Tzung‐Her Chen

2.4k total citations
88 papers, 1.7k citations indexed

About

Tzung‐Her Chen is a scholar working on Computer Vision and Pattern Recognition, Artificial Intelligence and Information Systems. According to data from OpenAlex, Tzung‐Her Chen has authored 88 papers receiving a total of 1.7k indexed citations (citations by other indexed papers that have themselves been cited), including 65 papers in Computer Vision and Pattern Recognition, 31 papers in Artificial Intelligence and 18 papers in Information Systems. Recurrent topics in Tzung‐Her Chen's work include Chaos-based Image/Signal Encryption (59 papers), Advanced Steganography and Watermarking Techniques (57 papers) and Cryptography and Data Security (24 papers). Tzung‐Her Chen is often cited by papers focused on Chaos-based Image/Signal Encryption (59 papers), Advanced Steganography and Watermarking Techniques (57 papers) and Cryptography and Data Security (24 papers). Tzung‐Her Chen collaborates with scholars based in Taiwan, United States and China. Tzung‐Her Chen's co-authors include Kai-Hsiang Tsao, Gwoboa Horng, Du-Shiau Tsai, Wei‐Bin Lee, Chih‐Hung Lin, Chin‐Chen Chang, Kuo‐Chen Wei, Tzu‐Ching Chang, Bingjian Wang and Der‐Chyuan Lou and has published in prestigious journals such as IEEE Transactions on Industrial Electronics, IEEE Access and Pattern Recognition.

In The Last Decade

Tzung‐Her Chen

83 papers receiving 1.6k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Tzung‐Her Chen Taiwan 22 1.5k 521 271 237 106 88 1.7k
Fenlin Liu China 21 1.3k 0.9× 350 0.7× 179 0.7× 199 0.8× 185 1.7× 172 1.7k
Xuehu Yan China 21 1.3k 0.9× 608 1.2× 190 0.7× 38 0.2× 137 1.3× 135 1.5k
Paolo D’Arco Italy 10 328 0.2× 291 0.6× 225 0.8× 322 1.4× 70 0.7× 31 649
Teddy Furon France 18 865 0.6× 268 0.5× 77 0.3× 27 0.1× 122 1.2× 79 1.1k
Lintao Liu China 15 920 0.6× 396 0.8× 80 0.3× 46 0.2× 48 0.5× 53 1.0k
Ziba Eslami Iran 16 514 0.4× 513 1.0× 180 0.7× 105 0.4× 26 0.2× 49 841
Moni Naor Israel 5 1.2k 0.8× 451 0.9× 155 0.6× 77 0.3× 106 1.0× 9 1.4k
Zhenxing Qian China 26 2.2k 1.5× 314 0.6× 79 0.3× 30 0.1× 144 1.4× 103 2.3k
T. Shamoon United States 6 3.8k 2.6× 220 0.4× 201 0.7× 50 0.2× 443 4.2× 13 3.9k
Tayo Oguntebi United States 7 381 0.3× 207 0.4× 142 0.5× 363 1.5× 39 0.4× 9 674

Countries citing papers authored by Tzung‐Her Chen

Since Specialization
Citations

This map shows the geographic impact of Tzung‐Her Chen's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Tzung‐Her Chen with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Tzung‐Her Chen more than expected).

Fields of papers citing papers by Tzung‐Her Chen

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Tzung‐Her Chen. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Tzung‐Her Chen. The network helps show where Tzung‐Her Chen may publish in the future.

Co-authorship network of co-authors of Tzung‐Her Chen

This figure shows the co-authorship network connecting the top 25 collaborators of Tzung‐Her Chen. A scholar is included among the top collaborators of Tzung‐Her Chen based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Tzung‐Her Chen. Tzung‐Her Chen is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Chen, Tzung‐Her, et al.. (2025). Promoting Racial Justice in Cancer Clinical Trials: Community Engaged Solutions for Bridging Gaps. Cancer Medicine. 14(4). e70690–e70690.
2.
Chen, Tzung‐Her, et al.. (2023). Enhanced Steganography for High Dynamic Range Images with Improved Security and Capacity. Applied Sciences. 13(15). 8865–8865. 6 indexed citations
3.
Chen, Tzung‐Her, et al.. (2021). Revisited—The Subliminal Channel in Blockchain and Its Application to IoT Security. Symmetry. 13(5). 855–855. 3 indexed citations
4.
Chen, Tzung‐Her, et al.. (2021). Blockchain as a CA: A Provably Secure Signcryption Scheme Leveraging Blockchains. Security and Communication Networks. 2021. 1–13. 3 indexed citations
5.
Chen, Tzung‐Her, et al.. (2017). A Novel Weighted Visual Cryptography Scheme with High Visual Quality.. Int. J. Netw. Secur.. 19. 922–928. 1 indexed citations
6.
Chen, Tzung‐Her, et al.. (2016). An Improved Anonymous Buyer-Reseller Watermarking Protocol.. International journal of network security. 18. 728–735. 4 indexed citations
7.
Lin, Shu‐Yuan, et al.. (2016). On the Security of Privacy-Preserving Keyword Searching for Cloud Storage Services. International journal of network security. 18(3). 597–600. 1 indexed citations
8.
Lin, Chih‐Yang, et al.. (2015). Efficient Compression-Jointed Quality Controllable Scrambling Method for H.264/SVC.. International journal of network security. 17. 282–289. 1 indexed citations
9.
Chen, Tzung‐Her, Ling Jin, Zhenjun Zhou, et al.. (2015). Factors Influencing the Output of Rural Cataract Surgical Facilities in China: The SHARP Study. Investigative Ophthalmology & Visual Science. 56(2). 1283–1291. 11 indexed citations
10.
Chen, Shuo, et al.. (2013). An authenticated secure image hiding scheme. The Imaging Science Journal. 1 indexed citations
11.
Lin, Chih‐Hung, et al.. (2013). A batch image encryption scheme based on chaining random grids. Scientia Iranica. 20(3). 670–681. 5 indexed citations
12.
Chen, Tzung‐Her, et al.. (2012). Yet another multiple-image encryption by rotating random grids. Signal Processing. 92(9). 2229–2237. 39 indexed citations
13.
Chen, Tzung‐Her, et al.. (2012). A security‐enhanced key agreement protocol based on chaotic maps. Security and Communication Networks. 6(1). 108–114. 9 indexed citations
14.
Chen, Tzung‐Her, et al.. (2008). Multi-secrets visual secret sharing. Asia-Pacific Conference on Communications. 1–5. 9 indexed citations
15.
Chen, Tzung‐Her, et al.. (2007). Security enhancement of a novel proxy key generation protocol. 2595. 681–688. 2 indexed citations
16.
Chen, Tzung‐Her & Wei‐Bin Lee. (2007). A new method for using hash functions to solve remote user authentication. Computers & Electrical Engineering. 34(1). 53–62. 26 indexed citations
17.
Chen, Tzung‐Her, et al.. (2006). Security of new encryption algorithm for image cryptosystems. The Imaging Science Journal. 54(3). 178–187. 4 indexed citations
18.
Horng, Gwoboa, Tzung‐Her Chen, & Du-Shiau Tsai. (2006). Cheating in Visual Cryptography. Designs Codes and Cryptography. 38(2). 219–236. 83 indexed citations
19.
Chen, Tzung‐Her, Wei‐Bin Lee, & Gwoboa Horng. (2004). Secure SAS-like password authentication schemes. Computer Standards & Interfaces. 27(1). 25–31. 10 indexed citations
20.
Chen, Tzung‐Her, et al.. (2003). A Robust Wavelet-Based Watermarking Scheme Using Quantization and Human Visual System Model. Information Technology Journal. 2(3). 213–230. 14 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026