Chung-Huang Yang’s research while affiliated with National Kaohsiung Normal University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (83)


Special issue on advance in multimedia and its application for convergence technologies
  • Article

May 2015

·

15 Reads

Telecommunication Systems

Seok-Hun Kim

·

Chung-Huang Yang

The special issue of Telecommunication Systems is intended to encourage the latest research in the area of multimedia and its application for convergence Technologies (MACT). The MACT offers significant opportunities for various modern multimedia applications and systems, such as ubiquitous computing technology, human?computer interaction, and convergence in multimedia technology, Bio-chips, RFID, and multimedia visualization. This special issue will also serve as a significant source for multimedia and its application convergence and will provide a reader with the most important new technologies in areas of multimedia and application processing for convergence.


A Secure Scalar Product Protocol and Its Applications to Computational Geometry

August 2013

·

27 Reads

·

7 Citations

Journal of Computers

A secure scalar product protocol is a type of specific SMC problem, and has found various applications in many areas such as privacy-preserving data mining, privacy-preserving cooperative statistical analysis, and privacy-preserving geometry computation. In this paper, we firstly extend to a solution of homomorphic-encryption based secure scalar product protocol such that it enables the scheme to be used in distributed decryption, and to deal with negative vectors. Secondly, we propose two-party secure computation of a public Boolean function on private inputs of each party. Thirdly, we describe two applications of our secure scalar product protocol to computational geometry: determining securely location of a point to a directed line segment, and conditional oblivious transfer based on the relation between a private point and a private directed line.


Design and Implementation of Digital Forensic Software for iPhone

July 2013

·

46 Reads

·

4 Citations

IPhone, which is equipped with the iOS operating system has become one of the most popular smart phones since its release in June, 2007, with its popularity and extensive use, it has certainly become the microcomputer that is necessary in our daily lives. However, the increasing trend of safety and criminal issues has made the development of iPhone forensics become a must. Because of the gradual development and the increasing attention it receives, it's required to develop forensic software. The aim of the research is to develop and implement Mac operating system forensic software towards iOS system which uses Objective-C and Shell Script. We conduct logical acquisition through the forensic program combined with open source device-libimobile device to conduct logical collection on the device. to extract phone calls, text messages, photos, contact list, web browsing information, SIM card information, memos, etc, use the characteristic of SQLite to recover old and deleted data to assist the investigators to conduct the acquisition and analysis of digital evidence.


Physical Forensic Acquisition and Pattern Unlock on Android Smart Phones

May 2013

·

790 Reads

·

5 Citations

Lecture Notes in Electrical Engineering

Since the Android operating system was released by Google in 2007, it has developed to the top smart phone sales around the world. Meanwhile, Android has also designed many measures of security protection for the users, and the pattern lock is one of the most popular ways on Android smart phones. However, this kind of function may be seen as a protection way to criminals. Therefore, there comes the need of physical acquisition and unlocking the pattern lock on Android devices for digital forensics. This research is based on the process of mobile forensics provided by National Institute of Standards and Technology, which is designed for physical acquisition, images making and pattern unlock when the Android smart phones are under the pattern lock. The evidence and images can be analyzed through computers and it can increase the capability of restoring the deleted data, and the unlocked mobile can be used to do logical acquisition.


Future Information Communication Technology and Applications: ICFICE 2013

January 2013

·

74 Reads

·

3 Citations

Lecture Notes in Electrical Engineering

These proceedings are based on the 2013 International Conference on Future Information & Communication Engineering (ICFICE 2013), which will be held at Shenyang in China from June 24-26, 2013. The conference is open to all over the world, and participation from Asia-Pacific region is particularly encouraged. The focus of this conference is on all technical aspects of electronics, information, and communications ICFICE-13 will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of FICE. In addition, the conference will publish high quality papers which are closely related to the various theories and practical applications in FICE. Furthermore, we expect that the conference and its publications will be a trigger for further related research and technology improvements in this important subject. "This work was supported by the NIPA (National IT Industry Promotion Agency) of Korea Grant funded by the Korean Government (Ministry of Science, ICT & Future Planning). "



A Secure Scalar Product Protocol Against Malicious Adversaries

January 2013

·

30 Reads

·

7 Citations

Journal of Computer Science and Technology

A secure scalar product protocol is a type of specific secure multi-party computation problem. Using this kind of protocol, two involved parties are able to jointly compute the scalar product of their private vectors, but no party will reveal any information about his/her private vector to another one. The secure scalar product protocol is of great importance in many privacy-preserving applications such as privacy-preserving data mining, privacy-preserving cooperative statistical analysis, and privacy-preserving geometry computation. In this paper, we give an efficient and secure scalar product protocol in the presence of malicious adversaries based on two important tools: the proof of knowledge of a discrete logarithm and the verifiable encryption. The security of the new protocol is proved under the standard simulation-based definitions. Compared with the existing schemes, our scheme offers higher efficiency because of avoiding inefficient cut-and-choose proofs.


Design and Implementation of Forensic Systems for Android Devices based on Cloud Computing

January 2012

·

128 Reads

·

7 Citations

Applied Mathematics & Information Sciences

As popularity of the smart phones continues to grow, it changes the way of cyber crime. Number of cyber crime increases dramatically in recent years and investigators have been facing the difficulty of admissibility of digital evidence on smart phones. To solve this problem, we must collect evidence by digital forensics techniques and analyze the digital data, or recover the damaged data in the phones. In this paper, we describe the design and implementation results of forensics software for Android smart phones. Our design is based on guidelines from the National Institute of Standards and Technology for cell phone forensics to ensure the effectiveness of digital evidence and credibility of the evidence on judicial review. In order to minimize the alteration of original evidence source in mobile phones, cloud computing platform is used to flexibly select proper forensic software and store the forensic results.


Design and Implementation of Live SD Acquisition Tool in Android Smart Phone

August 2011

·

76 Reads

·

33 Citations

From the end of 2007, the open-source characteristic of Android platform has been the most competitive one in the smart phone market. According to recent statistics from Gartner, Android's market share in February 2010 is 3.9%, rises to 17.2% in August in the same year, and reaches 22.7% in February 2011, which only falls behind Nokia's by 14.9%. From its skyrocketing growth rate, it can be expected that Google's Android operating system would become the dominate mobile platform. However, high market share comes with problems. For instance, in March 2011, Lookout, an information security company shows Dorid Dream will make the Android phones become the media of Bot Network. The ever-changing criminal conduct continuously challenges how well the present digital forensics could react. Data acquisition is an important part in mobile phone forensics. As the mobile forensic software becomes more mature and popular, most of them are now facing the same problem where the internal collecting tools must be installed in the mobile phones first so the data collecting could be started in turn. Whether this process is against the concept of protecting the original crime scene in forensics is questionable. A new concept called Live SD is therefore introduced in this work. It utilizes the concept of data recovery to perform physical data acquisition in Android smart phones. This data-acquisition methodology differs from the current ones in most mobile forensics software and can effectively perform the recovery of the deleted data.


Design and Implementation of Windows Based Computer Forensics Management System

May 2011

·

74 Reads

Computer management in campus had always been the core task for computer teachers. With the upgrades of computer equipment and network speed, the network traffic showed a higher pattern than before. However, the students' perception of computer system safety and intellectual property right did not improve accordingly, which resulted in several information safety issues, and the Internet managing employees would receive warning letters frequently. Since most schools in Taiwan adopted MS-Windows as the main operating system, this research developed an integration system for platforms of information safety forensics, with expectation to take use of this sound tool to assist in data collection of forensics-related tasks in campus, and prevent from computer crimes, or even provided forensics evidences for governmental entity. This research took MS-Windows as development platform, to adopt free digital forensics tools to come up with a Chinese localization version of computer forensics management system with automatic data collecting process, and may produce and analyze the image file with Live DVD/USB, to effectively record and manage the relative problems of campus computer usage, and also served as the data source for computer abuse or crime.


Citations (43)


... Yang, Ting, and Karamanoglu [31] implied that Lévy flight has an excellent capability to explore the search space. A new swarm intelligence-based algorithm Cuckoo Search (CS) introduced by Yang and Deb [32] contributed Lévy flight in the search strategy of the algorithm. Many researchers examined CS, and the result showed that it had an advanced performance [32]. ...

Reference:

An Improved particle swarm optimization based on lévy flight and simulated annealing for high dimensional optimization problem
Future Information Communication Technology and Applications: ICFICE 2013
  • Citing Book
  • January 2013

Lecture Notes in Electrical Engineering

... To know user's expectations, this study has considered user's reviews on Google Play Store when identify the threat model. The application rank can be divided into three zones, i.e. upper zone (rank 1-10), middle zone (rank [11][12][13][14][15][16][17][18][19][20], and lower zone (rank 21-30). Based on these zones, the applications that have more downloads (>1.000.000) are 8 of 10, 3 of 10, and 3 of 10 respectively, and the applications that have higher version numbers (> v1) are 7 of 10, 4 of 10, and 1 of 10 respectively. ...

Physical Forensic Acquisition and Pattern Unlock on Android Smart Phones
  • Citing Article
  • May 2013

Lecture Notes in Electrical Engineering

... Motivated by Goldwasser's prediction and Goldreich's observation, cryptographic researchers have been studying various secure multiparty computation problems, finding their solutions and applications. The problems studied include secure multiparty scientific computation [1,[7][8][9][10], secure statistical analysis [11][12][13][14], privacy-preserving data mining [15][16][17][18][19][20], secure multiparty computational geometry Efficient private subset computation J. Dou et al. [21][22][23][24][25], and the application of secure multiparty computation, to mention a few. ...

A Secure Scalar Product Protocol and Its Applications to Computational Geometry
  • Citing Article
  • August 2013

Journal of Computers

... The SD-Card is then processed on a Linux computer before the collected data can be inspected. In an attempt to eliminate the SD-Card requirements and minimize alteration of original evidence source in mobile phones, Yang et al. [13] proposed substituting a cloud computing platform for SD-Card. There remains a flaw in both designs as they only collect data instantly and not continuously. ...

Design and Implementation of Forensic Systems for Android Devices based on Cloud Computing
  • Citing Article
  • January 2012

Applied Mathematics & Information Sciences

... In addition to this, iOS also contains the data generated by the third party applications which are from App Store. IOS device has two kinds of storage formats: one is property list file(plist) in binary form, it's used to store some setup information; another is SQLite database, it's used to store personal information [8]. ...

Design and Implementation of Digital Forensic Software for iPhone
  • Citing Conference Paper
  • July 2013

... [28,29] require fully homomorphic encryption scheme, but practical fully homomorphic encryption scheme is not available at present. Yang et al. propose a scalar product protocol that can resist malicious adversaries based on verifiable encryption and discrete logarithm problems in Ref. [30]. However, the protocol requires that the vector components belong to Z n . ...

A Secure Scalar Product Protocol Against Malicious Adversaries
  • Citing Article
  • January 2013

Journal of Computer Science and Technology

... With an embedded microcontroller, smart cards have the unique ability to store large amounts of data, carry out their own on-card functions (e.g., encryption and mutual authentication) and interact intelligently with a smart card reader. Smart card technology conforms to international standards (ISO/IEC 7816 and ISO/IEC 14443) [17,18] and is available in a variety of form factors. Smart cards offer a high degree of physical security, secure data storage and support many authentication techniques commonly used to protect physical and logical access, including support for advanced symmetric encryption techniques like DES, 3DES, and asymmetric key services (like 1024 bit RSA) [18,19]. ...

High Speed Software Driven AES Algorithm on IC Smartcards
  • Citing Article
  • January 2004

... Otherwise, the signature may be fraudulent or the message altered. In this paper, we carry out the implementation of digital signature algorithms on IC cards using byte-unit modular arithmetic algorithm method [13], [20] . New arithmetic algorithms are proposed and implemented and we also evaluated the performance of well-knows ESIGN [3], [14] and RSA [18] digital signature algorithms on the Hitachi Copyright c 2005 The Institute of Electronics, Information and Communication Engineers H8/300 8-bit IC cards. ...

A Modular-Multiplication Algorithm using Lookahead Determination
  • Citing Article
  • January 1993

... Recent advances on environmental applications are related to new methods and circuitry associated with ISFETs. An analog processor design for an ISFET based flow system and its application in smart living space was presented by Chung et al. [69]. The authors stated that the results could be directly used in drinking water and swimming pool monitoring for improving living space and quality. ...

Analog processor design for potentiometric sensor array and its applications in smart living space - art. no. 65760W
  • Citing Article
  • April 2007

Proceedings of SPIE - The International Society for Optical Engineering

·

You-Lin Tsai

·

Tai-Tsun Liu

·

[...]

·

Bohdan Jaroszewicz

... The idea of that approach is to introduce time-varying error sources that give a non-stationary impulse response. This increases significantly the robust when comparing to other approaches that use modular arithmetic based encryption [3]. All those modular arithmetic algorithms divide the information by a number that is often referred to as encryption key. ...

Modular Arithmetic: From Ancient India to Public-Key Cryptography
  • Citing Article