Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Chin-Chen Chang
Alan Chin-Chen Chang
Author information
- unicode name: 張真誠
- affiliation: National Chung Cheng University, Taiwan
2010 – today
- 2014
[j465]Yanjun Liu, Chin-Chen Chang, Shih-Chang Chang: An Access Control Mechanism Based on the Generalized Aryabhata Remainder Theorem. I. J. Network Security 16(1): 58-64 (2014)
[j464]Chin-Chen Chang, Thai Son Nguyen, Chia-Chen Lin: Reversible Image Hiding for High Image Quality Based on Histogram Shifting and Local Complexity. I. J. Network Security 16(3): 201-213 (2014)
[j463]Xi Chen, Yun Liu, Chin-Chen Chang, Cheng Guo: Generalized Secret Sharing with Linear Hierarchical Secrets. I. J. Network Security 16(3): 220-228 (2014)
[j462]Xu Zhuang, Chin-Chen Chang, Zhi-Hui Wang, Yan Zhu: A Simple Password Authentication Scheme Based on Geometric Hashing Function. I. J. Network Security 16(4): 237-243 (2014)
[j461]Chi-Hsien Lin, K. Bharanitharan, Chin-Chen Chang: Comments and Proofs to Published Paper - A Novel Reversible Robust Watermarking Algorithm Based on a Chaotic System. I. J. Network Security 16(4): 273-276 (2014)
[j460]Qian Mao, Chin-Chen Chang, Ting-Feng Chung: A Reversible Steganography Suitable for Embedding Small Amounts of Data. I. J. Network Security 16(4): 304-312 (2014)- 2013
[j459]Chun-Yen Huang, Wan-Ting Jheng, Wen-Kai Tai, Chin-Chen Chang, Der-Lor Way: Procedural grape bunch modeling. Computers & Graphics 37(4): 225-237 (2013)
[j458]Xing-Tian Wang, Chin-Chen Chang, Thai Son Nguyen, MingChu Li: Reversible data hiding for high quality images exploiting interpolation and direction order mechanism. Digital Signal Processing 23(2): 569-577 (2013)
[j457]Chuan Qin, Chin-Chen Chang, Pei-Ling Tsou: Robust image hashing using non-uniform sampling in discrete Fourier domain. Digital Signal Processing 23(2): 578-585 (2013)
[j456]Jin Tang, Bo Jiang, Chin-Chen Chang, Bin Luo: Corrigendum to "Graph structure analysis based on complex network" [Digital Signal Processing 22 (5) (2012) 713-725]. Digital Signal Processing 23(4): 1332 (2013)
[j455]Zi-Yao Cheng, Yun Liu, Chin-Chen Chang, Cheng Guo: A fault-tolerant group key agreement protocol exploiting dynamic setting. Int. J. Communication Systems 26(2): 259-275 (2013)
[j454]Chin-Chen Chang, Chia-Yin Lee: A Smart Card-based Authentication Scheme Using User Identify Cryptography. I. J. Network Security 15(2): 139-147 (2013)
[j453]Yanjun Liu, Chin-Chen Chang, Shih-Chang Chang: An Efficient Oblivious Transfer Protocol Using Residue Number System. I. J. Network Security 15(3): 212-218 (2013)
[j452]Lein Harn, Chin-Chen Chang, Hsiao-Ling Wu: An Anonymous Multi-Receiver Encryption Based on RSA. I. J. Network Security 15(4): 307-312 (2013)
[j451]Jung-San Lee, Chin-Chen Chang, Kuo-Jui Wei: Provably Secure Conference Key Distribution Mechanism Preserving the Forward and Backward Secrecy. I. J. Network Security 15(5): 405-410 (2013)
[j450]Chin-Chen Chang, Jen-Ho Yang: A Group-oriented Digital Right Management Scheme with Reliable and Flexible Access Policies. I. J. Network Security 15(6): 471-477 (2013)
[j449]Hao-Chuan Tsai, Chin-Chen Chang: Provably secure three party encrypted key exchange scheme with explicit authentication. Inf. Sci. 238: 242-249 (2013)
[j448]Qian Mao, Chin-Chen Chang, Hsiao-Ling Wu: An Image Encryption Scheme Based on Concatenated Torus Automorphisms. TIIS 7(6): 1492-1511 (2013)
[j447]Chuan Qin, Chin-Chen Chang, Yen-Chang Chen: A Novel Reversible Data Hiding Scheme for VQ-Compressed Images Using Index Set Construction Strategy. TIIS 7(8): 2027-2041 (2013)
[j446]Pei-Yu Lin, Yi-Hui Chen, Chin-Chen Chang, Jung-San Lee: Contrast-Adaptive Removable Visible Watermarking (CARVW) mechanism. Image Vision Comput. 31(4): 311-321 (2013)
[j445]Chin-Chen Chang, Thai Son Nguyen, Chia-Chen Lin: A novel VQ-based reversible data hiding scheme by using hybrid encoding strategies. Journal of Systems and Software 86(2): 389-402 (2013)
[j444]Chin-Chen Chang, Kuo-Nan Chen, Zhi-Hui Wang, MingChu Li: Lossless Information Hiding in the VQ Index Table. JSW 8(3): 547-553 (2013)
[j443]Zi-Yao Cheng, Yun Liu, Chin-Chen Chang, Shih-Chang Chang: Authenticated RFID security mechanism based on chaotic maps. Security and Communication Networks 6(2): 247-256 (2013)
[j442]Chin-Chen Chang, Shih-Chang Chang, Jen-Ho Yang: A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment. Security and Communication Networks 6(8): 972-984 (2013)
[j441]Chuan Qin, Chin-Chen Chang, Kuo-Nan Chen: Adaptive self-recovery for tampered images based on VQ indexing and inpainting. Signal Processing 93(4): 933-946 (2013)
[j440]Li Li, Ying-Ying Ma, Chin-Chen Chang, Jianfeng Lu: Analyzing and removing SureSign watermark. Signal Processing 93(5): 1374-1378 (2013)
[j439]Chuan Qin, Chin-Chen Chang, Yen-Chang Chen: Efficient reversible data hiding for VQ-compressed images based on index mapping mechanism. Signal Processing 93(9): 2687-2695 (2013)
[j438]Chuan Qin, Chin-Chen Chang, Ying-Hsuan Huang, Li-Ting Liao: An Inpainting-Assisted Reversible Steganographic Scheme Using a Histogram Shifting Mechanism. IEEE Trans. Circuits Syst. Video Techn. 23(7): 1109-1118 (2013)
[j437]Chin-Chen Chang, Ting-Fang Cheng, Wei-yi Chen: A Novel Electronic English Auction System With a Secure On-Shelf Mechanism. IEEE Transactions on Information Forensics and Security 8(4): 657-668 (2013)
[j436]Chin-Chen Chang, Hai-Duong Le, Ching-Hsiang Chang: Novel Untraceable Authenticated Key Agreement Protocol Suitable for Mobile Communication. Wireless Personal Communications 71(1): 425-437 (2013)
[c249]Huei-Yung Lin, Chin-Chen Chang, Jhih-Yong Huang: Combining Depth Information for Image Retargeting. VISAPP (1) 2013: 172-179
[p4]Shuai Yue, Zhi-Hui Wang, Chin-Chen Chang: An Image Data Hiding Scheme Based on Vector Quantization and Graph Coloring. Recent Advances in Information Hiding and Applications 2013: 1-17
[p3]Shi-Yu Cui, Zhi-Hui Wang, Pei-Wei Tsai, Chin-Chen Chang, Shuai Yue: Single Bitmap Block Truncation Coding of Color Images Using Cat Swarm Optimization. Recent Advances in Information Hiding and Applications 2013: 119-138- 2012
[j435]Jin Tang, Bo Jiang, Chin-Chen Chang, Bin Luo: Graph structure analysis based on complex network. Digital Signal Processing 22(5): 713-725 (2012)
[j434]Kuo-Nan Chen, Chin-Hao Chen, Chin-Chen Chang: Efficient illumination compensation techniques for text images. Digital Signal Processing 22(5): 726-733 (2012)
[j433]Pei-Yan Pai, Chin-Chen Chang, Yung-Kuan Chan: Nucleus and cytoplast contour detector from a cervical smear image. Expert Syst. Appl. 39(1): 154-161 (2012)
[j432]Chuan Qin, Zhi-Hui Wang, Chin-Chen Chang, Kuo-Nan Chen: Reversible Data Hiding Scheme Based on Image Inpainting. Fundam. Inform. 120(1): 59-70 (2012)
[j431]Chin-Chen Chang, Yi-Pei Hsieh: A fast VQ codebook search with initialization and search order. Inf. Sci. 183(1): 132-139 (2012)
[j430]Zhi-Hui Wang, Chin-Chen Chang, MingChu Li: Optimizing least-significant-bit substitution using cat swarm optimization strategy. Inf. Sci. 192: 98-108 (2012)
[j429]Chin-Chen Chang, Chih-Yang Lin, Yi-Pei Hsieh: Data hiding for vector quantization images using mixed-base notation and dissimilar patterns without loss of fidelity. Inf. Sci. 201: 70-79 (2012)
[j428]Yi-Hui Chen, Chin-Chen Chang: Image Tamper Detection and Recovery Based on Dual Watermarks Sharing Strategy. JDIM 10(1): 39-49 (2012)
[j427]Fei Yu, Yiqin Lu, Chin-Chen Chang, Yan Gao: Guest Editors' Introduction: Special Section on ISIP 2011. Journal of Multimedia 7(1): 31-32 (2012)
[j426]Cheng Guo, Chin-Chen Chang, Chuan Qin: A hierarchical threshold secret image sharing. Pattern Recognition Letters 33(1): 83-91 (2012)
[j425]Cheng Guo, Chin-Chen Chang, Chuan Qin: A multi-threshold secret image sharing scheme based on MSP. Pattern Recognition Letters 33(12): 1594-1600 (2012)
[j424]Chuan Qin, Chin-Chen Chang, Li-Ting Liao: An adaptive prediction-error expansion oriented reversible information hiding scheme. Pattern Recognition Letters 33(16): 2166-2172 (2012)
[j423]Chuan Qin, Chin-Chen Chang, Pei-Yu Chen: Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Signal Processing 92(4): 1137-1150 (2012)
[j422]Xing-Tian Wang, Chin-Chen Chang, Chia-Chun Lin, MingChu Li: A novel multi-group exploiting modification direction method based on switch map. Signal Processing 92(6): 1525-1535 (2012)
[j421]Chin-Chen Chang, Chia-Yin Lee: A Secure Single Sign-On Mechanism for Distributed Computer Networks. IEEE Transactions on Industrial Electronics 59(1): 629-637 (2012)
[j420]Jen-Ho Yang, Chin-Chen Chang: A Low Computational-Cost Electronic Payment Scheme for Mobile Commerce with Large-Scale Mobile Users. Wireless Personal Communications 63(1): 83-99 (2012)
[c248]Tai-Yun Chen, Hung-Wei Hsu, Wen-Kai Tai, Chin-Chen Chang: An Automatic Race Track Generating System. Advances in Computer Entertainment 2012: 167-181
[c247]Chin-Chen Chang, Jen-Ho Yang, Kai-Jie Chang: An Efficient and Flexible Mobile Payment Protocol. ICGEC 2012: 63-66- 2011
[j419]Lein Harn, Chia-Yin Lee, Changlu Lin, Chin-Chen Chang: Fully Deniable Message Authentication Protocols Preserving Confidentiality. Comput. J. 54(10): 1688-1699 (2011)
[j418]T. Hoang Ngan Le, Chia-Chen Lin, Chin-Chen Chang, Hoai Bac Le: A high quality and small shadow size visual secret sharing scheme based on hybrid strategy for grayscale images. Digital Signal Processing 21(6): 734-745 (2011)
[j417]The Duc Kieu, Chin-Chen Chang: A steganographic scheme by fully exploiting modification directions. Expert Syst. Appl. 38(8): 10648-10657 (2011)
[j416]Chin-Chen Chang, Chih-Yang Lin, Yi-Hsuan Fan: Reversible Steganography for BTC-compressed Images. Fundam. Inform. 109(2): 121-134 (2011)
[j415]Chia-Yin Lee, Zhi-Hui Wang, Lein Harn, Chin-Chen Chang: Secure Key Transfer Protocol Based on Secret Sharing for Group Communications. IEICE Transactions 94-D(11): 2069-2076 (2011)
[j414]Pei-Yu Lin, Chin-Chen Chang: Cheating resistance and reversibility-oriented secret sharing mechanism. IET Information Security 5(2): 81-92 (2011)
[j413]Chin-Chen Chang, Kuo-Nan Chen, Ngoc-Tu Huynh: Lossless Secret Sharing Scheme with High Quality Shares Based on VQ-Compressed Images. IJPRAI 25(4): 529-546 (2011)
[j412]Pei-Yan Pai, Chin-Chen Chang, Yung-Kuan Chan, Meng-Hsiun Tsai: An adaptable threshold detector. Inf. Sci. 181(8): 1463-1483 (2011)
[j411]Chin-Chen Chang, Yi-Hui Chen, Hsin-Chi Wang: Meaningful secret sharing technique with authentication and remedy abilities. Inf. Sci. 181(14): 3073-3084 (2011)
[j410]Fei Yu, Haiwen Liu, Wenlang Luo, Huojiao He, Chin-Chen Chang: Guest Editorial. JCP 6(10): 2001-2003 (2011)
[j409]Chin-Feng Lee, Kuo-Nan Chen, Chin-Chen Chang, Meng-Cheng Tsai: A Hierarchical Fragile Watermarking with VQ Index Recovery. Journal of Multimedia 6(3): 277-284 (2011)
[j408]Cheng Guo, Zhi-Hui Wang, Chin-Chen Chang, Chuan Qin: A Secret Image Sharing Scheme with High Quality Shadows Based on Exploiting Modification Direction. Journal of Multimedia 6(4): 341-348 (2011)
[j407]Zhi-Hui Wang, Chin-Chen Chang, MingChu Li, Tzu-Chuen Lu: A Simple Image Encoding Method with Data Lossless Information Hiding. JNW 6(3): 400-407 (2011)
[j406]Fei Yu, Yiqin Lu, Jian Shu, Guangxue Yue, Chin-Chen Chang: Guest Editorial. JNW 6(10): 1387-1389 (2011)
[j405]Li Li, He-Huan Xu, Chin-Chen Chang, Ying-Ying Ma: A novel image watermarking in redistributed invariant wavelet domain. Journal of Systems and Software 84(6): 923-929 (2011)
[j404]Chin-Chen Chang, Kuo-Nan Chen, Chin-Feng Lee, Li-Jen Liu: A secure fragile watermarking scheme based on chaos-and-hamming code. Journal of Systems and Software 84(9): 1462-1470 (2011)
[j403]Fei Yu, Xuange Peng, Juefu Liu, Jiexian Zeng, Chin-Chen Chang: Guest Editorial. JSW 6(9): 1629-1631 (2011)
[j402]Chin-Feng Lee, Ying-Hsuan Huang, Chin-Chen Chang, Tien-Chung Liu: A Prediction-Based Adaptive Reversible Data Embedding Scheme. JSW 6(9): 1813-1820 (2011)
[j401]Chin-Chen Chang, Thai Son Nguyen, Chia-Chen Lin: A reversible data hiding scheme for VQ indices using locally adaptive coding. J. Visual Communication and Image Representation 22(7): 664-672 (2011)
[j400]Pei-Yu Lin, Jung-San Lee, Chin-Chen Chang: Protecting the content integrity of digital imagery with fidelity preservation. TOMCCAP 7(3): 15 (2011)
[c246]Jen-Ho Yang, Chin-Chen Chang, Chih-Hung Wang: An Efficient V-Fairness (t, n) Threshold Secret Sharing Scheme. ICGEC 2011: 180-183
[c245]Jen-Ho Yang, Chin-Chen Chang, Shih-Yi Lin: An Efficient Mutual Authentication with Key Agreement Protocol for Mobile Devices. IIH-MSP 2011: 145-148
[c244]Chin-Chen Chang, Kuo-Nan Chen, Ying-Hsuan Huang: Low Computational Color Secret Sharing Schemes with High Shares Quality Color Secret Sharing. IIH-MSP 2011: 157-160
[c243]Cheng Guo, Chin-Chen Chang: General Threshold Signature Based on the Chinese Remainder Theorem. IIH-MSP 2011: 244-247
[c242]Chin-Chen Chang, Hai-Duong Le, Chia-Yin Lee, Ching-Hsiang Chang: A Robust and Efficient Smart Card Oriented Remote User Authentication Protocol. IIH-MSP 2011: 252-255
[c241]Shuai Yue, Zhi-Hui Wang, Ching-Yun Chang, Chin-Chen Chang, MingChu Li: Image Data Hiding Schemes Based on Graph Coloring. UIC 2011: 476-489- 2010
[j399]Chin-Chen Chang, Hao-Chuan Tsai, Yi-Pei Hsieh: An efficient and fair buyer-seller fingerprinting scheme for large scale networks. Computers & Security 29(2): 269-277 (2010)
[j398]Yu-Chiang Li, Chia-Ming Yeh, Chin-Chen Chang: Data hiding based on the similarity between neighboring pixels with reversibility. Digital Signal Processing 20(4): 1116-1128 (2010)
[j397]Chin-Chen Chang, Jung-San Lee, T. Hoang Ngan Le: Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector. Digital Signal Processing 20(4): 1286-1307 (2010)
[j396]Wen-Jan Chen, Chin-Chen Chang, T. Hoang Ngan Le: High payload steganography mechanism using hybrid edge detector. Expert Syst. Appl. 37(4): 3292-3301 (2010)
[j395]Chin-Chen Chang, Jen-Ho Yang, Da-Wei Wang: An efficient and reliable E-DRM scheme for mobile environments. Expert Syst. Appl. 37(9): 6176-6181 (2010)
[j394]Chia-Chi Wu, Chia-Chen Lin, Chin-Chen Chang: Digital rights management for multimedia content over 3G mobile networks. Expert Syst. Appl. 37(10): 6787-6797 (2010)
[j393]Charlie Irawan Tan, Chang-Min Chen, Wen-Kai Tai, Chin-Chen Chang: Path Planning for Racing Games. International Journal on Artificial Intelligence Tools 19(5): 679-702 (2010)
[j392]Chin-Chen Chang, Chia-Yin Lee, Yen-Chang Chiu: An efficient e-mail protocol providing perfect forward secrecy for mobile devices. Int. J. Communication Systems 23(12): 1463-1473 (2010)
[j391]Chin-Chen Chang, Shih-Chang Chang, Yu-Wei Lai: An Improved Biometrics-based User Authentication Scheme without Concurrency System. IJIIP 1(1): 41-49 (2010)
[j390]Chin-Chen Chang, Chia-Yin Lee, Chang-Chu Chen, Zhi-Hui Wang: A data-hiding scheme based on one-way hash function. IJMIS 1(3): 285-297 (2010)
[j389]Naixue Xiong, Athanasios V. Vasilakos, Laurence Tianruo Yang, Cheng-Xiang Wang, Rajgopal Kannan, Chin-Chen Chang, Yi Pan: A novel self-tuning feedback controller for active queue management supporting TCP flows. Inf. Sci. 180(11): 2249-2263 (2010)
[j388]Chin-Chen Chang, Pei-Yan Pai, Chia-Ming Yeh, Yung-Kuan Chan: A high payload frequency-based reversible image hiding method. Inf. Sci. 180(11): 2286-2298 (2010)
[j387]Chin-Chen Chang, The Duc Kieu: A reversible data hiding scheme using complementary embedding strategy. Inf. Sci. 180(16): 3045-3058 (2010)
[j386]Chin-Chen Chang, Pei-Yu Lin, Zhi-Hui Wang, MingChu Li: A Sudoku-based Secret Image Sharing Scheme with Reversibility (Invited Paper). JCM 5(1): 5-12 (2010)
[j385]Fei Yu, Chin-Chen Chang, Guangxue Yue, Jiexian Zeng, Wen Chen: Guest Editorial. JCP 5(4): 489-491 (2010)
[j384]Yun Liu, Fei Yu, Chin-Chen Chang, Dongfeng Yuan, Yiqin Lu: Guest Editorial. JCP 5(6): 825-827 (2010)
[j383]Hsien-Hsi Hsieh, Chin-Chen Chang, Wen-Kai Tai, Han-Wei Shen: Novel Geometrical Voxelization Approach with Application to Streamlines. J. Comput. Sci. Technol. 25(5): 895-904 (2010)
[j382]Chin-Chen Chang, Pei-Yu Lin, Jun-Chou Chuang: A Grayscale Image Steganography Based upon Discrete Cosine Transformation. JDIM 8(2): 88-94 (2010)
[j381]Zhi-Hui Wang, Chin-Chen Chang, Pei-Yu Tsai: Hiding Secret Data in an Image Using Codeword Imitation. JIPS 6(4): 435-452 (2010)
[j380]Chin-Chen Chang, Chen-Yu Lin: Texture Tiling on 3D Models Using Automatic Polycube-maps and Wang Tiles. J. Inf. Sci. Eng. 26(1): 291-305 (2010)
[j379]Hsien-Hsi Hsieh, Wen-Kai Tai, Chin-Chen Chang: GPU-based Collision Detection and Response for Particles on 3D Models. J. Inf. Sci. Eng. 26(5): 1619-1635 (2010)
[j378]Fei Yu, Chin-Chen Chang, Jian Shu, Guangxue Yue, Jun Zhang: Guest Editorial. Journal of Multimedia 5(3): 197-199 (2010)
[j377]Chin-Chen Chang, Shih-Chang Chang: The Design of E-Traveler's Check with Efficiency and Mutual Authentication. JNW 5(3): 275-282 (2010)
[j376]Fei Yu, Chin-Chen Chang, Wen Chen, Jun Zhang, Guangxue Yue: Guest Editorial. JNW 5(6): 631-633 (2010)
[j375]Hsing-Chung Chen, Franz I. S. Ko, Yung-Chen Chou, Shyan-Ming Yuan, Yaw-Chung Chen, Chin-Chen Chang, Jyh-Horng Wen, Shiuh-Jeng Wang, Yuh-Ren Tsai, Keh-Ming Lu: Guest Editorial. JNW 5(8): 875-879 (2010)
[j374]Dongfeng Yuan, Chin-Chen Chang, Fei Yu, Guozhu Liu, Jun Zhang: Guest Editorial. JNW 5(9): 991-993 (2010)
[j373]Chi-Nan Lin, Daniel J. Buehrer, Chin-Chen Chang, Tzu-Chuen Lu: Using quad smoothness to efficiently control capacity-distortion of reversible data hiding. Journal of Systems and Software 83(10): 1805-1812 (2010)
[j372]Zhi-Hui Wang, Chin-Chen Chang, Kuo-Nan Chen, MingChu Li: An encoding method for both image compression and data lossless information hiding. Journal of Systems and Software 83(11): 2073-2082 (2010)
[j371]Hyunseung Choo, Sang-goo Lee, Katsumi Tanaka, Chin-Chen Chang: Guest Editorial. JSW 5(2): 131-132 (2010)
[j370]Fei Yu, Chin-Chen Chang, Jian Shu, Guiping Liao, Guangxue Yue: Guest Editorial. JSW 5(5): 455-457 (2010)
[j369]Fei Yu, Chin-Chen Chang, Jian Shu, Guangxue Yue, Naiping Hu: Guest Editorial. JSW 5(9): 923-925 (2010)
[j368]Chang-Chu Chen, Chin-Chen Chang: High capacity SMVQ-based hiding scheme using adaptive index. Signal Processing 90(7): 2141-2149 (2010)
[j367]Deok-Gyu Lee, Sajid Hussain, Alan Chin-Chen Chang: Intelligent systems for future generation communications. The Journal of Supercomputing 54(1): 1-3 (2010)
[j366]Chin-Chen Chang, Hao-Chuan Tsai: An Anonymous and Self-Verified Mobile Authentication with Authenticated Key Agreement for Large-Scale Wireless Networks. IEEE Transactions on Wireless Communications 9(11): 3346-3353 (2010)
[j365]Shih-Chun Tu, Wen-Kai Tai, Martin Isenburg, Chin-Chen Chang: An improved data hiding approach for polygon meshes. The Visual Computer 26(9): 1177-1181 (2010)
[j364]Jung-San Lee, Pei-Yu Lin, Chin-Chen Chang: Lightweight Secure Roaming Mechanism Between GPRS/UMTS and Wireless LANs. Wireless Personal Communications 53(4): 569-580 (2010)
[c240]Kuo-Nan Chen, Chin-Chen Chang, Huang-Ching Lin: A Large Payload EMD Embedding Scheme with High Stego-image Quality. CASoN 2010: 126-130
[c239]Chin-Chen Chang, Kuo-Nan Chen, Zhi-Hui Wang, MingChu Li: A technique of embedding digital data in an image compression code reversibly. ICUIMC 2010: 13
[c238]Zhi-Hui Wang, Chin-Chen Chang, MingChu Li, Tzu-Chuen Lu: A simple image encoding method with data lossless information hiding. ICUIMC 2010: 44
[c237]Chin-Feng Lee, Chin-Chen Chang, Chun-Yu Wu: A reversible and multiple-layer embedding strategy with high capacity. ICUIMC 2010: 51
[c236]Chin-Chen Chang, Kuo-Nan Chen, Ming-Huang Hsieh: A Robust Public Watermarking Scheme Based on DWT. IIH-MSP 2010: 21-26
[e3]Tai-Hoon Kim, Alan Chin-Chen Chang, MingChu Li, Chunming Rong, Charalampos Z. Patrikakis, Dominik Slezak (Eds.): Communication and Networking - International Conference, FGCN 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings, Part I. Communications in Computer and Information Science 119, Springer 2010, ISBN 978-3-642-17586-2
2000 – 2009
- 2009
[j363]Chin-Chen Chang, Shih-Chang Chang, Jung-San Lee: An on-line electronic check system with mutual authentication. Computers & Electrical Engineering 35(5): 757-763 (2009)
[j362]Chin-Chen Chang, Chia-Yin Lee, Yen-Chang Chiu: Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications 32(4): 611-618 (2009)
[j361]Jen-Ho Yang, Chin-Chen Chang: An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Computers & Security 28(3-4): 138-143 (2009)
[j360]Tzungher Chen, Chin-Chen Chang, Chang-Sian Wu, Der-Chyuan Lou: On the security of a copyright protection scheme based on visual cryptography. Computer Standards & Interfaces 31(1): 1-5 (2009)
[j359]Hao-Chuan Tsai, Chin-Chen Chang, Kai-Jie Chang: Roaming across wireless local area networks using SIM-based authentication protocol. Computer Standards & Interfaces 31(2): 381-389 (2009)
[j358]Jung-San Lee, Chin-Chen Chang: Design of electronic t-out-of-n lotteries on the Internet. Computer Standards & Interfaces 31(2): 395-400 (2009)
[j357]Chin-Chen Chang, Ting-Fang Cheng: An efficient proxy raffle protocol with anonymity-preserving. Computer Standards & Interfaces 31(4): 772-778 (2009)
[j356]Chin-Chen Chang, Yung-Chen Chou: A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes. Fundam. Inform. 90(1-2): 17-26 (2009)
[j355]Chung-Chuan Wang, Chin-Chen Chang, Jinn-ke Jan: NovelWatermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel Patterns. Fundam. Inform. 90(1-2): 125-155 (2009)
[j354]Tzu-Chuen Lu, Chin-Chen Chang, Yi-Long Liu: An Information-Hiding Scheme Based on Quantization-Based Embedding Technique. Fundam. Inform. 91(3-4): 597-610 (2009)
[j353]Chin-Chen Chang, Tzungher Chen, Li-Jen Liu: Preventing Cheating in Computational Visual Cryptography. Fundam. Inform. 92(1-2): 27-42 (2009)
[j352]The Duc Kieu, Chin-Chen Chang: An Image Authentication Based on Discrete Fourier Transform. Fundam. Inform. 97(4): 369-379 (2009)
[j351]Jung-San Lee, Chin-Chen Chang: A Secure Multicast Framework in Large and High-Mobility Network Groups. IEICE Transactions 92-B(7): 2365-2373 (2009)
[j350]Che Wun Chiou, Chiou-Yng Lee, Jim-Min Lin, Ting-Wei Hou, Chin-Chen Chang: Concurrent error detection and correction in dual basis multiplier over GF(2m). IET Circuits, Devices & Systems 3(1): 22-40 (2009)
[j349]Jung-San Lee, Chi-Shiang Chan, Chin-Chen Chang: Non-iterative privacy preservation for online lotteries. IET Information Security 3(4): 139-147 (2009)
[j348]Chin-Chen Chang, Yi-Fang Cheng, Iuon-Chang Lin: A novel key management scheme for dynamic multicast communications. Int. J. Communication Systems 22(1): 53-66 (2009)
[j347]Iuon-Chang Lin, Chin-Chen Chang: A countable and time-bound password-based user authentication scheme for the applications of electronic commerce. Inf. Sci. 179(9): 1269-1277 (2009)
[j346]Chin-Chen Chang, Pei-Yu Lin, Jieh-Shan Yeh: Preserving robustness and removability for digital watermarks using subsampling and difference correlation. Inf. Sci. 179(13): 2283-2293 (2009)
[j345]
[j344]
[j343]Chi-Nan Lin, Chin-Chen Chang, Mien-Tsung Tsai: An Image Copyright Protection Scheme Using DCT and a Table Look-up Technique. JDIM 7(6): 358-364 (2009)
[j342]Fei Yu, Chin-Chen Chang, Deng-Yi Zhang, Jiexian Zeng, Jun Zhang: Editorial. Journal of Multimedia 4(3): 101-103 (2009)
[j341]Chin-Chen Chang, Jung-San Lee: Robust t-out-of-n oblivious transfer mechanism based on CRT. J. Network and Computer Applications 32(1): 226-235 (2009)
[j340]
[j339]Chin-Chen Chang, Yung-Chen Chou, Yi-Pei Hsieh: Search-order coding method with indicator-elimination property. Journal of Systems and Software 82(3): 516-525 (2009)
[j338]Zhi-Hui Wang, Chin-Chen Chang, Chia-Chen Lin, MingChu Li: A reversible information hiding scheme using left-right and up-down chinese character representation. Journal of Systems and Software 82(8): 1362-1369 (2009)
[j337]Jen-Ho Yang, Chin-Chen Chang: An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments. Journal of Systems and Software 82(9): 1497-1502 (2009)
[j336]The Duc Kieu, Chin-Chen Chang: A high stego-image quality steganographic scheme with reversibility and high payload using multiple embedding strategy. Journal of Systems and Software 82(10): 1743-1752 (2009)
[j335]
[j334]Chin-Chen Chang, Guei-Mei Chen, Chia-Chen Lin: Lossless Compression Schemes of Vector Quantization Indices Using State Codebook. JSW 4(4): 274-282 (2009)
[j333]Chin-Chen Chang, The Duc Kieu, Yung-Chen Chou: Reversible information hiding for VQ indices based on locally adaptive coding. J. Visual Communication and Image Representation 20(1): 57-64 (2009)
[j332]Charlie Irawan Tan, Cong-Kai Lin, Wen-Kai Tai, Chin-Chen Chang: Hiding data: a high-capacity distortionless approach. Multimedia Syst. 15(6): 325-336 (2009)
[j331]Pei-Yu Lin, Jung-San Lee, Chin-Chen Chang: Distortion-free secret image sharing mechanism using modulus operator. Pattern Recognition 42(5): 886-895 (2009)
[j330]Chin-Chen Chang, The Duc Kieu, Wen-Chuan Wu: A lossless data embedding technique by joint neighboring coding. Pattern Recognition 42(7): 1597-1603 (2009)
[j329]Chin-Chen Chang, Yi-Pei Hsieh: Authors reply 'Sharing secrets in stego images with authentication'. Pattern Recognition 42(7): 1620-1621 (2009)
[j328]Chin-Chen Chang, Chia-Chen Lin, T. Hoang Ngan Le, Hoai Bac Le: Sharing a verifiable secret image using two shadows. Pattern Recognition 42(11): 3097-3114 (2009)
[j327]Chin-Chen Chang, Yi-Hui Chen, Chia-Chen Lin: A data embedding scheme for color images based on genetic algorithm and absolute moment block truncation coding. Soft Comput. 13(4): 321-331 (2009)
[j326]Che Wun Chiou, Chin-Chen Chang, Chiou-Yng Lee, Ting-Wei Hou, Jim-Min Lin: Concurrent Error Detection and Correction in Gaussian Normal Basis Multiplier over GF(2^m). IEEE Trans. Computers 58(6): 851-857 (2009)
[j325]Jung-San Lee, Chin-Hao Chen, Chin-Chen Chang: A Novel Illumination-Balance Technique for Improving the Quality of Degraded Text-Photo Images. IEEE Trans. Circuits Syst. Video Techn. 19(6): 900-905 (2009)
[j324]Wei-Liang Tai, Chia-Ming Yeh, Chin-Chen Chang: Reversible Data Hiding Based on Histogram Modification of Pixel Differences. IEEE Trans. Circuits Syst. Video Techn. 19(6): 906-910 (2009)
[j323]Pei-Yu Lin, Jung-San Lee, Chin-Chen Chang: Dual Digital Watermarking for Internet Media Based on Hybrid Strategies. IEEE Trans. Circuits Syst. Video Techn. 19(8): 1169-1177 (2009)
[j322]Chin-Chen Chang, Chia-Chen Lin, T. Hoang Ngan Le, Hoai Bac Le: Self-verifying visual secret sharing using error diffusion and interpolation techniques. IEEE Transactions on Information Forensics and Security 4(4): 790-801 (2009)
[c235]Chin-Chen Chang, Shih-Yi Lin, Jen-Ho Yang: Efficient User Authentication and Key Establishment Protocols with Perfect Forward Secrecy for Mobile Devices. CIT (2) 2009: 131-135
[c234]
[c233]Zhao-Xia Yin, Chin-Chen Chang, Yan-Ping Zhang: A High Embedding Efficiency Steganography Scheme for Wet Paper Codes. IAS 2009: 611-614
[c232]Chin-Feng Lee, Kuo-Nan Chen, Chin-Chen Chang, Meng-Cheng Tsai: A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation. IAS 2009: 615-618
[c231]Chin-Feng Lee, Chin-Chen Chang, Tien-Chung Liu: A VSS Scheme of Image Size Invariant for Vertical Edge Enhancement. HIS (1) 2009: 13-16
[c230]Chin-Chen Chang, Yeu-Pong Lai: An Enhancement of JPEG Still Image Compression with Adaptive Linear Regression and Golomb-Rice Coding. HIS (3) 2009: 35-40
[c229]Chin-Chen Chang, Pei-Yu Lin, Jung-San Lee: A Self-Reference Watermarking Scheme Based on Wet Paper Coding. HIS (1) 2009: 228-233
[c228]Zhi-Hui Wang, MingChu Li, Mao-Hua Chen, Chin-Chen Chang: A New Intelligent Authorization Agent Model in Grid. HIS (1) 2009: 394-398
[c227]Chin-Feng Lee, Kuo-Hua Wang, Chin-Chen Chang, Yu-Lin Huang: A reversible data hiding scheme based on dual steganographic images. ICUIMC 2009: 228-237
[c226]Chin-Chen Chang, Shih-Chang Chang: The design of e-traveler's check with efficiency and mutual authentication. ICUIMC 2009: 309-316
[c225]Kuo-Nan Chen, Chin-Feng Lee, Chin-Chen Chang: Embedding secret messages based on chaotic map and Huffman coding. ICUIMC 2009: 336-341
[c224]Kuo-Nan Chen, Chin-Feng Lee, Chin-Chen Chang, Huang-Ching Lin: Embedding Secret Messages Using Modified Huffman Coding. IIH-MSP 2009: 278-281
[c223]Chin-Chen Chang, Chia-Chen Lin, Pei-Yan Pai, Yen-Chang Chen: A Novel Retinal Blood Vessel Segmentation Method Based on Line Operator and Edge Detector. IIH-MSP 2009: 299-302
[c222]Chin-Chen Chang, Chi-Shiang Chan, Zhi-Hui Wang, MingChu Li: Reversible Steganography for VQ Indices Using the Modified State Codebook. IIH-MSP 2009: 320-323
[c221]The Duc Kieu, Chin-Chen Chang, Zhi-Hui Wang, MingChu Li: Sharing Secrets and Reversibly Reconstructing the Cover Image Using Two Meaningful Shadows. IIH-MSP 2009: 324-327
[c220]Chi-Nan Lin, Chin-Chen Chang, Wei-Bin Lee, Jason Lin: A Novel Secure Data Hiding Scheme Using a Secret Reference Matrix. IIH-MSP 2009: 369-373
[c219]Chin-Chen Chang, Yung-Chen Chou, Ming-Huang Hsieh: A Simple and Efficient Data Hiding Scheme Suitable for Low Power Computation Environments. IIH-MSP 2009: 624-627
[c218]Yu-Wei Lai, Chin-Chen Chang, Shih-Chang Chang: Novel Efficient Electronic Voting Mechanism Based upon Elliptic Curve. IIH-MSP 2009: 898-901
[c217]Chin-Chen Chang, Chia-Yin Lee, Wei-Bin Lee: Cryptanalysis and Improvement of a Secure Authentication Scheme with Anonymity for Wireless Communications. IIH-MSP 2009: 902-904
[c216]Chin-Chen Chang, Yung-Chen Chou, Chia-Chen Lin: A Steganographic Scheme based on Wet Paper Codes Suitable for Uniformly Distributed Wet Pixels. ISCAS 2009: 501-504
[c215]Chin-Chen Chang, Yung-Chen Chou, The Duc Kieu: Information Hiding in Dual Images with Reversibility. MUE 2009: 145-152
[c214]Chin-Chen Chang, Hsien-Wen Tseng: Data Hiding in Images by Hybrid LSB Substitution. MUE 2009: 360-363
[e2]Dominik Slezak, Tai-Hoon Kim, Alan Chin-Chen Chang, Thanos Vasilakos, MingChu Li, Kouichi Sakurai (Eds.): Communication and Networking - International Conference, FGCN/ACN 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings. Communications in Computer and Information Science 56, Springer 2009, ISBN 978-3-642-10843-3- 2008
[j321]Hsing-Bai Chen, Tzungher Chen, Wei-Bin Lee, Chin-Chen Chang: Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks. Computer Standards & Interfaces 30(1-2): 95-99 (2008)
[j320]Yu-Chiang Li, Jieh-Shan Yeh, Chin-Chen Chang: Isolated items discarding strategy for discovering high utility itemsets. Data Knowl. Eng. 64(1): 198-217 (2008)
[j319]Chin-Chen Chang, Chih-Yang Lin, Yi-Pei Hsieh: Three-Phase Lossless Data Hiding Method for the VQ Index Table. Fundam. Inform. 82(1-2): 1-13 (2008)
[j318]Hui-Feng Huang, Chin-Chen Chang: A Novel Cryptographic Key Assignment Scheme with ID-Based Access Control in a Hierachy. Fundam. Inform. 84(3-4): 353-361 (2008)
[j317]Chin-Chen Chang, Yung-Chen Chou, The Duc Kieu: High Capacity Data Hiding for Grayscale Images. Fundam. Inform. 86(4): 435-446 (2008)
[j316]Chin-Chen Chang, Chia-Chen Lin, Yi-Hui Chen: Adaptive Data Embedding Scheme Based on Similar and Dissimilar Clustering Strategies. Fundam. Inform. 88(1-2): 23-45 (2008)
[j315]Yung-Chen Chou, Chin-Chen Chang, Kuan-Ming Li: A Large Payload Data Embedding Technique for Color Images. Fundam. Inform. 88(1-2): 47-61 (2008)
[j314]Chin-Chen Chang, Pei-Yu Lin: A Color Image Authentication Method Using Partitioned Palette and Morphological Operations. IEICE Transactions 91-D(1): 54-61 (2008)
[j313]Chih-Yang Lin, Chin-Chen Chang, Yu-Zheng Wang: Reversible Steganographic Method with High Payload for JPEG Images. IEICE Transactions 91-D(3): 836-845 (2008)
[j312]Chang-Chu Chen, Chin-Chen Chang: LSB-Based Steganography Using Reflected Gray Code. IEICE Transactions 91-D(4): 1110-1116 (2008)
[j311]Jen-Ho Yang, Chin-Chen Chang: Efficient residue number system iterative modular multiplication algorithm for fast modular exponentiation. IET Computers & Digital Techniques 2(1): 1-5 (2008)
[j310]Chin-Chen Chang, Chia-Chen Lin, Yi-Hui Chen: Reversible data-embedding scheme using differences between original and predicted pixel values. IET Information Security 2(2): 35-46 (2008)
[j309]Chin-Chen Chang, Yen-Ting Kuo, Wen-Kai Tai: Genetic-Based Approach for Synthesizing Texture. International Journal on Artificial Intelligence Tools 17(4): 731-743 (2008)
[j308]Chin-Chen Chang, Cheng-Yi Liu, Wen-Kai Tai: Feature alignment approach for hand posture recognition based on curvature scale space. Neurocomputing 71(10-12): 1947-1953 (2008)
[j307]Chin-Chen Chang, Chia-Chen Lin, Chia-Hsuan Lin, Yi-Hui Chen: A novel secret image sharing scheme in color images using small shadow images. Inf. Sci. 178(11): 2433-2447 (2008)
[j306]Chin-Chen Chang, Wen-Chuan Wu, Yi-Hui Chen: Joint coding and embedding techniques for multimedia images. Inf. Sci. 178(18): 3543-3556 (2008)
[j305]Tzu-Chuen Lu, Chin-Chen Chang: Lossless nibbled data embedding scheme based on difference expansion. Image Vision Comput. 26(5): 632-638 (2008)
[j304]Hsien-Wen Tseng, Chin-Chen Chang: An extended difference expansion algorithm for reversible watermarking. Image Vision Comput. 26(8): 1148-1153 (2008)
[j303]Chin-Feng Lee, Chin-Chen Chang, Kuo-Hua Wang: An improvement of EMD embedding method for large payloads by pixel segmentation strategy. Image Vision Comput. 26(12): 1670-1676 (2008)
[j302]
[j301]
[j300]
[j299]Chia-Chi Wu, Chin-Chen Chang, Iuon-Chang Lin: New Sealed-Bid Electronic Auction with Fairness, Security and Efficiency. J. Comput. Sci. Technol. 23(2): 253-264 (2008)
[j298]Chin-Chen Chang, The Duc Kieu, Yung-Chen Chou: Reversible Data Embedding for Color Images. JDIM 6(2): 143-150 (2008)
[j297]Chin-Chen Chang, Pei-Yu Lin: Adaptive watermark mechanism for rightful ownership protection. Journal of Systems and Software 81(7): 1118-1129 (2008)
[j296]Ming-Ni Wu, Chia-Chen Lin, Chin-Chen Chang: An embedding technique based upon block prediction. Journal of Systems and Software 81(9): 1505-1516 (2008)
[j295]
[j294]Chin-Chen Chang, Yi-Hsuan Fan, Wei-Liang Tai: Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 41(2): 654-661 (2008)
[j293]Chin-Chen Chang, Chih-Yang Lin, Yi-Hsuan Fan: Lossless data hiding for color images based on block truncation coding. Pattern Recognition 41(7): 2347-2357 (2008)
[j292]Yi-Pei Hsieh, Chin-Chen Chang, Li-Jen Liu: A two-codebook combination and three-phase block matching based image-hiding scheme with high embedding capacity. Pattern Recognition 41(10): 3104-3113 (2008)
[j291]Chin-Chen Chang, Yi-Pei Hsieh, Chia-Hsuan Lin: Sharing secrets in stego images with authentication. Pattern Recognition 41(10): 3130-3137 (2008)
[j290]Chia-Chen Lin, Wei-Liang Tai, Chin-Chen Chang: Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recognition 41(12): 3582-3591 (2008)
[j289]Jung-San Lee, Chin-Chen Chang: Preserving data integrity in mobile ad hoc networks with variant Diffie-Hellman protocol. Security and Communication Networks 1(4): 277-286 (2008)
[j288]Yu-Ting Tsai, Chin-Chen Chang, Qing-Zhen Jiang, Shr-Ching Weng: Importance sampling of products from illumination and BRDF using spherical radial basis functions. The Visual Computer 24(7-9): 817-826 (2008)
[j287]Chin-Chen Chang, Iuon-Chang Lin, Chia-Chen Lin: A Novel Location Tracking Scheme for Reducing Location Updating Traffic in a Personal Communication System. Wireless Personal Communications 44(2): 139-152 (2008)
[c213]Chin-Feng Lee, Lin-Yi Chuang, Chin-Chen Chang: Hiding Information Employing Reduplicating Embedding. APSCC 2008: 825-828
[c212]Chin-Chen Chang, Chin-Feng Lee, Yi-Ren Wang: An Improved EMD Embedding Scheme Based on Secret Image Difference. EUC (1) 2008: 129-135
[c211]Chin-Chen Chang, Wei-Liang Tai, Kuo-Nan Chen: Lossless Data Hiding Based on Histogram Modification for Image Authentication. EUC (1) 2008: 506-511
[c210]Chin-Chen Chang, The Duc Kieu, Yung-Chen Chou: Using nearest covering codes to embed secret information in grayscale images. ICUIMC 2008: 315-320
[c209]Chin-Chen Chang, Jung-San Lee, Ting-Fang Cheng: Security design for three-party encrypted key exchange protocol using smart cards. ICUIMC 2008: 329-333
[c208]Chin-Feng Lee, Yi-Ren Wang, Chin-Chen Chang: An adaptive EMD embedding method by condensing secret messages based on consecutive ones transformation and token substitution. ICUIMC 2008: 390-395
[c207]Chin-Feng Lee, Pei-Yan Pai, Wen-Hung Huang, Chin-Chen Chang: An Effective Demosaicking and Zooming Algorithm for CFA Images. IIH-MSP 2008: 1150-1153
[c206]Chin-Feng Lee, Chin-Chen Chang, Kuo-Hua Wang: Hiding Data in VQ-Compressed Images Using Pairwise Nearest Codewords Based on Minimum Spanning Tree. IIH-MSP 2008: 1293-1296
[c205]Jun-Chou Chuang, Chin-Chen Chang: An Image Authentication Scheme for Halftone Images Based upon Error Diffusion. IIH-MSP 2008: 1297-1300
[c204]Chin-Chen Chang, Chia-Chen Lin, T. Hoang Ngan Le, Hoai Bac Le: A New Probabilistic Visual Secret Sharing Scheme for Color Images. IIH-MSP 2008: 1305-1308
[c203]Jieh-Shan Yeh, Shang-Ru Yang, Chin-Chen Chang, Tzungher Chen: Assigning Keys in a Hierarchy. IIH-MSP 2008: 1363-1366
[c202]Iuon-Chang Lin, Chin-Chen Chang: A Novel Digital Signature Scheme for Application of Document Review in a Linearly Hierarchical Organization. IIH-MSP 2008: 1367-1370
[c201]Chin-Chen Chang, Shih-Chang Chang: An Improved Authentication Key Agreement Protocol Based on Elliptic Curve for Wireless Mobile Networks. IIH-MSP 2008: 1375-1378
[c200]Jen-Ho Yang, Chin-Chen Chang: Aryabhata Remainder Theorem for Moduli with Common Factors and Its Application in Information Protection Systems. IIH-MSP 2008: 1379-1382
[c199]Iuon-Chang Lin, Chin-Chen Chang, Jen-Ho Yang: An Efficient Proxy Signature Scheme for Realizing Generalized Proxy Signing Policy. IIH-MSP 2008: 1537-1540
[c198]Jing Li, Jung-San Lee, Chin-Chen Chang: Preserving PHI in Compliance with HIPAA Privacy/Security Regulations Using Cryptographic Techniques. IIH-MSP 2008: 1545-1548
[c197]Jen-Ho Yang, Chin-Chen Chang: Cryptanalysis of ID-Based Digital Signature Scheme on Elliptic Curve Cryptosystem. ISDA (3) 2008: 3-5
[c196]Chin-Chen Chang, Jung-San Lee: Security Enhancement of Ku-Wang Authenticated Key Agreement Protocol. ISDA (3) 2008: 467-471
[c195]Chin-Chen Chang, The Duc Kieu, Yung-Chen Chou: A High Payload Steganographic Scheme Based on (7, 4) Hamming Code for Digital Images. ISECS 2008: 16-21
[c194]Chin-Chen Chang, Chia-Chen Lin, T. Hoang Ngan Le, Hoai Bac Le: A Probabilistic Visual Secret Sharing Scheme for Grayscale Images with Voting Strategy. ISECS 2008: 184-188
[e1]Jeng-Shyang Pan, Ajith Abraham, Chin-Chen Chang (Eds.): Eighth International Conference on Intelligent Systems Design and Applications, ISDA 2008, 26-28 November 2008, Kaohsiung, Taiwan, 3 Volumes. IEEE Computer Society 2008, ISBN 978-0-7695-3382-7- 2007
[j286]Yu-Chiang Li, Jieh-Shan Yeh, Chin-Chen Chang: MICF: An effective sanitization algorithm for hiding sensitive patterns on data mining. Advanced Engineering Informatics 21(3): 269-280 (2007)
[j285]Ting-Fang Cheng, Jung-San Lee, Chin-Chen Chang: Security enhancement of an IC-card-based remote login mechanism. Computer Networks 51(9): 2280-2287 (2007)
[j284]Yuan-Hui Yu, Chin-Chen Chang, Iuon-Chang Lin: A new steganographic method for color and grayscale image hiding. Computer Vision and Image Understanding 107(3): 183-194 (2007)
[j283]Ya-Fen Chang, Chin-Chen Chang: Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy. Fundam. Inform. 76(1-2): 13-23 (2007)
[j282]Chin-Chen Chang, Chang-Chu Chen: Full-Searching-Equivalent Vector Quantization Using Two-Bounds Triangle Inequality. Fundam. Inform. 76(1-2): 25-37 (2007)
[j281]Chin-Chen Chang, Tzu-Chuen Lu, Jun-Bin Ya: VQ Codebook Searching Algorithm Based on Correlation Property. Fundam. Inform. 76(1-2): 39-57 (2007)
[j280]Chin-Chen Chang, Chih-Yang Lin, Chun-Sen Tseng: Secret Image Hiding and Sharing Based on the (t, n)-Threshold. Fundam. Inform. 76(4): 399-411 (2007)
[j279]Hsien-Chu Wu, Chin-Chen Chang: An Image Retrieval Method Based on Color-Complexity and Spatial-Histogram Features. Fundam. Inform. 76(4): 481-493 (2007)
[j278]Chin-Chen Chang, Wei-Liang Tai, Chia-Chen Lin: A Novel Image Hiding Scheme Based on VQ and Hamming Distance. Fundam. Inform. 77(3): 217-228 (2007)
[j277]Hsien-Wen Tseng, Chin-Chen Chang: Anti-Pseudo-Gray Coding for VQ Encoded Images over Noisy Channels. IEEE Communications Letters 11(5): 443-445 (2007)
[j276]Chin-Chen Chang, Yung-Chen Chou, Chih-Yang Lin: Reversible Data Hiding in the VQ-Compressed Domain. IEICE Transactions 90-D(9): 1422-1429 (2007)
[j275]Chin-Chen Chang, Wen-Chuan Wu, Chih-Chiang Tsou: Hiding Secret Information Using Adaptive Side-Match VQ. IEICE Transactions 90-D(10): 1678-1686 (2007)
[j274]Chiou-Yng Lee, Che Wun Chiou, Jim-Min Lin, Chin-Chen Chang: Scalable and systolic Montgomery multiplier over GF(2m) generated by trinomials. IET Circuits, Devices & Systems 1(6): 477-484 (2007)
[j273]Jung-San Lee, Chin-Chen Chang, Pen-Yi Chang: Anonymous authentication scheme for wireless communications. IJMC 5(5): 590-601 (2007)
[j272]Ya-Fen Chang, Chin-Chen Chang, Pei-Yu Lin: A Concealed t-out-of-n Signer Ambiguous Signature Scheme with Variety of Keys. Informatica, Lith. Acad. Sci. 18(4): 535-546 (2007)
[j271]Tzu-Chuen Lu, Chin-Chen Chang: Color image retrieval technique based on color features and image bitmap. Inf. Process. Manage. 43(2): 461-472 (2007)
[j270]Chin-Chen Chang, Chih-Yang Lin: Reversible steganographic method using SMVQ approach based on declustering. Inf. Sci. 177(8): 1796-1805 (2007)
[j269]Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng, Wei-Liang Tai: Reversible hiding in DCT-based compressed images. Inf. Sci. 177(13): 2768-2786 (2007)
[j268]Iuon-Chang Lin, Chin-Chen Chang: Security enhancement for digital signature schemes with fault tolerance in RSA. Inf. Sci. 177(19): 4031-4039 (2007)
[j267]Jau-Ji Shen, Chin-Chen Chang, Yu-Chiang Li: Combined association rules for dealing with missing values. J. Information Science 33(4): 468-480 (2007)
[j266]Chin-Chen Chang, Chih-Yang Lin, Keng-Chu Lin: Simple efficient mutual anonymity protocols for peer-to-peer network based on primitive roots. J. Network and Computer Applications 30(2): 662-676 (2007)
[j265]Jung-San Lee, Chin-Chen Chang: Secure communications for cluster-based ad hoc networks using node identities. J. Network and Computer Applications 30(4): 1377-1396 (2007)
[j264]Ming-Ni Wu, Chia-Chen Lin, Chin-Chen Chang: Novel image copy detection with rotating tolerance. Journal of Systems and Software 80(7): 1057-1069 (2007)
[j263]Chin-Chen Chang, Yu-Chiang Li, Wen-Hung Huang: TFRP: An efficient microaggregation algorithm for statistical disclosure control. Journal of Systems and Software 80(11): 1866-1878 (2007)
[j262]Ya-Lun Zeng, Charlie Irawan Tan, Wen-Kai Tai, Mau-Tsuen Yang, Cheng-Chin Chiang, Chin-Chen Chang: A momentum-based deformation system for granular material. Journal of Visualization and Computer Animation 18(4-5): 289-300 (2007)
[j261]Chin-Chen Chang, Wen-Chuan Wu, Yu-Chen Hu: Lossless recovery of a VQ index table with embedded secret data. J. Visual Communication and Image Representation 18(3): 207-216 (2007)
[j260]Chi-Shiang Chan, Chin-Chen Chang: An efficient image authentication method based on Hamming code. Pattern Recognition 40(2): 681-690 (2007)
[j259]Chin-Chen Chang, Yi-Pei Hsieh, Chih-Yang Lin: Lossless Data Embedding With High Embedding Capacity Based on Declustering for VQ-Compressed Codes. IEEE Transactions on Information Forensics and Security 2(3-1): 341-349 (2007)
[j258]Chin-Chen Chang, Wen-Chuan Wu: Fast Planar-Oriented Ripple Search Algorithm for Hyperspace VQ Codebook. IEEE Transactions on Image Processing 16(6): 1538-1547 (2007)
[j257]Iuon-Chang Lin, Chin-Chen Chang: A Practical Electronic Payment System for Message Delivery Service in the Mobile Environment. Wireless Personal Communications 42(2): 247-261 (2007)
[c193]Chia-Chi Wu, Chin-Chen Chang, Shang-Ru Yang: An Efficient Fragile Watermarking for Web Pages Tamper-Proof. APWeb/WAIM Workshops 2007: 654-663
[c192]Kuo-Lung Hung, Chin-Chen Chang: Recoverable Tamper Proofing Technique for Image Authentication Using Irregular Sampling Coding. ATC 2007: 333-343
[c191]Chin-Chen Chang, Yi-Fang Cheng, Iuon-Chang Lin: Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control. Inscrypt 2007: 457-462
[c190]Chin-Chen Chang, Yih-Shin Hu, Chia-Chen Lin: A Digital Watermarking Scheme Based on Singular Value Decomposition. ESCAPE 2007: 82-93
[c189]Chao-Wen Chan, Chin-Chen Chang: A New (t, n)-Threshold Scheme Based on Difference Equations. ESCAPE 2007: 94-106
[c188]Chin-Chen Chang, Pei-Yu Lin: Significance-Preserving Codebook Using Generic Algorithm. FSKD (3) 2007: 660-664
[c187]Chin-Chen Chang, Yung-Chen Chou, Tzu-Chuen Lu: A Semi-blind Watermarking Based on Discrete Wavelet Transform. ICICS 2007: 164-176
[c186]Ming-Ni Wu, Chia-Chen Lin, Chin-Chen Chang: Brain Tumor Detection Using Color-Based K-Means Clustering Segmentation. IIH-MSP 2007: 245-250
[c185]Chin-Chen Chang, The Duc Kieu: Secret Sharing and Information Hiding by Shadow Images. IIH-MSP 2007: 457-460
[c184]Chin-Chen Chang, Wei-Liang Tai, Kuo-Nan Chen: Improvements of EMD Embedding for Large Payloads. IIH-MSP 2007: 473-476
[c183]Chin-Chen Chang, The Duc Kieu: Reversible Data Embedding for Vector Quantization Indices. IIH-MSP 2007: 481-484
[c182]Chin-Chen Chang, Chin-Feng Lee, Lin-Yi Chuang: Using Dynamic Programming Strategy to Find an Optimal Solution to Exploiting Modification Direction Embedding Method. IIH-MSP 2007: 489-492
[c181]Chin-Feng Lee, Yi-Ren Wang, Chin-Chen Chang: A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction. IIH-MSP 2007: 497-500
[c180]Chung-Chuan Wang, Chin-Chen Chang, Jinn-ke Jan, Iuon-Chang Lin: A Flexible Fragile Watermarking Scheme for Binary Images with Reversibility. IIH-MSP 2007: 501-504
[c179]Chin-Chen Chang, Yung-Chen Chou: High Payload Data Embedding with Hybrid Strategy. IIH-MSP 2007: 505-508
[c178]Chi-Nan Lin, Chin-Chen Chang: A Best-pair-first Capacity-distortion Control for Data Hiding on VQ Compression Domain. IIH-MSP 2007: 509-514
[c177]Chang-Chu Chen, Chin-Chen Chang: Secret Image Sharing Using Quadratic Residues. IIH-MSP 2007: 515-518
[c176]Chin-Chen Chang, Yu-Wei Su, Iuon-Chang Lin: A broadcast-encryption-based key management scheme for dynamic multicast communications work-in-progress. Infoscale 2007: 69
[c175]Kai-Jie Chang, Chin-Chen Chang: An e-mail signature protocol for anti-spam work-in-progress. Infoscale 2007: 70
[c174]
[c173]Chin-Chen Chang, Wen-Chuan Wu: Reversible Quantization-Index Modulation Using Neighboring Correlation. IWDW 2007: 222-232
[c172]Chin-Chen Chang, Chih-Yang Lin, Yu-Zheng Wang: A High Payload VQ Steganographic Method for Binary Images. IWDW 2007: 467-481
[c171]Chin-Chen Chang, Yi-Hui Chen, Yung-Chen Chou: Reversible Data Embedding Technique for Palette Images Using De-clustering. MCAM 2007: 130-139
[c170]Chung-Chuan Wang, Chin-Chen Chang, Xinpeng Zhang, Jinn-ke Jan: Senary Huffman Compression - A Reversible Data Hiding Scheme for Binary Images. MCAM 2007: 351-360
[c169]Chin-Chen Chang, Chih-Yang Lin: Density-Based Image Vector Quantization Using a Genetic Algorithm. MMM (1) 2007: 289-298
[c168]Chi-Shiang Chan, Chin-Chen Chang: A Color Image Hiding Scheme Based on SMVQ and Modulo Operator. MMM (2) 2007: 461-470
[c167]Chin-Chen Chang, Chu-Hsing Lin, Chien-Yuan Chen: A Conference Key Distribution Scheme Using Interpolating Polynomials. MUE 2007: 963-967
[c166]Hui-Feng Huang, Chin-Chen Chang: An Efficient Key-Lock-Pair Mechanism Based on Division Algorithm. MUE 2007: 982-986
[c165]Chin-Chen Chang, Hao-Chuan Tsai, Yi-Hui Chen: An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards. MUE 2007: 1210-1215
[c164]Jieh-Shan Yeh, Yu-Chiang Li, Chin-Chen Chang: Two-Phase Algorithms for a Novel Utility-Frequent Mining Model. PAKDD Workshops 2007: 433-444
[c163]Chin-Chen Chang, Chih-Chiang Tsou, Yung-Chen Chou: A Remediable Image Authentication Scheme Based on Feature Extraction and Clustered VQ. PCM 2007: 446-449
[c162]Yuan-Hui Yu, Chin-Chen Chang, Yu-Chen Hu: Improved JPEG Scheme Based on Adaptive Block Encoding. SITIS 2007: 645-651
[c161]Chin-Chen Chang, Tai-Xing Yu, Hsuan-Yen Yen: Paper Currency Verification with Support Vector Machines. SITIS 2007: 860-865
[p2]Chin-Chen Chang, Tzu-Chuen Lu, Yi-Hsuan Fan: A Bit-Level Visual Secret Sharing Scheme for Multi-Secret Images Using Rotation and Reversion Operatations. Intelligent Multimedia Data Hiding: New Directions 2007: 83-101
[p1]Chin-Chen Chang, Yu-Zheng Wang, Yu-Chen Hu: Adaptive Data Hiding Scheme for Palette Images. Intelligent Multimedia Data Hiding: New Directions 2007: 103-122- 2006
[j256]Chin-Chen Chang, Yeu-Pong Lai: A division algorithm for residue numbers. Applied Mathematics and Computation 172(1): 368-378 (2006)
[j255]Chin-Chen Chang, Yeu-Pong Lai: A parallel residue-to-binary conversion algorithm without trial division. Computers & Electrical Engineering 32(6): 454-467 (2006)
[j254]Chin-Chen Chang, Jung-San Lee: An anonymous voting mechanism based on the key exchange protocol. Computers & Security 25(4): 307-314 (2006)
[j253]Chin-Chen Chang, Jun-Chou Chuang, Yu-Chen Hu: Spatial Domain Image Hiding Scheme Using Pixel-Values Differencing. Fundam. Inform. 70(3): 171-184 (2006)
[j252]Chin-Chen Chang, Chih-Yang Lin, Henry Chou: Perfect Hashing Schemes for Mining Traversal Patterns. Fundam. Inform. 70(3): 185-202 (2006)
[j251]Yu-Chen Hu, Chin-Chen Chang: An Improved Tree-Structured Codebook Search Algorithm for Grayscale Image Compression. Fundam. Inform. 70(3): 251-260 (2006)
[j250]Chin-Chen Chang, Guei-Mei Chen, Yu-Chen Hu: A Novel Index Coding Scheme for Vector Quantization. Fundam. Inform. 71(2-3): 215-227 (2006)
[j249]Ming-Ni Wu, Chia-Chen Lin, Chin-Chen Chang: A Robust Content-Based Copy Detection Scheme. Fundam. Inform. 71(2-3): 351-366 (2006)
[j248]Chia-Chen Lin, Yu-Chen Hu, Chin-Chen Chang: A Novel Image Ownership Protection Scheme Based on Rehashing Concept and Vector Quantization. Fundam. Inform. 71(4): 443-451 (2006)
[j247]Chin-Chen Chang, Chih-Yang Lin: Reversible Data Embedding Based on Prediction Approach for VQ and SMVQ Compressed Images. Fundam. Inform. 74(2-3): 189-207 (2006)
[j246]Ya-Fen Chang, Jung-San Lee, Chin-Chen Chang: A secure and efficient authentication scheme for mobile users. IJMC 4(5): 581-594 (2006)
[j245]Chin-Chen Chang, Iuon-Chang Lin, Chia-Te Liao: An Access Control System with Time-constraint Using Support Vector Machines. I. J. Network Security 2(2): 150-159 (2006)
[j244]Chin-Chen Chang: Adaptive multiple sets of CSS features for hand posture recognition. Neurocomputing 69(16-18): 2017-2025 (2006)
[j243]Chin-Chen Chang, Chia-Te Liao: An image coding scheme using SMVQ and support vector machines. Neurocomputing 69(16-18): 2327-2335 (2006)
[j242]Hui-Feng Huang, Chin-Chen Chang: A novel efficient (t, n) threshold proxy signature scheme. Inf. Sci. 176(10): 1338-1349 (2006)
[j241]Chin-Chen Chang, Chih-Yang Lin, Yu-Zheng Wang: New image steganographic methods using run-length approach. Inf. Sci. 176(22): 3393-3408 (2006)
[j240]Yuan-Hui Yu, Chin-Chen Chang: A new edge detection approach based on image context analysis. Image Vision Comput. 24(10): 1090-1102 (2006)
[j239]Chin-Chen Chang, Jiann-Jone Chen, Wen-Kai Tai, Chin-Chuan Han: New Approach for Static Gesture Recognition. J. Inf. Sci. Eng. 22(5): 1047-1057 (2006)
[j238]Chin-Chen Chang, Tzu-Chuen Lu: Reversible index-domain information hiding scheme based on side-match vector quantization. Journal of Systems and Software 79(8): 1120-1129 (2006)
[j237]Hsien-Wen Tseng, Chin-Chen Chang: Error resilient locally adaptive data compression. Journal of Systems and Software 79(8): 1156-1160 (2006)
[j236]Chin-Chen Chang, Tzu-Chuen Lu: A difference expansion oriented data hiding scheme for restoring the original host images. Journal of Systems and Software 79(12): 1754-1766 (2006)
[j235]Chin-Chen Chang, Chi-Shiang Chan, Yi-Hsuan Fan: Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels. Pattern Recognition 39(6): 1155-1167 (2006)
[j234]Chin-Chen Chang, Yih-Shin Hu, Tzu-Chuen Lu: A watermarking-based image ownership and tampering authentication scheme. Pattern Recognition Letters 27(5): 439-446 (2006)
[j233]Chin-Chen Chang, Yu-Chiang Li, Jun-Bin Yeh: Fast codebook search algorithms based on tree-structured vector quantization. Pattern Recognition Letters 27(10): 1077-1086 (2006)
[j232]Chin-Chen Chang, Chi-Shiang Chan, Chun-Sen Tseng: Removing blocking effects using an artificial neural network. Signal Processing 86(9): 2381-2387 (2006)
[j231]Chin-Chen Chang, Wei-Liang Tai, Chia-Chen Lin: A Reversible Data Hiding Scheme Based on Side Match Vector Quantization. IEEE Trans. Circuits Syst. Video Techn. 16(10): 1301-1308 (2006)
[j230]Chin-Chen Chang, Chih-Yang Lin: Reversible Steganography for VQ-Compressed Images Using Side Matching and Relocation. IEEE Transactions on Information Forensics and Security 1(4): 493-501 (2006)
[j229]Chin-Chen Chang, Iuon-Chang Lin: A new solution for assigning cryptographic keys to control access in mobile agent environments. Wireless Communications and Mobile Computing 6: 137-146 (2006)
[c160]Ya-Fen Chang, Chin-Chen Chang: Enhanced Anonymous Auction Protocols with Freewheeling Bids. AINA (1) 2006: 353-358
[c159]Ya-Fen Chang, Chin-Chen Chang, Yu-Wei Su: A secure improvement on the user-friendly remote authentication scheme with no time concurrency mech. AINA (2) 2006: 741-745
[c158]Iuon-Chang Lin, Chin-Chen Chang: An Efficient Fault-Tolerant Digital Signature Scheme Based on the Discrete Logarithm Problem. ATC 2006: 601-610
[c157]Chin-Chen Chang, Chi-Shiang Chan, Yi-Hsuan Fan: A Secret Image Sharing Scheme Based on Vector Quantization Mechanism. EUC 2006: 469-478
[c156]Hui-Feng Huang, Chin-Chen Chang: An Untraceable Electronic Cash System Using Fair Blind Signatures. ICEBE 2006: 39-46
[c155]
[c154]Chin-Chen Chang, Wei-Liang Tai, Chia-Chen Lin: A Multipurpose Wavelet-Based Image Watermarking. ICICIC (3) 2006: 70-73
[c153]Chin-Chen Chang, Kuo-Lung Hung: An Efficient Euclidean Distance Estimation Scheme for Accelerating VQ Encoding. ICICIC (1) 2006: 194-196
[c152]Chin-Chen Chang, Yung-Chen Chou, Jau-Ji Shen: A Discrete Wavelet Transform Based State-Codebook Search Algorithm for Vector Quantization. ICICIC (1) 2006: 197-200
[c151]Chin-Chen Chang, Tung-Shou Chen, Hsien-Chu Hsia: An ImageWatermarking Scheme Using Pattern Coding Technique. ICICIC (3) 2006: 467-470
[c150]Ming-Ni Wu, Chia-Chen Lin, Chin-Chen Chang: A Fast Wavelet-Based Image Progressive Transmission Method Based on Vector Quantization. ICICIC (2) 2006: 677-680
[c149]Chin-Chen Chang, Tzu-Chuen Lu: A Wavelet-Based Progressive Digital Image Transmission Scheme. ICICIC (2) 2006: 681-684
[c148]Timothy K. Shih, Chin-Chen Chang, Hsiau Wen Lin: Reusability on Learning Object Repository. ICWL 2006: 203-214
[c147]Chung-Chuan Wang, Chin-Chen Chang, Jinn-ke Jan, Jieh-Shan Yeh: Novel Steganographic Schemes Based on Row-Major Mapping Relation. IIH-MSP 2006: 392-395
[c146]Chin-Chen Chang, Yung-Chen Chang, Jau-Ji Shen: A Heuristic Method for Extracting Enhanced Watermarks from Digital Images. IIH-MSP 2006: 453-456
[c145]Chin-Chen Chang, Yi-Hui Chen, Kuan-Ming Li: Improved SMVQ Scheme with Edge-Directed Prediction. IIH-MSP 2006: 541-544
[c144]

