I am a first-year Master student in Computer Science at National Taiwan University. My passion for CS and mathematics was ignited through independent software development projects, which ultimately inspired my self-motivated career transition from dentistry to computer science.
My research focuses on Algorithmic Machine Learning, Convex Optimization, and Spectral Graph Theory, with current emphasis on efficient algorithms for large-scale optimization and graph neural networks.
I have published research in network steganography and possess strong mathematical intuition and theoretical foundations. I am actively seeking summer research internships in algorithmic ML and optimization.
") does not match the recommended repository name for your site ("
").
", so that your site can be accessed directly at "http://
".
However, if the current repository name is intended, you can ignore this message by removing "{% include widgets/debug_repo_name.html %}
" in index.html
.
",
which does not match the baseurl
("
") configured in _config.yml
.
baseurl
in _config.yml
to "
".
Da-Chih Lin, Shang-Yu Chou
IEEE AccessIn Press. 2025
Network header steganography hides data in network headers instead of payloads. Traditional single-channel methods are vulnerable to statistical detection like chi-square tests. We present an enhanced algorithm using BCH code redundant bits to evade detection. A Peterson-Gorenstein-Zierler decoder recovers the data reliably. Our method achieves 80% higher security than existing techniques, significantly improving covert communication in network systems.
Da-Chih Lin, Shang-Yu Chou
IEEE AccessIn Press. 2025
Network header steganography hides data in network headers instead of payloads. Traditional single-channel methods are vulnerable to statistical detection like chi-square tests. We present an enhanced algorithm using BCH code redundant bits to evade detection. A Peterson-Gorenstein-Zierler decoder recovers the data reliably. Our method achieves 80% higher security than existing techniques, significantly improving covert communication in network systems.