Chi-Yao Weng

867 total citations
30 papers, 612 citations indexed

About

Chi-Yao Weng is a scholar working on Computer Vision and Pattern Recognition, Artificial Intelligence and Signal Processing. According to data from OpenAlex, Chi-Yao Weng has authored 30 papers receiving a total of 612 indexed citations (citations by other indexed papers that have themselves been cited), including 29 papers in Computer Vision and Pattern Recognition, 4 papers in Artificial Intelligence and 3 papers in Signal Processing. Recurrent topics in Chi-Yao Weng's work include Advanced Steganography and Watermarking Techniques (29 papers), Chaos-based Image/Signal Encryption (27 papers) and Digital Media Forensic Detection (22 papers). Chi-Yao Weng is often cited by papers focused on Advanced Steganography and Watermarking Techniques (29 papers), Chaos-based Image/Signal Encryption (27 papers) and Digital Media Forensic Detection (22 papers). Chi-Yao Weng collaborates with scholars based in Taiwan, China and India. Chi-Yao Weng's co-authors include Cheng-Hsing Yang, Shiuh-Jeng Wang, Hung–Min Sun, Chin‐Feng Lee, Hao-Kuan Tso, Cheng-Ta Huang, Chwei‐Shyong Tsai, Li Lin, Chun‐Ta Li and Agbotiname Lucky Imoize and has published in prestigious journals such as IEEE Journal on Selected Areas in Communications, IEEE Transactions on Information Forensics and Security and Journal of Systems and Software.

In The Last Decade

Chi-Yao Weng

29 papers receiving 557 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Chi-Yao Weng Taiwan 10 596 35 25 22 21 30 612
Junhui He China 9 510 0.9× 68 1.9× 25 1.0× 13 0.6× 15 0.7× 18 523
Dalel Bouslimi France 10 322 0.5× 61 1.7× 36 1.4× 30 1.4× 16 0.8× 19 352
Monalisa Sahu India 9 250 0.4× 27 0.8× 15 0.6× 26 1.2× 14 0.7× 9 283
S. Thakur India 4 241 0.4× 48 1.4× 29 1.2× 35 1.6× 19 0.9× 4 280
The Duc Kieu Taiwan 12 643 1.1× 38 1.1× 41 1.6× 10 0.5× 7 0.3× 21 656
Chi‐Shiang Chan Taiwan 10 360 0.6× 66 1.9× 19 0.8× 13 0.6× 7 0.3× 40 376
Pauline Puteaux France 9 564 0.9× 81 2.3× 20 0.8× 12 0.5× 7 0.3× 24 594
Nabil A. Lashin Egypt 10 257 0.4× 29 0.8× 26 1.0× 19 0.9× 67 3.2× 17 287
Da-Chun Wu Taiwan 7 926 1.6× 31 0.9× 44 1.8× 36 1.6× 12 0.6× 20 954
Hsien‐Wen Tseng Taiwan 10 569 1.0× 17 0.5× 19 0.8× 9 0.4× 16 0.8× 22 589

Countries citing papers authored by Chi-Yao Weng

Since Specialization
Citations

This map shows the geographic impact of Chi-Yao Weng's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Chi-Yao Weng with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Chi-Yao Weng more than expected).

Fields of papers citing papers by Chi-Yao Weng

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Chi-Yao Weng. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Chi-Yao Weng. The network helps show where Chi-Yao Weng may publish in the future.

Co-authorship network of co-authors of Chi-Yao Weng

This figure shows the co-authorship network connecting the top 25 collaborators of Chi-Yao Weng. A scholar is included among the top collaborators of Chi-Yao Weng based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Chi-Yao Weng. Chi-Yao Weng is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Weng, Chi-Yao, et al.. (2025). Enhanced reversible data hiding in encrypted images via median preserving pixel value ordering and block-wise difference preservation. Signal Image and Video Processing. 19(6). 1 indexed citations
2.
Imoize, Agbotiname Lucky, et al.. (2025). A Review of Machine Learning and Transfer Learning Strategies for Intrusion Detection Systems in 5G and Beyond. Mathematics. 13(7). 1088–1088. 3 indexed citations
3.
Huang, Cheng-Ta, et al.. (2024). Reversible data hiding based on pixel segmentation and prediction for improving hiding capacity. Signal Image and Video Processing. 18(6-7). 5043–5059. 2 indexed citations
4.
Weng, Chi-Yao, et al.. (2024). High-Payload Data-Hiding Scheme Based on Interpolation and Histogram Shifting. Electronics. 13(4). 738–738. 1 indexed citations
5.
Yang, Cheng-Hsing, et al.. (2024). Efficient reversible data hiding in encrypted images using Block Complexity and most significant bit inversion strategy. Multimedia Tools and Applications. 84(22). 25613–25638. 1 indexed citations
6.
Weng, Chi-Yao & Cheng-Hsing Yang. (2023). Reversible Data Hiding in Encrypted Image Using Multiple Data-Hiders Sharing Algorithm. Entropy. 25(2). 209–209. 10 indexed citations
7.
Huang, Cheng-Ta, et al.. (2023). Capacity-Raising Reversible Data Hiding Using Empirical Plus–Minus One in Dual Images. Mathematics. 11(8). 1764–1764. 7 indexed citations
8.
Huang, Cheng-Ta, et al.. (2023). Enhanced Embedding Capacity for Data Hiding Approach Based on Pixel Value Differencing and Pixel Shifting Technology. Electronics. 12(5). 1200–1200. 9 indexed citations
10.
Huang, Cheng-Ta, et al.. (2023). Capacity-raising reversible data hiding scheme using quinary secrets square in dual-images. Multimedia Tools and Applications. 82(27). 42699–42716. 1 indexed citations
11.
Tsai, Chwei‐Shyong, et al.. (2022). Separable reversible data hiding in encrypted images based on Paillier cryptosystem. Multimedia Tools and Applications. 81(13). 18807–18827. 9 indexed citations
12.
Yang, Cheng-Hsing, et al.. (2022). TPEIP: Thumbnail preserving encryption based on sum preserving for image privacy. Journal of Information Security and Applications. 70. 103352–103352. 13 indexed citations
13.
Yang, Cheng-Hsing, et al.. (2020). Achieve Thumbnail Preserving Encryption by Sum Preserving Approaches for Images. 125–129. 7 indexed citations
14.
Lee, Chin‐Feng, et al.. (2016). An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection. Multimedia Tools and Applications. 76(7). 9993–10016. 22 indexed citations
15.
Pan, Jeng‐Shyang, et al.. (2015). A KL Divergence Function for Randomized Secret Shares. 2. 231–234. 1 indexed citations
16.
Sun, Hung–Min, Chi-Yao Weng, Shiuh-Jeng Wang, & Cheng-Hsing Yang. (2013). Data embedding in image-media using weight-function on modulo operations. ACM Transactions on Embedded Computing Systems. 12(2). 1–12. 12 indexed citations
17.
Sun, Hung–Min, Chi-Yao Weng, Chin‐Feng Lee, & Cheng-Hsing Yang. (2011). Anti-Forensics with Steganographic Data Embedding in Digital Images. IEEE Journal on Selected Areas in Communications. 29(7). 1392–1403. 34 indexed citations
18.
Yang, Cheng-Hsing, Chi-Yao Weng, Hao-Kuan Tso, & Shiuh-Jeng Wang. (2010). A data hiding scheme using the varieties of pixel-value differencing in multimedia images. Journal of Systems and Software. 84(4). 669–678. 55 indexed citations
19.
Yang, Cheng-Hsing, Chi-Yao Weng, Shiuh-Jeng Wang, & Hung–Min Sun. (2009). Grouping strategies for promoting image quality of watermarking on the basis of vector quantization. Journal of Visual Communication and Image Representation. 21(1). 49–55. 2 indexed citations
20.
Yang, Cheng-Hsing, Chi-Yao Weng, Shiuh-Jeng Wang, & Hung–Min Sun. (2008). Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems. IEEE Transactions on Information Forensics and Security. 3(3). 488–497. 311 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026