23 Book Chapters

 

1.     F. Y. Shih and G. P. Chen, ‘‘Classification of landsat remote sensing images by a fuzzy unsupervised clustering algorithm,’’ in Advances in Fuzzy Theory and Technology (editor: P. P. Wang), Bookwrights Press Publisher, pp. 283-295, 1993.

2.     F. Y. Shih, ‘‘General sweep mathematical morphology,’’ in Advances in Imaging and Electron Physics, P. Hawkes, ed., vol. 140, Elsevier Publisher, Amsterdam, The Netherlands, pp. 265-306, 2006.

3.     F. Y. Shih, “Application of computer vision in shortest path planning,” in Computer Vision Research Progress, Z. Zhu, ed., Nova Science Publishers, Hauppauge, NY, pp. 213-244, Feb. 2008, ISBN# 1-60021-992-6.

4.     F. Y. Shih, J. Jing, M. Qu, and H. Wang, “Application of machine learning in solar physics,” in Solar Physics Research Trends, P. Wang, ed., Nova Science Publishers, Hauppauge, NY, pp. 259-286, 2008, ISBN# 1-60021-987-x.

5.     S. Cheng and F. Y. Shih, “Feature reduction for support vector machines,” in Encyclopedia of Data Warehousing and Mining, 2nd Edition. J. Wang, ed., Hershey, PA: Idea Group Reference, 2009, vol. 2, 13-digit ISBN: 978-1-60566-010-3.

6.     F. Y. Shih and Y. Wu, “Digital steganography based on genetic algorithm,” Handbook of Research on Secure Multimedia Distribution, Edited by Lian and Zhang, Hershey, PA: Information Science Reference, ISBN: 978-1605662626, pp. 441-455, Feb. 26, 2009.

7.     F. Y. Shih and Y. Wu, “Information hiding by digital watermarking,” Information Hiding and Applications, Edited by J.-S. Pang, H.-C. Huang, and L. C. Jain, New York, NY: Springer, Series: Studies in Computational Intelligence, Vol. 227, ISBN: 978-3-642-02334-7, pp. 205-223, Sep. 1, 2009.

8.     F. Y. Shih, “Image segmentation,” in Encyclopedia of Database Systems, Springer, 2009.

9.     F. Y. Shih, “Automated detection and classification of solar image features,” in Handbook of Pattern Recognition and Computer Vision, 4th Edition, Edited by C. H. Chen, World Scientific Publishing, ISBN: 978-981-4273-38-1, pp. 435-452, January 2010.

10.  F. Y. Shih and O. R. Mitchell, ‘‘Threshold decomposition of gray-scale morphology into binary and its structuring element decomposition,’’ a book chapter in Mathematical Morphology:Theory and Applications (editor: R. M. Haralick), New York: Oxford University Press, ISBN: 978-0195081879, June 2010.

11.  F. Y. Shih and A. Sheppard, “Improved feature vocabulary-based method for image categorization,” in Multimedia Security: Watermarking, Steganography, and Forensics, edited by F. Y. Shih, CRC Press, Boca Raton, FL, ISBN: 978-1-4398-7331-1, pp. 51-66, 2013.

12.  Y.-T. Wu and F. Y. Shih, “Digital watermarking based on chaotic map and reference register,” in Multimedia Security: Watermarking, Steganography, and Forensics, edited by F. Y. Shih, CRC Press, Boca Raton, FL, ISBN: 978-1-4398-7331-1, pp. 85-98, 2013.

13.  A. Koval, F. Y. Shih, and B. S. Verkhovsky, “Pseudo-random pixel rearrangement algorithm based on Gaussian integers for image watermarking,” in Multimedia Security: Watermarking, Steganography, and Forensics, edited by F. Y. Shih, CRC Press, Boca Raton, FL, ISBN: 978-1-4398-7331-1, pp. 99-114, 2013.

14.  W. Zhang and F. Y. Shih, “Watermarking based on local binary pattern operators,” in Multimedia Security: Watermarking, Steganography, and Forensics, edited by F. Y. Shih, CRC Press, Boca Raton, FL, ISBN: 978-1-4398-7331-1, pp. 141-164, 2013.

15.  V. G. Edupuganti and F. Y. Shih, “Authentication of JPEG images based on genetic algorithms,” in Multimedia Security: Watermarking, Steganography, and Forensics, edited by F. Y. Shih, CRC Press, Boca Raton, FL, ISBN: 978-1-4398-7331-1, pp. 165-180, 2013.

16.  V. G. Edupuganti, F. Y. Shih, and I-C. Chang, “An efficient block-based fragile watermarking system for tamper localization and recovery,” in Multimedia Security: Watermarking, Steganography, and Forensics, edited by F. Y. Shih, CRC Press, Boca Raton, FL, ISBN: 978-1-4398-7331-1, pp. 181-200, 2013.

17.  M. Bachrach and F. Y. Shih, “Survey of image steganography and steganalysis,” in Multimedia Security: Watermarking, Steganography, and Forensics, edited by F. Y. Shih, CRC Press, Boca Raton, FL, ISBN: 978-1-4398-7331-1, pp. 201-214, 2013.

18.  F. Y. Shih and V. G. Edupuganti, “Differential evolution-based algorithm for breaking the visual steganalytic System,” in Multimedia Security: Watermarking, Steganography, and Forensics, edited by F. Y. Shih, CRC Press, Boca Raton, FL, ISBN: 978-1-4398-7331-1, pp. 245-256, 2013.

19.  Y.-T. Wu and F. Y. Shih, “Genetic algorithm-based methodology for breaking the steganalytic systems,” in Multimedia Security: Watermarking, Steganography, and Forensics, edited by F. Y. Shih, CRC Press, Boca Raton, FL, ISBN: 978-1-4398-7331-1, pp. 257-274, 2013.

20.  F. Y. Shih and Y. Yuan, “A comparison study on copy–cover image forgery detection,” in Multimedia Security: Watermarking, Steganography, and Forensics, edited by F. Y. Shih, CRC Press, Boca Raton, FL, ISBN: 978-1-4398-7331-1, pp. 297-312, 2013.

21.  D. Xiao, F. Y. Shih, and X. Liao, “Chaos-based hash function with both modification detection and localization capabilities,” in Multimedia Security: Watermarking, Steganography, and Forensics, edited by F. Y. Shih, CRC Press, Boca Raton, FL, ISBN: 978-1-4398-7331-1, pp. 313-326, 2013.

22.  D. Xiao and F. Y. Shih, “Using the self-synchronizing method to improve security of the multi-chaotic systems-based image encryption,” in Multimedia Security: Watermarking, Steganography, and Forensics, edited by F. Y. Shih, CRC Press, Boca Raton, FL, ISBN: 978-1-4398-7331-1, pp. 343-356, 2013.

23.  Y. Xue, Y. Yang, F. G. Farhat, F. Y. Shih, O. Boukrina, A. M. Barrett, J. R. Binder, W. W. Graves, and U. W. Roshan, “Brain tumor classification with tumor segmentations and a dual path residual convolutional neural network from MRI and pathology images,” in Brainlesion: Glioma, Multiple Sclerosis, Stroke and Traumatic Brain Injuries, edited by A. Crimi and S. Bakas, Springer Nature Switzerland AG, 11993, pp. 1-8, May 2020.