. 194-208, September 2014. [SCI]
  6. Yin-Jen Chiang, Pei-Yu Lin*, Ran-Zan Wang and Yi-Hui Chen, "Blind QR Code Steganographic Approach Based upon Error Correction Capability,"KSII Transactions on Internet and Information Systems, vol. 7, no. 10, pp. 2527-2543, October 2013. [SCI]
  7. Pei-Yu Lin, Yi-Hui Chen, Chin-Chen Chang* and Jung-San Lee, "Contrast-Adaptive Removable Visible Watermarking (CARVW) Mechanism," Image and Vision Computing, vol. 31, no. 4, pp. 311-321, April 2013. [SCI]
  8. Yi-Hui Chen* and Pei-Yu Lin, "Authentication Mechanism for Secret Sharing Using Boolean Operation," Journal of Electronic Science and Technology (JEST), vol. 10, no. 3, pp. 195-198, September 2012. [EI]
  9. Pei-Yu Lin*, "Media Sharing Scheme with Cheater Identification and Content Reconstruction," Journal of Electronic Science and Technology (JEST), vol. 9, no. 4, pp. 332-338, December 2011. [EI]
  10. Pei-Yu Lin*, Jung-San Lee and Chin-Chen Chang, "Protecting the Content Integrity of Digital Imagery with Fidelity Preservation," ACM Transactions on Multimedia Computing Communications and Applications, vol. 7, no. 3, article 15, August 2011. [SCI]
  11. Pei-Yu Lin* and Chin-Chen Chang, "Cheating Resistance and Reversibility-oriented Secret Sharing Mechanism," IET Information Security, vol. 5, no. 2, pp. 81-92, June 2011. [SCI]
  12. Jung-San Lee*, Pei-Yu Lin and Chin-Chen Chang, "Analysis of an Image Secret Sharing Scheme to Identify Cheaters," International Journal of Image Processing (IJIP), vol. 4, no. 4, pp. 287-292, October 2010.
  13. Pei-Yu Lin* and Chi-Shiang Chan, "Invertible Secret Image Sharing with Steganography," Pattern Recognition Letters, vol. 31, no. 13, pp. 1887-1893, October 2010. [SCI] 
  14. Chin-Chen Chang, Pei-Yu Lin* and Jun-Chou Chuang, "A Grayscale Image Steganography Based Upon Discrete Cosine Transformation," Journal of Digital Information Management, vol. 8, no. 2, pp. 88-94, April 2010. [EI]
  15. Chin-Chen Chang, Pei-Yu Lin*, Zhi-Hui Wang and Ming-Chu Li, "A Sudoku-based Secret Image Sharing Scheme with Reversibility," Journal of Communications, vol. 5, no. 1, pp. 5-12, January 2010. [EI]
  16. Pei-Yu Lin*, Jung-San Lee and Chin-Chen Chang, "Dual Digital Watermarking for Internet Media Based on Hybrid Strategies," IEEE Transactions on Circuits and Systems for Video Technology, vol. 19, no. 8, pp. 1169-1177, August 2009. [SCI]
B. Local Journal Papers
  1. 謝韋帆, 林珮瑜, 陳惠惠, "分析數位內容產業的安全需求:以社群網站為例," 資訊傳播研究 (Journal of Information Communication), vol. 2, no. 2, pp. 21-38, April 2012.
  2. 林珮瑜, "具可回復性與分散性之數位媒體內容管理技術," 資訊安全通訊 (Communications of the CCISA),中華民國資訊安全學會, vol. 17, no. 1, pp. 37-49, January 2011.
C. International Conference Papers
  1. Pei-Yu Lin, Yi-Hui Chen* and Jun-Chou Chuang, "A (n, n)-threshold Secret Sharing Scheme for Barcode Application," International Computer Symposium (ICS 2014), Taichung, Taiwan, December 12-14, vol. 2, pp. 296-301, 2014.
  2. Jen-Ho Yang and Pei-Yu Lin*, "An ID-based User Authentication Scheme for Cloud Computing," The Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2014), Kitakyushu, Japan, August 27-29, pp. 98-101, 2014.
  3. Chi-Shiang Chan, Yi-Hui Chen* and Pei-Yu Lin, "An Image Hiding Method by Applying Tree Structure on Linking Pixels," The Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2014), Kitakyushu, Japan, August 27-29, pp. 110-113, 2014.
  4. Yi-Hui Chen, Pei-Yu Lin*, Chih-Yang Lin and Wanutchaporn Sirakriengkrai, "Block-Based Image Authentication Scheme with Located and Repairable Abilities," The 27th IPPR Conference on Computer Vision, Graphics, and Image Processing (CVGIP 2014), Pingtung, Taiwan, August 17-19, 2014.
  5. Jun-Chou Chuang*, Yi-Fang Cai and Pei-Yu Lin, "Histogram-Based Reversible Hiding for JPEG Compressed Images," 2014 International Conference on Information Technology and Management Engineering(ITME2014), Hong Kong, April 26-27, 2014.
  6. Fu-Ming Juang*, Ming-Chieh Hsu and Pei-Yu Lin, "The Exploration of Design Cognitive Thinking and Corporate Marketing Mix in Dynamic Logos," The Fifth Asian Conference on Arts and Humanities 2014, Osaka, Japan, April 3-6, 2014.
  7. Jen-Ho Yang*, Pei-Yu Lin, Chi-Lun Liu, Shu-Ting Hsueh, "A New E-payment Mechanism with Anonymity for Mobile Commerce," 2014 International Conference on e-Commerce, e-Administration, e-Society, e-Education, and e-Technology (e-CASE & e-Tech 2014), Nagoya University, Japan, April 2-4, 2014.
  8. Pei-Yu Lin*, Yi-Hui Chen, Eric Jui-Lin Lu and Ping-Jung Chen, "Secret Hiding Mechanism Using QR Barcode," The 9th International Conference on SIGNAL IMAGE TECHNOLOGY & INTERNET-BASED SYSTEMS (SITIS'13), Kyoto Terrsa, Japan, pp. 22-25, December 2-5, 2013.
  9. Pei-Yu Lin*, Yi-Hui Chen, Ming-Chieh Hsu and Fu-Ming Juang, "Secret Sharing Mechanism with Cheater Detection," Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA 2013) , Kaohsiung, Taiwan, pp. 1-4, October 29-November 1, 2013.
  10. Jun-Chou Chuang* and Pei-Yu Lin, "Reversible Image Authentication Scheme for VQ Images Using Codebook Clustering," International Conference on Advances In Computer and Electronics Technology (ACET 2013), Hong Kong, China, pp. 47-51, August 03-04, 2013.
  11. Wei-Fan Hsieh and Pei-Yu Lin*, "Imperceptible Visible Watermarking Scheme using Color Distribution Modulation," The 9th IEEE International Conference on Ubiquitous Intelligence and Computing (UIC 2012), Fukuoka, Japan, pp. 1002-1005, September 04-07, 2012. [EI]
  12. Wei-Fan Hsieh and Pei-Yu Lin*, "Analyze the Digital Watermarking Security Demands for the Facebook Website," The 6th International Conference on Genetic and Evolutionary Computing (ICGEC 2012), Kitakyushu, Japan, pp. 31-34, August 25-28, 2012. [EI]
  13. Pei-Yu Lin*, "Verifiable and Lossless Distributed Media Content Sharing," The 8th International Conference on Ubiquitous Intelligence and Computing (UIC 2011), Banff, Canada, vol. 6905 of LNCS, pp. 79-93, September 2-4, 2011. [EI]
  14. Pei-Yu Lin* and Chi-Shiang Chan, "A Verifiable and Recoverable Secret Image Sharing Mechanism," The 9th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA 2011), Busan, Korea, pp. 288-293, May 26-28, 2011. [EI]
  15. Yu-Wen Wang, Ming Chieh Hsu and P. Y. Lin, "Exploring Gender Differences in Children's Cognitive Interaction of E-book on Children’s Learning Motivation," 2012 International Conference on e-Commerce, e-Administration, e-Society, e-Education, and e-Technology (e-CASE & e-Tech 2012), HungKong, China, pp. 1212-1221, March 30-April 01, 2012.
  16. Jia-Yu Lin, Lola C. P. Chen and Pei-Yu Lin, "Discussion of Related Theories to Children's Mobile-Learning of Acceptance and E-book Usage," 2011 International Conference on e-Commerce, e-Administration, e-Society, e-Education, and e-Technology (e-CASE & e-Tech 2011), Tokyo, Japan, pp. 1972-1988, January 18-20, 2011.
  17. Jia-Wei Lin, Lola C. P. Chen and Pei-Yu Lin, "An Exploration in the Theories of Online Advergames," 2011 International Conference on e-Commerce, e-Administration, e-Society, e-Education, and e-Technology(e-CASE & e-Tech 2011), Tokyo, Japan, pp. 36-47, January 18-20, 2011.
D. Local Conference Papers
  1. Pei-Yu Lin*, "Secret Sharing Mechanism for Two-dimensional barcode," Progress on Cryptography - 20 Years of Cryptography in Taiwan, Taichung, Taiwan, November 8, 2014.
  2. 葉亞婷, 林珮瑜*, "自動化使用者識別系統基於嵌入式QR碼," 第四屆網路智能與應用研討會 (2014 The Fourth National Conference on Web Intelligence and Applications, NCWIA 2014), Penghu, Taiwan, May 02-03, 2014.
  3. 王郁雯, 許明潔, 林珮瑜, "兒童電子書之互動性於體驗學習研究,"2011 International Conference on Visual Communication Design (原創100-視覺設計國際學術研討會), Taipei, Taiwan, pp. 72-77, October 21, 2011.
  4. 龍思豪, 鄭月秀, 林珮瑜, "網路Banner設計風格特性分析-以金犢獎第十五屆到第十九屆佳作以上作品為例,"International Conference of Web 2.0 and Education (ICWE 2010), Jhongli City, Taoyuan County, Taiwan, pp. 122-135, November 20, 2010.
Go to top