Journal Papers
 

  1. F. Y. Shih and O. R. Mitchell, ``Threshold decomposition of grayscale morphology into binary morphology,'' IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 11, no. 1, pp. 31-42, Jan. 1989. 
  2. T. Q. Kim, Z. Ji, M. C. Leu, and F. Y. Shih, ``A robot vision system for 3-D metrology,'' Trans. North American Manufacturing Research Institute of Society of Manufacturing Engineers, vol. 1, no. 1, pp. 290-297, May 1990. 
  3. F. Y. Shih and O. R. Mitchell, ``Decomposition of gray scale morphological structuring elements,'' Pattern Recognition, vol. 24, no. 3, pp. 195-203, March 1991. 
  4. F. Y. Shih, ``Object representation and recognition using mathematical morphology model,'' Inter. Journal of Systems Integration, vol. 1, no. 2, pp. 235-256, Aug. 1991. 
  5. F. Y. Shih and J. Moh, ``Implementing morphological operations using programmable neural networks,'' Pattern Recognition, vol. 25, no. 1, pp. 89-99, Jan. 1992. 
  6. F. Y. Shih and O. R. Mitchell, ``A mathematical morphology approach to Euclidean distance transformation,'' IEEE Trans. Image Processing, vol. 1, no. 2, pp. 197-204, April 1992. 
  7. F. Y. Shih, J. Moh and F.-C. Chang, ``A new ART-based neural architecture for pattern classification and image enhancement without prior knowledge,'' Pattern Recognition, vol. 25, no. 5, pp. 533-542, May 1992. 
  8. F. Y. Shih, J. Moh and H. Bourne, ``A neural architecture applied to the enhancement of noisy binary images,'' Engineering Applications of Artificial Intelligence Tools, vol. 5, no. 3, pp. 215-222, 1992. 
  9. F. Y. Shih and H. Wu, ``Optimization on Euclidean distance transformation using grayscale morphology,'' Journal of Visual Communication and Image Representation, vol. 3, no. 2, pp. 104-114, June 1992. 
  10. F. Y. Shih and W. Wong, ``A new single-pass algorithm for extracting the mid-crack codes of multiple regions,'' Journal of Visual Communication and Image Representation, vol. 3, no. 3, pp. 217-224, Sep. 1992. 
  11. F. Y. Shih and C. C. Pu, ``Morphological shape description using geometric spectrum on multidimensional binary images,'' Pattern Recognition, vol. 25, no. 9, pp. 921-928, Sep. 1992. 
  12. F. Y. Shih and H. Wu, ``Decomposition of geometric-shaped structuring elements using morphological transformations on binary images,'' Pattern Recognition, vol. 25, no. 10, pp. 1097-1106, Oct. 1992. 
  13. F. Y. Shih and P. Yeh, ``Model-based partial shape recognition using contour curvature and affine transformation,'' Inter. Journal of Information Sciences, vol. 67, no. 3, pp. 229-244, Jan. 1993. 
  14. F.Y. Shih and W. Wong, ``Reconstruction of binary and gray-scale images from mid-crack code descriptions,'' Journal of Visual Commu. Image Rep., vol. 4, no. 2, pp. 121-129, June 1993. 
  15. J.T. Eck and F.Y. Shih, ``An automatic text-free speaker recognition system based on an enhanced ART 2 neural architecture,'' Inter. Journal of Information Sciences, vol. 76, no. 3, pp. 233-253, Dec. 1993. 
  16. F.Y. Shih and G.P. Chen, ``Classification of landsat remote sensing images by a fuzzy unsupervised clustering algorithm,'' Inter. Journal of Information Sciences Applications, vol. 1, no. 2, pp. 97-116, March 1994. 
  17. D. Shasha, J. Wang, K. Zhang, and F. Shih, ``Exact and approximate algorithms for unordered tree matching,'' IEEE Trans. Sys. Man. Cyber., vol. 24, no. 4, pp. 668-678, April 1994. 
  18. D. Blackmore, M. Leu, and F. Y. Shih, ``Analysis and modelling of deformed swept volumes,'' Computer Aided Design, vol. 26, no. 4, pp. 315-326, April 1994. 
  19. F. Y. Shih and W. Wong, ``An improved fast algorithm for the restoration of images based on chain codes description,'' Computer Vision, Graphics, Image Processing, vol. 56, no. 4, pp. 348-351, July 1994. 
  20. S.-S. Chen, F. Y. Shih, and P. A. Ng, ``A fuzzy model for unsupervised character classification,'' Inter. Journal of Information Sciences Applications, vol. 2, no. 3, pp. 143-165, Nov. 1994. 
  21. F. Y. Shih and W.-T. Wong, ``Fully parallel thinning with tolerance to boundary noise,'' Pattern Recognition, vol. 27, no. 12, pp. 1677-1695, Dec. 1994. 
  22. F.Y. Shih, C.T. King, and C.C. Pu, ``Pipeline architectures for recursive morphological operations,'' IEEE Trans. Image Processing, vol. 4, no. 1, pp. 11-18, Jan. 1995. 
  23. F. Y. Shih and W. Wong, ``A new safe-point thinning algorithm based on the mid-crack code tracing,'' IEEE Trans. Sys. Man. Cyber., vol. 25, no. 2, pp. 370-378, Feb. 1995. 
  24. F.Y. Shih and C.C. Pu, ``Analysis of the properties of soft morphological filtering using threshold decomposition,'' IEEE Trans. Signal Processing, vol. 43, no. 2, pp. 539-544, Feb. 1995. 
  25. F. Y. Shih and C. C. Pu, ``A skeletonization algorithm by maxima tracking on Euclidean distance transform,'' Pattern Recognition, vol. 28, no. 3, pp. 331-341, March 1995. 
  26. F.Y. Shih and P. Puttagunta, ``Recursive soft morphological filters,'' IEEE Trans. Image Processing, vol. 4, no. 7, pp. 1027-1032, July 1995. 
  27. J. Moh and F. Y. Shih, ``A general purpose model for image operations based on multilayer perceptrons,'' Pattern Recognition, vol. 28, no. 7, pp. 1083-1090, July 1995. 
  28. S.-S. Chen, F. Y. Shih, and P. A. Ng, ``Fuzzy typographical analysis for character preclassification,'' IEEE Trans. Sys. Man. Cyber., vol. 25, no. 10, pp. 1408-1413, Oct. 1995. 
  29. C. C. Pu and F. Y. Shih, ``Threshold decomposition of gray-scale soft morphology into binary soft morphology,'' Graphical Model and Image Processing, vol. 57, no. 6, pp. 522-526, Nov. 1995. 
  30. F. Y. Shih and C. C. Pu, ``Reply to "Comments on `Analysis of the properties of soft morphological filtering using threshold decompositionm'",'' IEEE Trans. Signal Processing, vol. 44, no. 9, pp. 2350-2352, Sep. 1996. 
  31. F. Y. Shih and S. Chen, ``Skeletonization for fuzzy degraded character images,'' IEEE Trans. Image Processing, vol. 5, no. 10, pp. 1481-1485, Oct. 1996. 
  32. F. Y. Shih and S. Chen, ``Adaptive document block segmentation and classification,'' IEEE Trans. Sys. Man. Cyber., vol. 26, no. 5, pp. 797-802, Oct. 1996. 
  33. J. Moh and F. Y. Shih, ``Design of one-pass training algorithms for variant morphological operations,'' Information Science Applications, vol. 94, pp. 303-314, 1996. 
  34. S. Pei, C. Lai, and F. Y. Shih, ``An efficient class of alternating sequential filters in morphology,'' Graphical Models and Image Processing, vol. 59, no. 2, pp. 109-116, March 1997. 
  35. S. Pei, C. Lai, and F. Y. Shih, ``A morphological approach to shortest path planning for rotating objects,'' Pattern Recognition, vol. 31, no. 8, pp. 1127-1138, Aug. 1998. 
  36. S. Pei, C. Lai, and F. Y. Shih, ``Recursive order-statistic soft morphological filters,'' IEE Proceedings Vision, Image and Signal Processing, vol. 145, no. 5, pp. 333 -342, Oct. 1998. 
  37. F. Y. Shih and J. Liu, ``Size-invariant four-scan euclidean distance transformation,'' Pattern Recognition, vol. 31, no. 11, pp. 1761-1766, Nov. 1998. 
  38. F. Y. Shih and W.-T. Wong, ``A one-pass algorithm for local symmetry of contours from chain codes,'' Pattern Recognition, vol. 32, no. 7, pp. 1203-1210, July 1999. 
  39. E. Morales and F. Y. Shih, ``Wavelet coefficients clustering using morphological operations and pruned quadtrees,'' Pattern Recognition, vol. 33, no. 10, pp. 1611-1620, Oct. 2000. 
  40. F. Y. Shih and A. Kowalski, ``Computing unique three-dimensional object aspects representation,'' Information Sciences, vol. 132, no. 1, pp. 13-22, Feb. 2001. 
  41. F. Y. Shih and W.-T. Wong, ``An adaptive algorithm for conversion from quadtree to chain codes,'' Pattern Recognition, vol. 34, no. 3, pp. 631-639, March 2001. 
  42. F. Y. Shih and S. Y. Wu, ``Combinational image watermarking in the spatial and frequency domains,'' Pattern Recognition, vol. 36, no. 4, pp. 969-975, April 2003.
  43. F. Y. Shih and V. Gaddipati, ``General sweep mathematical morphology,'' Pattern Recognition, vol. 36, no. 7, pp. 1489 - 1500, July 2003.
  44. M. Qu, F. Y. Shih, J. Jing, and H. Wang, ``Automatic solar flare detection using MLP, RBF, and SVM,'' Solar Physics, vol. 217, no. 1, pp. 157-172, Oct. 2003.
  45. F. Y. Shih and A. Kowalski, ``Automatic extraction of filaments in H-alpha solar images,'' Solar Physics, vol. 218, pp. 99-122, Dec. 2003.
  46. F. Y. Shih and Y. Wu, ``Three-dimensional Euclidean distance transformation and its application to shortest path planning,'' Pattern Recognition, vol. 37, no. 1, pp. 79-92, Jan. 2004.
  47. F. Y. Shih and C. Chuang, ``Automatic extraction of head and face boundaries and facial features,'' Information Sciences, vol. 158, no. 1, pp. 117-130, Jan. 2004.
  48. F. Y. Shih and Y. Wu, ``Fast Euclidean distance transformation in two scans using a 3x3 neighborhood,'' Computer Vision and Image Understanding, vol. 93, no. 2, pp. 195-205, Feb. 2004.
  49. F. Y. Shih and K. Zhang, ``Efficient contour detection based on improved snake model,'' Pattern Recognition and Artificial Intelligence, vol. 18, no. 2, pp. 197-209, March 2004.
  50. M. Qu, F. Y. Shih, J. Jing, and H. Wang, ``Automatic solar flare tracking using image processing techniques,'' Solar Physics, vol. 222, no. 1, pp. 137-149, July 2004.
  51. F. Y. Shih and Y. Wu, ``The efficient algorithms for achieving Euclidean distance transformation,'' IEEE Trans. Image Processing, vol. 13, no. 3, pp. 1078- 1091, August 2004.
  52. F. Y. Shih and K. Zhang, ``Inter-frame interpolation by snake and greedy algorithm,'' Pattern Recognition and Artificial Intelligence, vol. 18, no. 6, pp. 975-985, Sep. 2004.
  53. Y. Wu and F. Y. Shih, ``An adjusted-purpose digital watermarking technique,'' Pattern Recognition, vol. 37, no. 12, pp. 2349-2359, Dec. 2004.
  54. F. Y. Shih and S. Cheng, ``Adaptive mathematical morphology for edge linking,'' Information Sciences, vol. 167, no. 1-4, pp. 9-21, Dec. 2004..
  55. F. Y. Shih, K. Zhang, and Y. Fu, ``A hybrid two-phase algorithm for face recognition,'' Pattern Recognition and Artificial Intelligence, vol. 18, no. 8, pp. 1423-1435, Dec. 2004.
  56. F. Y. Shih, Y. Wu, and B. Chen, ``Forward and backward chain-code representation for motion planning of cars,'' Pattern Recognition and Artificial Intelligence, vol. 18, no. 8, pp. 1437-1451, Dec. 2004.
  57. F. Y. Shih, Y. Fu, and K. Zhang, ``Multi-view face identification and pose estimation using B-spline interpolation,'' Information Sciences, vol. 169, no. 3, pp. 189-204, Feb. 2005.
  58. F. Y. Shih and V. Gaddipati, ``Geometric modeling and representation based on sweep mathematical morphology,'' Information Sciences, vol. 171, no. 3, pp. 213-231, March 2005.
  59. F. Y. Shih and Y. Wu, ``Enhancement of image watermark retrieval based on genetic algorithm,'' Journal of Visual Commu. and Image Repre., vo. 16, pp. 115-133, April 2005.
  60. F. Y. Shih and S. Cheng, ``Improved feature reduction in combinational input and feature space,'' Pattern Recognition, vol. 38, no. 5, pp. 651-659, May 2005.M. 
  61. Qu, F. Y. Shih, J. Jing, and H. Wang, ``Automatic solar filament detection using image processing techniques,'' Solar Physics, vol. 228, no. 1, pp. 119-135, May 2005.
  62. F. Y. Shih, C. Chuang, and V. Gaddipati, ``A modified regulated morphological corner detector,'' Pattern Recognition Letters, vol. 26, no. 7, pp. 931-937, June 2005.
  63. F. Y. Shih and Y. Wu, ``Decomposition of binary morphological structuring elements based on genetic algorithms,'' Computer Vision and Image Understanding, vol. 99, no. 2, pp. 291-302, August 2005.
  64. F. Y. Shih and S. Cheng, ``Automatic seeded region growing for color image segmentation,'' Image and Vision Computing, vol. 23, no. 10, pp. 877-886, Sep. 2005.
  65. F. Y. Shih and K. Zhang, ``Support vector machine networks for multi-class classification,'' Pattern Recognition and Artificial Intelligence, vol. 19, no. 6, pp. 775-786, Sep. 2005.
  66. F. Y. Shih and Y. Wu, ``Robust watermarking and compression for medical images based on genetic algorithm,'' Information Sciences, vol. 175, no. 3, pp. 200-216, Oct. 2005.
  67. F. Y. Shih and Y. Wu, ``Decomposition of arbitrarily grayscale morphological structuring elements,'' Pattern Recognition, vol. 38, no. 12, pp. 2323-2332, Dec. 2005.
  68. Y. Wu and F. Y. Shih, ``Genetic algorithm based methodology for breaking the steganalysis systems,'' IEEE Trans. Systems, Man, and Cybernetics Part B, vol. 36, no. 1, pp. 24-31, Feb. 2006.
  69. S. Brahnam, C. Chuang, F. Y. Shih, and M. Slack, ``Machine recognition and representation of neonatal facial displays of acute pain,'' Int. Journal of Artificial Intelligence in Medicine, vol. 36, no. 3, pp. 211-222, March 2006.
  70. S. Brahnam, C. Chuang, F. Y. Shih, and M. Slack, ``SVM classification of neonatal facial images of pain,'' Fuzzy Logic and Applications, Isabelle Bloch, Alfredo Petrosino, Andrea G. B. Tettamanzi, editors, Lecture Notes in Computer Science, vol. 3849, pp. 121-128, 2006.
  71. F. Y. Shih, T. Klotz, and W. Brockmann, ``A system for rotational velocity computation from image sequences,'' Journal of Image and Vision Computing, vol. 24, no. 4, pp. 357-362, April 2006.
  72. W. Wong, F. Y. Shih and T. Su, ``Thinning algorithms based on quadtree and octree representations,'' Information Sciences, vol. 176, no. 10, pp. 1379-1394, May 2006.
  73. H. Chao, L. Uden, and F. Y. Shih, ``Mobile IP,'' Wireless Communication and Mobile Computing, vol. 6, no. 5, pp. 543-546, August 2006.
  74. C. Chuang and F. Y. Shih, ``Recognizing facial action units using independent component analysis and support vector machine,'' Pattern Recognition, vol. 39, no. 9, pp. 1795-1798, Sep. 2006.
  75. M. Qu, F. Y. Shih, J. Jing, and H. Wang, ``Automatic detection and classification of corona mass ejections,'' Solar Physics, vol. 237, no. 2, pp. 419-431, Sep. 2006.
  76. G. Fu, F. Y. Shih, and H. Wang, ``Automatic detection of prominence eruption using consecutive solar images,'' IEEE Trans. on Circuits and Systems for Video Technology, vol. 17, no. 1, pp. 79-85, Jan. 2007.
  77. F. Y. Shih and K. Zhang, ``Locating object contours in complex background using improved snakes,'' Computer Vision and Image Understanding, vol. 105, no. 2, pp. 93-98, Feb. 2007.
  78. Y. Wang, M. Ma, and F. Y. Shih, ``A hierarchical refinement algorithm for fully automatic gridding in spotted DNA microarray image processing,'' Information Sciences, vol. 177, no. 4, pp. 1123-1135, Feb. 2007.
  79. S. Cheng and F. Y. Shih, ``An improved incremental training algorithm for support vector machines using active query,'' Pattern Recognition, vol. 40, no. 3, pp. 964-971, March 2007.
  80. W. Wong, F. Y. Shih, and J. Liu, ``Shape-based image retrieval using Fourier descriptor and support vector machine,'' Information Sciences, vol. 177, no. 8, pp. 1878-1891, April 2007.
  81. S. Brahnam, C. Chuang, R. Sexton and F. Y. Shih, ``Machine assessment of neonatal facial expressions of acute pain,'' Special Issue on "Decision Support in Medicine" in Journal of Decision Support Systems, vol. 43, no. 4, pp. 1242-1254, Aug. 2007.
  82. M. Ma, K. Zhang, H. Wang, and F. Y. Shih, ``ELB-Q, A New Method for Improving the Robustness in DNA Microarray Image Quantification,'' IEEE Trans. on Information Technology in Biomedicine, vol. 11, no. 5, pp. 574-582, Sep. 2007.
  83. W. Wong, F. Y. Shih, and T. Su, ``Shape-based image retrieval using two-level similarity measures,'' Pattern Recognition and Artificial Intelligence, vol. 21, no. 6, pp. 995-1015, Sep. 2007.
  84. F. Y. Shih, Y. Wu, C. Chuang, J. Chen, H. Lu, and Y. Chang, ``An intelligent sensor network for object detection, classification, and recognition,'' Journal of Information Science and Engineering, vol. 23, no. 6, pp. 1955-1969, Nov. 2007.
  85. Y. Wu and F. Y. Shih, ``Digital watermarking based on chaotic map and reference register,'' Pattern Recognition, vol. 40, no. 12, pp. 3753-3763, Dec. 2007.
  86. F. Y. Shih and G. Fu, ``Decision combination of multiple classifiers,'' Pattern Recognition and Artificial Intelligence, vol. 22, no. 2, pp. 323-334, March 2008.
  87. F. Y. Shih and Y. Fu, ``Approximate image quality measure in low-dimensional domain based on random projection,'' Pattern Recognition and Artificial Intelligence, vol. 22, no. 2, pp. 335-345, March 2008.
  88. F. Y. Shih and K. Zhang, ``A distance-based separator representation for pattern classification,'' Image and Vision Computing, vol. 26, no. 5, pp. 667-672, May 2008.
  89. F. Y. Shih, C. Chuang, and P. Wang, ``Performance comparisons of facial expression recognition in JAFFE database,'' Pattern Recognition and Artificial Intelligence, vol. 22, no. 3, pp. 445-459, May 2008.
  90. F. Y. Shih, S. Cheng, C. Chuang, and P. Wang, ``Extracting faces and facial features from color images,'' Pattern Recognition and Artificial Intelligence, vol. 22, no. 3, pp. 515-534, May 2008.
  91. Y. Wu, F. Y. Shih, J. Shi, and Y. Wu, ``A top-down region dividing approach for image segmentation,'' Pattern Recognition, vol. 41, no. 6, pp. 1948-1960, June 2008.
  92. G. Fu, F. Y. Shih, and H. Wang, ``Automatic detection of magnetic flux emergings in the solar atmosphere from full-disk magnetogram sequences,'' IEEE Trans. on Image Processing, vol. 17, no. 11, pp. 2174-2185, Nov. 2008.
  93. T. Bober and F. Y. Shih, ``Image processing based methodology for optimizing automotive ignition timing,'' IEEE Trans. Vehicular Technology, vol. 58, no. 1, pp. 85-92, Jan. 2009.
  94. F. Y. Shih and V. G. Edupuganti, ``A differential evolution based algorithm for breaking the visual steganalytic system,'' Soft Computing, vol. 13, no. 4, pp. 345-353, Feb. 2009.
  95. F. Y. Shih and S. M. Tse, ``Medical image processing technology for diagnosing and treating cancers,'' Recent Patents on Biomedical Engineering, vol. 2, no. 2, pp. 141-147, June 2009.
  96. V. G. Edupuganti and F. Y. Shih, ``Authentication of JPEG Images based on Genetic Algorithms,'' The Open Artificial Intelligence Journal, vol. 4, pp. 30-36, 2010.
  97. F. Y. Shih and Y. Yuan, ``Image forgery detection,'' The Open Artificial Intelligence Journal, vol. 4, pp. 49-54, 2010.
  98. D. Xiao and F. Y. Shih, ``Using the self-synchronizing method to improve security of the multi chaotic systems-based image encryption,'' Optics Communications, vol. 283, no. 15, pp. 3030-3036, Aug. 2010.
  99. Y. Yuan, F. Y. Shih, J. Jing, and H. Wang, ``Automated flare forecasting using statistical learning techniques,'' Research in Astronomy and Astrophysics, vol. 10, no. 8, pp. 785-796, Aug. 2010.
  100. D. Xiao, F. Y. Shih, and X. Liao, ``A chaos-based hash function with both modification detection and localization,'' Communications in Nonlinear Science and Numerical Simulation, vol. 15, no. 9, pp. 2254-2261, Sep. 2010.
  101. F. Y. Shih and Yuan Yuan, ``A wavelet-based encoding algorithm for high dynamic range images,'' Open Signal Processing, vol. 3, pp. 13-19, 2010.
  102. W. Zhang, F. Y. Shih, N. Jin, and Y. Liu, ``Recognition of gas-liquid two-phase flow patterns based on improved local binary pattern operator,'' Inter. Journal of Multiphase Flow, vol. 36, no. 10, pp. 793-797, Oct. 2010.
  103. D. Xiao and F. Y. Shih, ``A reversible image authentication scheme based on chaotic fragile watermark,'' Intl. Journal of Innovative Computing, Information, and Control, vol. 6, no. 10, pp. 4731-4742, Oct. 2010.
  104. F. Y. Shih and A. Stone, ``A new image stabilization model for vehicle navigation,'' Journal of Positioning, vol. 1, no. 1, pp. 8-17, Nov. 2010.
  105. A. Koval, F. Y. Shih, and B. S. Verkhovsky, ``A pseudo-random pixel rearrangement algorithm based on Gaussian integers for image watermarking,'' Journal of Information Hiding and Multimedia Signal Processing, vol. 2, no. 1, pp. 60-70, Jan. 2011.
  106. S. Lian and F. Y. Shih, ``A special section of intelligent automation and soft computing soft computing for copyright protection,'' Autosoft Journal of Intelligent Automation & Soft Computing, vol. 17, no. 2, pp. 189-190, 2011.
  107. V. G. Edupuganti, F. Y. Shih, and I. Chang, ``An efficient block-based fragile watermarking system for tamper localization and recovery,'' Autosoft Journal of Intelligent Automation & Soft Computing, vol. 17, no. 2, pp. 257-267, 2011.
  108. G. Fu, F. Y. Shih, and H. Wang, ``A kernel-based parametric method for conditional density estimation,'' Pattern Recognition, vol. 44, no. 2, pp. 284-294, Feb. 2011.
  109. F. Y. Shih and A. Sheppard, ``An improved feature vocabulary based method for image categorization,'' Pattern Recognition and Artificial Intelligence, vol. 25, no. 3, pp. 415-429, May 2011.
  110. M. Bachrach and F. Y. Shih, ``Image steganography and steganalysis,'' WIREs Computational Statistics, vol. 3, no. 3, pp. 251-259, May/June 2011.
  111. W. Zhang and F. Y. Shih, ``Semi-fragile spatial watermarking based on local binary pattern operators,'' Journal of Optics Communications, vol. 284, no. 16, pp. 3904-3912, August 2011.
  112. Y. Yuan, F. Y. Shih, J. Jing, H. Wang, and J. Chae, ``Automatic solar filament segmentation and characterization,'' Solar Physics, vol. 272, no. 1, 101-117, Aug. 2011
  113. Y. Q. Zhao, X. F. Wang, F. Y. Shih, and G. Yu, ``A level-set method based on global andlocal regions for image segmentation,'' Pattern Recognition and Artificial Intelligence, vol.26, no. 1, February 2012.
  114. D. Xiao and F. Y. Shih, ``An improved hierarchical fragile watermarking scheme using chaotic sequence sorting and subblock post-processing,'' Journal of Optics Communications, vol. 285, no. 10-11, pp. 2596-2606, May 2012.
  115. Y. Q. Zhao, M. Liao, F. Y. Shih, Y. Q. Shi, ``Tampered region detection of inpainting JPEG images, '' Optik- International Journal for Light and Electron Optics, 2012.
  116. X. H. Li, Y. Q. Zhao, M. Liao, F. Y. Shih, Y. Q. Shi, ``Passive detection of copy-paste forgery between JPEG images, '' Journal of Central South University of Technology, vol. 19, pp. 1-13, 2012.
  117. X. H. Li, Y. Q. Zhao, M. Liao, F. Y. Shih, Y. Q. Shi, ``Detection of tampered region for JPEG images by using mode based first digit features, '' EURASIP Journal on Advances in Signal Processing, vol. 2012:190, pp. 1-22, Aug. 2012.
  118. G. Lynch, F. Y. Shih, and H.-Y. M. Liao, ``An efficient expanding block algorithm for image copy-move forgery detection, '' Information Sciences, vol. 239, no. 8, pp. 253-265, Aug. 2013.
  119. J. Marin and F. Y. Shih, ``Reversible data hiding techniques using multiple scanning difference value histogram modification, '' Journal of Information Hiding and Multimedia Signal Processing, vol. 5, no. 3, pp. 451-460, July 2014.
  120. Y. Q. Zhao, X. H. Wang, X. F. Wang, F. Y. Shih, ``Retinal vessels segmentation based on level set method and region growing, '' Pattern Recognition, vol. 47, no. 7, pp. 2437-2446, July 2014.
  121. W. S. Wehner and F. Y. Shih, ``A self-directed method for image segmentation using a modified top-down region dividing approach, '' Pattern Recognition and Artificial Intelligence, vol. 28, no. 6, pp. 1-13, Sep. 2014.
  122. F. Y. Shih and J. Jakson, ``Copy-cover image forgery detection in parallel processing, '' Pattern Recognition and Artificial Intelligence, vol. 29, no. 8, pp. 1-14, Dec. 2015.
  123. F. Y. Shih and X. Zhong, ``Intelligent watermarking for high-capacity low-distortion data embedding, '' Pattern Recognition and Artificial Intelligence, vol. 30, no. 5, pp. 1-17, May 2016.
  124. M. Liao, Y. Zhao, W. Wang, Y. Zeng, Q. Yang, F. Y. Shih, and B. Zou, ``Efficient liver segmentation in CT images based on graph cuts and bottleneck detection, '' Physica Medica, vol. 32, pp. 1383-1396, Oct. 2016.
  125. F. Y. Shih and X. Zhong, ``High-capacity multiple regions of interest watermarking for medical images, '' Information Sciences, vol. 367-368, pp. 648-659, Nov. 2016.
  126. X. Wang, B. Gao, S. Masnou, L. Chen, I. Theurkauffg, C. Cottin-Bizonne, Y. Zhao, and F. Y. Shih, ``Active colloids segmentation and tracking, '' Pattern Recognition, vol. 60, pp. 177-188, Dec. 2016.
  127. F. Y. Shih and X. Zhong, ``Achieving image watermarking robustness by geometric rectification, '' Pattern Recognition and Artificial Intelligence, vol. 31, no. 4, pp. 1-16, May 2017.
  128. C. M. Tsai and F. Y. Shih, ``An efficient image stitching method for heterogeneous car videos based on bounding boxes of features, '' Pattern Recognition and Artificial Intelligence, vol. 31, no. 5, pp. 1755008 (17 pages), May 2017.
  129. F. Y. Shih, X. Zhong, I.-C. Chang, and Shin'ichi Satoh, ``An adjustable-purpose image watermarking technique by particle swarm optimization, '' Multimedia Tools and Applications, vol. 31, no. 6, June 2017.
  130. M. Liao, Y.-Q. Zhao, Y.-Z. Zeng, B.-J. Zou, X.-F. Wang, F. Y. Shih, ``Automatic liver segmentation from abdominal CT volumes using graph cuts and border marching, '' Computer Methods and Programs in Biomedicine, vol. 143, 1-12, 2017.
  131. F. Y. Shih and X. Zhong, ``Automated counting and tracking of vehicles, '' Pattern Recognition and Artificial Intelligence, vol. 31, no. 12, pp. 1750038 (12 pages), Dec. 2017.
  132. W. Zhang, F. Y. Shih, S. Hu, and M. Jian, ``A visual secret sharing scheme based on improved local binary pattern, '' Pattern Recognition and Artificial Intelligence, vol. 32, no. 6, pp. 1850017 (19 pages), June 2018.
  133. X. Zhong and F. Y. Shih, ``A high-capacity reversible watermarking scheme based on shape decomposition for medical images, '' Pattern Recognition and Artificial Intelligence, vol. 33, no. 1, pp. 1950001 (14 pages), Jan. 2019.
  134. X. Zhong and F. Y. Shih, ``An efficient saliency detection model based on wavelet generalized lifting, '' Pattern Recognition and Artificial Intelligence, vol. 33, no. 2, pp. 1954006 (18 pages), Feb. 2019.
  135. J. Wang, T. Li, and F. Y. Shih, ``Discrimination of computer-generated and photographic images based on color quaternion wavelet transform, '' Pattern Recognition and Artificial Intelligence, vol. 33, no. 2, pp. 1954007 (13 pages), Feb. 2019.
  136. F. Y. Shih, Y. Shen, and X. Zhong, ``Development of deep learning framework for mathematical morphology, '' Pattern Recognition and Artificial Intelligence, vol. 33, no. 6, pp. 1954024 (16 pages), June 2019.
  137. M. Fang, L. Kuo, F. Y. Shih, and S. Taylor, , ``Sector categorization using gradient boosted trees trained on fundamental firm data, '' SSRN Electronic Journal, June 2019.
  138. X. Zhong and F. Y. Shih, , ``Robust multibit image watermarking based on contrast modulation and affine rectification, '' Pattern Recognition and Artificial Intelligence, vol. 33, no. 14, pp. 1954036-1~1954036-18, Dec. 2019.
  139. F. Y. Shih and H. Patel, , ``Deep learning classification on optical coherence tomography retina images, '' Pattern Recognition and Artificial Intelligence, vol. 34, no. 8, pp. 2052002 (20 pages), July 2020.
  140. X. Zhong, P.-C. Huang, S. Mastorakis, and F. Y. Shih, , ``An automated and robust image watermarking scheme based on deep neural networks, '' IEEE Trans. Multimedia, July 2020, doi: 10.1109/TMM.2020.3006415.
  141. S. Liu, F. Y. Shih, G. Russell, K. Russell, and H. Phan, , ``Classification of ecological data by deep learning, '' Pattern Recognition and Artificial Intelligence, vol. 34, no. 13 pp. 2052010 (20 pages), Dec. 2020.
  142. X. Zhong and F. Y. Shih, , ``Automatic image pixel clustering based on mussels wandering optimization, '' Pattern Recognition and Artificial Intelligence, vol. 35, no. 2, pp. 2154005 (17 pages), Feb. 2021.
  143. S. Liu, X. Zhong, and F. Y. Shih, , ``Joint learning for pneumonia classification and segmentation on medical images, '' Pattern Recognition and Artificial Intelligence, vol. 35, no. 5, pp. 2157003 (19 pages), April 2021.
  144. S. Liu, F. Y. Shih, and X. Zhong, , ``Classification of chest X-ray images using novel adaptive morphological neural networks, '' Pattern Recognition and Artificial Intelligence, vol. 35, no. 10, pp. 2157006 (14 pages), Oct. 2021.
  145. S. Somasunder and F. Y. Shih, , ``Land cover image segmentation based on individual class binary masks, '' Pattern Recognition and Artificial Intelligence, vol. 35, no. 16, pp. 2154034 (14 pages), Dec. 2021.
  146. Y. Yang, F. Y. Shih, and U. Roshan, , ``Defense against adversarial attacks based on stochastic descent sign activation networks on medical images, '' Pattern Recognition and Artificial Intelligence, vol. 36, no. 3, pp. 2254005 (17 pages), Mar. 2022.
  147. C. M. Tsai, F. Y. Shih, and Z. Y. Lin, , ``An efficient detection and recognition system for multiple motorcycle license plates based on decision tree, '' Pattern Recognition and Artificial Intelligence, vol. 36, no. 5, pp. 2250022 (23 pages), May 2022.
  148. Y. Yang, F. Y. Shih, and I. C. Chang, , ``Adaptive image reconstruction for defense against adversarial attacks, '' Pattern Recognition and Artificial Intelligence, vol. 36, no. 12, pp. 2252022 (16 pages), Dec. 2022.
  149. Y. Shen, F. Y. Shih, X. Zhong, and I. C. Chang, , ``Deep morphological neural networks, '' Pattern Recognition and Artificial Intelligence, vol. 36, no. 12, pp. 2252023 (21 pages), Dec. 2022.
  150. Y. Shen, F. Y. Shih, and H. Cheng, , ``Drug toxicity prediction by machine learning approaches, '' Pattern Recognition and Artificial Intelligence, vol. 37, no. 10, pp. 2351013 (14 pages), Oct. 2023.
  151. A. S. Rubel and F. Y. Shih, , ``FPA-Net: Frequency-guided position-based attention network for land cover image segmentation, '' Pattern Recognition and Artificial Intelligence, vol. 37, no. 11, pp. 2354015 (20 pages), Nov. 2023.
  152. C. M. Tsai and F. Y. Shih, , ``A novel multi-data-augmentation and multi-deep-learning framework for counting small vehicles and crowds, '' Pattern Recognition and Artificial Intelligence, accepted.
  153. Y. Wu, F. Y. Shih, C. Wang, K. Hsiao, Y. Liu, F. Chang, and E. Yu, , ``The deep hybrid neural network and an application on polyp detection, '' Pattern Recognition and Artificial Intelligence, accepted.