


default search action
Chin-Chen Chang 0001
Chinchen Chang 0001 – Alan Chin-Chen Chang – 張真誠
Person information
- unicode name: 張真誠
- affiliation (since 2005): Feng Chia University, Department of Information Engineering and Computer Science, Taichung, Taiwan
- affiliation (former): Asia University, Department of Computer Science and Information Engineering, Taichung, Taiwan
- affiliation (former): Chinese Medical University, Department of Biomedical Imaging and Radiological Science, Taichung, Taiwan
- affiliation (1989 - 2005): National Chung Cheng University, Chiayi, Taiwan
- affiliation (1983 - 1989): National Chung Hsing University, Institute of Applied Mathematics, Taichung, Taiwan
- affiliation (PhD 1982): National Chiao Tung University, Department of Computer Engineering, Hsinchu, Taiwan
Other persons with the same name
- Chin-Chen Chang 0002 — National United University, Department of Computer Science and Information Engineering, Miaoli, Taiwan (and 2 more)
- Chin-Chen Chang 0003
— National Taiwan University College of Medicine, Department of Medical Imaging, Taipei, Taiwan (and 1 more)
- Chin-Chen Chang 0004 — Industrial Technology and Research Institute, Advanced Technology Center, Hsinchu, Taiwan
- Chin-Chen Chang 0005 — Iowa State University, Ames, IA, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2025
- [j941]Xiang Shen
, Dezhi Han, Chin-Chen Chang, Ammar Oad, Huafeng Wu:
GFSNet: Gaussian Fourier with sparse attention network for visual question answering. Artif. Intell. Rev. 58(6): 159 (2025) - [j940]Hui Tian, Mengcheng Wang, Hanyu Quan, Chin-Chen Chang, Athanasios V. Vasilakos:
TEEMRDA: Leveraging trusted execution environments for multi-replica data auditing in cloud storage. Comput. Secur. 150: 104250 (2025) - [j939]Kai Gao, Ji-Hwei Horng
, Ching-Chun Chang, Chinchen Chang:
Crypto-space steganography for 3D mesh models with greedy selection and shortest expansion. Displays 87: 102961 (2025) - [j938]Yijie Lin, Jui-Chuan Liu, Ching-Chun Chang, Chin-Chen Chang:
Reversible data hiding in encrypted DICOM images via pattern matching and dynamic Huffman coding. Displays 90: 103105 (2025) - [j937]Chongqing Chen
, Dezhi Han, Zihan Guo, Chin-Chen Chang:
Towards bias-aware visual question answering: Rectifying and mitigating comprehension biases. Expert Syst. Appl. 264: 125817 (2025) - [j936]Hui Tian, Nan Gan, Fang Peng, Hanyu Quan, Chin-Chen Chang, Athanasios V. Vasilakos:
Smart contract-based public integrity auditing for cloud storage against malicious auditors. Future Gener. Comput. Syst. 166: 107709 (2025) - [j935]Lili Tang, Hui Tian, Chin-Chen Chang, Hui Huang:
Mechanical vibration signal compression based on speech codecs for intelligent manufacturing. Int. J. Comput. Integr. Manuf. 38(6): 732-751 (2025) - [j934]Shuying Xu
, Ji-Hwei Horng
, Ching-Chun Chang, Chin-Chen Chang:
Reversible Data Hiding in Encrypted JPEG Images With Polynomial Secret Sharing for IoT Security. IEEE Internet Things J. 12(1): 1098-1108 (2025) - [j933]Yijie Lin, Chia-Chen Lin, Ching-Chun Chang, Chin-Chen Chang:
An IoT-Based Electronic Health Protection Mechanism With AMBTC Compressed Images. IEEE Internet Things J. 12(3): 2430-2444 (2025) - [j932]Guangtian Fang, Feng Wang, Chenbin Zhao, Chuan Qin, Ching-Chun Chang, Chin-Chen Chang:
Reversible Data Hiding With Secret Encrypted Image Sharing and Adaptive Coding. IEEE Internet Things J. 12(13): 23933-23945 (2025) - [j931]Kai Gao
, Ji-Hwei Horng
, Ching-Chun Chang, Chin-Chen Chang:
Crypto-space reversible data hiding for 3D mesh models with k-Degree neighbor diffusion. J. Inf. Secur. Appl. 89: 103957 (2025) - [j930]Yijie Lin, Chia-Chen Lin, Ching-Chun Chang, Chin-Chen Chang:
Hiding information in encrypted images with ( ) secret sharing for IoT and cloud services. J. Inf. Secur. Appl. 93: 104137 (2025) - [j929]Li Liu, Kexin Fu, Yingchun Wu, Ching-Chun Chang, Anhong Wang, Chin-Chen Chang:
Reversible Data Hiding for JPEG Images Based on Point Distortion Estimation Optimization. J. Frankl. Inst. 362(8): 107657 (2025) - [j928]Chen Cui, Li Li, Jianfeng Lu, Shanqing Zhang, Chin-Chen Chang:
A novel high-fidelity reversible data hiding scheme based on multi-classification pixel value ordering. J. Vis. Commun. Image Represent. 110: 104473 (2025) - [j927]Sisheng Chen, Chin-Chen Chang, Ji-Hwei Horng
:
Reversible data hiding scheme using prediction neural network and adaptive modulation mapping. Multim. Tools Appl. 84(9): 6665-6686 (2025) - [j926]Jui-Chuan Liu, Yijie Lin, Ching-Chun Chang, Chin-Chen Chang:
A side match oriented data hiding based on absolute moment block truncation encoding mechanism with reversibility. Multim. Tools Appl. 84(17): 18395-18417 (2025) - [j925]Longfei Yuan, Chia-Chen Lin
, Chin-Chen Chang:
Visual quality-enhanced reversible data hiding scheme based on interpolation and variant Sudoku matrics. Multim. Tools Appl. 84(18): 20219-20247 (2025) - [j924]Yijie Lin
, Jui-Chuan Liu, Ching-Chun Chang, Chin-Chen Chang:
A puzzle matrix oriented secret sharing scheme for dual images with reversibility. Signal Process. 236: 110056 (2025) - [j923]Ye Yao, Detong Wang, Yanzhao Shen, Dawen Xu, Ching-Chun Chang, Chinchen Chang:
PVO-Based Reversible Data Hiding Using Two-Stage Embedding and FPM Mode Selection. IEEE Trans. Circuits Syst. Video Technol. 35(4): 3512-3526 (2025) - [j922]Canyang Guo, Feng-Jang Hwang, Chi-Hua Chen, Ching-Chun Chang, Chin-Chen Chang:
Cluster-Granularity Spatiotemporal Transfer for Cross-Region Graph-Based Traffic Forecasting. IEEE Trans. Intell. Transp. Syst. 26(7): 10780-10794 (2025) - 2024
- [j921]Kai Gao
, Chin-Chen Chang
, Chia-Chen Lin
:
Key-Free Image Encryption Algorithm Based on Self-Triggered Gaussian Noise Sampling. IEEE Access 12: 153274-153284 (2024) - [j920]Ching-Chun Chang, Shuying Xu, Kai Gao, Chin-Chen Chang:
Cryptanalysis of Dual-Stage Permutation Encryption Using Large-Kernel Convolutional Neural Network and Known Plaintext Attack. Cryptogr. 8(3): 41 (2024) - [j919]Ching-Chun Chang, Yijie Lin, Jui-Chuan Liu, Chin-Chen Chang:
Reversible Data Hiding in Absolute Moment Block Truncation Codes via Arithmetical and Logical Differential Coding. Cryptogr. 9(1): 4 (2024) - [j918]Kai Gao, Chin-Chen Chang, Chia-Chen Lin:
Multiple Perspective of Multipredictor Mechanism and Multihistogram Modification for High-Fidelity Reversible Data Hiding. Comput. Syst. Sci. Eng. 48(3): 813-833 (2024) - [j917]Kai Gao
, Ji-Hwei Horng
, Chin-Chen Chang:
Dual mode data hiding in fully encrypted images with pixel-shuffling for cloud applications. Displays 81: 102609 (2024) - [j916]Qi Wen Gan
, Wei-Chuen Yau
, Yee Siang Gan
, Iftekhar Salam
, Shihui Guo, Chinchen Chang, Yubing Wu
, Luchen Zhou
:
DSteganoM: Deep steganography for motion capture data. Expert Syst. Appl. 238(Part C): 121955 (2024) - [j915]Hao Fang, Chi-Hua Chen, Feng-Jang Hwang, Ching-Chun Chang, Chin-Chen Chang:
Metro Station functional clustering and dual-view recurrent graph convolutional network for metro passenger flow prediction. Expert Syst. Appl. 247: 122550 (2024) - [j914]Jui-Chuan Liu, Heng-Xiao Chi, Ching-Chun Chang, Chin-Chen Chang:
An Innovative Information Hiding Scheme Based on Block-Wise Pixel Reordering. Future Internet 16(1): 34 (2024) - [j913]Xu Wang, Jui-Chuan Liu, Ching-Chun Chang, Chin-Chen Chang:
Reversible Data Hiding in Encrypted 3D Mesh Models Based on Multi-Group Partition and Closest Pair Prediction. Future Internet 16(6): 210 (2024) - [j912]Yijie Lin, Jui-Chuan Liu, Ching-Chun Chang, Chin-Chen Chang:
An Innovative Recompression Scheme for VQ Index Tables. Future Internet 16(8): 297 (2024) - [j911]Haochen Lyu, Jianjun Li, Yin Ye, Chin-Chen Chang:
A Ranking Information Based Network for Facial Beauty Prediction. IEICE Trans. Inf. Syst. 107(6): 772-780 (2024) - [j910]Yuhang Zhou, Ting Luo
, Zhouyan He, Gangyi Jiang, Haiyong Xu, Chin-Chen Chang
:
CAISFormer: Channel-wise attention transformer for image steganography. Neurocomputing 603: 128295 (2024) - [j909]Canyang Guo
, Chi-Hua Chen
, Feng-Jang Hwang
, Ching-Chun Chang, Chin-Chen Chang:
Multi-view spatiotemporal learning for traffic forecasting. Inf. Sci. 657: 119868 (2024) - [j908]Yijie Lin, Chia-Chen Lin, Jui-Chuan Liu, Chin-Chen Chang
:
Verifiable (t, n) Secret Image Sharing Scheme Based on Slim Turtle Shell Matrix. J. Inf. Secur. Appl. 80: 103679 (2024) - [j907]Rong Wang
, Junchuan Liang, Siyu Wang, Chin-Chen Chang
:
A divide-and-conquer approach to privacy-preserving high-dimensional big data release. J. Inf. Secur. Appl. 83: 103756 (2024) - [j906]Jiang-Yi Lin, Ji-Hwei Horng, Chin-Chen Chang:
Secret image sharing with distinct covers based on improved Cycling-XOR. J. Vis. Commun. Image Represent. 104: 104282 (2024) - [j905]Guo-Dong Su, Chin-Chen Chang, Chia-Chen Lin
:
An effective compressed image authentication scheme based on N-variant AMBTC. Multim. Tools Appl. 83(2): 3801-3829 (2024) - [j904]Wujian Ye, Jiada Wang
, Yongda Cai, Yijun Liu, Huihui Zhou, Chin-Chen Chang:
Joint learning of fuzzy embedded clustering and non-negative spectral clustering. Multim. Tools Appl. 83(25): 66065-66086 (2024) - [j903]Shuying Xu, Chin-Chen Chang, Ji-Hwei Horng
:
Data hiding with thumbnail-preserving encryption for cloud medical images. Multim. Tools Appl. 83(36): 84161-84177 (2024) - [j902]Li Liu
, Chaofan Chen, Yingchun Wu, Chin-Chen Chang, Anhong Wang:
Reversible data hiding in encrypted images with block-based bit-plane reallocation. Multim. Tools Appl. 83(37): 84911-84932 (2024) - [j901]Chongqing Chen
, Dezhi Han, Chin-Chen Chang:
MPCCT: Multimodal vision-language learning paradigm with context-based compact Transformer. Pattern Recognit. 147: 110084 (2024) - [j900]Zhongming Huang
, Feng Wang, Chin-Chen Chang
, Xiuqiang Chen:
A new authentication scheme for dynamic charging system of electric vehicles in fog environment. Secur. Priv. 7(3) (2024) - [j899]Iuon-Chang Lin, Yi-Hsuan Kuo, Ching-Chun Chang, Jui-Chuan Liu, Chin-Chen Chang:
Symmetry in Blockchain-Powered Secure Decentralized Data Storage: Mitigating Risks and Ensuring Confidentiality. Symmetry 16(2): 147 (2024) - [j898]Ting Luo
, Jun Wu
, Zhouyan He
, Haiyong Xu
, Gangyi Jiang
, Chin-Chen Chang
:
WFormer: A Transformer-Based Soft Fusion Model for Robust Image Watermarking. IEEE Trans. Emerg. Top. Comput. Intell. 8(6): 4179-4196 (2024) - [j897]Canyang Guo, Feng-Jang Hwang, Chi-Hua Chen, Ching-Chun Chang, Chin-Chen Chang:
Dynamic Spatiotemporal Straight-Flow Network for Efficient Learning and Accurate Forecasting in Traffic. IEEE Trans. Intell. Transp. Syst. 25(11): 18899-18912 (2024) - [j896]Kai Gao
, Ji-Hwei Horng
, Chin-Chen Chang
:
Reversible Data Hiding for Encrypted 3D Mesh Models With Secret Sharing Over Galois Field. IEEE Trans. Multim. 26: 5499-5510 (2024) - [j895]Mingming Cui
, Dezhi Han
, Han Liu
, Kuan-Ching Li
, Mingdong Tang, Chin-Chen Chang
, Ferheen Ayaz
, Zhengguo Sheng
, Yong Liang Guan:
Secure Data Sharing for Consortium Blockchain-Enabled Vehicular Social Networks. IEEE Trans. Veh. Technol. 73(12): 19682-19695 (2024) - [j894]Guo-Dong Su, Ching-Chun Chang, Chia-Chen Lin
, Chin-Chen Chang:
Towards property-preserving JPEG encryption with structured permutation and adaptive group differentiation. Vis. Comput. 40(9): 6421-6447 (2024) - [j893]Hui Tian
, Jia Wang, Chin-Chen Chang, Hanyu Quan:
Public auditing of log integrity for shared cloud storage systems via blockchain. Wirel. Networks 30(7): 6249-6264 (2024) - [c291]Rong Wang, Junchuan Liang, Haiting Jiang, Chaosheng Feng, Chin-Chen Chang:
StegoFL: Using Steganography and Federated Learning to Transmit Malware. TrustCom 2024: 184-190 - 2023
- [j892]Congcong Sun
, Hui Tian
, Wojciech Mazurczyk, Chin-Chen Chang
, Hanyu Quan, Yonghong Chen:
Steganalysis of adaptive multi-rate speech with unknown embedding rates using clustering and ensemble learning. Comput. Electr. Eng. 111(Part A): 108909 (2023) - [j891]Shuying Xu, Chin-Chen Chang, Ji-Hwei Horng
:
A Steganography Based on Optimal Multi-Threshold Block Labeling. Comput. Syst. Sci. Eng. 44(1): 721-739 (2023) - [j890]Li Liu, Jing Li, Yingchun Wu, Chin-Chen Chang, Anhong Wang:
High-Imperceptibility Data Hiding Scheme for JPEG Images Based on Direction Modification. Comput. Syst. Sci. Eng. 47(2): 1415-1432 (2023) - [j889]Canyang Guo
, Chi-Hua Chen
, Ching-Chun Chang, Feng-Jang Hwang, Chin-Chen Chang:
De-Correlation Neural Network for Synchronous Implementation of Estimation and Secrecy. IEEE Commun. Lett. 27(1): 165-169 (2023) - [j888]Huimin Li, Dezhi Han, Chongqing Chen, Chin-Chen Chang, Kuan-Ching Li
, Dun Li:
A Visual Question Answering Network Merging High- and Low-Level Semantic Information. IEICE Trans. Inf. Syst. 106(5): 581-589 (2023) - [j887]Wujian Ye, Run Tan, Yijun Liu, Chin-Chen Chang:
The Comparison of Attention Mechanisms with Different Embedding Modes for Performance Improvement of Fine-Grained Classification. IEICE Trans. Inf. Syst. 106(5): 590-600 (2023) - [j886]Hui Tian
, Weiping Ye
, Jia Wang, Hanyu Quan
, Chin-Chen Chang
:
Certificateless Public Auditing for Cloud-Based Medical Data in Healthcare Industry 4.0. Int. J. Intell. Syst. 2023: 1-18 (2023) - [j885]Jiang-Yi Lin, Chin-Chen Chang, Ji-Hwei Horng
:
Crypto-space image steganography based on blind flipping. J. Inf. Secur. Appl. 79: 103660 (2023) - [j884]Chin-Chen Chang, Jui-Chuan Liu, Kai Gao:
Cryptanalysis of iterative encryption and image sharing scheme based on the VQ attack. J. Vis. Commun. Image Represent. 97: 103973 (2023) - [j883]Haoyang Kang
, Lu Leng, Chin-Chen Chang:
Overlapped (7, 4) hamming code for large-capacity and low-loss data hiding. Multim. Tools Appl. 82(20): 30345-30374 (2023) - [j882]Xu Wang
, Jui-Chuan Liu, Chin-Chen Chang
:
A novel reversible data hiding scheme for VQ codebooks. Secur. Priv. 6(6) (2023) - [j881]Shuying Xu
, Chin-Chen Chang
, Ji-Hwei Horng
:
Image Covert Communication With Block Regulation. IEEE Signal Process. Lett. 30: 1217-1221 (2023) - [j880]Kai Gao, Chin-Chen Chang
, Chia-Chen Lin:
Cryptanalysis of Reversible Data Hiding in Encrypted Images Based on the VQ Attack. Symmetry 15(1): 189 (2023) - [j879]Yuehai Chen
, Yijun Liu
, Wujian Ye
, Chin-Chen Chang
:
The High-Performance Design of a General Spiking Convolution Computation Unit for Supporting Neuromorphic Hardware Acceleration. IEEE Trans. Circuits Syst. II Express Briefs 70(9): 3634-3638 (2023) - [j878]Shuying Xu, Ji-Hwei Horng, Ching-Chun Chang, Chin-Chen Chang:
Reversible Data Hiding With Hierarchical Block Variable Length Coding for Cloud Security. IEEE Trans. Dependable Secur. Comput. 20(5): 4199-4213 (2023) - [j877]Yiqin Qiu
, Hui Tian
, Haizhou Li
, Chin-Chen Chang
, Athanasios V. Vasilakos
:
Separable Convolution Network With Dual-Stream Pyramid Enhanced Strategy for Speech Steganalysis. IEEE Trans. Inf. Forensics Secur. 18: 2737-2750 (2023) - [j876]Jiangtao Huang
, Ting Luo
, Li Li
, Gaobo Yang
, Haiyong Xu
, Chin-Chen Chang
:
ARWGAN: Attention-Guided Robust Image Watermarking Model Based on GAN. IEEE Trans. Instrum. Meas. 72: 1-17 (2023) - [j875]Canyang Guo, Chi-Hua Chen, Feng-Jang Hwang, Ching-Chun Chang, Chin-Chen Chang:
Fast Spatiotemporal Learning Framework for Traffic Flow Forecasting. IEEE Trans. Intell. Transp. Syst. 24(8): 8606-8616 (2023) - [j874]Zhenyan Ji
, Xiaojun Song, Qibo Feng
, Haishuai Wang, Chi-Hua Chen
, Chin-Chen Chang
:
RSG-Net: A Recurrent Similarity Network With Ghost Convolution for Wheelset Laser Stripe Image Inpainting. IEEE Trans. Intell. Transp. Syst. 24(11): 12852-12861 (2023) - [c290]Gejian Zhao, Chuan Qin, Xiangyang Luo, Xinpeng Zhang, Chin-Chen Chang:
Perceptual Robust Hashing for Video Copy Detection with Unsupervised Learning. IH&MMSec 2023: 13-18 - [c289]Jui-Chuan Liu
, Chin-Chen Chang
, Chia-Chen Lin
:
Hiding Information in a Well-Trained Vector Quantization Codebook. SPML 2023: 287-292 - [c288]Cheng Shi
, Chin-Chen Chang
, Eyhab Al-Masri
, Abel C. H. Chen
, Haishuai Wang
, Qichun Zhang
, Hsiao-Ting Tseng
, K. Shankar
, Taehong Kim
:
The 3rd International Workshop on Deep Learning for the Web of Things. WWW (Companion Volume) 2023: 1257 - [i3]Junchuan Liang, Rong Wang, Chaosheng Feng, Chin-Chen Chang:
A Survey on Federated Learning Poisoning Attacks and Defenses. CoRR abs/2306.03397 (2023) - 2022
- [j873]Chia-Chen Lin, Chin-Chen Chang
, Wei-Jiun Kao, Jui-Feng Chang:
Efficient Electronic Patient Information Hiding Scheme With Tamper Detection Function for Medical Images. IEEE Access 10: 18470-18485 (2022) - [j872]Manjie Zhai, Dezhi Han, Chin-Chen Chang, Zhijie Sun:
A consortium blockchain-based information management system for unmanned vehicle logistics. Comput. Sci. Inf. Syst. 19(2): 935-955 (2022) - [j871]Shaokang Cai
, Dezhi Han, Xinming Yin, Dun Li
, Chin-Chen Chang:
A Hybrid parallel deep learning model for efficient intrusion detection based on metric learning. Connect. Sci. 34(1): 551-577 (2022) - [j870]Wujian Ye, Junming Lao, Yijun Liu, Chin-Chen Chang, Ziwen Zhang, Hui Li, Huihui Zhou:
Pine pest detection using remote sensing satellite images combined with a multi-scale attention-UNet model. Ecol. Informatics 72: 101906 (2022) - [j869]Wujian Ye, Qingyuan Zeng, Yihang Peng, Yijun Liu
, Chin-Chen Chang:
A two-stage detection method of copy-move forgery based on parallel feature fusion. EURASIP J. Wirel. Commun. Netw. 2022(1): 30 (2022) - [j868]Ming Li, Dezhi Han
, Dun Li
, Han Liu, Chin-Chen Chang:
MFVT: an anomaly traffic detection method merging feature fusion network and vision transformer architecture. EURASIP J. Wirel. Commun. Netw. 2022(1): 39 (2022) - [j867]Zhijie Sun
, Dezhi Han
, Dun Li
, Xiangsheng Wang
, Chin-Chen Chang, Zhongdai Wu:
A blockchain-based secure storage scheme for medical information. EURASIP J. Wirel. Commun. Netw. 2022(1): 40 (2022) - [j866]Yuqi Chen, Dezhi Han, Mingming Cui, Zhongdai Wu, Chin-Chen Chang:
ABOS: an attention-based one-stage framework for person search. EURASIP J. Wirel. Commun. Netw. 2022(1): 75 (2022) - [j865]Hui Liu, Aihua Wu, Mingkang Wei, Chin-Chen Chang:
SKDStream: a dynamic clustering algorithm on time-decaying data stream. EURASIP J. Wirel. Commun. Netw. 2022(1): 102 (2022) - [j864]Xiang Lv
, Dezhi Han, Dun Li
, Lijun Xiao, Chin-Chen Chang:
Network abnormal traffic detection method based on fusion of chord similarity and multiple loss encoder. EURASIP J. Wirel. Commun. Netw. 2022(1): 105 (2022) - [j863]Xiang Shen
, Dezhi Han, Chin-Chen Chang, Liang Zong:
Dual Self-Guided Attention with Sparse Question Networks for Visual Question Answering. IEICE Trans. Inf. Syst. 105-D(4): 785-796 (2022) - [j862]Iuon-Chang Lin, Chin-Chen Chang, Hsiao-Chi Chiang:
A Novel e-Cash Payment System with Divisibility Based on Proxy Blind Signature in Web of Things. IEICE Trans. Inf. Syst. 105-D(12): 2092-2103 (2022) - [j861]Liaoying Zhao, Jiaming Li, Jianjun Li, Yong Wu, Shichao Cheng, Zheng Tang, Guobao Hui, Chin-Chen Chang:
Learning stereo disparity with feature consistency and confidence. Int. J. Ad Hoc Ubiquitous Comput. 39(1/2): 83-92 (2022) - [j860]Congcong Sun
, Hui Tian
, Wojciech Mazurczyk, Chin-Chen Chang, Yiqiao Cai, Yonghong Chen:
Towards blind detection of steganography in low-bit-rate speech streams. Int. J. Intell. Syst. 37(12): 12085-12112 (2022) - [j859]Yiqin Qiu
, Hui Tian
, Lili Tang
, Wojciech Mazurczyk
, Chin-Chen Chang:
Steganalysis of adaptive multi-rate speech streams with distributed representations of codewords. J. Inf. Secur. Appl. 68: 103250 (2022) - [j858]Sisheng Chen, Chin-Chen Chang
:
Reversible data hiding in encrypted images using block-based adaptive MSBs prediction. J. Inf. Secur. Appl. 69: 103297 (2022) - [j857]Wujian Ye, Xueke Zhu, Zuoteng Xu, Yijun Liu
, Chin-Chen Chang:
A comprehensive framework of multiple semantics preservation in neural style transfer. J. Vis. Commun. Image Represent. 82: 103378 (2022) - [j856]Xu Wang, Ching-Chun Chang, Chia-Chen Lin, Chin-Chen Chang:
Reversal of pixel rotation: A reversible data hiding system towards cybersecurity in encrypted images. J. Vis. Commun. Image Represent. 82: 103421 (2022) - [j855]Kai Gao
, Ji-Hwei Horng
, Chin-Chen Chang:
High-capacity reversible data hiding in encrypted images based on adaptive block encoding. J. Vis. Commun. Image Represent. 84: 103481 (2022) - [j854]Xu Wang, Ching-Chun Chang, Chia-Chen Lin
, Chin-Chen Chang:
On the multi-level embedding of crypto-image reversible data hiding. J. Vis. Commun. Image Represent. 87: 103556 (2022) - [j853]Zhongliang Yang
, Hao Yang, Ching-Chun Chang, Yongfeng Huang
, Chin-Chen Chang:
Real-time steganalysis for streaming media based on multi-channel convolutional sliding windows. Knowl. Based Syst. 237: 107561 (2022) - [j852]Jiang-Yi Lin, Ji-Hwei Horng
, Chin-Chen Chang
:
A reversible and authenticable secret sharing scheme using dual images. Multim. Tools Appl. 81(13): 17527-17545 (2022) - [j851]Sisheng Chen, Chin-Chen Chang
:
Privacy-preserving data hiding with robustness based on selective encryption and matrix embedding. Multim. Tools Appl. 81(23): 33397-33417 (2022) - [j850]Chongqing Chen
, Dezhi Han, Chin-Chen Chang:
CAAN: Context-Aware attention network for visual question answering. Pattern Recognit. 132: 108980 (2022) - [j849]Xiaojun Mei
, Dezhi Han
, Nasir Saeed
, Huafeng Wu
, Chin-Chen Chang
, Bin Han, Teng Ma
, Jiangfeng Xian:
Trajectory Optimization of Autonomous Surface Vehicles with Outliers for Underwater Target Localization. Remote. Sens. 14(17): 4343 (2022) - [j848]Wenny Ramadha Putri
, Shen-Hsuan Liu, Muhammad Saqlain Aslam
, Yung-Hui Li
, Chin-Chen Chang
, Jia-Ching Wang:
Self-Supervised Learning Framework toward State-of-the-Art Iris Image Segmentation. Sensors 22(6): 2133 (2022) - [j847]Heng-Xiao Chi
, Ji-Hwei Horng
, Chin-Chen Chang
, Yung-Hui Li
:
Embedding Biometric Information in Interpolated Medical Images with a Reversible and Adaptive Strategy. Sensors 22(20): 7942 (2022) - [j846]Hui Tian
, Junyan Wu
, Hanyu Quan, Chin-Chen Chang
:
Detecting Multiple Steganography Methods in Speech Streams Using Multi-Encoder Network. IEEE Signal Process. Lett. 29: 2462-2466 (2022) - [j845]Iuon-Chang Lin
, Chin-Chen Chang
, Yu-Sung Chang:
Data Security and Preservation Mechanisms for Industrial Control Network Using IOTA. Symmetry 14(2): 237 (2022) - [j844]Chin-Chen Chang
, Guo-Dong Su, Chia-Chen Lin, Yung-Hui Li
:
Position-Aware Guided Hiding Data Scheme with Reversibility and Adaptivity for Dual Images. Symmetry 14(3): 509 (2022) - [j843]Jiang-Yi Lin, Ji-Hwei Horng
, Chin-Chen Chang
, Yung-Hui Li
:
Asymmetric Orientation Combination for Reversible and Authenticable Data Hiding of Dual Stego-images. Symmetry 14(4): 819 (2022) - [j842]Chuan Qin
, Chanyu Jiang, Qun Mo, Heng Yao
, Chin-Chen Chang
:
Reversible Data Hiding in Encrypted Image via Secret Sharing Based on GF(p) and GF(2⁸). IEEE Trans. Circuits Syst. Video Technol. 32(4): 1928-1941 (2022) - [j841]Tiancong Zhang
, Tanshuai Hou, Shaowei Weng
, Fumin Zou, Hongchao Zhang, Chin-Chen Chang
:
Adaptive Reversible Data Hiding With Contrast Enhancement Based on Multi-Histogram Modification. IEEE Trans. Circuits Syst. Video Technol. 32(8): 5041-5054 (2022) - [j840]Hui Tian
, Fang Peng, Hanyu Quan, Chin-Chen Chang:
Identity-Based Public Auditing for Cloud Storage of Internet-of-Vehicles Data. ACM Trans. Internet Techn. 22(4): 88:1-88:24 (2022) - [j839]Shanqing Zhang, Shengqi Su, Li Li, Jianfeng Lu, Qili Zhou, Chin-Chen Chang:
CSST-Net: an arbitrary image style transfer network of coverless steganography. Vis. Comput. 38(6): 2125-2137 (2022) - [c287]Chih-Hung Lee, Kun-Sheng Sun, Yun-Qiao Wang, Ji-Hwei Horng
, Chin-Chen Chang:
Secret Message CDMA Multiplexing via QR Codes. ASSE 2022: 52-59 - [c286]Chutisant Kerdvibulvech, Chin-Chen Chang:
A New Study of Integration Between Social Robotic Systems and the Metaverse for Dealing with Healthcare in the Post-COVID-19 Situations. ICSR (2) 2022: 392-401 - [c285]Wenzhong Guo, Chin-Chen Chang, Eyhab Al-Masri, Chi-Hua Chen
, Haishuai Wang, Qichun Zhang, K. Shankar:
DLWoT'22: 2nd International Workshop on Deep Learning for the Web of Things. WWW (Companion Volume) 2022: 936-939 - [i2]Zhijie Sun, Dezhi Han, Dun Li, Xiangsheng Wang, Chin-Chen Chang, Zhongdai Wu:
A blockchain-based secure storage scheme for medical information. CoRR abs/2207.06102 (2022) - 2021
- [j838]Kai Gao
, Ji-Hwei Horng
, Chin-Chen Chang
:
An Authenticatable (2, 3) Secret Sharing Scheme Using Meaningful Share Images Based on Hybrid Fractal Matrix. IEEE Access 9: 50112-50125 (2021) - [j837]Shuying Xu, Ji-Hwei Horng
, Chin-Chen Chang
:
Reversible Data Hiding Scheme Based on VQ Prediction and Adaptive Parametric Binary Tree Labeling for Encrypted Images. IEEE Access 9: 55191-55204 (2021) - [j836]Shuying Xu, Chin-Chen Chang, Yanjun Liu:
A novel image compression technology based on vector quantisation and linear regression prediction. Connect. Sci. 33(2): 219-236 (2021) - [j835]Xiao-Zhu Xie, Chin-Chen Chang, Ji-Hwei Horng
:
An EMD-based data hiding scheme for JPEG images. Connect. Sci. 33(3): 515-531 (2021) - [j834]Chin-Chen Chang, Ji-Hwei Horng
, Chia-Shou Shih, Xu Wang:
VQ-oriented data hiding based on adjustable error compensation strategy. Connect. Sci. 33(4): 835-853 (2021) - [j833]Kaimeng Chen, Chin-Chen Chang:
High-capacity separable reversible data-Hiding method in encrypted images based on block-level encryption and Huffman compression coding. Connect. Sci. 33(4): 975-994 (2021) - [j832]Lin Li
, Alan Chin-Chen Chang
, Chia-Chen Lin
:
Reversible Data Hiding in Encrypted Image Based on (7, 4) Hamming Code and UnitSmooth Detection. Entropy 23(7): 790 (2021) - [j831]Keju Meng, Fuyou Miao, Yu Ning, Wenchao Huang, Yan Xiong, Chin-Chen Chang:
A proactive secret sharing scheme based on Chinese remainder theorem. Frontiers Comput. Sci. 15(2): 152801 (2021) - [j830]Chin-Chen Chang
, Jui-Feng Chang, Wei-Jiun Kao, Ji-Hwei Horng
:
Two-Layer Reversible Data Hiding for VQ-Compressed Images Based on De-Clustering and Indicator-Free Search-Order Coding. Future Internet 13(8): 215 (2021) - [j829]Guo-Hua Qiu, Chin-Feng Lee, Chinchen Chang:
Turtle-shell data embedding method with high image fidelity. Int. J. Embed. Syst. 14(2): 149-159 (2021) - [j828]Ting-Ting Xia, Juan Lin, Chin-Chen Chang, Tzu-Chuen Lu:
A novel adjustable reversible data hiding method for AMBTC-compressed codes using Hamming distance. Int. J. Embed. Syst. 14(4): 313-323 (2021) - [j827]Kai Gao, Chin-Chen Chang, Yanjun Liu:
Predicting missing data for data integrity based on the linear regression model. Int. J. Embed. Syst. 14(4): 355-362 (2021) - [j826]Chinchen Chang, Ji-Hwei Horng
, Wei-Jiun Kao:
A secure extended LBP data hiding scheme based on octagon-shaped shell. Int. J. Embed. Syst. 14(5): 497-508 (2021) - [j825]Wai-Kong Lee, Lanxiang Chen, Chinchen Chang, Zhiqiang Yao:
Post-quantum blockchain for secure communication in IoT-based smart home services. Int. J. Embed. Syst. 14(5): 509-524 (2021) - [j824]Xu Wang, Chin-Chen Chang, Chia-Chen Lin
:
Reversible data hiding in encrypted images with block-based adaptive MSB encoding. Inf. Sci. 567: 375-394 (2021) - [j823]Peng-Cheng Huang, Chinchen Chang, Yung-Hui Li, Yanjun Liu:
Enhanced (n, n)-threshold QR code secret sharing scheme based on error correction mechanism. J. Inf. Secur. Appl. 58: 102719 (2021) - [j822]Ji-Hwei Horng
, Chin-Chen Chang, Kun-Sheng Sun:
A Two-Layer Steganography for Mosaic Images. KSII Trans. Internet Inf. Syst. 15(9): 3298-3321 (2021) - [j821]Hua Wu, Ji-Hwei Horng
, Chin-Chen Chang:
Adaptive data hiding scheme based on magic matrix of flexible dimension. KSII Trans. Internet Inf. Syst. 15(9): 3348-3364 (2021) - [j820]Juan Lin, Ji-Hwei Horng
, Yanjun Liu, Chin-Chen Chang
:
An anisotropic reference matrix for image steganography. J. Vis. Commun. Image Represent. 74: 102969 (2021) - [j819]Chih-Cheng Chen, Chin-Chen Chang, Kaimeng Chen:
High-capacity reversible data hiding in encrypted image based on Huffman coding and differences of high nibbles of pixels. J. Vis. Commun. Image Represent. 76: 103060 (2021) - [j818]Sisheng Chen, Chin-Chen Chang:
Reversible data hiding based on three shadow images using rhombus magic matrix. J. Vis. Commun. Image Represent. 76: 103064 (2021) - [j817]Xu Wang
, Ching-Chun Chang, Chia-Chen Lin
, Chin-Chen Chang:
Privacy-preserving reversible data hiding based on quad-tree block encoding and integer wavelet transform. J. Vis. Commun. Image Represent. 79: 103203 (2021) - [j816]Xu Zhang, Dezhi Han, Chin-Chen Chang:
RDMMFET: Representation of Dense Multimodality Fusion Encoder Based on Transformer. Mob. Inf. Syst. 2021: 2662064:1-2662064:9 (2021) - [j815]Li Liu, Lifang Wang, Chin-Chen Chang
:
Separable reversible data hiding in encrypted images based on flexible preservation of the differences. Multim. Tools Appl. 80(5): 6639-6659 (2021) - [j814]Guo-Dong Su, Chin-Chen Chang, Chih-Cheng Chen:
A hybrid-Sudoku based fragile watermarking scheme for image tampering detection. Multim. Tools Appl. 80(8): 12881-12903 (2021) - [j813]Shuying Xu, Chin-Chen Chang
, Yanjun Liu:
A high-capacity reversible data hiding scheme for encrypted images employing vector quantization prediction. Multim. Tools Appl. 80(13): 20307-20325 (2021) - [j812]Chia-Chen Lin
, Si-Liang He, Chin-Chen Chang:
Pixel-based fragile image watermarking based on absolute moment block truncation coding. Multim. Tools Appl. 80(19): 29497-29518 (2021) - [j811]Xu Wang, Chin-Chen Chang
, Chia-Chen Lin
:
High capacity reversible data hiding in encrypted images based on prediction error and block classification. Multim. Tools Appl. 80(19): 29915-29937 (2021) - [j810]Sisheng Chen, Chin-Chen Chang
, Chia-Chen Lin
:
Reversible data hiding in encrypted images based on homomorphism and block-based congruence transformation. Multim. Tools Appl. 80(21): 33115-33138 (2021) - [j809]Chin-Chen Chang, Xu Wang, Chia-Chen Lin
:
An efficient dual prediction-based reversible data hiding and reduced code method for AMBTC. Multim. Tools Appl. 80(24): 33157-33176 (2021) - [j808]Chin-Chen Chang, Xu Wang, Chia-Chen Lin
:
Correction to: An efficient dual prediction-based reversible data hiding and reduced code method for AMBTC. Multim. Tools Appl. 80(24): 33177 (2021) - [j807]Xiao-Zhu Xie, Chin-Chen Chang
:
Hiding data in dual images based on turtle shell matrix with high embedding capacity and reversibility. Multim. Tools Appl. 80(30): 36567-36584 (2021) - [j806]Fuyou Miao, Yue Yu, Keju Meng
, Yan Xiong, Chin-Chen Chang:
Grouped Secret Sharing Schemes Based on Lagrange Interpolation Polynomials and Chinese Remainder Theorem. Secur. Commun. Networks 2021: 6678345:1-6678345:9 (2021) - [j805]Yen-Ching Chang
, Chin-Chen Chang
:
Using an Optimization Algorithm to Detect Hidden Waveforms of Signals. Sensors 21(2): 588 (2021) - [j804]Li Li, Rui Bai, Shanqing Zhang, Chin-Chen Chang
, Mengtao Shi:
Screen-Shooting Resilient Watermarking Scheme via Learned Invariant Keypoints and QT. Sensors 21(19): 6554 (2021) - [j803]Keju Meng, Fuyou Miao
, Yan Xiong, Chin-Chen Chang:
A reversible extended secret image sharing scheme based on Chinese remainder theorem. Signal Process. Image Commun. 95: 116221 (2021) - [j802]Jiang-Yi Lin, Ji-Hwei Horng
, Chin-Chen Chang
:
A Novel (2, 3)-Threshold Reversible Secret Image Sharing Scheme Based on Optimized Crystal-Lattice Matrix. Symmetry 13(11): 2063 (2021) - [j801]Chia-Chen Lin
, Thai-Son Nguyen
, Chin-Chen Chang
:
LRW-CRDB: Lossless Robust Watermarking Scheme for Categorical Relational Databases. Symmetry 13(11): 2191 (2021) - [j800]Juan Lin, Chin-Chen Chang
, Ji-Hwei Horng
:
Asymmetric Data Hiding for Compressed Images with High Payload and Reversibility. Symmetry 13(12): 2355 (2021) - [c284]Chin-Chen Chang, Ji-Hwei Horng
, Jui-Feng Chang:
High-Payload Data Hiding Scheme Based on Ordered Shifting of AC Coefficients for JPEG Images. iFUZZY 2021: 1-6 - [c283]Kunpeng Sun, Ji-Hwei Horng
, Chin-Chen Chang:
Reversible Data Hiding for SMVQ Compressed Images Based on De-Clustering Rules. SNPD 2021: 191-197 - [c282]Chin-Chen Chang, Thai-Son Nguyen
, Chia-Chen Lin:
A Reversible Database Watermark Scheme for Textual and Numerical Datasets. SNPD 2021: 208-212 - 2020
- [j799]Xiao-Zhu Xie
, Chin-Chen Chang
, Chia-Chen Lin
:
A Hybrid Reversible Data Hiding for Multiple Images With High Embedding Capacity. IEEE Access 8: 37-52 (2020) - [j798]Hui Tian
, Jie Liu
, Chin-Chen Chang
, Yongfeng Huang
, Yiqiao Cai
:
Detecting Steganography in Inactive Voice-Over-IP Frames Based on Statistic Characteristics of Fundamental Frequency. IEEE Access 8: 6117-6129 (2020) - [j797]Wenbin Zheng
, Chin-Chen Chang
, Shaowei Weng
:
A Novel Adjustable RDH Method for AMBTC-Compressed Codes Using One-to-Many Map. IEEE Access 8: 13105-13118 (2020) - [j796]Juan Lin
, Shaowei Weng
, Tiancong Zhang
, Bo Ou
, Chin-Chen Chang
:
Two-Layer Reversible Data Hiding Based on AMBTC Image With (7, 4) Hamming Code. IEEE Access 8: 21534-21548 (2020) - [j795]Sisheng Chen
, Chin-Chen Chang
, Qunying Liao
:
Fidelity Preserved Data Hiding in Encrypted Images Based on Homomorphism and Matrix Embedding. IEEE Access 8: 22345-22356 (2020) - [j794]Guo-Dong Su
, Chin-Chen Chang
, Chia-Chen Lin
:
A High Capacity Reversible Data Hiding in Encrypted AMBTC-Compressed Images. IEEE Access 8: 26984-27000 (2020) - [j793]Zhan Yu
, Chia-Chen Lin
, Chin-Chen Chang
:
ABMC-DH: An Adaptive Bit-Plane Data Hiding Method Based on Matrix Coding. IEEE Access 8: 27634-27648 (2020) - [j792]Li Liu
, Anhong Wang
, Chin-Chen Chang
:
Separable Reversible Data Hiding in Encrypted Images With High Capacity Based on Median-Edge Detector Prediction. IEEE Access 8: 29639-29647 (2020) - [j791]Yuehui Li
, Chin-Chen Chang
, Mingxing He
:
High Capacity Reversible Data Hiding for VQ-Compressed Images Based on Difference Transformation and Mapping Technique. IEEE Access 8: 32226-32245 (2020) - [j790]Xiao-Zhu Xie
, Chin-Chen Chang
, Kaimeng Chen
:
A High-Embedding Efficiency RDH in Encrypted Image Combining MSB Prediction and Matrix Encoding for Non-Volatile Memory-Based Cloud Service. IEEE Access 8: 52028-52040 (2020) - [j789]Wei Chen
, Chin-Chen Chang
, Shaowei Weng
, Bo Ou
:
Multi-Layer Mini-Sudoku Based High-Capacity Data Hiding Method. IEEE Access 8: 69256-69267 (2020) - [j788]Peng-Cheng Huang
, Chin-Chen Chang
, Yung-Hui Li
, Yanjun Liu
:
Efficient QR Code Secret Embedding Mechanism Based on Hamming Code. IEEE Access 8: 86706-86714 (2020) - [j787]Zhiwei Mou
, Wujian Ye
, Chin-Chen Chang
, Yitao Mao
:
The Application Analysis of Neural Network Techniques on Lexical Tone Rehabilitation of Mandarin-Speaking Patients With Post-Stroke Dysarthria. IEEE Access 8: 90709-90717 (2020) - [j786]Ji-Hwei Horng
, Chin-Chen Chang
, Guanlong Li
:
Steganography Using Quotient Value Differencing and LSB Substitution for AMBTC Compressed Images. IEEE Access 8: 129347-129358 (2020) - [j785]Kai Gao
, Ji-Hwei Horng
, Yanjun Liu
, Chin-Chen Chang
:
A Reversible Secret Image Sharing Scheme Based on Stick Insect Matrix. IEEE Access 8: 130405-130416 (2020) - [j784]Guo-Dong Su
, Chin-Chen Chang
, Chia-Chen Lin
:
Effective Self-Recovery and Tampering Localization Fragile Watermarking for Medical Images. IEEE Access 8: 160840-160857 (2020) - [j783]Kai Gao
, Ji-Hwei Horng
, Chin-Chen Chang
:
A Novel (2, 3) Reversible Secret Image Sharing Based on Fractal Matrix. IEEE Access 8: 174325-174341 (2020) - [j782]Sisheng Chen
, Chin-Chen Chang
:
Reversible Data Hiding in Encrypted Images Based on Reversible Integer Transformation and Quadtree-Based Partition. IEEE Access 8: 184199-184209 (2020) - [j781]Shanshan Tu, Muhammad Waqas
, Qiangqiang Lin, Sadaqat ur Rehman, Muhammad Hanif
, Chuangbai Xiao, M. Majid Butt
, Chin-Chen Chang:
Tracking area list allocation scheme based on overlapping community algorithm. Comput. Networks 173: 107182 (2020) - [j780]Shanshan Tu, Muhammad Waqas
, Yuan Meng, Sadaqat ur Rehman, Iftekhar Ahmad
, Anis Koubaa, Zahid Halim
, Muhammad Hanif
, Chin-Chen Chang, Chengjie Shi:
Mobile fog computing security: A user-oriented smart attack defense strategy based on DQL. Comput. Commun. 160: 790-798 (2020) - [j779]Rong Wang
, Yan Zhu
, Chin-Chen Chang
, Qiang Peng:
Privacy-preserving high-dimensional data publishing for classification. Comput. Secur. 93: 101785 (2020) - [j778]Lanxiang Chen, Nan Zhang, Hung-Min Sun, Chin-Chen Chang, Shui Yu
, Kim-Kwang Raymond Choo
:
Secure search for encrypted personal health records from big data NoSQL databases in cloud. Computing 102(6): 1521-1545 (2020) - [j777]Xu Wu, Shihui Guo
, Xing Gao, Minghong Liao, Chin-Chen Chang
, Wei-Chuen Yau:
Information hiding in motion data of virtual characters. Expert Syst. Appl. 159: 113516 (2020) - [j776]Guo-Dong Su, Chin-Chen Chang, Chia-Chen Lin
, Zhiqiang Yao:
Secure high capacity tetris-based scheme for data hiding. IET Image Process. 14(17): 4633-4645 (2020) - [j775]Yu Chen, Jiang-Yi Lin, Chin-Chen Chang, Yu-Chen Hu:
Reversibly hiding data using dual images scheme based on EMD data hiding method. Int. J. Comput. Sci. Eng. 21(4): 583-592 (2020) - [j774]Jiang-Yi Lin, Yu Chen, Chin-Chen Chang, Yu-Chen Hu:
A novel high capacity turtle shell-based data hiding with location table free. Int. J. Comput. Sci. Eng. 22(1): 135-145 (2020) - [j773]Dongwei Gao, Hefeng Chen, Chinchen Chang:
Plaintext aware encryption in the standard model under the linear Diffie-Hellman knowledge assumption. Int. J. Comput. Sci. Eng. 22(2/3): 270-279 (2020) - [j772]Ting-Ting Xia, Juan Lin, Chin-Chen Chang, Tzu-Chuen Lu:
Reversible data hiding scheme based on the AMBTC compression technique and Huffman coding. Int. J. Comput. Sci. Eng. 22(4): 383-393 (2020) - [j771]Chin-Chen Chang, Guo-Dong Su, Chia-Chen Lin:
An improved Sudoku-based data hiding scheme using greedy method. Int. J. Comput. Sci. Eng. 23(1): 10-21 (2020) - [j770]Guo-Hua Qiu, Chin-Feng Lee, Chin-Chen Chang:
Greedy algorithm for image quality optimisation based on turtle-shell steganography. Int. J. Comput. Sci. Eng. 23(1): 50-62 (2020) - [j769]Ji-Hwei Horng
, Xiao-Zhu Xie, Chin-Chen Chang:
The analysis of stego image visual quality for a data hiding scheme based on two-layer turtle shell matrix. Int. J. Comput. Sci. Eng. 23(4): 336-340 (2020) - [j768]Kuo-Kun Tseng, Xialong He, Xiaoxiao An, Chin-Chen Chang, Chao Wang, Xiangmin Guo:
Packet Watermarking With ECG Biological Feature. Int. J. Netw. Secur. 22(1): 1-11 (2020) - [j767]Hui Tian, Zhao-Hua Zhu, Chin-Chen Chang, Yongfeng Huang, Tian Wang, Yonghong Chen, Yiqiao Cai:
StegoNote: Steganography in Guitar Music Using Note Modulation. Int. J. Netw. Secur. 22(1): 68-79 (2020) - [j766]Yu Chen, Jiang-Yi Lin, Chin-Chen Chang, Yu-Chen Hu:
Low-Computation-Cost Data Hiding Scheme Based on Turtle Shell. Int. J. Netw. Secur. 22(2): 296-305 (2020) - [j765]Hefeng Chen, Chin-Chen Chang, Kaimeng Chen:
Reversible Data Hiding Schemes in Encrypted Images Based on the Paillier Cryptosystem. Int. J. Netw. Secur. 22(3): 523-533 (2020) - [j764]Yu Chen, Jiang-Yi Lin, Chin-Chen Chang, Yu-Chen Hu:
Sharing a Secret Image in the Cloud Using Two Shadows. Int. J. Netw. Secur. 22(4): 551-560 (2020) - [j763]Chin-Chen Chang, Jun-Yong Chen, Yan-Hong Chen, Yanjun Liu:
A Reversible Data Hiding Method for SMVQ Indices Based on Improved Locally Adaptive Coding. Int. J. Netw. Secur. 22(4): 575-583 (2020) - [j762]Yanjun Liu, Chin-Chen Chang, Peng-Cheng Huang:
One-Code-Pass User Authentication Based on QR Code and Secret Sharing. Int. J. Netw. Secur. 22(5): 752-762 (2020) - [j761]Yong-qing Chen, Wei-jiao Sun, Liyao Li, Chin-Chen Chang, Xu Wang:
An efficient general data hiding scheme based on image interpolation. J. Inf. Secur. Appl. 54: 102584 (2020) - [j760]Chin-Feng Lee, Chin-Chen Chang, Guanlong Li:
A Data Hiding Scheme Based on Turtle-shell for AMBTC Compressed Images. KSII Trans. Internet Inf. Syst. 14(6): 2554-2575 (2020) - [j759]Xiao-Shuang Li, Chin-Chen Chang
, Mingxing He, Chia-Chen Lin
:
A lightweight authenticable visual secret sharing scheme based on turtle shell structure matrix. Multim. Tools Appl. 79(1-2): 453-476 (2020) - [j758]Xu Wang, Chin-Chen Chang, Chia-Chen Lin
:
Adaptive reversible data hiding scheme for AMBTC compressed images. Multim. Tools Appl. 79(9-10): 6547-6568 (2020) - [j757]Xiao-Zhu Xie, Chin-Chen Chang
, Yu-Chen Hu:
An adaptive reversible data hiding scheme based on prediction error histogram shifting by exploiting signed-digit representation. Multim. Tools Appl. 79(33-34): 24329-24346 (2020) - [j756]Chin-Chen Chang, Chia-Chen Lin
, Guo-Dong Su:
An effective image self-recovery based fragile watermarking using self-adaptive weight-based compressed AMBTC. Multim. Tools Appl. 79(33-34): 24795-24824 (2020) - [j755]Hsiao-Ling Wu, Chin-Chen Chang, Long-Sheng Chen
:
Secure and anonymous authentication scheme for the Internet of Things with pairing. Pervasive Mob. Comput. 67: 101177 (2020) - [j754]Xiaoping Li, Hefeng Chen, Yanjun Liu, Chin-Chen Chang
:
Unordered Multisecret Sharing Based on Generalized Chinese Remainder Theorem. Secur. Commun. Networks 2020: 6073721:1-6073721:8 (2020) - [j753]Zhe Xia
, Yining Liu, Ching-Fang Hsu, Chinchen Chang:
Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple Authentications. Secur. Commun. Networks 2020: 6183861:1-6183861:8 (2020) - [j752]Ji-Hwei Horng
, Shuying Xu, Ching-Chun Chang, Chinchen Chang:
An Efficient Data-Hiding Scheme Based on Multidimensional Mini-SuDoKu. Sensors 20(9): 2739 (2020) - [j751]Ching-Chun Chang, Ji-Hwei Horng
, Chia-Shou Shih, Chin-Chen Chang:
A Maze Matrix-Based Secret Image Sharing Scheme with Cheater Detection. Sensors 20(13): 3802 (2020) - [j750]Hsiao-Ling Wu, Chin-Chen Chang, Yao-Zhu Zheng, Long-Sheng Chen
, Chih-Cheng Chen
:
A Secure IoT-Based Authentication System in Cloud Computing Environment. Sensors 20(19): 5604 (2020) - [j749]Meng Liu
, Shanshan Tu
, Chuangbai Xiao, Muhammad Waqas
, Sadaqat ur Rehman, Muhammad Aamir, Chin-Chen Chang
:
The Allocation and Reuse Scheme of Physical Cell Identifications Based on Maximum Degree First Coloring Algorithm. IEEE Syst. J. 14(1): 582-591 (2020) - [j748]Chia-Chen Lin
, Chin-Chen Chang
, Yao-Zhu Zheng:
A Ring Signature Based Anonymity Authentication Scheme for Group Medical Consultation. Symmetry 12(12): 2009 (2020) - [j747]Mengjie Lv, Shuming Zhou
, Gaolin Chen, Lanxiang Chen
, Jiafei Liu, Chin-Chen Chang
:
On Reliability of Multiprocessor System Based on Star Graph. IEEE Trans. Reliab. 69(2): 715-724 (2020) - [j746]Mingming Cui
, Dezhi Han
, Jun Wang
, Kuan-Ching Li
, Chin-Chen Chang
:
ARFV: An Efficient Shared Data Auditing Scheme Supporting Revocation for Fog-Assisted Vehicular Ad-Hoc Networks. IEEE Trans. Veh. Technol. 69(12): 15815-15827 (2020) - [c281]Kai Huang, Jianjun Li, Shichao Cheng, Jie Yu, Wanyong Tian, Lulu Zhao, Junfeng Hu, Chin-Chen Chang:
An Efficient Algorithm of Facial Expression Recognition by TSG-RNN Network. MMM (2) 2020: 161-174
2010 – 2019
- 2019
- [j745]Xin Tang
, Yongfeng Huang
, Chin-Chen Chang, Linna Zhou:
Efficient Real-Time Integrity Auditing With Privacy-Preserving Arbitration for Images in Cloud Storage System. IEEE Access 7: 33009-33023 (2019) - [j744]Shaowei Weng
, Yi Chen, Bo Ou
, Chin-Chen Chang, Chunyu Zhang:
Improved K-Pass Pixel Value Ordering Based Data Hiding. IEEE Access 7: 34570-34582 (2019) - [j743]Cheng Guo
, Ruhan Zhuang, Chin-Chen Chang, Qiongqiong Yuan:
Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data. IEEE Access 7: 35826-35837 (2019) - [j742]Yijun Liu, Zuoteng Xu, Wujian Ye
, Ziwen Zhang, Shaowei Weng, Chin-Chen Chang, Huajin Tang:
Image Neural Style Transfer With Preserving the Salient Regions. IEEE Access 7: 40027-40037 (2019) - [j741]Wujian Ye
, Haowen Chen, Ziwen Zhang, Yijun Liu, Shaowei Weng, Chin-Chen Chang
:
Hybrid Scheme of Image's Regional Colorization Using Mask R-CNN and Poisson Editing. IEEE Access 7: 115901-115913 (2019) - [j740]Xiaoping Li
, Yanjun Liu
, Hefeng Chen
, Chin-Chen Chang
:
A Secret Image Restoring Scheme Using Threshold Pairs of Unordered Image Shares. IEEE Access 7: 118249-118258 (2019) - [j739]Hui Tian
, Jie Liu, Chin-Chen Chang, Chih-Cheng Chen, Yongfeng Huang
:
Steganalysis of AMR Speech Based on Multiple Classifiers Combination. IEEE Access 7: 140957-140968 (2019) - [j738]Mingze He
, Yanjun Liu
, Chin-Chen Chang
, Mingxing He:
A Mini-Sudoku Matrix-Based Data Embedding Scheme With High Payload. IEEE Access 7: 141414-141425 (2019) - [j737]Jianjun Li
, Chin-Feng Lee, Chin-Chen Chang
, Jiang-Yi Lin, Yun-He Wu:
Reversible Data Hiding Scheme Based on Quad-Tree and Pixel Value Ordering. IEEE Access 7: 142947-142962 (2019) - [j736]Zhan Yu, Chia-Chen Lin
, Chin-Chen Chang
, Guo-Dong Su:
HBF-DH: An Enhanced Payload Hybrid Data Hiding Method Based on a Hybrid Strategy and Block Features. IEEE Access 7: 148439-148452 (2019) - [j735]Chih-Cheng Chen, Chin-Chen Chang, Chia-Chen Lin
, Guo-Dong Su:
TSIA: A Novel Image Authentication Scheme for AMBTC-Based Compressed Images Using Turtle Shell Based Reference Matrix. IEEE Access 7: 149515-149526 (2019) - [j734]Lanxiang Chen, Wai-Kong Lee
, Chin-Chen Chang, Kim-Kwang Raymond Choo
, Nan Zhang:
Blockchain based searchable encryption for electronic health record sharing. Future Gener. Comput. Syst. 95: 420-429 (2019) - [j733]Qiangqiang Lin, Shanshan Tu, Muhammad Waqas
, Sadaqat ur Rehman, Chinchen Chang:
Tracking areas planning based on spectral clustering in small cell networks. IET Commun. 13(13): 1921-1927 (2019) - [j732]Cheng Guo, Pengxu Tian, Chin-Chen Chang:
Privacy preserving weighted similarity search scheme for encrypted data. IET Inf. Secur. 13(1): 61-69 (2019) - [j731]Huidan Hu, Changlu Lin, Chin-Chen Chang, Lanxiang Chen:
Enhanced secure data backup scheme using multi-factor authentication. IET Inf. Secur. 13(6): 649-658 (2019) - [j730]Xiao-Zhu Xie, Chin-Chen Chang, Chia-Chen Lin
:
Reversibility-oriented secret image sharing mechanism with steganography and authentication based on code division multiplexing. IET Image Process. 13(9): 1411-1420 (2019) - [j729]Yanjun Liu, Chin-Chen Chang:
A Cloud-assisted Passenger Authentication Scheme for Japan Rail Pass Based on Image Morphing. Int. J. Netw. Secur. 21(2): 211-220 (2019) - [j728]Xiao-Shuang Li, Chin-Chen Chang, Mingxing He, Chia-Chen Lin:
Secure High Capacity Data Hiding Scheme based on Reference Matrix. Int. J. Netw. Secur. 21(6): 918-929 (2019) - [j727]Chin-Chen Chang
, Wai-Kong Lee
, Yanjun Liu, Bok-Min Goi, Raphael C.-W. Phan:
Signature Gateway: Offloading Signature Generation to IoT Gateway Accelerated by GPU. IEEE Internet Things J. 6(3): 4448-4461 (2019) - [j726]Hui Tian
, Fulin Nan
, Hong Jiang, Chin-Chen Chang
, Jianting Ning, Yongfeng Huang
:
Public auditing for shared cloud data with efficient and secure group management. Inf. Sci. 472: 107-125 (2019) - [j725]Peng-Cheng Huang, Chin-Chen Chang, Yung-Hui Li, Yanjun Liu:
Efficient secret sharing scheme with cheater identification based on QR code. KSII Trans. Internet Inf. Syst. 13(10): 5144-5160 (2019) - [j724]Jiang-Yi Lin, Yu Chen, Chin-Chen Chang, Yu-Chen Hu:
Reversible Data Hiding in Encrypted Images Based on Bit-plane Block Embedding. J. Inf. Hiding Multim. Signal Process. 10(2): 408-421 (2019) - [j723]Hui Tian
, Fulin Nan
, Chin-Chen Chang, Yongfeng Huang
, Jing Lu, Yongqian Du:
Privacy-preserving public auditing for secure data storage in fog-to-cloud computing. J. Netw. Comput. Appl. 127: 59-69 (2019) - [j722]Alan Chin-Chen Chang, Ying-Dar Lin, Yu-Kuen Lai, Yuan-Cheng Lai:
A scalable and accurate distributed traffic generator with Fourier transformed distribution over multiple commodity platforms. J. Netw. Comput. Appl. 144: 102-117 (2019) - [j721]Jiang-Yi Lin, Yanjun Liu, Chin-Chen Chang:
A real-time dual-image-based reversible data hiding scheme using turtle shells. J. Real Time Image Process. 16(3): 673-684 (2019) - [j720]Hui Tian, Meilun Huang, Chin-Chen Chang, Yongfeng Huang, Jing Lu, Yongqian Du:
Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pitch Delay. J. Univers. Comput. Sci. 25(9): 1131-1150 (2019) - [j719]Kaimeng Chen, Chin-Chen Chang
:
High-capacity reversible data hiding in encrypted images based on extended run-length coding and block-based MSB plane rearrangement. J. Vis. Commun. Image Represent. 58: 334-344 (2019) - [j718]Guo-Dong Su
, Yanjun Liu, Chin-Chen Chang
:
A square lattice oriented reversible information hiding scheme with reversibility and adaptivity for dual images. J. Vis. Commun. Image Represent. 64 (2019) - [j717]Li Liu, Lifang Wang, Chin-Chen Chang
:
Data embedding scheme based on multi-matrix structure of turtle shell to avoid human eye perception. Multim. Tools Appl. 78(8): 10473-10490 (2019) - [j716]Xiaozhu Xie, Chia-Chen Lin
, Chin-Chen Chang:
A reversible data hiding scheme for JPEG images by doubling small quantized AC coefficients. Multim. Tools Appl. 78(9): 11443-11462 (2019) - [j715]Xiaozhu Xie, Yanjun Liu
, Chin-Chen Chang:
Extended squared magic matrix for embedding secret information with large payload. Multim. Tools Appl. 78(14): 19045-19059 (2019) - [j714]Xiaozhu Xie, Chin-Chen Chang, Chia-Chen Lin
, Jia-Long Lin:
A Turtle Shell based RDH scheme with two-dimensional histogram shifting. Multim. Tools Appl. 78(14): 19413-19436 (2019) - [j713]Peng-Cheng Huang, Chin-Chen Chang
, Yung-Hui Li, Yanjun Liu:
High-payload secret hiding mechanism for QR codes. Multim. Tools Appl. 78(16): 22331-22350 (2019) - [j712]Jiang-Yi Lin, Yu Chen, Chin-Chen Chang, Yu-Chen Hu:
Dual-image-based reversible data hiding scheme with integrity verification using exploiting modification direction. Multim. Tools Appl. 78(18): 25855-25872 (2019) - [j711]Peng-Cheng Huang, Yung-Hui Li, Chin-Chen Chang
, Yanjun Liu:
Efficient QR code authentication mechanism based on Sudoku. Multim. Tools Appl. 78(18): 26023-26045 (2019) - [j710]Kaimeng Chen, Chin-Chen Chang
:
Error-free separable reversible data hiding in encrypted images using linear regression and prediction error map. Multim. Tools Appl. 78(22): 31441-31465 (2019) - [j709]Hefeng Chen
, Chin-Chen Chang
:
A Novel (t, n) Secret Sharing Scheme Based upon Euler's Theorem. Secur. Commun. Networks 2019: 2387358:1-2387358:7 (2019) - [j708]Lin Li
, Chin-Chen Chang
, Hefeng Chen
:
An Improved Bidirectional Shift-Based Reversible Data Hiding Scheme Using Double-Way Prediction Strategy. Secur. Commun. Networks 2019: 3031506:1-3031506:17 (2019) - [j707]Hefeng Chen
, Hsiao-Ling Wu, Chin-Chen Chang
, Long-Sheng Chen
:
Light Repository Blockchain System with Multisecret Sharing for Industrial Big Data. Secur. Commun. Networks 2019: 9060756:1-9060756:7 (2019) - [j706]Hui Tian
, Zhaoyi Chen, Chin-Chen Chang, Yongfeng Huang
, Tian Wang
, Zheng-an Huang, Yiqiao Cai, Yonghong Chen:
Public audit for operation behavior logs with error locating in cloud storage. Soft Comput. 23(11): 3779-3792 (2019) - [j705]Pei-Feng Shiu, Wei-Liang Tai
, Jinn-Ke Jan, Chin-Chen Chang, Chia-Chen Lin
:
An Interpolative AMBTC-based high-payload RDH scheme for encrypted images. Signal Process. Image Commun. 74: 64-77 (2019) - [j704]Yan-Hong Chen, Chin-Chen Chang, Chia-Chen Lin
, Cheng-Yi Hsu:
Content-Based Color Image Retrieval Using Block Truncation Coding Based on Binary Ant Colony Optimization. Symmetry 11(1): 21 (2019) - [j703]Shaowei Weng
, Yi Chen, Wien Hong
, Jeng-Shyang Pan
, Chin-Chen Chang, Yijun Liu:
An Improved Integer Transform Combining with an Irregular Block Partition. Symmetry 11(1): 49 (2019) - [j702]Kaimeng Chen
, Chin-Chen Chang:
Real-Time Error-Free Reversible Data Hiding in Encrypted Images Using (7, 4) Hamming Code and Most Significant Bit Prediction. Symmetry 11(1): 51 (2019) - [j701]Lin Li
, Chia-Chen Lin
, Chin-Chen Chang:
Using Two Meaningful Shadows to Share Secret Messages with Reversibility. Symmetry 11(1): 79 (2019) - [j700]Li Liu
, Lifang Wang, Yun-Qing Shi, Chin-Chen Chang:
Separable Data-Hiding Scheme for Encrypted Image to Protect Privacy of User in Cloud. Symmetry 11(1): 82 (2019) - [j699]Zhe Xia, Yi-Ning Liu
, Ching-Fang Hsu, Chin-Chen Chang:
An Information Theoretically Secure E-Lottery Scheme Based on Symmetric Bivariate Polynomials. Symmetry 11(1): 88 (2019) - [j698]Guo-Dong Su
, Chin-Chen Chang, Chia-Chen Lin
:
High-Precision Authentication Scheme Based on Matrix Encoding for AMBTC-Compressed Images. Symmetry 11(8): 996 (2019) - [j697]Shanqing Zhang, Shengqi Su, Li Li, Qili Zhou, Jianfeng Lu, Chin-Chen Chang:
An Image Style Transfer Network Using Multilevel Noise Encoding and Its Application in Coverless Steganography. Symmetry 11(9): 1152 (2019) - [j696]Juan Lin, Chia-Chen Lin
, Chin-Chen Chang:
Reversible Steganographic Scheme for AMBTC-Compressed Image Based on (7, 4) Hamming Code. Symmetry 11(10): 1236 (2019) - [j695]Chin-Chen Chang, Xu Wang
, Ji-Hwei Horng
:
A Hybrid Data Hiding Method for Strict AMBTC Format Images with High-Fidelity. Symmetry 11(10): 1314 (2019) - [j694]Yu-Chieh Chen, Chin-Chen Chang, Ramesh Perumal
, Shih-Rung Yeh, Yen-Chung Chang, Hsin Chen:
Optimization and Implementation of Wavelet-based Algorithms for Detecting High-voltage Spindles in Neuron Signals. ACM Trans. Embed. Comput. Syst. 18(5): 39:1-39:16 (2019) - [j693]Ngoc-Tu Nguyen
, Chin-Chen Chang
:
A Biometric-Based Authenticated Key Agreement Protocol for User-to-User Communications in Mobile Satellite Networks. Wirel. Pers. Commun. 107(4): 1727-1758 (2019) - [c280]Mian Sun, Li Li, Shanqing Zhang, Jianfeng Lu, Xiaoqing Feng, Chin-Chen Chang:
A copy detection algorithm for game character concept design based on pose features. ACM TUR-C 2019: 117:1-117:8 - [c279]Hsiao-Ling Wu, Chin-Chen Chang, Long-Sheng Chen
:
Secure Authentication Scheme with Conditional Privacy Preservation in a Global Mobility Communication Network. IECC 2019: 16-20 - [e6]Yulin Wang, Chin-Chen Chang:
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019, Kuala Lumpur, Malaysia, January 19-21, 2019. ACM 2019, ISBN 978-1-4503-6618-2 [contents] - 2018
- [j692]Jianfeng Lu, Xiaoyu Xu
, Xin Li
, Li Li, Chin-Chen Chang, Xiaoqing Feng, Shanqing Zhang:
Detection of Bird's Nest in High Power Lines in the Vicinity of Remote Campus Based on Combination Features and Cascade Classifier. IEEE Access 6: 39063-39071 (2018) - [j691]Jianjun Li, Ning Wang
, Zhihui Wang, Haojie Li, Chin-Chen Chang, Hong Wang:
New Secret Sharing Scheme Based on Faster R-CNNs Image Retrieval. IEEE Access 6: 49348-49357 (2018) - [j690]Changlu Lin
, Huidan Hu, Chin-Chen Chang, Shaohua Tang
:
A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction. IEEE Access 6: 70666-70673 (2018) - [j689]Shan-Shan Tu, Muhammad Waqas
, Sadaqat ur Rehman, Muhammad Aamir, Obaid Ur Rehman
, Jianbiao Zhang, Chinchen Chang:
Security in Fog Computing: A Novel Technique to Tackle an Impersonation Attack. IEEE Access 6: 74993-75001 (2018) - [j688]Rong Wang
, Yan Zhu, Tung-Shou Chen, Chin-Chen Chang:
An Authentication Method Based on the Turtle Shell Algorithm for Privacy-Preserving Data Mining. Comput. J. 61(8): 1123-1132 (2018) - [j687]Yanjun Liu, Chin-Chen Chang:
Reversible data hiding for JPEG images employing all quantized non-zero AC coefficients. Displays 51: 51-56 (2018) - [j686]Chin-Feng Lee, Chin-Chen Chang, Xiaozhu Xie
, Ke Mao, Run-Hua Shi:
An adaptive high-fidelity steganographic scheme using edge detection and hybrid hamming codes. Displays 53: 30-39 (2018) - [j685]Sadaqat ur Rehman, Shan-Shan Tu
, Obaid Ur Rehman
, Yongfeng Huang
, Chathura M. Sarathchandra Magurawalage
, Chinchen Chang:
Optimization of CNN through Novel Training Strategy for Visual Classification Problems. Entropy 20(4): 290 (2018) - [j684]Hui Tian
, Jun Sun, Chin-Chen Chang
, Yongfeng Huang
, Yonghong Chen
:
Detecting Bitrate Modulation-Based Covert Voice-Over-IP Communication. IEEE Commun. Lett. 22(6): 1196-1199 (2018) - [j683]Chuan Qin
, Ping Ji, Chin-Chen Chang, Jing Dong, Xingming Sun:
Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image Tampering Recovery. IEEE Multim. 25(3): 36-48 (2018) - [j682]Li Li, Hangkai Li, Wenqiang Yuan, Jianfeng Lu, Xiaoqing Feng, Chin-Chen Chang:
A Watermarking Mechanism With High Capacity for Three-Dimensional Mesh Objects Using Integer Planning. IEEE Multim. 25(3): 49-64 (2018) - [j681]Zhe Xia, Zheng Tong, Min Xiao
, Chin-Chen Chang:
Framework for practical and receipt-free remote voting. IET Inf. Secur. 12(4): 326-331 (2018) - [j680]Jianjun Li, Yun-He Wu, Chin-Feng Lee, Chin-Chen Chang:
Generalized PVO-K Embedding Technique for Reversible Data Hiding. Int. J. Netw. Secur. 20(1): 65-77 (2018) - [j679]Cheng Guo, Chin-Chen Chang, Shih-Chang Chang:
A Secure and Efficient Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications. Int. J. Netw. Secur. 20(2): 323-331 (2018) - [j678]Chin-Chen Chang, Ngoc-Tu Huynh, Yu-Kai Wang, Yanjun Liu:
An Improved Data Hiding Method Based on Lempel-Ziv-Welch Compression Codes. Int. J. Netw. Secur. 20(3): 478-488 (2018) - [j677]Peng-Cheng Huang, Yung-Hui Li, Chin-Chen Chang, Yanjun Liu:
Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction. KSII Trans. Internet Inf. Syst. 12(5): 2348-2365 (2018) - [j676]Rong Wang
, Yan Zhu, Tung-Shou Chen, Chin-Chen Chang:
Privacy-Preserving Algorithms for Multiple Sensitive Attributes Satisfying t-Closeness. J. Comput. Sci. Technol. 33(6): 1231-1242 (2018) - [j675]Shan-Qing Zhang, Tao Wu, Xianghua Xu, Zongmao Chen, Shiliang Pu, Chin-Chen Chang:
No-Reference Image Blur Assessment Based on SIFT and DCT. J. Inf. Hiding Multim. Signal Process. 9(1): 219-231 (2018) - [j674]Ye Yao, Cai-Xia Yu, Li Yang, Chin-Chen Chang:
Computer-Aided Annotation for Video Tampering Dataset of Forensic Research. J. Inf. Hiding Multim. Signal Process. 9(3): 768-774 (2018) - [j673]Zhao-Hua Zhu, Hui Tian, Chin-Chen Chang, Yonghong Chen, Tian Wang, Yiqiao Cai:
StegTab: Steganography in Guitar Tablatures. J. Inf. Hiding Multim. Signal Process. 9(4): 904-917 (2018) - [j672]Chin-Chen Chang, Yi-Ping Chiu, Chia-Chen Lin, Yi-Hui Chen:
Distortion Free Progressive BTC based Secret Image Sharing. J. Netw. Intell. 3(3): 195-213 (2018) - [j671]Cheonshik Kim, Chin-Chen Chang, Ching-Nung Yang, Xinpeng Zhang, Jinsuk Baek:
Special Issue: Real-Time Data Hiding and Visual Cryptography. J. Real Time Image Process. 14(1): 1-4 (2018) - [j670]Chin-Chen Chang, Ran Tang, Chia-Chen Lin, Wan-Li Lyu:
High-Capacity Reversible Data Hiding Method for JPEG Images. J. Softw. 13(1): 1-17 (2018) - [j669]Hsiao-Ling Wu, Chin-Chen Chang
:
Attacks on "a provably secure and efficient authentication scheme for access control in mobile pay-TV systems". Multim. Tools Appl. 77(2): 1525-1535 (2018) - [j668]Fan Li, Qian Mao, Chin-Chen Chang
:
Reversible data hiding scheme based on the Haar discrete wavelet transform and interleaving prediction method. Multim. Tools Appl. 77(5): 5149-5168 (2018) - [j667]Ngoc-Tu Huynh, K. Bharanitharan, Chin-Chen Chang, Yanjun Liu:
Minima-maxima preserving data hiding algorithm for absolute moment block truncation coding compressed images. Multim. Tools Appl. 77(5): 5767-5783 (2018) - [j666]Chin-Chen Chang, Tung-Shou Chen, Yu-Kai Wang, Yanjun Liu
:
A reversible data hiding scheme based on absolute moment block truncation coding compression using exclusive OR operator. Multim. Tools Appl. 77(7): 9039-9053 (2018) - [j665]Jianjun Li, Chenyan Wang, Xie Chen, Zheng Tang, Guobao Hui, Chin-Chen Chang
:
A selective encryption scheme of CABAC based on video context in high efficiency video coding. Multim. Tools Appl. 77(10): 12837-12851 (2018) - [j664]Binbin Xia, Anhong Wang, Chin-Chen Chang
, Li Liu:
Reversible data hiding for VQ indices using hierarchical state codebook mapping. Multim. Tools Appl. 77(16): 20519-20533 (2018) - [j663]Ngoc-Tu Nguyen
, Chin-Chen Chang
:
A biometric-based authenticated key agreement scheme for session initiation protocol in ip-based multimedia networks. Multim. Tools Appl. 77(18): 23909-23947 (2018) - [j662]Peng-Cheng Huang, Chin-Chen Chang
, Yung-Hui Li:
Sudoku-based secret sharing approach with cheater prevention using QR code. Multim. Tools Appl. 77(19): 25275-25294 (2018) - [j661]Yanjun Liu, Chin-Chen Chang
:
A turtle shell-based visual secret sharing scheme with reversibility and authentication. Multim. Tools Appl. 77(19): 25295-25310 (2018) - [j660]Thai-Son Nguyen
, Chin-Chen Chang, Tso-Hsien Shih:
Effective reversible image steganography based on rhombus prediction and local complexity. Multim. Tools Appl. 77(20): 26449-26467 (2018) - [j659]Chin-Chen Chang, Amy N. Nicholson, Enrico Rinaldi
, Evan Berkowitz
, Nicolas Garron
, D. A. Brantley, H. Monge-Camacho
, C. J. Monahan, Chris Bouchard
, Michael A. Clark
, Bálint Joó, Thorsten Kurth, Konstantinos Orginos
, Pavlos Vranas
, André Walker-Loud
:
A per-cent-level determination of the nucleon axial coupling from quantum chromodynamics. Nat. 558(7708): 91-94 (2018) - [j658]Ngoc-Tu Nguyen
, Chin-Chen Chang:
Untraceable biometric-based three-party authenticated key exchange for dynamic systems. Peer-to-Peer Netw. Appl. 11(3): 644-663 (2018) - [j657]Peng-Cheng Huang, Alan Chin-Chen Chang
, Yung-Hui Li, Yanjun Liu:
Efficient access control system based on aesthetic QR code. Pers. Ubiquitous Comput. 22(1): 81-91 (2018) - [j656]Dinh-Chien Nguyen, Thai-Son Nguyen
, Chin-Chen Chang
, Huan-Sheng Hsueh, Fang-Rong Hsu:
High Embedding Capacity Data Hiding Algorithm for H.264/AVC Video Sequences without Intraframe Distortion Drift. Secur. Commun. Networks 2018: 2029869:1-2029869:11 (2018) - [j655]Jianjun Li, Jie Yu
, Lanlan Xu, Xinying Xue, Chin-Chen Chang
, Xiaoyang Mao, Junfeng Hu:
A Cascaded Algorithm for Image Quality Assessment and Image Denoising Based on CNN for Image Security and Authorization. Secur. Commun. Networks 2018: 8176984:1-8176984:13 (2018) - [j654]Chuan Qin
, Meihui Sun, Chin-Chen Chang:
Perceptual hashing for color images based on hybrid extraction of structural features. Signal Process. 142: 194-205 (2018) - [j653]Chuan Qin
, Wei Zhang, Fang Cao, Xinpeng Zhang, Chin-Chen Chang
:
Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection. Signal Process. 153: 109-122 (2018) - [j652]Chin-Chen Chang, Tzu-Chuen Lu
, Zhao-Hua Zhu, Hui Tian
:
An Effective Authentication Scheme Using DCT for Mobile Devices. Symmetry 10(1): 13 (2018) - [j651]Yanjun Liu, Chin-Chen Chang, Peng-Cheng Huang, Cheng-Yi Hsu:
Efficient Information Hiding Based on Theory of Numbers. Symmetry 10(1): 19 (2018) - [j650]Xiaozhu Xie, Chia-Chen Lin
, Chin-Chen Chang:
Data Hiding Based on a Two-Layer Turtle Shell Matrix. Symmetry 10(2): 47 (2018) - [j649]Jianjun Li, Kangjian Peng, Chin-Chen Chang:
An Efficient Object Detection Algorithm Based on Compressed Networks. Symmetry 10(7): 235 (2018) - [j648]Jie Liu, Hui Tian
, Chin-Chen Chang, Tian Wang
, Yonghong Chen, Yiqiao Cai:
Steganalysis of Inactive Voice-Over-IP Frames Based on Poker Test. Symmetry 10(8): 336 (2018) - [j647]Jianfeng Lu, Weiling Cheng, Shanqing Zhang, Li Li, Zaorang Yang, Chin-Chen Chang:
A Novel Aesthetic QR Code Algorithm Based on Hybrid Basis Vector Matrices. Symmetry 10(11): 543 (2018) - [j646]Wenqi Chen, Hui Tian
, Chin-Chen Chang
, Fulin Nan, Jing Lu:
Adjacency-Hash-Table Based Public Auditing for Data Integrity in Mobile Cloud Computing. Wirel. Commun. Mob. Comput. 2018: 3471312:1-3471312:12 (2018) - [j645]Xu Zhuang, Yan Zhu, Chin-Chen Chang, Qiang Peng:
Security Issues in Ultralightweight RFID Authentication Protocols. Wirel. Pers. Commun. 98(1): 779-814 (2018) - [c278]Li Li, Xin Li, Tong Qiao, Xiaoyu Xu, Shanqing Zhang, Chin-Chen Chang:
A Novel Framework of Robust Video Watermarking Based on Statistical Model. ICCCS (4) 2018: 160-172 - [c277]Li Li, Jier Yu, Bing Wang, Qili Zhou, Shanqing Zhang, Jianfeng Lu, Chin-Chen Chang:
Multiple Schemes for Bike-Share Service Authentication Using QR Code and Visual Cryptography. ICCCS (3) 2018: 629-640 - [c276]Hsiao-Ling Wu, Chin-Chen Chang, Long-Sheng Chen
:
On the Security of a Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography. ICIT 2018: 88-91 - [c275]Jianjun Li, Lanlan Xu, Haojie Li, Chin-Chen Chang, Fuming Sun
:
Parameter Selection for Denoising Algorithms Using NR-IQA with CNN. MMM (1) 2018: 381-392 - [c274]Xin Tang, Linna Zhou, Yongfeng Huang
, Chin-Chen Chang:
Efficient Cross-User Deduplication of Encrypted Data Through Re-Encryption. TrustCom/BigDataSE 2018: 897-904 - [i1]Zhongliang Yang, Xueshun Peng, Yongfeng Huang, Chinchen Chang:
A novel method of speech information hiding based on 3D-Magic Matrix. CoRR abs/1809.03010 (2018) - 2017
- [j644]Junlan Bai, Chin-Chen Chang, Thai-Son Nguyen
, Ce Zhu, Yanjun Liu:
A high payload steganographic algorithm based on edge detection. Displays 46: 42-51 (2017) - [j643]Hui Tian
, Jun Sun, Chin-Chen Chang, Jie Qin, Yonghong Chen:
Hiding Information Into Voice-Over-IP Streams Using Adaptive Bitrate Modulation. IEEE Commun. Lett. 21(4): 749-752 (2017) - [j642]Xu Zhuang, Yan Zhu, Chin-Chen Chang, Qiang Peng:
Feature bundling in decision tree algorithm. Intell. Data Anal. 21(2): 371-383 (2017) - [j641]Qun Jin, Yong Xiang, Guozi Sun, Yao Liu, Chin-Chen Chang:
Cybersecurity for Cyber-Enabled Multimedia Applications. IEEE Multim. 24(4): 10-13 (2017) - [j640]Feng Wang, Chin-Chen Chang, Hsiao-Ling Wu:
Secure CAS-based authentication scheme for mobile pay-TV systems. Int. J. Commun. Syst. 30(10) (2017) - [j639]Ting-Fang Cheng, Chin-Chen Chang, Yu-Ya Lo:
Smart card-based password authenticated key agreement protocol using chaotic maps. Int. J. Commun. Syst. 30(12) (2017) - [j638]Yanjun Liu, Chin-Chen Chang, Shih-Chang Chang:
An Efficient and Secure Smart Card Based Password Authentication Scheme. Int. J. Netw. Secur. 19(1): 1-10 (2017) - [j637]Quanyu Zhao, Yining Liu, Gao Liu, Chin-Chen Chang:
A Novel Micropayment Scheme with Variable Denomination. Int. J. Netw. Secur. 19(1): 85-90 (2017) - [j636]Qiang Jin, Zhihong Li, Chin-Chen Chang, Anhong Wang, Li Liu:
Minimizing Turtle-Shell Matrix Based Stego Image Distortion Using Particle Swarm Optimization. Int. J. Netw. Secur. 19(1): 154-162 (2017) - [j635]Qian Mao, Chin-Chen Chang:
Turbo Unequal Error Protection Codes with Multiple Protection Levels. Int. J. Netw. Secur. 19(2): 205-216 (2017) - [j634]Li Liu, Anhong Wang, Chin-Chen Chang, Zhihong Li:
A Secret Image Sharing with Deep-steganography and Two-stage Authentication Based on Matrix Encoding. Int. J. Netw. Secur. 19(3): 327-334 (2017) - [j633]Xu Zhuang, Yan Zhu, Chin-Chen Chang, Qiang Peng, Faisal Khurshid
:
A unified score propagation model for web spam demotion algorithm. Inf. Retr. J. 20(6): 547-574 (2017) - [j632]Jianjun Li, Susu Fan, Zhihui Wang, Haojie Li, Chin-Chen Chang:
An Optimized CLBP Descriptor Based on a Scalable Block Size for Texture Classification. KSII Trans. Internet Inf. Syst. 11(1): 288-301 (2017) - [j631]Weibo Chu, Li-Fang Wang, Ze-Jun Jiang, Alan Chin-Chen Chang:
Protecting User Privacy in a Multi-Path Information-Centric Network Using Multiple Random-Caches. J. Comput. Sci. Technol. 32(3): 585-598 (2017) - [j630]Chin-Chen Chang, Pei-Yan Pai, Meng-Hsiun Tsai, Yung-Kuan Chan:
Vessel Detection in Chicken Chorioallantoic Membrane Image. J. Inf. Hiding Multim. Signal Process. 8(4): 784-797 (2017) - [j629]Liang-min Wang, Qing-Qing Xie, Tao Jiang, Chin-Chen Chang:
ShortHC: Self-Regenerated Short Hash Chain for Resource-Constrained System. J. Inf. Hiding Multim. Signal Process. 8(4): 847-860 (2017) - [j628]Chin-Chen Chang, Thai-Son Nguyen, Tzu-Yi Chien:
An Efficient Steganography Scheme Based on Edge Detection for High Payload. J. Inf. Hiding Multim. Signal Process. 8(5): 967-979 (2017) - [j627]Fei Yu
, Chin-Chen Chang, Jian Shu
, Iftikhar Ahmad, Jun Zhang
, José María de Fuentes
:
Recent Advances in Security and Privacy for Wireless Sensor Networks 2016. J. Sensors 2017: 3057534:1-3057534:3 (2017) - [j626]Jianfeng Lu, Zaorang Yang, Lina Li, Wenqiang Yuan, Li Li, Chin-Chen Chang:
Multiple Schemes for Mobile Payment Authentication Using QR Code and Visual Cryptography. Mob. Inf. Syst. 2017: 4356038:1-4356038:12 (2017) - [j625]Wen-Chung Kuo, Sheng-Yi Chang, Chun-Cheng Wang, Chin-Chen Chang:
Secure multi-group data hiding based on gemd map. Multim. Tools Appl. 76(2): 1901-1919 (2017) - [j624]Chuan Qin
, Ping Ji, Jinwei Wang, Chin-Chen Chang:
Fragile image watermarking scheme based on VQ index sharing and self-embedding. Multim. Tools Appl. 76(2): 2267-2287 (2017) - [j623]Li Liu, Chin-Chen Chang, Anhong Wang:
Data hiding based on extended turtle shell matrix construction method. Multim. Tools Appl. 76(10): 12233-12250 (2017) - [j622]Chin-Chen Chang
, Ying-Hsuan Huang, Tzu-Chuen Lu:
A difference expansion based reversible information hiding scheme with high stego image visual quality. Multim. Tools Appl. 76(10): 12659-12681 (2017) - [j621]Li Liu, Lifang Wang, Chin-Chen Chang
:
A semantic compression scheme for digital images based on vector quantization and data hiding. Multim. Tools Appl. 76(20): 20833-20846 (2017) - [j620]Yanjun Liu, Chin-Chen Chang
:
A one-card-pass user authentication scheme using image morphing. Multim. Tools Appl. 76(20): 21247-21264 (2017) - [j619]Chin-Chen Chang, Hsiao-Ling Wu, Chin-Yu Sun:
Notes on "Secure authentication scheme for IoT and cloud servers". Pervasive Mob. Comput. 38: 275-278 (2017) - [j618]Hui Tian
, Yanpeng Wu, Chin-Chen Chang, Yongfeng Huang, Yonghong Chen, Tian Wang, Yiqiao Cai, Jin Liu:
Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs. Signal Process. 134: 9-22 (2017) - [j617]Hui Tian
, Zhaoyi Chen, Chin-Chen Chang, Minoru Kuribayashi
, Yongfeng Huang, Yiqiao Cai, Yonghong Chen, Tian Wang:
Enabling public auditability for operation behaviors in cloud storage. Soft Comput. 21(8): 2175-2187 (2017) - [j616]Hui Tian
, Yuxiang Chen, Chin-Chen Chang, Hong Jiang, Yongfeng Huang, Yonghong Chen, Jin Liu:
Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage. IEEE Trans. Serv. Comput. 10(5): 701-714 (2017) - [c273]Li Li, Lina Li, Shanqing Zhang, Zaorang Yang, Jianfeng Lu, Chin-Chen Chang:
Novel Schemes for Bike-Share Service Authentication Using Aesthetic QR Code and Color Visual Cryptography. ICCCS (2) 2017: 837-842 - [c272]Chin-Feng Lee, Chin-Chen Chang, Qun-Feng Zeng:
VQ Compression Enhancer with Huffman Coding. ICGEC 2017: 101-108 - [c271]Chin-Chen Chang, Iuon-Chang Lin, Yu-Wei Su, Yanjun Liu:
A Digital Gift Certificate Scheme with Conditional Anonymity. ICMSS 2017: 139-144 - [c270]Yanjun Liu, Chin-Chen Chang, Peng-Cheng Huang:
Extended Exploiting-Modification-Direction Data Hiding with High Capacity. ICVIP 2017: 151-155 - [c269]Chin-Chen Chang, Thai-Son Nguyen
, Yanjun Liu:
A reversible data hiding scheme for image interpolation based on reference matrix. IWBF 2017: 1-6 - [c268]Chin-Chen Chang, Jen-Ho Yang, Yu-Wei Lai, Yanjun Liu:
An offline user-verifiable electronic traveler's check system. IWBF 2017: 1-6 - [c267]Xiaozhu Xie, Chin-Chen Chang:
Reversible data hiding in encrypted images using reformed JPEG compression. IWBF 2017: 1-5 - 2016
- [j615]Wenlong Xu, Chin-Chen Chang, Tung-Shou Chen, Liang-Min Wang:
An improved least-significant-bit substitution method using the modulo three strategy. Displays 42: 36-42 (2016) - [j614]Chin-Chen Chang, Thai Son Nguyen
, Meng-Chieh Lin, Chia-Chen Lin
:
A novel data-hiding and compression scheme based on block classification of SMVQ indices. Digit. Signal Process. 51: 142-155 (2016) - [j613]Yi-Ning Liu
, Chi Cheng, Tao Jiang, Chin-Chen Chang:
A practical lottery using oblivious transfer. Int. J. Commun. Syst. 29(2): 277-282 (2016) - [j612]Chin-Chen Chang, Ting-Fang Cheng, Wei-Yuan Hsueh:
A robust and efficient dynamic identity-based multi-server authentication scheme using smart cards. Int. J. Commun. Syst. 29(2): 290-306 (2016) - [j611]Zhi-Hui Wang, Xu Zhuang, Chin-Chen Chang, Chuan Qin, Yan Zhu:
Reversible Data Hiding Based on Geometric Structure of Pixel Groups. Int. J. Netw. Secur. 18(1): 52-59 (2016) - [j610]Feng Wang, Chin-Chen Chang, Changlu Lin, Shih-Chang Chang:
Secure and Efficient Identity-based Proxy Multi-signature Using Cubic Residues. Int. J. Netw. Secur. 18(1): 90-98 (2016) - [j609]Chin-Chen Chang, Chin-Yu Sun, Shih-Chang Chang:
A Strong RSA-based and Certificateless-based Signature Scheme. Int. J. Netw. Secur. 18(2): 201-208 (2016) - [j608]Hai-Duong Le, Ngoc-Tu Nguyen, Chin-Chen Chang:
Provably Secure and Efficient Three-Factor Authenticated Key Agreement Scheme with Untraceability. Int. J. Netw. Secur. 18(2): 335-344 (2016) - [j607]Fan Li, Qian Mao, Chin-Chen Chang:
A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method. Int. J. Netw. Secur. 18(3): 410-419 (2016) - [j606]Feng Wang, Chin-Chen Chang, Changlu Lin:
Security Analysis on Secure Untraceable Off-line Electronic Cash System. Int. J. Netw. Secur. 18(3): 454-458 (2016) - [j605]Yanjun Liu, Chin-Chen Chang:
An Integratable Verifiable Secret Sharing Mechanism. Int. J. Netw. Secur. 18(4): 617-624 (2016) - [j604]K. Bharanitharan, Chin-Chen Chang, Yang Hai Rui, Zhi-Hui Wang:
Efficient Pixel Prediction Algorithm for Reversible Data Hiding. Int. J. Netw. Secur. 18(4): 750-757 (2016) - [j603]Qing-Qing Xie, Shunrong Jiang, Liangmin Wang, Chin-Chen Chang:
Composable Secure Roaming Authentication Protocol for Cloud-assisted Body Sensor Networks. Int. J. Netw. Secur. 18(5): 816-831 (2016) - [j602]Yanjun Liu, Chin-Chen Chang, Chin-Yu Sun:
Notes on "An Anonymous Multi-server Authenticated Key Agreement Scheme Based on Trust Computing Using Smart Card and Biometrics". Int. J. Netw. Secur. 18(5): 997-1000 (2016) - [j601]Chin-Chen Chang, Wei-Yuan Hsueh, Ting-Fang Cheng:
An Advanced Anonymous and Biometrics-based Multi-server Authentication Scheme Using Smart Cards. Int. J. Netw. Secur. 18(6): 1010-1021 (2016) - [j600]Junlan Bai, Chin-Chen Chang:
A High Payload Steganographic Scheme for Compressed Images with Hamming Code. Int. J. Netw. Secur. 18(6): 1122-1129 (2016) - [j599]Qiong Wu
, Chen Zhu, Jianjun Li, Chin-Chen Chang, Zhi-Hui Wang:
A magic cube based information hiding scheme of large payload. J. Inf. Secur. Appl. 26: 1-7 (2016) - [j598]Thai Son Nguyen
, Chin-Chen Chang, Tso-Hsien Shih:
A High-Quality Reversible Image Authentication Scheme Based on Adaptive PEE for Digital Images. KSII Trans. Internet Inf. Syst. 10(1): 395-413 (2016) - [j597]Zhihong Li, Qiang Jin, Chin-Chen Chang, Li Liu, Anhong Wang:
A Common Bitmap Block Truncation Coding for Color Images Based on Binary Ant Colony Optimization. KSII Trans. Internet Inf. Syst. 10(5): 2326-2345 (2016) - [j596]Yubo Luo, Yongfeng Huang, Fufang Li, Chinchen Chang:
Text Steganography Based on Ci-poetry Generation Using Markov Chain Model. KSII Trans. Internet Inf. Syst. 10(9): 4568-4584 (2016) - [j595]Ya-Feng Di, Chin-Feng Lee, Zhi-Hui Wang, Chin-Chen Chang, Jianjun Li:
A Robust and Removable Watermarking Scheme Using Singular Value Decomposition. KSII Trans. Internet Inf. Syst. 10(12): 5268-5285 (2016) - [j594]Hong Zhong, Song Li, Ting-Fang Cheng, Chin-Chen Chang:
An Efficient Electronic English Auction System with a Secure On-Shelf Mechanism and Privacy Preserving. J. Electr. Comput. Eng. 2016: 6567146:1-6567146:14 (2016) - [j593]Wan-Li Lyu, Chin-Chen Chang:
An Image Compression Method Based on Block Truncation Coding and Linear Regression. J. Inf. Hiding Multim. Signal Process. 7(1): 198-215 (2016) - [j592]Hong Zhong, Haiquan Liu, Chin-Chen Chang, Chia-Chen Lin:
A Novel Fragile Watermark-Based Image Authentication Scheme for AMBTC-Compressed Images. J. Inf. Hiding Multim. Signal Process. 7(2): 362-375 (2016) - [j591]Chuan Qin, Haoran Ren, Chin-Chen Chang, Qingkui Chen:
Novel Occlusion Object Removal with Inter-frame Editing and Texture Synthesis. J. Inf. Hiding Multim. Signal Process. 7(2): 386-398 (2016) - [j590]Wan-Li Lyu, Chin-Chen Chang, Feng Wang:
Image Authentication and Self-Recovery Scheme Based on The Rehashing Model. J. Inf. Hiding Multim. Signal Process. 7(3): 460-474 (2016) - [j589]Yanjun Liu, Chin-Chen Chang, Chin-Yu Sun:
A Novel Three-party Authenticated Key Exchange Protocol Based on Secret Sharing. J. Inf. Hiding Multim. Signal Process. 7(4): 741-753 (2016) - [j588]Li Li, Dejie Zheng, Jianfeng Lu, Xiaoyang Mao, Chin-Chen Chang:
An Effective Mobile Visual Searching Algorithm Based on the Bag-of-Words Method for Furniture Images. J. Inf. Hiding Multim. Signal Process. 7(4): 754-770 (2016) - [j587]Binbin Xia, Anhong Wang, Chin-Chen Chang, Li Liu:
An Image Steganography Scheme Using 3D-Sudoku. J. Inf. Hiding Multim. Signal Process. 7(4): 836-845 (2016) - [j586]Zhihong Li, Qiang Jin, Chin-Chen Chang, Anhong Wang, Li Liu:
A Novel Pixel Grouping Scheme for AMBTC Based on Particle Swarm Optimization. J. Inf. Hiding Multim. Signal Process. 7(5): 970-982 (2016) - [j585]Jianfeng Lu, Xiaoyan Xu, Li Li, Chin-Chen Chang, Qiang Wang:
A Robust Image Copy Detection Method Based On Feature Extraction Algorithm. J. Inf. Hiding Multim. Signal Process. 7(5): 1136-1146 (2016) - [j584]Qian Mao, K. Bharanitharan, Chin-Chen Chang:
Novel Lossless Morphing Algorithm for Secret Sharing via Meaningful Images. J. Inf. Hiding Multim. Signal Process. 7(6): 1168-1184 (2016) - [j583]Xiao-Long Liu, Chia-Chen Lin, Chin-Chen Chang, Shyan-Ming Yuan:
A Survey of Fragile Watermarking-based Image Authentication Techniques. J. Inf. Hiding Multim. Signal Process. 7(6): 1282-1292 (2016) - [j582]Chin-Chen Chang, Wan-Ting Tseng, Hao-Chuan Tsai:
A Universal Authentication Scheme with Anonymity for Heterogeneous Wireless Networks. J. Inf. Hiding Multim. Signal Process. 7(6): 1384-1394 (2016) - [j581]Li Li, Jinxia Qiu, Jianfeng Lu, Chin-Chen Chang:
An aesthetic QR code solution based on error correction mechanism. J. Syst. Softw. 116: 85-94 (2016) - [j580]Chin-Chen Chang, Thai Son Nguyen
, Chia-Chen Lin
:
A new distortion-free data embedding scheme for high-dynamic range images. Multim. Tools Appl. 75(1): 145-163 (2016) - [j579]Chin-Chen Chang, Tzu-Chuen Lu, Gwoboa Horng, Ying-Hsuan Huang:
Very efficient variable-length codes for the lossless compression of VQ indices. Multim. Tools Appl. 75(6): 3537-3552 (2016) - [j578]Thai Son Nguyen
, Chin-Chen Chang, Huan-Sheng Hsueh:
High capacity data hiding for binary image based on block classification. Multim. Tools Appl. 75(14): 8513-8526 (2016) - [j577]Li Liu, Chin-Chen Chang, Anhong Wang:
Reversible data hiding scheme based on histogram shifting of n-bit planes. Multim. Tools Appl. 75(18): 11311-11326 (2016) - [j576]Fan Li, K. Bharanitharan, Chin-Chen Chang, Qian Mao:
Bi-stretch reversible data hiding algorithm for absolute moment block truncation coding compressed images. Multim. Tools Appl. 75(23): 16153-16171 (2016) - [j575]Hsiao-Ling Wu, Chin-Chen Chang, Chin-Yu Sun:
A secure authentication scheme with provable correctness for pay-TV systems. Secur. Commun. Networks 9(11): 1577-1588 (2016) - [j574]Feng Wang, Chin-Chen Chang, Shih-Chang Chang:
Robust off-line e-cash scheme with recoverability and anonymity revocation. Secur. Commun. Networks 9(14): 2412-2421 (2016) - [j573]Chin-Chen Chang, Wei-yi Chen, Shih-Chang Chang:
A highly efficient and secure electronic cash system based on secure sharing in cloud environment. Secur. Commun. Networks 9(14): 2476-2483 (2016) - [j572]Hui Tian
, Yanpeng Wu, Chin-Chen Chang, Yongfeng Huang, Jin Liu, Tian Wang, Yonghong Chen, Yiqiao Cai:
Steganalysis of analysis-by-synthesis speech exploiting pulse-position distribution characteristics. Secur. Commun. Networks 9(15): 2934-2944 (2016) - [j571]Zhi-Hui Wang, Ya-Feng Di, Jianjun Li, Chin-Chen Chang, Hui Liu:
Progressive secret image sharing scheme using meaningful shadows. Secur. Commun. Networks 9(17): 4075-4088 (2016) - [j570]Thai Son Nguyen
, Chin-Chen Chang, Wen-Chi Chang:
High capacity reversible data hiding scheme for encrypted images. Signal Process. Image Commun. 44: 84-91 (2016) - [j569]Sheng-Hsun Hsieh, Yung-Hui Li
, Chung-Hao Tien, Chin-Chen Chang:
Extending the Capture Volume of an Iris Recognition System Using Wavefront Coding and Super-Resolution. IEEE Trans. Cybern. 46(12): 3342-3350 (2016) - [j568]Chin-Chen Chang, Hai-Duong Le:
A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 15(1): 357-366 (2016) - [j567]Chin-Chen Chang, Wei-Yuan Hsueh, Ting-Fang Cheng:
A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks. Wirel. Pers. Commun. 89(2): 447-465 (2016) - [j566]Chin-Chen Chang, Ngoc-Tu Nguyen
:
An Untraceable Biometric-Based Multi-server Authenticated Key Agreement Protocol with Revocation. Wirel. Pers. Commun. 90(4): 1695-1715 (2016) - [c266]Xinxin Peng, Jianfeng Lu, Li Li, Chin-Chen Chang, Qili Zhou:
A New Card Authentication Scheme Based on Image Watermarking and Encryption. IWDW 2016: 358-369 - [c265]Chin-Chen Chang, Jen-Chun Chang, Yun-Hong Chou, Hsin-Lung Wu:
A High Embedding Capacity Data Hiding Scheme Based upon Permutation Vectors. IWDW 2016: 578-587 - 2015
- [j565]Qian Mao, K. Bharanitharan, Chin-Chen Chang:
A Proxy User Authentication Protocol Using Source-Based Image Morphing. Comput. J. 58(7): 1573-1584 (2015) - [j564]Thai Son Nguyen
, Chin-Chen Chang:
A reversible data hiding scheme based on the Sudoku technique. Displays 39: 109-116 (2015) - [j563]Jung-San Lee
, Chin-Chen Chang, Ngoc-Tu Huynh, Hsin-Yi Tsai:
Preserving user-friendly shadow and high-contrast quality for multiple visual secret sharing technique. Digit. Signal Process. 40: 131-139 (2015) - [j562]Chin-Chen Chang, Yeh-Chieh Chou, Chin-Yu Sun:
Novel and practical scheme based on secret sharing for laptop data protection. IET Inf. Secur. 9(2): 100-107 (2015) - [j561]Zhao-Xia Yin, Chin-Chen Chang, Qin Xu, Bin Luo
:
Second-order steganographic method based on adaptive reference matrix. IET Image Process. 9(4): 300-305 (2015) - [j560]Qian Mao, Karunanithi Bharanitharan, Chin-Chen Chang:
Multi-round dynamic swap optimisation for table-based steganography. IET Image Process. 9(12): 1073-1082 (2015) - [j559]Yanjun Liu, Lein Harn, Chin-Chen Chang:
A novel verifiable secret sharing mechanism using theory of numbers and a method for sharing secrets. Int. J. Commun. Syst. 28(7): 1282-1292 (2015) - [j558]Changlu Lin, Yong Li, Kewei Lv, Chin-Chen Chang:
Ciphertext-Auditable Identity-Based Encryption. Int. J. Netw. Secur. 17(1): 23-28 (2015) - [j557]Cheng Guo, Chin-Chen Chang:
A Novel Threshold Conference-Key Agreement Protocol Based on Generalized Chinese Remainder Theorem. Int. J. Netw. Secur. 17(2): 165-173 (2015) - [j556]Feng Wang, Chin-Chen Chang, Yeh-Chieh Chou:
Group Authentication and Group Key Distribution for Ad Hoc Networks. Int. J. Netw. Secur. 17(2): 199-207 (2015) - [j555]Hai-Duong Le, Chin-Chen Chang, Yeh-Chieh Chou:
A Novel Untraceable Authentication Scheme for Mobile Roaming in GLOMONET. Int. J. Netw. Secur. 17(4): 395-404 (2015) - [j554]Chenglian Liu, Chin-Chen Chang, Zhi-Pan Wu, Shi-Lin Ye:
A Study of Relationship between RSA Public Key Cryptosystem and Goldbach's Conjecture Properties. Int. J. Netw. Secur. 17(4): 445-453 (2015) - [j553]Chin-Feng Lee, Chin-Chen Chang, Pei-Yan Pai, Chia-Ming Liu:
Adjustment Hiding Method Based on Exploiting Modification Direction. Int. J. Netw. Secur. 17(5): 607-618 (2015) - [j552]Shengyun Zhai, Fan Li, Chin-Chen Chang, Qian Mao:
A Meaningful Scheme for Sharing Secret Images Using Mosaic Images. Int. J. Netw. Secur. 17(5): 643-649 (2015) - [j551]Chin-Chen Chang, Jen-Ho Yang, Yu-Ching Wu:
An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks. Int. J. Netw. Secur. 17(6): 702-707 (2015) - [j550]Chin-Chen Chang, Thai Son Nguyen
, Chia-Chen Lin
:
A reversible compression code hiding using SOC and SMVQ indices. Inf. Sci. 300: 85-99 (2015) - [j549]Qian Mao, Fan Li, Chin-Chen Chang:
Reversible data hiding with oriented and minimized distortions using cascading trellis coding. Inf. Sci. 317: 170-180 (2015) - [j548]Zhi-Hui Wang, Kuo-Nan Chen, Chin-Chen Chang, Chuan Qin
:
Sharing a Large Secret Image Using Meaningful Shadows Based on VQ and Inpainting. KSII Trans. Internet Inf. Syst. 9(12): 5170-5188 (2015) - [j547]Chin-Feng Lee, Chin-Chen Chang, Pei-Yan Pai, Chia-Ming Liu:
An Adjustable and Reversible Data Hiding Method Based on Multiple-base Notational System without Location Map. J. Inf. Hiding Multim. Signal Process. 6(1): 1-28 (2015) - [j546]Chin-Chen Chang, Chia-Chen Lin, Chih-Yang Lin:
Compressing Vector Quantization Index Table Using Side Match State Codebook. J. Inf. Hiding Multim. Signal Process. 6(1): 47-58 (2015) - [j545]Yanjun Liu, Chin-Chen Chang, Shih-Chang Chang:
A Group Key Distribution System Based on the Generalized Aryabhata Remainder Theorem for Enterprise Digital Rights Management. J. Inf. Hiding Multim. Signal Process. 6(1): 140-153 (2015) - [j544]Xuedan Jia, Ya-Fen Chang, Chin-Chen Chang, Liang-Min Wang:
A Critique of a Lightweight Identity Authentication Protocol for Vehicular Networks. J. Inf. Hiding Multim. Signal Process. 6(2): 183-188 (2015) - [j543]Li Liu, Anhong Wang, Chin-Chen Chang, Zhihong Li, Jinbo Liu:
A Lossy Secret Color Image Sharing Scheme with Small Shadows and Error-resilient Capability. J. Inf. Hiding Multim. Signal Process. 6(2): 246-253 (2015) - [j542]Hsiao-Ling Wu, Chin-Chen Chang:
A Robust Image Encryption Scheme Based on RSA and Secret Sharing for Cloud Storage Systems. J. Inf. Hiding Multim. Signal Process. 6(2): 288-296 (2015) - [j541]Yanjun Liu, Chin-Chen Chang, Chin-Yu Sun:
A Secure and Efficient Scheme for Digital Gift Certificates. J. Inf. Hiding Multim. Signal Process. 6(3): 416-429 (2015) - [j540]Jianfeng Lu, Meng Wang, Junping Dai, Qianru Huang, Li Li, Chin-Chen Chang:
Multiple Watermark Scheme based on DWT-DCT Quantization for Medical Images. J. Inf. Hiding Multim. Signal Process. 6(3): 458-472 (2015) - [j539]Wan-Li Lyu, Chin-Chen Chang, Feng Wang:
Color PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method. J. Inf. Hiding Multim. Signal Process. 6(3): 523-533 (2015) - [j538]Li Liu, Anhong Wang, Chin-Chen Chang, Qiang Jin, Binbin Xia:
Tree-Structured Vector Quantization with Flexible Multipath Searching Method Based on Side Match Prediction. J. Inf. Hiding Multim. Signal Process. 6(3): 568-576 (2015) - [j537]Ying-Hsuan Huang, Chin-Chen Chang, Meng-Chieh Lin, Gwoboa Horng:
Very Effective Multi-Layer Reversible Embedding Method Using Low Distortion Modification. J. Inf. Hiding Multim. Signal Process. 6(4) (2015) - [j536]Zhi-Hui Wang, Ying-Hsuan Huang, Chin-Chen Chang, Hai-Rui Yang:
Reversible Data Hiding for High Quality Using Secret Data Transformation Strategy. J. Inf. Hiding Multim. Signal Process. 6(4): 629-638 (2015) - [j535]Zhihui Wang, Qiong Wu, Zhongxuan Luo, Chin-Chen Chang:
A novel information hiding scheme based on line segments. J. Inf. Hiding Multim. Signal Process. 6(4): 674-685 (2015) - [j534]Wan-Li Lyu, Chin-Chen Chang, Yeh-Chieh Chou, Chia-Chen Lin:
Hybrid Color Image Steganography Method Used for Copyright Protection and Content Authentication. J. Inf. Hiding Multim. Signal Process. 6(4): 686-696 (2015) - [j533]Wen-Chung Kuo, Ming-Chih Kao, Chin-Chen Chang:
A Generalization of Fully Exploiting Modification Directions Data Hiding Scheme. J. Inf. Hiding Multim. Signal Process. 6(4): 718-727 (2015) - [j532]Jin Tang, Bo Jiang, Bin Luo, Chin-Chen Chang:
An Outlier Detection Method for Feature Point Matching Problem. J. Inf. Hiding Multim. Signal Process. 6(4): 728-739 (2015) - [j531]Chin-Chen Chang, Tzu-Chuen Lu, Gwoboa Horng, Ying-Hsuan Huang, Tai-Jung Hsu:
Dual-Histograms Reversible Data Hiding Capable of Avoiding Underflow/Overflow Problems. J. Inf. Hiding Multim. Signal Process. 6(5): 956-967 (2015) - [j530]Fei Yu
, Chin-Chen Chang, Jian Shu, Iftikhar Ahmad, Jun Zhang
, José María de Fuentes
:
Recent Advances in Security and Privacy for Wireless Sensor Networks. J. Sensors 2015: 169305:1-169305:2 (2015) - [j529]Li Li, Zihui Dong, Jianfeng Lu, Junping Dai, Qianru Huang, Chin-Chen Chang, Ting Wu:
AN H.264/AVC HDTV watermarking algorithm robust to camcorder recording. J. Vis. Commun. Image Represent. 26: 1-8 (2015) - [j528]Ngoc-Tu Huynh, K. Bharanitharan, Chin-Chen Chang:
Quadri-directional searching algorithm for secret image sharing using meaningful shadows. J. Vis. Commun. Image Represent. 28: 105-112 (2015) - [j527]Thai Son Nguyen
, Chin-Chen Chang, Ngoc-Tu Huynh:
A novel reversible data hiding scheme based on difference-histogram modification and optimal EMD algorithm. J. Vis. Commun. Image Represent. 33: 389-397 (2015) - [j526]Chin-Chen Chang, Iuon-Chang Lin, Chia-Chi Wu:
A Multipurpose Key Agreement Scheme in Ubiquitous Computing Environments. Mob. Inf. Syst. 2015: 934716:1-934716:7 (2015) - [j525]Chuan Qin
, Chin-Chen Chang, Chia-Chun Lin:
An adaptive reversible steganographic scheme based on the just noticeable distortion. Multim. Tools Appl. 74(6): 1983-1995 (2015) - [j524]Qian Mao, Chin-Chen Chang, Lein Harn, Shih-Chang Chang:
An image-based key agreement protocol using the morphing technique. Multim. Tools Appl. 74(9): 3207-3229 (2015) - [j523]Chuan Qin
, Chin-Chen Chang, Tai-Jung Hsu:
Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multim. Tools Appl. 74(15): 5861-5872 (2015) - [j522]Wenjie Liu, Anhong Wang, Chin-Chen Chang, Zhihong Li, Li Liu:
A grouped-scalable secret image sharing scheme. Multim. Tools Appl. 74(17): 7095-7109 (2015) - [j521]Qingzheng Hou, Junping Dai, Li Li, Jianfeng Lu, Chin-Chen Chang:
Scanned binary image watermarking based on additive model and sampling. Multim. Tools Appl. 74(21): 9407-9426 (2015) - [j520]Feng Wang, Chin-Chen Chang, Wan-Li Lyu:
The credit card visual authentication scheme based on GF(28) field. Multim. Tools Appl. 74(24): 11451-11465 (2015) - [j519]Chin-Chen Chang, Chin-Yu Sun, Ting-Fang Cheng:
A dependable storage service system in cloud environment. Secur. Commun. Networks 8(4): 574-588 (2015) - [j518]Chuan Qin
, Chin-Chen Chang, Gwoboa Horng, Ying-Hsuan Huang, Yen-Chang Chen:
Reversible data embedding for vector quantization compressed images using search-order coding and index parity matching. Secur. Commun. Networks 8(6): 899-906 (2015) - [j517]Xing-Tian Wang, Mingchu Li, Szu-Ting Wang, Chin-Chen Chang:
Reversible data hiding exploiting high-correlation regulation for high-quality images. Secur. Commun. Networks 8(7): 1408-1421 (2015) - [j516]Chin-Chen Chang, Hai-Duong Le:
A provably secure smart card-based authenticated group key exchange protocol. Secur. Commun. Networks 8(8): 1602-1607 (2015) - [c264]Chin-Chen Chang, Iuon-Chang Lin, Yi-Lun Chi:
Secure Electronic Coupons. AsiaJCIS 2015: 104-109 - [c263]Junlan Bai, Chin-Chen Chang, Ce Zhu:
A Reversible Data Hiding Scheme Using Ordered Cluster-Based VQ Index Tables for Complex Images. ICIG (1) 2015: 415-422 - [c262]Chin-Chen Chang, Ying-Hsuan Huang, Wei-Chi Chang:
Reversible data hiding for VQ indices using XOR operator and SOC codes. ICMLC 2015: 340-345 - [c261]Jianjun Li, Lijuan Meng, Zhihui Wang, Jiayou Du, Xiaofeng Fu, Chin-Chen Chang:
A Modified IMM-CSRF Algorithm for Passive Tracking of Maneuvering Targets. IIH-MSP 2015: 89-92 - [c260]Jianjun Li, Na Wu, Zhihui Wang, Jiayou Du, Xiaofeng Fu, Chin-Chen Chang:
Enhancement of the Quality of Images Based on Multiple Threshold Segmentation and Adaptive Gamma Correction. IIH-MSP 2015: 93-96 - 2014
- [j515]Chin-Chen Chang, Ting-Fang Cheng:
A Secure Diverse Ticket-Sale System in a Distributed Cloud Environment. Comput. J. 57(10): 1441-1459 (2014) - [j514]Chin-Chen Chang, Ting-Fang Cheng:
A Reliable Real-time Multicast Authentication Protocol with Provable Accuracy. Fundam. Informaticae 131(2): 167-186 (2014) - [j513]Xi Chen, Yun Liu, Chin-Chen Chang, Changlu Lin:
The design of dynamic access control for hierarchical sensor networks with key-lock-pair mechanism. Int. J. Ad Hoc Ubiquitous Comput. 17(2/3): 162-173 (2014) - [j512]Cheng Guo, Chin-Chen Chang:
An authenticated group key distribution protocol based on the generalized Chinese remainder theorem. Int. J. Commun. Syst. 27(1): 126-134 (2014) - [j511]Chin-Chen Chang, Ting-Fang Cheng, Hsiao-Ling Wu:
An authentication and key agreement protocol for satellite communications. Int. J. Commun. Syst. 27(10): 1994-2006 (2014) - [j510]Yanjun Liu, Lein Harn, Chin-Chen Chang:
An authenticated group key distribution mechanism using theory of numbers. Int. J. Commun. Syst. 27(11): 3502-3512 (2014) - [j509]Yanjun Liu, Chin-Chen Chang, Shih-Chang Chang:
An Access Control Mechanism Based on the Generalized Aryabhata Remainder Theorem. Int. J. Netw. Secur. 16(1): 58-64 (2014) - [j508]Chin-Chen Chang, Thai Son Nguyen, Chia-Chen Lin:
Reversible Image Hiding for High Image Quality Based on Histogram Shifting and Local Complexity. Int. J. Netw. Secur. 16(3): 201-213 (2014) - [j507]Xi Chen, Yun Liu, Chin-Chen Chang, Cheng Guo:
Generalized Secret Sharing with Linear Hierarchical Secrets. Int. J. Netw. Secur. 16(3): 220-228 (2014) - [j506]Xu Zhuang, Chin-Chen Chang, Zhi-Hui Wang, Yan Zhu:
A Simple Password Authentication Scheme Based on Geometric Hashing Function. Int. J. Netw. Secur. 16(4): 271-277 (2014) - [j505]Qian Mao, Chin-Chen Chang, Ting-Feng Chung:
A Reversible Steganography Suitable for Embedding Small Amounts of Data. Int. J. Netw. Secur. 16(4): 295-303 (2014) - [j504]Chi-Hsien Lin, K. Bharanitharan, Chin-Chen Chang:
Comments and Proofs to Published Paper - A Novel Reversible Robust Watermarking Algorithm Based on a Chaotic System. Int. J. Netw. Secur. 16(5): 389-392 (2014) - [j503]Xi Chen, Yun Liu, Chin-Chen Chang, Cheng Guo:
Generalized Secret Sharing with Linear Hierarchical Secrets. Int. J. Netw. Secur. 16(6): 411-419 (2014) - [j502]Zhi-Hui Wang, Haibo Jin, Xuebo Wang, Chin-Chen Chang:
An Adaptable (n, n) Secret Image Sharing Mechanism Based on Boolean Operation. Int. J. Netw. Secur. 16(6): 487-493 (2014) - [j501]Chin-Chen Chang, Thai Son Nguyen:
A Reversible Data Hiding Scheme for SMVQ Indices. Informatica 25(4): 523-540 (2014) - [j500]Thai Son Nguyen
, Chin-Chen Chang, Ting-Feng Chung:
A Tamper-Detection Scheme for BTC-Compressed Images with High-Quality Images. KSII Trans. Internet Inf. Syst. 8(6): 2005-2012 (2014) - [j499]Chin-Chen Chang, Thai Son Nguyen
, Chia-Chen Lin
:
Reversible Data Hiding Scheme for VQ Indices Based on Absolute Difference Trees. KSII Trans. Internet Inf. Syst. 8(7): 2572-2589 (2014) - [j498]Yanjun Liu, Hsiao-Ling Wu, Chin-Chen Chang:
A Fast and Secure Scheme for Data Outsourcing in the Cloud. KSII Trans. Internet Inf. Syst. 8(8): 2708-2722 (2014) - [j497]Zhi-Hui Wang, Hai-Rui Yang, Chin-Chen Chang, Gwoboa Horng, Ying-Hsuan Huang:
Lossless VQ Indices Compression Based on the High Correlation of Adjacent Image Blocks. KSII Trans. Internet Inf. Syst. 8(8): 2913-2929 (2014) - [j496]Wanli Liu, Chin-Chen Chang, Thai Son Nguyen
, Chia-Chen Lin
:
Image Watermarking Scheme Based on Scale-Invariant Feature Transform. KSII Trans. Internet Inf. Syst. 8(10): 3591-3606 (2014) - [j495]Chin-Chen Chang, Ting-Fang Cheng:
A Provably Secure t-out-of-n Oblivious Transfer Mechanism based on Blind Signature. J. Inf. Hiding Multim. Signal Process. 5(1): 1-12 (2014) - [j494]Zhi-Hui Wang, Marcos Segalla Pizzolatti, Chin-Chen Chang:
Efficient and Meaningful Multi-secret Image Sharing Based on Block Imitation. J. Inf. Hiding Multim. Signal Process. 5(1): 47-60 (2014) - [j493]Chin-Chen Chang, Ya-Chieh Huang, Hao-Chuan Tsai:
Design and Analysis of Chameleon Hashing Based Handover Authentication Scheme for Wireless Networks. J. Inf. Hiding Multim. Signal Process. 5(1): 107-116 (2014) - [j492]Chia-Chen Lin, Chin-Chen Chang, Yi-Hui Chen:
A Novel SVD-based watermarking Scheme for Protecting Rightful Ownership of Digital Images. J. Inf. Hiding Multim. Signal Process. 5(2): 124-143 (2014) - [j491]Gwoboa Horng, Ying-Hsuan Huang, Chin-Chen Chang, Yanjun Liu:
(k, n)-Image Reversible Data Hiding. J. Inf. Hiding Multim. Signal Process. 5(2): 152-164 (2014) - [j490]Chin-Chen Chang, Yi-Hui Chen, Lin-Yi Chuang:
Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques. J. Inf. Hiding Multim. Signal Process. 5(3): 342-352 (2014) - [j489]Chuan Qin, Chin-Chen Chang, Szu-Ting Wang:
A Novel Lossless Steganographic Scheme for Data Hiding in Traditional Chinese Text Files. J. Inf. Hiding Multim. Signal Process. 5(3): 534-545 (2014) - [j488]Yanjun Liu, Chin-Chen Chang:
A Database Encryption Scheme Based on the Generalized Aryabhata Remainder Theorem. J. Inf. Hiding Multim. Signal Process. 5(4): 603-613 (2014) - [j487]Yanjun Liu, Chin-Chen Chang:
A Secure Broadcasting Method Based on the Generalized Aryabhata Remainder Theorem. J. Inf. Hiding Multim. Signal Process. 5(4): 709-718 (2014) - [j486]Junping Dai, Yazhong Liu, Jianfeng Lu, Jiayi Xu, Chin-Chen Chang, Li Li:
Watermarking Marbled Image Based on Linear Enhancement Hologram. J. Inf. Hiding Multim. Signal Process. 5(4): 757-768 (2014) - [j485]Chin-Chen Chang, Pei-Yan Pai, Meng-Hsiun Tsai, Chia-Ming Liu:
A Novel Chicken Chorioallantoic Membrane Image Vessel Detection Detector Based on Statistic Color Distribution. J. Inf. Hiding Multim. Signal Process. 5(4): 789-805 (2014) - [j484]Chung-Chuan Wang, Ya-Fen Chang, Chin-Chen Chang, Jinn-Ke Jan, Chia-Chen Lin
:
A high capacity data hiding scheme for binary images based on block patterns. J. Syst. Softw. 93: 152-162 (2014) - [j483]Chin-Chen Chang, Thai Son Nguyen
, Chia-Chen Lin
:
Reversible data embedding for indices based on histogram analysis. J. Vis. Commun. Image Represent. 25(7): 1704-1716 (2014) - [j482]Ying-Hsuan Huang, Chin-Chen Chang, Chun-Yu Wu:
A DNA-based data hiding technique with low modification rates. Multim. Tools Appl. 70(3): 1439-1451 (2014) - [j481]Tzu-Chuen Lu, Chin-Chen Chang, Ying-Hsuan Huang:
High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting. Multim. Tools Appl. 72(1): 417-435 (2014) - [j480]Cheng Guo, Chin-Chen Chang, Chuan Qin
:
A novel (n, t, n) secret image sharing scheme without a trusted third party. Multim. Tools Appl. 72(3): 2195-2209 (2014) - [j479]Lein Harn, Fuyou Miao, Chin-Chen Chang:
Verifiable secret sharing based on the Chinese remainder theorem. Secur. Commun. Networks 7(6): 950-957 (2014) - [j478]Feng Wang, Chin-Chen Chang, Lein Harn:
Simulatable and secure certificate-based threshold signature without pairings. Secur. Commun. Networks 7(11): 2094-2103 (2014) - [j477]Chin-Chen Chang, Ngoc-Tu Huynh, Hai-Duong Le:
Lossless and unlimited multi-image sharing based on Chinese remainder theorem and Lagrange interpolation. Signal Process. 99: 159-170 (2014) - [j476]Thai Son Nguyen, Chin-Chen Chang, Meng-Chieh Lin:
Adaptive Lossless Data Hiding Scheme for SMVQ-Compressed Images using SOC Coding. Smart Comput. Rev. 4(3): 230-245 (2014) - [j475]Li Liu, Anhong Wang, Chin-Chen Chang, Zhihong Li:
A novel real-time and progressive secret image sharing with flexible shadows based on compressive sensing. Signal Process. Image Commun. 29(1): 128-134 (2014) - [j474]Chuan Qin
, Chin-Chen Chang, Yi-Ping Chiu:
A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting. IEEE Trans. Image Process. 23(3): 969-978 (2014) - [j473]Xu Zhuang, Yan Zhu, Chin-Chen Chang:
A New Ultralightweight RFID Protocol for Low-Cost Tags: R 2 AP. Wirel. Pers. Commun. 79(3): 1787-1802 (2014) - [c259]Chin-Chen Chang, Chin-Yu Sun:
Polynomial-Based Secret Sharing Scheme Based on the Absolute Moment Block Truncation Coding Technique. IIH-MSP 2014: 485-488 - [c258]Chin-Chen Chang, Hsiao-Ling Wu, Ting-Feng Chung:
Applying Histogram Modification to Embed Secret Message in AMBTC. IIH-MSP 2014: 489-492 - [c257]Chin-Chen Chang, Hsiao-Ling Wu:
A Large Payload Information Hiding Scheme Using Two-Level Exploiting Modification Direction. IIH-MSP 2014: 512-515 - [c256]Chin-Chen Chang, Wei-yi Chen, Ting-Fang Cheng:
A Secure RFID Mutual Authentication Protocol Conforming to EPC Class 1 Generation 2 Standard. IIH-MSP 2014: 642-645 - [c255]Chin-Chen Chang, Thai-Son Nguyen
, Chia-Chen Lin
:
A Virtual Primary Key for Reversible Watermarking Textual Relational Databases. ICS 2014: 756-769 - [c254]Chin-Chen Chang, Thai Son Nguyen
, Chia-Chen Lin
:
A Blind Robust Reversible Watermark Scheme for Textual Relational Databases with Virtual Primary Key. IWDW 2014: 75-89 - [c253]Jianfeng Lu, Qianru Huang, Meng Wang, Li Li, Junping Dai, Chin-Chen Chang:
Zero-Watermarking Based on Improved ORB Features Against Print-cam Attack. IWDW 2014: 187-198 - [e5]Charles M. Falco, Chin-Chen Chang, Xudong Jiang:
Sixth International Conference on Digital Image Processing, ICDIP 2014, Athens, Greece, April 5-6, 2014. SPIE Proceedings 9159, SPIE 2014, ISBN 978-1-6284-1186-7 [contents] - 2013
- [j472]Cheng Guo, Chin-Chen Chang:
Chaotic maps-based password-authenticated key agreement using smart cards. Commun. Nonlinear Sci. Numer. Simul. 18(6): 1433-1440 (2013) - [j471]Xing-Tian Wang, Chin-Chen Chang, Thai Son Nguyen
, Mingchu Li:
Reversible data hiding for high quality images exploiting interpolation and direction order mechanism. Digit. Signal Process. 23(2): 569-577 (2013) - [j470]Chuan Qin
, Chin-Chen Chang, Pei-Ling Tsou:
Robust image hashing using non-uniform sampling in discrete Fourier domain. Digit. Signal Process. 23(2): 578-585 (2013) - [j469]Jin Tang, Bo Jiang, Chin-Chen Chang, Bin Luo
:
Corrigendum to "Graph structure analysis based on complex network" [Digital Signal Processing 22 (5) (2012) 713-725]. Digit. Signal Process. 23(4): 1332 (2013) - [j468]Zi-Yao Cheng, Yun Liu, Chin-Chen Chang, Cheng Guo:
A fault-tolerant group key agreement protocol exploiting dynamic setting. Int. J. Commun. Syst. 26(2): 259-275 (2013) - [j467]Chin-Chen Chang, Chia-Yin Lee:
A Smart Card-based Authentication Scheme Using User Identify Cryptography. Int. J. Netw. Secur. 15(2): 139-147 (2013) - [j466]Yanjun Liu, Chin-Chen Chang, Shih-Chang Chang:
An Efficient Oblivious Transfer Protocol Using Residue Number System. Int. J. Netw. Secur. 15(3): 212-218 (2013) - [j465]Lein Harn, Chin-Chen Chang, Hsiao-Ling Wu:
An Anonymous Multi-Receiver Encryption Based on RSA. Int. J. Netw. Secur. 15(4): 307-312 (2013) - [j464]Jung-San Lee, Chin-Chen Chang, Kuo-Jui Wei:
Provably Secure Conference Key Distribution Mechanism Preserving the Forward and Backward Secrecy. Int. J. Netw. Secur. 15(5): 405-410 (2013) - [j463]Chin-Chen Chang, Jen-Ho Yang:
A Group-oriented Digital Right Management Scheme with Reliable and Flexible Access Policies. Int. J. Netw. Secur. 15(6): 471-477 (2013) - [j462]Hao-Chuan Tsai, Chin-Chen Chang:
Provably secure three party encrypted key exchange scheme with explicit authentication. Inf. Sci. 238: 242-249 (2013) - [j461]Qian Mao, Chin-Chen Chang, Hsiao-Ling Wu:
An Image Encryption Scheme Based on Concatenated Torus Automorphisms. KSII Trans. Internet Inf. Syst. 7(6): 1492-1511 (2013) - [j460]Chuan Qin
, Chin-Chen Chang, Yen-Chang Chen:
A Novel Reversible Data Hiding Scheme for VQ-Compressed Images Using Index Set Construction Strategy. KSII Trans. Internet Inf. Syst. 7(8): 2027-2041 (2013) - [j459]Chuan Qin
, Chin-Chen Chang, Tai-Jung Hsu:
Effective Fragile Watermarking for Image Authentication with High-quality Recovery Capability. KSII Trans. Internet Inf. Syst. 7(11): 2941-2956 (2013) - [j458]Pei-Yu Lin
, Yi-Hui Chen, Chin-Chen Chang, Jung-San Lee:
Contrast-Adaptive Removable Visible Watermarking (CARVW) mechanism. Image Vis. Comput. 31(4): 311-321 (2013) - [j457]Cheng Guo, Chin-Chen Chang:
A Construction for Secret Sharing Scheme with General Access Structure. J. Inf. Hiding Multim. Signal Process. 4(1): 1-8 (2013) - [j456]Cheng Guo, Chin-Chen Chang, Chin-Yu Sun:
Chaotic Maps-Based Mutual Authentication and Key Agreement using Smart Cards for Wireless Communications. J. Inf. Hiding Multim. Signal Process. 4(2): 99-109 (2013) - [j455]Xu Zhuang, Zhi-Hui Wang, Chin-Chen Chang, Yan Zhu:
Security Analysis of a new Ultra-lightweight RFID Protocol and Its Improvement. J. Inf. Hiding Multim. Signal Process. 4(3): 166-177 (2013) - [j454]Chin-Chen Chang, Yung-Chen Chou, Chih-Yang Lin:
An Indicator Elimination Method for Side-match Vector Quantization. J. Inf. Hiding Multim. Signal Process. 4(4): 233-249 (2013) - [j453]Chin-Chen Chang, Hsiao-Ling Wu, Zhi-Hui Wang, Qian Mao:
An Efficient Smart Card Based Authentication Scheme Using Image Encryption. J. Inf. Sci. Eng. 29(6): 1135-1150 (2013) - [j452]Chin-Chen Chang, Thai Son Nguyen
, Chia-Chen Lin
:
A novel VQ-based reversible data hiding scheme by using hybrid encoding strategies. J. Syst. Softw. 86(2): 389-402 (2013) - [j451]Zhi-Hui Wang, Hai-Rui Yang, Ting-Fang Cheng, Chin-Chen Chang:
A high-performance reversible data-hiding scheme for LZW codes. J. Syst. Softw. 86(11): 2771-2778 (2013) - [j450]Chin-Chen Chang, Kuo-Nan Chen, Zhi-Hui Wang, Mingchu Li:
Lossless Information Hiding in the VQ Index Table. J. Softw. 8(3): 547-553 (2013) - [j449]Zi-Yao Cheng, Yun Liu, Chin-Chen Chang, Shih-Chang Chang:
Authenticated RFID security mechanism based on chaotic maps. Secur. Commun. Networks 6(2): 247-256 (2013) - [j448]Chin-Chen Chang, Shih-Chang Chang, Jen-Ho Yang:
A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment. Secur. Commun. Networks 6(8): 972-984 (2013) - [j447]Chuan Qin
, Chin-Chen Chang, Kuo-Nan Chen:
Adaptive self-recovery for tampered images based on VQ indexing and inpainting. Signal Process. 93(4): 933-946 (2013) - [j446]Li Li, Ying-Ying Ma, Chin-Chen Chang, Jianfeng Lu:
Analyzing and removing SureSign watermark. Signal Process. 93(5): 1374-1378 (2013) - [j445]Chuan Qin
, Chin-Chen Chang, Yen-Chang Chen:
Efficient reversible data hiding for VQ-compressed images based on index mapping mechanism. Signal Process. 93(9): 2687-2695 (2013) - [j444]Chuan Qin
, Chin-Chen Chang, Ying-Hsuan Huang, Li-Ting Liao:
An Inpainting-Assisted Reversible Steganographic Scheme Using a Histogram Shifting Mechanism. IEEE Trans. Circuits Syst. Video Technol. 23(7): 1109-1118 (2013) - [j443]Chin-Chen Chang, Ting-Fang Cheng, Wei-yi Chen:
A Novel Electronic English Auction System With a Secure On-Shelf Mechanism. IEEE Trans. Inf. Forensics Secur. 8(4): 657-668 (2013) - [j442]Chin-Chen Chang, Hai-Duong Le, Ching-Hsiang Chang:
Novel Untraceable Authenticated Key Agreement Protocol Suitable for Mobile Communication. Wirel. Pers. Commun. 71(1): 425-437 (2013) - [c252]Chin-Chen Chang, Tzu-Chuen Lu, Gwoboa Horng, Ying-Hsuan Huang, Yung-Ming Hsu:
A high payload data embedding scheme using dual stego-images with reversibility. ICICS 2013: 1-5 - [c251]Chin-Feng Lee, Chin-Chen Chang, Cheng-You Gao:
A Two-Staged Multi-level Reversible Data Hiding Exploiting Lagrange Interpolation. IIH-MSP 2013: 485-488 - [p4]Shuai Yue, Zhi-Hui Wang, Chin-Chen Chang:
An Image Data Hiding Scheme Based on Vector Quantization and Graph Coloring. Recent Advances in Information Hiding and Applications 2013: 1-17 - [p3]Shi-Yu Cui, Zhi-Hui Wang, Pei-Wei Tsai
, Chin-Chen Chang, Shuai Yue:
Single Bitmap Block Truncation Coding of Color Images Using Cat Swarm Optimization. Recent Advances in Information Hiding and Applications 2013: 119-138 - 2012
- [j441]Jin Tang, Bo Jiang, Chin-Chen Chang, Bin Luo
:
Graph structure analysis based on complex network. Digit. Signal Process. 22(5): 713-725 (2012) - [j440]Kuo-Nan Chen, Chin-Hao Chen, Chin-Chen Chang:
Efficient illumination compensation techniques for text images. Digit. Signal Process. 22(5): 726-733 (2012) - [j439]Pei-Yan Pai, Chin-Chen Chang, Yung-Kuan Chan
:
Nucleus and cytoplast contour detector from a cervical smear image. Expert Syst. Appl. 39(1): 154-161 (2012) - [j438]Chuan Qin
, Zhi-Hui Wang, Chin-Chen Chang, Kuo-Nan Chen:
Reversible Data Hiding Scheme Based on Image Inpainting. Fundam. Informaticae 120(1): 59-70 (2012) - [j437]Chin-Chen Chang, Yi-Pei Hsieh:
A fast VQ codebook search with initialization and search order. Inf. Sci. 183(1): 132-139 (2012) - [j436]Zhi-Hui Wang, Chin-Chen Chang, Mingchu Li:
Optimizing least-significant-bit substitution using cat swarm optimization strategy. Inf. Sci. 192: 98-108 (2012) - [j435]Chin-Chen Chang, Chih-Yang Lin
, Yi-Pei Hsieh:
Data hiding for vector quantization images using mixed-base notation and dissimilar patterns without loss of fidelity. Inf. Sci. 201: 70-79 (2012) - [j434]Yi-Hui Chen, Chin-Chen Chang:
Image Tamper Detection and Recovery Based on Dual Watermarks Sharing Strategy. J. Digit. Inf. Manag. 10(1): 39-49 (2012) - [j433]Chi-Shiang Chan, Chin-Chen Chang, Hung P. Vo:
A User-Friendly Image Sharing Scheme Using JPEG-LS Median Edge Predictor. J. Inf. Hiding Multim. Signal Process. 3(4): 340-351 (2012) - [j432]Fei Yu, Yiqin Lu, Chin-Chen Chang, Yan Gao:
Guest Editors' Introduction: Special Section on ISIP 2011. J. Multim. 7(1): 31-32 (2012) - [j431]Cheng Guo, Chin-Chen Chang, Chuan Qin
:
A hierarchical threshold secret image sharing. Pattern Recognit. Lett. 33(1): 83-91 (2012) - [j430]Cheng Guo, Chin-Chen Chang, Chuan Qin
:
A multi-threshold secret image sharing scheme based on MSP. Pattern Recognit. Lett. 33(12): 1594-1600 (2012) - [j429]Chuan Qin
, Chin-Chen Chang, Li-Ting Liao:
An adaptive prediction-error expansion oriented reversible information hiding scheme. Pattern Recognit. Lett. 33(16): 2166-2172 (2012) - [j428]Chuan Qin
, Chin-Chen Chang, Pei-Yu Chen:
Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Signal Process. 92(4): 1137-1150 (2012) - [j427]Xing-Tian Wang, Chin-Chen Chang, Chia-Chun Lin, Mingchu Li:
A novel multi-group exploiting modification direction method based on switch map. Signal Process. 92(6): 1525-1535 (2012) - [j426]Chin-Chen Chang, Chia-Yin Lee:
A Secure Single Sign-On Mechanism for Distributed Computer Networks. IEEE Trans. Ind. Electron. 59(1): 629-637 (2012) - [j425]Jen-Ho Yang, Chin-Chen Chang:
A Low Computational-Cost Electronic Payment Scheme for Mobile Commerce with Large-Scale Mobile Users. Wirel. Pers. Commun. 63(1): 83-99 (2012) - [c250]Chin-Chen Chang, Ngoc-Tu Huynh, Chia-Chun Lin:
Strong Tamper-Localization, Visual Secret Sharing Scheme Based on Exploiting Modification Direction. AsiaJCIS 2012: 10-16 - [c249]Chin-Chen Chang, Hai-Duong Le, Ching-Hsiang Chang:
Mobile Friendly and Highly Efficient Remote User Authenticated Key Agreement Protocol Featuring Untraceability. AsiaJCIS 2012: 38-43 - [c248]Chin-Chen Chang, Jen-Ho Yang, Kai-Jie Chang:
An Efficient and Flexible Mobile Payment Protocol. ICGEC 2012: 63-66 - 2011
- [j424]Lein Harn, Chia-Yin Lee, Changlu Lin, Chin-Chen Chang:
Fully Deniable Message Authentication Protocols Preserving Confidentiality. Comput. J. 54(10): 1688-1699 (2011) - [j423]T. Hoang Ngan Le
, Chia-Chen Lin
, Chin-Chen Chang, Hoai Bac Le:
A high quality and small shadow size visual secret sharing scheme based on hybrid strategy for grayscale images. Digit. Signal Process. 21(6): 734-745 (2011) - [j422]The Duc Kieu, Chin-Chen Chang:
A steganographic scheme by fully exploiting modification directions. Expert Syst. Appl. 38(8): 10648-10657 (2011) - [j421]Chin-Chen Chang, Chih-Yang Lin
, Yi-Hsuan Fan:
Reversible Steganography for BTC-compressed Images. Fundam. Informaticae 109(2): 121-134 (2011) - [j420]Chia-Yin Lee, Zhi-Hui Wang, Lein Harn, Chin-Chen Chang:
Secure Key Transfer Protocol Based on Secret Sharing for Group Communications. IEICE Trans. Inf. Syst. 94-D(11): 2069-2076 (2011) - [j419]Pei-Yu Lin
, Chin-Chen Chang:
Cheating resistance and reversibility-oriented secret sharing mechanism. IET Inf. Secur. 5(2): 81-92 (2011) - [j418]Chin-Chen Chang, Kuo-Nan Chen, Ngoc-Tu Huynh:
Lossless Secret Sharing Scheme with High Quality Shares Based on VQ-Compressed Images. Int. J. Pattern Recognit. Artif. Intell. 25(4): 529-546 (2011) - [j417]Pei-Yan Pai, Chin-Chen Chang, Yung-Kuan Chan
, Meng-Hsiun Tsai:
An adaptable threshold detector. Inf. Sci. 181(8): 1463-1483 (2011) - [j416]Chin-Chen Chang, Yi-Hui Chen, Hsin-Chi Wang:
Meaningful secret sharing technique with authentication and remedy abilities. Inf. Sci. 181(14): 3073-3084 (2011) - [j415]Fei Yu, Haiwen Liu, Wenlang Luo, Huojiao He, Chin-Chen Chang:
Guest Editorial. J. Comput. 6(10): 2001-2003 (2011) - [j414]Zhi-Hui Wang, Chin-Chen Chang, Ngoc-Tu Huynh, Mingchu Li:
Sharing a Secret Image in Binary Images with Verification. J. Inf. Hiding Multim. Signal Process. 2(1) (2011) - [j413]Chin-Feng Lee, Kuo-Nan Chen, Chin-Chen Chang, Meng-Cheng Tsai:
A Hierarchical Fragile Watermarking with VQ Index Recovery. J. Multim. 6(3): 277-284 (2011) - [j412]Cheng Guo, Zhi-Hui Wang, Chin-Chen Chang, Chuan Qin
:
A Secret Image Sharing Scheme with High Quality Shadows Based on Exploiting Modification Direction. J. Multim. 6(4): 341-348 (2011) - [j411]Zhi-Hui Wang, Chin-Chen Chang, Mingchu Li, Tzu-Chuen Lu:
A Simple Image Encoding Method with Data Lossless Information Hiding. J. Networks 6(3): 400-407 (2011) - [j410]Fei Yu, Yiqin Lu, Jian Shu, Guangxue Yue, Chin-Chen Chang:
Guest Editorial. J. Networks 6(10): 1387-1389 (2011) - [j409]Li Li, He-Huan Xu, Chin-Chen Chang, Ying-Ying Ma:
A novel image watermarking in redistributed invariant wavelet domain. J. Syst. Softw. 84(6): 923-929 (2011) - [j408]Chin-Chen Chang, Kuo-Nan Chen, Chin-Feng Lee, Li-Jen Liu:
A secure fragile watermarking scheme based on chaos-and-hamming code. J. Syst. Softw. 84(9): 1462-1470 (2011) - [j407]Fei Yu, Xuange Peng, Juefu Liu, Jiexian Zeng, Chin-Chen Chang:
Guest Editorial. J. Softw. 6(9): 1629-1631 (2011) - [j406]Chin-Feng Lee, Ying-Hsuan Huang, Chin-Chen Chang, Tien-Chung Liu:
A Prediction-Based Adaptive Reversible Data Embedding Scheme. J. Softw. 6(9): 1813-1820 (2011) - [j405]Chin-Chen Chang, Thai Son Nguyen
, Chia-Chen Lin
:
A reversible data hiding scheme for VQ indices using locally adaptive coding. J. Vis. Commun. Image Represent. 22(7): 664-672 (2011) - [j404]Pei-Yu Lin
, Jung-San Lee, Chin-Chen Chang:
Protecting the content integrity of digital imagery with fidelity preservation. ACM Trans. Multim. Comput. Commun. Appl. 7(3): 15:1-15:20 (2011) - [c247]