Min-Shiang Hwang

Min-Shiang Hwang
Asia University · Department of Information Engineering

Doctor of Engineering

About

372
Publications
36,185
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
11,966
Citations

Publications

Publications (372)
Article
Full-text available
Since the beginning of stock trading, investors and researchers have tried to find effective ways to predict the direction of stock prices on the next day. However, predicting stock prices is a hard task because there exist many factors that may affect the next day’s stock prices. Recently, investors and researchers have adopted machine learning te...
Article
Wireless communication is a convenient but not secure transmission media. For internet application, such as E-commerce, there are a lot of private information existed. To protect the secret information inside and to set up a secure communication becomes an urgent topic. The purpose of a perfect communication system is to ensure the authentic destin...
Article
Full-text available
In addition to substituting low-price and low-quality materials for high-quality materials at the food processing stage, many dishonest businesses risk adulterating chemical materials in products to reduce production costs or increase product flavor with chemical synthesis spices. As a result, the risks to food safety are increased. Most safety man...
Article
Full-text available
The rapid development of digital multimedia has resulted in a massive storm of large-scale data. The data compression method reduces data size and lowers transmission costs. As a result, data-hiding research in the compression domain poses significant challenges to researchers. This work proposes a highly imperceptible data-hiding scheme for a comp...
Preprint
Full-text available
The rapid development of digital multimedia has resulted in a massive storm of large-scale data. The data compression method reduces data size and lowers transmission costs. As a result, data-hiding research in the compression domain poses significant challenges to researchers. This paper proposes a highly imperceptible data-hiding scheme for a com...
Chapter
The privacy and security are highly requested in the cooperative communication system. The information is sent to the destination with the help of relays. In the system, there might be the eavesdroppers playing the role of the relay. It suffers the system security. Traditionally, the complex and difficult encryption scheme would be applied to a hig...
Article
Full-text available
Coverless data hiding is resistant to steganalytical tool attacks because a stego image is not altered. On the other hand, one of its flaws is its limited hiding capacity. Recently, a coverless data-hiding method, known as the coverless information-hiding method based on the most significant bit of the cover image (CIHMSB), has been developed. This...
Article
The most common consumer behavior was to pay in cash at a physical store in the past. However, with the rapid development and popularization of smart handheld devices and computers, merchants have had many innovative business models in recent years. For example, the digital cryptocurrency Bitcoin has the advantages of decentralization, anonymity, a...
Article
Full-text available
In the vehicular ad hoc network, moving vehicles can keep communicating with each other by entering or leaving the network at any time to establish a new connection. However, since many users transmit a substantial number of messages, it may cause reception delays and affect the entire system. A certificateless aggregate signature scheme can provid...
Article
With the popularity of cloud storage, integrity verification for outsourced data has attracted more and more attention. The majority of existing research works rely on a unique third-party auditor (TPA) or fixed TPAs to audit the integrity of outsourced data, and thus they are vulnerable to DoS and collusion attacks as the TPA is not completely tru...
Article
Full-text available
Research related to the authentication schemes in vehicular ad hoc networks (VANETs) has received significant attention recently. They substantially impact the security and privacy aspects of the message dissemination process in the road environment. Some authentication schemes with certificateless aggregate signature (CLAS) in VANETs have been pub...
Article
Full-text available
Research related to vehicular ad hoc networks (VANETs) has received significant attention in recent years. Despite all the advantages, the security and privacy in VANETs still become the main challenge that is widely open to discussion. The authentication scheme plays a substantial role to guarantee the security and privacy of information circulati...
Article
Full-text available
The study of security and privacy in vehicular ad hoc networks (VANETs) has become a hot topic that is wide open to discussion. As the quintessence of this aspect, authentication schemes deployed in VANETs play a substantial role in providing secure communication among vehicles and the surrounding infrastructures. Many researchers have proposed a v...
Article
This research mainly explores the significance of tourism expenditure and wealth effect, and the relationship between tourism expenditure and age. Discuss that the increase in the overall wealth effect will increase spending on tourism for aging. This study uses the Quantile Regression model to analyze tourism expenditure behaviour. The empirical r...
Article
Full-text available
As a “wide-deployed” wireless local area networks (WLANs) standard, the IEEE 802.11n was designed to support a high data transmission rate (up to 600 Mbps) and maintain a compatibility with the previous versions. Due to a substantial demand of real-time data services, such as VoIP and video conference, an enhanced quality of service (QoS) mechanism...
Article
Full-text available
The main purpose of user authentication schemes is to verify the authorized user using a server via an insecure channel. With the authentication, a server and a user could have a mutual authentication. In 2019, Cao proposed an improvement of a user authentication scheme. The scheme was postulated in that it could protect from the several possible a...
Article
Data hiding in the compression domain is a very common method. Nowadays, the images to be transferred are usually compressed first. Therefore, data hiding in the compression domain becomes more and more important. Joint-neighbor coding uses the pixel that wants to be compressed, and its nearby pixels are used to embed the secret information. Absolu...
Article
Full-text available
The performance of dense wavelength division multiplexing (DWDM) system in optical fiber network communication is influenced by various factors, one of them is called a nonlinear effect. Stimulated Raman Scattering (SRS) is one of the nonlinear effects that occur due to a high-power level utilization, causes a signal scattering phenomenon that grow...
Conference Paper
Full-text available
Invalid signatures produced by some adversaries may pose a severe challenge to the recipient. Furthermore, identifying an invalid signature in a bunch of messages could be a complex and challenging task to do. Batch verification is an idea to simultaneously verify multiple digital signatures in just one exponential operation time. By this scheme, w...
Preprint
Full-text available
p>Seasonality is one of the significant features in tourism market. This study employs the X-13 ARIMA-SEATS method to tourism market in Taiwan. Tourists who had come to Taiwan from 1981 to 2016 mainly came from Asia, followed by the Americas and Europe. In Asian area, tourists from Mainland China account for the highest percentage, followed by Hong...
Preprint
p>Seasonality is one of the significant features in tourism market. This study employs the X-13 ARIMA-SEATS method to tourism market in Taiwan. Tourists who had come to Taiwan from 1981 to 2016 mainly came from Asia, followed by the Americas and Europe. In Asian area, tourists from Mainland China account for the highest percentage, followed by Hong...
Article
Full-text available
The remote nodes using a selecting relay algorithm (SRA) transmit its dates on wireless sensor networks (WSNs). The algorithm can enhance the network life cycle. It selects an appropriate cooperation node as a relay node by balancing between power consumption and communication. More recently, scholars have applied a fuzzy theory to SRA and achieved...
Article
The online course evaluation system for teaching evaluation and STEM education is a new field of research, but the anonymity of such a system is rarely discussed. An online evaluation system that requires a login will make students feel as if they were writing names on real answer sheets, and therefore causes them set aside their true feelings abou...
Article
The quality of a teacher is the most important factor that affects students’ learning and achievement. The weak or incompetent teachers are a threat to the reputation of the profession and the quality of education that students receive. Recently, educators and policymakers are concerned on how to improve teacher quality. Many types of research have...
Article
Full-text available
It is useful to verify a legal user from a remote terminal through the Internet with the user authentication schemes based on the smart card. Usually, the remote user has to use his/her identification accompanying the password to access the system. This action is an important scheme to protect the user’s privacy and confidentiality. To achieve the...
Article
Full-text available
Zhu proposed a provable privacy-protection system which could achieve two kinds of privacy protection and switch between them optionally by users. He claimed his scheme could achieve anonymous, privacy-protection, and practical multi-server architecture. His scheme is based on chaotic maps. He thus claimed his scheme can not only own high efficienc...
Conference Paper
Full-text available
This study investigates a comparison between Enhanced Distribution Channel Access (EDCA) against the "legacy" IEEE 802.11 Distributed Coordination Function (DCF) method for three traffic services e.g. voice, video streaming, and data, using an NS-3 simulator. The results showed that EDCA can fix the value of end-to-end delay and jitter better again...
Article
The idea of public key encryption with keyword search (PEKS), proposed by Boneh et al., enables one to send a trapdoor containing a encrypted keyword to query data without revealing the keyword. In Boneh et al.’s design, the trapdoor has to be transferred through a secure channel, which is both costly and inefficient. Baek et al. then proposed an e...
Article
Full-text available
Recently, Guo et al. proposed a secure and efficient mutual authentication and key agreement protocol with smart cards for wireless communications. There are two main contributions of their scheme: confidentiality of the session key and updating the password efficiently. They claimed that their scheme could withstand various known types of attacks:...
Chapter
Cooperative system is a tendency for the future communications because of its spatial diversity to improve the system performance. However, the security is a critical issue in the wireless application with a highly private request. Although the encryption schemes have been proposed to approach the secure purpose, those schemes need a lot of computi...
Chapter
It’s easy to access Internet resources in the cloud environment. And it’s important to protect the legal users’ privacy and confidentiality. Recently, Hou and Wang proposed a robust and efficient user authentication scheme based on elliptic curve cryptosystem. Their scheme was practical and easy to implement. They claimed that their scheme could ag...
Chapter
In this paper, we will show that the authentication protocol for roaming service proposed by Hwang-Chang is vulnerable to Denial-of-Service attack. Most important we also will show that the protocol may cause the mobile communication system to become insecure because the home network is fully trusted and because the security responsibility of each...
Chapter
In this article, we analyze Tan et al.’s serverless RFID authentication and search protocols. Tan et al. proposed a serverless RFID system to solve this problem without a central database while protecting the data in the portable reader. Their protocol based on serverless RFID system includes the design of a secure protocol to protect the data of t...
Article
Full-text available
One of major applications in cloud computing is cloud storage service. It's an important research issue to protect the stored data from illegal access by the system manager in the Cloud. To encrypt entire file by using data owner's secret keys is the simple solution. However it will raise a key management problem. To solve this problem, Hwang and S...
Article
Full-text available
In the traditional smart card-based password authentication schemes, the authentication is only applied to verify both of server and user, but not applied to verify the platform. Recently, Yang, Ma, and Jiang proposed a mutual authentication scheme with smart cards and password under trusted computing. Their scheme was designed to authenticate the...
Article
Full-text available
Password-based authentication protocols are susceptible to various attacks. Recently, Sood, Sarje, and Singh proposed an inverse cookie-based virtual password authentication protocol. Their protocol is practical and easy to implement. They claim that their scheme is secure to against various attacks, include online dictionary attack, offline dictio...
Article
Full-text available
Using smart cards make remote transactions easier for users in Internet. It's important to identity the legal users to have the access right to obtain the resources. In 2017, Liu et al. proposed an efficient and secure smart card based password authentication scheme. Recently, Moon et al. pointed some weaknesses of Liu et al.'s scheme. They also pr...
Article
Full-text available
In this paper, we propose an improved threshold signature and authenticated encryption for group communications. The proposed scheme gives the user the power to dynamically designate the participants in the verifying group so that they can cooperate to verify the threshold signature. The improved scheme is more practical in real-world applications.
Chapter
In recent years, product records become more common to merchandize sold in retail stores, but the current product record system used today can’t assure product’s quality after products were transported through the whole supply chain. During transportation, merchandise may be damaged accidentally or condition changed. Those events do not get recorde...
Article
Group signature scheme could be applied to the valid members to represent the group. The validity of the signature could be verified by the receiver. On the other hand, the member who signs the message could not be found. However, the group manager could reveal and identify the signer if it is necessary. Concerning with a high performance on securi...
Article
Data hiding has been popular over the past decades, and many different methods of the data hiding have been pro- posed. Nowadays, data hiding in compressed images becomes more and more popular because of the rise of the social media. Thus, we survey the previous research of data hiding of compressed images to provide the representative methods and...
Article
Full-text available
In this article, we proposed a framework of the intelligent indoor plant factory system. In the proposed system, we will plant with the natural agricultural cultivation, that is, no fertilizers and pesticides in our system. The proposed system includes four modules. They are the setting up system, the collecting data system, the transmitting data s...
Conference Paper
In recent times, Wei et al. proposed a secure smart card based on remote user password authentication scheme. Their scheme is more secure than other schemes. In this article, we will prove their scheme is vulnerable to password guessing attack, privileged insider attack, and denial of service attack. Furthermore, we will propose an improved scheme...
Article
A dual image technique is used as one of the data hiding method. Dual image copies an image to two same images. Through two images to embed or extract secret data, this technique significantly enhances image quality. A dual image technique is good or bad depending on the merits of its algorithm. This paper proposes a method to improve Lu et al. sch...
Article
The proposed scheme groups three pixels as an embedding unit to conceal three bits of secret data in which the possible modification for each pixel is at most +1 or −1. With our new scheme, the probability of altering one pixel by adding 1 or subtracting 1 is 6/8; it is 1/8 when altering two pixels, and 1/8 when preserving pixels without any modifi...
Article
Full-text available
In this paper, we propose new password authenticated key exchange (PAKE) and protected password change (PPC) protocols without any symmetric or public-key cryptosystems. The security of the proposed protocols is based on the computational Diffie-Hellman assumption in the random oracle model. The proposed scheme can resist both forgery server and de...
Article
Now, most institutions share the data through the Internet. With the rapid development of the Internet and the cloud storage, data-sharing becomes so easy that the data was stolen or destroyed easier than before. Therefore, accessing data should strictly control to avoid unauthorized access. In this paper, we propose the more efficient key manageme...
Article
In order to raise the embedding capacity and simultaneously reduce the artifact effect caused by embedding secret messages into binary images, a novel data hiding method based on the combination theory is proposed. In the proposed scheme, a secret position matrix is designed to improve the hiding capacity which is capable of preventing the least di...
Conference Paper
The user authentication scheme has been widely applied to verify the users’ legality. In order to enhance the security, the smart card has widely used in an authentication scheme. Recently, Liu et al. shown that some weaknesses exist in Li et al.’s scheme. An efficient and secure user authentication scheme with a smart card presented by them is mor...
Article
In this article, we propose a publicly verifiable authenticated encryption scheme based on factoring and discrete logarithms. We point out that even if either factoring or discrete logarithms is broken, this scheme still could keep the authentication, integration, and confidentiality of the message.
Conference Paper
With the prevalence of Internet, eLearning provides a platform for education that enables students to take classes online. While eLearning provides a flexible learning environment, it also has drawbacks. This research investigated the potential benefit of the proposed method in an informal formative web-based assessment. The data were collected fro...
Article
A privacy and authentication protocol (PAP) requires a tag to perform four simple operations in mobile communications: comparing two numbers used to execute a hash function, storing and retrieving a number in users' memory banks, and flipping a bit. In this paper, we will propose an improved PAP which is well secured and efficient in a small amount...
Article
A privacy and authentication protocol (PAP) requires a tag to perform four simple operations in mobile communications: Comparing two numbers used to execute a hash function, storing and retrieving a number in users' memory banks, and flipping a bit. In this paper, we will propose an improved PAP which is well secured and efficient in a small amount...
Article
This paper studies a key management problem for a conditional access system with a control word, an authorization key, a distribution key and the master private key. Using a new key store structure and multiple select groups, we can reduce the memory request size and update time. This problem is considered with a large memory for a matrix of group...
Article
An algorithm that a user has authenticated over remote devices should be designed to consider the limitations of computation and lower power in a wireless sensor networks. Lamport first proposed a one-time password authentication scheme which the password was different in each transaction. In this paper, according to the Lamport's concept we propos...
Article
With the characteristic of spatial diversity and low cost, cooperative system is a tendency for the future communications. In the wireless communication system, there exist degradation factors such as signal fading, multipath transmission, signal inferences, bandwidth limitation and so on. In addition to these degradation factors, the wireless tran...
Article
Following the White Paper HCE that Google released in August 2014, it was expected that NFC mobile phone payment would cause a wave of security discussion. After all, Android HCE will allow anyone to develop his own payment service on the Android platform to get rid of restriction from telecommunications, financial industries, or third party trust...
Article
Recently, storage as a service of cloud computing becomes a new trend to access or share files. Once files are stored in cloud, owner can access files seamlessly by personal computer or mobile device. However, owner may worry about confidentiality and integrity of owner’s files stored in cloud because cloud service providers are not always trustwor...
Article
Full-text available
Considering information security, reversible data hiding methods provide an efficient and simple way to prevent illegal accessing and unauthorized tampering. Adopting converted techniques, original images are going to be transferred to a collection of coefficients to be altered for embedding secret message. Then, the coefficients are converted to s...
Article
Denial-of-service (DoS) attacks against server resources exhaustion are a major security threat to the Internet. A number of defense mechanisms have been proposed against such attacks. Recently, Aura et al. proposed a solution to resist DoS attacks against an authentication protocol. However, their puzzle solution cannot guarantee that all of their...
Article
Cloud computing has been popular as the IT architecture. Cloud service providers offer many services based on cloud computing. Cloud storage service is the cloud services which can provide a huge storage space to solve the bottleneck of the storage space of local end users. However, cloud storage service may have data security because the users' da...
Article
In the letter, we propose an improved model, which is built on AdjointVM. Our model can improve the situation where attackers can successfully intrude two adjacent virtual machines. Because of this situation, it will lead to the collapse of the entire cloud services. This model uses a double circular chain concept, which can be a virtual machine ca...
Article
Recently, Tseng and Wu pointed out that the second pro-tocol of Biswas's two-party keys scheme based on the Diffe-Hellman technique has a security weakness and pro-posed a new protocol to remedy the weakness. In this article, we point out that Tseng-Wu's protocol is vulner-able to a man-in-the-middle attack. An attacker could intercept, delete, or...
Article
Cloud computing technology has matured, so cloud computing produces a wide range of cloud service. Cloud storage services are one of cloud services where cloud service provider can provide storage space to customers. Because cloud storage services bring a lot of convenience, many enterprises and users store the data to the cloud storage. However, t...
Article
Watermarking relational database is a technique which can provide ownership protection and temper proofing for relational databases. Although it has been developed over ten years, it is still not popular. For attracting more people to study this technique, we introduce it in detail in this paper. The main contributions of this paper include: 1) To...
Article
Cloud storage service is one of cloud services where cloud service provider can provide storage space to customers. Because cloud storage service has many advantages which include convenience, high computation and capacity, it attracts the user to outsource data in the cloud. However, the user outsources data directly in cloud storage service that...
Article
As the evolution of mobile technology, mobile devices have become an essential tool in people's daily life. Moreover, with the rapid growth of Internet and mobile networks, people can easily access various services provided by mobile platforms. Many services can be executed on the mobile devices with various mobile applications launched to mobile p...
Article
There are two applications in digital signature schemes with message recovery based on a discrete logarithm problem. One is an authenticated encryption scheme, and the other is a key agreement scheme. Considering that the cryptographic assumptions will be broken in the future, the digital signature scheme with message recovery should also be design...
Article
Full-text available
Due to the rapid growth of smart devices, the development of VANET tends to mature. Although many methods have been proposed to resolve the user privacy issue in vehicular ad hoc network (VANET), users still didn't know what information is collected (e.g. geolocation) and how to use .In this paper, we propose a secure and anonymous scheme for commu...