Tse-Shih Chen

767 total citations
18 papers, 530 citations indexed

About

Tse-Shih Chen is a scholar working on Computer Vision and Pattern Recognition, Artificial Intelligence and Information Systems. According to data from OpenAlex, Tse-Shih Chen has authored 18 papers receiving a total of 530 indexed citations (citations by other indexed papers that have themselves been cited), including 15 papers in Computer Vision and Pattern Recognition, 5 papers in Artificial Intelligence and 2 papers in Information Systems. Recurrent topics in Tse-Shih Chen's work include Advanced Steganography and Watermarking Techniques (12 papers), Chaos-based Image/Signal Encryption (10 papers) and Digital Media Forensic Detection (5 papers). Tse-Shih Chen is often cited by papers focused on Advanced Steganography and Watermarking Techniques (12 papers), Chaos-based Image/Signal Encryption (10 papers) and Digital Media Forensic Detection (5 papers). Tse-Shih Chen collaborates with scholars based in Taiwan and Russia. Tse-Shih Chen's co-authors include Ching‐Nung Yang, Tzi‐cker Chiueh, Yi‐Ling Chen, Yi‐Ling Chen, C. Y. Chang, Rastislav Lukàč and Chien‐Ching Chiu and has published in prestigious journals such as Pattern Recognition, Pattern Recognition Letters and Signal Processing.

In The Last Decade

Tse-Shih Chen

17 papers receiving 492 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Tse-Shih Chen Taiwan 9 496 150 29 28 25 18 530
Ran-Zan Wang Taiwan 13 775 1.6× 230 1.5× 64 2.2× 45 1.6× 16 0.6× 28 794
F. Deguillaume Switzerland 11 504 1.0× 38 0.3× 46 1.6× 64 2.3× 25 1.0× 24 522
Ling Du China 9 467 0.9× 54 0.4× 11 0.4× 35 1.3× 9 0.4× 23 512
Zichi Wang China 14 818 1.6× 119 0.8× 21 0.7× 50 1.8× 13 0.5× 73 872
Gordon W. Braudaway United States 9 357 0.7× 26 0.2× 36 1.2× 34 1.2× 9 0.4× 21 404
J. K. Su Germany 6 301 0.6× 29 0.2× 31 1.1× 39 1.4× 11 0.4× 11 345
Jean-François Delaigle Belgium 15 862 1.7× 33 0.2× 22 0.8× 92 3.3× 34 1.4× 36 886
A.L. McKellips United States 5 327 0.7× 53 0.4× 12 0.4× 30 1.1× 54 2.2× 13 409
G.C. Langelaar Netherlands 7 1.2k 2.4× 49 0.3× 53 1.8× 180 6.4× 31 1.2× 7 1.2k
Hsiang-Cheh Huang Taiwan 6 374 0.8× 26 0.2× 32 1.1× 58 2.1× 11 0.4× 16 396

Countries citing papers authored by Tse-Shih Chen

Since Specialization
Citations

This map shows the geographic impact of Tse-Shih Chen's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Tse-Shih Chen with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Tse-Shih Chen more than expected).

Fields of papers citing papers by Tse-Shih Chen

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Tse-Shih Chen. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Tse-Shih Chen. The network helps show where Tse-Shih Chen may publish in the future.

Co-authorship network of co-authors of Tse-Shih Chen

This figure shows the co-authorship network connecting the top 25 collaborators of Tse-Shih Chen. A scholar is included among the top collaborators of Tse-Shih Chen based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Tse-Shih Chen. Tse-Shih Chen is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

18 of 18 papers shown
1.
Chen, Tse-Shih, et al.. (2015). An intelligent surveillance video analysis service in cloud environment. 1–6. 3 indexed citations
2.
3.
Chen, Yi‐Ling, et al.. (2013). Intelligent Urban Video Surveillance System for Automatic Vehicle Detection and Tracking in Clouds. 814–821. 23 indexed citations
4.
Yang, Ching‐Nung, et al.. (2009). MTVSS: (M)isalignment (T)olerant (V)isual (S)ecret (S)haring on resolving alignment difficulty. Signal Processing. 89(8). 1602–1624. 22 indexed citations
5.
Yang, Ching‐Nung, et al.. (2008). New Steganography Scheme in Halftone Images. 1520–1523. 5 indexed citations
6.
Yang, Ching‐Nung & Tse-Shih Chen. (2008). Security Analysis of Authentication of Images Using Recursive Visual Cryptography. Cryptologia. 32(2). 131–136. 6 indexed citations
7.
Yang, Ching‐Nung & Tse-Shih Chen. (2008). Colored visual cryptography scheme based on additive color mixing. Pattern Recognition. 41(10). 3114–3129. 64 indexed citations
8.
Yang, Ching‐Nung, et al.. (2008). Wireless image transmission using burst error correction codes. 331–336. 1 indexed citations
9.
Yang, Ching‐Nung, et al.. (2007). Error Spreading Control in Image Steganographic Embedding Schemes Using Unequal Error Protection. Journal of Imaging Science and Technology. 51(4). 380–385. 1 indexed citations
10.
Yang, Ching‐Nung & Tse-Shih Chen. (2007). EXTENDED VISUAL SECRET SHARING SCHEMES: IMPROVING THE SHADOW IMAGE QUALITY. International Journal of Pattern Recognition and Artificial Intelligence. 21(5). 879–898. 36 indexed citations
11.
Yang, Ching‐Nung & Tse-Shih Chen. (2007). An Image Secret Sharing Scheme with the Capability of Previvewing the Secret Image. 1535–1538. 4 indexed citations
12.
Yang, Ching‐Nung, et al.. (2007). Improvements of image sharing with steganography and authentication. Journal of Systems and Software. 80(7). 1070–1076. 244 indexed citations
13.
Yang, Ching‐Nung & Tse-Shih Chen. (2006). Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation. Pattern Recognition. 39(7). 1300–1314. 35 indexed citations
14.
Yang, Ching‐Nung, et al.. (2006). Embed additional private information into two-dimensional bar codes by the visual secret sharing scheme. Integrated Computer-Aided Engineering. 13(2). 189–199. 17 indexed citations
15.
Yang, Ching‐Nung, et al.. (2005). Enhanced fair micropayment scheme based on hash chain to avoid merchant collusion. e84 d. 39–42. 8 indexed citations
16.
Yang, Ching‐Nung & Tse-Shih Chen. (2004). An algorithm to enumerate codewords for third-order spectral-null codes. 90–90. 1 indexed citations
17.
Yang, Ching‐Nung & Tse-Shih Chen. (2004). Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion. Pattern Recognition Letters. 26(2). 193–206. 54 indexed citations
18.
Chen, Tse-Shih. (1989). Dependence of stress and resistivity of sputtered copper films on deposition conditions. RIT Scholar Works (Rochester Institute of Technology). 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026