Kai-Hui Lee’s Home Page

 

Education

Work Experience

Publications

(Chinese version)

E-mail: khlee@mail.mcu.edu.tw

 

 

Education:

Ph.D. Department of Electric Engineering, National Taiwan University of Science and Technology in 2002.

 

Work Experience:

Ø   2012.08~

Professor, Dept. of Computer Science & Information Engineering, MCU.

Ø   2003.08~2012.07

Associate Professor, Dept. of Computer Science & Information Engineering, MCU.

 

 

Publications:

A.   Journal Papers

1.  Pei-Ling Chiu and Kai-Hui Lee*, User-friendly Threshold Visual cryptography with complementary cover images,Signal Processing, DOI: 10.1016/j.sigpro.2014.09.032. (Accepted for publication, 2014/09/24)

(Per: 2013, SCI, IF: 2.238, Ranking: 51/247=20.65% Category: ENGINEERING, ELECTRICAL & ELECTRONIC)

2.  Kai-Hui Lee and Pei-Ling Chiu*, “Sharing Visual Secrets in Single Image Random Dot Stereograms,” IEEE Transactions on Image Processing, vol. 23, no. 10, pp. 4336-4347, October 2014.

(Per: 2013, SCI, IF: 3.111, Ranking: 27/247=10.93% Category: ENGINEERING, ELECTRICAL & ELECTRONIC)

(More results are available on the web-site)

 

3.  Kai-Hui Lee and Pei-Ling Chiu, “Digital Image Sharing by Diverse Image Media,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 1, pp. 88-98, Jan. 2014. (Per: 2013, SCI, IF: 2.065, Ranking: 12/102=11.76% Category: COMPUTER SCIENCE, THEORY & METHODS)

(IEEE-TIFS Cover Page highlighted paper)

4.      Kai-Hui Lee and Pei-Ling Chiu, “Image Size Invariant Visual Cryptography for General Access Structures Subject to Display Quality Constraints,” IEEE Transactions on Image Processing, vol. 22, no. 10, pp. 3830-3841, 2013. (Per: 2012, SCI, IF: 3.199, Ranking: 17/242=7.02% Category: ENGINEERING, ELECTRICAL & ELECTRONIC)

(More results are available on the web-site)

5.      Kai-Hui Lee and Pei-Ling Chiu*, “An Extended Visual Cryptography Algorithm for General Access Structures,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 1, pp. 219-229, 2012. (SCI (2011), IF: 1.34, Ranking: 19/99=19.2%)

6.      Pei-Ling Chiu and Kai-Hui Lee*, “A Simulated Annealing Algorithm for General Threshold Visual Cryptography Schemes,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 992-1001, 2011. (SCI (2010), IF: 1.826, Ranking: 20/97=20.6%)

7.      Pei-Ling Chiu and Kai-Hui Lee*, “A Color Secret Image Sharing Scheme based on Natural Images,” Journal of Information Management, vol. 20, no. 1, pp. 76-96, 2013. (TSSCI)

8.      Pei-Ling Chiu and Kai-Hui Lee*, “A Generic Probabilistic Visual-Secret-Sharing Scheme using Optimization Approach,” International Journal of Innovative Computing, Information and Control, vol. 7, no. 9, pp. 5175-5191, 2011. (SCI (2010), IF: 1.667, ranking: 40/108=37%)

9.      Kai-Hui Lee and Pei-Ling Chiu*, “A High Contrast and Capacity Efficient Visual Cryptography Scheme for the Encryption of Multiple Secret Images,” Optics Communications, no. 284, pp. 2730-2741, June 2011. (SCI (2010), IF:1.517, Ranking:31/78=39.74%)

10.  Kai-Hui Lee and Pei-Ling Chiu*, “Sharing Multiple Digital Images via Halftoning Methods,” Advanced Materials Research Journal, 2011. (EI)

11.  T. L. Lin, S. J. Horng*, K. H. Lee, P. L. Chiu, T. W. Kao, R. S. Run, J. L. Lai and R. J. Chen, “A Visual Sharing Scheme for Multiple Secrets by Camouflaging Process,” International Journal of Innovative Computing, Information and Control, vol. 6, No.12, pp. 5749-5769, December 2010. (SCI (2009), IF: 2.932, ranking: 14/103=13.6%)

12.  T. L. Lin, S. J. Horng*, K. H. Lee, P. L. Chiu,A Novel Visual Secret Sharing Scheme for Multiple Secrets without Pixel Expansion,” Expert Systems with Applications (ESWA), vol. 37, no. 12, pp. 7858-7869, December 2010. (SCI (2009), IF: 2.908, ranking: 15/103 = 14.6%)

13.  Yie-Tarng Chen and Kai-Hui Lee*, “A Flexible Service Model for Advance Reservations”, Computer Networks, Vol. 37/3-4, pp. 251-262, Oct. 2001. (SCI, IF: 1.201, Ranking=23/76=30.26%)

14.  Kai-Hui Lee* and Yie-Tarng Chen, “An Effective Flow Aggregation Algorithm for Advance Reservations”, IEICE transactions on Communications, Vol.E84-B, No.6, JUNE 2001. (SCI, IF: 0.359, ranking=53/76=69.74%)

 

(B) Conference Papers

1.      K. H. Lee, P. L. Chiu, and S. Y. Cheng, “A Probabilistic Approach for General Friendly Threshold Visual Cryptography,” in Proc. 2014 International Conference on Business and Information (BAI2014), Osaka, Japan, July 03-05, 2014.

2.      P.-L. Chiu, K.-H. Lee, K.-W. Peng, and S.-Y. Cheng, “User-friendly Visual Cryptography with Complementary Cover Images,” in Proc. IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP 2013), Beijing, China, July 610, 2013.

3.      P.-L. Chiu, K.-H. Lee, K.-W. Peng, and S.-Y. Cheng, “A New Color Image Sharing Scheme with Natural Shadows,” in Proc. the 10th World Congress on Intelligent Control and Automation (WCICA 2012), Beijing, China, July 68, 2012.

4.      Kai-Hui Lee and Pei-Ling Chiu*, “Sharing Color Secret Images by Innocuous Natural Images,” in Proc. First International Conference on Engineering and Technology Innovation 2011 (ICETI2011), Kenting, Taiwan, November 11–15, 2011.

5.      Kai-Hui Lee and Pei-Ling Chiu*, “Sharing Multiple Digital Images via Halftoning Methods,” in Proc. 2011 International Conference on Materials Science and Information Technology, Singapore, September 16–18, 2011.

6.      臧建柱(碩士生)李開暉,邱佩玲: “高安全性與高機密容量的視覺密碼”, 臺灣網際網路研討會 TANET2010.

7.      K. H. Lee, P. L. Chiu, and K. W. Peng,A Novel Extended Visual Cryptography for General Access Structures,” in Proc. Cryptology and Information Security Conference 2010. (最佳論文候選獎)

8.      K. H. Lee, P. L. Chiu, C. C. Tsang, and P. S. Yeh, “A Patching Algorithm for Extended Visual Cryptography,” in Proc. 2010 Cross-Strait Conference on Information Science and Technology (CSCIST 2010).

9.      P. S. Yeh(碩士生), P. L. Chiu, K. H. Lee, and S. Y. Cheng, “Progressive Visual Cryptography without Pixel Expansion,” in Proc. 2010 Information Technologies Applications and Management Conference (2010ITAM), June 2010.

10. C. C. Tsang(碩士生), K. H. Lee, and P. L. Chiu, “Visual Cryptography based on Natural Images,” in Proc. 2010 Information Technologies Applications and Management Conference (2010ITAM), June 2010.

11.  P. L. Chiu, K. H. Lee, K. W. Peng, and S. Y. Cheng, “A Study on Sensor Networks Considering Accuracy of Target Positioning Services,” in Proc. the International Conference on Information Technologies and Practices -Theories and Applications of Information Systems 2009.

12.  K. H. Lee, P. L. Chiu, T. L. Lin, and K. W. Peng, “A Study on Multiple Visual Secret Sharing Schemes for Binary Images without Pixel Expansion,” in Proc. the International Conference on Information Technologies and Practices -Theories and Applications of Information Systems 2009.

13.  K. W. Peng, P. L. Chiu, and K. H. Lee, “A Multilayer Solution Procedure for CATV Network Planning,” in Proc. the International Conference on Information Technologies and Practices -Theories and Applications of Information Systems 2009.

14.  P. L. Chiu, K. H. Lee, and K. W. Peng, “Improving Positioning Accuracy of Wireless Sensor Networks with Adjustable Detection Radius,” in Proc. the International Conference on Information Technologies and Practices -Theories and Applications of Information Systems 2008.

15.  K. H. Lee and P. L. Chiu, Lifetime Prolonging Algorithms for Wireless Sensor Networks,” in Proc. the International Conference on Information Technologies and Practices -Theories and Applications of Information Systems 2008.

16.  K. H. Lee and P. L. Chiu,A RFID-Reader Placement Algorithm for Location-Sensing,” in Proc. the International Conference on Information Technologies and Practices -Theories and Applications of Information Systems 2006.

17. 李開暉,一個適用於大區域定位的RFID接收器配置演算法之設計, 2006全國電信會議

18.  K. H. Lee and P. L. Chiu, ”A Simulated-Annealing-Based course timetabling Algorithm,” in Proc. the International Conference on Information Technologies and Practices -Theories and Applications of Information Systems 2004.

19.  P. L. Chiu, Y. T. Chen and K. H. Lee, “A Request Scheduling Algorithm to Support Flexible Resource Reservations in Advance,” in Proc. IEEE CCECE 2004, pp. 1971-1974. (EI)

20. Kai-Hui Lee and Yie-Tarng Chen: “Advance Reservation System in VOD Services”, Proceedings of 5th Pacific Workshop on Distributed Multimedia System (DMS’98), July, 1998.

21. Kai-Hui Lee and Yie-Tarng Chen: “A New Advance Resource Reservation Protocol: ARSVP”, Proceedings of International Symposium on Multimedia Information Processing (ISMIP’98), December, 1998.

 

(C) Book Chapters

1.         Kai-Hui Lee, Pei-Ling Chiu*, and Yie-Tarng Chen: “A Highly Efficient Visual Cryptography for Halftone Images,” in Cryptography: Protocols, Design and Applications, Nova Science Publishers, NY, USA. (ISBN: 978-1-62100-779-1) (Pub. Date: 2012 1st quarter)

2.         Kai-Hui Lee* and Yie-Tarng Chen: "Advance Reservation System in VOD Services," in: Advances in Distributed Multimedia Systems, edited by S. K. Chang, T. F. Znati (University of Pittsburg) and S. T. Vuong (University of British Columbia), World Scientific Publisher, Singapore, pp. 240-256, ISBN: 981-02-3560-7, July 1999.

 

描述: 描述: FLAG