1.
W. H. Tsai and K. S. Fu (1979). "A pattern deformational
model and Bayes error-correcting recognition system,"
IEEE Transactions on Systems, Man, and Cybernetics,
Vol. SMC-9, No. 12, pp. 745-756. (SCI, EI)(PDF)
2.
W. H. Tsai and K. S. Fu (1979). "Error-correcting
isomorphisms of attributed relational graphs for pattern
analysis," IEEE Transactions on Systems, Man, and
Cybernetics, Vol. SMC-9, No. 12, pp. 757-768. (SCI,
EI) (PDF)
3.
W. H. Tsai and K. S. Fu (1980). "Attributed grammar -a
tool for combining syntactic and statistical approaches
to pattern recognition," IEEE Transactions on
Systems, Man, and Cybernetics, Vol. SMC-10, No. 12,
pp. 873-885. (SCI, EI) (PDF);
also in Context-Directed Pattern Recognition and
Machine Intelligence Techniques for Information
Processing, Y. H. Pao and G. W. Ernst (Eds.), IEEE
Computer Society Press, Silver Spring, Maryland, U.S.A.,
pp. 79-91.
4.
W. H. Tsai (1981). "An introduction to pattern
recognition applications and principles," Computer
Quarterly, Vol. 15, No. 3 and 4, pp. 41-52 (in
Chinese).
5.
W. H. Tsai and K. S. Fu (1983). "Subgraph
error-correcting isomorphism for syntactic pattern
recognition," IEEE Transactions on Systems, Man, and
Cybernetics, Vol. SMC-13, pp. 48-62. (SCI, EI)
6.
T. C. Fan and W. H. Tsai (1984). "Automatic
Chinese seal identification," Computer Vision,
Graphics, and Image Processing, Vol. 25, pp.
311-330. (SCI, EI) (Abstract)
(PDF)
7.
C. C. Shen and W. H. Tsai (1985). "A graph matching
approach to optimal task assignment in distributed
computing systems using a minimax criterion," IEEE
Transactions on Computers, Vol. C-34, No. 3, pp.
197-203. (SCI, EI) (PDF)
8.
W. H. Tsai (1985). "Moment-preserving thresholding: a
new approach," Computer Vision, Graphics, and Image
Processing, Vol. 29, No. 3, pp. 377-393. (SCI, EI) (PDF);
also in Document image analysis, L.
O'Gorman and R. Kasturi (Eds.), IEEE
Computer Society Press, Los Alamitos, CA,
USA,
pp. 44-60.
9.
W. H. Tsai and S. S. Yu (1985). "Attributed string
matching with merging for shape recognition," IEEE
Transactions on Pattern Analysis and Machine
Intelligence, Vol. PAMI-7, No. 4, pp. 453-462. (SCI,
EI)
(PDF)
10.
W. H. Tsai, S. I. Gao and N. Y. Yeh (1986).
"3-D object recognition by line features using binocular
images," Information Science and Engineering (now
Journal of Information Science and Engineering),
Vol. 2, No. 1, pp. 99-123. (SCI, EI) (Abstract)
11.
H. L. Chou and W. H. Tsai (1986). "A new approach to
robot location by house corners," Pattern Recognition,
Vol. 19, No. 6, pp. 439-451. (SCI, EI) (13th Annual Best
Paper Award, Pattern Recognition Society of U. S. A) (PDF)
12.
W. H. Tsai and Y. C. Chen (1986). "Adaptive
navigation of automated vehicles by image analysis
techniques," IEEE Transactions on Systems, Man, and
Cybernetics, Vol. SMC-16, No. 5, pp. 730-740. (SCI,
EI) (PDF)
13.
C. M. Chen and W. H. Tsai (1986). "Automatic
identification of Chinese seal imprints with arbitrary
or partial shapes," Computer Processing of Chinese
and Oriental Languages, Vol. 2, No. 4, pp. 216-233.
14.
K. C. Chang and W. H. Tsai (1987). "3-D
object inspection from multiple 2-D camera views,"
International Journal of Pattern Recognition and
Artificial Intelligence, Vol. 1, No. 1, pp. 85-102.
(SCI, EI) (Abstract)
15.
M. Y. Lin and W. H. Tsai (1987). "Removing
the ambiguity of phonetic Chinese input by the
relaxation technique," Computer Processing of Chinese
and Oriental Languages, Vol. 3, No. 1, pp. 1-24.
16.
J. J. Leou and W. H. Tsai (1987). "Automatic
rotational symmetry determination for shape analysis,"
Pattern Recognition, Vol. 20, No. 6, pp. 571-582.
(SCI, EI) (Abstract)
17.
L. H. Chen and W. H. Tsai (1988).
"Moment-preserving line detection," Pattern
Recognition, Vol. 21, No. 1, pp. 45-53. (SCI, EI) (Abstract)
18.
L. H. Chen and W. H. Tsai (1988).
"Moment-preserving sharpening --- A new approach to
picture deblurring," Computer Vision, Graphics, and
Image Processing, Vol. 41, No. 1, pp. 1-13. (SCI,
EI) (Abstract) (PDF)
19.
L. H. Chen and W. H. Tsai (1988).
"Moment-preserving curve detection," IEEE
Transactions on Systems, Man, and Cybernetics, Vol.
SMC-18, No. 1, pp. 148-158. (SCI, EI) (PDF)
20.
L. L. Wang and W. H. Tsai (1988). "Optimal
assignment of task modules with precedence for
distributed processing by graph matching and state-space
search," BIT, Vol. 28, No. 1, pp. 54-68. (SCI)(PDF)
21.
C. K. Fan and W. H. Tsai (1988). "Automatic
word identification in Chinese sentences by the
relaxation technique," Computer Processing of Chinese
and Oriental Languages, Vol. 4, No. 1, pp. 35-56.
22.
J. J. Leou and W. H. Tsai (1989). "Robot
monitoring by computer vision - a survey," Journal of
Computers, Vol. 1, No. 2, pp. 10-21.
23.
Y. T. Tsay and W. H. Tsai (1989).
"Model-guided attributed string matching by
split-and-merge for shape recognition," International
Journal of Pattern Recognition and Artificial
Intelligence, Vol. 4, No. 2, pp. 159-179. (SCI, EI)
(Abstract)
24.
S. T. Liu and W. H. Tsai (1989).
"Moment-preserving clustering," Pattern Recognition,
Vol. 22, No. 4, pp. 433-447. (SCI, EI) (Abstract)
25.
M. C. Yang and W. H. Tsai (1989).
"Recognition of 3-D curved object using 2-D cross-
sectional slice shapes," Image and Vision Computing,
Vol. 7, No. 3, pp. 210-216. (SCI, EI) (Abstract)
26.
L. H. Chen and W. H. Tsai (1989).
"Moment-preserving techniques in image processing-a
survey and new approaches," Proceedings of National
Science Council, Republic of China (Part A), Vol.
13, No. 5, pp. 280-301. (EI)
27.
J. J. Leou and W. H. Tsai (1989). "New
sensing strategies for monitoring moving polyhedral
objects by machine vision," IEEE Transactions on
Systems, Man and Cybernetics, Vol. SMC-19, No. 4,
pp. 872-880. (SCI, EI) (PDF)
28.
J. J. Leou and W. H. Tsai (1989). "Optimal
sensor arrangement for robot operation monitoring by
machine vision," International Journal of Robotics
and Automation, Vol. 4, No. 2, pp. 81-121. (SCI, EI)
29.
S. Y. Chen and W. H. Tsai (1989). "Robot location using
surface patches of curved objects," International
Journal of Robotics and Automation, Vol. 4, No. 3,
pp. 123-133. (SCI, EI)
30.
W. H. Tsai (1990). "Combining statistical
and structural methods," in Syntactic and Structural
Pattern Recognition - Theory and Applications,
H. Bunke and A. Sanfeliu (Eds.), World Scientific
Publication Co., Singapore, pp. 349-366.
31.
J. J. Leou and W. H. Tsai (1990). "The
minimum feature point set representing a convex
polyhedron," Pattern Recognition Letters, Vol.
11, No. 3, pp. 225-229. (SCI, EI) (Abstract)
32.
C. H. Liu and W. H. Tsai (1990). "3-D curved
object recognition from multiple 2-D camera views,"
Computer Vision, Graphics, and Image Processing,
Vol. 50, No. 2, pp. 177-187. (SCI, EI) (PDF)
33.
R. Lee, P. C. Lu, and W. H. Tsai (1990).
"Robot location using single views of rectangular
shapes," Photogrammetric Engineering and Remote
Sensing, Vol. 56, No. 2, pp. 231-238. (SCI, EI) (PDF)
34.
C. S. Chen and W. H. Tsai (1990). "A new
fast one-pass thinning algorithm and its parallel
hardware implementation," Pattern Recognition Letters,
Vol. 11, No. 7, pp. 471-477. (SCI, EI) (Abstract)
35.
L. L. Wang and W. H. Tsai (1990). "Computing
camera parameters using vanishing line information from
a rectangular parallelepiped," Machine Vision and
Applications, Vol. 3, No. 3, pp. 129-141. (SCI, EI)
(Abstract)
36.
K. P. Tang and W. H. Tsai (1990). "Infrared
target detection and tracking by region correspondence
in image sequences," Journal of Information Science
and Engineering, Vol. 6, No. 1, pp. 1-24. (SCI, EI)
(Abstract)
37.
R. Lee, P. C. Lu, and W. H. Tsai (1990).
"Moment-preserving detection of elliptical shapes in
gray-scale images," Pattern Recognition Letters,
Vol. 11, No. 6, pp. 405-414. (SCI, EI)(Abstract)
38.
L. H. Chen and W. H. Tsai (1990). "A survey
on moment-preserving techniques in image processing," in
Essays on Computer Vision and Related Topics: in
Memory of Dr. K. S. Fu, J. T. Tou (Ed.), Institute
of Information Science, Academia Sinica, Taipei, Taiwan,
Republic of China, pp. 388-432.
39.
S. T. Liu and W. H. Tsai (1990).
"Moment-preserving corner detection," Pattern
Recognition, Vol. 23, No. 5, pp. 411-421. (SCI,
EI)(Abstract)
40.
S. Y. Chen and W. H. Tsai (1990). "A
systematic approach to analytic determination of camera
parameters by line features," Pattern Recognition,
Vol. 23, No. 8, pp. 859-877. (SCI, EI)(Abstract)
41.
S. S. Yu and W. H. Tsai (1990). "A new
thinning algorithm for gray-scale images by the
relaxation technique," Pattern Recognition, Vol.
23, No. 10, pp. 1067- 1076. (SCI, EI)(Abstract)
42.
C. K. Fan and W. H. Tsai (1990).
"Relaxation-based word identification for removing the
ambiguity in phonetic Chinese input," International
Journal of Pattern Recognition and Artificial
Intelligence, Vol. 4, No. 4, pp. 651-666. (SCI, EI)
(Abstract)
43.
Y. R. Chen and W. H. Tsai (1990).
"Monitoring of nonperiodical robot operations by 3-D
computer vision," Journal of Information Science and
Engineering, Vol. 6, No. 4, pp. 425-443. (SCI, EI)(Abstract)
44.
S. C. Jeng and W. H. Tsai (1990). "Fast generalized
Hough transform," Pattern Recognition Letters,
Vol. 11, No. 11, pp. 725-733. (SCI, EI)(Abstract)
45.
W. H. Tsai and S. L. Chou (1991). "Detection
of generalized principal axes in rotationally symmetric
shapes," Pattern Recognition, Vol. 24, No. 2, pp.
95-104. (SCI, EI) (Abstract)
46.
S. Y. Chen and W. H. Tsai (1991).
"Determination of robot locations by common object
shapes," IEEE Transactions on Robotics and Automation,
Vol. 7, No. 1, pp. 149-156. (SCI, EI) (PDF)
47.
L. L. Wang and W. H. Tsai (1991). "Camera
calibration by vanishing lines for 3D computer vision,"
IEEE Transactions on Pattern Analysis and Machine
Intelligence, Vol. 13, No. 3, pp. 370-376. (SCI, EI)
(PDF)
48.
R. Lee, S. Y. Chen, P. C. Lu, and W. H. Tsai
(1991). "Flying object location using a single view of a
semi-circle running track," Proceedings of National
Science Council (Part A), Republic of China, Vol.
15, No. 1, pp. 40-50. (EI)
49.
L. L. Wang and W. H Tsai (1991). "Collision
Avoidance by a modified least-mean- square-error
classification scheme for indoor autonomous land vehicle
navigation," Journal of Robotic Systems, Vol. 8,
No. 5, pp. 677-698. (SCI, EI) (PDF)
50.
C. F. Lin and W. H. Tsai (1991). "Motion
planning for multiple robots with multi-mode operations
via disjunctive graphs," Robotica, Vol. 9, pp.
393-408. (SCI, EI) (Abstract) (PDF)
51.
S. L. Chou and W. H. Tsai (1991).
"Recognizing handwritten Chinese characters by stroke
-segment matching using an iteration scheme,"
International Journal of Pattern Recognition and
Artificial Intelligence, Vol. 5, No. 1 & 2, pp.
175-197 (SCI, EI) (Abstract) (PDF);
also in Character and Handwriting Recognition, P.
S. P. Wang, Ed., World Scientific Publishing Co.,
Singapore, 1991, pp. 175-198.
52.
S. D. Cheng and W. H. Tsai (1991).
"Model-based guidance of autonomous land vehicles in
indoor environments by structured light using vertical
line information," Journal of Electrical Engineering,
Vol. 34, No. 6, pp. 441-452. (PDF)
53.
S. L. Chou, J. C. Lin, and W. H. Tsai
(1991). "Fold principal axis - a new tool for defining
the orientations of rotational symmetric shapes,"
Pattern Recognition Letters, Vol. 12, No. 2, pp.
109-115. (SCI, EI) (Abstract) (PDF)
54.
S. C. Jeng and W. H. Tsai (1991). "Scale-and
orientation-invariant generalized Hough transform - a
new approach," Pattern Recognition, Vol. 24, No.
11, pp. 1037-1052. (SCI, EI) (Abstract) (PDF)
55.
C. F. Lin and W. H. Tsai (1991). "Trajectory
modeling, collision detection, and motion planning for
two robot manipulators," International Journal of
Robotics and Automation, Vol. 6, No. 4, pp. 193-209.
(SCI, EI) (PDF)
56.
S. S. Yu and W. H. Tsai (1992). "Relaxation
by the Hopfield neural network," Pattern Recognition,
Vol. 25, No. 2, pp. 197-209. (SCI, EI) (Abstract) (PDF)
57.
J. C. Lin, S. L. Chou, and W. H. Tsai
(1992). "Detection of rotationally symmetric shape
orientations by fold-invariant shape-specific points,"
Pattern Recognition, Vol. 25, No. 5, pp. 473-482.
(SCI, EI) (PDF)
58.
R. Y. Wu and W. H. Tsai (1992). "A new
one-pass parallel thinning algorithm for binary images,"
Pattern Recognition Letters, Vol. 13, No.
10, pp. 715-723. (SCI, EI)(Abstract) (PDF)
59.
R. Y. Wu and W. H. Tsai (1992). "A
single-layer neural network for parallel thinning,"
International Journal of Neural Systems, Vol. 3, No.
4, pp. 395-404. (SCI, EI) (Abstract) (PDF)
60.
Y. T. Tsay and W. H. Tsai (1993).
"Attributed string matching by split-and-merge for
on-line Chinese character recognition," IEEE
Transactions on Pattern Analysis and Machine
Intelligence, Vol. 15, No. 2, pp. 180-185. (SCI, EI)
(PDF)
61.
L. L. Wang, P. Y. Ku, and W. H. Tsai (1993).
"Model-based guidance by the longest common subsequence
algorithm for indoor autonomous vehicle navigation,"
Automation in Construction, Vol. 2, pp. 123-137.
(SCI, EI) (Abstract) (PDF)
62.
S. C. Cheng and W. H. Tsai (1993). "A neural
network implementation of the moment-preserving
technique and its application to thresholding," IEEE
Transactions on Computers, Vol. 42, No. 4, pp.
501-507. (SCI, EI) (PDF)
63.
H. S. Hsu and W. H. Tsai (1993).
"Moment-preserving edge detection and its application to
image data compression," Optical Engineering,
Vol. 32, No. 7, pp. 1596-1608. (SCI, EI) (PDF)
64.
S. L. Chou and W. H. Tsai (1993). "Line
segment matching for 3-D computer vision using a new
iteration scheme," Machine Vision and Applications,
Vol. 6, pp. 191-205. (SCI, EI) (Abstract)
65.
S. L. Chou and W. H. Tsai (1993). "On-line
Chinese character recognition through stroke-segment
matching using a new discrete iteration scheme,"
Computer Processing of Chinese and Oriental Languages,
Vol. 7, No. 1, pp. 1-20.
66.
L. H. Chen and W. H. Tsai (1993). "Location
of curved edges to subpixel values," Journal of the
Chinese Institute of Engineers, Vol. 16, No. 5, pp.
589-601. (SCI, EI) (PDF)
67.
S. C. Cheng and W. H. Tsai (1993). "Image
compression using adaptive multilevel block truncation
coding," Journal of Visual Communication and Image
Representation, Vol. 4, No. 3, pp. 225-241. (SCI,
EI)(Abstract) (PDF)
68.
Y. M. Su and W. H. Tsai (1994). "Autonomous
land vehicle guidance for navigation in building
corridors and elevators by computer vision, radio, and
photoelectric sensing techniques," Journal of the
Chinese Institute of Engineers, Vol. 17, No. 1, pp.
63-73. (SCI, EI) (PDF)
69.
J. C. Lin and W. H. Tsai (1994).
"Feature-preserving clustering of 2D data for two-class
problems using analytical formulas: an automatic and
fast approach," IEEE Transactions on Pattern Analysis
and Machine Intelligence, Vol. 16, No. 5, pp.
554-560. (SCI, EI) (PDF)
70.
C. H. Liu and W. H. Tsai (1994).
"Recognizing cylindrical objects by single camera
views," Computers and Mathematics with Applications,
Vol. 27, No. 8, pp. 101-117. (SCI, EI) (Abstract) (PDF)
71.
R. Y. Wu and W. H. Tsai (1994). "Extracting
structural features from binary images by neural
networks," Computer Processing of Chinese and
Oriental Languages, Vol. 8, No. 1, pp. 53-73. (PDF)
72.
S. C. Cheng and W. H. Tsai (1994). "Image
compression using moment-preserving edge detection,"
Pattern Recognition, Vol. 27, No. 11, pp. 1439-1449.
(SCI, EI) (Abstract) (PDF)
73.
R. Y. Wu and W. H. Tsai (1994). "Parallel
thinning by a recurrent neural network," Journal of
Information Science and Engineering, Vol. 10, No. 2,
pp. 221-237. (SCI, EI) (Abstract) (PDF)
74.
J. C. Lin, W. H. Tsai, and J. A. Chen
(1994). "Detecting numbers of folds and orientations in
shapes by a simple mathematical property," Pattern
Recognition Letters, Vol. 15, pp. 1081-1088. (SCI,
EI) (abstract) (PDF)
75.
C. F. Lin and W. H. Tsai (1995). "Optimal
assignment of robot tasks with precedence for
multi-robot coordination by disjunctive graphs and
state-space search," Journal of Robotic Systems,
Vol. 12, No. 4, pp. 219-236. (SCI, EI) (PDF)
76.
C. K. Yang and W. H. Tsai (1995). "Improving
block truncation coding by line and edge information and
adaptive bit plane selection for gray-scale image
compression," Pattern Recognition Letters, Vol.
16, pp. 67-75. (SCI, EI) (PDF)
77.
R. C. Lo and W. H. Tsai (1995). "Gray-scale Hough
transform for thick line detection in gray-scale
images," Pattern Recognition, Vol. 28, No. 5, pp.
647-662. (SCI, EI) (PDF)
78.
C. K. Yang, T. C. Wu, J. C. Lin and W. H.
Tsai (1995). "Color image sharpening by
moment-preserving technique," Signal Processing,
Vol. 45, pp. 397-403. (SCI, EI)(PDF)
79.
C. K. Yang and W. H. Tsai (1996). "Reduction
of color space dimensionality by moment-preserving
thresholding and its application for edge detection in
color images," Pattern
Recognition Letters, Vol. 17, pp. 481-490. (SCI,
EI)(PDF)
80.
R. C. Lo and W. H. Tsai (1996). "Color image
detection and matching using modified generalized Hough
transform," IEE Proceedings-Vision, Image and Signal
Processing, Vol. 143, No. 4, pp. 201-209. (SCI, EI)(PDF)
81.
R. C. Lo and W. H. Tsai (1997).
"Perspective-transform-invariant generalized Hough
transform for perspective shape detection and matching,"
Pattern Recognition, Vol. 30, No. 3, pp. 383-396.
(SCI, EI) (PDF)
82.
J. C. Y. Yang and W. H. Tsai (1997).
"Suppression of Moiré patterns in scanned halftone
images by double scans with grid movements," Pattern
Recognition Letters, Vol. 18, pp. 213-227. (SCI,
EI) (PDF)
83.
C. K. Yang, J. C. Lin, and W. H. Tsai
(1997). "Color image compression by moment-preserving
and block truncation techniques," IEEE Transactions
on Communications, Vol. 45, No. 12, pp. 1513-1516.
(SCI, EI) (PDF)
84.
K. H. Chen and W. H. Tsai (1997).
¡§Vision-based autonomous land vehicle guidance in
outdoor environments using combined line and road
following techniques,¡¨ Journal of Robotic Systems,
Vol. 14, No. 10, pp. 711-728. (SCI, EI) (PDF)
85.
C. K. Yang and W. H. Tsai (1998). ¡§Color
image compression using quantization, thresholding, and
edge detection techniques all based on the
moment-preserving principle,¡¨ Pattern Recognition
Letters, Vol. 19, pp. 205-215. (SCI, EI) (PDF)
86.
J. C. Y. Yang and W. H. Tsai (1998).
¡§Suppression of Moiré patterns in scanned halftone
images,¡¨ Signal Processing, Vol. 70, No. 1, pp.
23-42. (SCI, EI) (PDF)
87.
G. Y. Chen and W. H. Tsai (1998). "An
incremental-learning-by-navigation approach to
vision-based autonomous land vehicle guidance in indoor
environments using vertical line information and
multi-weighted generalized Hough transform," IEEE
Transactions on Systems, Man, and Cybernetics - Part B:
Cybernetics, Vol. 28, No. 5, pp. 740-748. (SCI, EI) (PDF)
88.
K H. Chen and W. H. Tsai (1998).
¡§Vision-based guidance for autonomous land vehicle
navigation in outdoor road environments with static and
moving cars,¡¨ Proceedings of National Science Council
(Part A), Republic of China, Vol. 22, No. 5, pp.
691-702. (EI) (image_PDF)
89.
D. C. Wu and W. H. Tsai (1998). ¡§Data hiding
in images via multiple-based number conversion and lossy
compression,¡¨ IEEE Transactions on Consumer
Electronics, Vol. 44, No. 4, pp.1406-1412. (SCI, EI) (PDF)
90.
Z. F. Yang and W. H. Tsai (1998). ¡§Using
parallel line information for vision-based landmark
location estimation and an application to automatic
helicopter landing,¡¨ Robotics and Computer-Integrated
Manufacturing, Vol. 14, pp. 297-306. (SCI, EI) (PDF)
91.
Y. C. Tseng and W. H. Tsai (1998).¡§Form
segmentation and component classification for clinic
data image analysis,¡¨ Journal of Computers, Vol.
10, No. 1, pp. 27-45.
(PDF)
92.
C. H. Ku and W. H. Tsai (1999). ¡§Smooth
vision-based autonomous land vehicle navigation in
indoor environments by person following using sequential
pattern recognition,¡¨ Journal of Robotic Systems,
Vol. 16, No. 5, pp. 249-262. (SCI, EI) (PDF)
93.
C. H. Ku and W. H. Tsai (1999). ¡§Obstacle
avoidance for autonomous land vehicle navigation in
indoor environments by quadratic classifier,¡¨ IEEE
Transactions on Systems, Man, and Cybernetics --- Part
B: Cybernetics, Vol. 29, No. 3, pp. 416-426. (SCI,
EI) (PDF)
94.
Z. F. Yang and W. H. Tsai (1999). ¡§Viewing
corridors as right parallelepipeds for vision-based
vehicle localization,¡¨ IEEE Transactions on
Industrial Electronics, Vol. 46, No. 3, pp. 653-661.
(SCI, EI) (PDF)
95.
C. C. Lai and W. H. Tsai (1999). ¡§Estimation
of moving vehicle locations using wheel shape
information in single 2-D lateral vehicle images by 3-D
computer vision techniques,¡¨ Robotics and Computer
Integrated Manufacturing, Vol. 15, pp. 111-120.
(SCI, EI) (PDF)
96.
C. C. Chang and W. H. Tsai (1999). ¡§Reliable
determination of object pose from line features by
hypothesis testing,¡¨ IEEE Transactions on Pattern
Analysis and Machine Intelligence, Vol. 21, No. 11,
pp. 1235-1241. (SCI, EI) (PDF)
97.
G. Y. Chen and W. H. Tsai (1999) ¡§A new
approach to vision-based unsupervised learning of
unexplored indoor environment for autonomous land
vehicle navigation,¡¨ Robotics and Computer-Integrated
Manufacturing, Vol. 15, pp. 353-364. (SCI, EI)(PDF)
98.
D. C. Wu and W. H. Tsai (1999). ¡§Embedding of any type
of data in images based on a human visual model and
multiple-based number conversion,¡¨ Pattern
Recognition Letters, Vol. 20, pp. 1511-1517. (SCI,
EI) (PDF)
99.
D. C. Wu and W. H. Tsai (2000). ¡§Spatial-domain image
hiding using an image differencing ,¡¨ IEE
Proceedings -Vision, Image and Signal Processing,
Vol. 147, No. 1, pp. 29-37. (SCI, EI) (PDF)
100.
T. S. Chuang, J. C. Lin and W. H. Tsai
(2000). ¡§A new efficient approach to image hiding,¡¨
Pattern Recognition and Image Analysis (EI), Vol.
10, No. 3, pp. 309-314. (Abstract)
101.
J. C. Y. Yang and W. H. Tsai (2000).
¡§Document image segmentation and quality improvement by
moiré pattern analysis,¡¨ Signal Processing: Image
Communication, Vol. 15, pp. 781-797. (SCI, EI) (PDF)
102.
K H. Chen and W. H. Tsai (2000).
¡§Vision-based obstacle detection and avoidance for
autonomous land vehicle navigation in outdoor roads,¡¨
Automation in Construction, Vol. 10, pp. 1-25. (SCI,
EI) (PDF)
103.
C. H. Tzeng and W. H. Tsai
(2000).¡§Compression of Chinese characters base on
rectangular region partitioning and contour information
encoding,¡¨
International Journal of Computer Processing of Oriental
Languages, Vol. 13, No. 2, pp. 177-202. (Abstract) (PDF)
104.
C. C. Chang and W. H. Tsai (2001).
¡§Vision-based tracking and interpretation of human leg
movement for virtual reality applications,¡¨ IEEE
Transactions on
Circuits and Systems for Video Technology, Vol. 11,
No. 1, pp. 9-24. (SCI, EI) (PDF)
105.
C. H. Ku and W. H. Tsai (2001). ¡§Obstacle
avoidance in person following for vision-based
autonomous land vehicle guidance using vehicle location
estimation and quadratic pattern classifier,¡¨ IEEE
Transactions on Industrial Electronics, Vol. 48,
No. 1, pp. 205-215. (SCI, EI) (PDF)
106.
C. C. Chang and W. H. Tsai (2002).
¡§Determination of head pose and facial expression from a
single perspective view by successive scaled
orthographic approximations,¡¨ International Journal
of Computer Vision, Vol. 46, No. 3, pp. 179-199.
(SCI, EI) (PDF)
107.
C. C. Lai and W. H. Tsai (2002). ¡§Camera
calibration with respect to computer monitors using
eye-glasses with a laser pointer for virtual reality
applications,¡¨ Pattern Recognition and Image Analysis
(EI), Vol. 12, No. 1, pp. 80-96.(Abstract)
108.
C. C. Lin and W. H. Tsai (2003). ¡§Visual
cryptography for gray-level images by dithering
techniques,¡¨ Pattern Recognition Letters, Vol.
24, No. 1-3, pp. 349-358. (SCI, EI) (PDF)
109.
Z. F. Yang and W. H. Tsai (2003). "Watermark
approach to embedded signature-based authentication by
channel statistics," Optical Engineering, Vol.
42, No. 4, pp. 1157-1165. (SCI, EI)(PDF)
110.
D. C. Wu and W. H. Tsai (2003). ¡§A
steganographic method for images by pixel-value
differencing,¡¨ Pattern Recognition Letters, Vol.
24, No. 9-10, pp. 1623-1636. (SCI, EI) (PDF)
111.
C. C. Lin and W. H. Tsai (2003). ¡§Secret
image sharing with capability of share data reduction,¡¨
Optical Engineering, Vol. 42, No. 8, pp.
2340-2345. (SCI, EI) (PDF)
112.
C. H. Tzeng and W. H. Tsai (2003). ¡§A new
approach to authentication of binary images for
multimedia communication with distortion reduction and
security enhancement,¡¨ IEEE Communications Letters,
Vol. 7, No. 9, pp. 443- 445. (SCI, EI) (PDF)
113.
C. H. Tzeng, Z. F. Yang, and W. H. Tsai
(2004). ¡§Adaptive data hiding in palette images by color
ordering and mapping with security protection,¡¨ IEEE
Transactions on Communications, Vol. 52, No. 4, pp.
791-800. (SCI, EI) (PDF)
114.
C. H. Tzeng and W. H. Tsai (2004). ¡§A
combined approach to integrity protection and
verification of palette images using fragile watermarks
and digital signatures,¡¨ IEICE Transactions on
Fundamentals of Electronics, Communications and Computer
Sciences, Vol. E87-A, No. 6, pp. 1612-1619. (SCI, EI)
(Abstract) (PDF)
115.
C. C. Lin and W. H. Tsai (2004). ¡§Secret
multimedia information sharing with data hiding
capability by simple logic operations,¡¨ Pattern
Recognition and Image Analysis, Vol. 14, No. 4, pp.
594-600. (EI) (Abstract)
116.
C. C. Lin and W. H. Tsai (2004/11-12).
¡§Secret image sharing with steganography and
authentication,¡¨ Journal of Systems & Software,
Vol. 73, No. 3, pp. 405-414. (SCI, EI) (PDF)
117.
C. H. Ku and W. H. Tsai (2004).
¡§Robust trajectory planning for target
following vision-based autonomous land
vehicle guidance,¡¨ Journal of Navigation, Vol.
57, pp.103-116. (SCI) (Abstract)
118.
Y. C. Chiu and W. H. Tsai (2006/05). "Copyright
protection by watermarking for color images against
print-and-scan operations using coding and
synchronization of peak locations in discrete Fourier
transform domain," Journal of Information Science and
Engineering, Vol. 22, No. 3, pp. 483-496. (SCI, EI)
(PDF)
119.
T. Y. Liu and W. H. Tsai (2007/03). "A New
steganographic method for data hiding in Microsoft Word
documents by a change tracking technique," IEEE
Transactions on Information Forensics and Security, Vol.
2, No. 1, pp. 24-30 (SCI, EI). (PDF)
120.
I. S. Lee and W. H. Tsai (2007/08). "Data
hiding in binary images with distortion-minimizing
capabilities by optimal block pattern coding and dynamic
programming techniques," IEICE Transactions on
Information and Systems, Vol. E90-D, No. 8, pp.
1142-1150. (SCI, EI) (PDF)
121.
S. W. Jeng and W. H. Tsai (2007/05).
"Improving quality of unwarped omni-images with
irregularly-distributed unfilled pixels by a new
edge-preserving interpolation technique," Pattern
Recognition Letters, Vol. 28, No. 15, pp. 1926-1936.
(SCI, EI) (PDF)
122.
S. W. Jeng and W. H. Tsai (2007/06). "Using
pano-mapping tables to unwarping of omni-images into
panoramic and perspective-view Images," IET Image
Processing, Vol. 1, No. 2, pp. 149-155. (SCI, EI) (PDF)
123.
S. W. Jeng and W. H. Tsai (2008/07). "A
robust and accurate calibration method by computer
vision techniques for coordinate transformation between
display screens and their images," Journal of
Information Science and Engineering, Vol. 24, No. 4,
pp. 1197-1211 (SCI, EI). (PDF)
124.
S. W. Jeng and W. H. Tsai (2008/05).
"Analytic image unwarping by a systematic calibration
method for omni-directional cameras with
hyperbolic-shaped mirrors," Image and Vision
Computing, Vol. 26, No. 5, pp. 690-701. (SCI, EI) (PDF)
125.
I. S. Lee and W. H. Tsai (2008/09). "Data
hiding in emails and applications by unused ASCII
control codes," Journal of Information Technology and
Applications, Vol. 3, No. 1, pp. 13-24.
(PDF)
126.
I. S. Lee and W. H. Tsai (2008/11). "Secret
communication through web pages using special codes in
HTML files," International Journal of Applied Science
and Engineering, Vol. 6, No. 2, pp. 141-149. (PDF)
127.
C. J. Wu and W. H. Tsai (2009/05). "Location
estimation for indoor autonomous vehicle navigation by
omni-directional vision using circular landmarks on
ceilings," Robotics and Autonomous Systems, Vol.
57, No. 5, pp. 546-555. (SCI, EI) (PDF)
128.
D. C. Wu and W. H. Tsai (2009/04). ¡§Image
verification for digital rights management using fragile
watermarks based on a human visual model,¡¨ Journal of
Computers, Vol. 20, No. 1, pp. 28-35. (PDF)
129.
I. S. Lee and W. H. Tsai (2009/07). "Data
hiding in grayscale images by dynamic programming based
on a human visual model," Pattern Recognition, Vol. 42,
No. 7, pp. 1604-1611. (SCI, EI) (PDF)
130.
T. Y. Liu and W. H. Tsai (2009). ¡§Robust
watermarking in slides of presentations by blank space
coloring: a new approach,¡¨
LNCS
Transactions on Data Hiding and Multimedia Security
IV - Lecture Notes in Computer Science (LNCS),
Vol. 5510, Y. Q. Shi (ed.), Springer, Berlin/Heidelberg,
Germany, pp. 49-64. (PDF)
131.
C. J. Wu and W. H. Tsai (2009/08).
"Unwarping of images taken by misaligned omni-cameras
without camera calibration by curved quadrilateral
morphing using quadratic pattern classifiers,"
Optical Engineering,
Vol. 48, No. 8, 087003-1~11. (PDF)
132.
C. J. Wu and W. H. Tsai (2009/09). ¡§A novel
method for lateral vehicle localization by omni-cameras
for car driving assistance,¡¨ Knowledge-Based and
Intelligent Information and Engineering Systems
(KES 2009)
- Lecture Notes in Computer Science (LNCS), Vol.
5712,
J.
D. Velázquez et al.
(eds.), Springer, Berlin/Heidelberg,
Germany, pp. 403-410. (PDF)
133.
C. J. Wu and W. H. Tsai (2009/09).
¡§Adaptation of
space-mapping
methods
for
object
location estimation to camera setup changes
¡X
a new study,¡¨
Knowledge-Based and Intelligent Information and
Engineering Systems
(KES 2009)
- Lecture Notes in Computer Science (LNCS), Vol.
5712,
J.
D. Velázquez et al.
(eds.), Springer, Berlin/Heidelberg,
Germany, pp. 395-402. (PDF)
134.
I. S. Lee and W. H. Tsai (2010/01).
"Security protection of software programs by information
sharing and authentication techniques using invisible
ASCII control codes," International Journal of
Network Security, Vol. 10, No. 1, pp. 1-10. (PDF)
135.
I. S. Lee and W. H. Tsai (2010/02). "A new
approach to covert communication via PDF Files,"
Signal Processing, Vol. 90, No. 2, pp. 557-565.
(PDF)
136. C. W. Lee and W. H. Tsai (2010/03). "A lossless data hiding method by histogram
shifting based on an adaptive block division scheme," in Pattern Recognition and Machine
Vision ¡V in Honor and Memory of the Late Professor
King-Sun Fu, Patrick S. P. Wang (Ed.), River Publishers, Aalborg, Denmark, pp. 1¡V14.
(PDF)
137.
T. Y. Liu and W. H. Tsai (2010/05). "Generic
lossless visible watermarking -- a new approach,"
IEEE Transactions on Image Processing, Vol. 19,
No. 5, pp. 1224-1235. (PDF)
138. K. C. Chen and W. H. Tsai (2010/09). "Guidance
of indoor vision-based autonomous vehicles for security
patrolling by a SIFT-based vehicle localization
technique using along-path object information,"
IEEE Transactions on Vehicular Technology, Vol. 59,
No. 7, Sept. 2010, pp. 3261-3271. (PDF)
139. T. Y. Liu and W. H. Tsai (2010/12). "Quotation
authentication: a new approach and efficient solutions
by data hiding and cascaded hashing techniques," IEEE
Transactions on Information Forensics and Security,
Vol. 5, No. 4, Dec. 2010, pp. 945-954.
(PDF)
140. S.
E. Shih and W. H. Tsai (2011/01).
¡§A new two-omni-camera system with a console table for
versatile 3D vision applications and its automatic
adaptation to imprecise camera setups,¡¨
Advances in Multimedia Modeling (MMM 2011)
- Lecture Notes in Computer Science (LNCS), Vol.
6523,
K.
T. Lee, W. H. Tsai, H. Y. M. Liao, T.
Chen, J. W. Hsieh and T. T. Tseng.
(eds.), Springer, Berlin/Heidelberg,
Germany, pp. 193-205. (PDF)
141. T. Y. Liu and W. H. Tsai (2011/05). "Data
hiding in graphic drawings by structures of object groupings," Journal of Information Science
and Engineering, Vol. 27, No. 3, pp. 983-994. (PDF)
142. C. W. Lee and W. H. Tsai
(2011/07). "A
lossless large-volume data hiding method based on
histogram shifting using an optimal hierarchical block
division scheme," Journal of Information Science
and Engineering, Vol. 27, No. 4, pp. 1265-1282. (PDF).
143. I.
J. Lai and W. H. Tsai (2011/09).
¡§Secret-fragment-visible
mosaic image ¡X a new computer art and its application to
information hiding,¡¨
IEEE
Transactions on Information Forensics and Security,
Vol. 6, No. 3, pp. 936-945.
(PDF)
144. Y.
T. Kuo and W. H. Tsai (2011/09).
¡§A new 3D imaging system using a portable two-camera
omni-imaging device for construction and browsing of
human-reachable environments,¡¨
Advances in Visual Computing
- Lecture Notes in Computer Science (LNCS), Vol.
6938,
G.
Bebis,
et al.
(eds.), Springer, Berlin/Heidelberg,
Germany, pp. 484-495. (PDF)
145. Y.
L. Li and W. H. Tsai (2011/09).
¡§New image steganography via secret-fragment-visible
mosaic images by nearly-reversible color transformation,¡¨
Advances in Visual Computing
- Lecture Notes in Computer Science (LNCS), Vol.
6939,
G.
Bebis,
et al.
(eds.), Springer, Berlin/Heidelberg,
Germany, pp. 64-74. (PDF)
146. P.
H. Yuan, K. F. Yang and W. H. Tsai (2011/10).
¡§Real-time security monitoring around a video
surveillance vehicle with a pair of two-camera
omni-imaging devices,¡¨
IEEE
Transactions on Vehicular Technology,
Vol. 60, No. 8, pp. 3603 - 3614.
(PDF)
147. C.
W. Lee and W. H. Tsai (2012/01).
¡§A secret-sharing-based method for authentication of
grayscale document images via the use of the PNG image
with a data repairing capability,¡¨
IEEE
Transactions on Image Processing,
Vol. 21, No. 1. pp. 207-218.
(PDF)
148. C. J. Wu and W. H. Tsai
(2012/01). "A space-mapping method for object location
estimation adaptive to camera setup changes for
vision-based automation applications,"
IEEE Transactions on Circuits and Systems for Video
Technology, Vol. 22, No. 1, pp. 157-162. (PDF)
149. C. W. Lee and W. H. Tsai
(2012/05). "Optimal pixel-level self-repairing
authentication method for grayscale images under a
minimax criterion of distortion reduction,"
Optical Engineering, Vol. 51, No. 5, pp. 057006-1
- 057006-10. (PDF)
150. S. C. Liu and W. H. Tsai
(2012/10). "Line-based Cubism-like image
¡X a new type of art image and its application
to lossless data hiding,"
IEEE
Transactions on Information Forensics and Security, Vol. 7, No. 5, pp. 1448-1458. (PDF)
151. C. W. Huang and W. H. Tsai (2012/12).
"Construction
of a machine guide dog using a two-mirror
omni-camera and an autonomous vehicle,"
Advances in Intelligent Systems and Applications, Vol. 2
- Smart Innovation, Systems and Technologies (SIST), Vol.
21,
J. S. Pan, C. N. Yang and C. C. Lin
(eds.), Springer, Berlin/Heidelberg,
Germany, pp. 205-219. (PDF)
152. H.
H. Tseng and W. H. Tsai (2012/12).
"Protection of privacy-sensitive contents
in surveillance videos using WebM video features,"
Advances in Intelligent Systems and Applications, Vol. 2
- Smart Innovation, Systems and Technologies (SIST), Vol.
21,
J. S. Pan, C. N. Yang and C. C. Lin
(eds.), Springer, Berlin/Heidelberg,
Germany, pp. 221-233. (PDF)
153. C. W. Lee and W. H. Tsai (2013/02). "A covert
communication method via spreadsheets by secret sharing
with a self-authentication capability," Journal of Systems & Software,
Vol. 86, No. 2, pp.
324-334. (PDF)
154. C. W. Lee and W. H. Tsai
(2013/07). "A data hiding method based on information
sharing via PNG images for applications of color image
authentication and metadata embedding," Signal
Processing, Vol. 93, No. 7, pp. 2010-2025. (PDF)
155. S. E. Shih and W. H. Tsai (2013/07). "A
two-omni-camera stereo vision system with an automatic
adaptation capability to any system setup for 3D vision
applications,"
IEEE Transactions on Circuits and Systems for Video
Technology,
Vol. 23, No. 7, pp. 1156-1169. (PDF)
156. S. E. Shih and W. H. Tsai (2013/11). "Optimal
design and placement of omni-cameras in binocular vision
systems for accurate 3D data measurement,"
IEEE Transactions on Circuits and Systems for Video
Technology,
Vol. 23, No. 11, pp. 1911-1926. (PDF)
157.
C. L. Chien and W. H. Tsai
(2014/01). "Image fusion with no gamut problem by improved
nonlinear IHS transforms for remote sensing,"
IEEE Transactions on Geoscience and Remote Sensing,
Vol. 52, No. 1, pp. 651-663. (PDF)
158. Y. L. Lee and W. H. Tsai (2014/02). "A new data hiding method via revision history
records on collaborative writing platforms," ACM
Transactions on Multimedia Computing, Communications,
and Applications, Vol. 10, No. 2, pp. 20:1-20:21. (PDF)
159. Y. L. Lee and W. H. Tsai
(2014/04). "A new secure image transmission technique via
secret-fragment-visible mosaic images by nearly
reversible color transformations," IEEE Transactions
on Circuits and Systems for Video Technology,
Vol.
24, No. 4, pp. 695-703. (PDF)
160.
S. E. Shih and W. H. Tsai (2014/08). "A
convenient vision-based system for automatic detection
of parking spaces in indoor parking lots using
wide-angle cameras," IEEE Transactions on Vehicular
Technology, Vol. 63, No. 6, pp. 2521-2532.
(PDF)
161. Y. L. Lee and W. H. Tsai
(2015/01). "Reversible data hiding by image encryptions and
spatial correlation comparisons," Journal of
Information Science and Engineering, Vol. 31, No. 1,
pp. 331-342. (PDF)
162. Y. L. Lee and W. H. Tsai
(2015/04). "A New Data Transfer Method via
Signal-rich-art Code Images Captured by Mobile Devices," IEEE Transactions
on Circuits and Systems for Video Technology,
Vol. 25, No. 4, pp. 688-700.
(PDF)
163. S. C. Hung, D. C. Wu and W. H. Tsai
(2020/04). "Data Hiding in Computer-Generated Stained Glass Images and Its Applications to Information Protection," IEICE Transactions on Information and Systems,
Vol. E103.D, No. 4, pp. 850-865.
(PDF)
164. S. C. Liu, D. C. Wu and W. H. Tsai
(2021/02). "Rectangle-based Neo-Plasticism-like Image - A New Type of Art Image and Its Application to Covert Communication," Journal of Information Science and Engineering,
Vol. 37, No. 2, pp. 441-468.
(PDF)
165. S. C. Liu, D. C. Wu and W. H. Tsai
(2022/12). "Stripe-Based Futurism-like Image - A New Type of Art and Its Application to Covert Communication," Applied Sciences,
2022, 12, 10422.
(PDF)
Back to
Main Page
(updated:
2021/03/08)
|