2009 | ||
---|---|---|
535 | Chin-Chen Chang, Shih-Yi Lin, Jen-Ho Yang: Efficient User Authentication and Key Establishment Protocols with Perfect Forward Secrecy for Mobile Devices. CIT (2) 2009: 131-135 | |
534 | Chin-Feng Lee, Chin-Chen Chang, Tien-Chung Liu: A VSS Scheme of Image Size Invariant for Vertical Edge Enhancement. HIS (1) 2009: 13-16 | |
533 | Chin-Chen Chang, Pei-Yu Lin, Jung-San Lee: A Self-Reference Watermarking Scheme Based on Wet Paper Coding. HIS (1) 2009: 228-233 | |
532 | Zhi-Hui Wang, Ming-Chu Li, Mao-Hua Chen, Chin-Chen Chang: A New Intelligent Authorization Agent Model in Grid. HIS (1) 2009: 394-398 | |
531 | Chin-Chen Chang, Yeu-Pong Lai: An Enhancement of JPEG Still Image Compression with Adaptive Linear Regression and Golomb-Rice Coding. HIS (3) 2009: 35-40 | |
530 | Chin-Chen Chang, Yen-Chang Chen, Chia-Chen Lin: A Resistant Secret Sharing Scheme. IAS 2009: 61-64 | |
529 | Zhao-Xia Yin, Chin-Chen Chang, Yan-Ping Zhang: A High Embedding Efficiency Steganography Scheme for Wet Paper Codes. IAS 2009: 611-614 | |
528 | Chin-Feng Lee, Kuo-Nan Chen, Chin-Chen Chang, Meng-Cheng Tsai: A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation. IAS 2009: 615-618 | |
527 | Chin-Feng Lee, Kuo-Hua Wang, Chin-Chen Chang, Yu-Lin Huang: A reversible data hiding scheme based on dual steganographic images. ICUIMC 2009: 228-237 | |
526 | Chin-Chen Chang, Shih-Chang Chang: The design of e-traveler's check with efficiency and mutual authentication. ICUIMC 2009: 309-316 | |
525 | Kuo-Nan Chen, Chin-Feng Lee, Chin-Chen Chang: Embedding secret messages based on chaotic map and Huffman coding. ICUIMC 2009: 336-341 | |
524 | Chin-Chen Chang, Yung-Chen Chou, The Duc Kieu: Information Hiding in Dual Images with Reversibility. MUE 2009: 145-152 | |
523 | Chin-Chen Chang, Hsien-Wen Tseng: Data Hiding in Images by Hybrid LSB Substitution. MUE 2009: 360-363 | |
522 | Chin-Chen Chang, Chia-Yin Lee, Yen-Chang Chiu: Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications 32(4): 611-618 (2009) | |
521 | Tzungher Chen, Chin-Chen Chang, Chang-Sian Wu, Der-Chyuan Lou: On the security of a copyright protection scheme based on visual cryptography. Computer Standards & Interfaces 31(1): 1-5 (2009) | |
520 | Hao-Chuan Tsai, Chin-Chen Chang, Kai-Jie Chang: Roaming across wireless local area networks using SIM-based authentication protocol. Computer Standards & Interfaces 31(2): 381-389 (2009) | |
519 | Jung-San Lee, Chin-Chen Chang: Design of electronic t-out-of-n lotteries on the Internet. Computer Standards & Interfaces 31(2): 395-400 (2009) | |
518 | Chin-Chen Chang, Ting-Fang Cheng: An efficient proxy raffle protocol with anonymity-preserving. Computer Standards & Interfaces 31(4): 772-778 (2009) | |
517 | Chung-Chuan Wang, Chin-Chen Chang, Jinn-ke Jan: NovelWatermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel Patterns. Fundam. Inform. 90(1-2): 125-155 (2009) | |
516 | Chin-Chen Chang, Yung-Chen Chou: A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes. Fundam. Inform. 90(1-2): 17-26 (2009) | |
515 | Tzu-Chuen Lu, Chin-Chen Chang, Yi-Long Liu: An Information-Hiding Scheme Based on Quantization-Based Embedding Technique. Fundam. Inform. 91(3-4): 597-610 (2009) | |
514 | Chin-Chen Chang, Tzungher Chen, Li-Jen Liu: Preventing Cheating in Computational Visual Cryptography. Fundam. Inform. 92(1-2): 27-42 (2009) | |
513 | Jung-San Lee, Chin-Chen Chang: A Secure Multicast Framework in Large and High-Mobility Network Groups. IEICE Transactions 92-B(7): 2365-2373 (2009) | |
512 | Chin-Chen Chang, Pei-Yu Lin, Jieh-Shan Yeh: Preserving robustness and removability for digital watermarks using subsampling and difference correlation. Inf. Sci. 179(13): 2283-2293 (2009) | |
511 | Iuon-Chang Lin, Chin-Chen Chang: A countable and time-bound password-based user authentication scheme for the applications of electronic commerce. Inf. Sci. 179(9): 1269-1277 (2009) | |
510 | Chin-Chen Chang, Yi-Fang Cheng, Iuon-Chang Lin: A novel key management scheme for dynamic multicast communications. Int. J. Communication Systems 22(1): 53-66 (2009) | |
509 | Chin-Chen Chang, Jung-San Lee: Robust t-out-of-n oblivious transfer mechanism based on CRT. J. Network and Computer Applications 32(1): 226-235 (2009) | |
508 | Chin-Chen Chang, The Duc Kieu, Yung-Chen Chou: Reversible information hiding for VQ indices based on locally adaptive coding. J. Visual Communication and Image Representation 20(1): 57-64 (2009) | |
507 | Fei Yu, Chin-Chen Chang, Ben M. Chen, Jian Shu, Guangxue Yue: Editorial. JCP 4(1): 1-2 (2009) | |
506 | Fei Yu, Chin-Chen Chang, Ben M. Chen, Jun Zhang, Guangxue Yue: Editorial. JSW 4(1): 1-2 (2009) | |
505 | The Duc Kieu, Chin-Chen Chang: A high stego-image quality steganographic scheme with reversibility and high payload using multiple embedding strategy. Journal of Systems and Software 82(10): 1743-1752 (2009) | |
504 | Chin-Chen Chang, Yung-Chen Chou, Yi-Pei Hsieh: Search-order coding method with indicator-elimination property. Journal of Systems and Software 82(3): 516-525 (2009) | |
503 | Zhi-Hui Wang, Chin-Chen Chang, Chia-Chen Lin, Ming-Chu Li: A reversible information hiding scheme using left-right and up-down chinese character representation. Journal of Systems and Software 82(8): 1362-1369 (2009) | |
502 | Jen-Ho Yang, Chin-Chen Chang: An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments. Journal of Systems and Software 82(9): 1497-1502 (2009) | |
501 | Charlie Irawan Tan, Cong-Kai Lin, Wen-Kai Tai, Chin-Chen Chang: Hiding data: a high-capacity distortionless approach. Multimedia Syst. 15(6): 325-336 (2009) | |
500 | Chin-Chen Chang, Chia-Chen Lin, T. Hoang Ngan Le, Hoai Bac Le: Sharing a verifiable secret image using two shadows. Pattern Recognition 42(11): 3097-3114 (2009) | |
499 | Pei-Yu Lin, Jung-San Lee, Chin-Chen Chang: Distortion-free secret image sharing mechanism using modulus operator. Pattern Recognition 42(5): 886-895 (2009) | |
498 | Chin-Chen Chang, The Duc Kieu, Wen-Chuan Wu: A lossless data embedding technique by joint neighboring coding. Pattern Recognition 42(7): 1597-1603 (2009) | |
497 | Chin-Chen Chang, Yi-Pei Hsieh: Authors reply 'Sharing secrets in stego images with authentication'. Pattern Recognition 42(7): 1620-1621 (2009) | |
496 | Chin-Chen Chang, Yi-Hui Chen, Chia-Chen Lin: A data embedding scheme for color images based on genetic algorithm and absolute moment block truncation coding. Soft Comput. 13(4): 321-331 (2009) | |
2008 | ||
495 | Jeng-Shyang Pan, Ajith Abraham, Chin-Chen Chang: Eighth International Conference on Intelligent Systems Design and Applications, ISDA 2008, 26-28 November 2008, Kaohsiung, Taiwan, 3 Volumes IEEE Computer Society 2008 | |
494 | Chin-Feng Lee, Lin-Yi Chuang, Chin-Chen Chang: Hiding Information Employing Reduplicating Embedding. APSCC 2008: 825-828 | |
493 | Chin-Chen Chang, Chin-Feng Lee, Yi-Ren Wang: An Improved EMD Embedding Scheme Based on Secret Image Difference. EUC (1) 2008: 129-135 | |
492 | Chin-Chen Chang, Wei-Liang Tai, Kuo-Nan Chen: Lossless Data Hiding Based on Histogram Modification for Image Authentication. EUC (1) 2008: 506-511 | |
491 | Chin-Chen Chang, The Duc Kieu, Yung-Chen Chou: Using nearest covering codes to embed secret information in grayscale images. ICUIMC 2008: 315-320 | |
490 | Chin-Chen Chang, Jung-San Lee, Ting-Fang Cheng: Security design for three-party encrypted key exchange protocol using smart cards. ICUIMC 2008: 329-333 | |
489 | Chin-Feng Lee, Yi-Ren Wang, Chin-Chen Chang: An adaptive EMD embedding method by condensing secret messages based on consecutive ones transformation and token substitution. ICUIMC 2008: 390-395 | |
488 | Jen-Ho Yang, Chin-Chen Chang: Cryptanalysis of ID-Based Digital Signature Scheme on Elliptic Curve Cryptosystem. ISDA (3) 2008: 3-5 | |
487 | Chin-Chen Chang, Jung-San Lee: Security Enhancement of Ku-Wang Authenticated Key Agreement Protocol. ISDA (3) 2008: 467-471 | |
486 | Chin-Chen Chang, The Duc Kieu, Yung-Chen Chou: A High Payload Steganographic Scheme Based on (7, 4) Hamming Code for Digital Images. ISECS 2008: 16-21 | |
485 | Chin-Chen Chang, Chia-Chen Lin, T. Hoang Ngan Le, Hoai Bac Le: A Probabilistic Visual Secret Sharing Scheme for Grayscale Images with Voting Strategy. ISECS 2008: 184-188 | |
484 | Hsing-Bai Chen, Tzungher Chen, Wei-Bin Lee, Chin-Chen Chang: Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks. Computer Standards & Interfaces 30(1-2): 95-99 (2008) | |
483 | Yu-Chiang Li, Jieh-Shan Yeh, Chin-Chen Chang: Isolated items discarding strategy for discovering high utility itemsets. Data Knowl. Eng. 64(1): 198-217 (2008) | |
482 | Chin-Chen Chang, Chih-Yang Lin, Yi-Pei Hsieh: Three-Phase Lossless Data Hiding Method for the VQ Index Table. Fundam. Inform. 82(1-2): 1-13 (2008) | |
481 | Hui-Feng Huang, Chin-Chen Chang: A Novel Cryptographic Key Assignment Scheme with ID-Based Access Control in a Hierachy. Fundam. Inform. 84(3-4): 353-361 (2008) | |
480 | Chin-Chen Chang, Yung-Chen Chou, The Duc Kieu: High Capacity Data Hiding for Grayscale Images. Fundam. Inform. 86(4): 435-446 (2008) | |
479 | Chin-Chen Chang, Chia-Chen Lin, Yi-Hui Chen: Adaptive Data Embedding Scheme Based on Similar and Dissimilar Clustering Strategies. Fundam. Inform. 88(1-2): 23-45 (2008) | |
478 | Yung-Chen Chou, Chin-Chen Chang, Kuan-Ming Li: A Large Payload Data Embedding Technique for Color Images. Fundam. Inform. 88(1-2): 47-61 (2008) | |
477 | Chin-Chen Chang, Pei-Yu Lin: A Color Image Authentication Method Using Partitioned Palette and Morphological Operations. IEICE Transactions 91-D(1): 54-61 (2008) | |
476 | Chih-Yang Lin, Chin-Chen Chang, Yu-Zheng Wang: Reversible Steganographic Method with High Payload for JPEG Images. IEICE Transactions 91-D(3): 836-845 (2008) | |
475 | Chang-Chu Chen, Chin-Chen Chang: LSB-Based Steganography Using Reflected Gray Code. IEICE Transactions 91-D(4): 1110-1116 (2008) | |
474 | Chin-Feng Lee, Chin-Chen Chang, Kuo-Hua Wang: An improvement of EMD embedding method for large payloads by pixel segmentation strategy. Image Vision Comput. 26(12): 1670-1676 (2008) | |
473 | Tzu-Chuen Lu, Chin-Chen Chang: Lossless nibbled data embedding scheme based on difference expansion. Image Vision Comput. 26(5): 632-638 (2008) | |
472 | Hsien-Wen Tseng, Chin-Chen Chang: An extended difference expansion algorithm for reversible watermarking. Image Vision Comput. 26(8): 1148-1153 (2008) | |
471 | Chin-Chen Chang, Chia-Chen Lin, Chia-Hsuan Lin, Yi-Hui Chen: A novel secret image sharing scheme in color images using small shadow images. Inf. Sci. 178(11): 2433-2447 (2008) | |
470 | Chin-Chen Chang, Wen-Chuan Wu, Yi-Hui Chen: Joint coding and embedding techniques for multimedia images. Inf. Sci. 178(18): 3543-3556 (2008) | |
469 | Chin-Chen Chang, Yen-Ting Kuo, Wen-Kai Tai: Genetic-Based Approach for Synthesizing Texture. International Journal on Artificial Intelligence Tools 17(4): 731-743 (2008) | |
468 | Chia-Chi Wu, Chin-Chen Chang, Iuon-Chang Lin: New Sealed-Bid Electronic Auction with Fairness, Security and Efficiency. J. Comput. Sci. Technol. 23(2): 253-264 (2008) | |
467 | Fei Yu, Chin-Chen Chang, Ben M. Chen, Wen Chen, Yongjun Chen: Editorial. JCM 3(6): 1-2 (2008) | |
466 | Wen Chen, Fei Yu, Chin-Chen Chang, Jiexian Zeng, Guangxue Yue: Editorial. JCM 3(7): 1-2 (2008) | |
465 | Fei Yu, Chin-Chen Chang, Ben M. Chen, Zhigang Chen, Jun Ni: Editorial. JCP 3(12): 1-2 (2008) | |
464 | Fei Yu, Chin-Chen Chang, Ben M. Chen, Yongjun Chen, Zhigang Chen: Editorial. JSW 3(9): 1-2 (2008) | |
463 | Chin-Chen Chang, Pei-Yu Lin: Adaptive watermark mechanism for rightful ownership protection. Journal of Systems and Software 81(7): 1118-1129 (2008) | |
462 | Ming-Ni Wu, Chia-Chen Lin, Chin-Chen Chang: An embedding technique based upon block prediction. Journal of Systems and Software 81(9): 1505-1516 (2008) | |
461 | Chin-Chen Chang, Cheng-Yi Liu, Wen-Kai Tai: Feature alignment approach for hand posture recognition based on curvature scale space. Neurocomputing 71(10-12): 1947-1953 (2008) | |
460 | Yi-Pei Hsieh, Chin-Chen Chang, Li-Jen Liu: A two-codebook combination and three-phase block matching based image-hiding scheme with high embedding capacity. Pattern Recognition 41(10): 3104-3113 (2008) | |
459 | Chin-Chen Chang, Yi-Pei Hsieh, Chia-Hsuan Lin: Sharing secrets in stego images with authentication. Pattern Recognition 41(10): 3130-3137 (2008) | |
458 | Chia-Chen Lin, Wei-Liang Tai, Chin-Chen Chang: Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recognition 41(12): 3582-3591 (2008) | |
457 | Chin-Chen Chang, Yi-Hsuan Fan, Wei-Liang Tai: Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 41(2): 654-661 (2008) | |
456 | Chin-Chen Chang, Chih-Yang Lin, Yi-Hsuan Fan: Lossless data hiding for color images based on block truncation coding. Pattern Recognition 41(7): 2347-2357 (2008) | |
455 | Jung-San Lee, Chin-Chen Chang: Preserving data integrity in mobile ad hoc networks with variant Diffie-Hellman protocol. Security and Communication Networks 1(4): 277-286 (2008) | |
454 | Yu-Ting Tsai, Chin-Chen Chang, Qing-Zhen Jiang, Shr-Ching Weng: Importance sampling of products from illumination and BRDF using spherical radial basis functions. The Visual Computer 24(7-9): 817-826 (2008) | |
2007 | ||
453 | Chia-Chi Wu, Chin-Chen Chang, Shang-Ru Yang: An Efficient Fragile Watermarking for Web Pages Tamper-Proof. APWeb/WAIM Workshops 2007: 654-663 | |
452 | Kuo-Lung Hung, Chin-Chen Chang: Recoverable Tamper Proofing Technique for Image Authentication Using Irregular Sampling Coding. ATC 2007: 333-343 | |
451 | Chin-Chen Chang, Yih-Shin Hu, Chia-Chen Lin: A Digital Watermarking Scheme Based on Singular Value Decomposition. ESCAPE 2007: 82-93 | |
450 | Chao-Wen Chan, Chin-Chen Chang: A New (t, n)-Threshold Scheme Based on Difference Equations. ESCAPE 2007: 94-106 | |
449 | Chin-Chen Chang, Pei-Yu Lin: Significance-Preserving Codebook Using Generic Algorithm. FSKD (3) 2007: 660-664 | |
448 | Chin-Chen Chang, Yung-Chen Chou, Tzu-Chuen Lu: A Semi-blind Watermarking Based on Discrete Wavelet Transform. ICICS 2007: 164-176 | |
447 | Chin-Chen Chang, Shih-Yi Lin: An Improvement on Authenticated Key Agreement Scheme. IPC 2007: 3-6 | |
446 | Chin-Chen Chang, Wen-Chuan Wu: Reversible Quantization-Index Modulation Using Neighboring Correlation. IWDW 2007: 222-232 | |
445 | Chin-Chen Chang, Chih-Yang Lin, Yu-Zheng Wang: A High Payload VQ Steganographic Method for Binary Images. IWDW 2007: 467-481 | |
444 | Chin-Chen Chang, Yu-Wei Su, Iuon-Chang Lin: A broadcast-encryption-based key management scheme for dynamic multicast communications work-in-progress. Infoscale 2007: 69 | |
443 | Kai-Jie Chang, Chin-Chen Chang: An e-mail signature protocol for anti-spam work-in-progress. Infoscale 2007: 70 | |
442 | Chin-Chen Chang, Yi-Fang Cheng, Iuon-Chang Lin: Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control. Inscrypt 2007: 457-462 | |
441 | Chin-Chen Chang, Yi-Hui Chen, Yung-Chen Chou: Reversible Data Embedding Technique for Palette Images Using De-clustering. MCAM 2007: 130-139 | |
440 | Chung-Chuan Wang, Chin-Chen Chang, Xinpeng Zhang, Jinn-ke Jan: Senary Huffman Compression - A Reversible Data Hiding Scheme for Binary Images. MCAM 2007: 351-360 | |
439 | Chin-Chen Chang, Chih-Yang Lin: Density-Based Image Vector Quantization Using a Genetic Algorithm. MMM (1) 2007: 289-298 | |
438 | Chi-Shiang Chan, Chin-Chen Chang: A Color Image Hiding Scheme Based on SMVQ and Modulo Operator. MMM (2) 2007: 461-470 | |
437 | Chin-Chen Chang, Hao-Chuan Tsai, Yi-Hui Chen: An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards. MUE 2007: 1210-1215 | |
436 | Chin-Chen Chang, Chu-Hsing Lin, Chien-Yuan Chen: A Conference Key Distribution Scheme Using Interpolating Polynomials. MUE 2007: 963-967 | |
435 | Hui-Feng Huang, Chin-Chen Chang: An Efficient Key-Lock-Pair Mechanism Based on Division Algorithm. MUE 2007: 982-986 | |
434 | Jieh-Shan Yeh, Yu-Chiang Li, Chin-Chen Chang: Two-Phase Algorithms for a Novel Utility-Frequent Mining Model. PAKDD Workshops 2007: 433-444 | |
433 | Chin-Chen Chang, Chih-Chiang Tsou, Yung-Chen Chou: A Remediable Image Authentication Scheme Based on Feature Extraction and Clustered VQ. PCM 2007: 446-449 | |
432 | Chin-Chen Chang, Yu-Zheng Wang, Yu-Chen Hu: Adaptive Data Hiding Scheme for Palette Images. Intelligent Multimedia Data Hiding: New Directions 2007: 103-122 | |
431 | Chin-Chen Chang, Tzu-Chuen Lu, Yi-Hsuan Fan: A Bit-Level Visual Secret Sharing Scheme for Multi-Secret Images Using Rotation and Reversion Operatations. Intelligent Multimedia Data Hiding: New Directions 2007: 83-101 | |
430 | Yu-Chiang Li, Jieh-Shan Yeh, Chin-Chen Chang: MICF: An effective sanitization algorithm for hiding sensitive patterns on data mining. Advanced Engineering Informatics 21(3): 269-280 (2007) | |
429 | Ting-Fang Cheng, Jung-San Lee, Chin-Chen Chang: Security enhancement of an IC-card-based remote login mechanism. Computer Networks 51(9): 2280-2287 (2007) | |
428 | Yuan-Hui Yu, Chin-Chen Chang, Iuon-Chang Lin: A new steganographic method for color and grayscale image hiding. Computer Vision and Image Understanding 107(3): 183-194 (2007) | |
427 | Ya-Fen Chang, Chin-Chen Chang: Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy. Fundam. Inform. 76(1-2): 13-23 (2007) | |
426 | Chin-Chen Chang, Chang-Chu Chen: Full-Searching-Equivalent Vector Quantization Using Two-Bounds Triangle Inequality. Fundam. Inform. 76(1-2): 25-37 (2007) | |
425 | Chin-Chen Chang, Tzu-Chuen Lu, Jun-Bin Ya: VQ Codebook Searching Algorithm Based on Correlation Property. Fundam. Inform. 76(1-2): 39-57 (2007) | |
424 | Chin-Chen Chang, Chih-Yang Lin, Chun-Sen Tseng: Secret Image Hiding and Sharing Based on the (t, n)-Threshold. Fundam. Inform. 76(4): 399-411 (2007) | |
423 | Hsien-Chu Wu, Chin-Chen Chang: An Image Retrieval Method Based on Color-Complexity and Spatial-Histogram Features. Fundam. Inform. 76(4): 481-493 (2007) | |
422 | Chin-Chen Chang, Wei-Liang Tai, Chia-Chen Lin: A Novel Image Hiding Scheme Based on VQ and Hamming Distance. Fundam. Inform. 77(3): 217-228 (2007) | |
421 | Chin-Chen Chang, Wen-Chuan Wu: Fast Planar-Oriented Ripple Search Algorithm for Hyperspace VQ Codebook. IEEE Transactions on Image Processing 16(6): 1538-1547 (2007) | |
420 | Chin-Chen Chang, Yi-Pei Hsieh, Chih-Yang Lin: Lossless Data Embedding With High Embedding Capacity Based on Declustering for VQ-Compressed Codes. IEEE Transactions on Information Forensics and Security 2(3-1): 341-349 (2007) | |
419 | Chin-Chen Chang, Wen-Chuan Wu, Chih-Chiang Tsou: Hiding Secret Information Using Adaptive Side-Match VQ. IEICE Transactions 90-D(10): 1678-1686 (2007) | |
418 | Chin-Chen Chang, Yung-Chen Chou, Chih-Yang Lin: Reversible Data Hiding in the VQ-Compressed Domain. IEICE Transactions 90-D(9): 1422-1429 (2007) | |
417 | Jung-San Lee, Chin-Chen Chang, Pen-Yi Chang: Anonymous authentication scheme for wireless communications. IJMC 5(5): 590-601 (2007) | |
416 | Tzu-Chuen Lu, Chin-Chen Chang: Color image retrieval technique based on color features and image bitmap. Inf. Process. Manage. 43(2): 461-472 (2007) | |
415 | Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng, Wei-Liang Tai: Reversible hiding in DCT-based compressed images. Inf. Sci. 177(13): 2768-2786 (2007) | |
414 | Iuon-Chang Lin, Chin-Chen Chang: Security enhancement for digital signature schemes with fault tolerance in RSA. Inf. Sci. 177(19): 4031-4039 (2007) | |
413 | Chin-Chen Chang, Chih-Yang Lin: Reversible steganographic method using SMVQ approach based on declustering. Inf. Sci. 177(8): 1796-1805 (2007) | |
412 | Ya-Fen Chang, Chin-Chen Chang, Pei-Yu Lin: A Concealed t-out-of-n Signer Ambiguous Signature Scheme with Variety of Keys. Informatica, Lith. Acad. Sci. 18(4): 535-546 (2007) | |
411 | Jau-Ji Shen, Chin-Chen Chang, Yu-Chiang Li: Combined association rules for dealing with missing values. J. Information Science 33(4): 468-480 (2007) | |
410 | Chin-Chen Chang, Chih-Yang Lin, Keng-Chu Lin: Simple efficient mutual anonymity protocols for peer-to-peer network based on primitive roots. J. Network and Computer Applications 30(2): 662-676 (2007) | |
409 | Jung-San Lee, Chin-Chen Chang: Secure communications for cluster-based ad hoc networks using node identities. J. Network and Computer Applications 30(4): 1377-1396 (2007) | |
408 | Chin-Chen Chang, Wen-Chuan Wu, Yu-Chen Hu: Lossless recovery of a VQ index table with embedded secret data. J. Visual Communication and Image Representation 18(3): 207-216 (2007) | |
407 | Chin-Chen Chang, Yu-Chiang Li, Wen-Hung Huang: TFRP: An efficient microaggregation algorithm for statistical disclosure control. Journal of Systems and Software 80(11): 1866-1878 (2007) | |
406 | Ming-Ni Wu, Chia-Chen Lin, Chin-Chen Chang: Novel image copy detection with rotating tolerance. Journal of Systems and Software 80(7): 1057-1069 (2007) | |
405 | Ya-Lun Zeng, Charlie Irawan Tan, Wen-Kai Tai, Mau-Tsuen Yang, Cheng-Chin Chiang, Chin-Chen Chang: A momentum-based deformation system for granular material. Journal of Visualization and Computer Animation 18(4-5): 289-300 (2007) | |
404 | Chi-Shiang Chan, Chin-Chen Chang: An efficient image authentication method based on Hamming code. Pattern Recognition 40(2): 681-690 (2007) | |
2006 | ||
403 | Ya-Fen Chang, Chin-Chen Chang: Enhanced Anonymous Auction Protocols with Freewheeling Bids. AINA (1) 2006: 353-358 | |
402 | Ya-Fen Chang, Chin-Chen Chang, Yu-Wei Su: A secure improvement on the user-friendly remote authentication scheme with no time concurrency mech. AINA (2) 2006: 741-745 | |
401 | Iuon-Chang Lin, Chin-Chen Chang: An Efficient Fault-Tolerant Digital Signature Scheme Based on the Discrete Logarithm Problem. ATC 2006: 601-610 | |
400 | Chin-Chen Chang, Chi-Shiang Chan, Yi-Hsuan Fan: A Secret Image Sharing Scheme Based on Vector Quantization Mechanism. EUC 2006: 469-478 | |
399 | Chao-Wen Chan, Chin-Chen Chang: A New Scheme for the Electronic Coin. ICEBE 2006: 339-343 | |
398 | Hui-Feng Huang, Chin-Chen Chang: An Untraceable Electronic Cash System Using Fair Blind Signatures. ICEBE 2006: 39-46 | |
397 | Chin-Chen Chang, Kuo-Lung Hung: An Efficient Euclidean Distance Estimation Scheme for Accelerating VQ Encoding. ICICIC (1) 2006: 194-196 | |
396 | Chin-Chen Chang, Yung-Chen Chou, Jau-Ji Shen: A Discrete Wavelet Transform Based State-Codebook Search Algorithm for Vector Quantization. ICICIC (1) 2006: 197-200 | |
395 | Ming-Ni Wu, Chia-Chen Lin, Chin-Chen Chang: A Fast Wavelet-Based Image Progressive Transmission Method Based on Vector Quantization. ICICIC (2) 2006: 677-680 | |
394 | Chin-Chen Chang, Tzu-Chuen Lu: A Wavelet-Based Progressive Digital Image Transmission Scheme. ICICIC (2) 2006: 681-684 | |
393 | Chin-Chen Chang, Tung-Shou Chen, Hsien-Chu Hsia: An ImageWatermarking Scheme Using Pattern Coding Technique. ICICIC (3) 2006: 467-470 | |
392 | Chin-Chen Chang, Wei-Liang Tai, Chia-Chen Lin: A Multipurpose Wavelet-Based Image Watermarking. ICICIC (3) 2006: 70-73 | |
391 | Timothy K. Shih, Chin-Chen Chang, Hsiau Wen Lin: Reusability on Learning Object Repository. ICWL 2006: 203-214 | |
390 | Chung-Chuan Wang, Chin-Chen Chang, Jinn-ke Jan, Jieh-Shan Yeh: Novel Steganographic Schemes Based on Row-Major Mapping Relation. IIH-MSP 2006: 392-395 | |
389 | Chin-Chen Chang, Yung-Chen Chang, Jau-Ji Shen: A Heuristic Method for Extracting Enhanced Watermarks from Digital Images. IIH-MSP 2006: 453-456 | |
388 | Chin-Chen Chang, Yi-Hui Chen, Kuan-Ming Li: Improved SMVQ Scheme with Edge-Directed Prediction. IIH-MSP 2006: 541-544 | |
387 | Chin-Chen Chang, Yung-Chen Chang, Jau-Ji Shen: A Novel Image Compression Algorithm Based on Sixteen Most Lately Used Encoded Codewords. IIH-MSP 2006: 545-548 | |
386 | Chin-Chen Chang, Yung-Chen Chou: Quantization Index Modulation Using Vector Quantization with DWT Based State-Codebook Search. IIH-MSP 2006: 549-554 | |
385 | Chia-Chen Lin, Chin-Chen Chang: An Image Hiding Scheme Based on Du's Disk Allocation Method. IIH-MSP 2006: 617-620 | |
384 | Chin-Chen Chang, Jun-Chou Chuang: Progressive Image Transmission Using Significant Features and Linear Regression Prediction. IIH-MSP 2006: 681-684 | |
383 | Ya-Fen Chang, Chin-Chen Chang, Wei-Liang Tai: Comments on Distributed Sign-and-Encryption Schemes. IMECS 2006: 178-180 | |
382 | Chin-Chen Chang, Chia-Chi Wu: An Improvement of the Design of Integrating Subliminal Channel with Access Control. IMECS 2006: 276-279 | |
381 | Hui-Feng Huang, Chin-Chen Chang: An Untraceable Forward-Secure Blind Signature Scheme. IMECS 2006: 441-446 | |
380 | Chin-Chen Chang, Wen-Bin Wu, Jieh-Shan Yeh: A Cryptanalysis on a Generalized Threshold Cryptosystem. IMECS 2006: 452-455 | |
379 | Chao-Wen Chan, Chin-Chen Chang: A Scheme for (t, n)-Threshold Secret Image Sharing. IMECS 2006: 619-624 | |
378 | Chin-Chen Chang, Keng-Chu Lin: Yet Another Attack on Mutual Authentication and Key Exchange Protocols for Low Power Wireless Communications. IMECS 2006: 959-962 | |
377 | Tzu-Chuen Lu, Chin-Chen Chang: A Bandwidth Efficiency of the Locally Adaptive Compression Method for Hiding Secret Messages. JCIS 2006 | |
376 | Hsien-Chu Wu, Chin-Chen Chang, Ting-Wei Yu: A DCT-based Recoverable Image Authentication. JCIS 2006 | |
375 | Ya-Fen Chang, Chin-Chen Chang: Comments on Abe et al.'s Threshold Signer-ambiguous Signature Scheme from Variety of Keys. JCIS 2006 | |
374 | Hsien-Chu Wu, Hui-Chuan Lin, Chin-Chen Chang: Reversible Palette Image Steganography Based on De-clustering and Predictive Coding. JCIS 2006 | |
373 | Chin-Chen Chang, Wen-Chuan Wu: A novel data hiding scheme for keeping high stego-image quality. MMM 2006 | |
372 | Chin-Chen Chang, Kuo-Lun Chen, Chu-Hsing Lin, Jen-Chieh Chang: A Group-Oriented (t, n) Threshold Signature Scheme Against Replay Attacks. UIC 2006: 816-825 | |
371 | Jen-Ho Yang, Chin-Chen Chang, Chih-Hung Wang: A Practical Solution to the (t, n) Threshold Untraceable Signature with (k, l) Verification Scheme. UIC 2006: 998-1007 | |
370 | Chin-Chen Chang, Chia-Chi Wu: A Novel Key Agreement Scheme in a Multiple Server Environment. WISA 2006: 187-197 | |
369 | Chin-Chen Chang, Yeu-Pong Lai: A division algorithm for residue numbers. Applied Mathematics and Computation 172(1): 368-378 (2006) | |
368 | Chin-Chen Chang, Yeu-Pong Lai: A parallel residue-to-binary conversion algorithm without trial division. Computers & Electrical Engineering 32(6): 454-467 (2006) | |
367 | Chin-Chen Chang, Jung-San Lee: An anonymous voting mechanism based on the key exchange protocol. Computers & Security 25(4): 307-314 (2006) | |
366 | Chin-Chen Chang, Jun-Chou Chuang, Yu-Chen Hu: Spatial Domain Image Hiding Scheme Using Pixel-Values Differencing. Fundam. Inform. 70(3): 171-184 (2006) | |
365 | Chin-Chen Chang, Chih-Yang Lin, Henry Chou: Perfect Hashing Schemes for Mining Traversal Patterns. Fundam. Inform. 70(3): 185-202 (2006) | |
364 | Yu-Chen Hu, Chin-Chen Chang: An Improved Tree-Structured Codebook Search Algorithm for Grayscale Image Compression. Fundam. Inform. 70(3): 251-260 (2006) | |
363 | Chin-Chen Chang, Guei-Mei Chen, Yu-Chen Hu: A Novel Index Coding Scheme for Vector Quantization. Fundam. Inform. 71(2-3): 215-227 (2006) | |
362 | Ming-Ni Wu, Chia-Chen Lin, Chin-Chen Chang: A Robust Content-Based Copy Detection Scheme. Fundam. Inform. 71(2-3): 351-366 (2006) | |
361 | Chia-Chen Lin, Yu-Chen Hu, Chin-Chen Chang: A Novel Image Ownership Protection Scheme Based on Rehashing Concept and Vector Quantization. Fundam. Inform. 71(4): 443-451 (2006) | |
360 | Chin-Chen Chang, Chih-Yang Lin: Reversible Data Embedding Based on Prediction Approach for VQ and SMVQ Compressed Images. Fundam. Inform. 74(2-3): 189-207 (2006) | |
359 | Chin-Chen Chang, Iuon-Chang Lin, Chia-Te Liao: An Access Control System with Time-constraint Using Support Vector Machines. I. J. Network Security 2(2): 150-159 (2006) | |
358 | Chin-Chen Chang, Wei-Liang Tai, Chia-Chen Lin: A Reversible Data Hiding Scheme Based on Side Match Vector Quantization. IEEE Trans. Circuits Syst. Video Techn. 16(10): 1301-1308 (2006) | |
357 | Chin-Chen Chang, Chih-Yang Lin: Reversible Steganography for VQ-Compressed Images Using Side Matching and Relocation. IEEE Transactions on Information Forensics and Security 1(4): 493-501 (2006) | |
356 | Ya-Fen Chang, Jung-San Lee, Chin-Chen Chang: A secure and efficient authentication scheme for mobile users. IJMC 4(5): 581-594 (2006) | |
355 | Yuan-Hui Yu, Chin-Chen Chang: A new edge detection approach based on image context analysis. Image Vision Comput. 24(10): 1090-1102 (2006) | |
354 | Hui-Feng Huang, Chin-Chen Chang: A novel efficient (t, n) threshold proxy signature scheme. Inf. Sci. 176(10): 1338-1349 (2006) | |
353 | Chin-Chen Chang, Chih-Yang Lin, Yu-Zheng Wang: New image steganographic methods using run-length approach. Inf. Sci. 176(22): 3393-3408 (2006) | |
352 | Chin-Chen Chang, Jiann-Jone Chen, Wen-Kai Tai, Chin-Chuan Han: New Approach for Static Gesture Recognition. J. Inf. Sci. Eng. 22(5): 1047-1057 (2006) | |
351 | Chin-Chen Chang, Tzu-Chuen Lu: A difference expansion oriented data hiding scheme for restoring the original host images. Journal of Systems and Software 79(12): 1754-1766 (2006) | |
350 | Chin-Chen Chang, Tzu-Chuen Lu: Reversible index-domain information hiding scheme based on side-match vector quantization. Journal of Systems and Software 79(8): 1120-1129 (2006) | |
349 | Hsien-Wen Tseng, Chin-Chen Chang: Error resilient locally adaptive data compression. Journal of Systems and Software 79(8): 1156-1160 (2006) | |
348 | Chin-Chen Chang: Adaptive multiple sets of CSS features for hand posture recognition. Neurocomputing 69(16-18): 2017-2025 (2006) | |
347 | Chin-Chen Chang, Chia-Te Liao: An image coding scheme using SMVQ and support vector machines. Neurocomputing 69(16-18): 2327-2335 (2006) | |
346 | Chin-Chen Chang, Chi-Shiang Chan, Yi-Hsuan Fan: Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels. Pattern Recognition 39(6): 1155-1167 (2006) | |
345 | Chin-Chen Chang, Yu-Chiang Li, Jun-Bin Yeh: Fast codebook search algorithms based on tree-structured vector quantization. Pattern Recognition Letters 27(10): 1077-1086 (2006) | |
344 | Chin-Chen Chang, Yih-Shin Hu, Tzu-Chuen Lu: A watermarking-based image ownership and tampering authentication scheme. Pattern Recognition Letters 27(5): 439-446 (2006) | |
343 | Chin-Chen Chang, Chi-Shiang Chan, Chun-Sen Tseng: Removing blocking effects using an artificial neural network. Signal Processing 86(9): 2381-2387 (2006) | |
342 | Chin-Chen Chang, Iuon-Chang Lin: A new solution for assigning cryptographic keys to control access in mobile agent environments. Wireless Communications and Mobile Computing 6: 137-146 (2006) | |
2005 | ||
341 | Yeu-Pong Lai, Chin-Chen Chang: A Simple Forward Secure Blind Signature Scheme Based on Master Keys and Blind Signatures. AINA 2005: 139-144 | |
340 | Chia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang: An Improved Low Computation Cost User Authentication Scheme for Mobile Communication. AINA 2005: 249-252 | |
339 | Chin-Chen Chang, Jui-Yi Kuo: An Efficient Multi-Server Password Authenticated Key Agreement Scheme Using Smart Cards with Access Control. AINA 2005: 257-260 | |
338 | Chi-Hsiung Huang, Chia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang, Kuo-Lun Chen: Authenticated Encryption Schemes with Message Linkage for Threshold Signatures. AINA 2005: 261-264 | |
337 | Hui-Feng Huang, Chin-Chen Chang: A New Design for Efficient t-out-n Oblivious Transfer Scheme. AINA 2005: 499-502 | |
336 | Chi-Shiang Chan, Chin-Chen Chang: A Lossless Medical Image Compression Scheme Using Modified S-Tree Structure. AINA 2005: 75-78 | |
335 | Chin-Chen Chang, Chi-Lung Chiang, Ju Yuan Hsiao: A DCT-Domain System for Hiding Fractal Compressed Images. AINA 2005: 83-86 | |
334 | Chin-Chen Chang, Wei-Liang Tai, Min-Hui Lin: A Reversible Data Hiding Scheme with Modified Side Match Vector Quantization. AINA 2005: 947-952 | |
333 | Chin-Chen Chang, Tzu-Chuen Lu: A Color-Based Image Retrieval Method Using Color Distribution and Common Bitmap. AIRS 2005: 56-71 | |
332 | Chin-Chen Chang, Yeu-Pong Lai: A Parallel Modular Exponentiation Scheme for Transformed Exponents. APPT 2005: 443-452 | |
331 | Yu-Chiang Li, Jieh-Shan Yeh, Chin-Chen Chang: A Fast Algorithm for Mining Share-Frequent Itemsets. APWeb 2005: 417-428 | |
330 | Ming-Ni Wu, Chia-Chen Lin, Chin-Chen Chang: Image Copy Detection with Rotating Tolerance. CIS (1) 2005: 464-469 | |
329 | Chin-Chen Chang, Jung-San Lee: Improvement on an Optimized Protocol for Mobile Network Authentication and Security. CIS (2) 2005: 538-541 | |
328 | Hui-Feng Huang, Chin-Chen Chang: Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function. CIS (2) 2005: 554-559 | |
327 | Chin-Chen Chang, Chia-Chen Lin, Jun-Bin Yeh: Adaptive Hiding Scheme Based on VQ-Indices Using Commutable Codewords. CIS (2) 2005: 567-572 | |
326 | Chin-Chen Chang, Jung-San Lee, Chang-Chu Chen: On the Forward and Backward Secrecy of HLL Group Key Exchange Mechanism. CIT 2005: 702-705 | |
325 | Chin-Chen Chang, Jui-Yi Kuo, Jung-San Lee: Time-bounded Based Password Authentication Scheme. CW 2005: 117-122 | |
324 | Hui-Feng Huang, Chin-Chen Chang: An efficient deniable authentication protocol. CW 2005: 307-310 | |
323 | Ya-Fen Chang, Chin-Chen Chang: Password-authenticated 3PEKE with Round Efficiency without Server's Public Key. CW 2005: 340-344 | |
322 | Chin-Chen Chang, Ya-Fen Chang, Wen-Chuan Wu: An Extendable-Message-Passing Protocol with Signatures Based on Two Hard Problems and Its Applications. CW 2005: 93-100 | |
321 | Yu-Chiang Li, Jieh-Shan Yeh, Chin-Chen Chang: Direct Candidates Generation: A Novel Algorithm for Discovering Complete Share-Frequent Itemsets. FSKD (2) 2005: 551-560 | |
320 | Yueh-Yi Lai, Wen-Kai Tai, Chin-Chen Chang, Chen-Duo Liu: Synthesizing transition textures on succession patterns. GRAPHITE 2005: 273-276 | |
319 | Hui-Feng Huang, Chin-Chen Chang: A Novel Conference Key Distribution System with Re-keying Protocol. Human.Society@Internet 2005: 282-290 | |
318 | Ya-Fen Chang, Chin-Chen Chang: An Improvement on Strong-Password Authentication Protocols. ICESS 2005: 629-637 | |
317 | Kuo-Feng Hwang, Chin-Chen Chang, Chao-Wen Chan: A Search Scheme Resulting in Mixing Compressed Text Files. ICPADS (1) 2005: 762-768 | |
316 | Chin-Chen Chang, Jun-Chou Chuang, Pei-Yu Lin: Sharing a Secret Two-Tone Image in Two Gray-Level Images. ICPADS (2) 2005: 300-304 | |
315 | Chin-Chen Chang, Po-Wen Lu: An Image Refining Method Using Digital Watermark via Vector Quantization. ICPADS (2) 2005: 585-589 | |
314 | Chin-Chen Chang, Chun-Sen Tseng, Chia-Chen Lin: Hiding Data in Binary Images. ISPEC 2005: 338-349 | |
313 | Chin-Chen Chang, Tzu-Chuen Lu: Method for Searching Similar Images Using Quality Index Measurement. KES (2) 2005: 1224-1230 | |
312 | Chin-Chen Chang, Chih-Yang Lin, Yu-Zheng Wang: VQ Image Steganographic Method with High Embedding Capacity Using Multi-way Search Approach. KES (3) 2005: 1058-1064 | |
311 | Chin-Chen Chang, Wen-Chuan Wu: A Reversible Information Hiding Scheme Based on Vector Quantization. KES (3) 2005: 1101-1107 | |
310 | Chin-Chen Chang, Yung-Chen Chou, Jau-Ji Shen: Improving Image Quality for JPEG Compression. KES (3) 2005: 442-448 | |
309 | Chin-Chen Chang, Tzu-Chuen Lu, Jun-Bin Yeh: A Bandwidth Efficiency of Lempel-Ziv Scheme for Data Authentication. KES (4) 2005: 249-256 | |
308 | Chin-Chen Chang, Yung-Chen Chou, Wen-Chuan Wu: Image Retrieval Using Spatial Color and Edge Detection. PCM (1) 2005: 981-992 | |
307 | Chin-Chen Chang, Yu-Chiang Li, Jung-San Lee: An Efficient Algorithm for Incremental Mining of Association Rules. RIDE 2005: 3-10 | |
306 | Chin-Chen Chang, Jau-Ji Shen, Yung-Chen Chou: FA-Tree - A Dynamic Indexing Structure for Spatial Data. WSTST 2005: 1071-1080 | |
305 | Chin-Chen Chang, Wei-Liang Tai, Chia-Chen Lin: Secret Hiding Using Side Match Vector Quantization. WSTST 2005: 172-181 | |
304 | Yung-Kuan Chan, Chin-Chen Chang: Content-Based Retrieval Concept. Encyclopedia of Information Science and Technology (I) 2005: 564-568 | |
303 | Chin-Chen Chang, Yeu-Pong Lai: A fast modular square computing method based on the generalized Chinese remainder theorem for prime moduli. Applied Mathematics and Computation 161(1): 181-194 (2005) | |
302 | Ya-Fen Chang, Chin-Chen Chang, Hui-Feng Huang: Digital signature with message recovery using self-certified public keys without trustworthy system authority. Applied Mathematics and Computation 161(1): 211-227 (2005) | |
301 | Chao-Wen Chan, Chin-Chen Chang: A scheme for threshold multi-secret sharing. Applied Mathematics and Computation 166(1): 1-14 (2005) | |
300 | Ya-Fen Chang, Chin-Chen Chang: Authentication schemes with no verification table. Applied Mathematics and Computation 167(2): 820-832 (2005) | |
299 | Min-Shiang Hwang, Kuo-Feng Hwang, Chin-Chen Chang: A time-stamping protocol for digital watermarking. Applied Mathematics and Computation 169(2): 1276-1284 (2005) | |
298 | Jen-Ho Yang, Chin-Chen Chang, Chih-Hung Wang: An iterative modular multiplication algorithm in RNS. Applied Mathematics and Computation 171(1): 637-645 (2005) | |
297 | Chin-Chen Chang, Chih-Yang Lin: Perfect Hashing Schemes for Mining Association Rules. Comput. J. 48(2): 168-179 (2005) | |
296 | Chin-Chen Chang, Jung-San Lee, Ya-Fen Chang: Efficient authentication protocols of GSM. Computer Communications 28(8): 921-928 (2005) | |
295 | Hui-Feng Huang, Chin-Chen Chang: Multisignatures with distinguished signing authorities for sequential and broadcasting architectures. Computer Standards & Interfaces 27(2): 169-176 (2005) | |
294 | Ya-Fen Chang, Chin-Chen Chang, Jen-Ho Yang: An efficient password authenticated key exchange protocol for imbalanced wireless networks. Computer Standards & Interfaces 27(3): 313-322 (2005) | |
293 | Chin-Chen Chang, Iuon-Chang Lin, Kwok-Yan Lam: An ID-based multisignature scheme without reblocking and predetermined signing order. Computer Standards & Interfaces 27(4): 407-413 (2005) | |
292 | Hsien-Chu Wu, Chin-Chen Chang: Sharing visual multi-secrets using circle shares. Computer Standards & Interfaces 28(1): 123-135 (2005) | |
291 |