default search action
Chia-Chen Lin 0001
Person information
- unicode name: 林家禎
- affiliation: Providence University, Department of Computer Science and Information Management, Taichung, Taiwan
- affiliation: National Chin-Yi University of Technology, Department of Computer Science and Information Engineering, Taichung, Taiwan
Other persons with the same name
- Chia-Chen Lin 0002 — National Taiwan University, Department of Mechanical Engineering, Taipei , Taiwan
- Chia-Chen Lin 0003 — National Kaohsiung University of Science and Technology, College of Engineering, Taiwan
- Min-Hui Lin 0002 — National Sun Yat-sen University, Department of Electrical Engineering, Kaohsiung, Taiwan
- Min-Hui Lin 0003 — Qualcomm AI Research
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j108]Ishaya Peni Gambo, Rhodes Massenon, Chia-Chen Lin, Roseline Oluwaseun Ogundokun, Saurabh Agarwal, Wooguil Pak:
Enhancing User Trust and Interpretability in AI-Driven Feature Request Detection for Mobile App Reviews: An Explainable Approach. IEEE Access 12: 114023-114045 (2024) - [j107]Sumit Singh Dhanda, Brahmjit Singh, Chia-Chen Lin, Poonam Jindal, Deepak Panwar, Tarun Kumar Sharma, Saurabh Agarwal, Wooguil Pak:
A Fast and Efficient 191-bit Elliptic Curve Cryptographic Processor Using a Hybrid Karatsuba Multiplier for IoT Applications. IEEE Access 12: 144304-144315 (2024) - [j106]Kai Gao, Chin-Chen Chang, Chia-Chen Lin:
Key-Free Image Encryption Algorithm Based on Self-Triggered Gaussian Noise Sampling. IEEE Access 12: 153274-153284 (2024) - [j105]Kai Gao, Chin-Chen Chang, Chia-Chen Lin:
Multiple Perspective of Multipredictor Mechanism and Multihistogram Modification for High-Fidelity Reversible Data Hiding. Comput. Syst. Sci. Eng. 48(3): 813-833 (2024) - [j104]Yijie Lin, Chia-Chen Lin, Jui-Chuan Liu, Chin-Chen Chang:
Verifiable (t, n) Secret Image Sharing Scheme Based on Slim Turtle Shell Matrix. J. Inf. Secur. Appl. 80: 103679 (2024) - [j103]Meenakshi Malhotra, Savita Walia, Chia-Chen Lin, Inderdeep Kaur Aulakh, Saurabh Agarwal:
A systematic scrutiny of artificial intelligence-based air pollution prediction techniques, challenges, and viable solutions. J. Big Data 11(1): 142 (2024) - [j102]Guo-Dong Su, Chin-Chen Chang, Chia-Chen Lin:
An effective compressed image authentication scheme based on N-variant AMBTC. Multim. Tools Appl. 83(2): 3801-3829 (2024) - [j101]Chia-Chen Lin, Bohan Zhang, Wei-Liang Tai, Pei-Feng Shiu, Jinn-Ke Jan:
A High-Payload Data Hiding Scheme Based on Absolute Moment Block Truncation Coding for Minimizing Hiding Impact. Symmetry 16(1): 64 (2024) - [j100]Guo-Dong Su, Ching-Chun Chang, Chia-Chen Lin, Chin-Chen Chang:
Towards property-preserving JPEG encryption with structured permutation and adaptive group differentiation. Vis. Comput. 40(9): 6421-6447 (2024) - 2023
- [j99]Arun Kumar Rai, Hari Om, Satish Chand, Chia-Chen Lin:
High-Capacity Reversible Data Hiding Based on Two-Layer Embedding Scheme for Encrypted Image Using Blockchain. Comput. 12(6): 120 (2023) - [j98]Shadab Khan, Yash Veer Singh, Prasant Singh Yadav, Vishnu Sharma, Chia-Chen Lin, Ki-Hyun Jung:
An Intelligent Bio-Inspired Autonomous Surveillance System Using Underwater Sensor Networks. Sensors 23(18): 7839 (2023) - [j97]Kai Gao, Chin-Chen Chang, Chia-Chen Lin:
Cryptanalysis of Reversible Data Hiding in Encrypted Images Based on the VQ Attack. Symmetry 15(1): 189 (2023) - [c45]Chia-Chen Lin, Hizrawan Dwi Oka, Enting Zhu:
A Novel Data Hiding Scheme based on Block Features Enhanced AMBTC. ASSE 2023: 112-118 - [c44]Yan-Heng Lin, Yu-Tse Tsan, Yu-Wei Chan, Chih-Hung Chang, Chia-Chen Lin, Hsuan-Fu Wang:
Implementation of a Quality Evaluation System for Chest Compression based on OpenPose Model. ICCE-Taiwan 2023: 583-584 - [c43]Jui-Chuan Liu, Chin-Chen Chang, Chia-Chen Lin:
Hiding Information in a Well-Trained Vector Quantization Codebook. SPML 2023: 287-292 - 2022
- [j96]Chia-Chen Lin, Chin-Chen Chang, Wei-Jiun Kao, Jui-Feng Chang:
Efficient Electronic Patient Information Hiding Scheme With Tamper Detection Function for Medical Images. IEEE Access 10: 18470-18485 (2022) - [j95]Xu Wang, Ching-Chun Chang, Chia-Chen Lin, Chin-Chen Chang:
Reversal of pixel rotation: A reversible data hiding system towards cybersecurity in encrypted images. J. Vis. Commun. Image Represent. 82: 103421 (2022) - [j94]Xu Wang, Ching-Chun Chang, Chia-Chen Lin, Chin-Chen Chang:
On the multi-level embedding of crypto-image reversible data hiding. J. Vis. Commun. Image Represent. 87: 103556 (2022) - [j93]Chia-Chen Lin, Xiaolong Liu, Jianjie Zhou, Chuan Yi Tang:
An image authentication and recovery scheme based on turtle Shell algorithm and AMBTC-compression. Multim. Tools Appl. 81(27): 39431-39452 (2022) - [j92]Chin-Chen Chang, Guo-Dong Su, Chia-Chen Lin, Yung-Hui Li:
Position-Aware Guided Hiding Data Scheme with Reversibility and Adaptivity for Dual Images. Symmetry 14(3): 509 (2022) - [c42]Chia-Chen Lin, Enting Zhu:
Adaptive Boundary Reference-based Dual-Images Reversible Data Hiding Scheme. ICCE-TW 2022: 1-2 - 2021
- [j91]Lin Li, Alan Chin-Chen Chang, Chia-Chen Lin:
Reversible Data Hiding in Encrypted Image Based on (7, 4) Hamming Code and UnitSmooth Detection. Entropy 23(7): 790 (2021) - [j90]Xu Wang, Chin-Chen Chang, Chia-Chen Lin:
Reversible data hiding in encrypted images with block-based adaptive MSB encoding. Inf. Sci. 567: 375-394 (2021) - [j89]Xu Wang, Ching-Chun Chang, Chia-Chen Lin, Chin-Chen Chang:
Privacy-preserving reversible data hiding based on quad-tree block encoding and integer wavelet transform. J. Vis. Commun. Image Represent. 79: 103203 (2021) - [j88]Chia-Chen Lin, Si-Liang He, Chin-Chen Chang:
Pixel-based fragile image watermarking based on absolute moment block truncation coding. Multim. Tools Appl. 80(19): 29497-29518 (2021) - [j87]Xu Wang, Chin-Chen Chang, Chia-Chen Lin:
High capacity reversible data hiding in encrypted images based on prediction error and block classification. Multim. Tools Appl. 80(19): 29915-29937 (2021) - [j86]Sisheng Chen, Chin-Chen Chang, Chia-Chen Lin:
Reversible data hiding in encrypted images based on homomorphism and block-based congruence transformation. Multim. Tools Appl. 80(21): 33115-33138 (2021) - [j85]Chin-Chen Chang, Xu Wang, Chia-Chen Lin:
An efficient dual prediction-based reversible data hiding and reduced code method for AMBTC. Multim. Tools Appl. 80(24): 33157-33176 (2021) - [j84]Chin-Chen Chang, Xu Wang, Chia-Chen Lin:
Correction to: An efficient dual prediction-based reversible data hiding and reduced code method for AMBTC. Multim. Tools Appl. 80(24): 33177 (2021) - [j83]Chia-Chen Lin, Thai-Son Nguyen, Chin-Chen Chang:
LRW-CRDB: Lossless Robust Watermarking Scheme for Categorical Relational Databases. Symmetry 13(11): 2191 (2021) - [c41]Chin-Chen Chang, Thai-Son Nguyen, Chia-Chen Lin:
A Reversible Database Watermark Scheme for Textual and Numerical Datasets. SNPD 2021: 208-212 - 2020
- [j82]Xiao-Zhu Xie, Chin-Chen Chang, Chia-Chen Lin:
A Hybrid Reversible Data Hiding for Multiple Images With High Embedding Capacity. IEEE Access 8: 37-52 (2020) - [j81]Guo-Dong Su, Chin-Chen Chang, Chia-Chen Lin:
A High Capacity Reversible Data Hiding in Encrypted AMBTC-Compressed Images. IEEE Access 8: 26984-27000 (2020) - [j80]Zhan Yu, Chia-Chen Lin, Chin-Chen Chang:
ABMC-DH: An Adaptive Bit-Plane Data Hiding Method Based on Matrix Coding. IEEE Access 8: 27634-27648 (2020) - [j79]Guo-Dong Su, Chin-Chen Chang, Chia-Chen Lin:
Effective Self-Recovery and Tampering Localization Fragile Watermarking for Medical Images. IEEE Access 8: 160840-160857 (2020) - [j78]Guo-Dong Su, Chin-Chen Chang, Chia-Chen Lin, Zhi-Qiang Yao:
Secure high capacity tetris-based scheme for data hiding. IET Image Process. 14(17): 4633-4645 (2020) - [j77]Chin-Chen Chang, Guo-Dong Su, Chia-Chen Lin:
An improved Sudoku-based data hiding scheme using greedy method. Int. J. Comput. Sci. Eng. 23(1): 10-21 (2020) - [j76]Xiao-Shuang Li, Chin-Chen Chang, Mingxing He, Chia-Chen Lin:
A lightweight authenticable visual secret sharing scheme based on turtle shell structure matrix. Multim. Tools Appl. 79(1-2): 453-476 (2020) - [j75]Xu Wang, Chin-Chen Chang, Chia-Chen Lin:
Adaptive reversible data hiding scheme for AMBTC compressed images. Multim. Tools Appl. 79(9-10): 6547-6568 (2020) - [j74]Chin-Chen Chang, Chia-Chen Lin, Guo-Dong Su:
An effective image self-recovery based fragile watermarking using self-adaptive weight-based compressed AMBTC. Multim. Tools Appl. 79(33-34): 24795-24824 (2020) - [j73]Chia-Chen Lin, Chin-Chen Chang, Yao-Zhu Zheng:
A Ring Signature Based Anonymity Authentication Scheme for Group Medical Consultation. Symmetry 12(12): 2009 (2020)
2010 – 2019
- 2019
- [j72]Xiaolong Liu, Chia-Chen Lin, Khan Muhammad, Fadi Al-Turjman, Shyan-Ming Yuan:
Joint Data Hiding and Compression Scheme Based on Modified BTC and Image Inpainting. IEEE Access 7: 116027-116037 (2019) - [j71]Zhan Yu, Chia-Chen Lin, Chin-Chen Chang, Guo-Dong Su:
HBF-DH: An Enhanced Payload Hybrid Data Hiding Method Based on a Hybrid Strategy and Block Features. IEEE Access 7: 148439-148452 (2019) - [j70]Chih-Cheng Chen, Chin-Chen Chang, Chia-Chen Lin, Guo-Dong Su:
TSIA: A Novel Image Authentication Scheme for AMBTC-Based Compressed Images Using Turtle Shell Based Reference Matrix. IEEE Access 7: 149515-149526 (2019) - [j69]Xiao-Zhu Xie, Chin-Chen Chang, Chia-Chen Lin:
Reversibility-oriented secret image sharing mechanism with steganography and authentication based on code division multiplexing. IET Image Process. 13(9): 1411-1420 (2019) - [j68]Xiao-Shuang Li, Chin-Chen Chang, Mingxing He, Chia-Chen Lin:
Secure High Capacity Data Hiding Scheme based on Reference Matrix. Int. J. Netw. Secur. 21(6): 918-929 (2019) - [j67]Xiaozhu Xie, Chia-Chen Lin, Chin-Chen Chang:
A reversible data hiding scheme for JPEG images by doubling small quantized AC coefficients. Multim. Tools Appl. 78(9): 11443-11462 (2019) - [j66]Xiaozhu Xie, Chin-Chen Chang, Chia-Chen Lin, Jia-Long Lin:
A Turtle Shell based RDH scheme with two-dimensional histogram shifting. Multim. Tools Appl. 78(14): 19413-19436 (2019) - [j65]Pei-Feng Shiu, Wei-Liang Tai, Jinn-Ke Jan, Chin-Chen Chang, Chia-Chen Lin:
An Interpolative AMBTC-based high-payload RDH scheme for encrypted images. Signal Process. Image Commun. 74: 64-77 (2019) - [j64]Yan-Hong Chen, Chin-Chen Chang, Chia-Chen Lin, Cheng-Yi Hsu:
Content-Based Color Image Retrieval Using Block Truncation Coding Based on Binary Ant Colony Optimization. Symmetry 11(1): 21 (2019) - [j63]Lin Li, Chia-Chen Lin, Chin-Chen Chang:
Using Two Meaningful Shadows to Share Secret Messages with Reversibility. Symmetry 11(1): 79 (2019) - [j62]Chia-Chen Lin, Ching-Chun Chang, Zhi-Ming Wang:
Reversible Data Hiding Scheme Using Adaptive Block Truncation Coding Based on an Edge-Based Quantization Approach. Symmetry 11(6): 765 (2019) - [j61]Guo-Dong Su, Chin-Chen Chang, Chia-Chen Lin:
High-Precision Authentication Scheme Based on Matrix Encoding for AMBTC-Compressed Images. Symmetry 11(8): 996 (2019) - [j60]Juan Lin, Chia-Chen Lin, Chin-Chen Chang:
Reversible Steganographic Scheme for AMBTC-Compressed Image Based on (7, 4) Hamming Code. Symmetry 11(10): 1236 (2019) - [c40]Sifei Zheng, Xiaolong Liu, Riqing Chen, Shyan-Ming Yuan, Chia-Chen Lin:
LSB-Based Visual Image Encryption Scheme in Cloud Environment. ISPA/BDCloud/SocialCom/SustainCom 2019: 891-896 - 2018
- [j59]Chin-Chen Chang, Yi-Ping Chiu, Chia-Chen Lin, Yi-Hui Chen:
Distortion Free Progressive BTC based Secret Image Sharing. J. Netw. Intell. 3(3): 195-213 (2018) - [j58]Pei-Feng Shiu, Chia-Chen Lin, Jinn-Ke Jan, Ya-Fen Chang:
A DCT-based Robust Watermarking Scheme Surviving JPEG Compression with Voting Strategy. J. Netw. Intell. 3(4): 259-277 (2018) - [j57]Chin-Chen Chang, Ran Tang, Chia-Chen Lin, Wan-Li Lyu:
High-Capacity Reversible Data Hiding Method for JPEG Images. J. Softw. 13(1): 1-17 (2018) - [j56]Xiaozhu Xie, Chia-Chen Lin, Chin-Chen Chang:
Data Hiding Based on a Two-Layer Turtle Shell Matrix. Symmetry 10(2): 47 (2018) - [j55]Xiaolong Liu, Chia-Chen Lin, Shyan-Ming Yuan:
Blind Dual Watermarking for Color Images' Authentication and Copyright Protection. IEEE Trans. Circuits Syst. Video Technol. 28(5): 1047-1055 (2018) - 2017
- [j54]Chia-Chen Lin, Yuehong Huang, Wei-Liang Tai:
A novel hybrid image authentication scheme based on absolute moment block truncation coding. Multim. Tools Appl. 76(1): 463-488 (2017) - 2016
- [j53]Chin-Chen Chang, Thai Son Nguyen, Meng-Chieh Lin, Chia-Chen Lin:
A novel data-hiding and compression scheme based on block classification of SMVQ indices. Digit. Signal Process. 51: 142-155 (2016) - [j52]Hong Zhong, Haiquan Liu, Chin-Chen Chang, Chia-Chen Lin:
A Novel Fragile Watermark-Based Image Authentication Scheme for AMBTC-Compressed Images. J. Inf. Hiding Multim. Signal Process. 7(2): 362-375 (2016) - [j51]Xiao-Long Liu, Chia-Chen Lin, Chin-Chen Chang, Shyan-Ming Yuan:
A Survey of Fragile Watermarking-based Image Authentication Techniques. J. Inf. Hiding Multim. Signal Process. 7(6): 1282-1292 (2016) - [j50]Chin-Chen Chang, Thai Son Nguyen, Chia-Chen Lin:
A new distortion-free data embedding scheme for high-dynamic range images. Multim. Tools Appl. 75(1): 145-163 (2016) - [j49]Wei Li, Chia-Chen Lin, Jeng-Shyang Pan:
Novel image authentication scheme with fine image quality for BTC-based compressed images. Multim. Tools Appl. 75(8): 4771-4793 (2016) - 2015
- [j48]Chia-Chen Lin, Xiao-Long Liu, Shyan-Ming Yuan:
Reversible data hiding for VQ-compressed images based on search-order coding and state-codebook mapping. Inf. Sci. 293: 314-326 (2015) - [j47]Chin-Chen Chang, Thai Son Nguyen, Chia-Chen Lin:
A reversible compression code hiding using SOC and SMVQ indices. Inf. Sci. 300: 85-99 (2015) - [j46]Chin-Chen Chang, Chia-Chen Lin, Chih-Yang Lin:
Compressing Vector Quantization Index Table Using Side Match State Codebook. J. Inf. Hiding Multim. Signal Process. 6(1): 47-58 (2015) - [j45]Wan-Li Lyu, Chin-Chen Chang, Yeh-Chieh Chou, Chia-Chen Lin:
Hybrid Color Image Steganography Method Used for Copyright Protection and Content Authentication. J. Inf. Hiding Multim. Signal Process. 6(4): 686-696 (2015) - [j44]Chia-Chen Lin, Xiao-Long Liu, Wei-Liang Tai, Shyan-Ming Yuan:
A novel reversible data hiding scheme based on AMBTC compression technique. Multim. Tools Appl. 74(11): 3823-3842 (2015) - [c39]Chia-Chen Lin, Cheng-Han Lin, Xiao-Long Liu, Shyan-Ming Yuan:
Fragile Watermarking-Based Authentication Scheme for Demosaicked Images. IIH-MSP 2015: 97-100 - 2014
- [j43]Chin-Chen Chang, Thai Son Nguyen, Chia-Chen Lin:
Reversible Image Hiding for High Image Quality Based on Histogram Shifting and Local Complexity. Int. J. Netw. Secur. 16(3): 201-213 (2014) - [j42]Chin-Chen Chang, Thai Son Nguyen, Chia-Chen Lin:
Reversible Data Hiding Scheme for VQ Indices Based on Absolute Difference Trees. KSII Trans. Internet Inf. Syst. 8(7): 2572-2589 (2014) - [j41]Wanli Liu, Chin-Chen Chang, Thai Son Nguyen, Chia-Chen Lin:
Image Watermarking Scheme Based on Scale-Invariant Feature Transform. KSII Trans. Internet Inf. Syst. 8(10): 3591-3606 (2014) - [j40]Chia-Chen Lin, Yuehong Huang, Wei-Liang Tai:
A High-Quality Image Authentication Scheme for AMBTC-compressed Images. KSII Trans. Internet Inf. Syst. 8(12): 4588-4603 (2014) - [j39]Chia-Chen Lin, Chin-Chen Chang, Yi-Hui Chen:
A Novel SVD-based watermarking Scheme for Protecting Rightful Ownership of Digital Images. J. Inf. Hiding Multim. Signal Process. 5(2): 124-143 (2014) - [j38]Chung-Chuan Wang, Ya-Fen Chang, Chin-Chen Chang, Jinn-Ke Jan, Chia-Chen Lin:
A high capacity data hiding scheme for binary images based on block patterns. J. Syst. Softw. 93: 152-162 (2014) - [j37]Chin-Chen Chang, Thai Son Nguyen, Chia-Chen Lin:
Reversible data embedding for indices based on histogram analysis. J. Vis. Commun. Image Represent. 25(7): 1704-1716 (2014) - [c38]Chia-Chen Lin, Xiao-Long Liu, Jianjie Zhou, Shyan-Ming Yuan:
An Optimal Modification BTC Scheme Based on Binary Search Tree. IIH-MSP 2014: 114-117 - [c37]Chia-Chen Lin, Yuehong Huang, Wei-Liang Tai:
Novel Image Authentication Scheme for AMBTC-Compressed Images. IIH-MSP 2014: 134-137 - [c36]Chin-Chen Chang, Thai-Son Nguyen, Chia-Chen Lin:
A Virtual Primary Key for Reversible Watermarking Textual Relational Databases. ICS 2014: 756-769 - [c35]Chin-Chen Chang, Thai Son Nguyen, Chia-Chen Lin:
A Blind Robust Reversible Watermark Scheme for Textual Relational Databases with Virtual Primary Key. IWDW 2014: 75-89 - [c34]Chia-Chen Lin, Yuehong Huang, Wei-Liang Tai:
A Novel Hybrid Image Authentication Scheme for AMBTC-Compressed Images. IWDW 2014: 433-443 - [c33]Jeng-Shyang Pan, Wei Li, Chia-Chen Lin:
Novel Reversible Data Hiding Scheme for AMBTC-Compressed Images by Reference Matrix. MISNC 2014: 427-436 - 2013
- [j36]Chin-Chen Chang, Thai Son Nguyen, Chia-Chen Lin:
A novel VQ-based reversible data hiding scheme by using hybrid encoding strategies. J. Syst. Softw. 86(2): 389-402 (2013) - 2012
- [j35]SooKyun Kim, Johnnes Arreymbi, Chia-Chen Lin:
Guest editorial: Advances in Digital and Multimedia Convergence. J. Supercomput. 62(1): 1-3 (2012) - [c32]Chia-Chen Lin, Xiao-Long Liu:
A Reversible Data Hiding Scheme for Block Truncation Compressions Based on Histogram Modification. ICGEC 2012: 157-160 - [c31]Chia-Chen Lin, Xue-Bai Zhang:
A High Capacity Reversible Data Hiding Scheme Based on SMVQ. ICGEC 2012: 169-172 - 2011
- [j34]T. Hoang Ngan Le, Chia-Chen Lin, Chin-Chen Chang, Hoai Bac Le:
A high quality and small shadow size visual secret sharing scheme based on hybrid strategy for grayscale images. Digit. Signal Process. 21(6): 734-745 (2011) - [j33]Chin-Chen Chang, Thai Son Nguyen, Chia-Chen Lin:
A reversible data hiding scheme for VQ indices using locally adaptive coding. J. Vis. Commun. Image Represent. 22(7): 664-672 (2011) - [c30]Kun-You Cai, Shin-Shian Wang, Pei-Feng Shiu, Chia-Chen Lin:
A verifiable secret sharing scheme based on AMBTC. ICUIMC 2011: 129 - [c29]Chia-Chen Lin, Li-Cheng Yang, Yi-Hui Chen:
Data Hiding Scheme Based on Features of Chinese Text. IIH-MSP 2011: 161-164 - 2010
- [j32]Chia-Chi Wu, Chia-Chen Lin, Chin-Chen Chang:
Digital rights management for multimedia content over 3G mobile networks. Expert Syst. Appl. 37(10): 6787-6797 (2010) - [j31]Chia-Chen Lin, Pei-Feng Shiu:
HighCapacity Data Hiding Scheme for DCT-based Images. J. Inf. Hiding Multim. Signal Process. 1(3): 220-240 (2010) - [j30]Chia-Chen Lin, Pei-Feng Shiu:
DCT-based Reversible Data Hiding Scheme. J. Softw. 5(2): 214-224 (2010) - [c28]Chia-Chen Lin, Pei-Feng Shiu:
Reversible data hiding scheme with high payload for JPEG images. ICUIMC 2010: 14
2000 – 2009
- 2009
- [j29]Zhi-Hui Wang, Chin-Chen Chang, Chia-Chen Lin, Mingchu Li:
A reversible information hiding scheme using left-right and up-down chinese character representation. J. Syst. Softw. 82(8): 1362-1369 (2009) - [j28]Chin-Chen Chang, Guei-Mei Chen, Chia-Chen Lin:
Lossless Compression Schemes of Vector Quantization Indices Using State Codebook. J. Softw. 4(4): 274-282 (2009) - [j27]Chin-Chen Chang, Chia-Chen Lin, T. Hoang Ngan Le, Hoai Bac Le:
Sharing a verifiable secret image using two shadows. Pattern Recognit. 42(11): 3097-3114 (2009) - [j26]Chin-Chen Chang, Yi-Hui Chen, Chia-Chen Lin:
A data embedding scheme for color images based on genetic algorithm and absolute moment block truncation coding. Soft Comput. 13(4): 321-331 (2009) - [j25]Chin-Chen Chang, Chia-Chen Lin, T. Hoang Ngan Le, Hoai Bac Le:
Self-verifying visual secret sharing using error diffusion and interpolation techniques. IEEE Trans. Inf. Forensics Secur. 4(4): 790-801 (2009) - [c27]Chia-Chen Lin, Shih-Chi Wu, Po-Hsuan Chiang, Chang-Chi Chen:
Enterprise-Oriented Digital Rights Management Mechanism: eDRM. ARES 2009: 923-928 - [c26]Chin-Chen Chang, Yen-Chang Chen, Chia-Chen Lin:
A Resistant Secret Sharing Scheme. IAS 2009: 61-64 - [c25]Chia-Chen Lin, Pei-Feng Shiu:
DCT-based reversible data hiding scheme. ICUIMC 2009: 327-335 - [c24]Chia-Chen Lin, Po-Hsuan Chiang:
A Novel Mutual Authentication Based on Data Embedding Technique. IIH-MSP 2009: 274-277 - [c23]Chin-Chen Chang, Chia-Chen Lin, Pei-Yan Pai, Yen-Chang Chen:
A Novel Retinal Blood Vessel Segmentation Method Based on Line Operator and Edge Detector. IIH-MSP 2009: 299-302 - [c22]Chin-Chen Chang, Yung-Chen Chou, Chia-Chen Lin:
A Steganographic Scheme based on Wet Paper Codes Suitable for Uniformly Distributed Wet Pixels. ISCAS 2009: 501-504 - 2008
- [j24]Chia-Chen Lin, Shing-Shoung Wang:
An Edge-based Image Copy Detection Scheme. Fundam. Informaticae 83(3): 299-318 (2008) - [j23]Chin-Chen Chang, Chia-Chen Lin, Yi-Hui Chen:
Adaptive Data Embedding Scheme Based on Similar and Dissimilar Clustering Strategies. Fundam. Informaticae 88(1-2): 23-45 (2008) - [j22]Chin-Chen Chang, Chia-Chen Lin, Yi-Hui Chen:
Reversible data-embedding scheme using differences between original and predicted pixel values. IET Inf. Secur. 2(2): 35-46 (2008) - [j21]Chin-Chen Chang, Chia-Chen Lin, Chia-Hsuan Lin, Yi-Hui Chen:
A novel secret image sharing scheme in color images using small shadow images. Inf. Sci. 178(11): 2433-2447 (2008) - [j20]Ming-Ni Wu, Chia-Chen Lin, Chin-Chen Chang:
An embedding technique based upon block prediction. J. Syst. Softw. 81(9): 1505-1516 (2008) - [j19]Chia-Chen Lin, Wei-Liang Tai, Chin-Chen Chang:
Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recognit. 41(12): 3582-3591 (2008) - [j18]Chin-Chen Chang, Iuon-Chang Lin, Chia-Chen Lin:
A Novel Location Tracking Scheme for Reducing Location Updating Traffic in a Personal Communication System. Wirel. Pers. Commun. 44(2): 139-152 (2008) - [c21]Chia-Chen Lin, Klara Nahrstedt, Chung-Juei Hung:
An image copy detection scheme based on edge features. ICME 2008: 665-668 - [c20]Chia-Chen Lin, Chu-Shiuan Lai, Wan-Ya Liao:
A novel data hiding scheme for color images based on GSBTC. ICUIMC 2008: 561-565 - [c19]Chin-Chen Chang, Chia-Chen Lin, T. Hoang Ngan Le, Hoai Bac Le:
A New Probabilistic Visual Secret Sharing Scheme for Color Images. IIH-MSP 2008: 1305-1308 - [c18]Chia-Chen Lin, Wen-Xiu Zhang:
Secret Sharing Scheme with Non-expansible Shadow Size for Color Images. ISDA (3) 2008: 302-307 - [c17]Chia-Chen Lin, Po-Hsuan Chiang:
A Mobile Trading Scheme for Digital Content Based on Digital Rights. ISDA (3) 2008: 451-456 - [c16]Chin-Chen Chang, Chia-Chen Lin, T. Hoang Ngan Le, Hoai Bac Le:
A Probabilistic Visual Secret Sharing Scheme for Grayscale Images with Voting Strategy. ISECS 2008: 184-188 - [c15]Yinh-Hueih Chen, Ching-Yi Tsao, Chia-Chen Lin, I-Chieh Hsu:
A Conjoint Study of the Relationship between Website Attributes and Consumer Purchase Intentions. PACIS 2008: 224 - 2007
- [j17]Chin-Chen Chang, Wei-Liang Tai, Chia-Chen Lin:
A Novel Image Hiding Scheme Based on VQ and Hamming Distance. Fundam. Informaticae 77(3): 217-228 (2007) - [j16]Yu-Chen Hu, Chia-Chen Lin, Kang-Liang Chi:
Block Prediction Vector Quantization for Grayscale Image Compression. Fundam. Informaticae 78(2): 257-270 (2007) - [j15]Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng, Wei-Liang Tai:
Reversible hiding in DCT-based compressed images. Inf. Sci. 177(13): 2768-2786 (2007) - [j14]Ming-Ni Wu, Chia-Chen Lin, Chin-Chen Chang:
Novel image copy detection with rotating tolerance. J. Syst. Softw. 80(7): 1057-1069 (2007) - [c14]Chin-Chen Chang, Yih-Shin Hu, Chia-Chen Lin:
A Digital Watermarking Scheme Based on Singular Value Decomposition. ESCAPE 2007: 82-93 - [c13]Ming-Ni Wu, Chia-Chen Lin, Chin-Chen Chang:
Brain Tumor Detection Using Color-Based K-Means Clustering Segmentation. IIH-MSP 2007: 245-250 - [c12]Chin-Chen Chang, Yung-Chen Chou, Chia-Chen Lin:
A New Image Compression Scheme Based on Locally Adaptive Coding. ISM 2007: 14-21 - 2006
- [j13]Yu-Chen Hu, Min-Hui Lin, Ji-Han Jiang:
A Novel Color Image Hiding Scheme Using Block Truncation Coding. Fundam. Informaticae 70(4): 317-331 (2006) - [j12]Ming-Ni Wu, Chia-Chen Lin, Chin-Chen Chang:
A Robust Content-Based Copy Detection Scheme. Fundam. Informaticae 71(2-3): 351-366 (2006) - [j11]Chia-Chen Lin, Yu-Chen Hu, Chin-Chen Chang:
A Novel Image Ownership Protection Scheme Based on Rehashing Concept and Vector Quantization. Fundam. Informaticae 71(4): 443-451 (2006) - [j10]Chin-Chen Chang, Wei-Liang Tai, Chia-Chen Lin:
A Reversible Data Hiding Scheme Based on Side Match Vector Quantization. IEEE Trans. Circuits Syst. Video Technol. 16(10): 1301-1308 (2006) - [c11]Chin-Chen Chang, Wei-Liang Tai, Chia-Chen Lin:
A Multipurpose Wavelet-Based Image Watermarking. ICICIC (3) 2006: 70-73 - [c10]Ming-Ni Wu, Chia-Chen Lin, Chin-Chen Chang:
A Fast Wavelet-Based Image Progressive Transmission Method Based on Vector Quantization. ICICIC (2) 2006: 677-680 - [c9]Chia-Chen Lin, Chin-Chen Chang:
An Image Hiding Scheme Based on Du's Disk Allocation Method. IIH-MSP 2006: 617-620 - 2005
- [j9]Chih-Yang Lin, Chin-Chen Chang, Chia-Chen Lin:
A New Density-Based Scheme for Clustering Based on Genetic Algorithm. Fundam. Informaticae 68(4): 315-331 (2005) - [j8]Chin-Chen Chang, Piyu Tsai, Chia-Chen Lin:
SVD-based digital image watermarking scheme. Pattern Recognit. Lett. 26(10): 1577-1586 (2005) - [c8]Chin-Chen Chang, Wei-Liang Tai, Min-Hui Lin:
A Reversible Data Hiding Scheme with Modified Side Match Vector Quantization. AINA 2005: 947-952 - [c7]Ming-Ni Wu, Chia-Chen Lin, Chin-Chen Chang:
Image Copy Detection with Rotating Tolerance. CIS (1) 2005: 464-469 - [c6]Chin-Chen Chang, Chia-Chen Lin, Jun-Bin Yeh:
Adaptive Hiding Scheme Based on VQ-Indices Using Commutable Codewords. CIS (2) 2005: 567-572 - [c5]Chin-Chen Chang, Chun-Sen Tseng, Chia-Chen Lin:
Hiding Data in Binary Images. ISPEC 2005: 338-349 - [c4]Chin-Chen Chang, Wei-Liang Tai, Chia-Chen Lin:
Secret Hiding Using Side Match Vector Quantization. WSTST 2005: 172-181 - 2004
- [j7]Min-Hui Lin, Chin-Chen Chang, Yan-Ren Chen:
A fair and secure mobile agent environment based on blind signature and proxy host. Comput. Secur. 23(3): 199-212 (2004) - [j6]Chin-Chen Chang, Piyu Tsai, Min-Hui Lin:
An Adaptive Steganographic Scheme for Color Images. Fundam. Informaticae 62(3-4): 275-289 (2004) - [j5]Yu-Chen Hu, Min-Hui Lin:
Secure Image Hiding Scheme Based Upon Vector Quantization. Int. J. Pattern Recognit. Artif. Intell. 18(6): 1111-1130 (2004) - [j4]Chin-Chen Chang, Guei-Mei Chen, Min-Hui Lin:
Information hiding based on search-order coding for VQ indices. Pattern Recognit. Lett. 25(11): 1253-1261 (2004) - [j3]Min-Hui Lin, Chin-Chen Chang:
A secure one-time password authentication scheme with low-computation for mobile communications. ACM SIGOPS Oper. Syst. Rev. 38(2): 76-84 (2004) - [c3]Min-Hui Lin, Chin-Chen Chang:
A Novel Information Hiding Scheme Based on BTC. CIT 2004: 66-71 - [c2]Ming-Ni Wu, Min-Hui Lin, Chin-Chen Chang:
A LSB Substitution Oriented Image Hiding Strategy Using Genetic Algorithms. AWCC 2004: 219-229 - [c1]Chin-Chen Chang, Piyu Tsai, Min-Hui Lin:
An Adaptive Steganography for Index-Based Images Using Codeword Grouping. PCM (3) 2004: 731-738 - 2002
- [j2]Chin-Chen Chang, Min-Hui Lin, Yu-Chen Hu:
A Fast and Secure Image Hiding Scheme Based on LSB Substitution. Int. J. Pattern Recognit. Artif. Intell. 16(4): 399-416 (2002) - [j1]Min-Hui Lin, Yu-Chen Hu, Chin-Chen Chang:
Both Color and Gray Scale Secret Images Hiding in a Color Image. Int. J. Pattern Recognit. Artif. Intell. 16(6): 697-714 (2002)
Coauthor Index
aka: Alan Chin-Chen Chang
aka: Thai-Son Nguyen
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint