


default search action
Chin-Chen Chang 0001
Person information
- unicode name: 張真誠
- affiliation (since 2005): Feng Chia University, Department of Information Engineering and Computer Science, Taichung, Taiwan
- affiliation (former): Asia University, Department of Computer Science and Information Engineering, Taichung, Taiwan
- affiliation (former): Chinese Medical University, Department of Biomedical Imaging and Radiological Science, Taichung, Taiwan
- affiliation (1989 - 2005): National Chung Cheng University, Chiayi, Taiwan
- affiliation (1983 - 1989): National Chung Hsing University, Institute of Applied Mathematics, Taichung, Taiwan
- affiliation (PhD 1982): National Chiao Tung University, Department of Computer Engineering, Hsinchu, Taiwan
Other persons with the same name
- Chin-Chen Chang 0002 — National United University, Department of Computer Science and Information Engineering, Miaoli, Taiwan (and 2 more)
- Chin-Chen Chang 0003
— National Taiwan University College of Medicine, Department of Medical Imaging, Taipei, Taiwan (and 1 more)
- Chin-Chen Chang 0004 — Industrial Technology and Research Institute, Advanced Technology Center, Hsinchu, Taiwan
- Chin-Chen Chang 0005 — Iowa State University, Ames, IA, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j927]Hui Tian, Mengcheng Wang, Hanyu Quan, Chin-Chen Chang, Athanasios V. Vasilakos:
TEEMRDA: Leveraging trusted execution environments for multi-replica data auditing in cloud storage. Comput. Secur. 150: 104250 (2025) - [j926]Kai Gao, Ji-Hwei Horng
, Ching-Chun Chang, Chinchen Chang:
Crypto-space steganography for 3D mesh models with greedy selection and shortest expansion. Displays 87: 102961 (2025) - [j925]Chongqing Chen
, Dezhi Han, Zihan Guo, Chin-Chen Chang:
Towards bias-aware visual question answering: Rectifying and mitigating comprehension biases. Expert Syst. Appl. 264: 125817 (2025) - [j924]Hui Tian, Nan Gan, Fang Peng, Hanyu Quan, Chin-Chen Chang, Athanasios V. Vasilakos:
Smart contract-based public integrity auditing for cloud storage against malicious auditors. Future Gener. Comput. Syst. 166: 107709 (2025) - [j923]Shuying Xu, Ji-Hwei Horng, Ching-Chun Chang, Chin-Chen Chang:
Reversible Data Hiding in Encrypted JPEG Images With Polynomial Secret Sharing for IoT Security. IEEE Internet Things J. 12(1): 1098-1108 (2025) - [j922]Yijie Lin, Chia-Chen Lin, Ching-Chun Chang, Chin-Chen Chang:
An IoT-Based Electronic Health Protection Mechanism With AMBTC Compressed Images. IEEE Internet Things J. 12(3): 2430-2444 (2025) - [j921]Kai Gao
, Ji-Hwei Horng
, Ching-Chun Chang, Chin-Chen Chang:
Crypto-space reversible data hiding for 3D mesh models with k-Degree neighbor diffusion. J. Inf. Secur. Appl. 89: 103957 (2025) - 2024
- [j920]Kai Gao
, Chin-Chen Chang
, Chia-Chen Lin
:
Key-Free Image Encryption Algorithm Based on Self-Triggered Gaussian Noise Sampling. IEEE Access 12: 153274-153284 (2024) - [j919]Ching-Chun Chang, Shuying Xu, Kai Gao, Chin-Chen Chang:
Cryptanalysis of Dual-Stage Permutation Encryption Using Large-Kernel Convolutional Neural Network and Known Plaintext Attack. Cryptogr. 8(3): 41 (2024) - [j918]Kai Gao, Chin-Chen Chang, Chia-Chen Lin:
Multiple Perspective of Multipredictor Mechanism and Multihistogram Modification for High-Fidelity Reversible Data Hiding. Comput. Syst. Sci. Eng. 48(3): 813-833 (2024) - [j917]Kai Gao
, Ji-Hwei Horng
, Chin-Chen Chang:
Dual mode data hiding in fully encrypted images with pixel-shuffling for cloud applications. Displays 81: 102609 (2024) - [j916]Qi Wen Gan
, Wei-Chuen Yau
, Yee Siang Gan
, Iftekhar Salam
, Shihui Guo, Chinchen Chang, Yubing Wu
, Luchen Zhou
:
DSteganoM: Deep steganography for motion capture data. Expert Syst. Appl. 238(Part C): 121955 (2024) - [j915]Hao Fang, Chi-Hua Chen, Feng-Jang Hwang, Ching-Chun Chang, Chin-Chen Chang:
Metro Station functional clustering and dual-view recurrent graph convolutional network for metro passenger flow prediction. Expert Syst. Appl. 247: 122550 (2024) - [j914]Jui-Chuan Liu, Heng-Xiao Chi, Ching-Chun Chang, Chin-Chen Chang:
An Innovative Information Hiding Scheme Based on Block-Wise Pixel Reordering. Future Internet 16(1): 34 (2024) - [j913]Xu Wang, Jui-Chuan Liu, Ching-Chun Chang, Chin-Chen Chang:
Reversible Data Hiding in Encrypted 3D Mesh Models Based on Multi-Group Partition and Closest Pair Prediction. Future Internet 16(6): 210 (2024) - [j912]Yijie Lin, Jui-Chuan Liu, Ching-Chun Chang, Chin-Chen Chang:
An Innovative Recompression Scheme for VQ Index Tables. Future Internet 16(8): 297 (2024) - [j911]Haochen Lyu, Jianjun Li, Yin Ye, Chin-Chen Chang:
A Ranking Information Based Network for Facial Beauty Prediction. IEICE Trans. Inf. Syst. 107(6): 772-780 (2024) - [j910]Yuhang Zhou, Ting Luo
, Zhouyan He, Gangyi Jiang, Haiyong Xu, Chin-Chen Chang
:
CAISFormer: Channel-wise attention transformer for image steganography. Neurocomputing 603: 128295 (2024) - [j909]Canyang Guo
, Chi-Hua Chen, Feng-Jang Hwang
, Ching-Chun Chang, Chin-Chen Chang:
Multi-view spatiotemporal learning for traffic forecasting. Inf. Sci. 657: 119868 (2024) - [j908]Yijie Lin, Chia-Chen Lin, Jui-Chuan Liu, Chin-Chen Chang
:
Verifiable (t, n) Secret Image Sharing Scheme Based on Slim Turtle Shell Matrix. J. Inf. Secur. Appl. 80: 103679 (2024) - [j907]Rong Wang
, Junchuan Liang, Siyu Wang, Chin-Chen Chang
:
A divide-and-conquer approach to privacy-preserving high-dimensional big data release. J. Inf. Secur. Appl. 83: 103756 (2024) - [j906]Jiang-Yi Lin, Ji-Hwei Horng, Chin-Chen Chang:
Secret image sharing with distinct covers based on improved Cycling-XOR. J. Vis. Commun. Image Represent. 104: 104282 (2024) - [j905]Guo-Dong Su, Chin-Chen Chang, Chia-Chen Lin
:
An effective compressed image authentication scheme based on N-variant AMBTC. Multim. Tools Appl. 83(2): 3801-3829 (2024) - [j904]Wujian Ye, Jiada Wang
, Yongda Cai, Yijun Liu, Huihui Zhou, Chin-Chen Chang:
Joint learning of fuzzy embedded clustering and non-negative spectral clustering. Multim. Tools Appl. 83(25): 66065-66086 (2024) - [j903]Shuying Xu, Chin-Chen Chang, Ji-Hwei Horng
:
Data hiding with thumbnail-preserving encryption for cloud medical images. Multim. Tools Appl. 83(36): 84161-84177 (2024) - [j902]Li Liu
, Chaofan Chen, Yingchun Wu, Chin-Chen Chang, Anhong Wang:
Reversible data hiding in encrypted images with block-based bit-plane reallocation. Multim. Tools Appl. 83(37): 84911-84932 (2024) - [j901]Chongqing Chen
, Dezhi Han, Chin-Chen Chang:
MPCCT: Multimodal vision-language learning paradigm with context-based compact Transformer. Pattern Recognit. 147: 110084 (2024) - [j900]Zhongming Huang
, Feng Wang, Chin-Chen Chang
, Xiuqiang Chen:
A new authentication scheme for dynamic charging system of electric vehicles in fog environment. Secur. Priv. 7(3) (2024) - [j899]Iuon-Chang Lin, Yi-Hsuan Kuo, Ching-Chun Chang, Jui-Chuan Liu, Chin-Chen Chang:
Symmetry in Blockchain-Powered Secure Decentralized Data Storage: Mitigating Risks and Ensuring Confidentiality. Symmetry 16(2): 147 (2024) - [j898]Ting Luo
, Jun Wu
, Zhouyan He
, Haiyong Xu
, Gangyi Jiang
, Chin-Chen Chang
:
WFormer: A Transformer-Based Soft Fusion Model for Robust Image Watermarking. IEEE Trans. Emerg. Top. Comput. Intell. 8(6): 4179-4196 (2024) - [j897]Canyang Guo, Feng-Jang Hwang, Chi-Hua Chen, Ching-Chun Chang, Chin-Chen Chang:
Dynamic Spatiotemporal Straight-Flow Network for Efficient Learning and Accurate Forecasting in Traffic. IEEE Trans. Intell. Transp. Syst. 25(11): 18899-18912 (2024) - [j896]Kai Gao
, Ji-Hwei Horng
, Chin-Chen Chang
:
Reversible Data Hiding for Encrypted 3D Mesh Models With Secret Sharing Over Galois Field. IEEE Trans. Multim. 26: 5499-5510 (2024) - [j895]Mingming Cui
, Dezhi Han
, Han Liu
, Kuan-Ching Li
, Mingdong Tang, Chin-Chen Chang
, Ferheen Ayaz
, Zhengguo Sheng
, Yong Liang Guan:
Secure Data Sharing for Consortium Blockchain-Enabled Vehicular Social Networks. IEEE Trans. Veh. Technol. 73(12): 19682-19695 (2024) - [j894]Guo-Dong Su, Ching-Chun Chang, Chia-Chen Lin
, Chin-Chen Chang:
Towards property-preserving JPEG encryption with structured permutation and adaptive group differentiation. Vis. Comput. 40(9): 6421-6447 (2024) - [j893]Hui Tian, Jia Wang, Chin-Chen Chang, Hanyu Quan:
Public auditing of log integrity for shared cloud storage systems via blockchain. Wirel. Networks 30(7): 6249-6264 (2024) - 2023
- [j892]Congcong Sun
, Hui Tian
, Wojciech Mazurczyk, Chin-Chen Chang
, Hanyu Quan, Yonghong Chen:
Steganalysis of adaptive multi-rate speech with unknown embedding rates using clustering and ensemble learning. Comput. Electr. Eng. 111(Part A): 108909 (2023) - [j891]Shuying Xu, Chin-Chen Chang, Ji-Hwei Horng
:
A Steganography Based on Optimal Multi-Threshold Block Labeling. Comput. Syst. Sci. Eng. 44(1): 721-739 (2023) - [j890]Li Liu, Jing Li, Yingchun Wu, Chin-Chen Chang, Anhong Wang:
High-Imperceptibility Data Hiding Scheme for JPEG Images Based on Direction Modification. Comput. Syst. Sci. Eng. 47(2): 1415-1432 (2023) - [j889]Canyang Guo
, Chi-Hua Chen
, Ching-Chun Chang, Feng-Jang Hwang, Chin-Chen Chang:
De-Correlation Neural Network for Synchronous Implementation of Estimation and Secrecy. IEEE Commun. Lett. 27(1): 165-169 (2023) - [j888]Huimin Li, Dezhi Han, Chongqing Chen, Chin-Chen Chang, Kuan-Ching Li
, Dun Li:
A Visual Question Answering Network Merging High- and Low-Level Semantic Information. IEICE Trans. Inf. Syst. 106(5): 581-589 (2023) - [j887]Wujian Ye, Run Tan, Yijun Liu, Chin-Chen Chang:
The Comparison of Attention Mechanisms with Different Embedding Modes for Performance Improvement of Fine-Grained Classification. IEICE Trans. Inf. Syst. 106(5): 590-600 (2023) - [j886]Hui Tian
, Weiping Ye
, Jia Wang, Hanyu Quan
, Chin-Chen Chang
:
Certificateless Public Auditing for Cloud-Based Medical Data in Healthcare Industry 4.0. Int. J. Intell. Syst. 2023: 1-18 (2023) - [j885]Jiang-Yi Lin, Chin-Chen Chang, Ji-Hwei Horng
:
Crypto-space image steganography based on blind flipping. J. Inf. Secur. Appl. 79: 103660 (2023) - [j884]Chin-Chen Chang, Jui-Chuan Liu, Kai Gao:
Cryptanalysis of iterative encryption and image sharing scheme based on the VQ attack. J. Vis. Commun. Image Represent. 97: 103973 (2023) - [j883]Haoyang Kang
, Lu Leng, Chin-Chen Chang:
Overlapped (7, 4) hamming code for large-capacity and low-loss data hiding. Multim. Tools Appl. 82(20): 30345-30374 (2023) - [j882]Xu Wang
, Jui-Chuan Liu, Chin-Chen Chang
:
A novel reversible data hiding scheme for VQ codebooks. Secur. Priv. 6(6) (2023) - [j881]Shuying Xu
, Chin-Chen Chang
, Ji-Hwei Horng
:
Image Covert Communication With Block Regulation. IEEE Signal Process. Lett. 30: 1217-1221 (2023) - [j880]Kai Gao, Chin-Chen Chang
, Chia-Chen Lin:
Cryptanalysis of Reversible Data Hiding in Encrypted Images Based on the VQ Attack. Symmetry 15(1): 189 (2023) - [j879]Yuehai Chen
, Yijun Liu
, Wujian Ye
, Chin-Chen Chang
:
The High-Performance Design of a General Spiking Convolution Computation Unit for Supporting Neuromorphic Hardware Acceleration. IEEE Trans. Circuits Syst. II Express Briefs 70(9): 3634-3638 (2023) - [j878]Shuying Xu, Ji-Hwei Horng, Ching-Chun Chang, Chin-Chen Chang:
Reversible Data Hiding With Hierarchical Block Variable Length Coding for Cloud Security. IEEE Trans. Dependable Secur. Comput. 20(5): 4199-4213 (2023) - [j877]Yiqin Qiu
, Hui Tian
, Haizhou Li
, Chin-Chen Chang
, Athanasios V. Vasilakos
:
Separable Convolution Network With Dual-Stream Pyramid Enhanced Strategy for Speech Steganalysis. IEEE Trans. Inf. Forensics Secur. 18: 2737-2750 (2023) - [j876]Jiangtao Huang
, Ting Luo
, Li Li
, Gaobo Yang
, Haiyong Xu
, Chin-Chen Chang
:
ARWGAN: Attention-Guided Robust Image Watermarking Model Based on GAN. IEEE Trans. Instrum. Meas. 72: 1-17 (2023) - [j875]Canyang Guo, Chi-Hua Chen, Feng-Jang Hwang, Ching-Chun Chang, Chin-Chen Chang:
Fast Spatiotemporal Learning Framework for Traffic Flow Forecasting. IEEE Trans. Intell. Transp. Syst. 24(8): 8606-8616 (2023) - [j874]Zhenyan Ji
, Xiaojun Song, Qibo Feng
, Haishuai Wang, Chi-Hua Chen
, Chin-Chen Chang
:
RSG-Net: A Recurrent Similarity Network With Ghost Convolution for Wheelset Laser Stripe Image Inpainting. IEEE Trans. Intell. Transp. Syst. 24(11): 12852-12861 (2023) - [c290]Gejian Zhao, Chuan Qin, Xiangyang Luo, Xinpeng Zhang, Chin-Chen Chang:
Perceptual Robust Hashing for Video Copy Detection with Unsupervised Learning. IH&MMSec 2023: 13-18 - [c289]Jui-Chuan Liu
, Chin-Chen Chang
, Chia-Chen Lin
:
Hiding Information in a Well-Trained Vector Quantization Codebook. SPML 2023: 287-292 - [c288]Cheng Shi
, Chin-Chen Chang
, Eyhab Al-Masri
, Abel C. H. Chen
, Haishuai Wang
, Qichun Zhang
, Hsiao-Ting Tseng
, K. Shankar
, Taehong Kim
:
The 3rd International Workshop on Deep Learning for the Web of Things. WWW (Companion Volume) 2023: 1257 - [i3]Junchuan Liang, Rong Wang, Chaosheng Feng, Chin-Chen Chang:
A Survey on Federated Learning Poisoning Attacks and Defenses. CoRR abs/2306.03397 (2023) - 2022
- [j873]Chia-Chen Lin, Chin-Chen Chang
, Wei-Jiun Kao, Jui-Feng Chang:
Efficient Electronic Patient Information Hiding Scheme With Tamper Detection Function for Medical Images. IEEE Access 10: 18470-18485 (2022) - [j872]Manjie Zhai, Dezhi Han, Chin-Chen Chang, Zhijie Sun:
A consortium blockchain-based information management system for unmanned vehicle logistics. Comput. Sci. Inf. Syst. 19(2): 935-955 (2022) - [j871]Shaokang Cai
, Dezhi Han, Xinming Yin, Dun Li
, Chin-Chen Chang:
A Hybrid parallel deep learning model for efficient intrusion detection based on metric learning. Connect. Sci. 34(1): 551-577 (2022) - [j870]Wujian Ye, Junming Lao, Yijun Liu, Chin-Chen Chang, Ziwen Zhang, Hui Li, Huihui Zhou:
Pine pest detection using remote sensing satellite images combined with a multi-scale attention-UNet model. Ecol. Informatics 72: 101906 (2022) - [j869]Wujian Ye, Qingyuan Zeng, Yihang Peng, Yijun Liu
, Chin-Chen Chang:
A two-stage detection method of copy-move forgery based on parallel feature fusion. EURASIP J. Wirel. Commun. Netw. 2022(1): 30 (2022) - [j868]Ming Li, Dezhi Han
, Dun Li
, Han Liu, Chin-Chen Chang:
MFVT: an anomaly traffic detection method merging feature fusion network and vision transformer architecture. EURASIP J. Wirel. Commun. Netw. 2022(1): 39 (2022) - [j867]Zhijie Sun
, Dezhi Han
, Dun Li
, Xiangsheng Wang
, Chin-Chen Chang, Zhongdai Wu:
A blockchain-based secure storage scheme for medical information. EURASIP J. Wirel. Commun. Netw. 2022(1): 40 (2022) - [j866]Yuqi Chen, Dezhi Han, Mingming Cui, Zhongdai Wu, Chin-Chen Chang:
ABOS: an attention-based one-stage framework for person search. EURASIP J. Wirel. Commun. Netw. 2022(1): 75 (2022) - [j865]Hui Liu, Aihua Wu, Mingkang Wei, Chin-Chen Chang:
SKDStream: a dynamic clustering algorithm on time-decaying data stream. EURASIP J. Wirel. Commun. Netw. 2022(1): 102 (2022) - [j864]Xiang Lv
, Dezhi Han, Dun Li
, Lijun Xiao, Chin-Chen Chang:
Network abnormal traffic detection method based on fusion of chord similarity and multiple loss encoder. EURASIP J. Wirel. Commun. Netw. 2022(1): 105 (2022) - [j863]Xiang Shen, Dezhi Han, Chin-Chen Chang, Liang Zong:
Dual Self-Guided Attention with Sparse Question Networks for Visual Question Answering. IEICE Trans. Inf. Syst. 105-D(4): 785-796 (2022) - [j862]Iuon-Chang Lin, Chin-Chen Chang, Hsiao-Chi Chiang:
A Novel e-Cash Payment System with Divisibility Based on Proxy Blind Signature in Web of Things. IEICE Trans. Inf. Syst. 105-D(12): 2092-2103 (2022) - [j861]Liaoying Zhao, Jiaming Li, Jianjun Li, Yong Wu, Shichao Cheng, Zheng Tang, Guobao Hui, Chin-Chen Chang:
Learning stereo disparity with feature consistency and confidence. Int. J. Ad Hoc Ubiquitous Comput. 39(1/2): 83-92 (2022) - [j860]Congcong Sun
, Hui Tian
, Wojciech Mazurczyk, Chin-Chen Chang, Yiqiao Cai, Yonghong Chen:
Towards blind detection of steganography in low-bit-rate speech streams. Int. J. Intell. Syst. 37(12): 12085-12112 (2022) - [j859]Yiqin Qiu
, Hui Tian
, Lili Tang
, Wojciech Mazurczyk
, Chin-Chen Chang:
Steganalysis of adaptive multi-rate speech streams with distributed representations of codewords. J. Inf. Secur. Appl. 68: 103250 (2022) - [j858]Sisheng Chen, Chin-Chen Chang
:
Reversible data hiding in encrypted images using block-based adaptive MSBs prediction. J. Inf. Secur. Appl. 69: 103297 (2022) - [j857]Wujian Ye, Xueke Zhu, Zuoteng Xu, Yijun Liu
, Chin-Chen Chang:
A comprehensive framework of multiple semantics preservation in neural style transfer. J. Vis. Commun. Image Represent. 82: 103378 (2022) - [j856]Xu Wang, Ching-Chun Chang, Chia-Chen Lin, Chin-Chen Chang:
Reversal of pixel rotation: A reversible data hiding system towards cybersecurity in encrypted images. J. Vis. Commun. Image Represent. 82: 103421 (2022) - [j855]Kai Gao
, Ji-Hwei Horng
, Chin-Chen Chang:
High-capacity reversible data hiding in encrypted images based on adaptive block encoding. J. Vis. Commun. Image Represent. 84: 103481 (2022) - [j854]Xu Wang, Ching-Chun Chang, Chia-Chen Lin
, Chin-Chen Chang:
On the multi-level embedding of crypto-image reversible data hiding. J. Vis. Commun. Image Represent. 87: 103556 (2022) - [j853]Zhongliang Yang
, Hao Yang, Ching-Chun Chang, Yongfeng Huang
, Chin-Chen Chang:
Real-time steganalysis for streaming media based on multi-channel convolutional sliding windows. Knowl. Based Syst. 237: 107561 (2022) - [j852]Jiang-Yi Lin, Ji-Hwei Horng
, Chin-Chen Chang
:
A reversible and authenticable secret sharing scheme using dual images. Multim. Tools Appl. 81(13): 17527-17545 (2022) - [j851]Sisheng Chen, Chin-Chen Chang
:
Privacy-preserving data hiding with robustness based on selective encryption and matrix embedding. Multim. Tools Appl. 81(23): 33397-33417 (2022) - [j850]Chongqing Chen
, Dezhi Han, Chin-Chen Chang:
CAAN: Context-Aware attention network for visual question answering. Pattern Recognit. 132: 108980 (2022) - [j849]Xiaojun Mei
, Dezhi Han
, Nasir Saeed
, Huafeng Wu
, Chin-Chen Chang
, Bin Han, Teng Ma
, Jiangfeng Xian:
Trajectory Optimization of Autonomous Surface Vehicles with Outliers for Underwater Target Localization. Remote. Sens. 14(17): 4343 (2022) - [j848]Wenny Ramadha Putri
, Shen-Hsuan Liu, Muhammad Saqlain Aslam
, Yung-Hui Li
, Chin-Chen Chang
, Jia-Ching Wang:
Self-Supervised Learning Framework toward State-of-the-Art Iris Image Segmentation. Sensors 22(6): 2133 (2022) - [j847]Heng-Xiao Chi
, Ji-Hwei Horng
, Chin-Chen Chang
, Yung-Hui Li
:
Embedding Biometric Information in Interpolated Medical Images with a Reversible and Adaptive Strategy. Sensors 22(20): 7942 (2022) - [j846]Hui Tian
, Junyan Wu
, Hanyu Quan, Chin-Chen Chang
:
Detecting Multiple Steganography Methods in Speech Streams Using Multi-Encoder Network. IEEE Signal Process. Lett. 29: 2462-2466 (2022) - [j845]Iuon-Chang Lin
, Chin-Chen Chang
, Yu-Sung Chang:
Data Security and Preservation Mechanisms for Industrial Control Network Using IOTA. Symmetry 14(2): 237 (2022) - [j844]Chin-Chen Chang
, Guo-Dong Su, Chia-Chen Lin, Yung-Hui Li
:
Position-Aware Guided Hiding Data Scheme with Reversibility and Adaptivity for Dual Images. Symmetry 14(3): 509 (2022) - [j843]Jiang-Yi Lin, Ji-Hwei Horng
, Chin-Chen Chang
, Yung-Hui Li
:
Asymmetric Orientation Combination for Reversible and Authenticable Data Hiding of Dual Stego-images. Symmetry 14(4): 819 (2022) - [j842]Chuan Qin
, Chanyu Jiang, Qun Mo, Heng Yao
, Chin-Chen Chang
:
Reversible Data Hiding in Encrypted Image via Secret Sharing Based on GF(p) and GF(2⁸). IEEE Trans. Circuits Syst. Video Technol. 32(4): 1928-1941 (2022) - [j841]Tiancong Zhang
, Tanshuai Hou, Shaowei Weng
, Fumin Zou, Hongchao Zhang, Chin-Chen Chang
:
Adaptive Reversible Data Hiding With Contrast Enhancement Based on Multi-Histogram Modification. IEEE Trans. Circuits Syst. Video Technol. 32(8): 5041-5054 (2022) - [j840]Hui Tian
, Fang Peng, Hanyu Quan, Chin-Chen Chang:
Identity-Based Public Auditing for Cloud Storage of Internet-of-Vehicles Data. ACM Trans. Internet Techn. 22(4): 88:1-88:24 (2022) - [j839]Shanqing Zhang, Shengqi Su, Li Li, Jianfeng Lu, Qili Zhou, Chin-Chen Chang:
CSST-Net: an arbitrary image style transfer network of coverless steganography. Vis. Comput. 38(6): 2125-2137 (2022) - [c287]Chih-Hung Lee, Kun-Sheng Sun, Yun-Qiao Wang, Ji-Hwei Horng
, Chin-Chen Chang:
Secret Message CDMA Multiplexing via QR Codes. ASSE 2022: 52-59 - [c286]Chutisant Kerdvibulvech, Chin-Chen Chang:
A New Study of Integration Between Social Robotic Systems and the Metaverse for Dealing with Healthcare in the Post-COVID-19 Situations. ICSR (2) 2022: 392-401 - [c285]Wenzhong Guo, Chin-Chen Chang, Eyhab Al-Masri, Chi-Hua Chen
, Haishuai Wang, Qichun Zhang, K. Shankar:
DLWoT'22: 2nd International Workshop on Deep Learning for the Web of Things. WWW (Companion Volume) 2022: 936-939 - [i2]Zhijie Sun, Dezhi Han, Dun Li, Xiangsheng Wang, Chin-Chen Chang, Zhongdai Wu:
A blockchain-based secure storage scheme for medical information. CoRR abs/2207.06102 (2022) - 2021
- [j838]Kai Gao
, Ji-Hwei Horng
, Chin-Chen Chang
:
An Authenticatable (2, 3) Secret Sharing Scheme Using Meaningful Share Images Based on Hybrid Fractal Matrix. IEEE Access 9: 50112-50125 (2021) - [j837]Shuying Xu, Ji-Hwei Horng
, Chin-Chen Chang
:
Reversible Data Hiding Scheme Based on VQ Prediction and Adaptive Parametric Binary Tree Labeling for Encrypted Images. IEEE Access 9: 55191-55204 (2021) - [j836]Shuying Xu, Chin-Chen Chang, Yanjun Liu:
A novel image compression technology based on vector quantisation and linear regression prediction. Connect. Sci. 33(2): 219-236 (2021) - [j835]Xiao-Zhu Xie, Chin-Chen Chang, Ji-Hwei Horng
:
An EMD-based data hiding scheme for JPEG images. Connect. Sci. 33(3): 515-531 (2021) - [j834]Chin-Chen Chang, Ji-Hwei Horng
, Chia-Shou Shih, Xu Wang:
VQ-oriented data hiding based on adjustable error compensation strategy. Connect. Sci. 33(4): 835-853 (2021) - [j833]Kaimeng Chen, Chin-Chen Chang:
High-capacity separable reversible data-Hiding method in encrypted images based on block-level encryption and Huffman compression coding. Connect. Sci. 33(4): 975-994 (2021) - [j832]Lin Li
, Alan Chin-Chen Chang
, Chia-Chen Lin
:
Reversible Data Hiding in Encrypted Image Based on (7, 4) Hamming Code and UnitSmooth Detection. Entropy 23(7): 790 (2021) - [j831]Keju Meng, Fuyou Miao, Yu Ning, Wenchao Huang, Yan Xiong, Chin-Chen Chang:
A proactive secret sharing scheme based on Chinese remainder theorem. Frontiers Comput. Sci. 15(2): 152801 (2021) - [j830]Chin-Chen Chang
, Jui-Feng Chang, Wei-Jiun Kao, Ji-Hwei Horng
:
Two-Layer Reversible Data Hiding for VQ-Compressed Images Based on De-Clustering and Indicator-Free Search-Order Coding. Future Internet 13(8): 215 (2021) - [j829]Guo-Hua Qiu, Chin-Feng Lee, Chinchen Chang:
Turtle-shell data embedding method with high image fidelity. Int. J. Embed. Syst. 14(2): 149-159 (2021) - [j828]Ting-Ting Xia, Juan Lin, Chin-Chen Chang, Tzu-Chuen Lu:
A novel adjustable reversible data hiding method for AMBTC-compressed codes using Hamming distance. Int. J. Embed. Syst. 14(4): 313-323 (2021) - [j827]Kai Gao, Chin-Chen Chang, Yanjun Liu:
Predicting missing data for data integrity based on the linear regression model. Int. J. Embed. Syst. 14(4): 355-362 (2021) - [j826]Chinchen Chang, Ji-Hwei Horng
, Wei-Jiun Kao:
A secure extended LBP data hiding scheme based on octagon-shaped shell. Int. J. Embed. Syst. 14(5): 497-508 (2021) - [j825]Wai-Kong Lee, Lanxiang Chen, Chinchen Chang, Zhiqiang Yao:
Post-quantum blockchain for secure communication in IoT-based smart home services. Int. J. Embed. Syst. 14(5): 509-524 (2021) - [j824]Xu Wang, Chin-Chen Chang, Chia-Chen Lin
:
Reversible data hiding in encrypted images with block-based adaptive MSB encoding. Inf. Sci. 567: 375-394 (2021) - [j823]Peng-Cheng Huang, Chinchen Chang, Yung-Hui Li, Yanjun Liu:
Enhanced (n, n)-threshold QR code secret sharing scheme based on error correction mechanism. J. Inf. Secur. Appl. 58: 102719 (2021) - [j822]Ji-Hwei Horng
, Chin-Chen Chang, Kun-Sheng Sun:
A Two-Layer Steganography for Mosaic Images. KSII Trans. Internet Inf. Syst. 15(9): 3298-3321 (2021) - [j821]Hua Wu, Ji-Hwei Horng
, Chin-Chen Chang:
Adaptive data hiding scheme based on magic matrix of flexible dimension. KSII Trans. Internet Inf. Syst. 15(9): 3348-3364 (2021) - [j820]Juan Lin, Ji-Hwei Horng
, Yanjun Liu, Chin-Chen Chang
:
An anisotropic reference matrix for image steganography. J. Vis. Commun. Image Represent. 74: 102969 (2021) - [j819]Chih-Cheng Chen, Chin-Chen Chang, Kaimeng Chen:
High-capacity reversible data hiding in encrypted image based on Huffman coding and differences of high nibbles of pixels. J. Vis. Commun. Image Represent. 76: 103060 (2021) - [j818]Sisheng Chen, Chin-Chen Chang:
Reversible data hiding based on three shadow images using rhombus magic matrix. J. Vis. Commun. Image Represent. 76: 103064 (2021) - [j817]Xu Wang
, Ching-Chun Chang, Chia-Chen Lin
, Chin-Chen Chang:
Privacy-preserving reversible data hiding based on quad-tree block encoding and integer wavelet transform. J. Vis. Commun. Image Represent. 79: 103203 (2021) - [j816]Xu Zhang, Dezhi Han, Chin-Chen Chang:
RDMMFET: Representation of Dense Multimodality Fusion Encoder Based on Transformer. Mob. Inf. Syst. 2021: 2662064:1-2662064:9 (2021) - [j815]Li Liu, Lifang Wang, Chin-Chen Chang
:
Separable reversible data hiding in encrypted images based on flexible preservation of the differences. Multim. Tools Appl. 80(5): 6639-6659 (2021) - [j814]Guo-Dong Su, Chin-Chen Chang, Chih-Cheng Chen:
A hybrid-Sudoku based fragile watermarking scheme for image tampering detection. Multim. Tools Appl. 80(8): 12881-12903 (2021) - [j813]Shuying Xu, Chin-Chen Chang
, Yanjun Liu:
A high-capacity reversible data hiding scheme for encrypted images employing vector quantization prediction. Multim. Tools Appl. 80(13): 20307-20325 (2021) - [j812]Chia-Chen Lin
, Si-Liang He, Chin-Chen Chang:
Pixel-based fragile image watermarking based on absolute moment block truncation coding. Multim. Tools Appl. 80(19): 29497-29518 (2021) - [j811]Xu Wang, Chin-Chen Chang
, Chia-Chen Lin
:
High capacity reversible data hiding in encrypted images based on prediction error and block classification. Multim. Tools Appl. 80(19): 29915-29937 (2021) - [j810]Sisheng Chen, Chin-Chen Chang
, Chia-Chen Lin
:
Reversible data hiding in encrypted images based on homomorphism and block-based congruence transformation. Multim. Tools Appl. 80(21): 33115-33138 (2021) - [j809]Chin-Chen Chang, Xu Wang, Chia-Chen Lin
:
An efficient dual prediction-based reversible data hiding and reduced code method for AMBTC. Multim. Tools Appl. 80(24): 33157-33176 (2021) - [j808]Chin-Chen Chang, Xu Wang, Chia-Chen Lin
:
Correction to: An efficient dual prediction-based reversible data hiding and reduced code method for AMBTC. Multim. Tools Appl. 80(24): 33177 (2021) - [j807]Xiao-Zhu Xie, Chin-Chen Chang
:
Hiding data in dual images based on turtle shell matrix with high embedding capacity and reversibility. Multim. Tools Appl. 80(30): 36567-36584 (2021) - [j806]Fuyou Miao, Yue Yu, Keju Meng
, Yan Xiong, Chin-Chen Chang:
Grouped Secret Sharing Schemes Based on Lagrange Interpolation Polynomials and Chinese Remainder Theorem. Secur. Commun. Networks 2021: 6678345:1-6678345:9 (2021) - [j805]Yen-Ching Chang
, Chin-Chen Chang
:
Using an Optimization Algorithm to Detect Hidden Waveforms of Signals. Sensors 21(2): 588 (2021) - [j804]Li Li, Rui Bai, Shanqing Zhang, Chin-Chen Chang
, Mengtao Shi:
Screen-Shooting Resilient Watermarking Scheme via Learned Invariant Keypoints and QT. Sensors 21(19): 6554 (2021) - [j803]Keju Meng, Fuyou Miao
, Yan Xiong, Chin-Chen Chang:
A reversible extended secret image sharing scheme based on Chinese remainder theorem. Signal Process. Image Commun. 95: 116221 (2021) - [j802]Jiang-Yi Lin, Ji-Hwei Horng
, Chin-Chen Chang
:
A Novel (2, 3)-Threshold Reversible Secret Image Sharing Scheme Based on Optimized Crystal-Lattice Matrix. Symmetry 13(11): 2063 (2021) - [j801]Chia-Chen Lin
, Thai-Son Nguyen
, Chin-Chen Chang
:
LRW-CRDB: Lossless Robust Watermarking Scheme for Categorical Relational Databases. Symmetry 13(11): 2191 (2021) - [j800]Juan Lin, Chin-Chen Chang
, Ji-Hwei Horng
:
Asymmetric Data Hiding for Compressed Images with High Payload and Reversibility. Symmetry 13(12): 2355 (2021) - [c284]Chin-Chen Chang, Ji-Hwei Horng
, Jui-Feng Chang:
High-Payload Data Hiding Scheme Based on Ordered Shifting of AC Coefficients for JPEG Images. iFUZZY 2021: 1-6 - [c283]Kunpeng Sun, Ji-Hwei Horng
, Chin-Chen Chang:
Reversible Data Hiding for SMVQ Compressed Images Based on De-Clustering Rules. SNPD 2021: 191-197 - [c282]Chin-Chen Chang, Thai-Son Nguyen
, Chia-Chen Lin:
A Reversible Database Watermark Scheme for Textual and Numerical Datasets. SNPD 2021: 208-212 - 2020
- [j799]Xiao-Zhu Xie
, Chin-Chen Chang
, Chia-Chen Lin
:
A Hybrid Reversible Data Hiding for Multiple Images With High Embedding Capacity. IEEE Access 8: 37-52 (2020) - [j798]Hui Tian
, Jie Liu
, Chin-Chen Chang
, Yongfeng Huang
, Yiqiao Cai
:
Detecting Steganography in Inactive Voice-Over-IP Frames Based on Statistic Characteristics of Fundamental Frequency. IEEE Access 8: 6117-6129 (2020) - [j797]Wenbin Zheng
, Chin-Chen Chang
, Shaowei Weng
:
A Novel Adjustable RDH Method for AMBTC-Compressed Codes Using One-to-Many Map. IEEE Access 8: 13105-13118 (2020) - [j796]Juan Lin
, Shaowei Weng
, Tiancong Zhang
, Bo Ou
, Chin-Chen Chang
:
Two-Layer Reversible Data Hiding Based on AMBTC Image With (7, 4) Hamming Code. IEEE Access 8: 21534-21548 (2020) - [j795]Sisheng Chen
, Chin-Chen Chang
, Qunying Liao
:
Fidelity Preserved Data Hiding in Encrypted Images Based on Homomorphism and Matrix Embedding. IEEE Access 8: 22345-22356 (2020) - [j794]Guo-Dong Su
, Chin-Chen Chang
, Chia-Chen Lin
:
A High Capacity Reversible Data Hiding in Encrypted AMBTC-Compressed Images. IEEE Access 8: 26984-27000 (2020) - [j793]Zhan Yu
, Chia-Chen Lin
, Chin-Chen Chang
:
ABMC-DH: An Adaptive Bit-Plane Data Hiding Method Based on Matrix Coding. IEEE Access 8: 27634-27648 (2020) - [j792]Li Liu
, Anhong Wang
, Chin-Chen Chang
:
Separable Reversible Data Hiding in Encrypted Images With High Capacity Based on Median-Edge Detector Prediction. IEEE Access 8: 29639-29647 (2020) - [j791]Yuehui Li
, Chin-Chen Chang
, Mingxing He
:
High Capacity Reversible Data Hiding for VQ-Compressed Images Based on Difference Transformation and Mapping Technique. IEEE Access 8: 32226-32245 (2020) - [j790]Xiao-Zhu Xie
, Chin-Chen Chang
, Kaimeng Chen
:
A High-Embedding Efficiency RDH in Encrypted Image Combining MSB Prediction and Matrix Encoding for Non-Volatile Memory-Based Cloud Service. IEEE Access 8: 52028-52040 (2020) - [j789]Wei Chen
, Chin-Chen Chang
, Shaowei Weng
, Bo Ou
:
Multi-Layer Mini-Sudoku Based High-Capacity Data Hiding Method. IEEE Access 8: 69256-69267 (2020) - [j788]Peng-Cheng Huang
, Chin-Chen Chang
, Yung-Hui Li
, Yanjun Liu
:
Efficient QR Code Secret Embedding Mechanism Based on Hamming Code. IEEE Access 8: 86706-86714 (2020) - [j787]Zhiwei Mou
, Wujian Ye
, Chin-Chen Chang
, Yitao Mao
:
The Application Analysis of Neural Network Techniques on Lexical Tone Rehabilitation of Mandarin-Speaking Patients With Post-Stroke Dysarthria. IEEE Access 8: 90709-90717 (2020) - [j786]Ji-Hwei Horng
, Chin-Chen Chang
, Guanlong Li
:
Steganography Using Quotient Value Differencing and LSB Substitution for AMBTC Compressed Images. IEEE Access 8: 129347-129358 (2020) - [j785]Kai Gao
, Ji-Hwei Horng
, Yanjun Liu
, Chin-Chen Chang
:
A Reversible Secret Image Sharing Scheme Based on Stick Insect Matrix. IEEE Access 8: 130405-130416 (2020) - [j784]Guo-Dong Su
, Chin-Chen Chang
, Chia-Chen Lin
:
Effective Self-Recovery and Tampering Localization Fragile Watermarking for Medical Images. IEEE Access 8: 160840-160857 (2020) - [j783]Kai Gao
, Ji-Hwei Horng
, Chin-Chen Chang
:
A Novel (2, 3) Reversible Secret Image Sharing Based on Fractal Matrix. IEEE Access 8: 174325-174341 (2020) - [j782]Sisheng Chen
, Chin-Chen Chang
:
Reversible Data Hiding in Encrypted Images Based on Reversible Integer Transformation and Quadtree-Based Partition. IEEE Access 8: 184199-184209 (2020) - [j781]Shanshan Tu, Muhammad Waqas
, Qiangqiang Lin, Sadaqat ur Rehman, Muhammad Hanif
, Chuangbai Xiao, M. Majid Butt
, Chin-Chen Chang:
Tracking area list allocation scheme based on overlapping community algorithm. Comput. Networks 173: 107182 (2020) - [j780]Shanshan Tu, Muhammad Waqas
, Yuan Meng, Sadaqat ur Rehman, Iftekhar Ahmad
, Anis Koubaa, Zahid Halim
, Muhammad Hanif
, Chin-Chen Chang, Chengjie Shi:
Mobile fog computing security: A user-oriented smart attack defense strategy based on DQL. Comput. Commun. 160: 790-798 (2020) - [j779]Rong Wang
, Yan Zhu
, Chin-Chen Chang
, Qiang Peng:
Privacy-preserving high-dimensional data publishing for classification. Comput. Secur. 93: 101785 (2020) - [j778]Lanxiang Chen, Nan Zhang, Hung-Min Sun, Chin-Chen Chang, Shui Yu
, Kim-Kwang Raymond Choo
:
Secure search for encrypted personal health records from big data NoSQL databases in cloud. Computing 102(6): 1521-1545 (2020) - [j777]Xu Wu, Shihui Guo
, Xing Gao, Minghong Liao, Chin-Chen Chang
, Wei-Chuen Yau:
Information hiding in motion data of virtual characters. Expert Syst. Appl. 159: 113516 (2020) - [j776]Guo-Dong Su, Chin-Chen Chang, Chia-Chen Lin
, Zhiqiang Yao:
Secure high capacity tetris-based scheme for data hiding. IET Image Process. 14(17): 4633-4645 (2020) - [j775]Yu Chen, Jiang-Yi Lin, Chin-Chen Chang, Yu-Chen Hu:
Reversibly hiding data using dual images scheme based on EMD data hiding method. Int. J. Comput. Sci. Eng. 21(4): 583-592 (2020) - [j774]Jiang-Yi Lin, Yu Chen, Chin-Chen Chang, Yu-Chen Hu:
A novel high capacity turtle shell-based data hiding with location table free. Int. J. Comput. Sci. Eng. 22(1): 135-145 (2020) - [j773]Dongwei Gao, Hefeng Chen, Chinchen Chang:
Plaintext aware encryption in the standard model under the linear Diffie-Hellman knowledge assumption. Int. J. Comput. Sci. Eng. 22(2/3): 270-279 (2020) - [j772]Ting-Ting Xia, Juan Lin, Chin-Chen Chang, Tzu-Chuen Lu:
Reversible data hiding scheme based on the AMBTC compression technique and Huffman coding. Int. J. Comput. Sci. Eng. 22(4): 383-393 (2020) - [j771]Chin-Chen Chang, Guo-Dong Su, Chia-Chen Lin:
An improved Sudoku-based data hiding scheme using greedy method. Int. J. Comput. Sci. Eng. 23(1): 10-21 (2020) - [j770]Guo-Hua Qiu, Chin-Feng Lee, Chin-Chen Chang:
Greedy algorithm for image quality optimisation based on turtle-shell steganography. Int. J. Comput. Sci. Eng. 23(1): 50-62 (2020) - [j769]Ji-Hwei Horng
, Xiao-Zhu Xie, Chin-Chen Chang:
The analysis of stego image visual quality for a data hiding scheme based on two-layer turtle shell matrix. Int. J. Comput. Sci. Eng. 23(4): 336-340 (2020) - [j768]Kuo-Kun Tseng, Xialong He, Xiaoxiao An, Chin-Chen Chang, Chao Wang, Xiangmin Guo:
Packet Watermarking With ECG Biological Feature. Int. J. Netw. Secur. 22(1): 1-11 (2020) - [j767]Hui Tian, Zhao-Hua Zhu, Chin-Chen Chang, Yongfeng Huang, Tian Wang, Yonghong Chen, Yiqiao Cai:
StegoNote: Steganography in Guitar Music Using Note Modulation. Int. J. Netw. Secur. 22(1): 68-79 (2020) - [j766]Yu Chen, Jiang-Yi Lin, Chin-Chen Chang, Yu-Chen Hu:
Low-Computation-Cost Data Hiding Scheme Based on Turtle Shell. Int. J. Netw. Secur. 22(2): 296-305 (2020) - [j765]Hefeng Chen, Chin-Chen Chang, Kaimeng Chen:
Reversible Data Hiding Schemes in Encrypted Images Based on the Paillier Cryptosystem. Int. J. Netw. Secur. 22(3): 523-533 (2020) - [j764]Yu Chen, Jiang-Yi Lin, Chin-Chen Chang, Yu-Chen Hu:
Sharing a Secret Image in the Cloud Using Two Shadows. Int. J. Netw. Secur. 22(4): 551-560 (2020) - [j763]Chin-Chen Chang, Jun-Yong Chen, Yan-Hong Chen, Yanjun Liu:
A Reversible Data Hiding Method for SMVQ Indices Based on Improved Locally Adaptive Coding. Int. J. Netw. Secur. 22(4): 575-583 (2020) - [j762]Yanjun Liu, Chin-Chen Chang, Peng-Cheng Huang:
One-Code-Pass User Authentication Based on QR Code and Secret Sharing. Int. J. Netw. Secur. 22(5): 752-762 (2020) - [j761]Yong-qing Chen, Wei-jiao Sun, Liyao Li, Chin-Chen Chang, Xu Wang:
An efficient general data hiding scheme based on image interpolation. J. Inf. Secur. Appl. 54: 102584 (2020) - [j760]Chin-Feng Lee, Chin-Chen Chang, Guanlong Li:
A Data Hiding Scheme Based on Turtle-shell for AMBTC Compressed Images. KSII Trans. Internet Inf. Syst. 14(6): 2554-2575 (2020) - [j759]Xiao-Shuang Li, Chin-Chen Chang
, Mingxing He, Chia-Chen Lin
:
A lightweight authenticable visual secret sharing scheme based on turtle shell structure matrix. Multim. Tools Appl. 79(1-2): 453-476 (2020) - [j758]Xu Wang, Chin-Chen Chang, Chia-Chen Lin
:
Adaptive reversible data hiding scheme for AMBTC compressed images. Multim. Tools Appl. 79(9-10): 6547-6568 (2020) - [j757]Xiao-Zhu Xie, Chin-Chen Chang
, Yu-Chen Hu:
An adaptive reversible data hiding scheme based on prediction error histogram shifting by exploiting signed-digit representation. Multim. Tools Appl. 79(33-34): 24329-24346 (2020) - [j756]Chin-Chen Chang, Chia-Chen Lin
, Guo-Dong Su:
An effective image self-recovery based fragile watermarking using self-adaptive weight-based compressed AMBTC. Multim. Tools Appl. 79(33-34): 24795-24824 (2020) - [j755]Hsiao-Ling Wu, Chin-Chen Chang, Long-Sheng Chen
:
Secure and anonymous authentication scheme for the Internet of Things with pairing. Pervasive Mob. Comput. 67: 101177 (2020) - [j754]Xiaoping Li, Hefeng Chen, Yanjun Liu, Chin-Chen Chang
:
Unordered Multisecret Sharing Based on Generalized Chinese Remainder Theorem. Secur. Commun. Networks 2020: 6073721:1-6073721:8 (2020) - [j753]Zhe Xia
, Yining Liu, Ching-Fang Hsu, Chinchen Chang:
Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple Authentications. Secur. Commun. Networks 2020: 6183861:1-6183861:8 (2020) - [j752]Ji-Hwei Horng
, Shuying Xu, Ching-Chun Chang, Chinchen Chang:
An Efficient Data-Hiding Scheme Based on Multidimensional Mini-SuDoKu. Sensors 20(9): 2739 (2020) - [j751]Ching-Chun Chang, Ji-Hwei Horng
, Chia-Shou Shih, Chin-Chen Chang:
A Maze Matrix-Based Secret Image Sharing Scheme with Cheater Detection. Sensors 20(13): 3802 (2020) - [j750]Hsiao-Ling Wu, Chin-Chen Chang, Yao-Zhu Zheng, Long-Sheng Chen
, Chih-Cheng Chen
:
A Secure IoT-Based Authentication System in Cloud Computing Environment. Sensors 20(19): 5604 (2020) - [j749]Meng Liu
, Shanshan Tu
, Chuangbai Xiao, Muhammad Waqas
, Sadaqat ur Rehman, Muhammad Aamir, Chin-Chen Chang
:
The Allocation and Reuse Scheme of Physical Cell Identifications Based on Maximum Degree First Coloring Algorithm. IEEE Syst. J. 14(1): 582-591 (2020) - [j748]Chia-Chen Lin
, Chin-Chen Chang
, Yao-Zhu Zheng:
A Ring Signature Based Anonymity Authentication Scheme for Group Medical Consultation. Symmetry 12(12): 2009 (2020) - [j747]Mengjie Lv, Shuming Zhou
, Gaolin Chen, Lanxiang Chen
, Jiafei Liu, Chin-Chen Chang
:
On Reliability of Multiprocessor System Based on Star Graph. IEEE Trans. Reliab. 69(2): 715-724 (2020) - [j746]Mingming Cui
, Dezhi Han
, Jun Wang
, Kuan-Ching Li
, Chin-Chen Chang
:
ARFV: An Efficient Shared Data Auditing Scheme Supporting Revocation for Fog-Assisted Vehicular Ad-Hoc Networks. IEEE Trans. Veh. Technol. 69(12): 15815-15827 (2020) - [c281]Kai Huang, Jianjun Li, Shichao Cheng, Jie Yu, Wanyong Tian, Lulu Zhao, Junfeng Hu, Chin-Chen Chang:
An Efficient Algorithm of Facial Expression Recognition by TSG-RNN Network. MMM (2) 2020: 161-174
2010 – 2019
- 2019
- [j745]Xin Tang
, Yongfeng Huang
, Chin-Chen Chang, Linna Zhou:
Efficient Real-Time Integrity Auditing With Privacy-Preserving Arbitration for Images in Cloud Storage System. IEEE Access 7: 33009-33023 (2019) - [j744]Shaowei Weng
, Yi Chen, Bo Ou
, Chin-Chen Chang, Chunyu Zhang:
Improved K-Pass Pixel Value Ordering Based Data Hiding. IEEE Access 7: 34570-34582 (2019) - [j743]Cheng Guo
, Ruhan Zhuang, Chin-Chen Chang, Qiongqiong Yuan:
Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data. IEEE Access 7: 35826-35837 (2019) - [j742]Yijun Liu, Zuoteng Xu, Wujian Ye
, Ziwen Zhang, Shaowei Weng, Chin-Chen Chang, Huajin Tang:
Image Neural Style Transfer With Preserving the Salient Regions. IEEE Access 7: 40027-40037 (2019) - [j741]Wujian Ye
, Haowen Chen, Ziwen Zhang, Yijun Liu, Shaowei Weng, Chin-Chen Chang
:
Hybrid Scheme of Image's Regional Colorization Using Mask R-CNN and Poisson Editing. IEEE Access 7: 115901-115913 (2019) - [j740]Xiaoping Li
, Yanjun Liu
, Hefeng Chen
, Chin-Chen Chang
:
A Secret Image Restoring Scheme Using Threshold Pairs of Unordered Image Shares. IEEE Access 7: 118249-118258 (2019) - [j739]Hui Tian
, Jie Liu, Chin-Chen Chang, Chih-Cheng Chen, Yongfeng Huang
:
Steganalysis of AMR Speech Based on Multiple Classifiers Combination. IEEE Access 7: 140957-140968 (2019) - [j738]Mingze He
, Yanjun Liu
, Chin-Chen Chang
, Mingxing He:
A Mini-Sudoku Matrix-Based Data Embedding Scheme With High Payload. IEEE Access 7: 141414-141425 (2019) - [j737]Jianjun Li
, Chin-Feng Lee, Chin-Chen Chang
, Jiang-Yi Lin, Yun-He Wu:
Reversible Data Hiding Scheme Based on Quad-Tree and Pixel Value Ordering. IEEE Access 7: 142947-142962 (2019) - [j736]Zhan Yu, Chia-Chen Lin
, Chin-Chen Chang
, Guo-Dong Su:
HBF-DH: An Enhanced Payload Hybrid Data Hiding Method Based on a Hybrid Strategy and Block Features. IEEE Access 7: 148439-148452 (2019) - [j735]Chih-Cheng Chen, Chin-Chen Chang, Chia-Chen Lin
, Guo-Dong Su:
TSIA: A Novel Image Authentication Scheme for AMBTC-Based Compressed Images Using Turtle Shell Based Reference Matrix. IEEE Access 7: 149515-149526 (2019) - [j734]Lanxiang Chen, Wai-Kong Lee
, Chin-Chen Chang, Kim-Kwang Raymond Choo
, Nan Zhang:
Blockchain based searchable encryption for electronic health record sharing. Future Gener. Comput. Syst. 95: 420-429 (2019) - [j733]Qiangqiang Lin, Shanshan Tu, Muhammad Waqas
, Sadaqat ur Rehman, Chinchen Chang:
Tracking areas planning based on spectral clustering in small cell networks. IET Commun. 13(13): 1921-1927 (2019) - [j732]Cheng Guo, Pengxu Tian, Chin-Chen Chang:
Privacy preserving weighted similarity search scheme for encrypted data. IET Inf. Secur. 13(1): 61-69 (2019) - [j731]Huidan Hu, Changlu Lin, Chin-Chen Chang, Lanxiang Chen:
Enhanced secure data backup scheme using multi-factor authentication. IET Inf. Secur. 13(6): 649-658 (2019) - [j730]Xiao-Zhu Xie, Chin-Chen Chang, Chia-Chen Lin
:
Reversibility-oriented secret image sharing mechanism with steganography and authentication based on code division multiplexing. IET Image Process. 13(9): 1411-1420 (2019) - [j729]Yanjun Liu, Chin-Chen Chang:
A Cloud-assisted Passenger Authentication Scheme for Japan Rail Pass Based on Image Morphing. Int. J. Netw. Secur. 21(2): 211-220 (2019) - [j728]Xiao-Shuang Li, Chin-Chen Chang, Mingxing He, Chia-Chen Lin:
Secure High Capacity Data Hiding Scheme based on Reference Matrix. Int. J. Netw. Secur. 21(6): 918-929 (2019) - [j727]Chin-Chen Chang
, Wai-Kong Lee
, Yanjun Liu, Bok-Min Goi, Raphael C.-W. Phan:
Signature Gateway: Offloading Signature Generation to IoT Gateway Accelerated by GPU. IEEE Internet Things J. 6(3): 4448-4461 (2019) - [j726]Hui Tian
, Fulin Nan
, Hong Jiang, Chin-Chen Chang
, Jianting Ning, Yongfeng Huang
:
Public auditing for shared cloud data with efficient and secure group management. Inf. Sci. 472: 107-125 (2019) - [j725]Peng-Cheng Huang, Chin-Chen Chang, Yung-Hui Li, Yanjun Liu:
Efficient secret sharing scheme with cheater identification based on QR code. KSII Trans. Internet Inf. Syst. 13(10): 5144-5160 (2019) - [j724]Jiang-Yi Lin, Yu Chen, Chin-Chen Chang, Yu-Chen Hu:
Reversible Data Hiding in Encrypted Images Based on Bit-plane Block Embedding. J. Inf. Hiding Multim. Signal Process. 10(2): 408-421 (2019) - [j723]Hui Tian
, Fulin Nan, Chin-Chen Chang, Yongfeng Huang
, Jing Lu, Yongqian Du:
Privacy-preserving public auditing for secure data storage in fog-to-cloud computing. J. Netw. Comput. Appl. 127: 59-69 (2019) - [j722]Alan Chin-Chen Chang, Ying-Dar Lin, Yu-Kuen Lai, Yuan-Cheng Lai:
A scalable and accurate distributed traffic generator with Fourier transformed distribution over multiple commodity platforms. J. Netw. Comput. Appl. 144: 102-117 (2019) - [j721]Jiang-Yi Lin, Yanjun Liu, Chin-Chen Chang:
A real-time dual-image-based reversible data hiding scheme using turtle shells. J. Real Time Image Process. 16(3): 673-684 (2019) - [j720]Hui Tian, Meilun Huang, Chin-Chen Chang, Yongfeng Huang, Jing Lu, Yongqian Du:
Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pitch Delay. J. Univers. Comput. Sci. 25(9): 1131-1150 (2019) - [j719]Kaimeng Chen, Chin-Chen Chang
:
High-capacity reversible data hiding in encrypted images based on extended run-length coding and block-based MSB plane rearrangement. J. Vis. Commun. Image Represent. 58: 334-344 (2019) - [j718]Guo-Dong Su
, Yanjun Liu, Chin-Chen Chang
:
A square lattice oriented reversible information hiding scheme with reversibility and adaptivity for dual images. J. Vis. Commun. Image Represent. 64 (2019) - [j717]Li Liu, Lifang Wang, Chin-Chen Chang
:
Data embedding scheme based on multi-matrix structure of turtle shell to avoid human eye perception. Multim. Tools Appl. 78(8): 10473-10490 (2019) - [j716]Xiaozhu Xie, Chia-Chen Lin
, Chin-Chen Chang:
A reversible data hiding scheme for JPEG images by doubling small quantized AC coefficients. Multim. Tools Appl. 78(9): 11443-11462 (2019) - [j715]Xiaozhu Xie, Yanjun Liu
, Chin-Chen Chang:
Extended squared magic matrix for embedding secret information with large payload. Multim. Tools Appl. 78(14): 19045-19059 (2019) - [j714]Xiaozhu Xie, Chin-Chen Chang, Chia-Chen Lin
, Jia-Long Lin:
A Turtle Shell based RDH scheme with two-dimensional histogram shifting. Multim. Tools Appl. 78(14): 19413-19436 (2019) - [j713]Peng-Cheng Huang, Chin-Chen Chang
, Yung-Hui Li, Yanjun Liu:
High-payload secret hiding mechanism for QR codes. Multim. Tools Appl. 78(16): 22331-22350 (2019) - [j712]Jiang-Yi Lin, Yu Chen, Chin-Chen Chang, Yu-Chen Hu:
Dual-image-based reversible data hiding scheme with integrity verification using exploiting modification direction. Multim. Tools Appl. 78(18): 25855-25872 (2019) - [j711]Peng-Cheng Huang, Yung-Hui Li, Chin-Chen Chang
, Yanjun Liu:
Efficient QR code authentication mechanism based on Sudoku. Multim. Tools Appl. 78(18): 26023-26045 (2019) - [j710]Kaimeng Chen, Chin-Chen Chang
:
Error-free separable reversible data hiding in encrypted images using linear regression and prediction error map. Multim. Tools Appl. 78(22): 31441-31465 (2019) - [j709]Hefeng Chen
, Chin-Chen Chang
:
A Novel (t, n) Secret Sharing Scheme Based upon Euler's Theorem. Secur. Commun. Networks 2019: 2387358:1-2387358:7 (2019) - [j708]Lin Li
, Chin-Chen Chang
, Hefeng Chen
:
An Improved Bidirectional Shift-Based Reversible Data Hiding Scheme Using Double-Way Prediction Strategy. Secur. Commun. Networks 2019: 3031506:1-3031506:17 (2019) - [j707]Hefeng Chen
, Hsiao-Ling Wu, Chin-Chen Chang
, Long-Sheng Chen
:
Light Repository Blockchain System with Multisecret Sharing for Industrial Big Data. Secur. Commun. Networks 2019: 9060756:1-9060756:7 (2019) - [j706]Hui Tian
, Zhaoyi Chen, Chin-Chen Chang, Yongfeng Huang
, Tian Wang
, Zheng-an Huang, Yiqiao Cai, Yonghong Chen:
Public audit for operation behavior logs with error locating in cloud storage. Soft Comput. 23(11): 3779-3792 (2019) - [j705]Pei-Feng Shiu, Wei-Liang Tai
, Jinn-Ke Jan, Chin-Chen Chang, Chia-Chen Lin
:
An Interpolative AMBTC-based high-payload RDH scheme for encrypted images. Signal Process. Image Commun. 74: 64-77 (2019) - [j704]Yan-Hong Chen, Chin-Chen Chang, Chia-Chen Lin
, Cheng-Yi Hsu:
Content-Based Color Image Retrieval Using Block Truncation Coding Based on Binary Ant Colony Optimization. Symmetry 11(1): 21 (2019) - [j703]Shaowei Weng
, Yi Chen, Wien Hong
, Jeng-Shyang Pan
, Chin-Chen Chang, Yijun Liu:
An Improved Integer Transform Combining with an Irregular Block Partition. Symmetry 11(1): 49 (2019) - [j702]Kaimeng Chen
, Chin-Chen Chang:
Real-Time Error-Free Reversible Data Hiding in Encrypted Images Using (7, 4) Hamming Code and Most Significant Bit Prediction. Symmetry 11(1): 51 (2019) - [j701]Lin Li
, Chia-Chen Lin
, Chin-Chen Chang:
Using Two Meaningful Shadows to Share Secret Messages with Reversibility. Symmetry 11(1): 79 (2019) - [j700]Li Liu
, Lifang Wang, Yun-Qing Shi, Chin-Chen Chang:
Separable Data-Hiding Scheme for Encrypted Image to Protect Privacy of User in Cloud. Symmetry 11(1): 82 (2019) - [j699]Zhe Xia, Yi-Ning Liu
, Ching-Fang Hsu, Chin-Chen Chang:
An Information Theoretically Secure E-Lottery Scheme Based on Symmetric Bivariate Polynomials. Symmetry 11(1): 88 (2019) - [j698]Guo-Dong Su
, Chin-Chen Chang, Chia-Chen Lin
:
High-Precision Authentication Scheme Based on Matrix Encoding for AMBTC-Compressed Images. Symmetry 11(8): 996 (2019) - [j697]Shanqing Zhang, Shengqi Su, Li Li, Qili Zhou, Jianfeng Lu, Chin-Chen Chang:
An Image Style Transfer Network Using Multilevel Noise Encoding and Its Application in Coverless Steganography. Symmetry 11(9): 1152 (2019) - [j696]Juan Lin, Chia-Chen Lin
, Chin-Chen Chang:
Reversible Steganographic Scheme for AMBTC-Compressed Image Based on (7, 4) Hamming Code. Symmetry 11(10): 1236 (2019) - [j695]Chin-Chen Chang, Xu Wang
, Ji-Hwei Horng
:
A Hybrid Data Hiding Method for Strict AMBTC Format Images with High-Fidelity. Symmetry 11(10): 1314 (2019) - [j694]Yu-Chieh Chen, Chin-Chen Chang, Ramesh Perumal
, Shih-Rung Yeh, Yen-Chung Chang, Hsin Chen:
Optimization and Implementation of Wavelet-based Algorithms for Detecting High-voltage Spindles in Neuron Signals. ACM Trans. Embed. Comput. Syst. 18(5): 39:1-39:16 (2019) - [j693]Ngoc-Tu Nguyen
, Chin-Chen Chang
:
A Biometric-Based Authenticated Key Agreement Protocol for User-to-User Communications in Mobile Satellite Networks. Wirel. Pers. Commun. 107(4): 1727-1758 (2019) - [c280]Mian Sun, Li Li, Shanqing Zhang, Jianfeng Lu, Xiaoqing Feng, Chin-Chen Chang:
A copy detection algorithm for game character concept design based on pose features. ACM TUR-C 2019: 117:1-117:8 - [c279]Hsiao-Ling Wu, Chin-Chen Chang, Long-Sheng Chen
:
Secure Authentication Scheme with Conditional Privacy Preservation in a Global Mobility Communication Network. IECC 2019: 16-20 - [e6]Yulin Wang, Chin-Chen Chang:
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019. ACM 2019, ISBN 978-1-4503-6618-2 [contents] - 2018
- [j692]Jianfeng Lu, Xiaoyu Xu
, Xin Li
, Li Li, Chin-Chen Chang, Xiaoqing Feng, Shanqing Zhang:
Detection of Bird's Nest in High Power Lines in the Vicinity of Remote Campus Based on Combination Features and Cascade Classifier. IEEE Access 6: 39063-39071 (2018) - [j691]Jianjun Li, Ning Wang
, Zhihui Wang, Haojie Li, Chin-Chen Chang, Hong Wang:
New Secret Sharing Scheme Based on Faster R-CNNs Image Retrieval. IEEE Access 6: 49348-49357 (2018) - [j690]Changlu Lin
, Huidan Hu, Chin-Chen Chang, Shaohua Tang
:
A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction. IEEE Access 6: 70666-70673 (2018) - [j689]Shan-Shan Tu, Muhammad Waqas
, Sadaqat ur Rehman, Muhammad Aamir, Obaid Ur Rehman
, Jianbiao Zhang, Chinchen Chang:
Security in Fog Computing: A Novel Technique to Tackle an Impersonation Attack. IEEE Access 6: 74993-75001 (2018) - [j688]Rong Wang
, Yan Zhu, Tung-Shou Chen, Chin-Chen Chang:
An Authentication Method Based on the Turtle Shell Algorithm for Privacy-Preserving Data Mining. Comput. J. 61(8): 1123-1132 (2018) - [j687]Yanjun Liu, Chin-Chen Chang:
Reversible data hiding for JPEG images employing all quantized non-zero AC coefficients. Displays 51: 51-56 (2018) - [j686]Chin-Feng Lee, Chin-Chen Chang, Xiaozhu Xie
, Ke Mao, Run-Hua Shi:
An adaptive high-fidelity steganographic scheme using edge detection and hybrid hamming codes. Displays 53: 30-39 (2018) - [j685]Sadaqat ur Rehman, Shan-Shan Tu
, Obaid Ur Rehman
, Yongfeng Huang
, Chathura M. Sarathchandra Magurawalage
, Chinchen Chang:
Optimization of CNN through Novel Training Strategy for Visual Classification Problems. Entropy 20(4): 290 (2018) - [j684]Hui Tian
, Jun Sun, Chin-Chen Chang
, Yongfeng Huang
, Yonghong Chen
:
Detecting Bitrate Modulation-Based Covert Voice-Over-IP Communication. IEEE Commun. Lett. 22(6): 1196-1199 (2018) - [j683]Chuan Qin
, Ping Ji, Chin-Chen Chang, Jing Dong, Xingming Sun:
Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image Tampering Recovery. IEEE Multim. 25(3): 36-48 (2018) - [j682]Li Li, Hangkai Li, Wenqiang Yuan, Jianfeng Lu, Xiaoqing Feng, Chin-Chen Chang:
A Watermarking Mechanism With High Capacity for Three-Dimensional Mesh Objects Using Integer Planning. IEEE Multim. 25(3): 49-64 (2018) - [j681]Zhe Xia, Zheng Tong, Min Xiao, Chin-Chen Chang:
Framework for practical and receipt-free remote voting. IET Inf. Secur. 12(4): 326-331 (2018) - [j680]Jianjun Li, Yun-He Wu, Chin-Feng Lee, Chin-Chen Chang:
Generalized PVO-K Embedding Technique for Reversible Data Hiding. Int. J. Netw. Secur. 20(1): 65-77 (2018) - [j679]Cheng Guo, Chin-Chen Chang, Shih-Chang Chang:
A Secure and Efficient Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications. Int. J. Netw. Secur. 20(2): 323-331 (2018) - [j678]Chin-Chen Chang, Ngoc-Tu Huynh, Yu-Kai Wang, Yanjun Liu:
An Improved Data Hiding Method Based on Lempel-Ziv-Welch Compression Codes. Int. J. Netw. Secur. 20(3): 478-488 (2018) - [j677]Peng-Cheng Huang, Yung-Hui Li, Chin-Chen Chang, Yanjun Liu:
Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction. KSII Trans. Internet Inf. Syst. 12(5): 2348-2365 (2018) - [j676]Rong Wang
, Yan Zhu, Tung-Shou Chen, Chin-Chen Chang:
Privacy-Preserving Algorithms for Multiple Sensitive Attributes Satisfying t-Closeness. J. Comput. Sci. Technol. 33(6): 1231-1242 (2018) - [j675]Shan-Qing Zhang, Tao Wu, Xianghua Xu, Zongmao Chen, Shiliang Pu, Chin-Chen Chang:
No-Reference Image Blur Assessment Based on SIFT and DCT. J. Inf. Hiding Multim. Signal Process. 9(1): 219-231 (2018) - [j674]Ye Yao, Cai-Xia Yu, Li Yang, Chin-Chen Chang:
Computer-Aided Annotation for Video Tampering Dataset of Forensic Research. J. Inf. Hiding Multim. Signal Process. 9(3): 768-774 (2018) - [j673]Zhao-Hua Zhu, Hui Tian, Chin-Chen Chang, Yonghong Chen, Tian Wang, Yiqiao Cai:
StegTab: Steganography in Guitar Tablatures. J. Inf. Hiding Multim. Signal Process. 9(4): 904-917 (2018) - [j672]Chin-Chen Chang, Yi-Ping Chiu, Chia-Chen Lin, Yi-Hui Chen:
Distortion Free Progressive BTC based Secret Image Sharing. J. Netw. Intell. 3(3): 195-213 (2018) - [j671]Cheonshik Kim, Chin-Chen Chang, Ching-Nung Yang, Xinpeng Zhang, Jinsuk Baek:
Special Issue: Real-Time Data Hiding and Visual Cryptography. J. Real Time Image Process. 14(1): 1-4 (2018) - [j670]Chin-Chen Chang, Ran Tang, Chia-Chen Lin, Wan-Li Lyu:
High-Capacity Reversible Data Hiding Method for JPEG Images. J. Softw. 13(1): 1-17 (2018) - [j669]Hsiao-Ling Wu, Chin-Chen Chang
:
Attacks on "a provably secure and efficient authentication scheme for access control in mobile pay-TV systems". Multim. Tools Appl. 77(2): 1525-1535 (2018) - [j668]Fan Li, Qian Mao, Chin-Chen Chang
:
Reversible data hiding scheme based on the Haar discrete wavelet transform and interleaving prediction method. Multim. Tools Appl. 77(5): 5149-5168 (2018) - [j667]Ngoc-Tu Huynh, K. Bharanitharan, Chin-Chen Chang, Yanjun Liu:
Minima-maxima preserving data hiding algorithm for absolute moment block truncation coding compressed images. Multim. Tools Appl. 77(5): 5767-5783 (2018) - [j666]Chin-Chen Chang, Tung-Shou Chen, Yu-Kai Wang, Yanjun Liu
:
A reversible data hiding scheme based on absolute moment block truncation coding compression using exclusive OR operator. Multim. Tools Appl. 77(7): 9039-9053 (2018) - [j665]Jianjun Li, Chenyan Wang, Xie Chen, Zheng Tang, Guobao Hui, Chin-Chen Chang
:
A selective encryption scheme of CABAC based on video context in high efficiency video coding. Multim. Tools Appl. 77(10): 12837-12851 (2018) - [j664]Binbin Xia, Anhong Wang, Chin-Chen Chang
, Li Liu:
Reversible data hiding for VQ indices using hierarchical state codebook mapping. Multim. Tools Appl. 77(16): 20519-20533 (2018) - [j663]Ngoc-Tu Nguyen
, Chin-Chen Chang
:
A biometric-based authenticated key agreement scheme for session initiation protocol in ip-based multimedia networks. Multim. Tools Appl. 77(18): 23909-23947 (2018) - [j662]Peng-Cheng Huang, Chin-Chen Chang
, Yung-Hui Li:
Sudoku-based secret sharing approach with cheater prevention using QR code. Multim. Tools Appl. 77(19): 25275-25294 (2018) - [j661]Yanjun Liu, Chin-Chen Chang
:
A turtle shell-based visual secret sharing scheme with reversibility and authentication. Multim. Tools Appl. 77(19): 25295-25310 (2018) - [j660]Thai-Son Nguyen
, Chin-Chen Chang, Tso-Hsien Shih:
Effective reversible image steganography based on rhombus prediction and local complexity. Multim. Tools Appl. 77(20): 26449-26467 (2018) - [j659]Chin-Chen Chang, Amy N. Nicholson, Enrico Rinaldi
, Evan Berkowitz
, Nicolas Garron
, D. A. Brantley, H. Monge-Camacho
, C. J. Monahan, Chris Bouchard
, Michael A. Clark
, Bálint Joó, Thorsten Kurth, Konstantinos Orginos
, Pavlos Vranas
, André Walker-Loud
:
A per-cent-level determination of the nucleon axial coupling from quantum chromodynamics. Nat. 558(7708): 91-94 (2018) - [j658]Ngoc-Tu Nguyen
, Chin-Chen Chang:
Untraceable biometric-based three-party authenticated key exchange for dynamic systems. Peer-to-Peer Netw. Appl. 11(3): 644-663 (2018) - [j657]Peng-Cheng Huang, Alan Chin-Chen Chang
, Yung-Hui Li, Yanjun Liu:
Efficient access control system based on aesthetic QR code. Pers. Ubiquitous Comput. 22(1): 81-91 (2018) - [j656]Dinh-Chien Nguyen, Thai-Son Nguyen
, Chin-Chen Chang
, Huan-Sheng Hsueh, Fang-Rong Hsu:
High Embedding Capacity Data Hiding Algorithm for H.264/AVC Video Sequences without Intraframe Distortion Drift. Secur. Commun. Networks 2018: 2029869:1-2029869:11 (2018) - [j655]Jianjun Li, Jie Yu
, Lanlan Xu, Xinying Xue, Chin-Chen Chang
, Xiaoyang Mao, Junfeng Hu:
A Cascaded Algorithm for Image Quality Assessment and Image Denoising Based on CNN for Image Security and Authorization. Secur. Commun. Networks 2018: 8176984:1-8176984:13 (2018) - [j654]Chuan Qin
, Meihui Sun, Chin-Chen Chang:
Perceptual hashing for color images based on hybrid extraction of structural features. Signal Process. 142: 194-205 (2018) - [j653]Chuan Qin
, Wei Zhang, Fang Cao, Xinpeng Zhang, Chin-Chen Chang
:
Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection. Signal Process. 153: 109-122 (2018) - [j652]Chin-Chen Chang, Tzu-Chuen Lu
, Zhao-Hua Zhu, Hui Tian
:
An Effective Authentication Scheme Using DCT for Mobile Devices. Symmetry 10(1): 13 (2018) - [j651]Yanjun Liu, Chin-Chen Chang, Peng-Cheng Huang, Cheng-Yi Hsu:
Efficient Information Hiding Based on Theory of Numbers. Symmetry 10(1): 19 (2018) - [j650]Xiaozhu Xie, Chia-Chen Lin
, Chin-Chen Chang:
Data Hiding Based on a Two-Layer Turtle Shell Matrix. Symmetry 10(2): 47 (2018) - [j649]Jianjun Li, Kangjian Peng, Chin-Chen Chang:
An Efficient Object Detection Algorithm Based on Compressed Networks. Symmetry 10(7): 235 (2018) - [j648]Jie Liu, Hui Tian
, Chin-Chen Chang, Tian Wang
, Yonghong Chen, Yiqiao Cai:
Steganalysis of Inactive Voice-Over-IP Frames Based on Poker Test. Symmetry 10(8): 336 (2018) - [j647]Jianfeng Lu, Weiling Cheng, Shanqing Zhang, Li Li, Zaorang Yang, Chin-Chen Chang:
A Novel Aesthetic QR Code Algorithm Based on Hybrid Basis Vector Matrices. Symmetry 10(11): 543 (2018) - [j646]Wenqi Chen, Hui Tian
, Chin-Chen Chang
, Fulin Nan, Jing Lu:
Adjacency-Hash-Table Based Public Auditing for Data Integrity in Mobile Cloud Computing. Wirel. Commun. Mob. Comput. 2018: 3471312:1-3471312:12 (2018) - [j645]Xu Zhuang, Yan Zhu, Chin-Chen Chang, Qiang Peng:
Security Issues in Ultralightweight RFID Authentication Protocols. Wirel. Pers. Commun. 98(1): 779-814 (2018) - [c278]Li Li, Xin Li, Tong Qiao, Xiaoyu Xu, Shanqing Zhang, Chin-Chen Chang:
A Novel Framework of Robust Video Watermarking Based on Statistical Model. ICCCS (4) 2018: 160-172 - [c277]Li Li, Jier Yu, Bing Wang, Qili Zhou, Shanqing Zhang, Jianfeng Lu, Chin-Chen Chang:
Multiple Schemes for Bike-Share Service Authentication Using QR Code and Visual Cryptography. ICCCS (3) 2018: 629-640 - [c276]Hsiao-Ling Wu, Chin-Chen Chang, Long-Sheng Chen
:
On the Security of a Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography. ICIT 2018: 88-91 - [c275]Jianjun Li, Lanlan Xu, Haojie Li, Chin-Chen Chang, Fuming Sun
:
Parameter Selection for Denoising Algorithms Using NR-IQA with CNN. MMM (1) 2018: 381-392 - [c274]Xin Tang, Linna Zhou, Yongfeng Huang
, Chin-Chen Chang:
Efficient Cross-User Deduplication of Encrypted Data Through Re-Encryption. TrustCom/BigDataSE 2018: 897-904 - [i1]Zhongliang Yang, Xueshun Peng, Yongfeng Huang, Chinchen Chang:
A novel method of speech information hiding based on 3D-Magic Matrix. CoRR abs/1809.03010 (2018) - 2017
- [j644]Junlan Bai, Chin-Chen Chang, Thai-Son Nguyen
, Ce Zhu, Yanjun Liu:
A high payload steganographic algorithm based on edge detection. Displays 46: 42-51 (2017) - [j643]Hui Tian
, Jun Sun, Chin-Chen Chang, Jie Qin, Yonghong Chen:
Hiding Information Into Voice-Over-IP Streams Using Adaptive Bitrate Modulation. IEEE Commun. Lett. 21(4): 749-752 (2017) - [j642]Xu Zhuang, Yan Zhu, Chin-Chen Chang, Qiang Peng:
Feature bundling in decision tree algorithm. Intell. Data Anal. 21(2): 371-383 (2017) - [j641]Qun Jin, Yong Xiang, Guozi Sun, Yao Liu, Chin-Chen Chang:
Cybersecurity for Cyber-Enabled Multimedia Applications. IEEE Multim. 24(4): 10-13 (2017) - [j640]Feng Wang, Chin-Chen Chang, Hsiao-Ling Wu:
Secure CAS-based authentication scheme for mobile pay-TV systems. Int. J. Commun. Syst. 30(10) (2017) - [j639]Ting-Fang Cheng, Chin-Chen Chang, Yu-Ya Lo:
Smart card-based password authenticated key agreement protocol using chaotic maps. Int. J. Commun. Syst. 30(12) (2017) - [j638]Yanjun Liu, Chin-Chen Chang, Shih-Chang Chang:
An Efficient and Secure Smart Card Based Password Authentication Scheme. Int. J. Netw. Secur. 19(1): 1-10 (2017) - [j637]Quanyu Zhao, Yining Liu, Gao Liu, Chin-Chen Chang:
A Novel Micropayment Scheme with Variable Denomination. Int. J. Netw. Secur. 19(1): 85-90 (2017) - [j636]Qiang Jin, Zhihong Li, Chin-Chen Chang, Anhong Wang, Li Liu:
Minimizing Turtle-Shell Matrix Based Stego Image Distortion Using Particle Swarm Optimization. Int. J. Netw. Secur. 19(1): 154-162 (2017) - [j635]Qian Mao, Chin-Chen Chang:
Turbo Unequal Error Protection Codes with Multiple Protection Levels. Int. J. Netw. Secur. 19(2): 205-216 (2017) - [j634]Li Liu, Anhong Wang, Chin-Chen Chang, Zhihong Li:
A Secret Image Sharing with Deep-steganography and Two-stage Authentication Based on Matrix Encoding. Int. J. Netw. Secur. 19(3): 327-334 (2017) - [j633]Xu Zhuang, Yan Zhu, Chin-Chen Chang, Qiang Peng, Faisal Khurshid
:
A unified score propagation model for web spam demotion algorithm. Inf. Retr. J. 20(6): 547-574 (2017) - [j632]Jianjun Li, Susu Fan, Zhihui Wang, Haojie Li, Chin-Chen Chang:
An Optimized CLBP Descriptor Based on a Scalable Block Size for Texture Classification. KSII Trans. Internet Inf. Syst. 11(1): 288-301 (2017) - [j631]Weibo Chu, Li-Fang Wang, Ze-Jun Jiang, Alan Chin-Chen Chang:
Protecting User Privacy in a Multi-Path Information-Centric Network Using Multiple Random-Caches. J. Comput. Sci. Technol. 32(3): 585-598 (2017) - [j630]Chin-Chen Chang, Pei-Yan Pai, Meng-Hsiun Tsai, Yung-Kuan Chan:
Vessel Detection in Chicken Chorioallantoic Membrane Image. J. Inf. Hiding Multim. Signal Process. 8(4): 784-797 (2017) - [j629]Liang-min Wang, Qing-Qing Xie, Tao Jiang, Chin-Chen Chang:
ShortHC: Self-Regenerated Short Hash Chain for Resource-Constrained System. J. Inf. Hiding Multim. Signal Process. 8(4): 847-860 (2017) - [j628]Chin-Chen Chang, Thai-Son Nguyen, Tzu-Yi Chien:
An Efficient Steganography Scheme Based on Edge Detection for High Payload. J. Inf. Hiding Multim. Signal Process. 8(5): 967-979 (2017) - [j627]Fei Yu
, Chin-Chen Chang, Jian Shu
, Iftikhar Ahmad, Jun Zhang
, José María de Fuentes
:
Recent Advances in Security and Privacy for Wireless Sensor Networks 2016. J. Sensors 2017: 3057534:1-3057534:3 (2017) - [j626]Jianfeng Lu, Zaorang Yang, Lina Li, Wenqiang Yuan, Li Li, Chin-Chen Chang:
Multiple Schemes for Mobile Payment Authentication Using QR Code and Visual Cryptography. Mob. Inf. Syst. 2017: 4356038:1-4356038:12 (2017) - [j625]Wen-Chung Kuo, Sheng-Yi Chang, Chun-Cheng Wang, Chin-Chen Chang:
Secure multi-group data hiding based on gemd map. Multim. Tools Appl. 76(2): 1901-1919 (2017) - [j624]Chuan Qin
, Ping Ji, Jinwei Wang, Chin-Chen Chang:
Fragile image watermarking scheme based on VQ index sharing and self-embedding. Multim. Tools Appl. 76(2): 2267-2287 (2017) - [j623]Li Liu, Chin-Chen Chang, Anhong Wang:
Data hiding based on extended turtle shell matrix construction method. Multim. Tools Appl. 76(10): 12233-12250 (2017) - [j622]Chin-Chen Chang
, Ying-Hsuan Huang, Tzu-Chuen Lu:
A difference expansion based reversible information hiding scheme with high stego image visual quality. Multim. Tools Appl. 76(10): 12659-12681 (2017) - [j621]Li Liu, Lifang Wang, Chin-Chen Chang
:
A semantic compression scheme for digital images based on vector quantization and data hiding. Multim. Tools Appl. 76(20): 20833-20846 (2017) - [j620]Yanjun Liu, Chin-Chen Chang
:
A one-card-pass user authentication scheme using image morphing. Multim. Tools Appl. 76(20): 21247-21264 (2017) - [j619]Chin-Chen Chang, Hsiao-Ling Wu, Chin-Yu Sun:
Notes on "Secure authentication scheme for IoT and cloud servers". Pervasive Mob. Comput. 38: 275-278 (2017) - [j618]Hui Tian
, Yanpeng Wu, Chin-Chen Chang, Yongfeng Huang, Yonghong Chen, Tian Wang, Yiqiao Cai, Jin Liu:
Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs. Signal Process. 134: 9-22 (2017) - [j617]Hui Tian
, Zhaoyi Chen, Chin-Chen Chang, Minoru Kuribayashi
, Yongfeng Huang, Yiqiao Cai, Yonghong Chen, Tian Wang:
Enabling public auditability for operation behaviors in cloud storage. Soft Comput. 21(8): 2175-2187 (2017) - [j616]Hui Tian
, Yuxiang Chen, Chin-Chen Chang, Hong Jiang, Yongfeng Huang, Yonghong Chen, Jin Liu:
Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage. IEEE Trans. Serv. Comput. 10(5): 701-714 (2017) - [c273]Li Li, Lina Li, Shanqing Zhang, Zaorang Yang, Jianfeng Lu, Chin-Chen Chang:
Novel Schemes for Bike-Share Service Authentication Using Aesthetic QR Code and Color Visual Cryptography. ICCCS (2) 2017: 837-842 - [c272]Chin-Feng Lee, Chin-Chen Chang, Qun-Feng Zeng:
VQ Compression Enhancer with Huffman Coding. ICGEC 2017: 101-108 - [c271]Chin-Chen Chang, Iuon-Chang Lin, Yu-Wei Su, Yanjun Liu:
A Digital Gift Certificate Scheme with Conditional Anonymity. ICMSS 2017: 139-144 - [c270]Yanjun Liu, Chin-Chen Chang, Peng-Cheng Huang:
Extended Exploiting-Modification-Direction Data Hiding with High Capacity. ICVIP 2017: 151-155 - [c269]Chin-Chen Chang, Thai-Son Nguyen
, Yanjun Liu:
A reversible data hiding scheme for image interpolation based on reference matrix. IWBF 2017: 1-6 - [c268]Chin-Chen Chang, Jen-Ho Yang, Yu-Wei Lai, Yanjun Liu:
An offline user-verifiable electronic traveler's check system. IWBF 2017: 1-6 - [c267]Xiaozhu Xie, Chin-Chen Chang:
Reversible data hiding in encrypted images using reformed JPEG compression. IWBF 2017: 1-5 - 2016
- [j615]Wenlong Xu, Chin-Chen Chang, Tung-Shou Chen, Liang-Min Wang:
An improved least-significant-bit substitution method using the modulo three strategy. Displays 42: 36-42 (2016) - [j614]Chin-Chen Chang, Thai Son Nguyen
, Meng-Chieh Lin, Chia-Chen Lin
:
A novel data-hiding and compression scheme based on block classification of SMVQ indices. Digit. Signal Process. 51: 142-155 (2016) - [j613]Yi-Ning Liu
, Chi Cheng, Tao Jiang, Chin-Chen Chang:
A practical lottery using oblivious transfer. Int. J. Commun. Syst. 29(2): 277-282 (2016) - [j612]Chin-Chen Chang, Ting-Fang Cheng, Wei-Yuan Hsueh:
A robust and efficient dynamic identity-based multi-server authentication scheme using smart cards. Int. J. Commun. Syst. 29(2): 290-306 (2016) - [j611]Zhi-Hui Wang, Xu Zhuang, Chin-Chen Chang, Chuan Qin, Yan Zhu:
Reversible Data Hiding Based on Geometric Structure of Pixel Groups. Int. J. Netw. Secur. 18(1): 52-59 (2016) - [j610]Feng Wang, Chin-Chen Chang, Changlu Lin, Shih-Chang Chang:
Secure and Efficient Identity-based Proxy Multi-signature Using Cubic Residues. Int. J. Netw. Secur. 18(1): 90-98 (2016) - [j609]Chin-Chen Chang, Chin-Yu Sun, Shih-Chang Chang:
A Strong RSA-based and Certificateless-based Signature Scheme. Int. J. Netw. Secur. 18(2): 201-208 (2016) - [j608]Hai-Duong Le, Ngoc-Tu Nguyen, Chin-Chen Chang:
Provably Secure and Efficient Three-Factor Authenticated Key Agreement Scheme with Untraceability. Int. J. Netw. Secur. 18(2): 335-344 (2016) - [j607]Fan Li, Qian Mao, Chin-Chen Chang:
A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method. Int. J. Netw. Secur. 18(3): 410-419 (2016) - [j606]Feng Wang, Chin-Chen Chang, Changlu Lin:
Security Analysis on Secure Untraceable Off-line Electronic Cash System. Int. J. Netw. Secur. 18(3): 454-458 (2016) - [j605]Yanjun Liu, Chin-Chen Chang:
An Integratable Verifiable Secret Sharing Mechanism. Int. J. Netw. Secur. 18(4): 617-624 (2016) - [j604]K. Bharanitharan, Chin-Chen Chang, Yang Hai Rui, Zhi-Hui Wang:
Efficient Pixel Prediction Algorithm for Reversible Data Hiding. Int. J. Netw. Secur. 18(4): 750-757 (2016) - [j603]Qing-Qing Xie, Shunrong Jiang, Liangmin Wang, Chin-Chen Chang:
Composable Secure Roaming Authentication Protocol for Cloud-assisted Body Sensor Networks. Int. J. Netw. Secur. 18(5): 816-831 (2016) - [j602]Yanjun Liu, Chin-Chen Chang, Chin-Yu Sun:
Notes on "An Anonymous Multi-server Authenticated Key Agreement Scheme Based on Trust Computing Using Smart Card and Biometrics". Int. J. Netw. Secur. 18(5): 997-1000 (2016) - [j601]Chin-Chen Chang, Wei-Yuan Hsueh, Ting-Fang Cheng:
An Advanced Anonymous and Biometrics-based Multi-server Authentication Scheme Using Smart Cards. Int. J. Netw. Secur. 18(6): 1010-1021 (2016) - [j600]Junlan Bai, Chin-Chen Chang:
A High Payload Steganographic Scheme for Compressed Images with Hamming Code. Int. J. Netw. Secur. 18(6): 1122-1129 (2016) - [j599]Qiong Wu
, Chen Zhu, Jianjun Li, Chin-Chen Chang, Zhi-Hui Wang:
A magic cube based information hiding scheme of large payload. J. Inf. Secur. Appl. 26: 1-7 (2016) - [j598]Thai Son Nguyen
, Chin-Chen Chang, Tso-Hsien Shih:
A High-Quality Reversible Image Authentication Scheme Based on Adaptive PEE for Digital Images. KSII Trans. Internet Inf. Syst. 10(1): 395-413 (2016) - [j597]Zhihong Li, Qiang Jin, Chin-Chen Chang, Li Liu, Anhong Wang:
A Common Bitmap Block Truncation Coding for Color Images Based on Binary Ant Colony Optimization. KSII Trans. Internet Inf. Syst. 10(5): 2326-2345 (2016) - [j596]Yubo Luo, Yongfeng Huang, Fufang Li, Chinchen Chang:
Text Steganography Based on Ci-poetry Generation Using Markov Chain Model. KSII Trans. Internet Inf. Syst. 10(9): 4568-4584 (2016) - [j595]Ya-Feng Di, Chin-Feng Lee, Zhi-Hui Wang, Chin-Chen Chang, Jianjun Li:
A Robust and Removable Watermarking Scheme Using Singular Value Decomposition. KSII Trans. Internet Inf. Syst. 10(12): 5268-5285 (2016) - [j594]Hong Zhong, Song Li, Ting-Fang Cheng, Chin-Chen Chang:
An Efficient Electronic English Auction System with a Secure On-Shelf Mechanism and Privacy Preserving. J. Electr. Comput. Eng. 2016: 6567146:1-6567146:14 (2016) - [j593]Wan-Li Lyu, Chin-Chen Chang:
An Image Compression Method Based on Block Truncation Coding and Linear Regression. J. Inf. Hiding Multim. Signal Process. 7(1): 198-215 (2016) - [j592]Hong Zhong, Haiquan Liu, Chin-Chen Chang, Chia-Chen Lin:
A Novel Fragile Watermark-Based Image Authentication Scheme for AMBTC-Compressed Images. J. Inf. Hiding Multim. Signal Process. 7(2): 362-375 (2016) - [j591]Chuan Qin, Haoran Ren, Chin-Chen Chang, Qingkui Chen:
Novel Occlusion Object Removal with Inter-frame Editing and Texture Synthesis. J. Inf. Hiding Multim. Signal Process. 7(2): 386-398 (2016) - [j590]Wan-Li Lyu, Chin-Chen Chang, Feng Wang:
Image Authentication and Self-Recovery Scheme Based on The Rehashing Model. J. Inf. Hiding Multim. Signal Process. 7(3): 460-474 (2016) - [j589]Yanjun Liu, Chin-Chen Chang, Chin-Yu Sun:
A Novel Three-party Authenticated Key Exchange Protocol Based on Secret Sharing. J. Inf. Hiding Multim. Signal Process. 7(4): 741-753 (2016) - [j588]Li Li, Dejie Zheng, Jianfeng Lu, Xiaoyang Mao, Chin-Chen Chang:
An Effective Mobile Visual Searching Algorithm Based on the Bag-of-Words Method for Furniture Images. J. Inf. Hiding Multim. Signal Process. 7(4): 754-770 (2016) - [j587]Binbin Xia, Anhong Wang, Chin-Chen Chang, Li Liu:
An Image Steganography Scheme Using 3D-Sudoku. J. Inf. Hiding Multim. Signal Process. 7(4): 836-845 (2016) - [j586]Zhihong Li, Qiang Jin, Chin-Chen Chang, Anhong Wang, Li Liu:
A Novel Pixel Grouping Scheme for AMBTC Based on Particle Swarm Optimization. J. Inf. Hiding Multim. Signal Process. 7(5): 970-982 (2016) - [j585]Jianfeng Lu, Xiaoyan Xu, Li Li, Chin-Chen Chang, Qiang Wang:
A Robust Image Copy Detection Method Based On Feature Extraction Algorithm. J. Inf. Hiding Multim. Signal Process. 7(5): 1136-1146 (2016) - [j584]Qian Mao, K. Bharanitharan, Chin-Chen Chang:
Novel Lossless Morphing Algorithm for Secret Sharing via Meaningful Images. J. Inf. Hiding Multim. Signal Process. 7(6): 1168-1184 (2016) - [j583]Xiao-Long Liu, Chia-Chen Lin, Chin-Chen Chang, Shyan-Ming Yuan:
A Survey of Fragile Watermarking-based Image Authentication Techniques. J. Inf. Hiding Multim. Signal Process. 7(6): 1282-1292 (2016) - [j582]Chin-Chen Chang, Wan-Ting Tseng, Hao-Chuan Tsai:
A Universal Authentication Scheme with Anonymity for Heterogeneous Wireless Networks. J. Inf. Hiding Multim. Signal Process. 7(6): 1384-1394 (2016) - [j581]Li Li, Jinxia Qiu, Jianfeng Lu, Chin-Chen Chang:
An aesthetic QR code solution based on error correction mechanism. J. Syst. Softw. 116: 85-94 (2016) - [j580]Chin-Chen Chang, Thai Son Nguyen
, Chia-Chen Lin
:
A new distortion-free data embedding scheme for high-dynamic range images. Multim. Tools Appl. 75(1): 145-163 (2016) - [j579]Chin-Chen Chang, Tzu-Chuen Lu, Gwoboa Horng, Ying-Hsuan Huang:
Very efficient variable-length codes for the lossless compression of VQ indices. Multim. Tools Appl. 75(6): 3537-3552 (2016) - [j578]Thai Son Nguyen
, Chin-Chen Chang, Huan-Sheng Hsueh:
High capacity data hiding for binary image based on block classification. Multim. Tools Appl. 75(14): 8513-8526 (2016) - [j577]Li Liu, Chin-Chen Chang, Anhong Wang:
Reversible data hiding scheme based on histogram shifting of n-bit planes. Multim. Tools Appl. 75(18): 11311-11326 (2016) - [j576]Fan Li, K. Bharanitharan, Chin-Chen Chang, Qian Mao:
Bi-stretch reversible data hiding algorithm for absolute moment block truncation coding compressed images. Multim. Tools Appl. 75(23): 16153-16171 (2016) - [j575]Hsiao-Ling Wu, Chin-Chen Chang, Chin-Yu Sun:
A secure authentication scheme with provable correctness for pay-TV systems. Secur. Commun. Networks 9(11): 1577-1588 (2016) - [j574]Feng Wang, Chin-Chen Chang, Shih-Chang Chang:
Robust off-line e-cash scheme with recoverability and anonymity revocation. Secur. Commun. Networks 9(14): 2412-2421 (2016) - [j573]Chin-Chen Chang, Wei-yi Chen, Shih-Chang Chang:
A highly efficient and secure electronic cash system based on secure sharing in cloud environment. Secur. Commun. Networks 9(14): 2476-2483 (2016) - [j572]Hui Tian
, Yanpeng Wu, Chin-Chen Chang, Yongfeng Huang, Jin Liu, Tian Wang, Yonghong Chen, Yiqiao Cai:
Steganalysis of analysis-by-synthesis speech exploiting pulse-position distribution characteristics. Secur. Commun. Networks 9(15): 2934-2944 (2016) - [j571]Zhi-Hui Wang, Ya-Feng Di, Jianjun Li, Chin-Chen Chang, Hui Liu:
Progressive secret image sharing scheme using meaningful shadows. Secur. Commun. Networks 9(17): 4075-4088 (2016) - [j570]Thai Son Nguyen
, Chin-Chen Chang, Wen-Chi Chang:
High capacity reversible data hiding scheme for encrypted images. Signal Process. Image Commun. 44: 84-91 (2016) - [j569]Sheng-Hsun Hsieh, Yung-Hui Li
, Chung-Hao Tien, Chin-Chen Chang:
Extending the Capture Volume of an Iris Recognition System Using Wavefront Coding and Super-Resolution. IEEE Trans. Cybern. 46(12): 3342-3350 (2016) - [j568]Chin-Chen Chang, Hai-Duong Le:
A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 15(1): 357-366 (2016) - [j567]Chin-Chen Chang, Wei-Yuan Hsueh, Ting-Fang Cheng:
A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks. Wirel. Pers. Commun. 89(2): 447-465 (2016) - [j566]Chin-Chen Chang, Ngoc-Tu Nguyen
:
An Untraceable Biometric-Based Multi-server Authenticated Key Agreement Protocol with Revocation. Wirel. Pers. Commun. 90(4): 1695-1715 (2016) - [c266]Xinxin Peng, Jianfeng Lu, Li Li, Chin-Chen Chang, Qili Zhou:
A New Card Authentication Scheme Based on Image Watermarking and Encryption. IWDW 2016: 358-369 - [c265]Chin-Chen Chang, Jen-Chun Chang, Yun-Hong Chou, Hsin-Lung Wu:
A High Embedding Capacity Data Hiding Scheme Based upon Permutation Vectors. IWDW 2016: 578-587 - 2015
- [j565]Qian Mao, K. Bharanitharan, Chin-Chen Chang:
A Proxy User Authentication Protocol Using Source-Based Image Morphing. Comput. J. 58(7): 1573-1584 (2015) - [j564]Thai Son Nguyen
, Chin-Chen Chang:
A reversible data hiding scheme based on the Sudoku technique. Displays 39: 109-116 (2015) - [j563]Jung-San Lee
, Chin-Chen Chang, Ngoc-Tu Huynh, Hsin-Yi Tsai:
Preserving user-friendly shadow and high-contrast quality for multiple visual secret sharing technique. Digit. Signal Process. 40: 131-139 (2015) - [j562]Chin-Chen Chang, Yeh-Chieh Chou, Chin-Yu Sun:
Novel and practical scheme based on secret sharing for laptop data protection. IET Inf. Secur. 9(2): 100-107 (2015) - [j561]Zhao-Xia Yin, Chin-Chen Chang, Qin Xu, Bin Luo
:
Second-order steganographic method based on adaptive reference matrix. IET Image Process. 9(4): 300-305 (2015) - [j560]Qian Mao, Karunanithi Bharanitharan, Chin-Chen Chang:
Multi-round dynamic swap optimisation for table-based steganography. IET Image Process. 9(12): 1073-1082 (2015) - [j559]Yanjun Liu, Lein Harn, Chin-Chen Chang:
A novel verifiable secret sharing mechanism using theory of numbers and a method for sharing secrets. Int. J. Commun. Syst. 28(7): 1282-1292 (2015) - [j558]Changlu Lin, Yong Li, Kewei Lv, Chin-Chen Chang:
Ciphertext-Auditable Identity-Based Encryption. Int. J. Netw. Secur. 17(1): 23-28 (2015) - [j557]Cheng Guo, Chin-Chen Chang:
A Novel Threshold Conference-Key Agreement Protocol Based on Generalized Chinese Remainder Theorem. Int. J. Netw. Secur. 17(2): 165-173 (2015) - [j556]Feng Wang, Chin-Chen Chang, Yeh-Chieh Chou:
Group Authentication and Group Key Distribution for Ad Hoc Networks. Int. J. Netw. Secur. 17(2): 199-207 (2015) - [j555]Hai-Duong Le, Chin-Chen Chang, Yeh-Chieh Chou:
A Novel Untraceable Authentication Scheme for Mobile Roaming in GLOMONET. Int. J. Netw. Secur. 17(4): 395-404 (2015) - [j554]Chenglian Liu, Chin-Chen Chang, Zhi-Pan Wu, Shi-Lin Ye:
A Study of Relationship between RSA Public Key Cryptosystem and Goldbach's Conjecture Properties. Int. J. Netw. Secur. 17(4): 445-453 (2015) - [j553]Chin-Feng Lee, Chin-Chen Chang, Pei-Yan Pai, Chia-Ming Liu:
Adjustment Hiding Method Based on Exploiting Modification Direction. Int. J. Netw. Secur. 17(5): 607-618 (2015) - [j552]Shengyun Zhai, Fan Li, Chin-Chen Chang, Qian Mao:
A Meaningful Scheme for Sharing Secret Images Using Mosaic Images. Int. J. Netw. Secur. 17(5): 643-649 (2015) - [j551]Chin-Chen Chang, Jen-Ho Yang, Yu-Ching Wu:
An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks. Int. J. Netw. Secur. 17(6): 702-707 (2015) - [j550]Chin-Chen Chang, Thai Son Nguyen
, Chia-Chen Lin
:
A reversible compression code hiding using SOC and SMVQ indices. Inf. Sci. 300: 85-99 (2015) - [j549]Qian Mao, Fan Li, Chin-Chen Chang:
Reversible data hiding with oriented and minimized distortions using cascading trellis coding. Inf. Sci. 317: 170-180 (2015) - [j548]Zhi-Hui Wang, Kuo-Nan Chen, Chin-Chen Chang, Chuan Qin
:
Sharing a Large Secret Image Using Meaningful Shadows Based on VQ and Inpainting. KSII Trans. Internet Inf. Syst. 9(12): 5170-5188 (2015) - [j547]Chin-Feng Lee, Chin-Chen Chang, Pei-Yan Pai, Chia-Ming Liu:
An Adjustable and Reversible Data Hiding Method Based on Multiple-base Notational System without Location Map. J. Inf. Hiding Multim. Signal Process. 6(1): 1-28 (2015) - [j546]Chin-Chen Chang, Chia-Chen Lin, Chih-Yang Lin:
Compressing Vector Quantization Index Table Using Side Match State Codebook. J. Inf. Hiding Multim. Signal Process. 6(1): 47-58 (2015) - [j545]Yanjun Liu, Chin-Chen Chang, Shih-Chang Chang:
A Group Key Distribution System Based on the Generalized Aryabhata Remainder Theorem for Enterprise Digital Rights Management. J. Inf. Hiding Multim. Signal Process. 6(1): 140-153 (2015) - [j544]Xuedan Jia, Ya-Fen Chang, Chin-Chen Chang, Liang-Min Wang:
A Critique of a Lightweight Identity Authentication Protocol for Vehicular Networks. J. Inf. Hiding Multim. Signal Process. 6(2): 183-188 (2015) - [j543]Li Liu, Anhong Wang, Chin-Chen Chang, Zhihong Li, Jinbo Liu:
A Lossy Secret Color Image Sharing Scheme with Small Shadows and Error-resilient Capability. J. Inf. Hiding Multim. Signal Process. 6(2): 246-253 (2015) - [j542]Hsiao-Ling Wu, Chin-Chen Chang:
A Robust Image Encryption Scheme Based on RSA and Secret Sharing for Cloud Storage Systems. J. Inf. Hiding Multim. Signal Process. 6(2): 288-296 (2015) - [j541]Yanjun Liu, Chin-Chen Chang, Chin-Yu Sun:
A Secure and Efficient Scheme for Digital Gift Certificates. J. Inf. Hiding Multim. Signal Process. 6(3): 416-429 (2015) - [j540]Jianfeng Lu, Meng Wang, Junping Dai, Qianru Huang, Li Li, Chin-Chen Chang:
Multiple Watermark Scheme based on DWT-DCT Quantization for Medical Images. J. Inf. Hiding Multim. Signal Process. 6(3): 458-472 (2015) - [j539]Wan-Li Lyu, Chin-Chen Chang, Feng Wang:
Color PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method. J. Inf. Hiding Multim. Signal Process. 6(3): 523-533 (2015) - [j538]Li Liu, Anhong Wang, Chin-Chen Chang, Qiang Jin, Binbin Xia:
Tree-Structured Vector Quantization with Flexible Multipath Searching Method Based on Side Match Prediction. J. Inf. Hiding Multim. Signal Process. 6(3): 568-576 (2015) - [j537]Ying-Hsuan Huang, Chin-Chen Chang, Meng-Chieh Lin, Gwoboa Horng:
Very Effective Multi-Layer Reversible Embedding Method Using Low Distortion Modification. J. Inf. Hiding Multim. Signal Process. 6(4) (2015) - [j536]Zhi-Hui Wang, Ying-Hsuan Huang, Chin-Chen Chang, Hai-Rui Yang:
Reversible Data Hiding for High Quality Using Secret Data Transformation Strategy. J. Inf. Hiding Multim. Signal Process. 6(4): 629-638 (2015) - [j535]Zhihui Wang, Qiong Wu, Zhongxuan Luo, Chin-Chen Chang:
A novel information hiding scheme based on line segments. J. Inf. Hiding Multim. Signal Process. 6(4): 674-685 (2015) - [j534]Wan-Li Lyu, Chin-Chen Chang, Yeh-Chieh Chou, Chia-Chen Lin:
Hybrid Color Image Steganography Method Used for Copyright Protection and Content Authentication. J. Inf. Hiding Multim. Signal Process. 6(4): 686-696 (2015) - [j533]Wen-Chung Kuo, Ming-Chih Kao, Chin-Chen Chang:
A Generalization of Fully Exploiting Modification Directions Data Hiding Scheme. J. Inf. Hiding Multim. Signal Process. 6(4): 718-727 (2015) - [j532]Jin Tang, Bo Jiang, Bin Luo, Chin-Chen Chang:
An Outlier Detection Method for Feature Point Matching Problem. J. Inf. Hiding Multim. Signal Process. 6(4): 728-739 (2015) - [j531]Chin-Chen Chang, Tzu-Chuen Lu, Gwoboa Horng, Ying-Hsuan Huang, Tai-Jung Hsu:
Dual-Histograms Reversible Data Hiding Capable of Avoiding Underflow/Overflow Problems. J. Inf. Hiding Multim. Signal Process. 6(5): 956-967 (2015) - [j530]Fei Yu
, Chin-Chen Chang, Jian Shu, Iftikhar Ahmad, Jun Zhang
, José María de Fuentes
:
Recent Advances in Security and Privacy for Wireless Sensor Networks. J. Sensors 2015: 169305:1-169305:2 (2015) - [j529]Li Li, Zihui Dong, Jianfeng Lu, Junping Dai, Qianru Huang, Chin-Chen Chang, Ting Wu:
AN H.264/AVC HDTV watermarking algorithm robust to camcorder recording. J. Vis. Commun. Image Represent. 26: 1-8 (2015) - [j528]Ngoc-Tu Huynh, K. Bharanitharan, Chin-Chen Chang:
Quadri-directional searching algorithm for secret image sharing using meaningful shadows. J. Vis. Commun. Image Represent. 28: 105-112 (2015) - [j527]Thai Son Nguyen
, Chin-Chen Chang, Ngoc-Tu Huynh:
A novel reversible data hiding scheme based on difference-histogram modification and optimal EMD algorithm. J. Vis. Commun. Image Represent. 33: 389-397 (2015) - [j526]Chin-Chen Chang, Iuon-Chang Lin, Chia-Chi Wu:
A Multipurpose Key Agreement Scheme in Ubiquitous Computing Environments. Mob. Inf. Syst. 2015: 934716:1-934716:7 (2015) - [j525]Chuan Qin
, Chin-Chen Chang, Chia-Chun Lin:
An adaptive reversible steganographic scheme based on the just noticeable distortion. Multim. Tools Appl. 74(6): 1983-1995 (2015) - [j524]Qian Mao, Chin-Chen Chang, Lein Harn, Shih-Chang Chang:
An image-based key agreement protocol using the morphing technique. Multim. Tools Appl. 74(9): 3207-3229 (2015) - [j523]Chuan Qin
, Chin-Chen Chang, Tai-Jung Hsu:
Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multim. Tools Appl. 74(15): 5861-5872 (2015) - [j522]Wenjie Liu, Anhong Wang, Chin-Chen Chang, Zhihong Li, Li Liu:
A grouped-scalable secret image sharing scheme. Multim. Tools Appl. 74(17): 7095-7109 (2015) - [j521]Qingzheng Hou, Junping Dai, Li Li, Jianfeng Lu, Chin-Chen Chang:
Scanned binary image watermarking based on additive model and sampling. Multim. Tools Appl. 74(21): 9407-9426 (2015) - [j520]Feng Wang, Chin-Chen Chang, Wan-Li Lyu:
The credit card visual authentication scheme based on GF(28) field. Multim. Tools Appl. 74(24): 11451-11465 (2015) - [j519]Chin-Chen Chang, Chin-Yu Sun, Ting-Fang Cheng:
A dependable storage service system in cloud environment. Secur. Commun. Networks 8(4): 574-588 (2015) - [j518]Chuan Qin
, Chin-Chen Chang, Gwoboa Horng, Ying-Hsuan Huang, Yen-Chang Chen:
Reversible data embedding for vector quantization compressed images using search-order coding and index parity matching. Secur. Commun. Networks 8(6): 899-906 (2015) - [j517]Xing-Tian Wang, Mingchu Li, Szu-Ting Wang, Chin-Chen Chang:
Reversible data hiding exploiting high-correlation regulation for high-quality images. Secur. Commun. Networks 8(7): 1408-1421 (2015) - [j516]Chin-Chen Chang, Hai-Duong Le:
A provably secure smart card-based authenticated group key exchange protocol. Secur. Commun. Networks 8(8): 1602-1607 (2015) - [c264]Chin-Chen Chang, Iuon-Chang Lin, Yi-Lun Chi:
Secure Electronic Coupons. AsiaJCIS 2015: 104-109 - [c263]Junlan Bai, Chin-Chen Chang, Ce Zhu:
A Reversible Data Hiding Scheme Using Ordered Cluster-Based VQ Index Tables for Complex Images. ICIG (1) 2015: 415-422 - [c262]Chin-Chen Chang, Ying-Hsuan Huang, Wei-Chi Chang:
Reversible data hiding for VQ indices using XOR operator and SOC codes. ICMLC 2015: 340-345 - [c261]Jianjun Li, Lijuan Meng, Zhihui Wang, Jiayou Du, Xiaofeng Fu, Chin-Chen Chang:
A Modified IMM-CSRF Algorithm for Passive Tracking of Maneuvering Targets. IIH-MSP 2015: 89-92 - [c260]Jianjun Li, Na Wu, Zhihui Wang, Jiayou Du, Xiaofeng Fu, Chin-Chen Chang:
Enhancement of the Quality of Images Based on Multiple Threshold Segmentation and Adaptive Gamma Correction. IIH-MSP 2015: 93-96 - 2014
- [j515]Chin-Chen Chang, Ting-Fang Cheng:
A Secure Diverse Ticket-Sale System in a Distributed Cloud Environment. Comput. J. 57(10): 1441-1459 (2014) - [j514]Chin-Chen Chang, Ting-Fang Cheng:
A Reliable Real-time Multicast Authentication Protocol with Provable Accuracy. Fundam. Informaticae 131(2): 167-186 (2014) - [j513]Xi Chen, Yun Liu, Chin-Chen Chang, Changlu Lin:
The design of dynamic access control for hierarchical sensor networks with key-lock-pair mechanism. Int. J. Ad Hoc Ubiquitous Comput. 17(2/3): 162-173 (2014) - [j512]Cheng Guo, Chin-Chen Chang:
An authenticated group key distribution protocol based on the generalized Chinese remainder theorem. Int. J. Commun. Syst. 27(1): 126-134 (2014) - [j511]Chin-Chen Chang, Ting-Fang Cheng, Hsiao-Ling Wu:
An authentication and key agreement protocol for satellite communications. Int. J. Commun. Syst. 27(10): 1994-2006 (2014) - [j510]Yanjun Liu, Lein Harn, Chin-Chen Chang:
An authenticated group key distribution mechanism using theory of numbers. Int. J. Commun. Syst. 27(11): 3502-3512 (2014) - [j509]Yanjun Liu, Chin-Chen Chang, Shih-Chang Chang:
An Access Control Mechanism Based on the Generalized Aryabhata Remainder Theorem. Int. J. Netw. Secur. 16(1): 58-64 (2014) - [j508]Chin-Chen Chang, Thai Son Nguyen, Chia-Chen Lin:
Reversible Image Hiding for High Image Quality Based on Histogram Shifting and Local Complexity. Int. J. Netw. Secur. 16(3): 201-213 (2014) - [j507]Xi Chen, Yun Liu, Chin-Chen Chang, Cheng Guo:
Generalized Secret Sharing with Linear Hierarchical Secrets. Int. J. Netw. Secur. 16(3): 220-228 (2014) - [j506]Xu Zhuang, Chin-Chen Chang, Zhi-Hui Wang, Yan Zhu:
A Simple Password Authentication Scheme Based on Geometric Hashing Function. Int. J. Netw. Secur. 16(4): 271-277 (2014) - [j505]Qian Mao, Chin-Chen Chang, Ting-Feng Chung:
A Reversible Steganography Suitable for Embedding Small Amounts of Data. Int. J. Netw. Secur. 16(4): 295-303 (2014) - [j504]Chi-Hsien Lin, K. Bharanitharan, Chin-Chen Chang:
Comments and Proofs to Published Paper - A Novel Reversible Robust Watermarking Algorithm Based on a Chaotic System. Int. J. Netw. Secur. 16(5): 389-392 (2014) - [j503]Xi Chen, Yun Liu, Chin-Chen Chang, Cheng Guo:
Generalized Secret Sharing with Linear Hierarchical Secrets. Int. J. Netw. Secur. 16(6): 411-419 (2014) - [j502]Zhi-Hui Wang, Haibo Jin, Xuebo Wang, Chin-Chen Chang:
An Adaptable (n, n) Secret Image Sharing Mechanism Based on Boolean Operation. Int. J. Netw. Secur. 16(6): 487-493 (2014) - [j501]Chin-Chen Chang, Thai Son Nguyen:
A Reversible Data Hiding Scheme for SMVQ Indices. Informatica 25(4): 523-540 (2014) - [j500]Thai Son Nguyen
, Chin-Chen Chang, Ting-Feng Chung:
A Tamper-Detection Scheme for BTC-Compressed Images with High-Quality Images. KSII Trans. Internet Inf. Syst. 8(6): 2005-2012 (2014) - [j499]Chin-Chen Chang, Thai Son Nguyen
, Chia-Chen Lin
:
Reversible Data Hiding Scheme for VQ Indices Based on Absolute Difference Trees. KSII Trans. Internet Inf. Syst. 8(7): 2572-2589 (2014) - [j498]Yanjun Liu, Hsiao-Ling Wu, Chin-Chen Chang:
A Fast and Secure Scheme for Data Outsourcing in the Cloud. KSII Trans. Internet Inf. Syst. 8(8): 2708-2722 (2014) - [j497]Zhi-Hui Wang, Hai-Rui Yang, Chin-Chen Chang, Gwoboa Horng, Ying-Hsuan Huang:
Lossless VQ Indices Compression Based on the High Correlation of Adjacent Image Blocks. KSII Trans. Internet Inf. Syst. 8(8): 2913-2929 (2014) - [j496]Wanli Liu, Chin-Chen Chang, Thai Son Nguyen
, Chia-Chen Lin
:
Image Watermarking Scheme Based on Scale-Invariant Feature Transform. KSII Trans. Internet Inf. Syst. 8(10): 3591-3606 (2014) - [j495]Chin-Chen Chang, Ting-Fang Cheng:
A Provably Secure t-out-of-n Oblivious Transfer Mechanism based on Blind Signature. J. Inf. Hiding Multim. Signal Process. 5(1): 1-12 (2014) - [j494]Zhi-Hui Wang, Marcos Segalla Pizzolatti, Chin-Chen Chang:
Efficient and Meaningful Multi-secret Image Sharing Based on Block Imitation. J. Inf. Hiding Multim. Signal Process. 5(1): 47-60 (2014) - [j493]Chin-Chen Chang, Ya-Chieh Huang, Hao-Chuan Tsai:
Design and Analysis of Chameleon Hashing Based Handover Authentication Scheme for Wireless Networks. J. Inf. Hiding Multim. Signal Process. 5(1): 107-116 (2014) - [j492]Chia-Chen Lin, Chin-Chen Chang, Yi-Hui Chen:
A Novel SVD-based watermarking Scheme for Protecting Rightful Ownership of Digital Images. J. Inf. Hiding Multim. Signal Process. 5(2): 124-143 (2014) - [j491]Gwoboa Horng, Ying-Hsuan Huang, Chin-Chen Chang, Yanjun Liu:
(k, n)-Image Reversible Data Hiding. J. Inf. Hiding Multim. Signal Process. 5(2): 152-164 (2014) - [j490]Chin-Chen Chang, Yi-Hui Chen, Lin-Yi Chuang:
Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques. J. Inf. Hiding Multim. Signal Process. 5(3): 342-352 (2014) - [j489]Chuan Qin, Chin-Chen Chang, Szu-Ting Wang:
A Novel Lossless Steganographic Scheme for Data Hiding in Traditional Chinese Text Files. J. Inf. Hiding Multim. Signal Process. 5(3): 534-545 (2014) - [j488]Yanjun Liu, Chin-Chen Chang:
A Database Encryption Scheme Based on the Generalized Aryabhata Remainder Theorem. J. Inf. Hiding Multim. Signal Process. 5(4): 603-613 (2014) - [j487]Yanjun Liu, Chin-Chen Chang:
A Secure Broadcasting Method Based on the Generalized Aryabhata Remainder Theorem. J. Inf. Hiding Multim. Signal Process. 5(4): 709-718 (2014) - [j486]Junping Dai, Yazhong Liu, Jianfeng Lu, Jiayi Xu, Chin-Chen Chang, Li Li:
Watermarking Marbled Image Based on Linear Enhancement Hologram. J. Inf. Hiding Multim. Signal Process. 5(4): 757-768 (2014) - [j485]Chin-Chen Chang, Pei-Yan Pai, Meng-Hsiun Tsai, Chia-Ming Liu:
A Novel Chicken Chorioallantoic Membrane Image Vessel Detection Detector Based on Statistic Color Distribution. J. Inf. Hiding Multim. Signal Process. 5(4): 789-805 (2014) - [j484]Chung-Chuan Wang, Ya-Fen Chang, Chin-Chen Chang, Jinn-Ke Jan, Chia-Chen Lin
:
A high capacity data hiding scheme for binary images based on block patterns. J. Syst. Softw. 93: 152-162 (2014) - [j483]Chin-Chen Chang, Thai Son Nguyen
, Chia-Chen Lin
:
Reversible data embedding for indices based on histogram analysis. J. Vis. Commun. Image Represent. 25(7): 1704-1716 (2014) - [j482]Ying-Hsuan Huang, Chin-Chen Chang, Chun-Yu Wu:
A DNA-based data hiding technique with low modification rates. Multim. Tools Appl. 70(3): 1439-1451 (2014) - [j481]Tzu-Chuen Lu, Chin-Chen Chang, Ying-Hsuan Huang:
High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting. Multim. Tools Appl. 72(1): 417-435 (2014) - [j480]Cheng Guo, Chin-Chen Chang, Chuan Qin
:
A novel (n, t, n) secret image sharing scheme without a trusted third party. Multim. Tools Appl. 72(3): 2195-2209 (2014) - [j479]Lein Harn, Fuyou Miao, Chin-Chen Chang:
Verifiable secret sharing based on the Chinese remainder theorem. Secur. Commun. Networks 7(6): 950-957 (2014) - [j478]Feng Wang, Chin-Chen Chang, Lein Harn:
Simulatable and secure certificate-based threshold signature without pairings. Secur. Commun. Networks 7(11): 2094-2103 (2014) - [j477]Chin-Chen Chang, Ngoc-Tu Huynh, Hai-Duong Le:
Lossless and unlimited multi-image sharing based on Chinese remainder theorem and Lagrange interpolation. Signal Process. 99: 159-170 (2014) - [j476]Thai Son Nguyen, Chin-Chen Chang, Meng-Chieh Lin:
Adaptive Lossless Data Hiding Scheme for SMVQ-Compressed Images using SOC Coding. Smart Comput. Rev. 4(3): 230-245 (2014) - [j475]Li Liu, Anhong Wang, Chin-Chen Chang, Zhihong Li:
A novel real-time and progressive secret image sharing with flexible shadows based on compressive sensing. Signal Process. Image Commun. 29(1): 128-134 (2014) - [j474]Chuan Qin
, Chin-Chen Chang, Yi-Ping Chiu:
A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting. IEEE Trans. Image Process. 23(3): 969-978 (2014) - [j473]Xu Zhuang, Yan Zhu, Chin-Chen Chang:
A New Ultralightweight RFID Protocol for Low-Cost Tags: R 2 AP. Wirel. Pers. Commun. 79(3): 1787-1802 (2014) - [c259]Chin-Chen Chang, Chin-Yu Sun:
Polynomial-Based Secret Sharing Scheme Based on the Absolute Moment Block Truncation Coding Technique. IIH-MSP 2014: 485-488 - [c258]Chin-Chen Chang, Hsiao-Ling Wu, Ting-Feng Chung:
Applying Histogram Modification to Embed Secret Message in AMBTC. IIH-MSP 2014: 489-492 - [c257]Chin-Chen Chang, Hsiao-Ling Wu:
A Large Payload Information Hiding Scheme Using Two-Level Exploiting Modification Direction. IIH-MSP 2014: 512-515 - [c256]Chin-Chen Chang, Wei-yi Chen, Ting-Fang Cheng:
A Secure RFID Mutual Authentication Protocol Conforming to EPC Class 1 Generation 2 Standard. IIH-MSP 2014: 642-645 - [c255]Chin-Chen Chang, Thai-Son Nguyen
, Chia-Chen Lin
:
A Virtual Primary Key for Reversible Watermarking Textual Relational Databases. ICS 2014: 756-769 - [c254]Chin-Chen Chang, Thai Son Nguyen
, Chia-Chen Lin
:
A Blind Robust Reversible Watermark Scheme for Textual Relational Databases with Virtual Primary Key. IWDW 2014: 75-89 - [c253]Jianfeng Lu, Qianru Huang, Meng Wang, Li Li, Junping Dai, Chin-Chen Chang:
Zero-Watermarking Based on Improved ORB Features Against Print-cam Attack. IWDW 2014: 187-198 - [e5]Charles M. Falco, Chin-Chen Chang, Xudong Jiang:
Sixth International Conference on Digital Image Processing, ICDIP 2014, Athens, Greece, April 5-6, 2014. SPIE Proceedings 9159, SPIE 2014, ISBN 978-1-6284-1186-7 [contents] - 2013
- [j472]Cheng Guo, Chin-Chen Chang:
Chaotic maps-based password-authenticated key agreement using smart cards. Commun. Nonlinear Sci. Numer. Simul. 18(6): 1433-1440 (2013) - [j471]Xing-Tian Wang, Chin-Chen Chang, Thai Son Nguyen
, Mingchu Li:
Reversible data hiding for high quality images exploiting interpolation and direction order mechanism. Digit. Signal Process. 23(2): 569-577 (2013) - [j470]Chuan Qin
, Chin-Chen Chang, Pei-Ling Tsou:
Robust image hashing using non-uniform sampling in discrete Fourier domain. Digit. Signal Process. 23(2): 578-585 (2013) - [j469]Jin Tang, Bo Jiang, Chin-Chen Chang, Bin Luo
:
Corrigendum to "Graph structure analysis based on complex network" [Digital Signal Processing 22 (5) (2012) 713-725]. Digit. Signal Process. 23(4): 1332 (2013) - [j468]Zi-Yao Cheng, Yun Liu, Chin-Chen Chang, Cheng Guo:
A fault-tolerant group key agreement protocol exploiting dynamic setting. Int. J. Commun. Syst. 26(2): 259-275 (2013) - [j467]Chin-Chen Chang, Chia-Yin Lee:
A Smart Card-based Authentication Scheme Using User Identify Cryptography. Int. J. Netw. Secur. 15(2): 139-147 (2013) - [j466]Yanjun Liu, Chin-Chen Chang, Shih-Chang Chang:
An Efficient Oblivious Transfer Protocol Using Residue Number System. Int. J. Netw. Secur. 15(3): 212-218 (2013) - [j465]Lein Harn, Chin-Chen Chang, Hsiao-Ling Wu:
An Anonymous Multi-Receiver Encryption Based on RSA. Int. J. Netw. Secur. 15(4): 307-312 (2013) - [j464]Jung-San Lee, Chin-Chen Chang, Kuo-Jui Wei:
Provably Secure Conference Key Distribution Mechanism Preserving the Forward and Backward Secrecy. Int. J. Netw. Secur. 15(5): 405-410 (2013) - [j463]Chin-Chen Chang, Jen-Ho Yang:
A Group-oriented Digital Right Management Scheme with Reliable and Flexible Access Policies. Int. J. Netw. Secur. 15(6): 471-477 (2013) - [j462]Hao-Chuan Tsai, Chin-Chen Chang:
Provably secure three party encrypted key exchange scheme with explicit authentication. Inf. Sci. 238: 242-249 (2013) - [j461]Qian Mao, Chin-Chen Chang, Hsiao-Ling Wu:
An Image Encryption Scheme Based on Concatenated Torus Automorphisms. KSII Trans. Internet Inf. Syst. 7(6): 1492-1511 (2013) - [j460]Chuan Qin
, Chin-Chen Chang, Yen-Chang Chen:
A Novel Reversible Data Hiding Scheme for VQ-Compressed Images Using Index Set Construction Strategy. KSII Trans. Internet Inf. Syst. 7(8): 2027-2041 (2013) - [j459]Chuan Qin
, Chin-Chen Chang, Tai-Jung Hsu:
Effective Fragile Watermarking for Image Authentication with High-quality Recovery Capability. KSII Trans. Internet Inf. Syst. 7(11): 2941-2956 (2013) - [j458]Pei-Yu Lin
, Yi-Hui Chen, Chin-Chen Chang, Jung-San Lee:
Contrast-Adaptive Removable Visible Watermarking (CARVW) mechanism. Image Vis. Comput. 31(4): 311-321 (2013) - [j457]Cheng Guo, Chin-Chen Chang:
A Construction for Secret Sharing Scheme with General Access Structure. J. Inf. Hiding Multim. Signal Process. 4(1): 1-8 (2013) - [j456]Cheng Guo, Chin-Chen Chang, Chin-Yu Sun:
Chaotic Maps-Based Mutual Authentication and Key Agreement using Smart Cards for Wireless Communications. J. Inf. Hiding Multim. Signal Process. 4(2): 99-109 (2013) - [j455]Xu Zhuang, Zhi-Hui Wang, Chin-Chen Chang, Yan Zhu:
Security Analysis of a new Ultra-lightweight RFID Protocol and Its Improvement. J. Inf. Hiding Multim. Signal Process. 4(3): 166-177 (2013) - [j454]Chin-Chen Chang, Yung-Chen Chou, Chih-Yang Lin:
An Indicator Elimination Method for Side-match Vector Quantization. J. Inf. Hiding Multim. Signal Process. 4(4): 233-249 (2013) - [j453]Chin-Chen Chang, Hsiao-Ling Wu, Zhi-Hui Wang, Qian Mao:
An Efficient Smart Card Based Authentication Scheme Using Image Encryption. J. Inf. Sci. Eng. 29(6): 1135-1150 (2013) - [j452]Chin-Chen Chang, Thai Son Nguyen
, Chia-Chen Lin
:
A novel VQ-based reversible data hiding scheme by using hybrid encoding strategies. J. Syst. Softw. 86(2): 389-402 (2013) - [j451]Zhi-Hui Wang, Hai-Rui Yang, Ting-Fang Cheng, Chin-Chen Chang:
A high-performance reversible data-hiding scheme for LZW codes. J. Syst. Softw. 86(11): 2771-2778 (2013) - [j450]Chin-Chen Chang, Kuo-Nan Chen, Zhi-Hui Wang, Mingchu Li:
Lossless Information Hiding in the VQ Index Table. J. Softw. 8(3): 547-553 (2013) - [j449]Zi-Yao Cheng, Yun Liu, Chin-Chen Chang, Shih-Chang Chang:
Authenticated RFID security mechanism based on chaotic maps. Secur. Commun. Networks 6(2): 247-256 (2013) - [j448]Chin-Chen Chang, Shih-Chang Chang, Jen-Ho Yang:
A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment. Secur. Commun. Networks 6(8): 972-984 (2013) - [j447]Chuan Qin
, Chin-Chen Chang, Kuo-Nan Chen:
Adaptive self-recovery for tampered images based on VQ indexing and inpainting. Signal Process. 93(4): 933-946 (2013) - [j446]Li Li, Ying-Ying Ma, Chin-Chen Chang, Jianfeng Lu:
Analyzing and removing SureSign watermark. Signal Process. 93(5): 1374-1378 (2013) - [j445]Chuan Qin
, Chin-Chen Chang, Yen-Chang Chen:
Efficient reversible data hiding for VQ-compressed images based on index mapping mechanism. Signal Process. 93(9): 2687-2695 (2013) - [j444]Chuan Qin
, Chin-Chen Chang, Ying-Hsuan Huang, Li-Ting Liao:
An Inpainting-Assisted Reversible Steganographic Scheme Using a Histogram Shifting Mechanism. IEEE Trans. Circuits Syst. Video Technol. 23(7): 1109-1118 (2013) - [j443]Chin-Chen Chang, Ting-Fang Cheng, Wei-yi Chen:
A Novel Electronic English Auction System With a Secure On-Shelf Mechanism. IEEE Trans. Inf. Forensics Secur. 8(4): 657-668 (2013) - [j442]Chin-Chen Chang, Hai-Duong Le, Ching-Hsiang Chang:
Novel Untraceable Authenticated Key Agreement Protocol Suitable for Mobile Communication. Wirel. Pers. Commun. 71(1): 425-437 (2013) - [c252]Chin-Chen Chang, Tzu-Chuen Lu, Gwoboa Horng, Ying-Hsuan Huang, Yung-Ming Hsu:
A high payload data embedding scheme using dual stego-images with reversibility. ICICS 2013: 1-5 - [c251]Chin-Feng Lee, Chin-Chen Chang, Cheng-You Gao:
A Two-Staged Multi-level Reversible Data Hiding Exploiting Lagrange Interpolation. IIH-MSP 2013: 485-488 - [p4]Shuai Yue, Zhi-Hui Wang, Chin-Chen Chang:
An Image Data Hiding Scheme Based on Vector Quantization and Graph Coloring. Recent Advances in Information Hiding and Applications 2013: 1-17 - [p3]Shi-Yu Cui, Zhi-Hui Wang, Pei-Wei Tsai
, Chin-Chen Chang, Shuai Yue:
Single Bitmap Block Truncation Coding of Color Images Using Cat Swarm Optimization. Recent Advances in Information Hiding and Applications 2013: 119-138 - 2012
- [j441]Jin Tang, Bo Jiang, Chin-Chen Chang, Bin Luo
:
Graph structure analysis based on complex network. Digit. Signal Process. 22(5): 713-725 (2012) - [j440]Kuo-Nan Chen, Chin-Hao Chen, Chin-Chen Chang:
Efficient illumination compensation techniques for text images. Digit. Signal Process. 22(5): 726-733 (2012) - [j439]Pei-Yan Pai, Chin-Chen Chang, Yung-Kuan Chan
:
Nucleus and cytoplast contour detector from a cervical smear image. Expert Syst. Appl. 39(1): 154-161 (2012) - [j438]Chuan Qin
, Zhi-Hui Wang, Chin-Chen Chang, Kuo-Nan Chen:
Reversible Data Hiding Scheme Based on Image Inpainting. Fundam. Informaticae 120(1): 59-70 (2012) - [j437]Chin-Chen Chang, Yi-Pei Hsieh:
A fast VQ codebook search with initialization and search order. Inf. Sci. 183(1): 132-139 (2012) - [j436]Zhi-Hui Wang, Chin-Chen Chang, Mingchu Li:
Optimizing least-significant-bit substitution using cat swarm optimization strategy. Inf. Sci. 192: 98-108 (2012) - [j435]Chin-Chen Chang, Chih-Yang Lin
, Yi-Pei Hsieh:
Data hiding for vector quantization images using mixed-base notation and dissimilar patterns without loss of fidelity. Inf. Sci. 201: 70-79 (2012) - [j434]Yi-Hui Chen, Chin-Chen Chang:
Image Tamper Detection and Recovery Based on Dual Watermarks Sharing Strategy. J. Digit. Inf. Manag. 10(1): 39-49 (2012) - [j433]Chi-Shiang Chan, Chin-Chen Chang, Hung P. Vo:
A User-Friendly Image Sharing Scheme Using JPEG-LS Median Edge Predictor. J. Inf. Hiding Multim. Signal Process. 3(4): 340-351 (2012) - [j432]Fei Yu, Yiqin Lu, Chin-Chen Chang, Yan Gao:
Guest Editors' Introduction: Special Section on ISIP 2011. J. Multim. 7(1): 31-32 (2012) - [j431]Cheng Guo, Chin-Chen Chang, Chuan Qin
:
A hierarchical threshold secret image sharing. Pattern Recognit. Lett. 33(1): 83-91 (2012) - [j430]Cheng Guo, Chin-Chen Chang, Chuan Qin
:
A multi-threshold secret image sharing scheme based on MSP. Pattern Recognit. Lett. 33(12): 1594-1600 (2012) - [j429]Chuan Qin
, Chin-Chen Chang, Li-Ting Liao:
An adaptive prediction-error expansion oriented reversible information hiding scheme. Pattern Recognit. Lett. 33(16): 2166-2172 (2012) - [j428]Chuan Qin
, Chin-Chen Chang, Pei-Yu Chen:
Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Signal Process. 92(4): 1137-1150 (2012) - [j427]Xing-Tian Wang, Chin-Chen Chang, Chia-Chun Lin, Mingchu Li:
A novel multi-group exploiting modification direction method based on switch map. Signal Process. 92(6): 1525-1535 (2012) - [j426]Chin-Chen Chang, Chia-Yin Lee:
A Secure Single Sign-On Mechanism for Distributed Computer Networks. IEEE Trans. Ind. Electron. 59(1): 629-637 (2012) - [j425]Jen-Ho Yang, Chin-Chen Chang:
A Low Computational-Cost Electronic Payment Scheme for Mobile Commerce with Large-Scale Mobile Users. Wirel. Pers. Commun. 63(1): 83-99 (2012) - [c250]Chin-Chen Chang, Ngoc-Tu Huynh, Chia-Chun Lin:
Strong Tamper-Localization, Visual Secret Sharing Scheme Based on Exploiting Modification Direction. AsiaJCIS 2012: 10-16 - [c249]Chin-Chen Chang, Hai-Duong Le, Ching-Hsiang Chang:
Mobile Friendly and Highly Efficient Remote User Authenticated Key Agreement Protocol Featuring Untraceability. AsiaJCIS 2012: 38-43 - [c248]Chin-Chen Chang, Jen-Ho Yang, Kai-Jie Chang:
An Efficient and Flexible Mobile Payment Protocol. ICGEC 2012: 63-66 - 2011
- [j424]Lein Harn, Chia-Yin Lee, Changlu Lin, Chin-Chen Chang:
Fully Deniable Message Authentication Protocols Preserving Confidentiality. Comput. J. 54(10): 1688-1699 (2011) - [j423]T. Hoang Ngan Le
, Chia-Chen Lin
, Chin-Chen Chang, Hoai Bac Le:
A high quality and small shadow size visual secret sharing scheme based on hybrid strategy for grayscale images. Digit. Signal Process. 21(6): 734-745 (2011) - [j422]The Duc Kieu, Chin-Chen Chang:
A steganographic scheme by fully exploiting modification directions. Expert Syst. Appl. 38(8): 10648-10657 (2011) - [j421]Chin-Chen Chang, Chih-Yang Lin
, Yi-Hsuan Fan:
Reversible Steganography for BTC-compressed Images. Fundam. Informaticae 109(2): 121-134 (2011) - [j420]Chia-Yin Lee, Zhi-Hui Wang, Lein Harn, Chin-Chen Chang:
Secure Key Transfer Protocol Based on Secret Sharing for Group Communications. IEICE Trans. Inf. Syst. 94-D(11): 2069-2076 (2011) - [j419]Pei-Yu Lin
, Chin-Chen Chang:
Cheating resistance and reversibility-oriented secret sharing mechanism. IET Inf. Secur. 5(2): 81-92 (2011) - [j418]Chin-Chen Chang, Kuo-Nan Chen, Ngoc-Tu Huynh:
Lossless Secret Sharing Scheme with High Quality Shares Based on VQ-Compressed Images. Int. J. Pattern Recognit. Artif. Intell. 25(4): 529-546 (2011) - [j417]Pei-Yan Pai, Chin-Chen Chang, Yung-Kuan Chan
, Meng-Hsiun Tsai:
An adaptable threshold detector. Inf. Sci. 181(8): 1463-1483 (2011) - [j416]Chin-Chen Chang, Yi-Hui Chen, Hsin-Chi Wang:
Meaningful secret sharing technique with authentication and remedy abilities. Inf. Sci. 181(14): 3073-3084 (2011) - [j415]Fei Yu, Haiwen Liu, Wenlang Luo, Huojiao He, Chin-Chen Chang:
Guest Editorial. J. Comput. 6(10): 2001-2003 (2011) - [j414]Zhi-Hui Wang, Chin-Chen Chang, Ngoc-Tu Huynh, Mingchu Li:
Sharing a Secret Image in Binary Images with Verification. J. Inf. Hiding Multim. Signal Process. 2(1) (2011) - [j413]Chin-Feng Lee, Kuo-Nan Chen, Chin-Chen Chang, Meng-Cheng Tsai:
A Hierarchical Fragile Watermarking with VQ Index Recovery. J. Multim. 6(3): 277-284 (2011) - [j412]Cheng Guo, Zhi-Hui Wang, Chin-Chen Chang, Chuan Qin
:
A Secret Image Sharing Scheme with High Quality Shadows Based on Exploiting Modification Direction. J. Multim. 6(4): 341-348 (2011) - [j411]Zhi-Hui Wang, Chin-Chen Chang, Mingchu Li, Tzu-Chuen Lu:
A Simple Image Encoding Method with Data Lossless Information Hiding. J. Networks 6(3): 400-407 (2011) - [j410]Fei Yu, Yiqin Lu, Jian Shu, Guangxue Yue, Chin-Chen Chang:
Guest Editorial. J. Networks 6(10): 1387-1389 (2011) - [j409]Li Li, He-Huan Xu, Chin-Chen Chang, Ying-Ying Ma:
A novel image watermarking in redistributed invariant wavelet domain. J. Syst. Softw. 84(6): 923-929 (2011) - [j408]Chin-Chen Chang, Kuo-Nan Chen, Chin-Feng Lee, Li-Jen Liu:
A secure fragile watermarking scheme based on chaos-and-hamming code. J. Syst. Softw. 84(9): 1462-1470 (2011) - [j407]Fei Yu, Xuange Peng, Juefu Liu, Jiexian Zeng, Chin-Chen Chang:
Guest Editorial. J. Softw. 6(9): 1629-1631 (2011) - [j406]Chin-Feng Lee, Ying-Hsuan Huang, Chin-Chen Chang, Tien-Chung Liu:
A Prediction-Based Adaptive Reversible Data Embedding Scheme. J. Softw. 6(9): 1813-1820 (2011) - [j405]Chin-Chen Chang, Thai Son Nguyen
, Chia-Chen Lin
:
A reversible data hiding scheme for VQ indices using locally adaptive coding. J. Vis. Commun. Image Represent. 22(7): 664-672 (2011) - [j404]Pei-Yu Lin
, Jung-San Lee, Chin-Chen Chang:
Protecting the content integrity of digital imagery with fidelity preservation. ACM Trans. Multim. Comput. Commun. Appl. 7(3): 15:1-15:20 (2011) - [c247]Jen-Ho Yang, Chin-Chen Chang, Chih-Hung Wang:
An Efficient V-Fairness (t, n) Threshold Secret Sharing Scheme. ICGEC 2011: 180-183 - [c246]Jen-Ho Yang, Chin-Chen Chang, Shih-Yi Lin:
An Efficient Mutual Authentication with Key Agreement Protocol for Mobile Devices. IIH-MSP 2011: 145-148 - [c245]Chin-Chen Chang, Kuo-Nan Chen, Ying-Hsuan Huang:
Low Computational Color Secret Sharing Schemes with High Shares Quality Color Secret Sharing. IIH-MSP 2011: 157-160 - [c244]Cheng Guo, Chin-Chen Chang:
General Threshold Signature Based on the Chinese Remainder Theorem. IIH-MSP 2011: 244-247 - [c243]Chin-Chen Chang, Hai-Duong Le, Chia-Yin Lee, Ching-Hsiang Chang:
A Robust and Efficient Smart Card Oriented Remote User Authentication Protocol. IIH-MSP 2011: 252-255 - [c242]Shuai Yue, Zhi-Hui Wang, Ching-Yun Chang, Chin-Chen Chang, Mingchu Li:
Image Data Hiding Schemes Based on Graph Coloring. UIC 2011: 476-489 - 2010
- [j403]Chin-Chen Chang, Hao-Chuan Tsai, Yi-Pei Hsieh:
An efficient and fair buyer-seller fingerprinting scheme for large scale networks. Comput. Secur. 29(2): 269-277 (2010) - [j402]Yu-Chiang Li, Chia-Ming Yeh, Chin-Chen Chang:
Data hiding based on the similarity between neighboring pixels with reversibility. Digit. Signal Process. 20(4): 1116-1128 (2010) - [j401]Chin-Chen Chang, Jung-San Lee, T. Hoang Ngan Le
:
Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector. Digit. Signal Process. 20(4): 1286-1307 (2010) - [j400]Wen-Jan Chen, Chin-Chen Chang, T. Hoang Ngan Le
:
High payload steganography mechanism using hybrid edge detector. Expert Syst. Appl. 37(4): 3292-3301 (2010) - [j399]Chin-Chen Chang, Jen-Ho Yang, Da-Wei Wang:
An efficient and reliable E-DRM scheme for mobile environments. Expert Syst. Appl. 37(9): 6176-6181 (2010) - [j398]Chia-Chi Wu, Chia-Chen Lin
, Chin-Chen Chang:
Digital rights management for multimedia content over 3G mobile networks. Expert Syst. Appl. 37(10): 6787-6797 (2010) - [j397]Chin-Chen Chang, Chia-Yin Lee, Yen-Chang Chiu:
An efficient e-mail protocol providing perfect forward secrecy for mobile devices. Int. J. Commun. Syst. 23(12): 1463-1473 (2010) - [j396]Chin-Chen Chang, Shih-Chang Chang, Yu-Wei Lai:
An Improved Biometrics-based User Authentication Scheme without Concurrency System. Int. J. Intell. Inf. Process. 1(1): 41-49 (2010) - [j395]Chin-Chen Chang, Chia-Yin Lee, Chang-Chu Chen, Zhi-Hui Wang:
A data-hiding scheme based on one-way hash function. Int. J. Multim. Intell. Secur. 1(3): 285-297 (2010) - [j394]Naixue Xiong, Athanasios V. Vasilakos
, Laurence Tianruo Yang, Cheng-Xiang Wang
, Rajgopal Kannan, Chin-Chen Chang, Yi Pan:
A novel self-tuning feedback controller for active queue management supporting TCP flows. Inf. Sci. 180(11): 2249-2263 (2010) - [j393]Chin-Chen Chang, Pei-Yan Pai, Chia-Ming Yeh, Yung-Kuan Chan
:
A high payload frequency-based reversible image hiding method. Inf. Sci. 180(11): 2286-2298 (2010) - [j392]Chin-Chen Chang, The Duc Kieu:
A reversible data hiding scheme using complementary embedding strategy. Inf. Sci. 180(16): 3045-3058 (2010) - [j391]Chin-Chen Chang, Pei-Yu Lin
, Zhi-Hui Wang, Mingchu Li:
A Sudoku-based Secret Image Sharing Scheme with Reversibility (Invited Paper). J. Commun. 5(1): 5-12 (2010) - [j390]Fei Yu, Chin-Chen Chang, Guangxue Yue, Jiexian Zeng, Wen Chen:
Guest Editorial. J. Comput. 5(4): 489-491 (2010) - [j389]Yun Liu, Fei Yu, Chin-Chen Chang, Dongfeng Yuan, Yiqin Lu:
Guest Editorial. J. Comput. 5(6): 825-827 (2010) - [j388]Chin-Chen Chang, Pei-Yu Lin, Jun-Chou Chuang:
A Grayscale Image Steganography Based upon Discrete Cosine Transformation. J. Digit. Inf. Manag. 8(2): 88-94 (2010) - [j387]Zhi-Hui Wang, The Duc Kieu, Chin-Chen Chang, Mingchu Li:
A Novel Information Concealing Method Based on Exploiting Modification Direction. J. Inf. Hiding Multim. Signal Process. 1(1): 1-9 (2010) - [j386]Tzu-Chuen Lu, Chin-Chen Chang:
A Survey of VQ Codebook Generation. J. Inf. Hiding Multim. Signal Process. 1(3): 190-203 (2010) - [j385]Zhi-Hui Wang, Chin-Chen Chang, Pei-Yu Tsai:
Hiding Secret Data in an Image Using Codeword Imitation. J. Inf. Process. Syst. 6(4): 435-452 (2010) - [j384]Fei Yu, Chin-Chen Chang, Jian Shu, Guangxue Yue, Jun Zhang:
Guest Editorial. J. Multim. 5(3): 197-199 (2010) - [j383]Chin-Chen Chang, Shih-Chang Chang:
The Design of E-Traveler's Check with Efficiency and Mutual Authentication. J. Networks 5(3): 275-282 (2010) - [j382]Fei Yu, Chin-Chen Chang, Wen Chen, Jun Zhang, Guangxue Yue:
Guest Editorial. J. Networks 5(6): 631-633 (2010) - [j381]Hsing-Chung Chen, Franz I. S. Ko, Yung-Chen Chou, Shyan-Ming Yuan
, Yaw-Chung Chen, Chin-Chen Chang, Jyh-Horng Wen, Shiuh-Jeng Wang, Yuh-Ren Tsai
, Keh-Ming Lu:
Guest Editorial. J. Networks 5(8): 875-879 (2010) - [j380]Dongfeng Yuan, Chin-Chen Chang, Fei Yu, Guozhu Liu, Jun Zhang:
Guest Editorial. J. Networks 5(9): 991-993 (2010) - [j379]Chi-Nan Lin, Daniel J. Buehrer, Chin-Chen Chang, Tzu-Chuen Lu:
Using quad smoothness to efficiently control capacity-distortion of reversible data hiding. J. Syst. Softw. 83(10): 1805-1812 (2010) - [j378]Zhi-Hui Wang, Chin-Chen Chang, Kuo-Nan Chen, Mingchu Li:
An encoding method for both image compression and data lossless information hiding. J. Syst. Softw. 83(11): 2073-2082 (2010) - [j377]Hyunseung Choo, Sang-goo Lee, Katsumi Tanaka, Chin-Chen Chang:
Guest Editorial. J. Softw. 5(2): 131-132 (2010) - [j376]Fei Yu, Chin-Chen Chang, Jian Shu, Guiping Liao, Guangxue Yue:
Guest Editorial. J. Softw. 5(5): 455-457 (2010) - [j375]Fei Yu, Chin-Chen Chang, Jian Shu, Guangxue Yue, Naiping Hu:
Guest Editorial. J. Softw. 5(9): 923-925 (2010) - [j374]Chang-Chu Chen, Chin-Chen Chang:
High capacity SMVQ-based hiding scheme using adaptive index. Signal Process. 90(7): 2141-2149 (2010) - [j373]Deok-Gyu Lee, Sajid Hussain, Alan Chin-Chen Chang:
Intelligent systems for future generation communications. J. Supercomput. 54(1): 1-3 (2010) - [j372]Chin-Chen Chang, Hao-Chuan Tsai:
An Anonymous and Self-Verified Mobile Authentication with Authenticated Key Agreement for Large-Scale Wireless Networks. IEEE Trans. Wirel. Commun. 9(11): 3346-3353 (2010) - [j371]Jung-San Lee, Pei-Yu Lin
, Chin-Chen Chang:
Lightweight Secure Roaming Mechanism Between GPRS/UMTS and Wireless LANs. Wirel. Pers. Commun. 53(4): 569-580 (2010) - [c241]Kuo-Nan Chen, Chin-Chen Chang, Huang-Ching Lin:
A Large Payload EMD Embedding Scheme with High Stego-image Quality. CASoN 2010: 126-130 - [c240]Chin-Chen Chang, Kuo-Nan Chen, Zhi-Hui Wang, Mingchu Li:
A technique of embedding digital data in an image compression code reversibly. ICUIMC 2010: 13 - [c239]Zhi-Hui Wang, Chin-Chen Chang, Mingchu Li, Tzu-Chuen Lu:
A simple image encoding method with data lossless information hiding. ICUIMC 2010: 44 - [c238]Chin-Feng Lee, Chin-Chen Chang, Chun-Yu Wu:
A reversible and multiple-layer embedding strategy with high capacity. ICUIMC 2010: 51 - [c237]Chin-Chen Chang, Kuo-Nan Chen, Ming-Huang Hsieh:
A Robust Public Watermarking Scheme Based on DWT. IIH-MSP 2010: 21-26 - [e4]Chin-Chen Chang, Thanos Vasilakos, Purnendu Das, Tai-Hoon Kim, Byeong-Ho Kang, Muhammad Khurram Khan:
Advanced Communication and Networking - Second International Conference, ACN 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings. Communications in Computer and Information Science 77, 2010, ISBN 978-3-642-13404-3 [contents] - [e3]Tai-Hoon Kim, Alan Chin-Chen Chang, Mingchu Li, Chunming Rong, Charalampos Z. Patrikakis, Dominik Slezak:
Communication and Networking - International Conference, FGCN 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings, Part I. Communications in Computer and Information Science 119, Springer 2010, ISBN 978-3-642-17586-2 [contents]
2000 – 2009
- 2009
- [j370]Chin-Chen Chang, Shih-Chang Chang, Jung-San Lee:
An on-line electronic check system with mutual authentication. Comput. Electr. Eng. 35(5): 757-763 (2009) - [j369]Chin-Chen Chang, Chia-Yin Lee, Yen-Chang Chiu:
Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Comput. Commun. 32(4): 611-618 (2009) - [j368]Jen-Ho Yang, Chin-Chen Chang:
An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comput. Secur. 28(3-4): 138-143 (2009) - [j367]Tzungher Chen
, Chin-Chen Chang, Chang-Sian Wu, Der-Chyuan Lou
:
On the security of a copyright protection scheme based on visual cryptography. Comput. Stand. Interfaces 31(1): 1-5 (2009) - [j366]Hao-Chuan Tsai, Chin-Chen Chang, Kai-Jie Chang:
Roaming across wireless local area networks using SIM-based authentication protocol. Comput. Stand. Interfaces 31(2): 381-389 (2009) - [j365]Jung-San Lee, Chin-Chen Chang:
Design of electronic t-out-of-n lotteries on the Internet. Comput. Stand. Interfaces 31(2): 395-400 (2009) - [j364]Chin-Chen Chang, Ting-Fang Cheng:
An efficient proxy raffle protocol with anonymity-preserving. Comput. Stand. Interfaces 31(4): 772-778 (2009) - [j363]Chin-Chen Chang, Yung-Chen Chou:
A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes. Fundam. Informaticae 90(1-2): 17-26 (2009) - [j362]Chung-Chuan Wang, Chin-Chen Chang, Jinn-ke Jan:
NovelWatermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel Patterns. Fundam. Informaticae 90(1-2): 125-155 (2009) - [j361]Tzu-Chuen Lu, Chin-Chen Chang, Yi-Long Liu:
An Information-Hiding Scheme Based on Quantization-Based Embedding Technique. Fundam. Informaticae 91(3-4): 597-610 (2009) - [j360]Chin-Chen Chang, Tzungher Chen
, Li-Jen Liu:
Preventing Cheating in Computational Visual Cryptography. Fundam. Informaticae 92(1-2): 27-42 (2009) - [j359]The Duc Kieu, Chin-Chen Chang:
An Image Authentication Based on Discrete Fourier Transform. Fundam. Informaticae 97(4): 369-379 (2009) - [j358]Jung-San Lee, Chin-Chen Chang:
A Secure Multicast Framework in Large and High-Mobility Network Groups. IEICE Trans. Commun. 92-B(7): 2365-2373 (2009) - [j357]Che Wun Chiou, Chiou-Yng Lee
, Jim-Min Lin, Ting-Wei Hou, Chin-Chen Chang:
Concurrent error detection and correction in dual basis multiplier over GF(2m). IET Circuits Devices Syst. 3(1): 22-40 (2009) - [j356]Jung-San Lee, Chi-Shiang Chan, Chin-Chen Chang:
Non-iterative privacy preservation for online lotteries. IET Inf. Secur. 3(4): 139-147 (2009) - [j355]Chin-Chen Chang, Yi-Fang Cheng, Iuon-Chang Lin:
A novel key management scheme for dynamic multicast communications. Int. J. Commun. Syst. 22(1): 53-66 (2009) - [j354]Iuon-Chang Lin, Chin-Chen Chang:
A countable and time-bound password-based user authentication scheme for the applications of electronic commerce. Inf. Sci. 179(9): 1269-1277 (2009) - [j353]Chin-Chen Chang, Pei-Yu Lin
, Jieh-Shan Yeh:
Preserving robustness and removability for digital watermarks using subsampling and difference correlation. Inf. Sci. 179(13): 2283-2293 (2009) - [j352]Fei Yu, Chin-Chen Chang, Ben M. Chen, Jian Shu, Guangxue Yue:
Editorial. J. Comput. 4(1): 1-2 (2009) - [j351]Li Ming, Mingwen Wang, Deng-Yi Zhang, Chin-Chen Chang, Fei Yu:
Editorial. J. Comput. 4(6): 433-435 (2009) - [j350]Chi-Nan Lin, Chin-Chen Chang, Mien-Tsung Tsai:
An Image Copyright Protection Scheme Using DCT and a Table Look-up Technique. J. Digit. Inf. Manag. 7(6): 358-364 (2009) - [j349]Fei Yu, Chin-Chen Chang, Deng-Yi Zhang, Jiexian Zeng, Jun Zhang:
Editorial. J. Multim. 4(3): 101-103 (2009) - [j348]Chin-Chen Chang, Jung-San Lee:
Robust t-out-of-n oblivious transfer mechanism based on CRT. J. Netw. Comput. Appl. 32(1): 226-235 (2009) - [j347]Jian Shu, Fei Yu, Chin-Chen Chang, Limin Sun, Guangxue Yue:
Editorial. J. Networks 4(4): 225-227 (2009) - [j346]Chin-Chen Chang, Yung-Chen Chou, Yi-Pei Hsieh:
Search-order coding method with indicator-elimination property. J. Syst. Softw. 82(3): 516-525 (2009) - [j345]Zhi-Hui Wang, Chin-Chen Chang, Chia-Chen Lin
, Mingchu Li:
A reversible information hiding scheme using left-right and up-down chinese character representation. J. Syst. Softw. 82(8): 1362-1369 (2009) - [j344]Jen-Ho Yang, Chin-Chen Chang:
An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments. J. Syst. Softw. 82(9): 1497-1502 (2009) - [j343]The Duc Kieu, Chin-Chen Chang:
A high stego-image quality steganographic scheme with reversibility and high payload using multiple embedding strategy. J. Syst. Softw. 82(10): 1743-1752 (2009) - [j342]Fei Yu, Chin-Chen Chang, Ben M. Chen, Jun Zhang, Guangxue Yue:
Editorial. J. Softw. 4(1): 1-2 (2009) - [j341]Chin-Chen Chang, Guei-Mei Chen, Chia-Chen Lin
:
Lossless Compression Schemes of Vector Quantization Indices Using State Codebook. J. Softw. 4(4): 274-282 (2009) - [j340]Chin-Chen Chang, The Duc Kieu, Yung-Chen Chou:
Reversible information hiding for VQ indices based on locally adaptive coding. J. Vis. Commun. Image Represent. 20(1): 57-64 (2009) - [j339]Pei-Yu Lin
, Jung-San Lee, Chin-Chen Chang:
Distortion-free secret image sharing mechanism using modulus operator. Pattern Recognit. 42(5): 886-895 (2009) - [j338]Chin-Chen Chang, The Duc Kieu, Wen-Chuan Wu:
A lossless data embedding technique by joint neighboring coding. Pattern Recognit. 42(7): 1597-1603 (2009) - [j337]Chin-Chen Chang, Yi-Pei Hsieh:
Authors reply 'Sharing secrets in stego images with authentication'. Pattern Recognit. 42(7): 1620-1621 (2009) - [j336]Chin-Chen Chang, Chia-Chen Lin
, T. Hoang Ngan Le
, Hoai Bac Le:
Sharing a verifiable secret image using two shadows. Pattern Recognit. 42(11): 3097-3114 (2009) - [j335]Chin-Chen Chang, Yi-Hui Chen, Chia-Chen Lin
:
A data embedding scheme for color images based on genetic algorithm and absolute moment block truncation coding. Soft Comput. 13(4): 321-331 (2009) - [j334]Che Wun Chiou, Chin-Chen Chang, Chiou-Yng Lee
, Ting-Wei Hou, Jim-Min Lin:
Concurrent Error Detection and Correction in Gaussian Normal Basis Multiplier over GF(2^m). IEEE Trans. Computers 58(6): 851-857 (2009) - [j333]Jung-San Lee, Chin-Hao Chen, Chin-Chen Chang:
A Novel Illumination-Balance Technique for Improving the Quality of Degraded Text-Photo Images. IEEE Trans. Circuits Syst. Video Technol. 19(6): 900-905 (2009) - [j332]Wei-Liang Tai
, Chia-Ming Yeh, Chin-Chen Chang:
Reversible Data Hiding Based on Histogram Modification of Pixel Differences. IEEE Trans. Circuits Syst. Video Technol. 19(6): 906-910 (2009) - [j331]Pei-Yu Lin
, Jung-San Lee, Chin-Chen Chang:
Dual Digital Watermarking for Internet Media Based on Hybrid Strategies. IEEE Trans. Circuits Syst. Video Technol. 19(8): 1169-1177 (2009) - [j330]Chin-Chen Chang, Chia-Chen Lin
, T. Hoang Ngan Le
, Hoai Bac Le:
Self-verifying visual secret sharing using error diffusion and interpolation techniques. IEEE Trans. Inf. Forensics Secur. 4(4): 790-801 (2009) - [c236]Chin-Chen Chang, Shih-Yi Lin, Jen-Ho Yang:
Efficient User Authentication and Key Establishment Protocols with Perfect Forward Secrecy for Mobile Devices. CIT (2) 2009: 131-135 - [c235]Chin-Chen Chang, Yen-Chang Chen, Chia-Chen Lin
:
A Resistant Secret Sharing Scheme. IAS 2009: 61-64 - [c234]Zhao-Xia Yin, Chin-Chen Chang, Yan-Ping Zhang:
A High Embedding Efficiency Steganography Scheme for Wet Paper Codes. IAS 2009: 611-614 - [c233]Chin-Feng Lee, Kuo-Nan Chen, Chin-Chen Chang, Meng-Cheng Tsai:
A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation. IAS 2009: 615-618 - [c232]Chin-Feng Lee, Chin-Chen Chang, Tien-Chung Liu:
A VSS Scheme of Image Size Invariant for Vertical Edge Enhancement. HIS (1) 2009: 13-16 - [c231]Chin-Chen Chang, Yeu-Pong Lai:
An Enhancement of JPEG Still Image Compression with Adaptive Linear Regression and Golomb-Rice Coding. HIS (3) 2009: 35-40 - [c230]Chin-Chen Chang, Pei-Yu Lin
, Jung-San Lee:
A Self-Reference Watermarking Scheme Based on Wet Paper Coding. HIS (1) 2009: 228-233 - [c229]Zhi-Hui Wang, Mingchu Li, Mao-Hua Chen, Chin-Chen Chang:
A New Intelligent Authorization Agent Model in Grid. HIS (1) 2009: 394-398 - [c228]Chin-Feng Lee, Kuo-Hua Wang, Chin-Chen Chang, Yu-Lin Huang:
A reversible data hiding scheme based on dual steganographic images. ICUIMC 2009: 228-237 - [c227]Chin-Chen Chang, Shih-Chang Chang:
The design of e-traveler's check with efficiency and mutual authentication. ICUIMC 2009: 309-316 - [c226]Kuo-Nan Chen, Chin-Feng Lee, Chin-Chen Chang:
Embedding secret messages based on chaotic map and Huffman coding. ICUIMC 2009: 336-341 - [c225]Kuo-Nan Chen, Chin-Feng Lee, Chin-Chen Chang, Huang-Ching Lin:
Embedding Secret Messages Using Modified Huffman Coding. IIH-MSP 2009: 278-281 - [c224]Chin-Chen Chang, Chia-Chen Lin
, Pei-Yan Pai, Yen-Chang Chen:
A Novel Retinal Blood Vessel Segmentation Method Based on Line Operator and Edge Detector. IIH-MSP 2009: 299-302 - [c223]Chin-Chen Chang, Chi-Shiang Chan, Zhi-Hui Wang, Mingchu Li:
Reversible Steganography for VQ Indices Using the Modified State Codebook. IIH-MSP 2009: 320-323 - [c222]The Duc Kieu, Chin-Chen Chang, Zhi-Hui Wang, Mingchu Li:
Sharing Secrets and Reversibly Reconstructing the Cover Image Using Two Meaningful Shadows. IIH-MSP 2009: 324-327 - [c221]Chi-Nan Lin, Chin-Chen Chang, Wei-Bin Lee, Jason Lin
:
A Novel Secure Data Hiding Scheme Using a Secret Reference Matrix. IIH-MSP 2009: 369-373 - [c220]Chin-Chen Chang, Yung-Chen Chou, Ming-Huang Hsieh:
A Simple and Efficient Data Hiding Scheme Suitable for Low Power Computation Environments. IIH-MSP 2009: 624-627 - [c219]Yu-Wei Lai, Chin-Chen Chang, Shih-Chang Chang:
Novel Efficient Electronic Voting Mechanism Based upon Elliptic Curve. IIH-MSP 2009: 898-901 - [c218]Chin-Chen Chang, Chia-Yin Lee, Wei-Bin Lee:
Cryptanalysis and Improvement of a Secure Authentication Scheme with Anonymity for Wireless Communications. IIH-MSP 2009: 902-904 - [c217]Chin-Chen Chang, Yung-Chen Chou, Chia-Chen Lin
:
A Steganographic Scheme based on Wet Paper Codes Suitable for Uniformly Distributed Wet Pixels. ISCAS 2009: 501-504 - [c216]Chin-Chen Chang, Yung-Chen Chou, The Duc Kieu:
Information Hiding in Dual Images with Reversibility. MUE 2009: 145-152 - [c215]Chin-Chen Chang, Hsien-Wen Tseng:
Data Hiding in Images by Hybrid LSB Substitution. MUE 2009: 360-363 - [e2]Dominik Slezak, Tai-Hoon Kim, Alan Chin-Chen Chang, Thanos Vasilakos, Mingchu Li, Kouichi Sakurai:
Communication and Networking - International Conference, FGCN/ACN 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings. Communications in Computer and Information Science 56, Springer 2009, ISBN 978-3-642-10843-3 [contents] - 2008
- [j329]Hsing-Bai Chen, Tzungher Chen
, Wei-Bin Lee, Chin-Chen Chang:
Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks. Comput. Stand. Interfaces 30(1-2): 95-99 (2008) - [j328]Yu-Chiang Li, Jieh-Shan Yeh, Chin-Chen Chang:
Isolated items discarding strategy for discovering high utility itemsets. Data Knowl. Eng. 64(1): 198-217 (2008) - [j327]Chin-Chen Chang, Chih-Yang Lin, Yi-Pei Hsieh:
Three-Phase Lossless Data Hiding Method for the VQ Index Table. Fundam. Informaticae 82(1-2): 1-13 (2008) - [j326]Hui-Feng Huang, Chin-Chen Chang:
A Novel Cryptographic Key Assignment Scheme with ID-Based Access Control in a Hierachy. Fundam. Informaticae 84(3-4): 353-361 (2008) - [j325]Chin-Chen Chang, Yung-Chen Chou, The Duc Kieu:
High Capacity Data Hiding for Grayscale Images. Fundam. Informaticae 86(4): 435-446 (2008) - [j324]Chin-Chen Chang, Chia-Chen Lin, Yi-Hui Chen:
Adaptive Data Embedding Scheme Based on Similar and Dissimilar Clustering Strategies. Fundam. Informaticae 88(1-2): 23-45 (2008) - [j323]Yung-Chen Chou, Chin-Chen Chang, Kuan-Ming Li:
A Large Payload Data Embedding Technique for Color Images. Fundam. Informaticae 88(1-2): 47-61 (2008) - [j322]Chin-Chen Chang, Pei-Yu Lin
:
A Color Image Authentication Method Using Partitioned Palette and Morphological Operations. IEICE Trans. Inf. Syst. 91-D(1): 54-61 (2008) - [j321]Chih-Yang Lin
, Chin-Chen Chang, Yu-Zheng Wang:
Reversible Steganographic Method with High Payload for JPEG Images. IEICE Trans. Inf. Syst. 91-D(3): 836-845 (2008) - [j320]Chang-Chu Chen, Chin-Chen Chang:
LSB-Based Steganography Using Reflected Gray Code. IEICE Trans. Inf. Syst. 91-D(4): 1110-1116 (2008) - [j319]Jen-Ho Yang, Chin-Chen Chang:
Efficient residue number system iterative modular multiplication algorithm for fast modular exponentiation. IET Comput. Digit. Tech. 2(1): 1-5 (2008) - [j318]Chin-Chen Chang, Chia-Chen Lin
, Yi-Hui Chen:
Reversible data-embedding scheme using differences between original and predicted pixel values. IET Inf. Secur. 2(2): 35-46 (2008) - [j317]Chin-Chen Chang, Chia-Chen Lin, Chia-Hsuan Lin, Yi-Hui Chen:
A novel secret image sharing scheme in color images using small shadow images. Inf. Sci. 178(11): 2433-2447 (2008) - [j316]Chin-Chen Chang, Wen-Chuan Wu, Yi-Hui Chen:
Joint coding and embedding techniques for multimedia images. Inf. Sci. 178(18): 3543-3556 (2008) - [j315]Tzu-Chuen Lu, Chin-Chen Chang:
Lossless nibbled data embedding scheme based on difference expansion. Image Vis. Comput. 26(5): 632-638 (2008) - [j314]Hsien-Wen Tseng, Chin-Chen Chang:
An extended difference expansion algorithm for reversible watermarking. Image Vis. Comput. 26(8): 1148-1153 (2008) - [j313]Chin-Feng Lee, Chin-Chen Chang, Kuo-Hua Wang:
An improvement of EMD embedding method for large payloads by pixel segmentation strategy. Image Vis. Comput. 26(12): 1670-1676 (2008) - [j312]Fei Yu, Chin-Chen Chang, Ben M. Chen, Wen Chen, Yongjun Chen:
Editorial. J. Commun. 3(6): 1-2 (2008) - [j311]Wen Chen, Fei Yu, Chin-Chen Chang, Jiexian Zeng, Guangxue Yue:
Editorial. J. Commun. 3(7): 1-2 (2008) - [j310]Fei Yu, Chin-Chen Chang, Ben M. Chen, Zhigang Chen, Jun Ni
:
Editorial. J. Comput. 3(12): 1-2 (2008) - [j309]Chia-Chi Wu, Chin-Chen Chang, Iuon-Chang Lin:
New Sealed-Bid Electronic Auction with Fairness, Security and Efficiency. J. Comput. Sci. Technol. 23(2): 253-264 (2008) - [j308]Chin-Chen Chang, The Duc Kieu, Yung-Chen Chou:
Reversible Data Embedding for Color Images. J. Digit. Inf. Manag. 6(2): 143-150 (2008) - [j307]Chin-Chen Chang, Pei-Yu Lin
:
Adaptive watermark mechanism for rightful ownership protection. J. Syst. Softw. 81(7): 1118-1129 (2008) - [j306]Ming-Ni Wu, Chia-Chen Lin
, Chin-Chen Chang:
An embedding technique based upon block prediction. J. Syst. Softw. 81(9): 1505-1516 (2008) - [j305]Fei Yu, Chin-Chen Chang, Ben M. Chen, Yongjun Chen, Zhigang Chen:
Editorial. J. Softw. 3(9): 1-2 (2008) - [j304]Chin-Chen Chang, Yi-Hsuan Fan, Wei-Liang Tai
:
Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognit. 41(2): 654-661 (2008) - [j303]Chin-Chen Chang, Chih-Yang Lin
, Yi-Hsuan Fan:
Lossless data hiding for color images based on block truncation coding. Pattern Recognit. 41(7): 2347-2357 (2008) - [j302]Yi-Pei Hsieh, Chin-Chen Chang, Li-Jen Liu:
A two-codebook combination and three-phase block matching based image-hiding scheme with high embedding capacity. Pattern Recognit. 41(10): 3104-3113 (2008) - [j301]Chin-Chen Chang, Yi-Pei Hsieh, Chia-Hsuan Lin:
Sharing secrets in stego images with authentication. Pattern Recognit. 41(10): 3130-3137 (2008) - [j300]Chia-Chen Lin
, Wei-Liang Tai
, Chin-Chen Chang:
Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recognit. 41(12): 3582-3591 (2008) - [j299]Jung-San Lee, Chin-Chen Chang:
Preserving data integrity in mobile ad hoc networks with variant Diffie-Hellman protocol. Secur. Commun. Networks 1(4): 277-286 (2008) - [j298]Chin-Chen Chang, Iuon-Chang Lin, Chia-Chen Lin
:
A Novel Location Tracking Scheme for Reducing Location Updating Traffic in a Personal Communication System. Wirel. Pers. Commun. 44(2): 139-152 (2008) - [c214]Chang-Chu Chen, Chin-Chen Chang:
Reversibly sharing and hiding secret using expansion strategy. APCCAS 2008: 1588-1591 - [c213]Chin-Feng Lee, Lin-Yi Chuang, Chin-Chen Chang:
Hiding Information Employing Reduplicating Embedding. APSCC 2008: 825-828 - [c212]Chin-Chen Chang, Chin-Feng Lee, Yi-Ren Wang:
An Improved EMD Embedding Scheme Based on Secret Image Difference. EUC (1) 2008: 129-135 - [c211]Chin-Chen Chang, Wei-Liang Tai
, Kuo-Nan Chen:
Lossless Data Hiding Based on Histogram Modification for Image Authentication. EUC (1) 2008: 506-511 - [c210]Chin-Chen Chang, The Duc Kieu, Yung-Chen Chou:
Using nearest covering codes to embed secret information in grayscale images. ICUIMC 2008: 315-320 - [c209]Chin-Chen Chang, Jung-San Lee, Ting-Fang Cheng:
Security design for three-party encrypted key exchange protocol using smart cards. ICUIMC 2008: 329-333 - [c208]Chin-Feng Lee, Yi-Ren Wang, Chin-Chen Chang:
An adaptive EMD embedding method by condensing secret messages based on consecutive ones transformation and token substitution. ICUIMC 2008: 390-395 - [c207]Chin-Feng Lee, Pei-Yan Pai, Wen-Hung Huang, Chin-Chen Chang:
An Effective Demosaicking and Zooming Algorithm for CFA Images. IIH-MSP 2008: 1150-1153 - [c206]Chin-Feng Lee, Chin-Chen Chang, Kuo-Hua Wang:
Hiding Data in VQ-Compressed Images Using Pairwise Nearest Codewords Based on Minimum Spanning Tree. IIH-MSP 2008: 1293-1296 - [c205]Jun-Chou Chuang, Chin-Chen Chang:
An Image Authentication Scheme for Halftone Images Based upon Error Diffusion. IIH-MSP 2008: 1297-1300 - [c204]Chin-Chen Chang, Chia-Chen Lin, T. Hoang Ngan Le
, Hoai Bac Le:
A New Probabilistic Visual Secret Sharing Scheme for Color Images. IIH-MSP 2008: 1305-1308 - [c203]Jieh-Shan Yeh, Shang-Ru Yang, Chin-Chen Chang, Tzungher Chen:
Assigning Keys in a Hierarchy. IIH-MSP 2008: 1363-1366 - [c202]Iuon-Chang Lin, Chin-Chen Chang:
A Novel Digital Signature Scheme for Application of Document Review in a Linearly Hierarchical Organization. IIH-MSP 2008: 1367-1370 - [c201]Chin-Chen Chang, Shih-Chang Chang:
An Improved Authentication Key Agreement Protocol Based on Elliptic Curve for Wireless Mobile Networks. IIH-MSP 2008: 1375-1378 - [c200]Jen-Ho Yang, Chin-Chen Chang:
Aryabhata Remainder Theorem for Moduli with Common Factors and Its Application in Information Protection Systems. IIH-MSP 2008: 1379-1382 - [c199]Iuon-Chang Lin, Chin-Chen Chang, Jen-Ho Yang:
An Efficient Proxy Signature Scheme for Realizing Generalized Proxy Signing Policy. IIH-MSP 2008: 1537-1540 - [c198]Jing Li, Jung-San Lee, Chin-Chen Chang:
Preserving PHI in Compliance with HIPAA Privacy/Security Regulations Using Cryptographic Techniques. IIH-MSP 2008: 1545-1548 - [c197]Jen-Ho Yang, Chin-Chen Chang:
Cryptanalysis of ID-Based Digital Signature Scheme on Elliptic Curve Cryptosystem. ISDA (3) 2008: 3-5 - [c196]Chin-Chen Chang, Jung-San Lee:
Security Enhancement of Ku-Wang Authenticated Key Agreement Protocol. ISDA (3) 2008: 467-471 - [c195]Chin-Chen Chang, The Duc Kieu, Yung-Chen Chou:
A High Payload Steganographic Scheme Based on (7, 4) Hamming Code for Digital Images. ISECS 2008: 16-21 - [c194]Chin-Chen Chang, Chia-Chen Lin
, T. Hoang Ngan Le
, Hoai Bac Le:
A Probabilistic Visual Secret Sharing Scheme for Grayscale Images with Voting Strategy. ISECS 2008: 184-188 - [e1]Jeng-Shyang Pan, Ajith Abraham, Chin-Chen Chang:
Eighth International Conference on Intelligent Systems Design and Applications, ISDA 2008, 26-28 November 2008, Kaohsiung, Taiwan, 3 Volumes. IEEE Computer Society 2008, ISBN 978-0-7695-3382-7 [contents] - 2007
- [j297]Yu-Chiang Li, Jieh-Shan Yeh, Chin-Chen Chang:
MICF: An effective sanitization algorithm for hiding sensitive patterns on data mining. Adv. Eng. Informatics 21(3): 269-280 (2007) - [j296]Ting-Fang Cheng, Jung-San Lee, Chin-Chen Chang:
Security enhancement of an IC-card-based remote login mechanism. Comput. Networks 51(9): 2280-2287 (2007) - [j295]Yuan-Hui Yu, Chin-Chen Chang, Iuon-Chang Lin:
A new steganographic method for color and grayscale image hiding. Comput. Vis. Image Underst. 107(3): 183-194 (2007) - [j294]Ya-Fen Chang, Chin-Chen Chang:
Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy. Fundam. Informaticae 76(1-2): 13-23 (2007) - [j293]Chin-Chen Chang, Chang-Chu Chen:
Full-Searching-Equivalent Vector Quantization Using Two-Bounds Triangle Inequality. Fundam. Informaticae 76(1-2): 25-37 (2007) - [j292]Chin-Chen Chang, Tzu-Chuen Lu, Jun-Bin Ya:
VQ Codebook Searching Algorithm Based on Correlation Property. Fundam. Informaticae 76(1-2): 39-57 (2007) - [j291]Chin-Chen Chang, Chih-Yang Lin, Chun-Sen Tseng:
Secret Image Hiding and Sharing Based on the (t, n)-Threshold. Fundam. Informaticae 76(4): 399-411 (2007) - [j290]Hsien-Chu Wu, Chin-Chen Chang:
An Image Retrieval Method Based on Color-Complexity and Spatial-Histogram Features. Fundam. Informaticae 76(4): 481-493 (2007) - [j289]Chin-Chen Chang, Wei-Liang Tai, Chia-Chen Lin:
A Novel Image Hiding Scheme Based on VQ and Hamming Distance. Fundam. Informaticae 77(3): 217-228 (2007) - [j288]Hsien-Wen Tseng, Chin-Chen Chang:
Anti-Pseudo-Gray Coding for VQ Encoded Images over Noisy Channels. IEEE Commun. Lett. 11(5): 443-445 (2007) - [j287]Chin-Chen Chang, Yung-Chen Chou, Chih-Yang Lin
:
Reversible Data Hiding in the VQ-Compressed Domain. IEICE Trans. Inf. Syst. 90-D(9): 1422-1429 (2007) - [j286]Chin-Chen Chang, Wen-Chuan Wu, Chih-Chiang Tsou:
Hiding Secret Information Using Adaptive Side-Match VQ. IEICE Trans. Inf. Syst. 90-D(10): 1678-1686 (2007) - [j285]Chiou-Yng Lee
, Che Wun Chiou, Jim-Min Lin, Chin-Chen Chang:
Scalable and systolic Montgomery multiplier over GF(2m) generated by trinomials. IET Circuits Devices Syst. 1(6): 477-484 (2007) - [j284]Ya-Fen Chang, Chin-Chen Chang:
An RSA-based (t, n) threshold proxy signature scheme with freewill identities. Int. J. Inf. Comput. Secur. 1(1/2): 201-209 (2007) - [j283]Jung-San Lee, Chin-Chen Chang, Pen-Yi Chang:
Anonymous authentication scheme for wireless communications. Int. J. Mob. Commun. 5(5): 590-601 (2007) - [j282]Ya-Fen Chang, Chin-Chen Chang, Pei-Yu Lin:
A Concealed t-out-of-n Signer Ambiguous Signature Scheme with Variety of Keys. Informatica 18(4): 535-546 (2007) - [j281]Tzu-Chuen Lu, Chin-Chen Chang:
Color image retrieval technique based on color features and image bitmap. Inf. Process. Manag. 43(2): 461-472 (2007) - [j280]Chin-Chen Chang, Chih-Yang Lin
:
Reversible steganographic method using SMVQ approach based on declustering. Inf. Sci. 177(8): 1796-1805 (2007) - [j279]Chin-Chen Chang, Chia-Chen Lin
, Chun-Sen Tseng, Wei-Liang Tai
:
Reversible hiding in DCT-based compressed images. Inf. Sci. 177(13): 2768-2786 (2007) - [j278]Iuon-Chang Lin, Chin-Chen Chang:
Security enhancement for digital signature schemes with fault tolerance in RSA. Inf. Sci. 177(19): 4031-4039 (2007) - [j277]Jau-Ji Shen, Chin-Chen Chang, Yu-Chiang Li:
Combined association rules for dealing with missing values. J. Inf. Sci. 33(4): 468-480 (2007) - [j276]Chin-Chen Chang, Chih-Yang Lin
, Keng-Chu Lin:
Simple efficient mutual anonymity protocols for peer-to-peer network based on primitive roots. J. Netw. Comput. Appl. 30(2): 662-676 (2007) - [j275]Jung-San Lee, Chin-Chen Chang:
Secure communications for cluster-based ad hoc networks using node identities. J. Netw. Comput. Appl. 30(4): 1377-1396 (2007) - [j274]Ming-Ni Wu, Chia-Chen Lin
, Chin-Chen Chang:
Novel image copy detection with rotating tolerance. J. Syst. Softw. 80(7): 1057-1069 (2007) - [j273]Chin-Chen Chang, Yu-Chiang Li, Wen-Hung Huang:
TFRP: An efficient microaggregation algorithm for statistical disclosure control. J. Syst. Softw. 80(11): 1866-1878 (2007) - [j272]Chin-Chen Chang, Wen-Chuan Wu, Yu-Chen Hu
:
Lossless recovery of a VQ index table with embedded secret data. J. Vis. Commun. Image Represent. 18(3): 207-216 (2007) - [j271]Chi-Shiang Chan, Chin-Chen Chang:
An efficient image authentication method based on Hamming code. Pattern Recognit. 40(2): 681-690 (2007) - [j270]Chin-Chen Chang, Yi-Pei Hsieh, Chih-Yang Lin
:
Lossless Data Embedding With High Embedding Capacity Based on Declustering for VQ-Compressed Codes. IEEE Trans. Inf. Forensics Secur. 2(3-1): 341-349 (2007) - [j269]Chin-Chen Chang, Wen-Chuan Wu:
Fast Planar-Oriented Ripple Search Algorithm for Hyperspace VQ Codebook. IEEE Trans. Image Process. 16(6): 1538-1547 (2007) - [j268]Iuon-Chang Lin, Chin-Chen Chang:
A Practical Electronic Payment System for Message Delivery Service in the Mobile Environment. Wirel. Pers. Commun. 42(2): 247-261 (2007) - [c193]Chia-Chi Wu, Chin-Chen Chang, Shang-Ru Yang:
An Efficient Fragile Watermarking for Web Pages Tamper-Proof. APWeb/WAIM Workshops 2007: 654-663 - [c192]Kuo-Lung Hung, Chin-Chen Chang:
Recoverable Tamper Proofing Technique for Image Authentication Using Irregular Sampling Coding. ATC 2007: 333-343 - [c191]Chin-Chen Chang, Yi-Fang Cheng, Iuon-Chang Lin:
Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control. Inscrypt 2007: 457-462 - [c190]Chin-Chen Chang, Yih-Shin Hu, Chia-Chen Lin
:
A Digital Watermarking Scheme Based on Singular Value Decomposition. ESCAPE 2007: 82-93 - [c189]Chao-Wen Chan, Chin-Chen Chang:
A New (t, n)-Threshold Scheme Based on Difference Equations. ESCAPE 2007: 94-106 - [c188]Chin-Chen Chang, Pei-Yu Lin
:
Significance-Preserving Codebook Using Generic Algorithm. FSKD (3) 2007: 660-664 - [c187]Chin-Chen Chang, Yung-Chen Chou, Tzu-Chuen Lu:
A Semi-blind Watermarking Based on Discrete Wavelet Transform. ICICS 2007: 164-176 - [c186]Ming-Ni Wu, Chia-Chen Lin
, Chin-Chen Chang:
Brain Tumor Detection Using Color-Based K-Means Clustering Segmentation. IIH-MSP 2007: 245-250 - [c185]Chin-Chen Chang, The Duc Kieu:
Secret Sharing and Information Hiding by Shadow Images. IIH-MSP 2007: 457-460 - [c184]Chin-Chen Chang, Wei-Liang Tai
, Kuo-Nan Chen:
Improvements of EMD Embedding for Large Payloads. IIH-MSP 2007: 473-476 - [c183]Chin-Chen Chang, The Duc Kieu:
Reversible Data Embedding for Vector Quantization Indices. IIH-MSP 2007: 481-484 - [c182]Chin-Chen Chang, Chin-Feng Lee, Lin-Yi Chuang:
Using Dynamic Programming Strategy to Find an Optimal Solution to Exploiting Modification Direction Embedding Method. IIH-MSP 2007: 489-492 - [c181]Chin-Feng Lee, Yi-Ren Wang, Chin-Chen Chang:
A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction. IIH-MSP 2007: 497-500 - [c180]Chung-Chuan Wang, Chin-Chen Chang, Jinn-ke Jan, Iuon-Chang Lin:
A Flexible Fragile Watermarking Scheme for Binary Images with Reversibility. IIH-MSP 2007: 501-504 - [c179]Chin-Chen Chang, Yung-Chen Chou:
High Payload Data Embedding with Hybrid Strategy. IIH-MSP 2007: 505-508 - [c178]Chi-Nan Lin, Chin-Chen Chang:
A Best-pair-first Capacity-distortion Control for Data Hiding on VQ Compression Domain. IIH-MSP 2007: 509-514 - [c177]Chang-Chu Chen, Chin-Chen Chang:
Secret Image Sharing Using Quadratic Residues. IIH-MSP 2007: 515-518 - [c176]Chin-Chen Chang, Yu-Wei Su, Iuon-Chang Lin:
A broadcast-encryption-based key management scheme for dynamic multicast communications work-in-progress. Infoscale 2007: 69 - [c175]Kai-Jie Chang, Chin-Chen Chang:
An e-mail signature protocol for anti-spam work-in-progress. Infoscale 2007: 70 - [c174]Chin-Chen Chang, Shih-Yi Lin:
An Improvement on Authenticated Key Agreement Scheme. IPC 2007: 3-6 - [c173]Chin-Chen Chang, Yung-Chen Chou, Chia-Chen Lin
:
A New Image Compression Scheme Based on Locally Adaptive Coding. ISM 2007: 14-21 - [c172]Chin-Chen Chang, Wen-Chuan Wu:
Reversible Quantization-Index Modulation Using Neighboring Correlation. IWDW 2007: 222-232 - [c171]Chin-Chen Chang, Chih-Yang Lin, Yu-Zheng Wang:
A High Payload VQ Steganographic Method for Binary Images. IWDW 2007: 467-481 - [c170]Chin-Chen Chang, Yi-Hui Chen, Yung-Chen Chou:
Reversible Data Embedding Technique for Palette Images Using De-clustering. MCAM 2007: 130-139 - [c169]Chung-Chuan Wang, Chin-Chen Chang, Xinpeng Zhang, Jinn-ke Jan:
Senary Huffman Compression - A Reversible Data Hiding Scheme for Binary Images. MCAM 2007: 351-360 - [c168]Chin-Chen Chang, Chih-Yang Lin:
Density-Based Image Vector Quantization Using a Genetic Algorithm. MMM (1) 2007: 289-298 - [c167]Chi-Shiang Chan, Chin-Chen Chang:
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator. MMM (2) 2007: 461-470 - [c166]Chin-Chen Chang, Chu-Hsing Lin, Chien-Yuan Chen:
A Conference Key Distribution Scheme Using Interpolating Polynomials. MUE 2007: 963-967 - [c165]Hui-Feng Huang, Chin-Chen Chang:
An Efficient Key-Lock-Pair Mechanism Based on Division Algorithm. MUE 2007: 982-986 - [c164]Chin-Chen Chang, Hao-Chuan Tsai, Yi-Hui Chen:
An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards. MUE 2007: 1210-1215 - [c163]Jieh-Shan Yeh, Yu-Chiang Li, Chin-Chen Chang:
Two-Phase Algorithms for a Novel Utility-Frequent Mining Model. PAKDD Workshops 2007: 433-444 - [c162]Chin-Chen Chang, Chih-Chiang Tsou, Yung-Chen Chou:
A Remediable Image Authentication Scheme Based on Feature Extraction and Clustered VQ. PCM 2007: 446-449 - [c161]Yuan-Hui Yu, Chin-Chen Chang, Yu-Chen Hu
:
Improved JPEG Scheme Based on Adaptive Block Encoding. SITIS 2007: 645-651 - [c160]Chin-Chen Chang, Tai-Xing Yu, Hsuan-Yen Yen:
Paper Currency Verification with Support Vector Machines. SITIS 2007: 860-865 - [p2]Chin-Chen Chang, Tzu-Chuen Lu, Yi-Hsuan Fan:
A Bit-Level Visual Secret Sharing Scheme for Multi-Secret Images Using Rotation and Reversion Operatations. Intelligent Multimedia Data Hiding: New Directions 2007: 83-101 - [p1]Chin-Chen Chang, Yu-Zheng Wang, Yu-Chen Hu:
Adaptive Data Hiding Scheme for Palette Images. Intelligent Multimedia Data Hiding: New Directions 2007: 103-122 - 2006
- [j267]Chin-Chen Chang, Yeu-Pong Lai:
A division algorithm for residue numbers. Appl. Math. Comput. 172(1): 368-378 (2006) - [j266]Chin-Chen Chang, Yeu-Pong Lai:
A parallel residue-to-binary conversion algorithm without trial division. Comput. Electr. Eng. 32(6): 454-467 (2006) - [j265]Chin-Chen Chang, Jung-San Lee:
An anonymous voting mechanism based on the key exchange protocol. Comput. Secur. 25(4): 307-314 (2006) - [j264]Chin-Chen Chang, Jun-Chou Chuang, Yu-Chen Hu:
Spatial Domain Image Hiding Scheme Using Pixel-Values Differencing. Fundam. Informaticae 70(3): 171-184 (2006) - [j263]Chin-Chen Chang, Chih-Yang Lin, Henry Chou:
Perfect Hashing Schemes for Mining Traversal Patterns. Fundam. Informaticae 70(3): 185-202 (2006) - [j262]Yu-Chen Hu, Chin-Chen Chang:
An Improved Tree-Structured Codebook Search Algorithm for Grayscale Image Compression. Fundam. Informaticae 70(3): 251-260 (2006) - [j261]Chin-Chen Chang, Guei-Mei Chen, Yu-Chen Hu:
A Novel Index Coding Scheme for Vector Quantization. Fundam. Informaticae 71(2-3): 215-227 (2006) - [j260]Ming-Ni Wu, Chia-Chen Lin, Chin-Chen Chang:
A Robust Content-Based Copy Detection Scheme. Fundam. Informaticae 71(2-3): 351-366 (2006) - [j259]Chia-Chen Lin, Yu-Chen Hu, Chin-Chen Chang:
A Novel Image Ownership Protection Scheme Based on Rehashing Concept and Vector Quantization. Fundam. Informaticae 71(4): 443-451 (2006) - [j258]Chin-Chen Chang, Chih-Yang Lin:
Reversible Data Embedding Based on Prediction Approach for VQ and SMVQ Compressed Images. Fundam. Informaticae 74(2-3): 189-207 (2006) - [j257]Ya-Fen Chang, Jung-San Lee, Chin-Chen Chang:
A secure and efficient authentication scheme for mobile users. Int. J. Mob. Commun. 4(5): 581-594 (2006) - [j256]Chin-Chen Chang, Iuon-Chang Lin, Chia-Te Liao:
An Access Control System with Time-constraint Using Support Vector Machines. Int. J. Netw. Secur. 2(2): 150-159 (2006) - [j255]Chin-Chen Chang, Chia-Te Liao:
An image coding scheme using SMVQ and support vector machines. Neurocomputing 69(16-18): 2327-2335 (2006) - [j254]Hui-Feng Huang, Chin-Chen Chang:
A novel efficient (t, n) threshold proxy signature scheme. Inf. Sci. 176(10): 1338-1349 (2006) - [j253]Chin-Chen Chang, Chih-Yang Lin
, Yu-Zheng Wang:
New image steganographic methods using run-length approach. Inf. Sci. 176(22): 3393-3408 (2006) - [j252]Yuan-Hui Yu, Chin-Chen Chang:
A new edge detection approach based on image context analysis. Image Vis. Comput. 24(10): 1090-1102 (2006) - [j251]Chin-Chen Chang, Tzu-Chuen Lu:
Reversible index-domain information hiding scheme based on side-match vector quantization. J. Syst. Softw. 79(8): 1120-1129 (2006) - [j250]Hsien-Wen Tseng, Chin-Chen Chang:
Error resilient locally adaptive data compression. J. Syst. Softw. 79(8): 1156-1160 (2006) - [j249]Chin-Chen Chang, Tzu-Chuen Lu:
A difference expansion oriented data hiding scheme for restoring the original host images. J. Syst. Softw. 79(12): 1754-1766 (2006) - [j248]Chin-Chen Chang, Chi-Shiang Chan, Yi-Hsuan Fan:
Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels. Pattern Recognit. 39(6): 1155-1167 (2006) - [j247]Chin-Chen Chang, Yih-Shin Hu, Tzu-Chuen Lu:
A watermarking-based image ownership and tampering authentication scheme. Pattern Recognit. Lett. 27(5): 439-446 (2006) - [j246]Chin-Chen Chang, Yu-Chiang Li, Jun-Bin Yeh:
Fast codebook search algorithms based on tree-structured vector quantization. Pattern Recognit. Lett. 27(10): 1077-1086 (2006) - [j245]Chin-Chen Chang, Chi-Shiang Chan, Chun-Sen Tseng:
Removing blocking effects using an artificial neural network. Signal Process. 86(9): 2381-2387 (2006) - [j244]Chin-Chen Chang, Wei-Liang Tai
, Chia-Chen Lin
:
A Reversible Data Hiding Scheme Based on Side Match Vector Quantization. IEEE Trans. Circuits Syst. Video Technol. 16(10): 1301-1308 (2006) - [j243]Chin-Chen Chang, Chih-Yang Lin
:
Reversible Steganography for VQ-Compressed Images Using Side Matching and Relocation. IEEE Trans. Inf. Forensics Secur. 1(4): 493-501 (2006) - [j242]Chin-Chen Chang, Iuon-Chang Lin:
A new solution for assigning cryptographic keys to control access in mobile agent environments. Wirel. Commun. Mob. Comput. 6: 137-146 (2006) - [c159]Ya-Fen Chang, Chin-Chen Chang:
Enhanced Anonymous Auction Protocols with Freewheeling Bids. AINA (1) 2006: 353-358 - [c158]Ya-Fen Chang, Chin-Chen Chang, Yu-Wei Su:
A secure improvement on the user-friendly remote authentication scheme with no time concurrency mech. AINA (2) 2006: 741-745 - [c157]Iuon-Chang Lin, Chin-Chen Chang:
An Efficient Fault-Tolerant Digital Signature Scheme Based on the Discrete Logarithm Problem. ATC 2006: 601-610 - [c156]Chin-Chen Chang, Chi-Shiang Chan, Yi-Hsuan Fan:
A Secret Image Sharing Scheme Based on Vector Quantization Mechanism. EUC 2006: 469-478 - [c155]Hui-Feng Huang, Chin-Chen Chang:
An Untraceable Electronic Cash System Using Fair Blind Signatures. ICEBE 2006: 39-46 - [c154]Chao-Wen Chan, Chin-Chen Chang:
A New Scheme for the Electronic Coin. ICEBE 2006: 339-343 - [c153]Chin-Chen Chang, Wei-Liang Tai, Chia-Chen Lin:
A Multipurpose Wavelet-Based Image Watermarking. ICICIC (3) 2006: 70-73 - [c152]Chin-Chen Chang, Kuo-Lung Hung:
An Efficient Euclidean Distance Estimation Scheme for Accelerating VQ Encoding. ICICIC (1) 2006: 194-196 - [c151]Chin-Chen Chang, Yung-Chen Chou, Jau-Ji Shen:
A Discrete Wavelet Transform Based State-Codebook Search Algorithm for Vector Quantization. ICICIC (1) 2006: 197-200 - [c150]Chin-Chen Chang, Tung-Shou Chen, Hsien-Chu Hsia:
An ImageWatermarking Scheme Using Pattern Coding Technique. ICICIC (3) 2006: 467-470 - [c149]Ming-Ni Wu, Chia-Chen Lin, Chin-Chen Chang:
A Fast Wavelet-Based Image Progressive Transmission Method Based on Vector Quantization. ICICIC (2) 2006: 677-680 - [c148]Chin-Chen Chang, Tzu-Chuen Lu:
A Wavelet-Based Progressive Digital Image Transmission Scheme. ICICIC (2) 2006: 681-684 - [c147]Timothy K. Shih, Chin-Chen Chang, Hsiau Wen Lin:
Reusability on Learning Object Repository. ICWL 2006: 203-214 - [c146]Chung-Chuan Wang, Chin-Chen Chang, Jinn-ke Jan, Jieh-Shan Yeh:
Novel Steganographic Schemes Based on Row-Major Mapping Relation. IIH-MSP 2006: 392-395 - [c145]Chin-Chen Chang, Yung-Chen Chang, Jau-Ji Shen:
A Heuristic Method for Extracting Enhanced Watermarks from Digital Images. IIH-MSP 2006: 453-456 - [c144]Chin-Chen Chang, Yi-Hui Chen, Kuan-Ming Li:
Improved SMVQ Scheme with Edge-Directed Prediction. IIH-MSP 2006: 541-544 - [c143]Chin-Chen Chang, Yung-Chen Chang, Jau-Ji Shen:
A Novel Image Compression Algorithm Based on Sixteen Most Lately Used Encoded Codewords. IIH-MSP 2006: 545-548 - [c142]Chin-Chen Chang, Yung-Chen Chou:
Quantization Index Modulation Using Vector Quantization with DWT Based State-Codebook Search. IIH-MSP 2006: 549-554 - [c141]Chia-Chen Lin
, Chin-Chen Chang:
An Image Hiding Scheme Based on Du's Disk Allocation Method. IIH-MSP 2006: 617-620 - [c140]Chin-Chen Chang, Jun-Chou Chuang:
Progressive Image Transmission Using Significant Features and Linear Regression Prediction. IIH-MSP 2006: 681-684 - [c139]Ya-Fen Chang, Chin-Chen Chang, Wei-Liang Tai:
Comments on Distributed Sign-and-Encryption Schemes. IMECS 2006: 178-180 - [c138]Chin-Chen Chang, Chia-Chi Wu:
An Improvement of the Design of Integrating Subliminal Channel with Access Control. IMECS 2006: 276-279 - [c137]Hui-Feng Huang, Chin-Chen Chang:
An Untraceable Forward-Secure Blind Signature Scheme. IMECS 2006: 441-446 - [c136]Chin-Chen Chang, Wen-Bin Wu, Jieh-Shan Yeh:
A Cryptanalysis on a Generalized Threshold Cryptosystem. IMECS 2006: 452-455 - [c135]Chao-Wen Chan, Chin-Chen Chang:
A Scheme for (t, n)-Threshold Secret Image Sharing. IMECS 2006: 619-624 - [c134]Chin-Chen Chang, Keng-Chu Lin:
Yet Another Attack on Mutual Authentication and Key Exchange Protocols for Low Power Wireless Communications. IMECS 2006: 959-962 - [c133]Ya-Fen Chang, Chin-Chen Chang:
Comments on Abe et al.'s Threshold Signer-ambiguous Signature Scheme from Variety of Keys. JCIS 2006 - [c132]Tzu-Chuen Lu, Chin-Chen Chang:
A Bandwidth Efficiency of the Locally Adaptive Compression Method for Hiding Secret Messages. JCIS 2006 - [c131]Hsien-Chu Wu, Chin-Chen Chang, Ting-Wei Yu:
A DCT-based Recoverable Image Authentication. JCIS 2006 - [c130]Hsien-Chu Wu, Hui-Chuan Lin, Chin-Chen Chang:
Reversible Palette Image Steganography Based on De-clustering and Predictive Coding. JCIS 2006 - [c129]Chin-Chen Chang, Wen-Chuan Wu:
A novel data hiding scheme for keeping high stego-image quality. MMM 2006 - [c128]Chin-Chen Chang, Kuo-Lun Chen, Chu-Hsing Lin, Jen-Chieh Chang:
A Group-Oriented (t, n) Threshold Signature Scheme Against Replay Attacks. UIC 2006: 816-825 - [c127]Jen-Ho Yang, Chin-Chen Chang, Chih-Hung Wang:
A Practical Solution to the (t, n) Threshold Untraceable Signature with (k, l) Verification Scheme. UIC 2006: 998-1007 - [c126]Chin-Chen Chang, Chia-Chi Wu:
A Novel Key Agreement Scheme in a Multiple Server Environment. WISA 2006: 187-197 - 2005
- [j241]Chin-Chen Chang, Yeu-Pong Lai:
A fast modular square computing method based on the generalized Chinese remainder theorem for prime moduli. Appl. Math. Comput. 161(1): 181-194 (2005) - [j240]Ya-Fen Chang, Chin-Chen Chang, Hui-Feng Huang:
Digital signature with message recovery using self-certified public keys without trustworthy system authority. Appl. Math. Comput. 161(1): 211-227 (2005) - [j239]Chao-Wen Chan, Chin-Chen Chang:
A scheme for threshold multi-secret sharing. Appl. Math. Comput. 166(1): 1-14 (2005) - [j238]Ya-Fen Chang, Chin-Chen Chang:
Authentication schemes with no verification table. Appl. Math. Comput. 167(2): 820-832 (2005) - [j237]Min-Shiang Hwang, Kuo-Feng Hwang, Chin-Chen Chang:
A time-stamping protocol for digital watermarking. Appl. Math. Comput. 169(2): 1276-1284 (2005) - [j236]Jen-Ho Yang, Chin-Chen Chang, Chih-Hung Wang:
An iterative modular multiplication algorithm in RNS. Appl. Math. Comput. 171(1): 637-645 (2005) - [j235]Iuon-Chang Lin, Chin-Chen Chang:
A (t, n) Threshold Secret Sharing System with Efficient Identification of Cheaters. Comput. Artif. Intell. 24(5): 529-541 (2005) - [j234]Chin-Chen Chang, Chih-Yang Lin:
Perfect Hashing Schemes for Mining Association Rules. Comput. J. 48(2): 168-179 (2005) - [j233]Chin-Chen Chang, Jung-San Lee, Ya-Fen Chang:
Efficient authentication protocols of GSM. Comput. Commun. 28(8): 921-928 (2005) - [j232]Hsien-Chu Wu, Chin-Chen Chang:
A novel digital image watermarking scheme based on the vector quantization technique. Comput. Secur. 24(6): 460-471 (2005) - [j231]Hui-Feng Huang, Chin-Chen Chang:
Multisignatures with distinguished signing authorities for sequential and broadcasting architectures. Comput. Stand. Interfaces 27(2): 169-176 (2005) - [j230]Ya-Fen Chang, Chin-Chen Chang, Jen-Ho Yang:
An efficient password authenticated key exchange protocol for imbalanced wireless networks. Comput. Stand. Interfaces 27(3): 313-322 (2005) - [j229]Chin-Chen Chang, Iuon-Chang Lin, Kwok-Yan Lam:
An ID-based multisignature scheme without reblocking and predetermined signing order. Comput. Stand. Interfaces 27(4): 407-413 (2005) - [j228]Hsien-Chu Wu, Chin-Chen Chang:
Sharing visual multi-secrets using circle shares. Comput. Stand. Interfaces 28(1): 123-135 (2005) - [j227]Iuon-Chang Lin, Min-Shiang Hwang, Chin-Chen Chang:
The General Pay-Word: A Micro-payment Scheme Based on n-dimension One-way Hash Chain. Des. Codes Cryptogr. 36(1): 53-67 (2005) - [j226]Chi-Shiang Chan, Chin-Chen Chang:
An Image Hiding Scheme Based on Multi-bit-reference Substitution Table Using Dynamic Programming Strategy. Fundam. Informaticae 65(4): 291-305 (2005) - [j225]Tzu-Chuen Lu, Chin-Chen Chang:
Data Compressor for VQ Index Tables. Fundam. Informaticae 65(4): 353-371 (2005) - [j224]Chin-Chen Chang, Chi-Shiang Chan:
An Inverse Halftoning Technique Using Modified Look-Up Tables. Fundam. Informaticae 68(3): 207-220 (2005) - [j223]Chih-Yang Lin, Chin-Chen Chang, Chia-Chen Lin:
A New Density-Based Scheme for Clustering Based on Genetic Algorithm. Fundam. Informaticae 68(4): 315-331 (2005) - [j222]Chin-Chen Chang, Wen-Chuan Wu:
A Steganographic Method for Hiding Secret Data Using Side Match Vector Quantization. IEICE Trans. Inf. Syst. 88-D(9): 2159-2167 (2005) - [j221]Chin-Chen Chang, Iuon-Chang Lin, Hui-Min Tsai:
A dynamic mechanism for determining relationships in a partially ordered user hierarchy. Int. J. High Perform. Comput. Netw. 3(5/6): 378-384 (2005) - [j220]Chin-Chen Chang, Iuon-Chang Lin:
Cryptanalysis of the Modified Remote Login Authentication Scheme Based on a Geometric Approach. Informatica 16(1): 37-44 (2005) - [j219]Hsien-Wen Tseng, Chin-Chen Chang:
Hiding Data in Halftone Images. Informatica 16(3): 419-430 (2005) - [j218]Ya-Fen Chang, Chin-Chen Chang:
Schemes for Digital Gift Certificates with Low Computation Complexity. Informatica 16(4): 503-518 (2005) - [j217]Hsien-Wen Tseng, Chin-Chen Chang:
A Very Low Bit Rate Image Compressor Using Transformed Classified Vector Quantization. Informatica (Slovenia) 29(3): 335-342 (2005) - [j216]Yuan-Hui Yu, Chin-Chen Chang, Yu-Chen Hu
:
A genetic-based adaptive threshold selection method for dynamic path tree structured vector quantization. Image Vis. Comput. 23(6): 597-609 (2005) - [j215]Chin-Chen Chang, Yung-Chen Chou, Yuan-Hui Yu, Kai-Jung Shih:
An image zooming technique based on vector quantization approximation. Image Vis. Comput. 23(13): 1214-1225 (2005) - [j214]Yuan-Hui Yu, Chin-Chen Chang, Yu-Chen Hu
:
Hiding secret data in images via predictive coding. Pattern Recognit. 38(5): 691-705 (2005) - [j213]Chin-Chen Chang, Piyu Tsai, Chia-Chen Lin
:
SVD-based digital image watermarking scheme. Pattern Recognit. Lett. 26(10): 1577-1586 (2005) - [j212]Ya-Fen Chang, Chin-Chen Chang:
An efficient authentication protocol for mobile satellite communication systems. ACM SIGOPS Oper. Syst. Rev. 39(1): 70-84 (2005) - [c125]Chin-Chen Chang, Jung-San Lee, Chang-Chu Chen:
On the Forward and Backward Secrecy of HLL Group Key Exchange Mechanism. CIT 2005: 702-705 - [c124]Chi-Shiang Chan, Chin-Chen Chang:
A Lossless Medical Image Compression Scheme Using Modified S-Tree Structure. AINA 2005: 75-78 - [c123]Chin-Chen Chang, Chi-Lung Chiang, Ju Yuan Hsiao:
A DCT-Domain System for Hiding Fractal Compressed Images. AINA 2005: 83-86 - [c122]Yeu-Pong Lai, Chin-Chen Chang:
A Simple Forward Secure Blind Signature Scheme Based on Master Keys and Blind Signatures. AINA 2005: 139-144 - [c121]Chia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang:
An Improved Low Computation Cost User Authentication Scheme for Mobile Communication. AINA 2005: 249-252 - [c120]Chin-Chen Chang, Jui-Yi Kuo:
An Efficient Multi-Server Password Authenticated Key Agreement Scheme Using Smart Cards with Access Control. AINA 2005: 257-260 - [c119]Chi-Hsiung Huang, Chia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang, Kuo-Lun Chen:
Authenticated Encryption Schemes with Message Linkage for Threshold Signatures. AINA 2005: 261-264 - [c118]Hui-Feng Huang, Chin-Chen Chang:
A New Design for Efficient t-out-n Oblivious Transfer Scheme. AINA 2005: 499-502 - [c117]Chin-Chen Chang, Wei-Liang Tai
, Min-Hui Lin
:
A Reversible Data Hiding Scheme with Modified Side Match Vector Quantization. AINA 2005: 947-952 - [c116]Chin-Chen Chang, Tzu-Chuen Lu:
A Color-Based Image Retrieval Method Using Color Distribution and Common Bitmap. AIRS 2005: 56-71 - [c115]Chin-Chen Chang, Yeu-Pong Lai:
A Parallel Modular Exponentiation Scheme for Transformed Exponents. APPT 2005: 443-452 - [c114]Yu-Chiang Li, Jieh-Shan Yeh, Chin-Chen Chang:
A Fast Algorithm for Mining Share-Frequent Itemsets. APWeb 2005: 417-428 - [c113]Ming-Ni Wu, Chia-Chen Lin
, Chin-Chen Chang:
Image Copy Detection with Rotating Tolerance. CIS (1) 2005: 464-469 - [c112]Chin-Chen Chang, Jung-San Lee:
Improvement on an Optimized Protocol for Mobile Network Authentication and Security. CIS (2) 2005: 538-541 - [c111]Hui-Feng Huang, Chin-Chen Chang:
Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function. CIS (2) 2005: 554-559 - [c110]Chin-Chen Chang, Chia-Chen Lin
, Jun-Bin Yeh:
Adaptive Hiding Scheme Based on VQ-Indices Using Commutable Codewords. CIS (2) 2005: 567-572 - [c109]Chin-Chen Chang, Ya-Fen Chang, Wen-Chuan Wu:
An Extendable-Message-Passing Protocol with Signatures Based on Two Hard Problems and Its Applications. CW 2005: 93-100 - [c108]Chin-Chen Chang, Jui-Yi Kuo, Jung-San Lee:
Time-bounded Based Password Authentication Scheme. CW 2005: 117-122 - [c107]Hui-Feng Huang, Chin-Chen Chang:
An efficient deniable authentication protocol. CW 2005: 307-310 - [c106]Ya-Fen Chang, Chin-Chen Chang:
Password-authenticated 3PEKE with Round Efficiency without Server's Public Key. CW 2005: 340-344 - [c105]Yu-Chiang Li, Jieh-Shan Yeh, Chin-Chen Chang:
Direct Candidates Generation: A Novel Algorithm for Discovering Complete Share-Frequent Itemsets. FSKD (2) 2005: 551-560 - [c104]Hui-Feng Huang, Chin-Chen Chang:
A Novel Conference Key Distribution System with Re-keying Protocol. Human.Society@Internet 2005: 282-290 - [c103]Ya-Fen Chang, Chin-Chen Chang:
An Improvement on Strong-Password Authentication Protocols. ICESS 2005: 629-637 - [c102]Chin-Chen Chang, Jun-Chou Chuang, Pei-Yu Lin
:
Sharing a Secret Two-Tone Image in Two Gray-Level Images. ICPADS (2) 2005: 300-304 - [c101]Chin-Chen Chang, Po-Wen Lu:
An Image Refining Method Using Digital Watermark via Vector Quantization. ICPADS (2) 2005: 585-589 - [c100]Kuo-Feng Hwang, Chin-Chen Chang, Chao-Wen Chan:
A Search Scheme Resulting in Mixing Compressed Text Files. ICPADS (1) 2005: 762-768 - [c99]Yuchiang Li, Chinchen Chang, Jiehshan Yeh:
An Algorithm for Mining Association Rules with Weighted Minimum Supports. AIAI 2005: 291-300 - [c98]Chin-Chen Chang, Chun-Sen Tseng, Chia-Chen Lin
:
Hiding Data in Binary Images. ISPEC 2005: 338-349 - [c97]Chin-Chen Chang, Tzu-Chuen Lu, Jun-Bin Yeh:
A Bandwidth Efficiency of Lempel-Ziv Scheme for Data Authentication. KES (4) 2005: 249-256 - [c96]Chin-Chen Chang, Yung-Chen Chou, Jau-Ji Shen:
Improving Image Quality for JPEG Compression. KES (3) 2005: 442-448 - [c95]Chin-Chen Chang, Chih-Yang Lin, Yu-Zheng Wang:
VQ Image Steganographic Method with High Embedding Capacity Using Multi-way Search Approach. KES (3) 2005: 1058-1064 - [c94]Chin-Chen Chang, Wen-Chuan Wu:
A Reversible Information Hiding Scheme Based on Vector Quantization. KES (3) 2005: 1101-1107 - [c93]Chin-Chen Chang, Tzu-Chuen Lu:
Method for Searching Similar Images Using Quality Index Measurement. KES (2) 2005: 1224-1230 - [c92]Chin-Chen Chang, Yung-Chen Chou, Wen-Chuan Wu:
Image Retrieval Using Spatial Color and Edge Detection. PCM (1) 2005: 981-992 - [c91]Chin-Chen Chang, Yu-Chiang Li, Jung-San Lee:
An Efficient Algorithm for Incremental Mining of Association Rules. RIDE 2005: 3-10 - [c90]Chin-Chen Chang, Wei-Liang Tai, Chia-Chen Lin
:
Secret Hiding Using Side Match Vector Quantization. WSTST 2005: 172-181 - [c89]Chin-Chen Chang, Jau-Ji Shen, Yung-Chen Chou:
FA-Tree - A Dynamic Indexing Structure for Spatial Data. WSTST 2005: 1071-1080 - [r1]Yung-Kuan Chan, Chin-Chen Chang:
Content-Based Retrieval Concept. Encyclopedia of Information Science and Technology (I) 2005: 564-568 - 2004
- [j211]Hsien-Wen Tseng, Chin-Chen Chang:
A Branch-and-Bound Algorithm for the Construction of Reversible Variable Length Codes. Comput. J. 47(6): 701-707 (2004) - [j210]Min-Hui Lin
, Chin-Chen Chang, Yan-Ren Chen:
A fair and secure mobile agent environment based on blind signature and proxy host. Comput. Secur. 23(3): 199-212 (2004) - [j209]Hui-Feng Huang, Chin-Chen Chang:
A new cryptographic key assignment scheme with time-constraint access control in a hierarchy. Comput. Stand. Interfaces 26(3): 159-166 (2004) - [j208]Chin-Chen Chang, Ya-Fen Chang:
A novel three-party encrypted key exchange protocol. Comput. Stand. Interfaces 26(5): 471-476 (2004) - [j207]Chwei-Shyong Tsai, Chin-Chen Chang:
A New Repeating Color Watermarking Scheme Based on Human Visual Model. EURASIP J. Adv. Signal Process. 2004(13): 1965-1972 (2004) - [j206]Yuan-Hui Yu, Chin-Chen Chang:
Scenery Image Segmentation Using Support Vector Machines. Fundam. Informaticae 61(3-4): 379-388 (2004) - [j205]Chin-Chen Chang, Piyu Tsai, Min-Hui Lin:
An Adaptive Steganographic Scheme for Color Images. Fundam. Informaticae 62(3-4): 275-289 (2004) - [j204]Hsien-Chu Wu, Chin-Chen Chang:
Embedding Invisible Watermarks into Digital Images Based on Side-Match Vector Quantization. Fundam. Informaticae 63(1): 89-106 (2004) - [j203]Chin-Chen Chang, Ya-Fen Chang:
Signing a digital signature without using one-way hash functions and message redundancy schemes. IEEE Commun. Lett. 8(8): 485-487 (2004) - [j202]Jen-Ho Yang, Chin-Chen Chang, Chien-Yuan Chen:
A high-speed division algorithm in residue number system using parity. Int. J. Comput. Math. 81(6): 775-780 (2004) - [j201]Chin-Chen Chang, Yuan-Hui Yu:
An Efficient Approach For Face Detection And Facial Feature Location Using Prune-And-Search Technique. Int. J. Pattern Recognit. Artif. Intell. 18(6): 987-1005 (2004) - [j200]Chin-Chen Chang, Jun-Chou Chuang, Yih-Shin Hu:
Similar Image Retrieval Based on Wavelet Transformation. Int. J. Wavelets Multiresolution Inf. Process. 2(2): 111-120 (2004) - [j199]Hsien-Wen Tseng, Chin-Chen Chang:
High Capacity Data Hiding in JPEG-Compressed Images. Informatica 15(1): 127-142 (2004) - [j198]Chin-Chen Chang, Hsien-Wen Tseng:
VQ-Based Image Watermarking Using Anti-Gray Coding. Informatica 15(2): 147-160 (2004) - [j197]Chin-Chen Chang, Wen-Chuan Wu, Yu-Chen Hu:
Public-Key Inter-Block Dependence Fragile Watermarking for Image Authentication Using Continued Fraction. Informatica (Slovenia) 28(2): 147-152 (2004) - [j196]Chwei-Shyong Tsai, Chin-Chen Chang:
A Pattern Mapping Based Digital Image Watermarking. Informatica (Slovenia) 28(2): 181-188 (2004) - [j195]Chin-Chen Chang, Jun-Chou Chuang, Yih-Shin Hu:
Retrieving digital images from a JPEG compressed image database. Image Vis. Comput. 22(6): 471-484 (2004) - [j194]Chin-Chen Chang, Chih-Yang Lin, Pei-Yu Lin
:
An Efficient Graph-Based Method for Parallel Mining Problems. J. Inf. Knowl. Manag. 3(2): 143-154 (2004) - [j193]Chin-Chen Chang, Ren-Junn Hwang:
A new scheme to protect confidential images. J. Interconnect. Networks 5(3): 221-232 (2004) - [j192]Hui-Feng Huang, Chin-Chen Chang:
A new design of efficient partially blind signature scheme. J. Syst. Softw. 73(3): 397-403 (2004) - [j191]Chin-Chen Chang, Guei-Mei Chen, Min-Hui Lin
:
Information hiding based on search-order coding for VQ indices. Pattern Recognit. Lett. 25(11): 1253-1261 (2004) - [j190]Chin-Chen Chang, Hsien-Wen Tseng:
A steganographic method for digital images using side match. Pattern Recognit. Lett. 25(12): 1431-1437 (2004) - [j189]Chin-Chen Chang, Iuon-Chang Lin:
Novel full-search schemes for speeding up image coding using vector quantization. Real Time Imaging 10(2): 95-102 (2004) - [j188]Min-Hui Lin
, Chin-Chen Chang:
A secure one-time password authentication scheme with low-computation for mobile communications. ACM SIGOPS Oper. Syst. Rev. 38(2): 76-84 (2004) - [j187]Ya-Fen Chang, Chin-Chen Chang, Chia-Lin Kao:
An improvement on a deniable authentication protocol. ACM SIGOPS Oper. Syst. Rev. 38(3): 65-74 (2004) - [j186]Ya-Fen Chang, Chin-Chen Chang:
A secure and efficient strong-password authentication protocol. ACM SIGOPS Oper. Syst. Rev. 38(3): 79-90 (2004) - [j185]Chin-Chen Chang, Iuon-Chang Lin:
An improvement of delegated multisignature scheme with document decomposition. ACM SIGOPS Oper. Syst. Rev. 38(4): 52-57 (2004) - [j184]Chin-Chen Chang, Yeu-Pong Lai:
A convertible group signature scheme. ACM SIGOPS Oper. Syst. Rev. 38(4): 58-65 (2004) - [j183]Ya-Fen Chang, Chin-Chen Chang, Jui-Yi Kuo:
A secure one-time password authentication scheme using smart cards without limiting login times. ACM SIGOPS Oper. Syst. Rev. 38(4): 80-90 (2004) - [j182]Chin-Chen Chang, Iuon-Chang Lin:
Remarks on fingerprint-based remote user authentication scheme using smart cards. ACM SIGOPS Oper. Syst. Rev. 38(4): 91-96 (2004) - [j181]Piyu Tsai, Yu-Chen Hu
, Chin-Chen Chang:
A color image watermarking scheme based on color quantization. Signal Process. 84(1): 95-106 (2004) - [j180]Piyu Tsai, Yu-Chen Hu
, Chin-Chen Chang:
A progressive secret reveal system based on SPIHT image transmission. Signal Process. Image Commun. 19(3): 285-297 (2004) - [j179]Chin-Chen Chang, Kuo-Lun Chen, Min-Shiang Hwang:
End-to-End Security Protocol for Mobile Communications with End-User Identification/Authentication. Wirel. Pers. Commun. 28(2): 95-106 (2004) - [c88]Hsien-Wen Tseng, Chin-Chen Chang:
Steganography Using JPEG-Compressed Images. CIT 2004: 12-17 - [c87]Min-Hui Lin, Chin-Chen Chang:
A Novel Information Hiding Scheme Based on BTC. CIT 2004: 66-71 - [c86]Chin-Chen Chang, Chu-Hsing Lin, Wei Lee, Pai-Cheng Hwang:
Secret Sharing with Access Structures in a Hierarchy. AINA (2) 2004: 31-34 - [c85]Chin-Chen Chang, Iuon-Chang Lin, Hui-Min Tsai:
A Dynamic Mechanism for Determining Relationships in a Partially Ordered User Hierarchy. AINA (1) 2004: 133-138 - [c84]Chin-Chen Chang, Ren-Junn Hwang:
A New Scheme to Protect Confidential Images. AINA (1) 2004: 158-164 - [c83]Chin-Chen Chang, Ya-Fen Chang:
Yet Another Attack on a QR-based Password Authentication System. AINA (2) 2004: 170-173 - [c82]Yung-Kuan Chan, Chin-Chen Chang:
Spatial Video Retrieval Based on the Piecewise Method. AINA (1) 2004: 171-176 - [c81]Ren-Junn Hwang, Chin-Chen Chang:
Enhancing the Efficiency of (v, r, n)-Fairness Secret Sharing Scheme. AINA (1) 2004: 208-212 - [c80]Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang:
Supervising Secret-Key Agreements in a Level-Based Hierarchy. AINA (1) 2004: 309-314 - [c79]Ching-Te Wang, Chin-Chen Chang, Chu-Hsing Lin:
Using IC Cards to Remotely Login Passwords without Verification Tables. AINA (1) 2004: 321-326 - [c78]Chin-Chen Chang, Iuon-Chang Lin, Hui-Min Tsai, Hsiao-Hsi Wang:
A Key Assignment Scheme for Controlling Access in Partially Ordered User Hierarchies. AINA (2) 2004: 376-379 - [c77]Chin-Chen Chang, Tzu-Chuen Lu, Yi-Long Liu:
Bandwidth Efficiency of an Image Compression Method for Information Hiding. AINA (1) 2004: 426-432 - [c76]Ming-Ni Wu, Min-Hui Lin
, Chin-Chen Chang:
A LSB Substitution Oriented Image Hiding Strategy Using Genetic Algorithms. AWCC 2004: 219-229 - [c75]Chih-Yang Lin, Chin-Chen Chang:
A Prediction Scheme for Image Vector Quantization Based on Mining Association Rules. AWCC 2004: 230-240 - [c74]Yu-Chiang Li, Chin-Chen Chang:
A New FP-Tree Algorithm for Mining Frequent Itemsets. AWCC 2004: 266-277 - [c73]Chin-Chen Chang, Pei-Yu Lin:
A Compression-Based Data Hiding Scheme Using Vector Quantization and Principle Component Analysis. CW 2004: 369-375 - [c72]Chin-Chen Chang, Jung-San Lee:
An Efficient and Secure Multi-Server Password Authentication Scheme using Smart Cards. CW 2004: 417-422 - [c71]Chin-Chen Chang, Chien-Fa Li, Iuon-Chang Lin:
A Novel Quadtree-Structured Scheme for Transmitting Chinese Calligraphy Progressively. Eurographics Multimedia Workshop 2004: 95-103 - [c70]Chin-Chen Chang, Yi-Long Liu:
Progressive Image Transmission Using Singular Value Decomposition. Eurographics Multimedia Workshop 2004: 115-123 - [c69]Chin-Chen Chang, Tzu-Chuen Lu:
A Chinese Remainder Theorem Oriented Information Hiding Scheme. Eurographics Multimedia Workshop 2004: 181-190 - [c68]Chin-Chen Chang, Ya-Fen Chang:
The Security Flaw of an Untraceable Signature Scheme. ICEB 2004: 1379-1381 - [c67]Chin-Chen Chang, Kuo-Lun Chen:
A Signature Scheme with (t, n) Shared Verification and Message Recovery. iiWAS 2004 - [c66]Jun-Chou Chuang, Chin-Chen Chang:
Detection and Restoration of a Tampered Medical Image. MIAR 2004: 78-85 - [c65]Chin-Chen Chang, Piyu Tsai, Min-Hui Lin
:
An Adaptive Steganography for Index-Based Images Using Codeword Grouping. PCM (3) 2004: 731-738 - 2003
- [j178]Yeu-Pong Lai, Chin-Chen Chang:
Parallel computational algorithms for generalized Chinese remainder theorem. Comput. Electr. Eng. 29(8): 801-811 (2003) - [j177]Hsien-Wen Tseng, Chin-Chen Chang:
Construction of Symmetrical Reversible Variable Length Codes Using Backtracking. Comput. J. 46(1): 100-105 (2003) - [j176]Chin-Chen Chang, Yeu-Pong Lai:
A flexible date-attachment scheme on e-cash. Comput. Secur. 22(2): 160-166 (2003) - [j175]Chin-Chen Chang, Ya-Fen Chang:
Efficient anonymous auction protocols with freewheeling bids. Comput. Secur. 22(8): 728-734 (2003) - [j174]Iuon-Chang Lin, Min-Shiang Hwang, Chin-Chen Chang:
Security enhancement for anonymous secure e-voting over a network. Comput. Stand. Interfaces 25(2): 131-139 (2003) - [j173]Chin-Chen Chang, Iuon-Chang Lin:
The strategy of reducing the location update traffic using forwarding pointers in virtual layer architecture. Comput. Stand. Interfaces 25(5): 501-513 (2003) - [j172]Iuon-Chang Lin, Min-Shiang Hwang, Chin-Chen Chang:
A new key assignment scheme for enforcing complicated access control policies in hierarchy. Future Gener. Comput. Syst. 19(4): 457-462 (2003) - [j171]Hui-Feng Huang, Chin-Chen Chang:
An Efficient and Practical (t, n) Threshold Proxy Signature Scheme with Known Signers. Fundam. Informaticae 56(3): 243-253 (2003) - [j170]Chao-Wen Chan, Chin-Chen Chang:
A New Channel for Image Hiding Based on Interpolating polynomials. Fundam. Informaticae 58(2): 93-104 (2003) - [j169]Chwei-Shyong Tsai, Chin-Chen Chang:
An Improvement to Image Segment Based on Human Visual System for Object-based Coding. Fundam. Informaticae 58(2): 167-178 (2003) - [j168]Chwei-Shyong Tsai, Chin-Chen Chang:
A DWT-based Deblocking Technique Based on Edge Detection and Zero Masking for Reducing Blocking Effect. Fundam. Informaticae 58(2): 179-188 (2003) - [j167]Hsien-Chu Wu, Chin-Chen Chang:
Hiding Digital Watermarks Using Fractal Compression Technique. Fundam. Informaticae 58(2): 189-202 (2003) - [j166]Yu-Chen Hu
, Chin-Chen Chang:
Edge Detection Using Block Truncation Coding. Int. J. Pattern Recognit. Artif. Intell. 17(6): 951-966 (2003) - [j165]Chin-Chen Chang, Kuo-Feng Hwang:
Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards. Informatica 14(3): 289-294 (2003) - [j164]Chin-Chen Chang, Chi-Shiang Chan:
A Watermarking Scheme Based on Principal Component Analysis Technique. Informatica 14(4): 431-444 (2003) - [j163]Chin-Chen Chang, Chi-Yien Chung:
An efficient protocol for anonymous multicast and reception. Inf. Process. Lett. 85(2): 99-103 (2003) - [j162]Chin-Chen Chang, Ju Yuan Hsiao, Chi-Shiang Chan:
Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recognit. 36(7): 1583-1595 (2003) - [j161]Hsien-Wen Tseng, Chin-Chen Chang:
A Fast and Simple Algorithm for the Construction of Asymmetrical Reversible Variable Length Codes. Real Time Imaging 9(1): 3-10 (2003) - [j160]Kuo-Lung Hung, Chin-Chen Chang:
Error prevention and resilience of VQ encoded images. Signal Process. 83(2): 431-437 (2003) - [j159]Piyu Tsai, Yu-Chen Hu
, Chin-Chen Chang:
Using set partitioning in hierarchical trees to authenticate digital images. Signal Process. Image Commun. 18(9): 813-822 (2003) - [j158]Kuo-Feng Hwang, Chin-Chen Chang:
A self-encryption mechanism for authentication of roaming and teleconference services. IEEE Trans. Wirel. Commun. 2(2): 400-407 (2003) - [j157]Chin-Chen Chang, Timothy K. Shih, Iuon-Chang Lin:
Guessing by neighbors: an efficient reconstruction method for transmitting image progressively. Vis. Comput. 19(5): 342-353 (2003) - [c64]Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang:
Signature Schemes Based on Two Hard Problems Simultaneously. AINA 2003: 557-560 - [c63]Chao-Wen Chan, Chin-Chen Chang:
Huffman Tree Decomposition and Its Coding Applications. AINA 2003: 683-688 - [c62]Chin-Chen Chang, Ying-Tse Kuo, Chu-Hsing Lin:
Fast Algorithms for Common-Multiplicand Multiplication and Exponentiation by Performing Complements. AINA 2003: 807-811 - [c61]Chin-Chen Chang, Chi-Shiang Chan, Ju Yuan Hsiao:
Lossless Image Compression Based on Two-Way Smaller Difference. AINA 2003: 821-824 - [c60]Kuo-Lung Hung, Chin-Chen Chang:
A Robust and Recoverable Tamper Proofing Technique for Image Authentication. Human.Society@Internet 2003 2003: 44-53 - [c59]Hui-Feng Huang, Chin-Chen Chang:
An Efficient Convertible Authenticated Encryption Scheme and Its Variant. ICICS 2003: 382-392 - [c58]Ren-Junn Hwang, Chin-Chen Chang:
A Method for Sending Confidential Messages to a Group without Trusted Parties. ISPA 2003: 375-381 - [c57]Kuo-Lung Hung, Chin-Chen Chang, Tung-Shou Chen:
An Efficient Block-based Scheme for Progressively Transmitting Lossless Images. MMM 2003: 313-328 - [c56]Chin-Chen Chang, Jun-Chou Chuang, Yih-Shin Hu:
Similar Image Retrieval Based on Wavelet Transformation. WAA 2003: 294- - 2002
- [j156]Ching-Te Wang, Chin-Chen Chang, Chu-Hsing Lin:
A New Micro-Payment System Using General Payword Chain. Electron. Commer. Res. 2(1-2): 159-168 (2002) - [j155]Kuo-Lung Hung, Chin-Chen Chang:
Error Prevention and Concealment for Chinese Calligraphy Based on Block Truncation Coding. Int. J. Comput. Process. Orient. Lang. 15(1): 101-113 (2002) - [j154]Yung-Kuan Chan
, Chin-Chen Chang:
A Color Image Retrieval Method Based on Color Moment and Color Variance of Adjacent Pixels. Int. J. Pattern Recognit. Artif. Intell. 16(1): 113-125 (2002) - [j153]Chin-Chen Chang, Min-Hui Lin
, Yu-Chen Hu:
A Fast and Secure Image Hiding Scheme Based on LSB Substitution. Int. J. Pattern Recognit. Artif. Intell. 16(4): 399-416 (2002) - [j152]Min-Hui Lin
, Yu-Chen Hu, Chin-Chen Chang:
Both Color and Gray Scale Secret Images Hiding in a Color Image. Int. J. Pattern Recognit. Artif. Intell. 16(6): 697-714 (2002) - [j151]Chin-Chen Chang, Kuo-Feng Hwang, Min-Shiang Hwang:
A Feature-Oriented Copyright Owner Proving Technique for Still Images. Int. J. Softw. Eng. Knowl. Eng. 12(3): 317-330 (2002) - [j150]Kuo-Lung Hung, Chin-Chen Chang:
An improvement of a technique for color quantization using reduction of color space dimensionality. Informatica (Slovenia) 26(1) (2002) - [j149]Chin-Chen Chang, Jun-Chou Chuang, Tung-Shou Chen:
Recognition of Image Authenticity Using Significant DCT Coefficients Quantization. Informatica (Slovenia) 26(4) (2002) - [j148]Chin-Chen Chang, Tung-Shou Chen, Lou-Zo Chung:
A steganographic method based upon JPEG and quantization table modification. Inf. Sci. 141(1-2): 123-138 (2002) - [j147]Hsien-Chu Wu, Chin-Chen Chang:
Detection and restoration of tampered JPEG compressed images. J. Syst. Softw. 64(2): 151-161 (2002) - [j146]Chwei-Shyong Tsai, Chin-Chen Chang, Tung-Shou Chen:
Sharing multiple secrets in digital images. J. Syst. Softw. 64(2): 163-170 (2002) - [j145]Chin-Chen Chang, Jun-Chou Chuang:
An image intellectual property protection scheme for gray-level images using visual secret sharing strategy. Pattern Recognit. Lett. 23(8): 931-94 (2002) - [j144]Kuo-Feng Hwang, Chin-Chen Chang:
A fast pixel mapping algorithm using principal component analysis. Pattern Recognit. Lett. 23(14): 1747-1753 (2002) - [j143]Chin-Chen Chang, Tai-Xing Yu:
Cryptanalysis of an encryption scheme for binary images. Pattern Recognit. Lett. 23(14): 1847-1852 (2002) - [j142]Piyu Tsai, Chin-Chen Chang, Yu-Chen Hu:
An Adaptive Two-Stage Edge Detection Scheme for Digital Color Images. Real Time Imaging 8(4): 329-343 (2002) - [j141]Min-Shiang Hwang, Chin-Chen Chang, Kuo-Feng Hwang:
An ElGamal-Like Cryptosystem for Enciphering Large Messages. IEEE Trans. Knowl. Data Eng. 14(2): 445-446 (2002) - [c55]Chin-Chen Chang, Po-Wen Lu, Ju Yuan Hsiao:
A Hybrid Method for Estimating the Euclidean Distance between Two Vectors. CW 2002: 183-190 - [c54]Chin-Chen Chang, Ju Yuan Hsiao, Chi-Lung Chiang:
An Image Copyright Protection Scheme Based on Torus Automorphism. CW 2002: 217-224 - [c53]Chin-Chen Chang, Tai-Xing Yu:
Sharing a Secret Gray Image in Multiple Images. CW 2002: 230-240 - [c52]Chao-Wen Chan, Chin-Chen Chang:
Key Exchange Protocols for Multiparty Communication Services. CW 2002: 241-248 - [c51]Hui-Feng Huang, Chin-Chen Chang:
Cryptanalysis of the WD Public-Key Cryptosystem. CW 2002: 249-254 - [c50]Yung-Kuan Chan, Chin-Chen Chang, Jau-Ji Shen:
A Compact Patricia Trie for a Large Set of Keys. ISDB 2002: 31-36 - [c49]Chin-Chen Chang, Chi-Shiang Chan, Ya-Ping Pan:
An Inverse Halftoning Technique using Genetic Algorithm. ISDB 2002: 184-189 - [c48]Tzu-Chuen Lu, Chin-Chen Chang, S. Wesley Changchien:
An Association Rule Mining Method for Spatial Database. ISDB 2002: 281-286 - [c47]Chin-Chen Chang, Iuon-Chang Lin, Timothy K. Shih:
An Efficient Edge Detection Technique for Chinese Calligraphy. JCIS 2002: 960-963 - [c46]Chin-Chen Chang, Ming-Ni Wu:
An Algorithm for Color Image Compression Base on Common Bit Map Block Truncation Coding. JCIS 2002: 964-967 - [c45]Chin-Chen Chang, Yuan-Yuan Su:
A Dynamic Color Palette for Color Images Coding. IEEE Pacific Rim Conference on Multimedia 2002: 369-376 - [c44]Chin-Chen Chang, Chih-Ping Hsieh, Ju Yuan Hsiao:
A Fast and Efficient Noise Reduction Method Suitable for Low Noise Density. IEEE Pacific Rim Conference on Multimedia 2002: 386-392 - [c43]Chin-Chen Chang, Ju Yuan Hsiao, Chi-Lung Chiang:
A Cross-Type Peak-and-Valley Filter for Error Prevention and Resilience in Image Communications. IEEE Pacific Rim Conference on Multimedia 2002: 393-400 - 2001
- [j140]Tzong-Chen Wu, Chin-Chen Chang:
Cryptographic key assignment scheme for hierarchical access control. Comput. Syst. Sci. Eng. 16(1): 25-28 (2001) - [j139]Kuo-Lung Hung, Chin-Chen Chang:
A Novel Progressive Image Transmission Technique for Chinese Calligraphy. Int. J. Comput. Process. Orient. Lang. 14(4): 293-307 (2001) - [j138]Chin-Chen Chang, Guu-In Chen:
Bi-level Lossless Calligraphy Compression Using Location Propagation and Width Inheritance. Int. J. Comput. Process. Orient. Lang. 14(4): 309-339 (2001) - [j137]Tung-Shou Chen, Chin-Chen Chang:
New method of secret image sharing based upon vector quantization. J. Electronic Imaging 10(4): 988-997 (2001) - [j136]Chin-Chen Chang, Lin-Li Chen, Tung-Shou Chen:
A New Two-Path Search Algorithm for Block Motion Estimation of Video Data. J. Inf. Sci. Eng. 17(3): 405-415 (2001) - [j135]Chin-Chen Chang, Min-Shiang Hwang, Tung-Shou Chen:
A new encryption algorithm for image cryptosystems. J. Syst. Softw. 58(2): 83-91 (2001) - [j134]Yung-Kuan Chan
, Chin-Chen Chang:
Spatial Similarity Retrieval in Video Databases. J. Vis. Commun. Image Represent. 12(2): 107-122 (2001) - [j133]Yung-Kuan Chan
, Chin-Chen Chang:
Image matching using run-length feature. Pattern Recognit. Lett. 22(5): 447-455 (2001) - [c42]Yung-Kuan Chan, Chin-Chen Chang:
Concealing a Secret Image Using the Breadth First Traversal Linear Quadtree Structure. CODAS 2001: 213- - [c41]Chin-Chen Chang, Hsien-Chu Hsia, Tung-Shou Chen:
A Progressive Image Transmission Scheme Based on Block Truncation Coding. Human.Society@Internet 2001: 383-397 - [c40]Chin-Chen Chang, Iuon-Chang Lin:
Cryptanalysis of the Improved User Efficient Blind Signatures. ICICS 2001: 42-46 - [c39]Chin-Chen Chang, Kuo-Feng Hwang:
Towards the Forgery of a Group Signature without Knowing the Group Center's Secret. ICICS 2001: 47-51 - [c38]Yung-Kuan Chan
, Chin-Chen Chang:
Image Retrieval Based on Tolerable Difference of Direction. ICOIN 2001: 387-392 - [c37]Chin-Chen Chang, Jyh-Chiang Yeh, Ju Yuan Hsiao:
A Novel Scheme for Securing Image Steganography. IEEE Pacific Rim Conference on Multimedia 2001: 804-811 - [c36]Chin-Chen Chang, Chi-Shiang Chan, Ju Yuan Hsiao:
A Color Image Retrieval Method Based on Local Histogram. IEEE Pacific Rim Conference on Multimedia 2001: 831-836 - [c35]Chwei-Shyong Tsai, Chin-Chen Chang:
A Generalized Secret Image Sharing and Recovery Scheme. IEEE Pacific Rim Conference on Multimedia 2001: 963-968 - 2000
- [j132]Min-Shiang Hwang, Chin-Chen Chang, Kuo-Feng Hwang:
A threshold decryption scheme without session keys. Comput. Electr. Eng. 27(1): 29-35 (2000) - [j131]Ji-Han Jiang, Chin-Chen Chang, Tung-Shou Chen:
A Compact Sparse Matrix Representation Using Random Hash Functions. Data Knowl. Eng. 32(1): 29-49 (2000) - [j130]Chin-Chen Chang, Pei-Fang Chung:
A Technique of Watermarking for Digital Images Using (t, n)-Threshold Scheme. Informatica (Slovenia) 24(1) (2000) - [j129]Chin-Chen Chang, Chwei-Shyong Tsai:
A Technique for Computing Watermarks from Digital Images. Informatica (Slovenia) 24(3) (2000) - [j128]Chin-Chen Chang, Kuo-Feng Hwang, Min-Shiang Hwang:
A Digital Watermarking Scheme Using Human Visual Effects. Informatica (Slovenia) 24(4) (2000) - [j127]Min-Shiang Hwang, Chin-Chen Chang, Kuo-Feng Hwang:
Digital watermarking of images using neural networks. J. Electronic Imaging 9(4): 548-555 (2000) - [j126]Chin-Feng Lee, Chin-Chen Chang:
Breadth-first search oriented symbolic picture representation for spatial match retrieval. J. Syst. Softw. 52(1): 11-23 (2000) - [j125]Yu-Chen Hu, Chin-Chen Chang:
A new lossless compression scheme based on Huffman coding scheme for image compression. Signal Process. Image Commun. 16(4): 367-372 (2000) - [j124]Chin-Chen Chang, Jer-Sheng Chou, Tung-Shou Chen:
An efficient computation of Euclidean distances using approximated look-up table. IEEE Trans. Circuits Syst. Video Technol. 10(4): 594-599 (2000) - [c34]Iuon-Chang Lin, Chin-Chen Chang, Min-Shiang Hwang:
Security Enhancement for the "Simple Authentication Key Agreement Algorithm". COMPSAC 2000: 113-115 - [c33]Chin-Chen Chang, Kuo-Feng Hwang, Yi Lin:
A Proof of Copyright Ownership Using Moment-Preserving. COMPSAC 2000: 198-203 - [c32]Chin-Chen Chang, Chao-Wen Chan:
Detecting Dealer Cheating in Secret Sharing Systems. COMPSAC 2000: 449-453 - [c31]Chin-Chen Chang, Chwei-Shyong Tsai, Tung-Shou Chen:
A New Scheme for Sharing Secret Color Images in Computer Network. ICPADS 2000: 21-27 - [c30]Chin-Chen Chang, Hsien-Chu Wu:
Computing watermarks from images using quadtrees. ICPADS Workshops 2000: 123-128 - [c29]Chin-Chen Chang, Tung-Shou Chen, Yi Lin:
An efficient accessing technique of Chinese characters using Boshiamy Chinese input system. IRAL 2000: 61-67 - [c28]Chin-Chen Chang:
A Perspective on the Development of Digital Libraries in Taiwan. Kyoto International Conference on Digital Libraries 2000: 44-46 - [c27]Chin-Chen Chang, Jyh-Chiang Yeh, Ju Yuan Hsiao:
A Method for Protecting Digital Images from Being Copied Illegally. Kyoto International Conference on Digital Libraries 2000: 348-355 - [c26]Chin-Chen Chang, Tung-Shou Chen:
An Improved Prediction Method for Quadtree Image Coding. ISMSE 2000: 269-275
1990 – 1999
- 1999
- [j123]Chin-Chen Chang, Pai-Cheng Huang, Wei-Bin Lee:
Conference key distribution schemes for portable communication systems. Comput. Commun. 22(12): 1160-1164 (1999) - [j122]Chien-Yuan Chen, Chin-Chen Chang:
A fast modular multiplication algorithm for calculating the product AB modulo N. Inf. Process. Lett. 72(3-4): 77-81 (1999) - [j121]Wei-Bin Lee, Chin-Chen Chang:
(t, n) Threshold Digital Signature With Traceability Property. J. Inf. Sci. Eng. 15(5): 669-678 (1999) - [j120]Ren-Junn Hwang, Chin-Chen Chang:
An Improved Threshold Scheme Based on Modular ARithmetic. J. Inf. Sci. Eng. 15(5): 691-699 (1999) - [j119]Ren-Junn Hwang, Wei-Bin Lee, Chin-Chen Chang:
A concept of designing cheater identification methods for secret sharing. J. Syst. Softw. 46(1): 7-11 (1999) - [j118]Chin-Chen Chang, Tian-Fu Lee, Jyh-Jong Leu:
Partition search filter and its performance analysis. J. Syst. Softw. 47(1): 35-43 (1999) - [j117]Yu-Chen Hu, Chin-Chen Chang:
Low complexity index-compressed vector quantization for image compression. IEEE Trans. Consumer Electron. 45(1): 219-224 (1999) - [j116]Min-Shiang Hwang, Chin-Chen Chang, Kuo-Feng Hwang:
A watermarking technique based on one-way hash functions. IEEE Trans. Consumer Electron. 45(2): 286-294 (1999) - [j115]Yu-Chen Hu, Chin-Chen Chang:
Variable rate vector quantization scheme based on quadtree segmentation. IEEE Trans. Consumer Electron. 45(2): 310-317 (1999) - [j114]Kuo-Lung Hung, Chin-Chen Chang, Tung-Shou Chen:
Reconstruction of lost blocks using codeword estimation. IEEE Trans. Consumer Electron. 45(4): 1190-1199 (1999) - [c25]Chin-Chen Chang, Fun-Chou Shiue, Tung-Shou Chen:
Tree Structured Vector Quantization with Dynamic Path Search. ICPP Workshops 1999: 536-541 - 1998
- [j113]Wei-Bin Lee, Chin-Chen Chang:
Authenticity of public keys in asymmetric cryptosystems. Comput. Commun. 21(2): 195-198 (1998) - [j112]Wei-Bin Lee, Chin-Chen Chang:
Using RSA with low exponent in a public network. Comput. Commun. 21(3): 284-286 (1998) - [j111]Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang:
Threshold signature schemes with traceable signers in group communications. Comput. Commun. 21(8): 771-776 (1998) - [j110]Ren-Junn Hwang, Chin-Chen Chang:
An on-line secret sharing scheme for multi-secrets. Comput. Commun. 21(13): 1170-1176 (1998) - [j109]Chin-Chen Chang, Chin-Feng Lee:
A Bin-Tree Oriented Iconic Indexing Scheme for Retrieving Symbolic Pictures. Data Knowl. Eng. 26(2): 121-133 (1998) - [j108]Chin-Chen Chang, Ren-Junn Hwang:
Sharing Secret Omages using Shadow Codebooks. Inf. Sci. 111(1-4): 335-345 (1998) - [j107]Chin-Chen Chang, Wen-Tsai Li, Tung-Shou Chen:
Two improved codebook search methods of vector quantization based on orthogonal checking and fixed range search. J. Electronic Imaging 7(2): 357-366 (1998) - [j106]Der-Chyuan Lou
, Chin-Chen Chang:
An adaptive exponentiation method. J. Syst. Softw. 42(1): 59-69 (1998) - [j105]Chin-Chen Chang, Chin-Feng Lee:
A spatial match retrieval mechanism for symbolic pictures. J. Syst. Softw. 44(1): 73-83 (1998) - [j104]Chin-Chen Chang, Jer-Sheng Chou, Tung-Shou Chen:
A predictive image coding scheme using a smaller codebook. Signal Process. Image Commun. 12(1): 23-32 (1998) - [j103]Tung-Shou Chen, Chin-Chen Chang, Min-Shiang Hwang:
A virtual image cryptosystem based upon vector quantization. IEEE Trans. Image Process. 7(10): 1485-1488 (1998) - [c24]Yung-Kuan Chan, Chin-Chen Chang:
An Efficient Data Structure for Storing Similar Binary Images. FODO 1998: 268-275 - [c23]Chin-Chen Chang, Jyh-Jong Leu, Pai-Cheng Huang, Wei-Bin Lee:
A Scheme for Obtaining a Message from the Digital Multisignature. Public Key Cryptography 1998: 154-163 - 1997
- [j102]Wei-Bin Lee, Chin-Chen Chang:
Three ID-based information security functions. Comput. Commun. 20(14): 1301-1307 (1997) - [j101]Chin-Chen Chang, Jinn-Ke Jan, Huey-Cheue Kowng:
A Digital Signature Scheme Based upon the Theory of Quadratic residues. Cryptologia 21(1): 55-70 (1997) - [j100]Chiuyuan Chen, Chin-Chen Chang, Gerard J. Chang:
Proper interval graphs and the guard problem. Discret. Math. 170(1-3): 223-230 (1997) - [j99]Chin-Chen Chang, Der-Chyuan Lou
:
Parallel computation of the multi-exponentiation for cryptosystems. Int. J. Comput. Math. 63(1-2): 9-26 (1997) - [j98]Der-Chyuan Lou
, Chin-Chen Chang:
A Cost Optimal Search Technique for the Knapsack Problem. Int. J. High Speed Comput. 9(1): 1-12 (1997) - [j97]Chin-Chen Chang, Chin-Feng Lee:
Spatial match retrieval based on direction signatures using multiple key hashing scheme. Int. J. Intell. Syst. 12(10): 777-788 (1997) - [j96]Chin-Chen Chang, Shin-Jia Hwang:
A Simple Approach for Generating RSA Keys. Inf. Process. Lett. 63(1): 19-21 (1997) - [j95]Wei-Bin Lee, Chin-Chen Chang:
Authenticated Encryption Schemes with Linkage Between Message Blocks. Inf. Process. Lett. 63(5): 247-250 (1997) - [j94]Chin-Chen Chang, Der-Chyuan Lou
, Tzong-Chen Wu:
A Binary Access Control Method Using Prime Factorization. Inf. Sci. 96(1&2): 15-26 (1997) - [j93]C. Y. Chen, H. F. Lin, Chin-Chen Chang, Richard C. T. Lee:
Multidisk Smaller Sized MKH file Allocation for Partial Match Retrieval. J. Inf. Sci. Eng. 13(1): 125-141 (1997) - [j92]Chin-Chen Chang, Dai-Chuan Lin, Tung-Shou Chen:
An Improved VQ Codebook Search Algorithm Using Principal Component Analysis. J. Vis. Commun. Image Represent. 8(1): 27-37 (1997) - [j91]Chin-Chen Chang, Wen-Bin Wu:
A secure voting system on a public network. Networks 29(2): 81-87 (1997) - [j90]Der-Chyuan Lou
, Chin-Chen Chang:
A Parallel Two-List Algorithm for the Knapsack Problem. Parallel Comput. 22(14): 1985-1996 (1997) - [j89]Tung-Shou Chen, Chin-Chen Chang:
Diagonal axes method (DAM): a fast search algorithm for vector quantization. IEEE Trans. Circuits Syst. Video Technol. 7(3): 555-559 (1997) - [j88]Tung-Shou Chen, Chin-Chen Chang:
A new image coding algorithm using variable-rate side-match finite-state vector quantization. IEEE Trans. Image Process. 6(8): 1185-1187 (1997) - [j87]C. Y. Chen, H. F. Lin, Chin-Chen Chang, Richard C. T. Lee:
Optimal Bucket Allocation Design of k-ary MKH Files for Partial Match Retrieval. IEEE Trans. Knowl. Data Eng. 9(1): 148-160 (1997) - 1996
- [j86]Chin-Chen Chang, Jyh-Jong Leu:
Two 2D search filters and their performance analyses. Int. J. Comput. Math. 60(3-4): 183-203 (1996) - [j85]Chin-Chen Chang, Ji-Han Jiang:
A Spatial Filter for Similarity Retrieval. Int. J. Pattern Recognit. Artif. Intell. 10(6): 711-730 (1996) - [j84]Wei-Bin Lee, Chin-Chen Chang:
Integrating Authentication in Public Key Distribution System. Inf. Process. Lett. 57(1): 49-52 (1996) - [j83]Shin-Jia Hwang, Chin-Chen Chang, Wei-Pang Yang:
Autenticated Encryption Schemes with Message Linkage. Inf. Process. Lett. 58(4): 189-195 (1996) - [j82]Annie Y. H. Chou, Wei-Pang Yang, Chin-Chen Chang:
Some Properties of Optimal Cartesian Product Files for Orthogonal Range Queries. Inf. Sci. 90(1-4): 91-107 (1996) - [j81]Chien-Yuan Chen, Chin-Chen Chang, Wei-Pang Yang:
Cryptanalysis of the Secret Exponent of the RSA Scheme. J. Inf. Sci. Eng. 12(2): 277-290 (1996) - [j80]Wei-Bin Lee, Chin-Chen Chang:
On Key Changeable ID-Based Digital Signature Scheme. J. Inf. Sci. Eng. 12(3): 381-386 (1996) - [j79]Chin-Chen Chang, Ruey-Feng Chang, Wen-Tsai Lee, Ching-Lin Kuo:
A Fast Search Algorithm for Vector Quantization. J. Inf. Sci. Eng. 12(4): 593-602 (1996) - [j78]Chin-Chen Chang, Daniel J. Buehrer:
An Improvement to Ziegler's Sparse Matrix Compression Algorithm. J. Syst. Softw. 35(1): 67-71 (1996) - [j77]C. Y. Chen, H. F. Lin, Richard C. T. Lee, Chin-Chen Chang:
Redundant MKH Files Design among Multiple Disks for Concurrent Partial Match Retrieval. J. Syst. Softw. 35(3): 199-207 (1996) - [j76]Chin-Chen Chang, D. C. Lin:
A spatial data representation: an adaptive 2D-H string. Pattern Recognit. Lett. 17(2): 175-185 (1996) - [c22]Shin-Jia Hwang, Chin-Chen Chang:
A dynamic secret sharing scheme with cheater detection. ACISP 1996: 48-55 - [c21]Chu-Hsing Lin, Ching-Te Wang, Chin-Chen Chang:
A group-oriented (t, n) undeniable signature scheme without trusted center. ACISP 1996: 266-274 - [c20]C. Y. Chen, Chin-Chen Chang, Richard C. T. Lee, D. C. Lin:
A Temporal Join Mechanism Based on Trie-Ranking Data Structure. CODAS 1996: 428-435 - [c19]Chin-Feng Lee, Chin-Chen Chang:
Optimal Bit Lengths of Direction Signatures for Spatial Match Accessing Using Basic Linear Hashing Scheme. CODAS 1996: 526-529 - [c18]C. Y. Chen, Chin-Chen Chang, Richard C. T. Lee, D. C. Lin:
Optimal Linear Hashing Files for Orthogonal Range Retrieval. COMPSAC 1996: 406-413 - 1995
- [j75]Chin-Chen Chang, Tzong-Chen Wu, Chi-Sung Laih:
Cryptanalysis of a Password Authentication Scheme Using Quadratic Residues. Comput. Commun. 18(1): 45-47 (1995) - [j74]Chin-Chen Chang, Sun-Min Tsu, Chien-Yuan Chen:
Remote scheme for password authentication based on theory of quadratic residues. Comput. Commun. 18(12): 936-942 (1995) - [j73]Hui-Min Tsai, Chin-Chen Chang:
A cryptographic implementation for dynamic access control in a user hierarchy. Comput. Secur. 14(2): 159-166 (1995) - [j72]Chin-Chen Chang, Sun-Min Tsu:
Arithmetic operations on encrypted data. Int. J. Comput. Math. 56(1-2): 1-10 (1995) - [j71]Chin-Chen Chang, J. Liang:
Dynamic Pictorial Databases Design for Similarity Retrieval. Inf. Sci. 87(1-3): 29-46 (1995) - [j70]Yuh-Jiun Chen, Chin-Chen Chang, Wei-Pang Yang:
Shortest Weighted Length Addition Chains. J. Inf. Sci. Eng. 11(2): 295-305 (1995) - [j69]Chin-Chen Chang, Woan-Jing Horng, Daniel J. Buehrer:
A Cascade Exponentiation Evaluation Scheme Based on the Lempel-Ziv-Welch Compression Algorithm. J. Inf. Sci. Eng. 11(3): 417-431 (1995) - [j68]Annie Y. H. Chou, Wei-Pang Yang, Chin-Chen Chang:
Optimal Two-Attribute Cartesian Product Files for Orthogonal Range Queries. J. Inf. Sci. Eng. 11(4): 625-647 (1995) - [j67]Yuh-Jiun Chen, Chin-Chen Chang, Wei-Pang Yang:
Parallel Computation of the Modular Cascade Exponentiation. Parallel Algorithms Appl. 7(1-2): 29-42 (1995) - [j66]Chin-Chen Chang, Chin-Feng Lee:
Relative coordinates oriented symbolic string for spatial relationship retrieval. Pattern Recognit. 28(4): 563-570 (1995) - [j65]C. Y. Chen, Chin-Chen Chang, Richard Chia-Tung Lee:
A near pattern-matching scheme based upon principal component analysis. Pattern Recognit. Lett. 16(4): 339-345 (1995) - [j64]Chin-Chen Chang, Tzong-Chen Wu:
An exact match retrieval scheme based upon principal component analysis. Pattern Recognit. Lett. 16(5): 465-470 (1995) - [j63]Chu-Hsing Lin, Chin-Chen Chang, Richard C. T. Lee:
New Public-Key Cipher System Based Upon the Diophantine Equations. IEEE Trans. Computers 44(1): 13-19 (1995) - [c17]Chiuyuan Chen, Chin-Chen Chang:
Connected Proper Interval Graphs and the Guard Problem in Spiral Polygons. Combinatorics and Computer Science 1995: 39-47 - [c16]Shin-Jia Hwang, Chin-Chen Chang, Wei-Pang Yang:
Some Active Attacks on Fast Server-Aided Secret Computation Protocols for Modular Exponentiation. Cryptography: Policy and Algorithms 1995: 215-227 - 1994
- [j62]Ming-Yung Ko, Tzonelih Hwang, Chin-Chen Chang:
Attacks on an ID-based signature scheme based on Rabin's public key cryptosystem. Comput. Commun. 17(9): 674-676 (1994) - [j61]Chu-Hsing Lin, Chin-Chen Chang:
Method for constructing a group-oriented cipher system. Comput. Commun. 17(11): 805-808 (1994) - [j60]Chin-Chen Chang, Jinn-Ke Jan, Daniel J. Buehrer:
A scheme to determine the relationship between two users in a hierarchy. Comput. Secur. 13(3): 255-261 (1994) - [j59]Chi-Sung Laih, Wen-Hong Chiou, Chin-Chen Chang:
Authentication and protection of public keys. Comput. Secur. 13(7): 581-585 (1994) - [j58]Chin-Chen Chang, Jao-Ji Shen, Tzong-Chen Wu:
Access control with binary keys. Comput. Secur. 13(8): 681-686 (1994) - [j57]Chin-Chen Chang, Yaw-Wen Chen, Daniel J. Buehrer:
A Two-Dimensional Shape Recognition Scheme Based on Principal Component Analysis. Int. J. Pattern Recognit. Artif. Intell. 8(4): 859-875 (1994) - [j56]Tzong-Chen Wu, Chin-Chen Chang:
Controlling Access in Tree Hierarchies. Inf. Sci. 78(1-2): 69-76 (1994) - [j55]J. Liang, Chin-Chen Chang, Ron McFadyen, Richard C. T. Lee:
Optimal Multiple Key Hashing Files for Orthogonal Range Queries. Inf. Sci. 79(1-2): 145-158 (1994) - [j54]Chin-Chen Chang, Feng-Yi Liou:
A Digital Multisignature Scheme Based upon the Digital Signature Scheme of a Modified ElGamal Public Key Cryptosystem. J. Inf. Sci. Eng. 10(3): 423-432 (1994) - [j53]Chin-Chen Chang, Shin-Jia Hwang, Daniel J. Buehrer:
New concepts for multiple stack systems: Born and reborn. J. Syst. Softw. 27(1): 45-54 (1994) - [j52]Tzong-Chen Wu, Chin-Chen Chang:
Application of geometric hashing to iconic database retrieval. Pattern Recognit. Lett. 15(9): 871-876 (1994) - 1993
- [j51]Jinn-Ke Jan, Chin-Chen Chang:
A Key-Lock-Pair Oriented Access Control Scheme for the Growth of Users and Files. BIT 33(3): 382-389 (1993) - [j50]Chin-Chen Chang, Huey-Cheue Kowng, Tzong-Chen Wu:
A Refinement of a Compression-Oriented Addressing Scheme. BIT 33(4): 529-535 (1993) - [j49]Chin-Chen Chang, Ren-Junn Hwang:
Master Keys for an M 3 Cryptoscheme. Cryptologia 17(2): 175-186 (1993) - [j48]Chin-Chen Chang, Tzong-Chen Wu:
Controlling the Access Requests in an Information Protection System. Inf. Process. Manag. 29(1): 61-68 (1993) - [j47]C. Y. Chen, Chin-Chen Chang, Richard C. T. Lee:
Optimal MMI file systems for orthogonal range retrieval. Inf. Syst. 18(1): 37-54 (1993) - [j46]Tzong-Chen Wu, Yi-Shiung Yeh, Chin-Chen Chang:
Algebraic operations on encryped relational databases. Inf. Syst. 18(1): 55-62 (1993) - [j45]Chin-Chen Chang, Horng-Chin Lee:
A New Generalized Group-Oriented Cryptoscheme Without Trusted Centers. IEEE J. Sel. Areas Commun. 11(5): 725-729 (1993) - [j44]C. Y. Chen, Chin-Chen Chang:
An object-oriented similarity retrieval algorithm for iconic image databases. Pattern Recognit. Lett. 14(6): 465-470 (1993) - [j43]Chin-Chen Chang, Tzong-Chen Wu:
A hashing-oriented nearest neighbor searching scheme. Pattern Recognit. Lett. 14(8): 625-630 (1993) - [c15]J. Liang, Chin-Chen Chang:
Similarity Retrieval on Pictorial Databases Based upon Module Operation. DASFAA 1993: 19-26 - [c14]Daniel J. Buehrer, Chin-Chen Chang:
Application of a Reciprocal Confluence Tree Unit to Similar-Picture Retrieval. SSD 1993: 437-442 - 1992
- [j42]Chin-Chen Chang, H. Y. Chen, C. Y. Chen:
Symbolic Gray Code As A Data Allocation Scheme For Two-Disc Systems. Comput. J. 35(3): 299-305 (1992) - [j41]Chin-Chen Chang, H. F. Lin, C. Y. Chen:
Optimality Properties of the Disc Modulo Allocation Method for k-ary Multiple Key Hashing Files. Comput. J. 35(4): 390-394 (1992) - [j40]Chu-Hsing Lin, Chin-Chen Chang, Richard C. T. Lee:
A Record-Oriented Cryptosystem for Database Sharing (Short Note). Comput. J. 35(6): 658-660 (1992) - [j39]Annie Y. H. Chou, W.-P. Wang, Chin-Chen Chang:
Greedy File - a New Data Organisation Concept for Partial Match Retrieval. Comput. J. 35(Additional-Papers): A403-A408 (1992) - [j38]Chin-Chen Chang:
A fast algorithm to retrieve symbolic pictures. Int. J. Comput. Math. 43(3-4): 133-138 (1992) - [j37]Chin-Chen Chang, Tzong-Chen Wu:
Retrieving the Most Similar Symbolic Pictures from Pictorial Databases. Inf. Process. Manag. 28(5): 581-588 (1992) - [j36]Chin-Chen Chang, Ren-Junn Hwang, Tzong-Chen Wu:
Crypographic key assignment scheme for access control in a hierarchy. Inf. Syst. 17(3): 243-247 (1992) - [j35]Chu-Hsing Lin, Chin-Chen Chang, Richard C. T. Lee:
A conference key broadcasting system using sealed locks. Inf. Syst. 17(4): 323-328 (1992) - [j34]C. Y. Chen, Chin-Chen Chang:
On GDM allocation for partial range queries. Inf. Syst. 17(5): 381-394 (1992) - [j33]Chin-Chen Chang, Chu-Hsing Lin, Richard C. T. Lee:
Hierarchy representations based on arithmetic coding for dynamic information protection systems. Inf. Sci. 64(1-2): 35-48 (1992) - [j32]Jen Nan Chen, Chin-Chen Chang:
A Chinese Character Retrieval Scheme Using Shuang Pinyin. J. Inf. Sci. Eng. 8(3): 487-507 (1992) - [c13]Chin-Chen Chang, Tzong-Chen Wu, C. P. Chen:
The Design of a Conference Key Distribution System. AUSCRYPT 1992: 459-466 - [c12]Chin-Chen Chang, Daniel J. Buehrer:
De-Clustering Image Databases. Future Databases 1992: 142-145 - [c11]Chin-Chen Chang, Horng-Chin Lee:
A Solution to Generalized Group Oriented Cryptography. SEC 1992: 265-275 - 1991
- [j31]Chin-Chen Chang, C. Y. Chen, Jinn-Ke Jan:
On the Design of a Machine-Independent Perfect Hashing Scheme. Comput. J. 34(5): 469-474 (1991) - [j30]Jinn-Ke Jan, Chin-Chen Chang, S. J. Wang:
A dynamic key-lock-pair access control scheme. Comput. Secur. 10(2): 129-139 (1991) - [j29]Tzong-Chen Wu, Chin-Chen Chang:
A password authentication scheme based on discrete logarithms. Int. J. Comput. Math. 41(1-2): 31-38 (1991) - [j28]Chu-Hsing Lin, Chin-Chen Chang, Tzong-Chen Wu, Richard C. T. Lee:
Password authentication using Newton's interpolating polynomials. Inf. Syst. 16(1): 97-102 (1991) - [j27]C. Y. Chen, Chin-Chen Chang, Richard C. T. Lee:
On the design of multiple key hashing files for concurrent orthogonal range retrieval between two disks. Inf. Syst. 16(6): 613-625 (1991) - [j26]Chin-Chen Chang, C. Y. Chen:
A note on allocating k-ary multiple key hashing files among multiple disks. Inf. Sci. 55(1-3): 69-76 (1991) - [j25]Chin-Chen Chang:
A Composite Perfect Hashing Scheme for Large Letter-Oriented Key Sets. J. Inf. Sci. Eng. 7(2): 173-186 (1991) - [j24]Chin-Chen Chang:
Spatial Match Retrieval of Symbolic Pictures. J. Inf. Sci. Eng. 7(3): 405-422 (1991) - [j23]Chin-Chen Chang, Suh-Yin Lee:
Retrieval of similar pictures on pictorial databases. Pattern Recognit. 24(7): 675-680 (1991) - [j22]Chin-Chen Chang, S. M. Hwang, Daniel J. Buehrer:
A shape recognition scheme based on relative distances of feature points from the centroid. Pattern Recognit. 24(11): 1053-1063 (1991) - [j21]Chin-Chen Chang, Tzong-Chen Wu:
A Letter-oriented Perfect Hashing Scheme Based upon Sparse Table Compression. Softw. Pract. Exp. 21(1): 35-49 (1991) - 1990
- [j20]Chin-Chen Chang, Chu-Hsing Lin:
A Reciprocal Confluence Tree Unit and Its Applications. BIT 30(1): 27-33 (1990) - [j19]Chu-Hsing Lin, Richard C. T. Lee, Chin-Chen Chang:
A Dynamic Access Control Mechanism in Information Protection Systems. J. Inf. Sci. Eng. 6(1): 25-35 (1990) - [j18]Chin-Chen Chang, Ling-Hua Wu:
A New Password Authentication Scheme. J. Inf. Sci. Eng. 6(2): 139-147 (1990)
1980 – 1989
- 1989
- [c10]Chin-Chen Chang, D. F. Leu:
Multikey Sorting as a File Organization Scheme When Queries Are Not Equally Likely. DASFAA 1989: 219-224 - 1988
- [j17]Chin-Chen Chang:
Application of Principal Component Analysis to Multi-Disk Concurrent Accessing. BIT 28(2): 205-214 (1988) - [j16]Chin-Chen Chang, C. Y. Chen:
A Recursive Performance Formula of the Disc Modulo Allocation Method for Binary Cartesian Product Files. Comput. J. 31(6): 565-566 (1988) - [j15]Chin-Chen Chang, C. H. Chang:
An Ordered Minimal Perfect Hashing Scheme with Single Parameter. Inf. Process. Lett. 27(2): 79-83 (1988) - [c9]Chin-Chen Chang, C. Y. Chen:
Orthogonal Range Retrieval Using Bucket Address Hashing. SSDBM 1988: 133-140 - 1987
- [j14]Chin-Chen Chang, C. Y. Chen:
Performance of Two-Disk Partition Data Allocations. BIT 27(3): 306-314 (1987) - [j13]Chin-Chen Chang:
An Information Protection Scheme Based Upon Number Theory. Comput. J. 30(3): 249-253 (1987) - [j12]Chin-Chen Chang, C. Y. Chen:
Performance Analysis of the Generalised Disc Modulo Allocation method for Multiple Key Hashing Files on Multi-Disc Systems. Comput. J. 30(6): 535-540 (1987) - [j11]Chin-Chen Chang, C. Y. Chen:
Some Properties of Cartesian Product Files for Disk Modulo Allocation Method in a Two-disk System. J. Inf. Sci. Eng. 3(2): 151-176 (1987) - [j10]Chin-Chen Chang, C. Y. Chen:
Gray Code as a De-clustering Scheme for Concurrent Disk Retrieval. J. Inf. Sci. Eng. 3(2): 177-188 (1987) - 1986
- [j9]Chin-Chen Chang:
On the Design of a Key-Lock-Pair Mechanism in Information Protection Systems. BIT 26(4): 410-417 (1986) - [j8]Chin-Chen Chang, Richard C. T. Lee:
A Letter-Oriented Minimal Perfect Hashing Scheme. Comput. J. 29(3): 277-281 (1986) - [j7]Chin-Chen Chang:
Letter-oriented reciprocal hashing scheme. Inf. Sci. 38(3): 243-255 (1986) - [j6]Chin-Chen Chang:
A scheme for constructing ordered minimal perfect hashing functions. Inf. Sci. 39(2): 187-195 (1986) - [c8]Chin-Chen Chang, J. C. Shieh:
On the Design of Ordered Minimal Perfect Hashing Functions. ICDE 1986: 112-115 - [c7]M. T. Fang, Richard C. T. Lee, Chin-Chen Chang:
The Idea of De-Clustering and its Applications. VLDB 1986: 181-188 - 1985
- [c6]Chin-Chen Chang:
The Study of a Letter Oriented Minimal Perfect Hashing Scheme. FODO 1985: 91-99 - [c5]Chin-Chen Chang, Jaw-Ji Shen:
Consecutive Retrieval Organization as a File Allocation Scheme on Multiple Disk Systems. FODO 1985: 113-124 - [c4]Chin-Chen Chang, L. S. Lian:
On Strict Optimality Property of Allocating Binary Cartesian Product Files on Multiple Disk Systems. FODO 1985: 159-175 - [c3]Chin-Chen Chang, J. C. Shieh:
On the Complexity of File Allocation Problem. FODO 1985: 177-181 - [c2]Chin-Chen Chang:
Database Research and Development in Taiwan. FODO 1985: 603-605 - 1984
- [j5]Chin-Chen Chang:
An ordered minimal perfect hashing scheme based upon Euler's theorem. Inf. Sci. 32(3): 165-172 (1984) - [j4]Chin-Chen Chang:
Optimal information retrieval when queries are not random. Inf. Sci. 34(3): 199-223 (1984) - [j3]Chin-Chen Chang, M. W. Du, Richard C. T. Lee:
Performance Analyses of Cartesian Product Files and Random Files. IEEE Trans. Software Eng. 10(1): 88-99 (1984) - 1983
- [j2]Chin-Chen Chang, M. W. Du, Richard C. T. Lee:
The hierarchical ordering in multiattribute files. Inf. Sci. 31(1): 41-75 (1983) - 1982
- [j1]Chin-Chen Chang, Richard C. T. Lee, M. W. Du:
Symbolic Gray Code as a Perfect Multiattribute Hashing Scheme for Partial Match Queries. IEEE Trans. Software Eng. 8(3): 235-249 (1982) - 1980
- [c1]Chin-Chen Chang, Richard C. T. Lee, David Hung-Chang Du:
Some Properties of Cartesian Product Files. SIGMOD Conference 1980: 157-168
Coauthor Index
aka: Karunanithi Bharanitharan
aka: Jinn-Ke Jan
aka: Richard Chia-Tung Lee
aka: Yuchiang Li
aka: Thai-Son Nguyen
aka: Xiao-Zhu Xie
aka: Jiehshan Yeh
aka: Shan-Qing Zhang

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-20 20:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint