出版年月 |
著作類別 |
著作名稱 |
作者 |
收錄出處 |
2023-06 |
期刊論文
|
A Steganography Based on Optimal Multi-Threshold Block Labeling |
Xu, S., Chang, C. C. and Horng, J. H. |
Computer Systems Science and Engineering
|
2022-11 |
期刊論文
|
Pine Pest Detection using Remote Sensing Satellite Images Combined with
a Multi-scale Attention-UNet Model |
Ye, W., Lao, J., Liu, Y., Chang, C. C., Zhang, Z., Li, H. and Zhou, H. |
Ecological Informatics
|
2022-11 |
期刊論文
|
Reversible Data Hiding with Hierarchical Block Variable Length Coding for Cloud Security |
Xu, S., Horng, J. H., Chang, C. C. and Chang, C. C. |
IEEE Transactions on Dependable and Secure Computing
|
2022-10 |
期刊論文
|
De-Correlation Neural Network for Synchronous Implementation of Estimation and Secrecy |
Cao, C., Chen, C. H., Chang, C. C., Hwang, F. J. and Chang, C. C. |
IEEE Communications Letters
|
2022-10 |
期刊論文
|
Detecting Multiple Steganography Methods in Speech Streams Using Multi-Encoder Network |
Tian, H., Wu, J., Quan, H., and Chang, C. C. |
IEEE Signal Processing Letters
|
2022-10 |
期刊論文
|
Embedding Biometric Information in Interpolated Medical Images with A Reversible and Adaptive Strategy |
Chi, H., Horng, J. H., Chang, C. C. and Li, Y. H |
Sensors
|
2022-10 |
期刊論文
|
Hiding and Extracting Important Information in Encrypted Images by Using the Transformation of All Possible Permutations and VQ Codebook |
Chi, Z., Chang, C. C., Wang, X. and Lin, C. C. |
Electronics
|
2022-09 |
期刊論文
|
A Consortium Blockchain-based Information Management System for Unmanned Vehicle Logistics |
Zhai, M., Han, D., Chang, C. C. and Sun, Z. |
Computer Science and Information Systems
|
2022-09 |
期刊論文
|
ABOS: An Attention-Based One-Stage Framework for Person Search |
Chen, Y., Han, D., Cui, M., Wu, Z. and Chang, C. C. |
EURASIP Journal on Wireless Communications and Networking
|
2022-09 |
期刊論文
|
SKDStream: A Dynamic Clustering Algorithm in Time-Decaying Data Stream |
Liu, H., Wu, A., Wei, M. and Chang, C. C. |
EURASIP Journal on Wireless Communications and Networking
|
2022-09 |
期刊論文
|
Trajectory Optimization of Autonomous Surface Vehicles with Outliers for Underwater Target Localization |
Mei, X., Han, D., Saeed, N., Wu, H., Chang, C. C., Han, B., Ma, T. and Xian, J. |
Remote Sensing
|
2022-08 |
期刊論文
|
A Novel e-Cash Payment System with Divisibility Based on Proxy Blind Signature in Web of Things |
Lin, I. C., Chang, C. C. and Chiang, H. C. |
IEICE Transactions on Information and Systems
|
2022-08 |
期刊論文
|
CAAN: Context-Aware Attention Network for Visual Question Answering |
Chen, C., Han, D. and Chang, C. C. |
Pattern Recognition
|
2022-08 |
期刊論文
|
Towards Blind Detection of Steganography in Low‐Bit‐Rate Speech Streams |
Sun, C., Tian, H., Mazurczyk, W., Chang, C. C., Cai, Y. and Chen, Y. |
International Journal of Intelligent Systems
|
2022-07 |
期刊論文
|
Reversible Data Hiding in Encrypted Images Using Block-based Adaptive MSB Prediction |
Chen, S. and Chang, C. C. |
Journal of Security and Applications
|
2022-07 |
期刊論文
|
Steganalysis of Adaptive Multi-rate Speech Streams with Distributed Representations of Codewords |
Qiu, Y., Tian, H., Tang, L., Mazurczyk, W. and Chang, C. C. |
Journal of Information Security and Applications
|
2022-06 |
期刊論文
|
On the Multi-Level Embedding of Crypto-Image Reversible Data Hiding |
Wang, X., Chang, C. C., Lin, C. C. and Chang, C. C. |
Journal of Visual Communication and Image Representation
|
2022-05 |
期刊論文
|
RSG-Net: A Recurrent Similarity Network with Ghost Convolution for Wheelset Laser Stripe Image Inpainting |
Ji, Z., Song, X., Feng, B., Wang, H., Chen, C. H. and Chang, C. C. |
IEEE Transactions on Intelligent Transportation Systems
|
2022-04 |
期刊論文
|
A Blockchain-based Secure Storage Scheme for Medical Information |
Sun, Z., Han, D., Li, D., Wang, X., Chang, C. C. and Wu, Z. |
EURASIP Journal on Wireless Communications and Networking
|
2022-04 |
期刊論文
|
Asymmetric Orientation Combination for Reversible and Authenticable Data Hiding of Dual Stego Images |
Lin, J., Chang, C. C. and Horng, J. H. |
Symmetry
|
2022-04 |
期刊論文
|
Dual Self-guided Attention with Sparse Question Networks for Visual Question Answering |
Shen, X., Han, D., Chang, C. C. and Zong, L. |
IEICE Transactions on Information and Systems
|
2022-04 |
期刊論文
|
Privacy-Preserving Data Hiding with Robustness based on Selective Encryption and Matrix Embedding |
Chen, S. and Chang, C. C. |
Multimedia Tools and Applications
|
2022-04 |
期刊論文
|
Public Auditing of Log Integrity for Shared Cloud Storage Systems via Blockchain |
Tian, H., Wang, J., Chang, C. C. and Quan, H. |
Wireless Networks
|
2022-04 |
期刊論文
|
Reversible Data Hiding in Encrypted Image via Secret Sharing Based on GF(p) and GF(2^8) |
Qin, C., Jiang, C., Mo, Q., Yan, H. and Chang, C. C. |
IEEE Transactions on Circuits and Systems for Video Technology
|
2022-03 |
期刊論文
|
A Two-stage Detection Method for Copy-move Forgery based on Parallel Feature Fusion |
Ye, W., Zeng, Q., Peng, Y., Liu, Y.* and Chang, C. C. |
EURASIP Journal on Wireless Communications and Networking
|
2022-02 |
期刊論文
|
A (k,n)-Threshold Secret Image Sharing Scheme Based on Non-Full Rank Linear Model |
Horng, J. H., Chen, S. and Chang, C. C. |
Mathematics
|
2022-02 |
期刊論文
|
High-capacity Reversible Data Hiding in Encrypted Images Based on Adaptive Block Encoding |
Gao, K, Horng, J. H. and Chang, C. C. |
Journal of Visual Communication and Image Representation
|
2022-02 |
期刊論文
|
Learning Stereo Disparity with Feature Consistency and Confidence |
Zhao, L., Li, J., Li, J., Wu, Y. Cheng, S., Tang, Z., Hui, G. and Chang, C. C. |
International Journal of Ad Hoc and Ubiquitous Computing
|
2022-02 |
期刊論文
|
Position-Aware Guided Hiding Data Scheme with Reversibility and Adaptivity for Dual Images |
Chang, C. C., Su, G. D., Lin, C. C.* and Li, Y. H. |
Symmetry
|
2022-02 |
期刊論文
|
Post-quantum Blockchain for Secure Communication in IoT based Smart Home Services |
Lee, W. K., Chen, L., Chang, C. C., Xiong, N., Goi, B. M. and Phan, C. W. |
International Journal of Embedded Systems
|
2022-02 |
期刊論文
|
Pre-training Model Based on the Parallel Multimodal Fusion Layer |
Li, X. W., Han, D. Z. and Chang, C. C. |
Plos One
|
2022-02 |
期刊論文
|
Real-Time Steganalysis for Stream Media Based on Multi-Channel Convolutional Sliding Windows |
Yang, Z., Chang, H., Chang, C. C., Huang, Y. and Chang, C. C. |
Knowledge-Based Systems
|
2022-02 |
期刊論文
|
Self-Supervised Learning Framework Toward State-of-the-Art Iris Image Segmentation |
Putri, W. R., Liu, S. H., Aslam, M. S., Li, Y. H., Chang, C. C. and Wang, J. |
Sensors
|
2022-02 |
期刊論文
|
The Speech Recognition of Post-stroke Dysarthria by Combining Spectrograms and CNN Network |
Ye, W., Mou, Z., Li, Q., Liu, Y. and Chang, C. C. |
Journal of Medical Imaging and Health Informatics
|
2022-01 |
期刊論文
|
A Comprehensive Framework of Multiple Semantic Preservation in Neural Style Transfer |
Ye, W., Zhu, X., Xu, Z., Liu, Y. and Chang, C. C. |
Journal of Visual Communication and Image Representation
|
2022-01 |
期刊論文
|
A Hybrid Parallel Deep Learning Model for Efficient Intrusion Detection Based On Metric Learning |
Han, D., Cai, S., Yin, X., Li, D. and Chang, C. C. |
Connection Science
|
2022-01 |
期刊論文
|
A Reversible and Authenticable Secret Sharing Scheme Using Dual Images |
Lin, J. Y., Horng, J. H. and Chang, C. C. |
Multimedia Tools and Applications
|
2022-01 |
期刊論文
|
A Visual Question Answering Network Merging High- and Low-Level Semantic Information |
Li, H., Han, D., Chen, C. Q., Li, K. J.C, Chang, C. C. and Li, D. |
IEICE Transactions on Information and Systems
|
2022-01 |
期刊論文
|
Adaptive Reversible Data Hiding with Contrast Enhancement based on Multi-histogram Modification |
Zhang, T., Hou, T., Weng, S., Zou, F., Zhang, H. and Chang, C. C. |
IEEE Transactions on Circuits and Systems for Video Technology
|
2022-01 |
期刊論文
|
An Improved Image Steganography Framework based on Y-channel Information for Neural Style Transfer |
Lin, W., Zhu, X., Ye, W., Chang, C. C., Liu, Y. and Liu, C. |
Security and Communication Networks
|
2022-01 |
期刊論文
|
Data Security and Preservation Mechanism for Industrial Control Network using IOTA |
Lin, I. C., Chang, C. C. and Chang, Y. S. |
Symmetry
|
2022-01 |
期刊論文
|
Dual Self-guided Attention with Sparse Question Networks for Visual Quenstion Answering |
Shen, X, Han, D., Chang, C. C. and Liang, Z. |
IEICE Transactions on Information and Systems
|
2022-01 |
期刊論文
|
Efficient Electronic Patient Information Hiding Scheme with Tamper Detection Function for Medical Images |
Lin, C. C., Chang, C. C., Kao, W. J. and Chang, J. F. |
IEEE Access
|
2022-01 |
期刊論文
|
Identity-Based Public Auditing for Cloud Storage of Internet-of-Vehicles Data |
Tian, H., Peng, F., Quan, H. and Chang, C. C. |
ACM Transactions on Internet Technology
|
2022-01 |
期刊論文
|
MFVT: An Anomaly Traffic Detection Method Merging Feature Fusion Network and Vision Transformer Architecture |
Li, M., Han, D., Li, D., Liu, H., and Chang, C. C. |
EURASIP Journal on Wireless Communications and Networking
|
2022-01 |
期刊論文
|
Reversal of Pixel Rotation: A Reversible Data Hiding System towards Cybersecurity in Encrypted Images |
Wang, X., Chang, C. C., Lin, C. C. and Chang, C. C. |
Journal of Visual Communication and Image Representation
|
2022-01 |
期刊論文
|
Signal Decomposition by Differential Evolution |
Chang, Y. C. and Chang, C. C. |
Sensors
|
2022-01 |
期刊論文
|
The Comparison of Attention Mechanisms with Different Embedding Modes for Performance Improvement of Fine-grained Classification |
Ye, W., Tan, R., Liu, Y. and Chang, C. C |
IEICE Transactions on Information and Systems
|
2021-12 |
期刊論文
|
Asymmetric Data Hiding for Compressed Images with High Payload and Reversibility |
Lin, J., Chang, C. C. and Horng, J. H. |
Symmetry
|
2021-12 |
期刊論文
|
CSST-Net: An Arbitrary Image Style Transfer Network of Coverless Steganography |
Zhang, S., Su, S., Li, L., Lu, J., Zhou, Q. and Chang, C. C. |
The Visual Computer
|
2021-12 |
期刊論文
|
Hiding Data in Dual Images Based on Turtle Shell Matrix with High Embedding Capacity and Reversibility |
Xie, X. Z. and Chang, C. C. |
Multimedia Tools and Applications
|
2021-11 |
期刊論文
|
A Novel (2, 3)-Threshold Reversible Secret Image Sharing Scheme Based on Optimized Crystal-Lattice Matrix |
Lin, J. Y., Horng, J. H. and Chang, C. C. |
Symmetry
|
2021-11 |
期刊論文
|
An EMD-based Data Hiding Scheme for JPEG Images |
Xie, X., Chang, C. C. and Horng, J. H.* |
Connection Science
|
2021-11 |
期刊論文
|
Efficient Reversible Data Hiding Scheme for AMBTC-Compressed Images |
Lin, C. C., Nguyen, T. S., Chang, C. C. and Chang, W. C. |
Applied Sciences
|
2021-11 |
期刊論文
|
LRW-CRDB: Lossless Robust Watermarking Scheme for Categorical Relational Databases |
Lin, C. C., Nguyen, T. S. and Chang, C. C. |
Symmetry
|
2021-10 |
期刊論文
|
An Efficient Dual Prediction-based Reversible Data Hiding and Reduced Code Method for AMBTC |
Chang, C. C., Wang, X. and Lin, C. C. |
Multimedia Tools and Applications
|
2021-10 |
期刊論文
|
An SMVQ Compressed Data Hiding Scheme Based on Multiple Linear Regression Prediction |
Chi, H., Chang, C. C. and Liu, Y. |
Connection Science
|
2021-10 |
期刊論文
|
RDMMFET: Representation of Dense Multi-Modality Fusion Encoder Based on Transformer |
Zhang, X., Han, D. and Chang, C. C. |
Mobile Information Systems, Special Issue on Machine Learning
|
2021-10 |
期刊論文
|
Reversible Data Hiding in Encrypted Images Based on Homomorphism and Block-based Congruence Transformation |
Chen, S., Chang, C. C. and Lin, C. C. |
Multimedia Tools and Applications
|
2021-09 |
期刊論文
|
A Novel Adjustable Reversible Data Hiding Method for AMBTC-Compressed Codes using Hamming Distance |
Xia, T. T., Lin, J., Chang, C. C. and Lu, T. C. |
International Journal of Embedded Systems
|
2021-09 |
期刊論文
|
A Two-Layer Steganography for Mosaic Image |
Horng, J. H., Chang, C. C. and Sun, K. S. |
KSII Transactions on Internet and Information Systems
|
2021-09 |
期刊論文
|
Adaptive Data Hiding Scheme based on Magic Matrix of Flexible Dimension |
Wu, H., Horng, J. H. and Chang, C. C. |
KSII Transactions on Internet and Information Systems
|
2021-09 |
期刊論文
|
Predicting Missing Data for Data Integrity Based on the Linear Regression Model |
Gao, K., Chang, C. C. and Liu, Y. |
International Journal of Embedded Systems
|
2021-09 |
期刊論文
|
Screen-Shooting Resilient Watermarking Scheme via Learned Invariant Keypoints and QT |
Li, L., Bai, R., Zhang, S., Chang, C. C. and Shi, M. |
Sensors
|
2021-08 |
期刊論文
|
A High Robust and Blind Image Watermarking Using Arnold Transform Mapping in the DCT Domain of YCbCr Color Space |
Lee, C. F., Chang, C. C., Wang, Z. H. and Di, Y. F. |
Journal of Network Intelligence
|
2021-08 |
期刊論文
|
High Capacity Reversible Data Hiding in Encrypted Images Based on Prediction Error and Block Classification |
Wang, X., Chang, C. C. and Lin, C. C. |
Multimedia Tools and Applications
|
2021-08 |
期刊論文
|
Two-Layer Reversible Data Hiding for VQ-Compressed Images Based on De-Clustering and Indicator-Free Search-Order Coding |
Chang, C. C., Chang, J. F., Kao, W. J. and Horng, J. H. |
Future Internet
|
2021-07 |
期刊論文
|
A Lightweight Attribute -based Access Control Scheme for Intelligent Transportation System with Full Privacy Protection |
Tian, H., Li, X., Quan, H., Chang, C. C. and Thar, B. |
IEEE Sensors Journal
|
2021-07 |
期刊論文
|
Privacy-Preserving Reversible Data Hiding for Medical Images Employing Local Rotation |
Su, G. D., Chang, C. C. and Lin, C. C. |
Journal of Healthcare Engineering
|
2021-07 |
期刊論文
|
Reversible Data Hiding Based on Pixel-Value-Ordering and Prediction-Error Triplet Expansion |
Chi, H., Horng, J W. and Chang, C. C. |
Mathematics
|
2021-06 |
期刊論文
|
Pixel-based Fragile Image Watermarking Based on Absolute Moment Block Truncation Coding |
Lin, C. C., He, S. and Chang, C. C. |
Multimedia Tools and Applications
|
2021-06 |
期刊論文
|
Privacy-Preserving Reversible Data Hiding Based on Quad-Tree Block encoding and Integer Wavelet Transform |
Wang, X., Chang, C. C., Lin, C. C. and Chang, C. C. |
Journal of Visual Communication and Image Representation
|
2021-06 |
期刊論文
|
Reversible Data Hiding in Encrypted Image Based on (7, 4) Hamming Code and UnitSmooth Detection |
Li, L., Chang, C. C. and Lin, C. C. |
Entropy
|
2021-05 |
期刊論文
|
Enhanced (n,n)-threshold QR Code Secret Sharing Scheme Based on Error Correction Mechanism |
Huang, P., Chang, C. C., Li, Y. H. and Liu, Y. |
Journal of Information Security and Applications
|
2021-05 |
期刊論文
|
High-Capacity Separable Reversible Data-Hiding Method in Encrypted Images Based on Block-Level Encryption and Huffman Compression Coding |
Chen, K. M. and Chang, C. C |
Connection Science
|
2021-04 |
期刊論文
|
A Proactive Secret Sharing Scheme Based on Chinese Remainder Theorem |
Meng, K., Miao, F., Ning, Y., Huang, W., Xiong, Y. and Chang, C. C. |
Frontiers of Computer Science
|
2021-04 |
期刊論文
|
Reversible Data Hiding Scheme Based on VQ Prediction and Adaptive Parametric Binary Tree Labeling for Encrypted Images |
Xu, S., Horng, J. H. and Chang, C. C. |
IEEE Access
|
2021-03 |
期刊論文
|
A High-Capacity Reversible Data Hiding Scheme for Encrypted Images Employing Vector Quantization Prediction |
Xu, S., Chang, C. C. and Liu, Y. |
Multimedia Tools and Applications
|
2021-03 |
期刊論文
|
A Hybrid-Sudoku based Fragile Watermarking Scheme for Image Tampering Detection |
Su, G. D., Chang, C. C. and Chen, C. C. |
Multimedia Tools and Applications
|
2021-03 |
期刊論文
|
A Reversible Extended Secret Image Sharing Scheme Based on Chinese Remainder Theorem |
Meng, K., Miao, F., Xiong, Y. and Chang, C. C. |
Signal Processing: Image Communication
|
2021-03 |
期刊論文
|
A Secure Extended LBP Data Hiding Scheme based on Octagon-shaped Shell |
Chang, C. C., Horng, J. H. and Gao, W. J. |
International Journal of Embedded Systems
|
2021-03 |
期刊論文
|
An Authenticatable (2,3) Secret Sharing Scheme Using Meaningful Share Images Based on Hybrid Fractal Matrix |
Gao, K., Horng, J. H. and Chang, C. C. |
IEEE Access
|
2021-03 |
期刊論文
|
An Efficient Lossless Dual Images Secret Sharing Scheme Using Turtle Shell Reference Matrix |
Lin, J. Y., Chen, Y., Chang, C. C. and Hu, Y. C. |
International Journal of Network Security
|
2021-03 |
期刊論文
|
Correction of Slanted Text Pictures Based on Modified Opencv |
Lu, R., Xu, Y., Wu, Z., Zheng, Y., Ren, L., Ding, F., Li, J.* and Chang, C. C. |
Journal of Network Intelligence
|
2021-03 |
期刊論文
|
Grouped Secret Sharing Schemes Based on Lagrange Interpolation Polynomials and Chinese Remainder Theorem |
Miao, F., Yu, Y., Meng, K., Xiong, Y. and Chang, C. C. |
Security and Communication Networks
|
2021-03 |
期刊論文
|
High-Capacity Reversible Data Hiding in Encrypted Images Based on Prediction Error Compression and Block Selection |
Wang,X., Li, L., Chang C. C., and Chang C. C. |
Security and Communication Networks
|
2021-03 |
期刊論文
|
High-capacity Reversible Data Hiding in Encrypted Image Based on Hierarchical Quad-tree Coding and Multi-MSB Prediction |
Liu, Y., Feng, G., Qin, C., Lu, H. and Chang, C. C. |
Electronics
|
2021-03 |
期刊論文
|
Smart Meter Fault Prediction Based on One-dimensional Convolution Neural Network Integrated Model |
Chen, Y., Xu, W., Hong, Z. H., Zhu, M. M., Li, B., Li, J. and Chang, C. C. |
Journal of Network Intelligence
|
2021-03 |
期刊論文
|
Turtle-shell Data Embedding Method with High Image Fidelity |
Qiu, G. H., Lee, C. F. and Chang, C. C. |
International Journal of Embedded Systems
|
2021-03 |
期刊論文
|
VQ-Oriented Data Hiding based on Adjustable Error Compensation Strategy |
Chang, C. C, Horng, J. H., Shi, C. S. and Wang, X. |
Connection Science
|
2021-02 |
期刊論文
|
A Coverless Information Hiding Method Based on Constructing a Complete Grouped Basis with Unsupervised Learning |
Lu, J., Ni, J., Li, L., Luo, T., and Chang, C. C. |
Journal of Network Intelligence
|
2021-02 |
期刊論文
|
High-capacity Reversible Data Hiding in Encrypted Image Based on Huffman Coding and Differences of High Nibbles of Pixels |
Chen, C. C., Chang, C. C. and Chen, K. |
Journal of Visual Communication and Image Representation
|
2021-02 |
期刊論文
|
Pixel P Air-wise Fragile Image Watermarking based on HC-based Absolute Moment Block Truncation Coding |
Lin, C. C., He, S. L. and Chang, C. C. |
Electronics
|
2021-02 |
期刊論文
|
Reversible Data Hiding Based on Three Shadow Images Using Rhombus Magic Matrix |
Chen, S. and Chang, C. C |
Journal of Visual Communication and Image Representation
|
2021-02 |
期刊論文
|
Reversible Data Hiding in Encrypted Images with Block-based Adaptive MSB Encoding |
Wang, X., Chang, C. C. and Lin, C. C. |
Information Sciences
|
2021-02 |
期刊論文
|
Separable Reversible Data Hiding in Encrypted Images Based on Flexible Preservation of the Differences |
Liu, L., Wang, L. and Chang, C. C. |
Multimedia Tools and Applications
|
2021-01 |
期刊論文
|
A Novel Image Compression Technology Based on Vector Quantization and Linear Regression Prediction |
Xu, S., Chang, C. C. and Liu, Y. |
Connection Science
|
2021-01 |
期刊論文
|
An Adaptive Reversible Data Hiding Scheme using AMBTC and Quantization Level Difference |
Chen, Y. H., Chang, C. C., Lin, C. C. and Wang, Z. M. |
Applied Sciences
|
2021-01 |
期刊論文
|
An Anisotropic Reference Matrix for Image Steganography |
Lin, J., Horng, J. H., Liu, Y. and Chang, C. C. |
Journal of Visual Communication and Image Representation
|
2021-01 |
期刊論文
|
Reversible Data Hiding for AMBTC Compressed Images Based on Matrix and Hamming Coding |
Lin, C. C., Lin, J. and Chang, C. C. |
Electronics
|
2021-01 |
期刊論文
|
Using an Optimization Algorithm to Detect Hidden Waveforms of Signals |
Chang, Y. C. and Chang, C. C. |
Sensors
|
2021-01 |
期刊論文
|
Visible 3D-model Watermarking Algorithm for 3D-Printing Based on Bitmap Fonts |
Yan, C., Zhang, G., Wang, A., Liu, L. and Chang, C. C. |
International Journal of Network Security
|
2020-12 |
期刊論文
|
ARFV: An Efficient Shared Data Auditing Scheme Supporting Revocation for Fog-Assisted Vehicular Ad-Hoc Networks |
Cui, M., Han, D., Wang, J., Li, K. C. and Chang, C. C. |
IEEE Transactions on Vehicular Technology
|
2020-11 |
期刊論文
|
A Ring Signature Based Anonymity Authentication Scheme for Group Medical Consultation |
Lin, C. C., Chang, C. C. and Zheng, Y. Z. |
Symmetry
|
2020-11 |
期刊論文
|
Information Hiding in Motion Data of Virtual Characters |
Wu, X., Guo, S., Xing, G., Liao, M., Chang, C. C. and Chuen, Y. |
Expert Systems and Applications
|
2020-11 |
期刊論文
|
Secure High Capacity Tetris-Based Scheme for Data Hiding |
Su, G. D., Chang, C. C., Lin, C. C. and Yao, Z. |
IET Image Processing
|
2020-10 |
期刊論文
|
3D Multilayered Turtle Shell Models for Image Steganography |
Horng, J. H., Lin, J., Liu, Y. and Chang, C. C. |
Computer Modeling in Engineering and Sciences
|
2020-10 |
期刊論文
|
A Fair and Secure Reverse Auction for Government Procurement |
Lin, C. C., Chang, Y. F., Chang, C. C. and Zheng, Y. Z. |
Sustainability
|
2020-10 |
期刊論文
|
An Efficient General Data Hiding Scheme Based on Image Interpolation |
Chen, Y. Q., Sun, W. J., Li, L. Y., Chang, C. C. and Wang, X. |
Journal of Information Security and Applications
|
2020-10 |
期刊論文
|
Greedy Algorithm for Image Quality Optimization Based on Turtle-Shell Steganography |
Qiu, G. H., Lee, C. F. and Chang, C. C. |
International Journal of Computational Science and Engineering
|
2020-10 |
期刊論文
|
Reversible Data Hiding in Encrypted Images Based on Reversible Integer Transformation and Quadtree-based Partition |
Chen, S. and Chang, C. C. |
IEEE Access
|
2020-09 |
期刊論文
|
A Novel (2, 3) Reversible Secret Image Sharing Based on Fractal Matrix |
Gao, K., Horng, J. H. and Chang, C. C. |
IEEE Access
|
2020-09 |
期刊論文
|
A Secure IoT-based Authentication Scheme in Cloud Computing Environment |
Wu, H. L., Chang, C. C., Zheng, Y. Z., Chen, L. S. and Chen, C. C. |
Sensors
|
2020-09 |
期刊論文
|
An Improved Sudoku-based Data Hiding Scheme Using Greedy Method |
Chang, C. C. Su, G. D., and Lin, C. C. |
International Journal of Computational Science and Engineering
|
2020-09 |
期刊論文
|
Effective Self-recovery and Tampering Localization Fragile Watermarking for Medical Images |
Su, G. D., Chang, C. C. and Lin, C. C. |
IEEE Access
|
2020-09 |
期刊論文
|
One-Code-Pass User Authentication Based on QR Code and Secret Sharing |
Liu, Y., Chang, C. C. and Huang, P. C. |
International Journal of Network Security
|
2020-09 |
期刊論文
|
Secure and Anonymous Authentication Scheme for the Internet of Things with Pairing |
Wu, H. L., Chang, C. C. and Chen, L. S. |
Pervasive and Mobile Computing
|
2020-08 |
期刊論文
|
An Adaptive Reversible Data Hiding Scheme Based on Prediction Error Histogram Shifting by Exploiting Signed-Digit Representation |
Xie, X. Z., Chang, C. C. and Hu, Y. C. |
Multimedia Tools and Applications
|
2020-08 |
期刊論文
|
An Effective Image Self-Recovery based Fragile Watermarking using Self-Adaptive Weight-based Compressed AMBTC |
Chang, C. C., Lin, C. C. and Su, G. D. |
Multimedia Tools and Apllications
|
2020-08 |
期刊論文
|
Secure Search for Encrypted Personal Health Records from Big Data NoSQL Databases in Cloud |
Chen, L., Zhang, N., Sun, H. M., Chang, C. C., Yu, S. and Choo, K. K. R. |
Computing
|
2020-07 |
期刊論文
|
A Maze Matrix-Based Secret Image Sharing Scheme with Cheater Detection |
Chang, C. C., Horng, J. H., Shih, C. S. and Chang, C. C. |
Sensors
|
2020-07 |
期刊論文
|
A Reversible Data Hiding Method for SMVQ Indices Based on Improved Locally Adaptive Coding |
Chang, C. C., Chen, J. Y., Chen, Y. H. and Liu, Y. |
International Journal of Network Security
|
2020-07 |
期刊論文
|
A Reversible Secret Image Sharing Scheme Based on Stick Insect Matrix |
Gao, K., Horng, J. H., Liu, Y. and Chang, C. C. |
IEEE Access
|
2020-07 |
期刊論文
|
Cryptanalysis and Improvement of A Group Authentication Scheme with Multiple Trials and Multiple Authentications |
Xia, Z., Liu, Y., Hsu, C. F. and Chang, C. C. |
Security and Communication Networks
|
2020-07 |
期刊論文
|
Mobile Fog Computing Security: A User-Oriented Smart Attack Defense Strategy Based on DQL |
Tu, S., Waqas, M., Meng, Y., Rehman, S., Ahmed I., Koubaa, A., Halim, Z., Hanif, M., Chang, C. C. and Shi, C. |
Computer Communications
|
2020-07 |
期刊論文
|
Sharing a Secret Image in the Cloud Using Two Shadows |
Chen, Y., Lin, J. Y., Chang, C. C. and Hu, Y. C. |
International Journal of Network Security
|
2020-07 |
期刊論文
|
Steganography using Quotient Value Differencing and LSB Substitution for AMBTC Compressed Images |
Horng, J. H., Chang, C. C. and Li, G. L. |
IEEE Access
|
2020-07 |
期刊論文
|
The Analysis of Stego Image Visual Quality for a Data Hiding Scheme Based on Two-Layer Turtle Shell Matrix |
Horng, J. H., Xie, X. Z. and Chang, C. C. |
International Journal of Computational Science and Engineering
|
2020-07 |
期刊論文
|
Unordered Multi-secret Sharing Based on Generalized Chinese Remainder Theorem |
Li, X., Chen, H., Liu, Y. and Chang, C. C. |
Security and Communication Networks
|
2020-06 |
期刊論文
|
On Reliability of Multiprocessor System Based on Star Graph |
Lv, M., Zhou, S., Chen, G., Chen, L., Liu, J. and Chang, C. C. |
IEEE Transactions on Reliability
|
2020-05 |
期刊論文
|
A Novel High Capacity Turtle Shell-based Data Hiding with Location Table Free |
Lin, J. Y., Chen, Y., Chang, C. C. and Hu, Y. C. |
International Journal of Computational Science and Engineering
|
2020-05 |
期刊論文
|
An Efficient Data Hiding Scheme Based on Multi-Dimensional Mini-Sudoku |
Horng, J. H., Xu, S., Chang, C. C. and Chang, C. C |
Sensors
|
2020-05 |
期刊論文
|
Plaintext Aware Encryption in the Standard Model under the Linear Diffie-Hellman Knowledge Assumption |
Gao, D. W., Chen, H. and Chang, C. C. |
International Journal of Computational Science and Engineering
|
2020-05 |
期刊論文
|
The Application Analysis of Neural Network Techniques on Lexical Tone Rehabilitation of Mandarin-speaking Patients with Post-stroke Dysarthria |
Mou, Z., Ye, W., Chang, C. C. and Mao, Y. |
IEEE Access
|
2020-04 |
期刊論文
|
A Data Hiding Scheme Based on Turtle-shell for AMBTC Compressed Images |
Lee, C. F., Chang, C. C. and Li, G. L. |
KSII Transactions on Internet and Information Systems
|
2020-04 |
期刊論文
|
Efficient QR Code Secret Embedding Mechanism Based on Hamming Code |
Huang, P., Chang, C. C., Li, Y. H. and Liu, Y. |
IEEE Access
|
2020-04 |
期刊論文
|
Multi-layer Mini-Sudoku Based High-Capacity Data Hiding Method |
Chen, W., Chang, C. C., Weng, S. and Ou, B |
IEEE Access
|
2020-04 |
期刊論文
|
Reversibly Hiding Data Using Dual Images Scheme Based on EMD Data Hiding Method |
Chen, Y., Lin, J. Y., Chang, C. C. and Hu, Y. C. |
International Journal of Computational Science and Engineering
|
2020-03 |
期刊論文
|
A High Embedding Efficiency RDH in Encrypted Image Combining MSB Prediction and Matrix Encoding for Non-volatile Memory-Based Cloud Service |
Xie, X. Z., Chang, C. C. and Chen, K. M. |
IEEE Access
|
2020-03 |
期刊論文
|
Adaptive Reversible Data Hiding Scheme for AMBTC Compressed Images |
Wang, X., Chang, C. C. and Lin, C. C |
Multimedia Tools and Applications
|
2020-03 |
期刊論文
|
Low-computation-cost Data Hiding Scheme Based on Turtle Shell |
Chen, Y., Lin, J. Y., Chang, C. C. and Hu, Y. C. |
International Journal of Network Security
|
2020-03 |
期刊論文
|
Privacy-preserving High-dimensional Data Publishing for Classification |
Wang, R., Zhu, Y., Chang, C. C. and Peng, Q. |
Computers & Security
|
2020-03 |
期刊論文
|
Reversible Data Hiding Scheme Based on the AMBTC Compression Technique and Huffman Coding |
Xia, T. T., Lin, J., Chang, C. C. and Lu, T. C. |
International Journal of Computational Science and Engineering
|
2020-03 |
期刊論文
|
Steganalysis of Adaptive Multi-rate Speech Based on Extreme Gradient Boosting |
Sun, C., Tian, H., Chang, C. C., Chen, Y., Cai, Y., Du, Y., Chen, Y. H. and Chen, C. C.* |
Electronics
|
2020-03 |
期刊論文
|
The Allocation and Reuse Scheme of Physical Cell Identifications Based on Maximum Degree First Coloring Algorithm |
Liu, M., Tu, S., Xiao, C., Waqas, M., Rehman, S. U., Aamir, M. and Chang, C. C. |
IEEE Systems Journal
|
2020-03 |
期刊論文
|
Tracking Area List Allocation Scheme Based on Overlapping Community Algorithm |
Tu, S., Waqas, M., Lin, Q., Rehman, S. U., Hanif, M., Xiao, C., Butt, M. M. and Chang, C. C. |
Computer Networks
|
2020-02 |
期刊論文
|
A High Capacity Reversible Data Hiding in Encrypted AMBTC-compressed Images |
Su, G. D., Chang, C. C. and Lin, C. C. |
IEEE Access
|
2020-02 |
期刊論文
|
ABMC-DH: An Adaptive Bit-plane Data Hiding Method Based on Matrix Coding |
Yu, Z., Chang, C. C. and Lin, C. C. |
IEEE Access
|
2020-02 |
期刊論文
|
Fidelity Preserved Data Hiding in Encrypted Images Based on Homomorphism and Matrix Embedding |
Chen, S., Chang, C. C. and Liao, Q. Y. |
IEEE Access
|
2020-02 |
期刊論文
|
High Capacity Reversible Data Hiding for VQ-compressed Images Based on Difference Transformation and Mapping Technique |
Li, Y., Chang, C. C. and He, M. |
IEEE Access
|
2020-02 |
期刊論文
|
Reversible Data Hiding Schemes in Encrypted Images Based on the Paillier Cryptosystem |
Chen, H., Chang, C. C. and Chen, K. M. |
International Journal of Network Security
|
2020-02 |
期刊論文
|
Separable Reversible Data Hiding in Encrypted Images With High Capacity Based on Median-Edge Detector Prediction |
Liu, L., Wang, A. and Chang, C. C. |
IEEE Access
|
2020-02 |
期刊論文
|
Two-layer Reversible Data Hiding based on AMBTC Image with (7, 4) Hamming Code |
Lin, J., Weng, S., Zhang, T., Ou, B. and Chang, C. C. |
IEEE Access
|
2020-01 |
期刊論文
|
A Hybrid Reversible Data Hiding for Multiple Images with High Embedding Capacity |
Xie, X. Z., Chang, C. C. and Lin, C. C. |
IEEE Access
|
2020-01 |
期刊論文
|
A Lightweight Authenticable Visual Secret Sharing Scheme based on Turtle Shell Structure Matrix |
Li, X. S., Chang, C. C., He, M. X. and Lin, C. C. |
Multimedia Tools and Applications
|
2020-01 |
期刊論文
|
A Novel Adjustable RDH Method for AMBTC-Compressed Codes Using One-to-many Map |
Zheng, W., Chang, C. C., and Weng, S. W. |
IEEE Access
|
2020-01 |
期刊論文
|
Detecting Steganography in Inactive Voice-over-IP Frames Based on Statistic Characteristics of Fundamental Frequency |
Tian, H., Liu, J., Chang, C. C., Huang, Y, and Cai, Y. |
IEEE Access
|
2020-01 |
期刊論文
|
Packet Watermarking With ECG Biological Feature |
Tseng, K. K., He, X., An, X., Chang, C. C., Wang, C. and Guo, X. |
International Journal of Network Security
|
2020-01 |
期刊論文
|
StegoNote: Steganography in Guitar Music Using Note Modulation |
Tian, H., Zhu, Z., Chang, C. C., Huang, Y., Wang, T., Chen, Y. and Cai, Y. |
International Journal of Network Security
|
2019-12 |
期刊論文
|
An Improved Bidirectional Shift-Based Reversible Data Hiding Scheme Using Double-Way Prediction Strategy |
Li, L., Chang, C. C. and Chen, H. |
Security and Communication Networks
|
2019-11 |
期刊論文
|
Error-free Separable Reversible Data Hiding in Encrypted Images Using Linear Regression and Prediction Error Map |
Chen, K. M. and Chang, C. C. |
Multimedia Tools and Applications
|
2019-10 |
期刊論文
|
A Hybrid Data Hiding Method for Strict AMBTC Format Images with High-Fidelity |
Chang, C. C., Wang, X., and Horng, J. H. |
Symmetry
|
2019-10 |
期刊論文
|
A Square Lattice Oriented Reversible Information Hiding Scheme with Reversibility and Adaptivity for Dual Images |
Su, G. D., Liu, Y. and Chang, C. C. |
Journal of Visual Communication and Image Representation
|
2019-10 |
期刊論文
|
HBF-DH: An Enhanced Payload Hybrid Data Hiding Method Based on A Hybrid Strategy and Block Features |
Yu, Z., Lin, C. C., Chang, C. C. and Su, G. D. |
IEEE Access
|
2019-10 |
期刊論文
|
Light Repository Blockchain System with Multisecret Sharing for Industrial Big Data |
Chen, H., Wu, H. L., Chang, C. C. and Chen, L. S. |
Security and Communication Networks
|
2019-10 |
期刊論文
|
Memory Leakage-resilient Dynamic and Verifiable Multi-keyword Ranked Search on Encrypted Smart Body Sensor Network Data |
Chen, L., Chen, Z., Choo, K. K. R., Chang, C. C. and Sun, H. M |
IEEE Sensors Journal
|
2019-10 |
期刊論文
|
Reversible Data Hiding Scheme based on Quad-tree and Pixel Value Ordering |
Li, J. J., Lee, C. F., Chang, C. C., Lin, J. Y. and Wu, Y. H. |
IEEE Access
|
2019-10 |
期刊論文
|
Reversible Steganographic Scheme for AMBTC-Compressed Image Based on (7, 4) Hamming Code |
Lin, J., Lin, C. C. and Chang, C. C. |
Symmetry
|
2019-10 |
期刊論文
|
Secure High Capacity Data Hiding Scheme based on Reference Matrix |
Li, X. S., Chang, C. C., He, M. X. and Lin, C. C. |
International Journal of Network Security
|
2019-10 |
期刊論文
|
TSIA: A Novel Image Authentication Scheme for AMBTC-Based Compressed Images Using Turtle Shell Based Reference Matrix |
Chen, C. C., Chang, C. C., Lin, C. C. and Su, G. D |
IEEE Access
|
2019-09 |
期刊論文
|
A Mini-Sudoku Matrix-Based Data Embedding Scheme with High Payload |
He, M. Z., Liu, Y., Chang, C. C. and He, M. |
IEEE Access
|
2019-09 |
期刊論文
|
An Image Style Transfer Network using Multilevel Noise Encoding and Its Application in Coverless Steganography |
Zhang, S., Su, S., Li, L., Zhou, Q., Lu, J. and Chang, C. C. |
Symmetry
|
2019-09 |
期刊論文
|
Dual-Image-Based Reversible Data Hiding Scheme with Integrity Verification Based on Exploiting Modification Direction |
Lin, J. Y., Chen, Y., Chang, C. C. and Hu, Y. C. |
Multimedia Tools and Applications
|
2019-09 |
期刊論文
|
Efficient QR Code Authentication Mechanism Based on Sudoku |
Huang, P. C., Li, Y. H., Chang, C. C. and Liu, Y. |
Multimedia Tools and Applications
|
2019-09 |
期刊論文
|
Steganalysis of AMR Speech Based on Multiple Classifiers Combination |
Tian, H., Liu, J., Chang, C. C., Chen, C. C. and Huang, Y. |
IEEE Access
|
2019-09 |
期刊論文
|
Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pitch Delay |
Tian, H., Huang, M., Chang, C. C., Huang, Y., Lu, J. and Du, Y. |
Journal of Universal Computer Science
|
2019-08 |
期刊論文
|
A Biometric-based Authenticated Key Agreement Protocol for User-to-user Communications in Mobile Satellite Networks |
Nguyen, N. T. and Chang, C. C. |
Wireless Personal Communications
|
2019-08 |
期刊論文
|
A Secret Image Restoring Scheme Using Threshold Pairs of Unordered Image Shares |
Li, X., Liu, Y., Chen, H. and Chang, C. C. |
IEEE Access
|
2019-08 |
期刊論文
|
AMBTC based High Payload Data Hiding with Modulo-2 Operation and Hamming Code |
Li, L., He, M., Zhang, S., Luo, T. and Chang, C. C. |
Mathematical Biosciences and Engineering
|
2019-08 |
期刊論文
|
High-payload Secret Hiding Mechanism for QR Codes |
Huang, P. C., Chang, C. C., Li, Y. H. and Liu, Y. |
Multimedia Tools and Applications
|
2019-08 |
期刊論文
|
High-precision Authentication Scheme Based on Matrix Encoding for AMBTC-compressed Images |
Su, G. D., Chang, C. C. and Lin, C. C. |
Symmetry
|
2019-08 |
期刊論文
|
Hybrid Scheme of Image’s Regional Colorization Using Mask R-CNN and Poisson Editing |
Ye, W., Chen, H., Zhang, Z., Liu, Y., Weng, S. and Chang, C. C. |
IEEE Access
|
2019-08 |
期刊論文
|
Tracking Areas Planning Based on Spectral Clustering in Small Cell Networks |
Lin, Q., Tu, S., Waqas, M., Rehman, S. and Chang, C. C. |
IET Communications
|
2019-07 |
期刊論文
|
A Novel Secret Sharing Scheme Using Multiple Share Images |
Li, X., Liu, Y., Chen, H. and Chang, C. C. |
Mathematical Biosciences and Engineering
|
2019-07 |
期刊論文
|
A Turtle Shell based RDH Scheme with Two-Dimensional Histogram Shifting |
Xie, X. Z., Chang, C. C., Lin, C. C. and Lin, C. L. |
Multimedia Tools and Applications
|
2019-07 |
期刊論文
|
Aesthetic QR Code Authentication Based on Directed Periodic Texture Pattern |
Li, L., He, M., Yu, J., Lu, J., Zhou, Q., Feng, X. and Chang, C. C. |
Journal of Computers
|
2019-07 |
期刊論文
|
Extended Squared Magic Matrix for Embedding Secret Information with Large Payload |
Xie, X. Z., Liu, Y. and Chang, C. C. |
Multimedia Tools and Applications
|
2019-07 |
期刊論文
|
Reversibility-oriented Secret Image Sharing Mechanism with Steganography and Authentication Based on Code Division Multiplexing |
Xie, X. Z., Chang, C. C. and Lin, C. C. |
IET Image Processing
|
2019-06 |
期刊論文
|
A Real-Time Dual-Image-Based Reversible Data Hiding Scheme Using Turtle Shells |
Lin, J. Y., Liu, Y. and Chang, C. C. |
Journal of Real-Time Image Processing
|
2019-06 |
期刊論文
|
Blockchain based Searchable Encryption for Electronic Health Record Sharing |
Chen, L., Lee, W. K., Chang, C. C., Choo, K. K. and Zhang, N. |
Future Generation Computer Systems
|
2019-06 |
期刊論文
|
Public Audit for Operation Behavior Logs with Error Locating in Cloud Storage |
Tian, H., Chen, Z., Chang, C. C., Huang Y., Wang, T., Huang, Z., Cai, Y. and Chen, Y. |
Soft Computing
|
2019-06 |
期刊論文
|
Signature Gateway: Offloading Signature Generation to IoT Gateway Accelerated by GPU |
Chang, C. C., Lee, W. K., Liu, Y., Goi, B. M. and Phan, C. W. |
IEEE Internet of Things Journal
|
2019-05 |
期刊論文
|
A Reversible Data Hiding Scheme for JPEG Images by Doubling Small Quantized AC Coefficients |
Xie, X. Z., Lin, C. C. and Chang, C. C. |
Multimedia Tools and Applications
|
2019-05 |
期刊論文
|
An Interpolative AMBTC-based High-Payload RDH Scheme for Encrypted Images |
Shiu, P. F., Tai, W. L., Jan, J. K., Chang, C. C. and Lin, C. C. |
Signal Processing: Image Communication
|
2019-05 |
期刊論文
|
High-capacity Reversible Data Hiding in Encrypted Images Based on Two-phase Histogram Shifting |
Chen, K. and Chang, C. C. |
Mathematical Biosciences and Engineering
|
2019-04 |
期刊論文
|
A Video Watermark Algorithm Based on Tensor Decomposition |
Zhang, S., Guo, X., Xu, X., Li, L. and Chang, C. C. |
Mathematical Biosciences and Engineering
|
2019-04 |
期刊論文
|
Data Embedding Scheme Based on Multi-Matrix Structure of Turtle Shell to Avoid Human Eye Perception |
Liu, L., Wang, L. and Chang, C. C. |
Multimedia Tools and Applications
|
2019-04 |
期刊論文
|
Efficient Secret Sharing Scheme with Cheater Identification Based on QR Code |
Huang, P. C., Chang, C. C., Li, Y. H. and Liu, Y. |
KSII Transactions on Internet and Information Systems
|
2019-04 |
期刊論文
|
Enhanced Secure Data Backup Scheme Using Multi-factor Authenticatio |
Hu, H., Lin, C., Chang, C. C. and Chen, L. |
IET Information Security
|
2019-04 |
期刊論文
|
Image Neural Style Transfer with Preserving the Salient Regions |
Xu, Z., Ye, W., Weng, S., Zhang, Z., Chang, C. C. and Tang, H. |
IEEE Access
|
2019-03 |
期刊論文
|
A Cloud-assisted Passenger Authentication Scheme for Japan Rail Pass Based on Image Morphing |
Liu, Y. and Chang, C. C. |
International Journal of Network Security
|
2019-03 |
期刊論文
|
A New Aesthetic QR Code Algorithm based on Salient Region Detection and SPBVM |
Li, L., Wang, B., Lu, J., Zhang, S. and Chang, C. C. |
Journal of Internet Technology
|
2019-03 |
期刊論文
|
A Novel (t,n) Secret Sharing Scheme Based Upon Euler's Theorem |
Chen, H. and Chang, C. C. |
Security and Communication Networks
|
2019-03 |
期刊論文
|
Dynamic Multi-Keyword Ranked Search Based on Bloom Filter over Encrypted Cloud Data |
Guo, C., Zhuang, R., Chang, C. C. and Yuan, Q. |
IEEE Access
|
2019-03 |
期刊論文
|
Efficient Real-time Integrity Auditing with Privacy-preserving Arbitration for Images in Cloud Storage System |
Tang, X., Huang, Y., Chang, C. C. and Zhou, L. |
IEEE Access
|
2019-03 |
期刊論文
|
Improved K-pass Pixel Value Ordering Based Data Hiding |
Weng, S., Chen, Y., Chang, C. C. and Zhang, C. |
IEEE Access
|
2019-03 |
期刊論文
|
Reversible Data Hiding in Encrypted Images Based on Bit-plane Block Embedding |
Lin, J. Y., Chen, Y., Chang, C. C. and Hu, Y. C. |
Journal of Information Hiding and Multimedia Signal Processing
|
2019-03 |
期刊論文
|
Security Protection Using Two Different Image Shadows with Authentication |
Liu, Y., Chang, C. C. and Huang, P. C. |
Mathematical Biosciences and Engineering
|
2019-02 |
期刊論文
|
Privacy-preserving Public Auditing for Secure Data Storage in Fog-to-Cloud Computing |
Tian, H., Nan, F., Chang, C. C., Huang, Y., Chen, Y. and Cai, S. |
Journal of Network and Computer Applications
|
2019-01 |
期刊論文
|
An Improved Integer Transform Combining with an Irregular Block Partition |
Weng, S., Chen, Y., Hong, W., Pan, J. S., Chang, C. C. and Liu, Y. |
Symmetry
|
2019-01 |
期刊論文
|
An Information Theoretically Secure E-lottery Scheme Based on Symmetric Bivariate Polynomials |
Xia, Z., Liu, Y., Hsu, C. F. and Chang, C. C. |
Symmetry
|
2019-01 |
期刊論文
|
Content-based Color Image Retrieval Using Block Truncation Coding Based on Binary Ant Colony Optimization |
Chen, Y. H., Chang, C. C., Lin, C. C. and Hsu, C. Y. |
Symmetry
|
2019-01 |
期刊論文
|
High-capacity Reversible Data Hiding in Encrypted Images Based on Extended Run-Length Coding and Block-based MSB Plane Rearrangement |
Chen, K. M. and Chang, C. C. |
Journal of Visual Communication and Image Representation
|
2019-01 |
期刊論文
|
Privacy Preserving Weighted Similarity Search Scheme for Encrypted Data |
Guo, C., Tian, P. and Chang, C. C. |
IET Image Processing
|
2019-01 |
期刊論文
|
Public Auditing for Shared Cloud Data with Efficient and Secure Group Management |
Tian, H., Nan, F., Jiang, H., Chang, C. C., Ning, J. and Huamg, Y. |
Information Sciences
|
2019-01 |
期刊論文
|
Real-Time Error-Free Reversible Data Hiding in Encrypted Images Using (7, 4) Hamming Code and Most Significant Bit Prediction |
Chen, K. and Chang, C. C. |
Symmetry
|
2019-01 |
期刊論文
|
Separable Data-Hiding Scheme for Encrypted Image to Protect Privacy of User in Cloud |
Liu, L., Wang, L., Shi, Y. Q. and Chang, C. C. |
Symmetry
|
2018-12 |
期刊論文
|
A Publicly Verifiable Multi-secret Sharing Scheme with Outsourcing Secret Reconstruction |
Lin, C., Hu, H., Chang, C. C. and Tang, S. |
IEEE Access
|
2018-12 |
期刊論文
|
Separable Reversible Data Hiding in Encrypted Images via Adaptive Embedding Strategy with Block Selection |
Qin, C., Zhang, W., Cao, F., Zhang, X. and Chang, C. C. |
Signal Processing
|
2018-12 |
期刊論文
|
Steganalysis of Inactive Voice-over-IP Frames Based on Poker Test |
Liu, J., Tian, H., Chang, C. C., Wang, T., Chen, Y. and Cai, Y. |
Symmetry
|
2018-11 |
期刊論文
|
Security in Fog Computing: A Novel Technique to Tackle an Impersonation Attack |
Tu, S., Waqas, M., Rehman, S. R., Aamir, M., Rehman, O. U., Zhang, J. and Chang, C. C. |
IEEE Access
|
2018-10 |
期刊論文
|
A Novel Aesthetic QR Code Algorithm Based on Hybrid Basis Vector Matrices |
Lu, J., Cheng, W., Zhang, S., Li, L., Yang, Z. and Chang, C. C. |
Symmetry
|
2018-10 |
期刊論文
|
A Turtle Shell-based Visual Secret Sharing Scheme with Reversibility and Authentication |
Liu, Y. and Chang, C. C. |
Multimedia Tools and Applications
|
2018-10 |
期刊論文
|
Effective Reversible Image Steganography Based on Rhombus Prediction and Local Complexity |
Nguyen, T. S., Chang, C. C. and Shih, T.H. |
Multimedia Tools and Applications
|
2018-10 |
期刊論文
|
Privacy-Preserving Algorithms for Multiple Sensitive Attributes Satisfying t-Closeness |
Wang, R., Zhu, Y., Chen, T. S. and Chang, C. C. |
Journal of Computer Science and Technology
|
2018-10 |
期刊論文
|
Sudoku-based Secret Sharing Approach With Cheater Prevention Using QR Code |
Huang, P. C., Chang, C. C. and Li, Y. H. |
Multimedia Tools and Applications
|
2018-09 |
期刊論文
|
A Biometric-based Authenticated Key Agreement Scheme for Session Initiation Protocol in IP-based Multimedia Networks |
Nguyen, N. T. and Chang, C. C. |
Multimedia Tools and Applications
|
2018-09 |
期刊論文
|
Adjacency-Hash-Table based Public Auditing for Data Integrity in Mobile Cloud Computing |
Chen, W., Tian, H., Chang, C. C., Nan, F. and Lu, J. |
Wireless Communications and Mobile Computing
|
2018-08 |
期刊論文
|
A New Aesthetic QR Code Algorithm based on Salient Region Detection and SPBVM |
Li, L., Wang, B., Lu, J., Zhang, S. and Chang, C. C. |
Journal of Internet Technology
|
2018-08 |
期刊論文
|
An Authentication Method Based on the Turtle Shell Algorithm for Privacy-Preserving Data Mining |
Wang, R., Zhu, Y., Chen, T. S. and Chang, C. C. |
The Computer Journal
|
2018-08 |
期刊論文
|
High Embedding Capacity Data Hiding Algorithm for H.264/AVC Video Sequences without Intraframe Distortion Drift |
Nguyen, D. C., Nguyen T. S., Chang, C. C., Hsueh, H. S., and Hsu, F. R. |
Security and Communication Networks
|
2018-08 |
期刊論文
|
Reversible Data Hiding for VQ Indices using Hierarchical State Codebook Mapping |
Xia, B., Wang, A., Chang, C. C. and Liu, L. |
Multimedia Tools and Applications
|
2018-07 |
期刊論文
|
A Cascaded Algorithm for Image Quality Assessment and Image Denoising Based on CNN for Image Security and Authorization |
Li, J., Yu, J., Xu, L., Xue, X., Chang, C. C., Mao, X. and Hu, J. |
Security and Communication Networks
|
2018-07 |
期刊論文
|
A Novel Method of Speech Information Hiding Based on 3D-Magic Matrix |
Yang, Z. L., Peng, X. S., Huang, Y. F. and Chang, C. C. |
Journal of Internet Technology
|
2018-07 |
期刊論文
|
A Watermarking Mechanism With High Capacity for Three-Dimensional Mesh Objects Using Integer Planning |
Li, L., Li, H., Yuan, W., Feng, X., Lu, J. and Chang, C. C. |
IEEE Multimedia
|
2018-07 |
期刊論文
|
An Adaptive High-Fidelity Steganographic Scheme Using Edge Detection and Hybrid Hamming Codes |
Lee, C. F., Chang, C. C., Xie, X. Z., Mao, K. and Shi, R. H. |
Displays
|
2018-07 |
期刊論文
|
Framework for Practical and Receipt-free Remote Voting |
Xia, Z., Tong, Z., Xiao, M. and Chang, C. C. |
IET Information Security
|
2018-07 |
期刊論文
|
Imbalanced Image Classification Approach Based on Convolution Neural Network and Cost-sensitivity |
Tan, J., Zhu, Y., Chen, T. S. and Chang, C. C. |
Journal of Computer Applications
|
2018-07 |
期刊論文
|
Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image Tampering Recovery |
Qin, C., Ji, P., Chang, C. C., Dong, J. and Sun, X. |
IEEE Multimedia
|
2018-07 |
期刊論文
|
StegTab: Steganography in Guitar Tablatures |
Zhu, Z., Tian, H., Chang, C. C., Chen, Y., Wang, T. and Cai, Y. |
Journal of Information Hiding and Multimedia Signal Processing
|
2018-06 |
期刊論文
|
An Efficient Object Detection Algorithm Based on Compressed Networks |
Li, J., Peng, K. and Chang, C. C. |
Symmetry
|
2018-06 |
期刊論文
|
Detecting Bitrate Modulation-Based Covert Voice-Over-IP Communication |
Tian, H., Sun, J., Chang, C. C., Huang, Y. and Chen, Y. |
IEEE Communications Letters
|
2018-06 |
期刊論文
|
Detection of Bird‘s Nest in High Power Lines in the Vicinity of Remote Campus Based on Combination Features and Cascade Classifier |
Lu, J., Xu, X., Li, X., Li, L., Chang, C. C., Feng, X. and Zhang, S. |
IEEE Access
|
2018-05 |
期刊論文
|
A Selective Encryption Scheme of CABAC based on Video Context in High Efficiency Video Coding |
Li, J. Wang, C., Chen, X., Tang, Z., Hui, G. and Chang, C. C. |
Multimedia Tools and Applications
|
2018-05 |
期刊論文
|
An Improved Data Hiding Method Based on Lempel-Ziv-Welch Compression Codes |
Chang, C. C., Huynh, N. T., Wang, Y. K. and Liu, Y. |
International Journal of Network Security
|
2018-05 |
期刊論文
|
Computer-Aided Annotation for Video Tampering Dataset of Foyensic Research |
Yao, Y., Yu, C. X., Yang, L., Chang, C. C. |
Journal of Information Hiding and Multimedia Signal Processing
|
2018-05 |
期刊論文
|
Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction |
Huang, P. C., Li, Y. H., Chang, C. C. and Liu, Y. |
KSII Transactions on Internet and Information Systems
|
2018-05 |
期刊論文
|
Untraceable Biometric-Based Three-Party Authenticated Key Exchange for Dynamic Systems |
Nguyen, N. T. and Chang, C. C. |
Peer-to-Peer Networking and Applications
|
2018-04 |
期刊論文
|
A Reversible Data Hiding Scheme Based on Absolute Moment Block Truncation Coding Compression Using Exclusive OR Operator |
Chang, C. C., Chen, T. S., Wang, Y. K. and Liu, Y. |
Multimedia Tools and Applications
|
2018-04 |
期刊論文
|
New Secret Sharing Scheme Based on Faster R-CNNs Image Retrieval |
Li, J., Wang, N., Wang, Z. H., Li, H., Chang, C. C. and Wang, H. |
IEEE Access
|
2018-04 |
期刊論文
|
Optimization of CNN through Novel Training Strategy for Visual Classification Problems |
Rehman, S., Tu, S., Rehman, O., Huang, Y, Magurawalage, C. and Chang, C. C. |
Entropy
|
2018-03 |
期刊論文
|
A Secure and Efficient Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communication |
Guo, C., Chang, C. C. and Chang, S. C. |
International Journal of Network Security
|
2018-03 |
期刊論文
|
Minima-Maxima Preserving Data Hiding Algorithm for Absolute Moment Block Truncation Coding Compressed Images |
Huynh, N. T., Bharanitharan, K., Chang, C. C. and Liu, Y. |
Multimedia Tools and Applications
|
2018-03 |
期刊論文
|
Reversible Data Hiding Scheme Based on the Haar Discrete Wavelet Transform and Interleaving Prediction Method |
Li, F., Mao, Q. and Chang, C. C. |
Multimedia Tools and Applications
|
2018-02 |
期刊論文
|
Data Hiding Based on A Two-layer Turtle Shell Matrix |
Xie, X. Z., Lin, C. C. and Chang, C. C. |
Symmetry
|
2018-02 |
期刊論文
|
Efficient Access Control System Based on Aesthetic QR Code |
Huang, P. C., Chang, C. C., Li, Y. H. and Liu, Y. |
Personal and Ubiquitous Computing
|
2018-01 |
期刊論文
|
An Effective Authentication Scheme Using DCT for Mobile Devices |
Chang, C. C., Lu, T. C., Zhu, Z. H and Tian, H. |
Symmetry
|
2018-01 |
期刊論文
|
Attacks on "A Provably Secure and Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems" |
Wu, H. L. and Chang, C. C. |
Multimedia Tools and Applications
|
2018-01 |
期刊論文
|
Detecting Bitrate Modulation-Based Covert Voice-Over-IP Communication |
Tian, H., Sun, J., Chang, C. C., Huang, Y. and Chen, Y. |
IEEE Communications Letters
|
2018-01 |
期刊論文
|
Efficient Information Hiding Based on Theory of Numbers |
Liu, Y., Chang, C. C., Huang, P. C. and Hsu, C. Y. |
Symmetry
|
2018-01 |
期刊論文
|
Generalized PVO-K Embedding Technique for Reversible Data Hiding |
Li, J. J., Wu, Y. H., Lee, C. F. and Chang, C. C. |
International Journal of Network Securit
|
2018-01 |
期刊論文
|
High-Capacity Reversible Data Hiding Method for JPEG Images |
Chang, C. C., Tang, R., Lin, C. C. and Lyu, W. L. |
Journal of Software
|
2018-01 |
期刊論文
|
No-Reference Image Blur Assessment Based on SIFT and DCT |
Zhang, S., Wu, T., Xu, X., Cheng, Z., Pu. S. and Chang, C. C |
Journal of Information Hiding and Multimedia Signal Processing
|
2018-01 |
期刊論文
|
Optimum Feature Selection Based on Genetic Algorithm Under Web Spam Detection |
Wang, J. Q., Zhu, Y., Chen, T. S. and Chang, C. C. |
Journal of Computer Applications
|
2018-01 |
期刊論文
|
Perceptual Hashing for Color Images Based on Hybrid Extraction of Structural Features |
Qin, C., Sun, M. and Chang, C. C. |
Signal Processing
|
2018-01 |
期刊論文
|
Reversible Data Hiding for JPEG Images Employing All Quantized Non-Zero AC Coefficients |
Liu, Y. and Chang, C. C. |
Displays
|
2018-01 |
期刊論文
|
Security Issues in Ultralightweight RFID Authentication Protocols |
Zhuang, X., Zhu, Y., Chang, C. C.* and Peng, Q. |
Wireless Personal Communications
|
2017-12 |
期刊論文
|
A Unified Score Propagation Model for Web Spam Demotion Algorithm |
Zhuang, X., Zhu, Y., Chang, C. C., Peng, Q. and Faisal, M. |
Information Retrieval Journal
|
2017-11 |
期刊論文
|
A Lossless Data Hiding Scheme Based on VQ Index Frequency |
Bai, J., Chang, C. C. and Zhu, C. |
Journal of Internet Technology
|
2017-10 |
期刊論文
|
A One-Card-Pass User Authentication Scheme Using Image Morphing |
Liu, Y. and Chang, C. C. |
Multimedia Tools and Applications
|
2017-10 |
期刊論文
|
A Semantic Compression Scheme for Digital Images Based on Vector Quantization and Data Hiding |
Liu, L., Wang, L. F. and Chang, C. C. |
Multimedia Tools and Applications
|
2017-10 |
期刊論文
|
Cybersecurity for Cyber-Enabled Multimedia Applications |
Jin, Q., Xiang, Y., Sun, G.,Liu, Y. and Chang, C. C. |
IEEE MultiMedia
|
2017-10 |
期刊論文
|
Steganography in Low Bit-rate Speech Streams of VoIP Based on Quantization Index Modulation Controlled by Keys |
Huang, Y, Tao, H., Xiao, B. and Chang, C. C. |
Science China Technological Sciences
|
2017-09 |
期刊論文
|
An Efficient Steganography Scheme Based on Edge Detection for High Payload |
Chang, C. C., Nguyen, T. S. and Chien, T. Y. |
J. of Information Hiding and Multimedia Signal Processing
|
2017-09 |
期刊論文
|
Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage |
Tian, H., Chen, Y., Chang, C. C., Huang, Y. and Chen, Y. H. |
IEEE Transactions on Services Computing
|
2017-07 |
期刊論文
|
High Capacity Data Hiding For Binary Image Based on Block Classification |
Nguyen, T. S., Chang, C. C. and Hsueh, H. S. |
Multimedia Tools and Applications
|
2017-07 |
期刊論文
|
Notes on Secure Authentication Scheme for IoT and Cloud Servers |
Chang, C. C., Wu, H. L. and Sun, C. Y. |
Pervasive and Mobile Computing
|
2017-07 |
期刊論文
|
ShortHC: Self-Regenerated Short Hash Chain for Resource-Constrained System |
Wang, L. M., Xie, Q. Q., Jiang, T. and Chang, C. C. |
J. of Information Hiding and Multimedia Signal Processing
|
2017-07 |
期刊論文
|
Vessel Detection in Chicken Chorioallantoic Membrane Image |
Chang, C. C., Pai, P. Y., Tsai, M. H. and Chan, Y. K. |
J. of Information Hiding and Multimedia Signal Processing
|
2017-06 |
期刊論文
|
Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pulse Pairs |
Tian, H., Wu, Y., Chang, C. C., Huang, Y., Chen, Y., Wang, T., Liu, J. and Cai, Y. |
Signal Processing
|
2017-05 |
期刊論文
|
A Difference Expansion Based Reversible Information Hiding Scheme with High Stego Image Visual Quality |
Chang, C. C., Huang, Y. H. and Lu, T. C. |
Multimedia Tools and Applications
|
2017-05 |
期刊論文
|
A Secret Image Sharing with Deep-steganography and Two-stage Authentication Based on Matrix Encoding |
Liu, L., Wang, A. Chang, C. C. and Li, Z. |
International Journal of Network Security
|
2017-05 |
期刊論文
|
Data Hiding Based on Extended Turtle Shell Matrix Construction Method |
Liu, L., Chang, C. C. and Wang, A. |
Multimedia Tools and Applications
|
2017-05 |
期刊論文
|
Protecting User Privacy in a Multi-path ICN Using Multiple Random-Caches |
Chu, W., Wang, L., Jiang, Z. and Chang, C. C. |
Journal of Computer Science and Technology
|
2017-04 |
期刊論文
|
Enabling Public Auditability for Operation Behaviors in Cloud Storage |
Tian, H., Chen, Z., Chang, C. C., Kuribayashi, M. and Huang, Y. |
Software Computing
|
2017-04 |
期刊論文
|
Hiding Information into Voice-over-IP Streams Using Adaptive Bitrate Modulation |
Tian, H., Sun, J., Qin, J., Chang, C. C. and Chen, Y. |
IEEE Communications Letters
|
2017-04 |
研討會論文
|
A Reversible Data Hiding Scheme for Image Interpolation Based on Reference Matrix |
Chang, C. C., Nguyen, T. S. and Liu, Y. |
|
2017-04 |
研討會論文
|
An Offline User-Verifiable Electronic Traveler's Check System |
Chang, C. C., Yang, J. H. and Lai, Y. W. and Liu, Y. |
|
2017-04 |
研討會論文
|
Reversible Data Hiding in Encrypted Images Using Reformed JPEG Compression |
Xie, X. Z. and Chang, C. C. |
|
2017-03 |
期刊論文
|
Feature Bundling for Decision Tree Algorithm |
Zhuang, X., Zhu, Y., Chang, C. C. and Peng, Q. |
Intelligent Data Analysis
|
2017-03 |
期刊論文
|
Lottery Protocol Using Oblivious Transfer Based on ECC |
Liu, Y. N., Liu, G. and Chang, C. C. |
Journal of Internet Technology
|
2017-03 |
期刊論文
|
Multiple Schemes for Mobile Payment Authentication Using QR Code and Visual Cryptography |
Lu, J., Yang, Z., Li, L., Yuan, W., Li, L. and Chang, C. C. |
Mobile Information Systems
|
2017-03 |
期刊論文
|
Turbo Unequal Error Protection Codes with Multiple Protection Levels |
Mao, Q. and Chang, C. C. |
International Journal of Network Security
|
2017-02 |
期刊論文
|
A Secure and Efficient Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communication |
Guo, C., Chang, C. C. and Chang, S. C. |
International Journal of Network Security
|
2017-02 |
期刊論文
|
Minima-Maxima Preserving Data Hiding Algorithm for Absolute Moment Block Truncation Coding Compressed Images |
Huynh, N. T., Bharanitharan, K., Chang, C. C. and Liu, Y. |
Multimedia Tools and Applications
|
2017-02 |
期刊論文
|
Recent Advances in Security and Privacy for Wireless Sensor Networks 2016 |
Yu, F., Chang, C. C., Shu, J., Ahmad, J. S., Zhang, J. and Fuentes, J. M. |
Journal of Sensors
|
2017-01 |
期刊論文
|
"Fragile Image Watermarking Scheme Based on VQ Index Sharing and Self-embedding |
Qin, C., Ji, P., Wang, J. and Chang, C. C. |
Multimedia Tools and Applications
|
2017-01 |
期刊論文
|
A High Payload Steganographic Algorithm Based on Edge Detection |
Bai, J., Chang, C. C., Nguyen, T. S., Zhu, C. and Liu, Y. |
Displays
|
2017-01 |
期刊論文
|
A Novel Micropayment Scheme with Variable Denomination |
Zhao, Q. Y., Liu, Y. N., Liu, G. and Chang, C. C. |
International Journal of Network Security
|
2017-01 |
期刊論文
|
Attacks on "A Provably Secure and Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems" |
Wu, H. L. and Chang, C. C. |
Multimedia Tools and Applications
|
2017-01 |
期刊論文
|
Attacks on A Provably Secure and Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems |
Wu, H. L. and Chang, C. C. |
Multimedia Tools and Applications
|
2017-01 |
期刊論文
|
Minimizing Turtle-Shell Matrix Based Stego Image Distortion Using Particle Swarm Optimization |
Jin, Q., Li, Z., Chang, C. C., Wang, A. and Liu, L. |
International Journal of Network Security
|
2017-01 |
期刊論文
|
Reversible Data Hiding Using Pixel Order Exchange |
Wu, H. L., Chang, C. C. and Nguyen, T. S. |
International Journal of Future Computer and Communication
|
2017-01 |
期刊論文
|
Secure Multi-group Data Hiding Based on GEMD Map |
Kuo, W. C., Chang, S. Y., Wang, C. C. and Chang, C. C. |
Multimedia Tools and Applications
|
2016-12 |
期刊論文
|
A Robust and Removable Watermarking Scheme Using Singular Value Decomposition |
Di, Y. F., Lee, C. F., Wang, Z. H., Chang, C. C. and Li, J. J. |
KSII Transactions on Internet and Information Systems
|
2016-12 |
期刊論文
|
Bi-Stretch Reversible Data Hiding Algorithm for Absolute Moment Block Truncation Coding Compressed Images |
Li, F., Bharanitharan, K., Chang, C. C. and Mao, Q. |
Multimedia tools and Applications
|
2016-12 |
期刊論文
|
Generalized PVO-K Embedding Technique for Reversible Data Hiding |
Li, J. J., Wu, Y. H., Lee, C. F. and Chang, C. C. |
International Journal of Network Security
|
2016-12 |
期刊論文
|
Reversible Data Hiding Scheme Based on the Haar Discrete Wavelet Transform and Interleaving Prediction Method |
Li, F., Mao, Q. and Chang, C. C. |
Multimedia Tools and Applications
|
2016-11 |
期刊論文
|
A High Payload Steganographic Scheme for Compressed Images with Hamming Code |
Bai, J. and Chang, C. C. |
International Journal of Network Security
|
2016-11 |
期刊論文
|
A Survey of Fragile Watermarking-based Image Authentication Techniques |
Liu, X. L., Lin, C. C., Chang, C. C. and Yuan, S. M. |
Journal of Information Hiding and Multimedia Signal Processing
|
2016-11 |
期刊論文
|
A Universal Authentication Scheme with Anonymity for Heterogeneous Wireless Networks |
Chang, C. C., Tseng, W. T. and Tsai, H. C. |
Journal of Information Hiding and Multimedia Signal Processing
|
2016-11 |
期刊論文
|
An Advanced Anonymous and Biometrics-based Multi-server Authentication Scheme Using Smart Cards |
Chang, C. C., Hsueh, W. Y. and Cheng, T. F. |
International Journal of Network Security
|
2016-11 |
期刊論文
|
Novel Lossless Morphing Algorithm for Secret Sharing via Meaningful Images |
Mao, Q., Bharanitharan, K. and Chang, C. C. |
Journal of Information Hiding and Multimedia Signal Processing
|
2016-11 |
期刊論文
|
Smart Card Based Password Authenticated Key Agreement Protocol Using Chaotic Maps |
Cheng, T. F., Chang, C. C. and Lo, Y. Y. |
International Journal of Communication Systems
|
2016-11 |
期刊論文
|
The Study of Difference-Expansion Embedding Schemes |
Mao, K., Lee, C. F., Chang, C. C. and Shi, R. H. |
Journal of Electronic Science and Technology, Special Issue on Information Security and Applications
|
2016-11 |
研討會論文
|
A Revisit to LSB Substitution Based Data Hiding for Embedding More Information |
Liu, Y., Chang, C. C. and Chien, T. Y. |
|
2016-11 |
研討會論文
|
A Secure Authentication Scheme for Telecare Medical Information Systems |
Chang, C. C., Lee, J. S., Lo, Y. Y. and Liu, Y. |
|
2016-11 |
研討會論文
|
The Reduction of VQ Index Table Size by Matching Side Pixels |
Di, Y. F., Wang, Z. H., Lee, C. F. and Chang, C. C. |
|
2016-10 |
期刊論文
|
A Novel Image Protection Scheme using Bit-plane compression and Secret Sharing Strategies |
Liu, Y., Zhong, Q. and Chang, C. C. |
Journal of the Chinese Institute of Engineers
|
2016-09 |
期刊論文
|
A Novel Pixel Grouping Scheme for AMBTC Based on Particle Swarm Optimization |
Li, Z, Jin, Q., Chang, C. C., Wang, A. and Liu, L. |
Journal of Information Hiding and Multimedia Signal Processing
|
2016-09 |
期刊論文
|
A Robust Image Copy Detection Method Based on Feature Extraction Algorithm |
Wang, Q., Xu, X., Li, L., Lu, J., Chang, C. C. and Wang, Q. |
Journal of Information Hiding and Multimedia Signal Processing
|
2016-09 |
期刊論文
|
Composable Secure Roaming Authentication Protocol for Cloud-assisted Body Sensor Networks |
Xie, Q. Q., Jiang, S. R, Wang, L. M and Chang, C. C. |
International Journal of Network Security
|
2016-09 |
期刊論文
|
Reversible Data Hiding Scheme Based on Histogram Shifting of n-bit Planes |
Liu, L., Chang, C. C. and Wang, A. |
Multimedia Tools and Applications
|
2016-09 |
期刊論文
|
Robust Off-line E-cash Scheme with Recoverability and Anonymity Revocation |
Wang, F., Chang, C. C. and Chang, S. C. |
Security and Communication Networks
|
2016-09 |
期刊論文
|
Text Steganography Based on Ci-poetry Generation Using Markov Chain Model |
Luo, Y. B., Huang, Y. F., Li, F. F. and Chang, C. C. |
KSII Transactions on Internet and Information Systems
|
2016-08 |
期刊論文
|
A CAS-based Authentication Scheme for Mobile Pay-TV Systems |
Wang, F., Chang, C. C. and Wu, H. L. |
International Journal of Communication Systems
|
2016-08 |
期刊論文
|
A Load Balance Strategy of Data Routing Algorithm Using Semantics for Deduplication Clusters |
Jiang, Z., Zhang, Z., Wang, L., Chang, C. C. and Liu, L. |
Journal of Electronic Science and Technology
|
2016-08 |
期刊論文
|
A Reversible Image Authentication Scheme Based on Fragile Watermarking in Discrete Wavelet Transform Domain |
Nguyen, T. S., Chang, C. C. and Yang, X. Q. |
International Journal of Electronics and Communications
|
2016-08 |
研討會論文
|
A Novel Reversible Ternary Embedding Algorithm Based on Modified Full Context Prediction Errors |
Li, L., Chang, C. C., Bharanitharan, K. and Liu, Y. |
|
2016-07 |
期刊論文
|
A Fast Image Coding Algorithm Using Indirect-index Codebook Based on SMVQ |
Xia, B., Wang, A., Chang, C. C. and Liu, L. |
Journal of Electronic Science and Technology
|
2016-07 |
期刊論文
|
A High-Payload, Reversible Data Hiding Scheme Based on Histogram Modification in JPEG Bitstream |
Lin, C. C., Chang, C. C. and Liu, X. L. |
Imaging Science Journal
|
2016-07 |
期刊論文
|
A Novel Three-party Authenticated Key Exchange Protocol Based on Secret Sharing |
Liu, Y., Chang, C. C. and Sun, C. Y. |
Journal of Information Hiding and Multimedia Signal Processing
|
2016-07 |
期刊論文
|
An Effective Mobile Visual Searching Algorithm Based on the Bag-of-Words Method for Furniture Images |
Li, L., Zheng, D., Lu, J., Mao, X. and Chang, C. C. |
Journal of Information Hiding and Multimedia Signal Processing
|
2016-07 |
期刊論文
|
An Image Steganography Scheme Using 3D-Sudoku |
Xia, B., Wang, A., Chang, C. C. and Liu, L. |
Journal of Information Hiding and Multimedia Signal Processing
|
2016-07 |
期刊論文
|
An Integratable Verifiable Secret Sharing Mechanism |
Liu, Y. and Chang, C. C. |
International Journal of Network Security
|
2016-07 |
期刊論文
|
Efficient Pixel Prediction Algorithm for Reversible Data Hiding |
Bharanitharan, K., Chang, C. C., Yang, H. R. and Wang, Z. H. |
International Journal of Network Security
|
2016-06 |
期刊論文
|
An Aesthetic QR Code Solution Based on Error Correction Mechanism |
Li, L., Qiu, J., Lu, J. and Chang, C. C. |
Journal of Systems and Software, Special Issue on JSS 35th Anniversary
|
2016-06 |
期刊論文
|
An Untraceable Biometric-based Multi-server Authenticated Key Agreement Protocol with Revocation |
Chang, C. C. and Nguyen, N. T. |
Wireless Personal Communications
|
2016-05 |
期刊論文
|
A Common Bitmap Block Truncation Coding for Color Images Based on Binary Ant Colony Optimization |
Li, Z., Jin, Q., Chang, C. C., Wang, A. and Liu, L. |
KSII Transactions on Internet and Information Systems
|
2016-05 |
期刊論文
|
A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method |
Li, F., Mao, Q. and Chang, C. C. |
International Journal of Network Security
|
2016-05 |
期刊論文
|
An Efficient Electronic English Auction System with a Secure On-shelf Mechanism and Privacy Preserving |
Zhong, H., Li, S., Cheng, T. F. and Chang, C. C. |
Journal of Electrical and Computer Engineering, Special Issue on Innovations in Communications Security
|
2016-05 |
期刊論文
|
Image Authentication and Self-Recovery Scheme Based on the Rehashing Model |
Lyu, W. L., Chang, C. C. and Wang, F. |
Journal of Information Hiding and Multimedia Signal Processing
|
2016-05 |
期刊論文
|
Security Analysis on "Secure Untraceable Off-line Electronic Cash System" |
Wang, F., Chang, C. C. and Lin, C. L. |
International Journal of Network Security
|
2016-04 |
期刊論文
|
A Novel Data-Hiding and Compression Scheme Based on Block Classification of SMVQ indices |
Chang, C. C., Nguyen, T. S., Lin, M. C. and Lin, C. C. |
Digital Signal Processing
|
2016-04 |
期刊論文
|
An Improved Least-Significant-Bit Substitution Method Using the Modulo Three Strategy |
Xu, W. L., Chang, C. C., Chen, T. S. and Wang, L. M. |
Displays
|
2016-03 |
期刊論文
|
A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks |
Chang, C. C., Hsueh, W. Y. and Cheng, T. F. |
Wireless Personal Communication
|
2016-03 |
期刊論文
|
A Highly Efficient and Secure Electronic Cash System Based on Secure Sharing in Cloud Environment |
Chang, C. C., Chen, W. Y. and Chang, S. C. |
Security and Communication Networks
|
2016-03 |
期刊論文
|
A Novel Fragile Watermark-based Image Authentication Scheme for AMBTC-compressed Images |
Zhong, H., Liu, H. Q., Chang, C. C. and Lin, C. C. |
Journal of Information Hiding and Multimedia Signal Processing
|
2016-03 |
期刊論文
|
A Strong RSA-based and Certificateless-based Signature Scheme |
Chang, C. C., Sun, C. Y. and Chang, S. C. |
International Journal of Network Security
|
2016-03 |
期刊論文
|
Novel Occlusion Object Removal with Inter-frame Editing and Texture Synthesis |
Qin, C., Ren, H., Chang, C. C. and Chen, Q. |
Journal of Information Hiding and Multimedia Signal Processing
|
2016-03 |
期刊論文
|
Provably Secure and Efficient Three-Factor Authenticated Key Agreement Scheme with Untraceability |
Nguyen, N. T., Le, H. D. and Chang, C. C. |
International Journal of Network Security
|
2016-03 |
期刊論文
|
Very Efficient Variable-length Codes for the Lossless Compression of VQ Indices |
Chang, C. C., Lu, T. C., Horng, G. and Huang, Y. H. |
Multimedia Tools and Applications
|
2016-02 |
期刊論文
|
A Magic Cube Based Information Hiding Scheme of Large Payload |
Wu, Q., Zhu, C., Li, J. J., Chang, C. C. and Wang, Z. H. |
Journal of Information Security and Applications
|
2016-01 |
期刊論文
|
A High-Quality Reversible Image Authentication Scheme Based on Adaptive PEE for Digital Images |
Nguyen, T. S., Chang, C. C. and Shih, T. H. |
KSII Transactions on Internet and Information Systems
|
2016-01 |
期刊論文
|
A New Distortion-Free Data Embedding Scheme for High-Dynamic Range Images |
Chang, C. C., Nguyen, T. S. and Lin, C. C. |
Multimedia Tools and Applications
|
2016-01 |
期刊論文
|
A Practical Lottery Using Oblivious Transfer |
Liu, Y. N., Cheng, C., Jiang, T. and Chang, C. C. |
International Journal of Communication Systems
|
2016-01 |
期刊論文
|
A Provably Secure, Efficient and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks |
Chang, C. C. and Le, H. D. |
IEEE Transactions on Wireless Communications
|
2016-01 |
期刊論文
|
A Robust and Efficient Dynamic Identity Based Multi-Server Authentication Scheme Using Smart Cards |
Chang, C. C., Cheng, T. F. and Hsueh, W. Y. |
International Journal of Communication Systems
|
2016-01 |
期刊論文
|
A Secure Authentication Scheme with Provable Correctness for Pay-TV Systems |
Wu, H. L., Chang, C. C. and Sun, C. Y. |
Security and Communication Networks
|
2016-01 |
期刊論文
|
An Image Compression Method Based on Block Truncation Coding and Linear Regression |
Lyu, W. L. and Chang, C. C. |
Journal of Information Hiding and Multimedia Signal Processing
|
2016-01 |
期刊論文
|
High Capacity Reversible Data Hiding Scheme for Encrypted Images |
Nguyen, T. S., Chang, C. C.* and Chang, W. C. |
Signal Processing: Image Communication
|
2016-01 |
期刊論文
|
Reversible Data Hiding Based on Geometric Structure of Pixel Groups |
Wang, Z. H., Zhuang, X., Chang, C. C., Qin, C. and Yan, Z. |
International Journal of Network Security
|
2016-01 |
期刊論文
|
Secure Multi-group Data Hiding Based on GEMD Map |
Kuo, W. C., Chang, S. Y., Wang, C. C. and Chang, C. C. |
Multimedia Tools and Applications
|
2016-01 |
期刊論文
|
Secure and Efficient Identity-Based Proxy Multi-Signature Using Cubic Residues |
Wang, F., Chang, C. C., Lin, C. L. and Chang, S. C. |
International Journal of Network Security
|
2016-01 |
期刊論文
|
Zero-watermarking for Face Image Protection in Database |
Le, H. D., Xu, X., Wang, Q., Li, L. and Chang, C. C. |
Journal of Internet Technology
|
2015-12 |
期刊論文
|
An Efficient and Secure Smart Card Based Password Authentication Scheme |
Liu, Y., Chang, C. C. and Chang, S. C. |
International Journal of Network Security
|
2015-12 |
期刊論文
|
Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage |
Tian, H., Chen, Y., Chang, C. C., Huang, Y. and Chen, Y. H. |
IEEE Transactions on Service Computing
|
2015-12 |
期刊論文
|
Extending the Capture Volume of an Iris Recognition System Using Wavefront Coding and Super-Resolution |
Hsieh, S. H., Li, Y. H., Tien, C. H. and Chang, C. C. |
IEEE Transactions on Cybernetics
|
2015-12 |
期刊論文
|
Multi-Round Dynamic Swap Optimization for Table Based Steganograph |
Mao, Q., Bharanitharan, K. and Chang, C. C. |
IET Image Processing
|
2015-12 |
期刊論文
|
Notes on “Secure Authentication Scheme for IoT and Cloud Servers” |
Chang, C. C., Wu, H. L. and Sun, C. Y. |
Pervasive and Mobile Computing
|
2015-12 |
期刊論文
|
Sharing a Large Secret Image Using Meaningful Shadows Based on VQ and Inpainting |
Wang, Z. H., Chen, K. N., Chang, C. C. and Qin, C. |
KSII Transactions on Internet and Information Systems
|
2015-12 |
期刊論文
|
Steganalysis of Analysis-by-synthesis Speech Exploiting Pulse-position Distribution Characteristics |
Tian, H., Wu, Y., Chang, C. C., Huang, Y., Liu, J., Wang, T., Chen, Y. and Cai, Y. |
Security and Communication Networks
|
2015-12 |
期刊論文
|
The Credit Card Visual Authentication Scheme Based on GF(2^8) Field |
Wang, F., Chang, C. C.and Lyu, W. L. |
Multimedia Tools and Applications
|
2015-11 |
期刊論文
|
A Multi-Purpose Key Agreement Scheme in Ubiquitous Computing Environments |
Chang, C. C., Wu, C. C. and Lin, I. C. |
Mobile Information Systems
|
2015-11 |
期刊論文
|
A Novel Reversible Data Hiding Scheme Based on Difference-Histogram Modification and Optimal EMD Algorithm |
Nguyen, T. S., Chang, C. C. and Huynh, N. T. |
Journal of Visual Communication and Image Representation
|
2015-11 |
期刊論文
|
An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks |
Chang, C. C., Yang, J. H. and Wu, Y. C. |
International Journal of Network Security
|
2015-11 |
期刊論文
|
Scanned Binary Image Watermarking Based On Additive Model and Sampling |
Hou, Q., Dai, J., Li, L., Lu, J. and Chang, C. C. |
Multimedia Tools and Applications
|
2015-10 |
期刊論文
|
A Reversible Data Hiding Scheme Based on the Sudoku Technique |
Nguyen, T. S. and Chang, C. C. |
Displays
|
2015-10 |
期刊論文
|
Improved Wet Paper Code Using Simplified Hamming Parity-Check Matrix and Its Application in Voice-over-IP Steganography |
Tian, H., Qin, J., Chang, C. C., Huang, Y. Liu, J. and Chen, Y. H. |
Journal of Internet Technology
|
2015-10 |
期刊論文
|
Reversible Data Hiding with Oriented and Minimized Distortions Using Cascading Trellis Coding |
Mao, Q., Li, F. and Chang, C. C. |
Information Sciences
|
2015-09 |
期刊論文
|
A Grouped-scalable Secret Image Sharing Scheme |
Liu, W., Wang, A., Chang, C. C., Li, Z. and Liu, L. |
Multimedia Tools and Applications
|
2015-09 |
期刊論文
|
A Meaningful Scheme for Sharing Secret Images Using Mosaic Images |
Zhai, S., Li, F., Chang, C. C. and Mao, Q. |
International Journal of Network Security
|
2015-09 |
期刊論文
|
Adjustment Hiding Method Based on Exploiting Modification Direction |
Lee, C. F., Pai, P. Y., Chang, C. C. and Liu, C. M. |
International Journal of Network Security
|
2015-09 |
期刊論文
|
Dual-Histograms Reversible Data Hiding Capable of Avoiding Underflow/Overflow Problems |
Chang, C. C., Lu, T. C., Horng, G., Huang, Y. H. and Hsu, T. J. |
Journal of Information Hiding and Multimedia Signal Processing
|
2015-09 |
期刊論文
|
Dynamic Selective Information Hiding Based on Search Order Coding with Low Bit Rate |
Chang, C. C., Lin, M. C. and Cheng, T. F. |
The Imaging Science Journal
|
2015-09 |
期刊論文
|
Lottery Protocol Using Oblivious Transfer Based on ECC |
Liu, Y. N., Liu, G. and Chang, C. C. |
Journal of Internet Technology
|
2015-09 |
研討會論文
|
A Modified IMM-CSRF Algorithm for Passive Tracking of Maneuvering Targets |
Li, J., Meng, L. Wang, Z., Du, J., Fu, X. and Chang, C. C. |
|
2015-09 |
研討會論文
|
Enhancement of the Quality of Images Based on Multiple Threshold Segmentation and Adaptive Gamma Correction |
Li, J., Wu, N. Wang, Z., Du, J., Fu, X. and Chang, C. C. |
|
2015-08 |
研討會論文
|
A Reversible Data Hiding Scheme Using Ordered Cluster-based VQ Index Tables for Complex Images |
Bai, J., Chang, C. C. and Zhu, C. |
|
2015-07 |
期刊論文
|
A Generalization of Fully Exploiting Modification Directions Data Hiding Scheme |
Kuo, W. C., Kao, M. C. and Chang, C. C. |
Journal of Information Hiding and Multimedia Signal Processing
|
2015-07 |
期刊論文
|
A Novel Information Hiding Scheme Based on Line Segments |
Wang, Z. H., Wu, Q., Luo, Z. C. and Chang, C. C. |
Journal of Information Hiding and Multimedia Signal Processing
|
2015-07 |
期刊論文
|
A Novel Untraceable Authentication Scheme for Mobile Roaming in GLOMONET |
Le, H. D., Chang, C. C. and Chou, Y. C. |
International Journal of Network Security
|
2015-07 |
期刊論文
|
A Study of Relationship between RSA Public Key Cryptosystem and Goldbach’s Conjecture Properties |
Liu, C., Chang, C. C., Wu, Z. P. and Ye, S. L. |
International Journal of Network Security
|
2015-07 |
期刊論文
|
An Outlier Detection Method for Feature Point Matching Problem |
Tang, J., Jiang, B., Luo, B. and Chang, C. C. |
An Outlier Detection Method for Feature Point Matching Problem
|
2015-07 |
期刊論文
|
Embedding Information in Chinese Calligraphy Images |
Wang, Z. H., Chang, C. C., Huang, Y. H., Yang, H. R. and Horng, G. |
Journal of Computers
|
2015-07 |
期刊論文
|
Hybrid Color Image Steganography Method Used for Copyright Protection and Content Authentication |
Lyu, W. L., Chang, C. C., Chou, Y. C. and Lin, C. C. |
Journal of Information Hiding and Multimedia Signal Processing
|
2015-07 |
期刊論文
|
Reversible Data Hiding Scheme Based on Exploiting Modification Direction with Two Steganographic Images |
Qin, C., Chang, C. C. and Hsu, T. J. |
Multimedia Tools and Applications
|
2015-07 |
期刊論文
|
Reversible Data Hiding for High Quality Using Secret Data Transformation Strategy |
Wang, Z. H., Huang, Y. H., Chang, C. C., Yang, H. R. |
Journal of Information Hiding and Multimedia Signal Processing
|
2015-07 |
期刊論文
|
Very Effective Multi-Layer Reversible Embedding Method Using Low Distortion Modification |
Huang, Y. H., Chang, C. C., Lin, M. C. and Horng, G. |
Journal of Information Hiding and Multimedia Signal Processing
|
2015-07 |
研討會論文
|
Reversible Data Hiding for VQ Indices Using XOR Operation and SOC codes |
Chang, C. C., Huang, Y. H., and Chang, W. C. |
|
2015-05 |
期刊論文
|
A Novel Verifiable Secret Sharing Mechanism Using Theory of Numbers and a Method for Sharing Secrets |
Liu, Y., Harn, L. and Chang, C. C. |
International Journal of Communication Systems
|
2015-05 |
期刊論文
|
A Provably Secure Smart-card-based Authenticated Group Key Exchange Protocol |
Chang, C. C. and Le, H. D. |
Security and Communication Networks
|
2015-05 |
期刊論文
|
A Secure and Efficient Scheme for Digital Gift Certificates |
Liu, Y., Chang, C. C. and Sun, C. Y. |
Journal of Information Hiding and Multimedia Signal Processing
|
2015-05 |
期刊論文
|
An Image-Based Key Agreement Protocol Using the Morphing Technique |
Mao, Q., Chang, C. C., Harn, L. and Chang, S. C. |
Multimedia Tools and Applications
|
2015-05 |
期刊論文
|
Color PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method |
Lyu, W. L., Chang, C. C. and Wang, F. |
Journal of Information Hiding and Multimedia Signal Processing
|
2015-05 |
期刊論文
|
Digital Image Scrambling Algorithm Based on Chaotic Sequence and Decomposition and Recombination of Pixel Values |
Wang, D., Chang, C. C., Liu, Y. and Song, G. |
International Journal of Network Security
|
2015-05 |
期刊論文
|
Multiple Watermark Scheme based on DWT-DCT Quantization for Medical Images |
Lu, J., Wang, M., Dai, J., Huang, Q., Li, L. and Chang, C. C. |
Journal of Information Hiding and Multimedia Signal Processing
|
2015-05 |
期刊論文
|
Preserving User-Friendly Shadow and High-Contrast Quality for Multiple Visual Secret Sharing Technique |
Lee, J. S., Chang, C. C., Huynh, N. T. and Tsai, H. Y. |
Digital Signal Processing
|
2015-05 |
期刊論文
|
Reversible Data Hiding Exploiting High-Correlation Regulation for High-Quality Images |
Wang, X. T., Li, M. C., Wang, S. T. and Chang, C. C. |
Security and Communication Networks
|
2015-05 |
期刊論文
|
Tree-Structured Vector Quantization with Flexible Multipath Searching Method Based on Side Match Prediction |
Liu, L., Wang, A. H., Chang, C. C., Jin, Q. and Xia, B. B. |
Journal of Information Hiding and Multimedia Signal Processing
|
2015-05 |
研討會論文
|
Secure Electronic Coupons |
Chang, C. C., Lin, I. C., and Chi, Y. L. |
|
2015-04 |
期刊論文
|
A Reversible Compression Code Hiding Using SOC and SMVQ Indices |
Chang, C. C., Nguyen, T. S. and Lin, C. C. |
Information Sciences
|
2015-04 |
期刊論文
|
Quadri-Directional Searching Algorithm for Secret Image Sharing Using Meaningful Shadows |
Huynh, N. T., Bharanitharan, K. and Chang, C. C. |
Journal of Visual Communication and Image Representation
|
2015-04 |
期刊論文
|
Reversible Data Embedding for Vector Quantization Compressed Images Using Search-Order Coding and Index Parity Matching |
Qin, C., Chang, C. C., Horng, G., Huang, Y. H. and Chen, Y. C. |
Security and Communication Networks
|
2015-04 |
期刊論文
|
Second-Order Steganographic Method Based on Adaptive Reference Matrix |
Yin, Z. X., Chang, C. C., Xu, Q. and Luo, B. |
IET Image Processing
|
2015-03 |
期刊論文
|
A Critique of a Lightweight Identity Authentication Protocol for Vehicular Networks |
Jia, X. D., Chang, Y. F., Chang, C. C. and Wang, L. M. |
Journal of Information Hiding and Multimedia Signal Processing
|
2015-03 |
期刊論文
|
A Dependable Storage Service System in Cloud Environment |
Chang, C. C., Sun, C. Y. and Cheng, T. F. |
Security and Communication Networks
|
2015-03 |
期刊論文
|
A Lossy Secret Color Image Sharing Scheme with Small Shadows and Error-resilient Capability |
Liu, L., Wang, A. H., Chang, C. C., li, Z. H. and Liu, J. B. |
Journal of Information Hiding and Multimedia Signal Processing
|
2015-03 |
期刊論文
|
A Novel Threshold Conference-Key Agreement Protocol Based on Generalized Chinese Remainder Theorem |
Guo, C. and Chang, C. C. |
International Journal of Network Security
|
2015-03 |
期刊論文
|
A Robust Image Encryption Scheme Based on RSA and Secret Sharing for Cloud Storage Systems |
Wu, H. L. and Chang, C. C. |
Journal of Information Hiding and Multimedia Signal Processing
|
2015-03 |
期刊論文
|
An Adaptive Reversible Steganographic Scheme Based on the Just Noticeable Distortion |
Qin, C., Chang, C. C. and Lin C. C. |
Multimedia Tools and Applications
|
2015-03 |
期刊論文
|
Group Authentication and Group Key Distribution for Ad Hoc Networks |
Wang, F., Chang, C. C. and Chou, Y. C. |
International Journal of Network Security
|
2015-03 |
期刊論文
|
Novel and Practical Scheme based on Secret Sharing for Laptop Data Protection |
Chang, C. C., Chou, Y. C. and Sun, C. Y. |
IET Information Security
|
2015-02 |
期刊論文
|
A Divide-conquer Heuristic Search Algorithm for Cutting Surplus Steel Plates of Steel & Iron Companies |
Li, Z. Q., Huang, R., Peng, B. L., Chang, C. C. and Wang, Q. Z. |
Inter. Journal of Innovative Computing, Info. and Control
|
2015-01 |
期刊論文
|
A Group Key Distribution System Based on the Generalized Aryabhata Remainder Theorem for Enterprise Digital Rights Management |
Liu, Y., Chang, C. C. and Chang, S. C. |
Journal of Information Hiding and Multimedia Signal Processing
|
2015-01 |
期刊論文
|
An Adjustable and Reversible Data Hiding Method Based on Multiple-base Notational System without Location Map |
Lee, C. F., Chang, C. C., Liu, C. M. and Pai, P. Y. |
Journal of Information Hiding and Multimedia Signal Processing
|
2015-01 |
期刊論文
|
An H.264/AVC HDTV Watermarking Algorithm Robust to Camcorder Recording |
Li, Li, Dong, Z., Lu, J., Dai, J., Huang, Q., Chang, C. C. and Wu, T. |
Journal of Visual Communication and Image Representation
|
2015-01 |
期刊論文
|
Ciphertext-Auditable Identity-Based Encryptiong |
Lin, C. L., Li, Y., Lv, K. and Chang, C. C. |
International Journal of Network Security
|
2015-01 |
期刊論文
|
Compressing Vector Quantization Index Table Using Side Match State Codebook |
Chang, C. C., Lin, C. C. and Lin, C. Y. |
Journal of Information Hiding and Multimedia Signal Processing
|
2014-12 |
期刊論文
|
A New Ultralightweight RFID Protocol for Low-Cost Tags: R2AP |
Zhuang, X., Zhu, Y. and Chang, C. C. |
Wireless Personal Communications
|
2014-12 |
期刊論文
|
A Reversible Data Hiding Scheme for SMVQ Indices |
Chang, C. C. and Nguyen, T. S. |
Informatica
|
2014-12 |
研討會論文
|
A Virtual Primary Key for Watermarking Textual Relational Databases |
Chang, C. C., Nguyen, T. S. and Lin, C. C. |
|
2014-11 |
期刊論文
|
A New Pixels Flipping Method for Huge Watermarking Capacity of the Invoice Font Image |
Li, L., Hou, Q., Lu, J., Xu, Q., Dai, J., Mao, X. and Chang, C. C. |
The Scientific World Journal, Special Issue on Recent Advances in Machine Learning Theory and Applications
|
2014-11 |
期刊論文
|
An Adaptable (n, n) Secret Image Sharing Mechanism Based on Boolean Operation |
Wang, Z. H., Jin, H., Wang, X. and Chang, C. C. |
International Journal of Network Security
|
2014-11 |
期刊論文
|
An Authenticated Group Key Distribution Mechanism Using Theory of Numbers |
Liu, Y., Harn, L. and Chang, C. C. |
International Journal of Communication Systems
|
2014-11 |
期刊論文
|
Simulatable and Secure Certificate-based Threshold Signature without Pairings |
Wang, F., Chang, C. C. and Harn, L. |
Security and Communication Networks
|
2014-11 |
期刊論文
|
The Design of Dynamic Access Control for Hierarchical Sensor Networks with Key-lock-pair Mechanism |
Chen, X., Liu, Y., Chang, C. C. and Lin, C. L. |
International Journal of Ad Hoc and Ubiquitous Computing
|
2014-10 |
期刊論文
|
A Database Encryption Scheme Based on the Generalized Aryabhata Remainder Theorem |
Liu, Y. and Chang, C. C. |
Journal of Information Hiding and Multimedia Signal Processing
|
2014-10 |
期刊論文
|
A Novel (n, t, n) Secret Image Sharing Scheme without a Trusted Third Party |
Guo, C., Chang, C. C. and Qin, C. |
Multimedia Tools and Applications
|
2014-10 |
期刊論文
|
A Novel Chicken Chorioallantoic Membrane Image Vessel Detection Detector Based on Statistic Color Distribution |
Chang, C. C., Pai, P. Y., Tsai, M. H. and Chan, Y. K. |
Journal of Information Hiding and Multimedia Signal Processing
|
2014-10 |
期刊論文
|
A Secure Broadcasting Method Based on the Generalized Aryabhata Remainder Theorem |
Liu, Y. and Chang, C. C. |
Journal of Information Hiding and Multimedia Signal Processing
|
2014-10 |
期刊論文
|
A Secure Diverse Ticket-sale System in a Distributed Cloud Environment |
Chang, C. C. and Cheng, T. F. |
The Computer Journal
|
2014-10 |
期刊論文
|
An Authentication and Key Agreement Protocol for Satellite Communications |
Chang, C. C., Cheng, T. F. and Wu, H. L. |
International Journal of Communication Systems
|
2014-10 |
期刊論文
|
Efficient Searching Strategy for Secret Image Sharing with Meaningful Shadows |
Chang, C. C., Huynh, N. T. and Chung, T. F. |
International Journal of Machine Learning and Computing
|
2014-10 |
期刊論文
|
Image Watermarking Scheme Based on Scale-Invariant Feature Transform |
Lyu, W. L., Chang, C. C., Nguyen, T. S. and Lin, C. C. |
KSII Transactions on Internet and Information Systems
|
2014-10 |
期刊論文
|
Practical Secure and High Efficient Authentication Scheme in Global Mobility Networks |
Chang, C. C., Sun, C. Y. and Chang, S. C. |
Journal of Internet Technology
|
2014-10 |
期刊論文
|
Watermarking Marbled Image Based on Linear Enhancement Hologram |
Dai, J., Liu, Y., Lu, J., Xu, J., Li, L. and Chang, C. C. |
Journal of Information Hiding and Multimedia Signal Processing
|
2014-10 |
研討會論文
|
A Blind Robust Reversible Watermark Scheme for Textual Relational Databases with Virtual Primary Key |
Chang, C. C., Nguyen, T. S. and Lin, C. C. |
|
2014-10 |
研討會論文
|
Zero-watermarking Based on Improved ORB Features Against Print-cam Attack |
Lu, J., Huang, Q., Wang, M., Li, L., Dai, J. and Chang, C. C. |
|
2014-09 |
期刊論文
|
A Proxy User Authentication Protocol Using Source-Based Image Morphing |
Mao, Q., Bharanitharan, K. and Chang, C. C. |
The Computer Journal
|
2014-09 |
期刊論文
|
High Capacity Reversible Hiding Scheme Based on Interpolation, Difference Expansion, and Histogram Shifting |
Lu, T. C., Chang, C. C. and Huang, Y. H. |
Multimedia Tools and Applications
|
2014-08 |
期刊論文
|
A Fast and Secure Scheme for Data Outsourcing in the Cloud |
Liu, Y., Wu, H. L. and Chang, C. C. |
KSII Transactions on Internet and Information Systems
|
2014-08 |
期刊論文
|
Lossless VQ Indices Compression Based on the High Correlation of Adjacent Image Blocks |
Wang, Z. H., Yang, H. R., Chang, C. C., Horng, G. and Huang, Y. H. |
KSII Transactions on Internet and Information Systems
|
2014-08 |
研討會論文
|
Applying Histogram Modification to Embed Secret Message in AMBTC |
Chang, C. C. Wu, H. L. and Chung, T. F. |
|
2014-08 |
研討會論文
|
Polynomial-based Secret Sharing Scheme Based on the Absolute Moment Block Truncation Coding Technique |
Chang, C. C. and Sun, C. Y. |
|
2014-07 |
期刊論文
|
A Data Lossless Message Hiding Scheme without Extra Information |
Wang, Z. H., Mao, Q. and Chang, C. C. |
Journal of Internet Technology
|
2014-07 |
期刊論文
|
A Novel Lossless Steganographic Scheme for Data Hiding in Traditional Chinese Text Files |
Qin, C., Chang, C. C. and Wang, S. T. |
Journal of Information Hiding and Multimedia Signal Processing
|
2014-07 |
期刊論文
|
Comments and Proofs to Published Paper - A Novel Reversible Robust Watermarking Algorithm Based on a Chaotic System |
Lin, C. H., Tharan, K.B. and Chang, C. C. |
International Journal of Network Security
|
2014-07 |
期刊論文
|
Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques |
Chang, C. C., Chen, Y. H. and Chuang, L. Y. |
Journal of Information Hiding and Multimedia Signal Processing
|
2014-07 |
期刊論文
|
Notes on"Polynomial-based Key Management for Secure Intra-group and Inter-group Communication" |
Chang, C. C., Harn, L. and Cheng, T. F. |
International Journal of Network Security
|
2014-07 |
期刊論文
|
Reversible Data Hiding Scheme for VQ Indices Based on Absolute Difference Trees |
Chang, C. C., Nguyen, T. S., Lin, C. C. |
KSII Transactions on Internet and Information Systems
|
2014-06 |
期刊論文
|
A DNA-based Data Hiding Technique with Low Modification Rates |
Huang, Y. H., Chang, C. C. and Wu, C. Y. |
Multimedia Tools and Applications
|
2014-06 |
期刊論文
|
A Tamper-Detection Scheme for BTC-Compressed Images with High-Quality Images |
Nguyen, T. S., Chang, C. C. and Chung, T. F. |
KSII Transactions on Internet and Information Systems
|
2014-06 |
期刊論文
|
Adaptive Lossless Data Hiding Scheme for SMVQ-Compressed Images using SOC Coding |
Nguyen, T. S., Chang, C. C., Lin, M. C. |
Smart Computing Review
|
2014-06 |
期刊論文
|
Lossless and Unlimited Multi-image Sharing Based on Chinese Remainder Theorem and Lagrange Interpolation |
Chang, C. C., Huynh, N. T. and Le, H. D. |
Signal Processing
|
2014-06 |
期刊論文
|
Verifiable Secret Sharing Based on the Chinese Remainder Theorem |
Harn, L, Miao, F. and Chang, C. C. |
Security and Communication Networks
|
2014-05 |
期刊論文
|
A Reversible Steganography Suitable for Embedding Small Amounts of Data |
Mao, Q., Chang, C. C. and Chung, T. F. |
International Journal of Network Security
|
2014-05 |
期刊論文
|
A Simple Password Authentication Scheme Based on Geometric Hashing Function |
Zhuang, X., Chang, C. C., Wang, Z. H. and Zhu, Y. |
International Journal of Network Security
|
2014-05 |
期刊論文
|
A User-Friendly and Authenticatable Secret Image Sharing Scheme |
Lee, J. S., Tsai, H. Y. and Chang, C. C. |
Journal of Internet Technology
|
2014-05 |
期刊論文
|
Generalized Secret Sharing with Linear Hierarchical Secrets |
Chen, X., Liu, Y., Chang, C. C. and Guo, C. |
International Journal of Network Security
|
2014-05 |
期刊論文
|
Reversible Image Hiding for High Image Quality Based on Histogram Shifting and Local Complexity |
Chang, C. C., Nguyen, T. S. and Lin, C. C. |
International Journal of Network Security
|
2014-05 |
期刊論文
|
Reversible Image Hiding for High Image Quality based on Histogram Shifting and Local Complexity |
Chang, C. C., Nguyen, T. S. and Lin, C. C. |
International Journal of Network and Security
|
2014-04 |
期刊論文
|
(k, n)-Image Reversible Data Hiding |
Horng, G., Huang, Y. H., Chang, C. C. and Liu, Y. |
Journal of Information Hiding and Multimedia Signal Processing
|
2014-04 |
期刊論文
|
A Novel SVD-based watermarking Scheme for Protecting Rightful Ownership of Digital Images |
Lin, C. C., Chang, C. C. and Chen, Y. H. |
Journal of Information Hiding and Multimedia Signal Processing
|
2014-03 |
期刊論文
|
A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting |
Qin, C., Chang, C. C. and Chiu, Y. P. |
IEEE Transactions on Image Processing
|
2014-02 |
期刊論文
|
A High Capacity Data Hiding Scheme for Binary Images Based on Block Patterns |
Wang, C. C., Lin, C. C., Chang, C. C., Jan, J. K. and Chang, Y. F. |
Journal of Systems and Software
|
2014-01 |
期刊論文
|
A Novel Real-time and Progressive Secret Image Sharing with Flexible Shadows Based on Compressive Sensing |
Liu, L., Wang, A., Chang, C. C. and Li, Z. |
Signal Processing: Image Communication
|
2014-01 |
期刊論文
|
A Novel SD Card Oriented Authentication Protocol with Anonymity for Wireless Roaming Service |
Cheng, Z. Y., Liu, Y., Chang, C. C. and Chang, C. H. |
Information-An International Interdisciplinary Journal
|
2014-01 |
期刊論文
|
A Provably Secure t-out-of-n Oblivious Transfer Mechanism Based on Blind Signature |
Chang, C. C. and Cheng, T. F. |
Journal of Information Hiding and Multimedia Signal Processing
|
2014-01 |
期刊論文
|
A Reliable Real-time Multicast Authentication Protocol with Provable Accuracy |
Chang C. C. and Cheng, T. F. |
Fundamenta Informaticae
|
2014-01 |
期刊論文
|
An Access Control Mechanism Based on the Generalized Aryabhata Remainder Theorem |
Liu, Y., Chang, C. C. and Chang, S. C. |
International Journal of Network Security
|
2014-01 |
期刊論文
|
An Authenticated Group Key Distribution Protocol Based on the Generalized Chinese Remainder Theorem |
Guo, C. and Chang, C. C. |
International Journal of Communication Systems
|
2014-01 |
期刊論文
|
Design and Analysis of Chameleon Hashing Based Handover Authentication Scheme for Wireless Networks |
Chang, C. C., Huang, Y. C. and Tsai, H. C. |
Journal of Information Hiding and Multimedia Signal Processing
|
2014-01 |
期刊論文
|
Distortion Free Progressive BTC based Secret Image Sharing |
Chang, C. C., Chiu, Y. P., Lin, C. C. and Chen, Y. H. |
Journal of Information Hiding and Multimedia Signal Processing
|
2014-01 |
期刊論文
|
Efficient and Meaningful Multi-secret Image Sharing Based on Block Imitation |
Wang, Z. H., Segalla Pizzolatti, M. and Chang, C. C. |
Journal of Information Hiding and Multimedia Signal Processing
|
2013-12 |
研討會論文
|
A High Payload Data Embedding Scheme Using Dual Stego-images with Reversibility |
Chang, C. C., Lu, T. C., Horng, G., Huang, Y. H. and Hsu, Y. M. |
|
2013-12 |
研討會論文
|
A High-Capacity Reversible Secret Sharing Scheme Using Two Steganographic Images |
Chang, C. C., Lyu, W. L. and Lin, C. C. |
|
2013-12 |
研討會論文
|
A Novel Watermark Scheme for Calligraphy Images |
Wang, Z. H., Chang, C. C., Huang, Y. H., Yang, H. R. and Horng, G. |
|
2013-11 |
期刊論文
|
A Group-oriented Digital Right Management Scheme with Reliable and Flexible Access Policies |
Chang, C. C. and Yang, J. H. |
International Journal of Network Security
|
2013-11 |
期刊論文
|
A High-performance Reversible Data-hiding Scheme for LZW Codes |
Wang, Z. H., Yang, H. R., Cheng, T. F. and Chang, C. C. |
Journal of Systems and Software
|
2013-11 |
期刊論文
|
An Efficient Smart Card Based Authentication Scheme Using Image Encryption |
Chang, C. C., Wu, H. L., Wang, Z. H. and Mao, Q. |
Journal of Information Science and Engineering
|
2013-11 |
期刊論文
|
Effective Fragile Watermarking for Image Authentication with High-quality Recovery Capability |
Qin, C., Chang, C. C. and Hsu, T. J. |
KSII Transactions on Internet and Information Systems
|
2013-10 |
期刊論文
|
An Indicator Elimination Method for Side-match Vector Quantization |
Chang, C. C., Chou, Y. C. and Lin, C. Y. |
Journal of Information Hiding and Multimedia Signal Processing
|
2013-10 |
研討會論文
|
A Two-staged Multi-level Reversible Data Hiding Exploiting Lagrange Interpolation |
Lee, C. F., Chang, C. C. and Gao, C. Y. |
|
2013-09 |
期刊論文
|
Efficient Reversible Data Hiding for VQ-Compressed Images Based on Index Mapping Mechanism |
Qin, C., Chang, C. C. and Chen, Y. C. |
Signal Processing
|
2013-09 |
期刊論文
|
Provably Secure Conference Key Distribution Mechanism Preserving the Forward and Backward Secrecy |
Lee, J. S., Chang, C. C. and Wei, K. J. |
International Journal of Network Security
|
2013-08 |
期刊論文
|
A Blind Reversible Robust Watermarking Scheme for Relational Databases |
Chang, C. C., Nguyen, T. S. and Lin, C. C. |
The Scientific World Journal
|
2013-08 |
期刊論文
|
A Novel Reversible Data Hiding Scheme for VQ-Compressed Images Using Index Set Construction Strategy |
Qin, C., Chang, C. C. and Chen, Y. C. |
KSII Transactions on Internet and Information Systems
|
2013-08 |
期刊論文
|
A Practical Secure and Efficient Enterprise Digital Rights Management Mechanism Suitable for Mobile Environment |
Chang, C. C., Chang, S. C. and Yang, J. H. |
Security and Communications Networks
|
2013-08 |
期刊論文
|
Edge Directed Automatic Control Point Selection Algorithm for Image Morphing |
Mao, Q., Bharanitharan, K. and Chang, C. C. |
IETE Technical Review
|
2013-08 |
期刊論文
|
ElGamal-Based Weighted Threshold Signature Scheme |
Guo, C. and Chang, C. C. |
Information-An International Interdisciplinary Journal
|
2013-08 |
期刊論文
|
Two Step Regionally Focused Algorithm for H.264/AVC Encoder |
Bharanitharan, K., Chen, B. W. and Chang, C. C. |
IETE Technical Review
|
2013-07 |
期刊論文
|
A DCT-based Dual Watermark Scheme for Image Authentication and Recovery |
Chang, C. C., Lin, C. C. and Liao, L. T. |
Advance in Information Science and Service Science
|
2013-07 |
期刊論文
|
A Digital Rights Management Mechanism for Mobile Social Platforms |
Chang, C. C., Chang, S. C. and Yang, J. H. |
ICIC Express Letters
|
2013-07 |
期刊論文
|
A Novel Biometric-based Remote User Authentication Scheme Using Quadratic Residues |
Cheng, Z. Y., Liu, Y. Chang, C. C. and Liu, C. X. |
International Journal of Information and Electronics Engineering
|
2013-07 |
期刊論文
|
An Anonymous Multi-Receiver Encryption Based on RSA |
Harn, L., Chang, C. C. and Wu, H. L. |
International Journal of Network Security
|
2013-07 |
期刊論文
|
An Inpainting-Assisted Reversible Steganographic Scheme Using Histogram Shifting Mechanism |
Qin, C., Chang, C. C., Huang, Y. H. and Liao, L. T. |
IEEE Transactions on Circuits and Systems for Video Technology
|
2013-07 |
期刊論文
|
Novel Untraceable Authenticated Key Agreement Protocol Suitable for Mobile Communication |
Chang, C. C., Le, H. D. and Chang, C. H. |
Wireless Personal Communications
|
2013-07 |
期刊論文
|
Provably Secure Three Party Encrypted Key Exchange Scheme with Explicit Authentication |
Tsai, H. C. and Chang, C. C. |
Information Sciences
|
2013-07 |
期刊論文
|
Security Analysis of a new Ultra-lightweight RFID Protocol and Its Improvement |
Zhuang, X., Wang, Z. H., Chang, C. C. and Zhu, Y. |
Journal of Information Hiding and Multimedia Signal Processing
|
2013-06 |
期刊論文
|
An Image Encryption Scheme Based on Concatenated Torus Automorphisms |
Mao, Q., Chang, C. C. and Wu, H. L. |
KSII Transactions on Internet and Information Systems
|
2013-06 |
期刊論文
|
Chaotic Maps-Based Password-Authenticated Key Agreement Using Smart Cards |
Guo, C. and Chang, C. C. |
Communications in Nonlinear Science and Numerical Simulation
|
2013-05 |
期刊論文
|
A Residual Number System Oriented Group Key Distribution Mechanism |
Liu, Y., Chang, C. C. and Chang, S. C. |
International Journal of Information Processing and Management
|
2013-05 |
期刊論文
|
An Efficient Oblivious Transfer Protocol Using Residue Number System |
Liu, Y., Chang, C. C. and Chang, S. C. |
International Journal of Network Security
|
2013-05 |
期刊論文
|
Analyzing and Removing SureSign Watermark |
Li, L., Ma, Y. Y., Chang, C. C. and Lu, J. F. |
Signal Processing
|
2013-05 |
研討會論文
|
Mathematical Analysis of Extended Matrix Coding for Steganography |
Fan, L., Gao, T. and Chang, C. C. |
|
2013-04 |
期刊論文
|
A Lossless Information Hiding Scheme with Large Payload Using Prediction Error Composition |
Wang, Z. H., Chen, K. N., Chang, C. C., Chen, P. Y. and Lee, C. F. |
KSII Transactions on Internet and Information Systems
|
2013-04 |
期刊論文
|
A Novel Electronic English Auction System with a Secure On-shelf Mechanism |
Chang, C. C., Cheng, T. F. and Chen, W. Y. |
IEEE Transactions on Information Forensics and Security
|
2013-04 |
期刊論文
|
A Secure and Efficient t-out-of-n Oblivious Transfer Based on the Generalized Aryabhata Remainder Theorem |
Liu, Y., Chang, C. C. and Chang, S. C. |
Journal of Information Hiding and Multimedia Signal Processing
|
2013-04 |
期刊論文
|
Adaptive Self-recovery for Tampered Images Based on VQ Indexing and Inpainting |
Qin, C., Chang, C. C. and Chen, K. N. |
Signal Processing
|
2013-04 |
期刊論文
|
Chaotic Maps-Based Mutual Authentication and Key Agreement using Smart Cards for Wireless Communications |
Guo, C., Chang, C. C. and Sun, C. Y. |
Journal of Information Hiding and Multimedia Signal Processing
|
2013-04 |
期刊論文
|
Contrast-Adaptive Removable Visible Watermarking (CARVW) Mechanism |
Lin, P. Y., Chen, Y. H., Chang, C. C. and Lee, J. S. |
Image and Vision Computing
|
2013-04 |
期刊論文
|
Reversible Visual Secret Sharing Based on Random Grids for Two-Image Encryption |
Wang, Z. H., Pizzolatti, M. S. and Chang, C. C. |
International Journal of Innovative Computing, Information and Control
|
2013-04 |
專書
|
Steganography and Watermarking |
Ching-Nung Yang, Chia-Chen Lin and Chin-Chen Chang |
Nova Science Publishers Inc.
|
2013-03 |
期刊論文
|
A Novel (n, n) Secret Image Sharing Scheme Based on Sudoku |
Wang, Z. H., Guo, C. and Chang, C. C. |
Journal of Electronic Science and Technology
|
2013-03 |
期刊論文
|
A Smart Card-based Authentication Scheme Using User Identify Cryptography |
Chang, C. C. and Lee, C. Y. |
International Journal of Network Security
|
2013-03 |
期刊論文
|
A Verifiable Key Management Scheme in Hierarchical Ad Hoc Networks |
Chang, C. C., Wu, C. C. and Lin, I. C. |
Information-An International Interdisciplinary Journal
|
2013-03 |
期刊論文
|
An Efficient Information Hiding Scheme Based on Closest Paired Tree Structure Vector Quantization |
Wang, Z. H., Chang, C. C. and Lin, T. Y. |
Journal of Electronic Science and Technology
|
2013-03 |
期刊論文
|
Distortion-Free Data Embedding Scheme for High Dynamic Range Images |
Chang, C. C., Nguyen, T. S. and Lin, C. C. |
Journal of Electronic Science and Technology
|
2013-03 |
期刊論文
|
Lossless Information Hiding in the VQ Index Table |
Chang, C. C., Chen, K. N., Wang, Z. H. and Li, M. C. |
Journal of Software
|
2013-03 |
期刊論文
|
Reversible Data Hiding For High Quality Image Exploiting Interpolation and Direction Order Mechanism |
Wang, X. T., Chang, C. C., Nguyen, T. S. and Li, M. C. |
Digital Signal Processing
|
2013-03 |
期刊論文
|
Robust Image Hashing Using Non-Uniform Sampling in Discrete Fourier Domain |
Qin, C., Chang, C. C. and Tsou, P. L. |
Digital Signal Processing
|
2013-02 |
期刊論文
|
A Division Algorithm Using Bisection Method in Residue Number System |
Chang, C. C. and Yang, J. H. |
International journal of Computer, Consumer and Control
|
2013-02 |
期刊論文
|
A Novel VQ-based Reversible Data Hiding Scheme by Using Hybrid Encoding Strategies |
Chang, C. C., Nguyen, T. S. and Lin, C. C. |
Journal of Systems and Software
|
2013-02 |
期刊論文
|
Dictionary-Based Data Hiding Using Image Hashing Strategy |
Qin, C., Chang, C. C. and Tsou, P. L. |
International Journal of Innovative Computing, Information and Control
|
2013-01 |
期刊論文
|
A Construction for Secret Sharing Scheme with General Access Structure |
Guo, C. and Chang, C. C. |
Journal of Information Hiding and Multimedia Signal Processing
|
2013-01 |
期刊論文
|
A Fault-tolerant Group Key Agreement Protocol Exploiting Dynamic Setting |
Cheng, Z. Y., Liu, Y., Chang, C. C. and Guo, C. |
International Journal of Communication Systems
|
2013-01 |
期刊論文
|
A Practical Secure Chaos-Based Group Key Agreement Protocol Suitable for Distributed Network Environment |
Cheng, Z. Y., Liu, Y., Chang, C. C. and Chang, S. C. |
International Journal of Innovative Computing, Information and Control
|
2013-01 |
期刊論文
|
Authenticated RFID Security Mechanism Based on Chaotic Maps |
Cheng, Z. Y., Liu, Y., Chang, C. C. and Chang, S. C. |
Security and Communication Networks
|
2013-01 |
研討會論文
|
A Fair Hash Chain-based On-line Application Services Granting Scheme for Cloud Computing Environment |
Lin, C. C., Wu, C. C. and Chang, C. C. |
|
2012-12 |
期刊論文
|
Advanced Constantly Updated RFID Access Control Protocol Using Challenge-Response and Indefinite-Index |
Cheng, Z. Y., Liu, Y., Chang, C. C. and Chang, S. C. |
International Journal of Innovative Computing, Information and Control
|
2012-12 |
期刊論文
|
An Adaptive Prediction-Error Expansion Oriented Reversible Information Hiding Scheme |
Qin, C., Chang C. C. and Liao, L. T. |
Pattern Recognition Letters
|
2012-12 |
研討會論文
|
A UMTS Enhanced Cocktail Protocol |
Chang, C. C., Wu, C. C. and Lin, I. C. |
|
2012-11 |
研討會論文
|
A Novel Distortion-free Data Hiding Scheme for High Dynamic Range Images |
Wang, Z. H., Lin, T. Y., Chang, C. C. and Lin, C. C. |
|
2012-10 |
期刊論文
|
A User-Friendly Image Sharing Scheme Using JPEG-LS Median Edge Predictor |
Chan, C. S., Chang, C. C. and Hung, P. V. |
Journal of Information Hiding and Multimedia Signal Processing
|
2012-10 |
期刊論文
|
Data Hiding for Vector Quantization Images Using Mixed-Base Notation and Dissimilar Patterns without Loss of Fidelity |
Chang, C. C., Lin, C. Y. and Hsieh, Y. P. |
Information Sciences
|
2012-10 |
期刊論文
|
Novel Efficient User Authentication Protocol for Wireless Sensor Networks Using One-Way Hash Function |
Chang, C. C., Chang, S. C. and Chen, Y. W. |
ICIC Express Letters
|
2012-09 |
期刊論文
|
A Multi-threshold Secret Image Sharing Scheme Based on MSP |
Guo, C., Chang, C. C. and Qin, C. |
Pattern Recognition Letters
|
2012-09 |
期刊論文
|
Efficient Illumination Compensation Techniques for Text Images |
Chen, K. N., Chen, C. H. and Chang, C. C. |
Digital Signal Processing
|
2012-09 |
期刊論文
|
Graph Structure Analysis Based on a Complex Network |
Tang, J., Jiang, B., Chang C. C. and Bin, L. |
Digital Signal Processing
|
2012-09 |
期刊論文
|
Perceptual Image Hashing Based on the Error Diffusion Halftone Mechanism |
Qin, C., Chang, C. C. and Tsou, P. L. |
International Journal of Innovative Computing, Information and Control
|
2012-09 |
期刊論文
|
Prediction-Based Reversible Data Hiding with High Image Quality Using the Difference of Neighboring Pixels |
Chang, C. C., Huang, Y. H., Tsai, H. Y. and Qin, C. |
International Journal of Electronics and Communications
|
2012-09 |
期刊論文
|
Proactive Weighted Threshold Signature Based on Generalized Chinese Remainder Theorem |
Guo, C. and Chang, C. C. |
Journal of Electronic Science and Technology
|
2012-09 |
期刊論文
|
Reversible Data Embedding Scheme Using Relationships between Pixel-Values and Their Neighbors |
Lin, C. C., Chang, C. C. and Chen, Y. H. |
Journal of Electronic Science and Technology
|
2012-08 |
期刊論文
|
A Smart Card Based Authentication Scheme for Remote User Login and Verification |
Cheng, Z. Y., Liu, Y., Chang, C. C. and Chang, S. C. |
International Journal of Innovative Computing, Information and Control
|
2012-08 |
期刊論文
|
An Image Segmentation-Based Thresholding Method |
Pai, P. Y., Chang, C. C., Chan, Y. K., Tsai, M. H. and Guo, S. W. |
Journal of Imaging Science and Technology
|
2012-08 |
期刊論文
|
Perceptual Robust Image Hashing Scheme Based on Secret Sharing |
Qin, C, Chang, C. C. and Guo, C. |
Journal of Computer Research and Development
|
2012-08 |
期刊論文
|
Reversible Data Hiding Scheme Based on Image Inpainting |
Qin, C., Wang, Z. H., Chang, C. C. and Chen, K. N. |
Fundamenta Informaticae
|
2012-08 |
研討會論文
|
Mobile Friendly and Highly Efficient Authenticated Key Agreement Protocol Featuring Untraceability |
Chang, C. C., Le, H. D., and Chang, C. H. |
|
2012-08 |
研討會論文
|
Strong Tamper-Localization Visual Secret Sharing Scheme Based on Exploiting Modification Direction |
Chang, C. C., Tu, H. N., and Lin, C. C. |
|
2012-07 |
期刊論文
|
A Novel Vector Quantization Technique Using Block Mining in Image Compression |
Wang, Z. H., Chang, C. C. and Pizzolatti, M. S. |
Advances in Information Sciences and Service Sciences
|
2012-07 |
期刊論文
|
A Secure Image Delivery Scheme with Regional Protection Capability Using Image Inpainting and Editing |
Qin, C., Chang, C. C., Lee, W. B. and Zhang, X. |
The Imaging Science Journal
|
2012-07 |
期刊論文
|
An ROI-Based Medical Image Hiding Method |
Pai, P. Y., Chang, C. C., Chan, Y. K. and Liu, C. M. |
International Journal of Innovative Computing, Information and Control
|
2012-06 |
期刊論文
|
A Novel Multi-group Exploiting Modification Direction Method Based on Switch Map |
Wang, X. T., Chang C. C., Lin, C. C. and Li, M. C. |
Signal Processing
|
2012-06 |
期刊論文
|
Optimizing Least-significant-bit Substitution Using Cat Swarm Optimization Strategy |
Wang, Z. H., Chang, C. C. and Li, M. C. |
Information Sciences
|
2012-05 |
期刊論文
|
A Secure Dynamic Identity Based Remote User Authentication Scheme Using Secret Sharing |
Liu, Y., Cheng, Z. Y., Chang, C. C. and Zhang, Z. J. |
Journal of Internet Technology
|
2012-05 |
期刊論文
|
Encryption Scheme for Weighted Threshold Authentication |
Guo, C., Chang, C. C., Qin, C. and Li, M. C. |
Journal of Applied Sciences - Electronics and Information Engineering
|
2012-04 |
期刊論文
|
Self-Embedding Fragile Watermarking with Restoration Capability Based on Adaptive Bit Allocation Mechanism |
Qin, C., Chang, C. C. and Chen, P. Y. |
Signal Processing
|
2012-03 |
期刊論文
|
A Low Computational-cost Electronic Payment Scheme for Mobile Commerce with Large-scale Mobile Users |
Yang, J. H. and Chang, C. C. |
Wireless Personal Communications
|
2012-03 |
期刊論文
|
Multi-Threshold Visual Secret Sharing |
Guo, C., Chang, C. C. and Qin, C. |
Advance in Information Science and Service Science
|
2012-02 |
期刊論文
|
Image Tamper Detection and Recovery Based on Dual Watermarks Sharing Strategy |
Chen, Y. H. and Chang, C. C. |
Journal of Digital Information Management
|
2012-02 |
期刊論文
|
Reversible Watermarking Schemes Based on Expansion Embedding Using Pixel Partition Strategies |
Kieu, T. D. and Chang, C. C. |
The Imaging Science Journal
|
2012-01 |
期刊論文
|
A Data Hiding Scheme Based on Voronoi Diagram |
Cui, S. Y., Wang, Z. H., Chang, C. C. and Li, M. C. |
Journal of Computers
|
2012-01 |
期刊論文
|
A Fast VQ Codebook Search with Initialization and Search Order |
Chang, C. C. and Hsieh, Y. P. |
Information Sciences
|
2012-01 |
期刊論文
|
A Hierarchical Threshold Secret Image Sharing |
Guo, C., Chang, C. C. and Qin, C. |
Pattern Recognition Letters
|
2012-01 |
期刊論文
|
A New Data Hiding Scheme Based on DNA Sequence |
Guo, C., Chang, C. C. and Wang, Z. H. |
International Journal of Innovative Computing, Information and Control
|
2012-01 |
期刊論文
|
A Secure Single Sign-on Mechanism for Distributed Computer Networks |
Chang, C. C. and Lee, C. Y. |
IEEE Transactions on Industrial Electronics
|
2012-01 |
期刊論文
|
An Improved Protocol for Password Authentication Using Smart Cards |
Cheng, Z. Y., Liu, Y., Chang, C. C. and Chang, S. C. |
Journal of Computers
|
2012-01 |
期刊論文
|
Novel Electronic Check Mechanism Using Elliptic Curve Cryptosystem |
Chang, C. C., Chang, S. C. and Wu, Y. C. |
Journal of Computers
|
2012-01 |
期刊論文
|
Nucleus and Cytoplast Contour Detector from a Cervical Smear Image |
Pai, P. Y., Chang, C. C. and Chan, Y. K. |
Expert Systems with Applications
|
2011-9 |
研討會論文
|
A New Reversible Secret Image Sharing Scheme Based on Multi-Level Encoding |
Wang, Z. H., Chang, C. C. and Pizzolatti, M. S. |
|
2011-9 |
研討會論文
|
Image Data Hiding Schemes Based on Graph Coloring |
Yue, S., Wang, Z. H., Chang. C. Y., Chang, C. C. and Li, M. C. |
|
2011-8 |
研討會論文
|
An Efficient V-Fairness (t, n) Threshold Secret Sharing Scheme |
Yang, J. H., Chang, C. C. and Wang, C. H. |
|
2011-5 |
研討會論文
|
Adaptive Data Hiding Based on Exploiting Modification Direction with High Embedding Capacity |
Lee, C. F., Liu, C. M., Wang, X. T. and Chang, C. C. |
|
2011-12 |
期刊論文
|
A Visual Secret Sharing Scheme for Progressively Restoring Secrets |
Chang, C. C., Hsieh, Y. P. and Liao, C. C. |
Journal of Electronic Science and Technology
|
2011-11 |
期刊論文
|
A Reversible Watermarking Scheme with High Payload and Good Visual Quality for Watermarked Images |
Kieu, T. D. and Chang, C. C. |
International Journal of Innovative Computing, Information and Control
|
2011-11 |
期刊論文
|
Secure Key Transfer Protocol Based on Secret Sharing for Group Communications |
Lee, C. Y., Wang, Z. H., Harn, L. and Chang, C. C. |
IEICE Transactions on Information and Systems
|
2011-11 |
研討會論文
|
A Progressive Digital Image Recovery Scheme Based on EMD Data Embedding Method |
Chang, C. C., Wang, S. T. and Chen, K. N. |
|
2011-10 |
期刊論文
|
A High Payload Multiple Embedding Scheme Based Reversible Data Hiding |
Lee, C. F., Chang, C. C. and Wu, C. Y. |
Journal of Computers
|
2011-10 |
期刊論文
|
A Reversible Data Hiding Scheme for VQ Indices Using Locally Adaptive Coding |
Chang, C. C., Nguyen, T. S. and Lin, C. C. |
Journal of Visual Communication and Image Representation
|
2011-10 |
期刊論文
|
Hiding Secret Information in Lossless Compression Codes |
Chen, C. C. and Chang, C. C. |
International Journal of Innovative Computing, Information and Control
|
2011-10 |
期刊論文
|
Provably Secure High Entropy Three-party Authenticated Key Exchange Scheme for Network Environments |
Chang, C. C., Tsai, H. C. and Huang, Y. C. |
International Journal of Innovative Computing, Information and Control
|
2011-10 |
研討會論文
|
A Robust and Efficient Smart Card Oriented Remote User Authentication Protocol |
Chang, C. C., Le, H. D., Lee, C. Y. and Chang, C. H. |
|
2011-10 |
研討會論文
|
An Efficient Mutual Authentication with Key Agreement Protocol for Mobile Devices |
Chang, C. C., Yang, J. H. and Lin, S. Y. |
|
2011-10 |
研討會論文
|
General Threshold Signature based on the Chinese Remainder Theorem |
Guo, C. and Chang, C. C. |
|
2011-10 |
研討會論文
|
Low Computational Color Secret Sharing Schemes with High Shares Quality Color Secret Sharing |
Chang, C. C., Chen, K. N. and Huang, Y. H. |
|
2011-09 |
期刊論文
|
A Prediction-Based Adaptive Reversible Data Embedding Scheme |
Lee, C. F., Huang, Y. H., Chang, C. C. and Liu, T. C. |
Journal of Software
|
2011-09 |
期刊論文
|
A Secure E-mail Protocol for Mobile Devices |
Chang, C. C. and Lee, C. Y. |
International Journal of Innovative Computing, Information and Control
|
2011-09 |
期刊論文
|
A Secure Fragile Watermarking Scheme Based on Chaos-and-Hamming Code |
Chang, C. C., Chen, K. N., Lee, C. F. and Liu, L. J. |
Journal of Systems and Software
|
2011-08 |
期刊論文
|
A Robust and Efficient Smart Card Based Remote Login Mechanism for Multi-Server Architecture |
Chang, C. C. and Cheng, T. F. |
International Journal of Innovative Computing, Information and Control
|
2011-08 |
期刊論文
|
A Secret Image Sharing Scheme with High Quality Shadows Based on Exploiting Modification Direction |
Guo, C., Wang, Z. H., Chang, C. C. and Qin, C. |
Journal of Multimedia
|
2011-08 |
期刊論文
|
Fully Deniable Message Authentication Protocols Preserving Confidentiality |
Harn, L., Lee, C. Y., Lin, C. and Chang, C. C. |
The Computer Journal
|
2011-08 |
期刊論文
|
Protecting the Content Integrity of Digital Imagery with Fidelity Preservation |
Lin, P. Y., Lee, J. S. and Chang, C. C. |
ACM Transactions on Multimedia Computing Communications and Applications
|
2011-07 |
期刊論文
|
A High Quality and Small Shadow Size Visual Secret Sharing Scheme Based on Hybrid Strategy for Grayscale Images |
Le, T. H. N., Lin, C. C., Chang, C. C.and Le, H. B. |
Digital Signal Processing
|
2011-07 |
期刊論文
|
Novel Magic Matrices Generation Method for Secret Messages Embedding |
Chang, C. C., Chen, K. N. and Lin, H. C. |
International Journal of Computer Sciences and Engineering Systems
|
2011-07 |
期刊論文
|
Reversible Watermarking Using Two-passed Threshold Decision |
Chang, C. C., Chen, K. N. and Tsai, M. H. |
Journal of Multimedia
|
2011-07 |
期刊論文
|
Rotation Invariant Image Copy Detection Using DCT Domain |
Li, L., Xu, H. and Chang, C. C. |
International Journal of Innovative Computing, Information and Control
|
2011-07 |
期刊論文
|
Safeguarding Visual Information Using (t,n) Verifiable Secret Shares |
Chang, C. C., Lin, C. C. and Huynh, N. T. |
Journal of Computers
|
2011-06 |
期刊論文
|
A Digital Watermark Algorithm for QR Code |
Li, L., Wang, R. L. and Chang, C. C. |
International Journal of Intelligent Information Processing
|
2011-06 |
期刊論文
|
A Hierarchical Fragile Watermarking with VQ Index Recovery |
Lee, C. F., Chen, K. N., Chang, C. C. and Tsai, M. C. |
Journal of Multimedia
|
2011-06 |
期刊論文
|
A Reversible Watermarking Algorithm Based on Four-Neighbors Context Prediction for Tongue Images |
Li, L., Yang, F. and Chang, C. C. |
International Journal of Intelligent Information Processing
|
2011-06 |
期刊論文
|
Cheating Resistance and Reversibility Oriented Secret Sharing Mechanism |
Lin, P. Y. and Chang, C. C. |
IET Information Security
|
2011-06 |
期刊論文
|
Lossless Secret Sharing Scheme with High Quality Shares Based on VQ-Compressed Images |
Chang, C. C., Chen, K. N. and Huynh, N. T. |
International Journal of Pattern Recognition and Artificial Intelligence (IJPRAI)
|
2011-05 |
期刊論文
|
An Improved AES S-box And Its Performance Analysis |
Cui, J., Huang, L., Zhong, H., Chang, C. C. and Yang, W. |
International Journal of Innovative Computing, Information and Control
|
2011-04 |
期刊論文
|
A Steganographic Scheme by Fully Exploiting Modification Directions |
Kieu, T. D. and Chang, C. C. |
Expert Systems with Applications
|
2011-04 |
期刊論文
|
An Adaptable Threshold Detector |
Pai, P. Y., Chang, C. C., Chan, Y. K. and Tsai, M. H. |
Information Sciences
|
2011-03 |
期刊論文
|
A Simple Image Encoding Method with Data Lossless Information Hiding |
Wang, Z. H., Chang, C. C., Li, M. C. and Lu, T. C. |
Journal of Networks
|
2011-03 |
期刊論文
|
Meaningful Secret Sharing Technique with Authentication and Remedy Abilities |
Chang, C. C., Chen, Y. H. and Wang, H. C. |
Information Sciences
|
2011-03 |
期刊論文
|
Meaningful Shadow Based Multiple Gray Level Visual Cryptography without Size Expansion |
Pai, P. Y., Chang, C. C., Chan, Y. K. and Liao, C. C. |
International Journal of Innovative Computing, Information and Control
|
2011-03 |
期刊論文
|
Reversible Data Hiding for VQ Indices Using Prediction Errors |
Wang, Z. H., Chang, C. C., Huynh, N. T. and Li, M. C. |
International Journal of Innovative Computing, Information and Control
|
2011-03 |
期刊論文
|
Reversible Steganography for BTC-compressed Images |
Chang, C. C., Lin, C. Y. and Fan, Y. H. |
Fundamenta Informaticae
|
2011-01 |
期刊論文
|
A Novel Image Watermarking in Redistributed Invariant Wavelet Domain |
Li, L., Xu, H. H., Chang, C. C. and Ma, Y. Y. |
Journal of Systems and Software
|
2011-01 |
期刊論文
|
An Adaptive Liner Regression Approach to Still Image Compression |
Chang, C. C. and Lai, Y. P. |
International Journal of Innovative Computing, Information and Control
|
2011-01 |
期刊論文
|
Sharing a Secret Image in Binary Images with Verification |
Wang, Z. H., Chang, C. C., Huynh, N. T. and Li, M. C. |
Journal of Information Hiding and Multimedia Signal Processing
|
2010-9 |
研討會論文
|
A Large Payload EMD Embedding Scheme with High Stego-image Quality |
Chen, K. N., Chang, C. C. and Lin, H. C. |
|
2010-8 |
研討會論文
|
Embedding Data and Sharing Original Image in Two Stego Images Using Sudoku |
Chang, C. C., Chou, Y. C. and Kieu, T. D. |
|
2010-12 |
期刊論文
|
Hiding Secret Data in an Image Using Codeword Imitation |
Wang, Z. H., Chang, C. C. and Tsai, P. Y. |
Journal of Information Processing Systems
|
2010-12 |
期刊論文
|
Reversible Secret Sharing with Distortion Control Mechanism |
Chang, C. C., Huang, Y. H. and Li, T. C. |
ICIC Express Letters, Part B
|
2010-12 |
研討會論文
|
Data Hiding Scheme with High Embedding Capacity and Good Visual Image Quality Based on Edge Detection |
Lee, C. F., Chang, C. C. and Tsou, P. L. |
|
2010-12 |
研討會論文
|
Providing Anonymous Channels and Mutual Authentication for Mobile Communications |
Li, B., Chang, C. C. and Lee, J. S. |
|
2010-11 |
期刊論文
|
An Anonymous and Self-verified Mobile Authentication with Authenticated Key Agreement for Large-scale Wireless Networks |
Chang, C. C. and Tsai, H. C. |
IEEE Transactions on Wireless Communications
|
2010-11 |
期刊論文
|
An Encoding Method for Both Image Compression and Data Lossless Information Hiding |
Wang, Z. H., Chang, C. C., Chen, K. N. and Li, M. C. |
Journal of Systems and Software
|
2010-11 |
期刊論文
|
Hiding Information in Binary Images with Complete Reversibility and High Embedding Capacity |
Wang, C. C., Hwang, Y. T., Chang, C. C. and Jan, J. K. |
International Journal of Innovative Computing, Information and Control
|
2010-10 |
期刊論文
|
A Removable Visible Watermark for Digital Images |
Chang, C. C., Lin, C. C. and Li, K. M. |
Journal of Computers
|
2010-10 |
期刊論文
|
A VQ Compression Method Based on the Variations of the Image Block Groups |
Chan, Y. K., Pai, P. Y., Chen, R. C. and Chang, C. C. |
International Journal of Innovative Computing, Information and Control
|
2010-10 |
期刊論文
|
Digital Rights Management for Multimedia Content over 3G Mobile Networks |
Wu, C. C., Lin, C. C. and Chang, C. C. |
Expert Systems with Applications
|
2010-10 |
期刊論文
|
Hiding Secret Information in Modified Locally Adaptive Data Compression Code |
Chang, C. C., Chen, K. N. and Wang, Z. H. |
ICIC Express Letters
|
2010-10 |
研討會論文
|
A Robust Public Watermarking Scheme Based on DWT |
Chang, C. C., Chen, K. N. and Hsieh, M. H. |
|
2010-1 |
研討會論文
|
A Reversible and Multiple-layer Embedding Strategy with High Capacity |
Lee, C. F., Chang, C. C. and Wu, C. Y. |
|
2010-1 |
研討會論文
|
A Technique of Embedding Digital Data in an Image Compression Code Reversibly |
Chang, C. C., Chen, K. N., Wang, Z. H. and Li, M. C. |
|
2010-1 |
研討會論文
|
High-capacity Reversible Data-hiding for LZW Codes |
Chen, C. C. and Chang, C. C. |
|
2010-09 |
期刊論文
|
An Efficient and Reliable E-DRM Scheme for Mobile Environments |
Chang, C. C., Yang, J. H. and Wang, D. W. |
Expert Systems with Applications (ESWP 2010)
|
2010-09 |
期刊論文
|
An Improved Biometrics-based User Authentication Scheme without Concurrency System |
Chang, C. C., Chang, S. C. and Lai, Y. W. |
International Journal of Intelligent Information Processing
|
2010-09 |
期刊論文
|
Analysis of an Image Secret Sharing Scheme to Identify Cheaters |
Lee, J. S., Lin, P. Y. and Chang, C. C. |
International Journal of Image Processing
|
2010-08 |
期刊論文
|
A Reversible Data Hiding Scheme Using Complementary Embedding Strategy |
Chang, C. C. and Kieu, T. D. |
Information Sciences
|
2010-08 |
期刊論文
|
Secret Sharing Using Visual Cryptography |
Chang, C. C., Li, B. and Lee, J. S. |
Journal of Electronic Science and Technology
|
2010-07 |
期刊論文
|
An Efficient Internet On-line Transaction Mechanism |
Chang, C. C. and Chang, S. C. |
International Journal of Innovative Computing, Information and Control
|
2010-07 |
期刊論文
|
An Information Hiding Scheme Based on (7,4) Hamming Code Oriented Wet Paper Codes |
Yin, Z. X., Chang, C. C. and Zhang, Y. P. |
International Journal of Innovative Computing, Information and Control
|
2010-07 |
期刊論文
|
Data Hiding Based on the Similarity between Neighboring Pixels with Reversibility |
Li, Y. C., Chang, C. C. and Yeh, C. M. |
Digital Signal Processing
|
2010-07 |
期刊論文
|
High Capacity SMVQ-based Hiding Scheme Using Adaptive Index |
Chen, C. C. and Chang, C. C. |
Signal Processing
|
2010-07 |
期刊論文
|
Hybrid Wet Paper Coding Mechanism for Steganography Employing n-Indicator and Fuzzy Edge Detector |
Chang, C. C., Lee, J. S. and Le, T. H. N. |
Digital Signal Processing
|
2010-06 |
期刊論文
|
A Data-hiding Scheme Based on One-way Hash Function |
Chang, C. C., Lee, C. Y., Chen, C. C. and Wang, Z. H. |
International Journal of Multimedia Intelligence and Security (IJMIS)
|
2010-06 |
期刊論文
|
A High Payload Frequency Based Reversible Image Hiding Method |
Chang, C. C., Pai, P. Y., Yeh, C. M. and Chan, Y. K. |
Information Sciences
|
2010-06 |
期刊論文
|
A Novel Self-tuning Feedback Controller for Active Queue Management Supporting TCP Flows |
Xiong, N., Vasilakos, A. V., Yang, L. T., Wang, C. X., Kannan, R., Chang, C. C. and Pan, Y. |
Information Sciences
|
2010-06 |
期刊論文
|
Lightweight Secure Roaming Mechanism between GPRS/UMTS and Wireless LANs |
Lee, J. S., Lin, P. Y. and Chang, C. C. |
Wireless Personal Communications
|
2010-06 |
期刊論文
|
Using Quad Smoothness to Efficiently Control Capacity–distortion of Reversible Data Hiding |
Lin, C. N., Buehrer, D. J., Chang, C. C. and Lu, T. C. |
the Journal of Systems and Software
|
2010-04 |
期刊論文
|
A Digital Image and Secret Messages Sharing Scheme Using Two Stego Images |
Chen, C. C. and Chang, C. C. |
International Journal of Innovative Computing, Information and Control
|
2010-04 |
期刊論文
|
A Grayscale Image Steganography Based upon Discrete Cosine Transformation |
Chang, C. C., Lin, P. Y. and Chuang, J. C. |
Journal of Digital Information Management
|
2010-04 |
期刊論文
|
An Effective Demosaicing Algorithm for CFA Image |
Lee, C. F., Chang, C. C., Pai, P. Y. and Huang, W. H. |
International Journal of Innovative Computing, Information and Control
|
2010-04 |
期刊論文
|
An Efficient Payment Scheme by Using Electronic Bill of Lading |
Yang, J. H. and Chang, C. C. |
International Journal of Innovative Computing, Information and Control
|
2010-04 |
期刊論文
|
Generalized Aryabhata Remainder Theorem |
Chang, C. C., Yeh, J. S. and Yang, J. H. |
International Journal of Innovative Computing, Information and Control
|
2010-04 |
期刊論文
|
High Payload Steganography Mechanism Using Hybrid Edge Detector |
Chen, W. J., Chang, C. C. and Le, T. H. N. |
Expert Systems with Applications (ESWA 2010)
|
2010-03 |
期刊論文
|
A Visual Secret Sharing Scheme with Verification Mechanism |
Chang, C. C., Lin, C. C. and Huynh, N. T. |
International Journal of Computer Science and Engineering Systems
|
2010-03 |
期刊論文
|
An Efficient E-mail Protocol Providing Perfect Forward Secrecy for Mobile Devices |
Chang, C. C., Lee, C. Y. and Chiu, Y. C. |
International Journal of Communication Systems
|
2010-03 |
期刊論文
|
An Efficient and Fair Buyer-Seller Fingerprinting Scheme for Large Scale Networks |
Chang, C. C., Tsai, H. C. and Hsieh, Y. P. |
Computers & Security
|
2010-03 |
期刊論文
|
An Enhancement of JPEG Still Image Compression with Adaptive Linear Regression and Golomb-Rice Coding |
Chang, C. C. and Lai, Y. P. |
International Journal of Innovative Computing, Information and Control
|
2010-03 |
期刊論文
|
The Design of E-Traveler's Check with Efficiency and Mutual Authentication |
Chang, C. C. and Chang, S. C. |
Journal of Networks
|
2010-02 |
期刊論文
|
3GPP SIM-based Authentication Schemes for Wireless Local Area Networks |
Wu, C. C., Chang, C. C. and Lin, I. C. |
International Journal of Innovative Computing, Information and Control
|
2010-02 |
期刊論文
|
A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation |
Lee, C. F., Chen, K. N., Chang, C. C. and Tsai, M. C. |
the special issue of Journal of Information Assurance and Security (JIAS)
|
2010-02 |
期刊論文
|
A Chaotic Map Based Adaptive Variable-Size LSB Method with Pixel-Value Differencing and Modulus Function |
Chang, C. C. and Hsieh, Y. P. |
The Imaging Science Journal
|
2010-02 |
期刊論文
|
A Key Management Scheme for Sensor Networks Using Bilinear Pairings and Gap Diffie-Hellman Group |
Lin, I. C., Chang, P. Y. and Chang, C. C. |
International Journal of Innovative Computing, Information and Control
|
2010-02 |
期刊論文
|
A Secure Protocol for Three-Party Authenticated Key Exchange with Provable Belief |
Cheng, T. F., Chang, C. C. and Wang, Z. H. |
International Journal of Information Sciences and Computer Engineering (IJISCE)
|
2010-02 |
期刊論文
|
A Watermarking Technique Using Synonym Substitution for Integrity Protection of XML Documents |
Chang, C. C., Chen, Y. H. and Kieu, T. D. |
ICIC Express Letters
|
2010-02 |
期刊論文
|
An Efficient Authenticated Encryption Scheme Based on Elliptic Curve Cryptosystem for Broadcast Environments |
Chang, C. C., Lai, Y. W. and Yang, J. H. |
ICIC Express Letters
|
2010-01 |
期刊論文
|
A Modification of VQ Index Table for Data Embedding and Lossless Indices Recovery |
Wang, Z. H., Chang, C. C., Chen, K. N. and Li, M. C. |
Journal of Computers
|
2010-01 |
期刊論文
|
A Novel Information Concealing Method Based on Exploiting Modification Direction |
Wang, Z. H., Kieu, T. D., Chang, C. C. and Li, M. C. |
Journal of Information Hiding and Multimedia Signal Processing
|
2010-01 |
期刊論文
|
A Parallel Computation Algorithm for Generalized Aryabhata Remainder Theorem |
Chang, C. C. and Yang J. H. |
International Journal of Computer Sciences and Engineering Systems
|
2010-01 |
期刊論文
|
A Sudoku-based Secret Image Sharing Scheme with Reversibility |
Chang, C. C., Lin, P. Y., Wang, Z. H. and Li, M. C. |
Journal of Communications
|
2009-9 |
研討會論文
|
A Novel Retinal Blood Vessel Segmentation Method Based on Line Operator and Edge Detector |
Chang, C. C., Lin, C. C., Pai, P. Y. and Chen, Y. C. |
|
2009-9 |
研討會論文
|
A Novel Secure Data Hiding Scheme Using a Secret Reference Matrix |
Lin, C. N., Chang, C. C., Lee, W. B. and Lin, J. |
|
2009-9 |
研討會論文
|
A Novel Secure Data Hiding Scheme Using a Secret Reference Matrix |
Lin, C. N., Chang, C. C., Lee, W. B., and Lin, J. |
|
2009-9 |
研討會論文
|
A Simple and Efficient Data Hiding Scheme Suitable for Low Power Computation Environments |
Chang, C. C., Chou, Y. C. and Hsieh, M. H. |
|
2009-9 |
研討會論文
|
Cryptanalysis and Improvement of a Secure Authentication Scheme with Anonymity for Wireless Communications |
Chang, C. C., Lee, C. Y., and Lee, W. B. |
|
2009-9 |
研討會論文
|
Embedding Secret Messages Using Modified Huffman Coding |
Chen, K. N., Lee, C. F., Chang, C. C. and Lin, H. C. |
|
2009-9 |
研討會論文
|
Novel Efficient Electronic Voting Mechanism Based upon Elliptic Curve |
Lai, Y. W., Chang, C. C. and Chang, S. C. |
|
2009-9 |
研討會論文
|
Reversible Steganography for VQ Indices Using the Modified State Codebook |
Chang, C. C., Chan, C. S., Wang, Z. H. and Li, M. C. |
|
2009-9 |
研討會論文
|
Sharing Secrets and Reversibly Reconstructing the Cover Image Using Two Meaningful Shadows |
Kieu, T. D., Wang, Z. H., Chang, C. C. and Li, M. C. |
|
2009-8 |
研討會論文
|
A High Embedding Efficiency Steganography Scheme for Wet Paper Codes |
Yin, Z. X., Chang, C. C., and Zhang, Y. P. |
|
2009-8 |
研討會論文
|
A New Intelligent Authorization Agent Model in Grid |
Wang, Z. H., Li, M. C., Chen, M. H. and Chang, C. C. |
|
2009-8 |
研討會論文
|
A Quadratic-residue-based Fragile Watermarking Scheme |
Chang, C. C., Chen, K. N., Wang, Z. H. and Li, M. C. |
|
2009-8 |
研討會論文
|
A Resistant Secret Sharing Scheme |
Chang, C. C., Chen, Y. C. and Lin, C. C. |
|
2009-8 |
研討會論文
|
A Reversible Data Embedding Scheme Based on Chinese Remainder Theorem for VQ Index Tables |
Chang, C. C., Chen, Y. H., Wang, Z. H. and Li, M. C. |
|
2009-8 |
研討會論文
|
A Self-Reference Watermarking Scheme Based on Wet Paper Coding |
Chang, C. C., Lin, P. Y. and Lee, J. S. |
|
2009-8 |
研討會論文
|
A Steganographic Scheme for Reversible Information Hiding with Good Visual Quality Suitable for Small Embedded Data |
Chang, C. C., Kieu, T. D., Wang, Z. H. and Li, M. C. |
|
2009-8 |
研討會論文
|
A VSS Scheme of Image Size Invariant for Vertical Edge Enhancement |
Lee, C. F., Chang, C. C. and Liu, T. C. |
|
2009-8 |
研討會論文
|
An Enhancement of JPEG Still Image Compression with Adaptive Linear Regression and Golomb-Rice Coding |
Chang, C. C. and Lai, Y. P. |
|
2009-8 |
研討會論文
|
An Image Authentication Scheme Using Magic Square |
Chang, C. C., Kieu, T. D., Wang, Z. H. and Li, M. C. |
|
2009-8 |
研討會論文
|
Information Hiding Technology Based on Block-Sigmentation Strategy |
Lu, T. C., Liao, S. R., Chen, P. L., Chang, C. C. and Wang, Z. H. |
|
2009-7 |
研討會論文
|
A New Classification Mechanism for Retinal Images |
Chang, C. C., Chen, Y. C. and Lin, C. C. |
|
2009-6 |
研討會論文
|
A Data Embedding Scheme Based on a Magic Matrix and Wet Paper Codes |
Chang, C. C., Chen, Y. H., Wang, Z. H. and Li, M. C. |
|
2009-6 |
研討會論文
|
Data Hiding in Images by Hybrid LSB Substitution |
Chang, C. C. and Tseng, H. W. |
|
2009-6 |
研討會論文
|
Information Hiding in Dual Images with Reversibility |
Chang, C. C., Kieu, T. D. and Chou, Y. C. |
|
2009-6 |
研討會論文
|
Secret Image Sharing with Reversible Steganography |
Chang, C. C., Lin, P. Y. and Chan, C. S. |
|
2009-5 |
研討會論文
|
A Novel Reversible Data Embedding Scheme Using Dissimilar Pairing for Palette-based Images |
Chang, C. C., Wang, Z. H., Chen, Y. H. and Li, M. C. |
|
2009-5 |
研討會論文
|
A Steganographic Scheme Based on Wet Paper Codes Suitable for Uniformly Distributed Wet Pixels |
Chang, C. C., Chou, Y. C., and Lin, C. C. |
|
2009-5 |
研討會論文
|
Hiding Information in Region-based Wet Images |
Chang, C. C., Chen, K. N., Lee, C. F. and Wang, Z. H. |
|
2009-4 |
研討會論文
|
Cheating Resistance for Secret Sharing |
Chan, C. W., Chang, C. C.and Wang, Z. H. |
|
2009-4 |
研討會論文
|
Design of a Distributed Flow Control Scheme based on Wireless Multi-rate Multicast Networks |
Xiong, N., Jia, X., Yang, Y. R., Vasilakos, A. V., Pan, Y., Chang, C. C., Li, Y. |
|
2009-12 |
期刊論文
|
A Novle Key Management Scheme for Scalable Multicast Communications |
Chang, C. C., Cheng, Y. F. and Lin, I. C. |
International Journal of Communication systems
|
2009-12 |
期刊論文
|
An Image Copyright Protection Scheme Using DCT and a Table Look-up Technique |
Lin, C. N., Chang, C. C. and Tsai, M. T. |
Journal of Digital Information Management (JDIM)
|
2009-12 |
期刊論文
|
Self-Verifying Visual Secret Sharing Using Error Diffusion and Interpolation Techniques |
Chang, C. C., Lin, C. C., Le, T. H. N. and Le, H. B. |
IEEE Transactions on Information Forensics and Security
|
2009-12 |
研討會論文
|
A Data Hiding Method for Text Documents Using Multiple-Base Encoding |
Chang, C. C., Wu, C. C. and Lin, I. C. |
|
2009-12 |
研討會論文
|
A High Quality Steganographic Scheme for ROI Images |
Chang, C. C., Lee, C. F., Chen, K. N. and Liu, T. C. |
|
2009-12 |
研討會論文
|
An Ingenious Data Hiding Scheme for Color Retinal Images |
Chang, C.C., Wang, Z. H. and Yin, Z. X. |
|
2009-12 |
研討會論文
|
High Payload Reversible Data Embedding Scheme Suitable for VQ Compressed Smooth Images Using Index Lookup |
Wang, Z. H., Chang, C. C., Chen, Y. H. and Li, M. C. |
|
2009-11 |
期刊論文
|
An Efficient Fair Electronic Payment System Based upon Non-Signature Authenticated Encryption Scheme |
Yang, J. H. and Chang, C. C. |
International Journal of Innovative Computing, Information and Control
|
2009-11 |
期刊論文
|
LSB-based High-Capacity Data Embedding Scheme for Digital Images |
Lin, C. C., Chen, Y. H. and Chang, C. C. |
International Journal of Innovative Computing, Information and Control
|
2009-11 |
期刊論文
|
Sharing a Verifiable Secret Image Using Two Shadows |
Chang, C. C., Lin, C. C., Le, T. H. N. and Le, H. B. |
Pattern Recognition
|
2009-11 |
研討會論文
|
A Simple and Efficient Edge Detection Method |
Chang, C. C., Wang, Z. H. and Yin, Z. X. |
|
2009-11 |
研討會論文
|
A Watermark Extraction Model to Enhance the Correlation of Digimarc Plug-ins in Photoshop |
Li, L., Xu, H. H. and Chang, C. C. |
|
2009-11 |
研討會論文
|
A Wet Image Data Hiding Scheme Based on Coordinate Modifications |
C. C. Chang, Z. H. Wang, Y.H. Chen and M. C. Li |
|
2009-11 |
研討會論文
|
An Improvement of Proxy Certificate Chain Authentication Scheme Based on Proxy Certificate Trust List |
Wang, Z. H., Li, M. C. and Chang, C. C. |
|
2009-11 |
研討會論文
|
Emoticon-based Text Steganography in Chat |
Wang, Z. H., Kieu, T. D., Chang, C. C. and Li, M. C. |
|
2009-10 |
期刊論文
|
A High Stego-image Quality Steganographic Scheme with Reversibility and High Payload Using Multiple Embedding Strategy |
Kieu, T. D. and Chang, C. C. |
Journal of Systems and Software
|
2009-10 |
期刊論文
|
A New Data Hiding Strategy with Restricted Region Protection |
Lee, C. F., Chen, K. N. and Chang, C. C. |
The Imaging Science Journal
|
2009-10 |
期刊論文
|
Modular Square-and-Multiply Operation for Quadratic Residue Bases |
Chang, C. C. and Lai, Y. P. |
International Journal of Innovative Computing, Information and Control
|
2009-10 |
研討會論文
|
Efficient User Authentication and Key Establishment Protocols with Perfect Forward Secrecy for Mobile Devices |
Chang, C. C., Lin, S. Y. and Yang, J. H. |
|
2009-10 |
研討會論文
|
Hiding Information in VQ Index Tables with Reversibility |
Chang, C. C., Chen, K. N., Wang, Z. H. and Li, M. C. |
|
2009-1 |
研討會論文
|
A Reversible Data Hiding Scheme Based on Dual Steganographic Images |
Lee, C. F., Wang, K. H., Chang, C. C. and Huang, Y. L. |
|
2009-1 |
研討會論文
|
Embedding Secret Messages Based on Chaotic Map and Huffman Coding |
Chen, K. N., Lee, C. F. and Chang, C. C. |
|
2009-09 |
期刊論文
|
A Robust Certification Service for Highly Dynamic MANET in Emergency Tasks |
Ge, M., Lam, K. Y., Gollmann, D., Chung, S. L. and Chang, C. C. |
International Journal of Communication Systems
|
2009-09 |
期刊論文
|
An Authenticated PayWord Scheme without Public Key Cryptosystems |
Wu, C. C., Chang, C. C. and Lin, I. C. |
International Journal of Innovative Computing, Information and Control
|
2009-09 |
期刊論文
|
An Efficient Three-party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography for Mobile-commerce Environments |
Yang, J. H. and Chang, C. C. |
Journal of Systems and Software
|
2009-09 |
期刊論文
|
An On-line Electronic Check System with Mutual Authentication |
Chang, C. C., Chang, S. C. and Lee, J. S. |
Computers & Electrical Engineering
|
2009-08 |
期刊論文
|
A Reversible Information Hiding Scheme Using Left-Right and Up-Down Chinese Character Representation |
Wang, Z. H., Chang, C. C., Lin, C. C. and Li, M. C. |
Journal of Systems and Software
|
2009-08 |
期刊論文
|
An Image Authentication Based on Discrete Fourier Transform |
Kieu, T. D. and Chang, C. C. |
Fundamenta Informaticae
|
2009-08 |
期刊論文
|
Dual Digital Watermarking for Internet Media Based on Hybrid Strategies |
Lin, P. Y., Lee, J. S. and Chang, C. C. |
IEEE Transactions on Circuits and Systems for Video Technology
|
2009-07 |
期刊論文
|
A Lossless Data Embedding Technique by Joint Neighboring Coding |
Chang, C. C., Kieu, T. D. and Wu, W. C. |
Pattern Recognition
|
2009-07 |
期刊論文
|
A Parallel Conversion Algorithm Based upon Aryabhata Remainder Theorem for Residue Number System |
Chang, C. C. and Yang, J. H. |
International Journal of Innovative Computing, Information and Control
|
2009-07 |
期刊論文
|
A Secure Multicast Framework in Large and High-Mobility Network Groups |
Lee, J. S. and Chang, C. C. |
IEICE Transactions on Communications
|
2009-07 |
期刊論文
|
Data Hiding Based on VQ Compressed Images Using Hamming Codes and Declustering |
Tai, W. L. and Chang, C. C. |
International Journal of Innovative Computing, Information and Control
|
2009-06 |
期刊論文
|
A Novel Illumination-Balance Technique for Improving the Quality of Degraded Text-Photo Images |
Lee, J. S., Chen, C. H. and Chang, C. C. |
IEEE Transactions on Circuits and Systems for Video Technology
|
2009-06 |
期刊論文
|
An Efficient Proxy Raffle Protocol with Anonymity-Preserving |
Chang, C. C. and Cheng, T. F. |
Computer Standards & Interfaces
|
2009-06 |
期刊論文
|
An Improved Full-Search Scheme for the Vector Quantization Algorithm Based on Triangle Inequality |
Lu, T. C. and Chang, C. C. |
International Journal of Innovative Computing, Information and Control
|
2009-06 |
期刊論文
|
Concurrent Error Detection and Correction in Gaussian Normal Basis Multiplier over GF(2m) |
Chiou, C. W., Chang, C. C., Lee, C. Y., Hou, T. W. and Lin, J. M. |
IEEE Transactions on Computers
|
2009-06 |
期刊論文
|
Distortion-Free Steganography Mechanism with Compression to VQ Indices |
Chang, C. C., Lin, P. Y. and Wang, H. C. |
International Journal of Signal Processing, Image Processing and Pattern Recognition
|
2009-06 |
期刊論文
|
Lossless Compression Schemes of Vector Quantization Indices Using State Codebook |
Chang, C. C., Chen, G. M. and Lin, C. C. |
Journal of Computers
|
2009-06 |
期刊論文
|
Lossless Image Compression Based on Multiple-Tables Arithmetic Coding |
Chen, R. C., Pai, P. Y., Chan, Y. K. and Chang, C. C. |
Mathematical Problems in Engineering
|
2009-06 |
期刊論文
|
Preserving Robustness and Removability for Digital Watermarks Using Subsampling and Difference Correlation |
Chang, C. C., Lin, P. Y. and Yeh, J. S. |
Information Sciences
|
2009-06 |
期刊論文
|
Reversible Data Hiding Based on Histogram Modification of Pixel Differences |
Tai, W. L., Yeh, C. M. and Chang, C. C. |
IEEE Transactions on Circuits and Systems for Video Technology
|
2009-05 |
期刊論文
|
An ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on Elliptic Curve Cryptosystem |
Yang, J. H. and Chang, C. C. |
Computers and Security
|
2009-05 |
期刊論文
|
Distortion-Free Secret Image Sharing Mechanism Using Modulus Operator |
Lin, P. Y., Lee, J. S. and Chang, C. C. |
Pattern Recognition
|
2009-04 |
期刊論文
|
A Countable and Time-Bound Password-Based User Authentication Scheme for the Applications of Electronic Commerce |
Lin, I. C. and Chang, C. C. |
Information Sciences
|
2009-04 |
期刊論文
|
A Sudoku Based Wet Paper Hiding Scheme |
Kieu, T. D., Wang, Z. H., Chang, C. C. and Li, M. C. |
International Journal of Smart Home
|
2009-04 |
期刊論文
|
Three Improved Codebook Searching Algorithms for Image Compression Using Vector Quantizer |
Chang, C. C., Kuo, C. L. and Chen, C. C. |
International Journal of Computers and Applications
|
2009-03 |
期刊論文
|
A New Public-key Oblivious Fragile Watermarking for Image Authentication Using Discrete Cosine Transform |
Chang, C. C. and Chou, H. |
International Journal of Signal Processing, Image Processing and Pattern Recognition
|
2009-03 |
期刊論文
|
An Efficient Probability-based t out of n Secret Image Sharing Scheme |
Chang, C. C., Wang, Y. Z. and Chan, C. S. |
International Journal of Signal Processing, Image Processing and Pattern Recognition
|
2009-03 |
期刊論文
|
Enhanced Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks |
Chang, C. C., Lee, C. Y. and Chiu, Y. C. |
Computer Communications
|
2009-03 |
期刊論文
|
Lossless Information Hiding Scheme Based on Neighboring Correlation |
Chang, C. C. and Lu, T. C. |
International Journal of Signal Processing, Image Processing and Pattern Recognition
|
2009-03 |
期刊論文
|
Non-Iterative Privacy Preservation for Online Lotteries |
Lee, J. S., Chan, C. S. and Chang, C. C. |
IET Information Security
|
2009-03 |
期刊論文
|
Preventing Cheating in Computational Visual Cryptography |
Chang, C. C., Chen, T. H. and Liu, L. J. |
Fundamenta Informaticae
|
2009-02 |
期刊論文
|
A Data Embedding Scheme for Color Images Based on Genetic Algorithm and Absolute Moment Block Truncation Coding |
Chang, C. C., Chen, Y. H. and Lin, C. C. |
Soft Computing
|
2009-02 |
期刊論文
|
A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes |
Chang, C. C. and Chou, Y. C. |
Fundamenta Informaticae
|
2009-02 |
期刊論文
|
A Simple and Robust Authenticated Multiple Key Agreement Scheme |
Chang, C. C., Tsai, H. C. and Chiu, Y. C. |
International Journal of Security and Its Applications (IJSIA)
|
2009-02 |
期刊論文
|
An Information-Hiding Scheme Based on Quantization-Based Embedding Technique |
Lu, T. C., Chang, C. C. and Liu, Y. L. |
Fundamenta Informaticae
|
2009-02 |
期刊論文
|
Design of Electronic t-out-of-n Lotteries on the Internet |
Lee, J. S. and Chang, C. C. |
Computer Standards and Interfaces
|
2009-02 |
期刊論文
|
Hiding Data in Color Palette Images with Hybrid Strategies |
Chang, C. C., Lin, C. C. and Chen, Y. H. |
The Imaging Science Journal
|
2009-02 |
期刊論文
|
Novel Watermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel Patterns |
Wang, C. C., Chang, C. C. and Jan, J. K. |
Fundamenta Informaticae
|
2009-02 |
期刊論文
|
Roaming Across Wireless Local Area Networks Using SIM-Based Authentication Protocol |
Tsai, H. C., Chang, C. C. and Chang, K. J. |
Computer Standards & Interfaces
|
2009-02 |
期刊論文
|
Search-Order Coding Method with Indicator-elimination Property |
Chang, C. C., Chou, Y. C. and Hsieh, Y. P. |
Journal of Systems and Software
|
2009-01 |
期刊論文
|
An IC-Card-Based and Flexible t-out-of-n Electronic Voting Mechanism |
Chang, C. C. and Cheng, T. F. |
Journal of Computers
|
2009-01 |
期刊論文
|
Concurrent Error Detection and Correction in Dual Basis Multiplier over GF(2m) |
Chiou, C. W., Lee, C. Y., Lin, J. M., Hou, T. W. and Chang, C. C. |
IET Circuits, Devices and Systems
|
2009-01 |
期刊論文
|
Embedding Secret Binary Message Using Locally Adaptive Data Compression Coding |
Chang, C. C., Lee, C. F. and Chuang, L. Y. |
International Journal of Computer Sciences and Engineering Systems
|
2009-01 |
期刊論文
|
On the Security of A Copyright Protection Scheme Based on Visual Cryptography |
Chen, T. H., Chang, C. C., Wu, C. S. and Lou, D. C. |
Computer Standards & Interfaces
|
2009-01 |
期刊論文
|
Progressive Image Transmission Scheme for Lossless Images Using Prior Bitmap |
Chang, C. C., Lin, P. Y. and Chuang, J. C. |
Journal of Applied Sciences - Electronics and Information Engineering
|
2009-01 |
期刊論文
|
Reversible Information Hiding for VQ Indices Based on Locally Adaptive Coding |
Chang, C. C., Kieu, T. D. and Chou, Y. C. |
Journal of Visual Communication and Image Representation
|
2009-01 |
期刊論文
|
Robust t-out-of-n Oblivious Transfer Mechanism Based on CRT |
Chang, C. C. and Lee, J. S. |
Journal of Network and Computer Applications
|
2008-12 |
期刊論文
|
An Improvement of EMD Embedding Method for Large Payloads by Pixel Segmentation Strategy |
Lee, C. F., Chang, C. C. and Wang, K. H. |
Image and Vision Computing
|
2008-12 |
期刊論文
|
Data Hiding on Two-stage VQ Compression Codes |
Lin, C. N., Chang, C. C. and Chan, Y. K. |
The Imaging Science Journal (ISJ)
|
2008-12 |
期刊論文
|
Multilevel Reversible Data Hiding Based on Histogram Modification of Difference Images |
Lin, C. C., Tai, W. L. and Chang, C. C. |
Pattern Recognition
|
2008-11 |
期刊論文
|
Time-bound Based Authentication Scheme for Multi-server Architecture |
Chang, C. C., Lee, J. S. and Kuo, J. Y. |
International Journal of Innovative Computing, Information and Control
|
2008-10 |
期刊論文
|
A Two-Codebook Combination and Three-Phase Block Matching Based Image-Hiding Scheme with High Embedding Capacity |
Hsieh, Y. P., Chang, C. C. and Liu, L. J. |
Pattern Recognition
|
2008-10 |
期刊論文
|
Sharing Secrets in Stego Images with Authenticatio |
Chang, C. C., Hsieh, Y. P. and Lin, C. H. |
Pattern Recognition
|
2008-09 |
期刊論文
|
An Embedding Technique Based upon Block Prediction |
Wu, M. N., Lin, C. C. and Chang, C. C. |
Journal of Systems and Software
|
2008-09 |
期刊論文
|
Improving Line-Based Light Balancing for Text Images |
Chang, C. C., Chen, C. H. and Lin, P. Y. |
Journal of Applied Sciences - Electronics and Information Engineering
|
2008-09 |
期刊論文
|
Joint Coding and Embedding Techniques for Multimedia Images |
Chang, C. C., Wu, W. C. and Chen, Y. H. |
Information Sciences
|
2008-09 |
期刊論文
|
Secure Authentication Protocols for Mobile Commerce Transactions |
Lee, J. S., Chang, Y. F. and Chang, C. C. |
International Journal of Innovative Computing, Information and Control
|
2008-08 |
期刊論文
|
A Novel Key Management Scheme for Dynamic Multicast Communications |
Chang, C. C., Cheng, Y. F. and Lin, I. C. |
International Journal of Communication Systems
|
2008-08 |
期刊論文
|
An Extended Difference Expansion Algorithm for Reversible Watermarking |
Tseng, H. W. and Chang, C. C. |
Image and Vision Computing
|
2008-08 |
期刊論文
|
Efficient Optimal Pixel Grouping Schemes for AMBTC |
Tsou, C. C. Hu, Y. C. and Chang, C. C. |
The Imaging Science Journal
|
2008-08 |
期刊論文
|
Placing Chinese Phonetic Symbols on Mobile Phones Using Linear Programming |
Lin, C. Y. and Chang, C. C. |
International Journal of Innovative Computing, Information and Control
|
2008-07 |
期刊論文
|
A Probabilistic Visual Secret Sharing Scheme for Grayscale Images with Voting Strategy |
Chang, C. C., Lin, C. C., Le, T. H. N. and Le, H. B. |
International Journal of Intelligent Information Technology Application (IJIITA)
|
2008-07 |
期刊論文
|
Adaptive Watermark Mechanism for Rightful Ownership Protection |
Chang, C. C. and Lin, P. Y. |
Journal of Systems and Software
|
2008-07 |
期刊論文
|
High Capacity Data Hiding for Grayscale Images |
Chang, C. C., Chou, Y. C. and Kieu, T. D. |
Fundamenta Informaticae
|
2008-07 |
期刊論文
|
Lossless Data Hiding for Color Images Based on Block Truncation Coding |
Chang, C. C., Lin, C. Y. and Fan, Y. H. |
Pattern Recognition
|
2008-06 |
期刊論文
|
A Multi-policy Threshold Signature Scheme with Traceable Participant Cosigners |
Chu, C. H., Lin, H. F., Chang, C. C. and Chen, C. Y. |
International Journal of Innovative Computing, Information and Control
|
2008-06 |
期刊論文
|
A Novel Authentication Protocol for Multi-server Architecture without Smart Cards |
Lee, J. S., Chang, Y. F. and Chang, C. C. |
International Journal of Innovative Computing, Information and Control
|
2008-06 |
期刊論文
|
A Novel Secret Image Sharing Scheme in Color Images Using Small Shadow Images |
Chang, C. C., Lin, C. C., Lin, C. H. and Chen, Y. H. |
Information Sciences
|
2008-06 |
期刊論文
|
An Efficient Generalized Group-Oriented Signature Scheme |
Chen, C. Y., Lin, H. F. and Chang, C. C. |
International Journal of Innovative Computing, Information and Control
|
2008-06 |
期刊論文
|
Low-Computation Oblivious Transfer Scheme for Private Information Retrieval |
Huang, H. F. and Chang, C. C. |
International Journal of Innovative Computing, Information and Control
|
2008-06 |
期刊論文
|
Preserving Data Integrity with Variant Diffie-Hellman Protocol for Mobile Ad Hoc Networks |
Lee, J. S. and Chang, C. C. |
Security and Communication Networks
|
2008-06 |
期刊論文
|
Reversible Data-Embedding Scheme Using Differences Between Original and Predicted Pixel Values |
Chang, C. C., Lin, C. C. and Chen, Y. H. |
IET Information Security
|
2008-05 |
期刊論文
|
Lossless Nibbled Data Embedding Scheme Based on Difference Expansion |
Lu, T. C. and Chang, C. C. |
Image and Vision Computing
|
2008-04 |
期刊論文
|
A Novel High Capacity Reversible Information Hiding Scheme Based on Side-Match Prediction and Shortest Spanning Path |
Wu, M. N. and Chang, C. C. |
Circuits, Systems and Signal Processing
|
2008-04 |
期刊論文
|
LSB-Based Steganography Using Reflected Gray Code |
Chen, C. C. and Chang, C. C. |
IEICE Transactions on Information and Systems
|
2008-04 |
期刊論文
|
Reversible Data Embedding for Color Images |
Chang, C. C., Kieu, T. D. and Chou, Y. C. |
Journal of Digital Information Management
|
2008-03 |
期刊論文
|
A Novel Method for Progressive Image Transmission Using Blocked Wavelets |
Chang, C. C., Li, Y. C. and Lin, C. H. |
International Journal of Electronics and Communications
|
2008-03 |
期刊論文
|
Error Resilient Lempel-Ziv Data Compression Scheme with Perfect Hashing |
Chang, C. C. and Tseng, H. W. |
International Journal of Innovative Computing, Information and Control
|
2008-03 |
期刊論文
|
New Sealed-bid Electronic Auction with Fairness, Security and Efficiency |
Wu, C. C., Chang, C. C. and Lin, I. C. |
Journal of computer science and technology
|
2008-03 |
期刊論文
|
Reversible Steganographic Method with High Payload for JPEG Images |
Lin, C. Y., Chang, C. C. and Wang, Y. C. |
IEICE Transactions on Information and Systems
|
2008-02 |
期刊論文
|
A Novel Color Image Hiding Scheme Using Error Diffusion Technique |
Chuang, J. C., Chang, C. C. and Hu, Y. C. |
The Imaging Science Journal
|
2008-02 |
期刊論文
|
Digital Right Schemes for Limited Issues and Flexible Division |
Lin, C. C., Wu, C. C. and Chang, C. C. |
International Journal of Computer Science and Network Security
|
2008-02 |
期刊論文
|
Four-scanning Attack on Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery |
Chang, C. C., Fan, Y. H. and Tai, W. L. |
Pattern Recognition
|
2008-02 |
期刊論文
|
Novel Colour Image-hiding Scheme Using Error Diffusion Technique |
Chuang, J. C., Chang, C. C. and Hu, Y. C. |
The Imaging Science Journal
|
2008-02 |
期刊論文
|
Robust t-out-of-n Proxy Signature Based on RSA Cryptosystems |
Chang, Y. F. and Chang, C. C. |
International Journal of Innovative Computing, Information and Control
|
2008-02 |
期刊論文
|
Three-Phase Lossless Data Hiding Method for the VQ Index Table |
Chang, C. C., Lin, C. Y. and Hsieh, Y. P. |
Fundamenta Informaticae
|
2008-02 |
期刊論文
|
Using Dominance Searching to Speed up Temporal Join Operation |
Chen, C. Y., Hu, J. F. and Chang, C. C. |
International Journal of Innovative Computing, Information and Control
|
2008-01 |
期刊論文
|
A Color Image Authentication Method Using Partitioned Palette and Morphological Operations |
Chang, C. C. and Lin, P. Y. |
IEICE Transactions on Information and Systems
|
2008-01 |
期刊論文
|
A Friendly Password Mutual Authentication Scheme for Remote-Login Network Systems |
Chang, C. C. and Lee, C. Y. |
International Journal of Multimedia and Ubiquitous Engineering (IJMUE)
|
2008-01 |
期刊論文
|
A Novel Cryptographic Key Assignment Scheme with ID-Based Access Control in a Hierarchy |
Huang, H. F. and Chang, C. C. |
Fundamenta Informaticae
|
2008-01 |
期刊論文
|
A Novel Location Tracking Scheme for Reducing Location Updating Traffic in a Personal Communication System |
Chang, C. C., Lin, I. C. and Lin, M. H. |
Wireless Personal Communications
|
2008-01 |
期刊論文
|
Constructing a Conversation Key in Three-Party Communications Environment |
Chang, C. C., Su, Y. W. and Lee, C. Y. |
International Journal of Multimedia and Ubiquitous Engineering (IJMUE)
|
2008-01 |
期刊論文
|
Efficient Residue Number System Iterative Modular Multiplication Algorithm for Fast Modular Exponentiation |
Yang, J. H. and Chang, C. C. |
IET Computers & Digital Techniques
|
2008-01 |
期刊論文
|
Isolated Items Discarding Strategy for Discovering High Utility Itemsets |
Li, Y. C., Yeh, J. S. and Chang, C. C. |
Data & Knowledge Engineering
|
2008-01 |
期刊論文
|
Security Enhancement for a Three-Party Encrypted Key Exchange Protocol against Undetectable On-Line Password Guessing Attacks |
Chen, H. B., Chen, T. H., Lee, W. B. and Chang, C. C. |
Computer standards & Interfaces
|
2008- |
期刊論文
|
A Hybrid Strategy for Improving Illumination-Balance of Degraded Text-Photo Images |
Chang, C. C., Chen, C. H. and Lee, J. S. |
Journal of Science and Technology
|
2008- |
期刊論文
|
A Large Payload Data Embedding Technique for Color Images |
Chou, Y. C., Chang, C. C. and Li, K. M. |
Fundamenta Informaticae
|
2008- |
期刊論文
|
Adaptive Data Embedding Scheme Based on Similar and Dissimilar Clustering Strategies |
Chang, C. C., Lin, C. C. and Chen, Y. H. |
Fundamenta Informaticae
|
2007-12 |
期刊論文
|
A Progressive Image Transmission Technique Using Haar Wavelet Transformation |
Lu, T. C. and Chang, C. C. |
International Journal of Innovative Computing, Information and Control
|
2007-12 |
期刊論文
|
Adaptive Data Embedding Using VQ and Clustering |
Chen, Y. H., Chang, C. C. and Lin, C. C. |
International Journal of Innovative Computing, Information and Control
|
2007-12 |
期刊論文
|
Scalable and Systolic montgomery Multiplier over GF(2m) Generated by Trinomials |
Lee, C. Y., Chiou, C. W., Lin, J. M. and Chang, C. C. |
IET Circuits, Devices & Systems
|
2007-10 |
期刊論文
|
A Conference Key Distribution Scheme Using Interpolating Polynomials |
Chang, C. C., Lin, C. H. and Chen, C. Y. |
International Journal of Security and Its Applications (IJSIA)
|
2007-10 |
期刊論文
|
A Mutual Authenticated Key Agreement Scheme over Insecure Networks |
Chang, C. C., Lee, C. Y. and Su, Y. W. |
Journal of Discrete Mathematical Sciences & Cryptography
|
2007-10 |
期刊論文
|
An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards |
Chang, C. C., Tsai, H. C. and Chen, Y. H. |
International Journal of Security and Its Applications (IJSIA)
|
2007-10 |
期刊論文
|
Hiding Secret Information Using Adaptive Side-Match VQ |
Chang, C. C., Wu, W. C. and Tsou, C. C. |
IEICE Transactions on Information and Systems
|
2007-10 |
期刊論文
|
Reversible Data Hiding Schemes for Deoxyribonucleic ACID (DNA) Medium |
Chang, C. C., Lu, T. C. Chang, Y. F. and Lee, R. C. T. |
International Journal of Innovative Computing, Information and Control
|
2007-10 |
期刊論文
|
Security Enhancement for Digital Signature Schemes with Fault Tolerance in RSA |
Chang, C. C. and Lin, I. C. |
Information Sciences
|
2007-09 |
期刊論文
|
A New Steganographic Method for Color and Grayscale Image Hiding |
Yu, Y. H., Chang, C. C. and Lin, I. C. |
Computer Vision and Image Understanding
|
2007-09 |
期刊論文
|
Fragile Watermarking Scheme for Digital Image Authentication Using Pixel Difference |
Chang, C. C., Lin, P. Y. and Chuang, J. C. |
The Imaging Science Journal
|
2007-09 |
期刊論文
|
Lossless Data Embedding with High Embedding Capacity Based on Declustering for VQ-Compressed Images |
Chang, C. C., Hsieh, Y. P. and Lin, C. Y. |
IEEE Transactions on Information Forensics and Security
|
2007-09 |
期刊論文
|
Reversible Data Hiding in the VQ-Compressed Domain |
Chang, C. C., Chou, Y. C. and Lin, C. Y. |
IEICE Transactions on Information and Systems
|
2007-09 |
期刊論文
|
Security Enhancement of Key Authentication Schemes Based on Discrete Logarithms |
Lee, J. S. and Chang, C. C. |
Journal of Discrete Mathematical Sciences & Cryptography
|
2007-09 |
期刊論文
|
TFRP: An Efficient Microaggregation Algorithm for Statistical Disclosure Control |
Chang, C. C., Li, Y. C. and Huang, W. H. |
Journal of Systems and Software
|
2007-07 |
期刊論文
|
A Novel Image Hiding Scheme Based on VQ and Hamming Distance |
Chang, C. C., Tai, W. L. and Lin, C. C. |
Fundamenta Informaticae
|
2007-07 |
期刊論文
|
A Practical Electronic Payment System for Message Delivery Service in the Mobile Environment |
Lin, I. C. and Chang, C. C. |
Wireless Personal Communications
|
2007-07 |
期刊論文
|
A Survey of Information Hiding Schemes for Digital Images |
Chan, C. S. and Chang, C. C. |
International Journal of Computer Sciences and Engineering Systems
|
2007-07 |
期刊論文
|
MICF: An Effective Sanitization Algorithm for Hiding Sensitive Patterns on Data Mining |
Lee, Y. C., Yeh, J. S. and Chang, C. C. |
Advanced Engineering Informatics
|
2007-07 |
期刊論文
|
Novel Image Copy Detection with Rotating Tolerance |
Wu, M. N., Lin, C. C. and Chang, C. C. |
Journal of Systems and Software
|
2007-07 |
期刊論文
|
Reversible Hiding in DCT-Based Compressed Images |
Chang, C. C., Lin, C. C., Tseng, C. S. and Tai, W. L. |
Information Sciences
|
2007-06 |
期刊論文
|
A Novel Identity-Based Society Oriented Signature Scheme with Anonymous Signers |
Huang, H. F. and Chang, C. C. |
Applied Mathematics Sciences
|
2007-06 |
期刊論文
|
An SVD Oriented Watermark Embedding Scheme with High Qualities for the Restored Images |
Chang, C. C., Lin, C. C. and Hu, Y. S. |
International Journal of Innovative Computing, Information and Control
|
2007-06 |
期刊論文
|
Fast Planar-Oriented Ripple Search Algorithm for Hyperspace VQ Codebook |
Chang, C. C. and Wu, W. C. |
IEEE Transactions on Image Processing
|
2007-06 |
期刊論文
|
Lossless Recovery of a VQ Index Table with Embedded Secret Data |
Chang, C. C., Wu, W. C. and Hu, Y. C. |
Journal of Visual Communication and Image Representation
|
2007-06 |
期刊論文
|
Security Enhancement of an IC-Card-Based Remote Login Mechanism |
Cheng, T. F., Lee, J. S. and Chang, C. C. |
Computer Networks
|
2007-05 |
期刊論文
|
Anti-Pseudo-Gray Coding for VQ Encoded Images over Noisy Channels |
Tseng, H. W. and Chang, C. C. |
IEEE Communications Letters
|
2007-04 |
期刊論文
|
Attacks on Provably Secure Proxy-protected Signature Schemes Based on Factoring |
Wu, C. C. and Chang, C. C. |
Journal of Discrete Mathematical Sciences & Cryptography
|
2007-04 |
期刊論文
|
Reversible Steganographic Method Using SMVQ Approach Based on Declustering |
Chang, C. C. and Lin, C. Y. |
Information Sciences
|
2007-04 |
期刊論文
|
Secret Image Hiding and Sharing Based on the (t, n)-Threshold |
Chang, C. C., Lin, C. Y. and Tseng, C. S. |
Fundamenta Informaticae
|
2007-04 |
期刊論文
|
Simple Efficient Mutual Anonymity Protocols for Peer-to-Peer Network Based on Primitive Roots |
Chang, C. C., Lin, C. Y. and Lin, K. C. |
Journal of Network and Computer Applications
|
2007-03 |
期刊論文
|
A New t-out-n Oblivious Transfer with Low Bandwidth |
Huang, H. F. and Chang, C. C. |
Applied Mathematics Sciences
|
2007-03 |
期刊論文
|
Novel Scheme for Data Hiding Using Multiple Codebooks |
Yu, Y. H., Chang, C. C. and Hu, Y. C. |
The Imaging Science Journal
|
2007-03 |
期刊論文
|
Novel Scheme for Hiding Data Using Multiple Codebooks |
Yu, Y. H., Chang, C. C. and Hu, Y. C. |
The Imaging Science Journal
|
2007-03 |
期刊論文
|
Scheme for Hiding Images by Finding Optimal One-to-two Substitution Table Using Dynamic Programming Strategy |
Chan, C. S. and Chang, C. C. |
The Imaging Science Journal
|
2007-02 |
期刊論文
|
An Efficient Image Authentication Method Based on Hamming Code |
Chan, C. S. and Chang, C. C. |
Pattern Recognition
|
2007-02 |
期刊論文
|
Robust Non-interactive t-out-of-n Oblivious Transfer Based on the RSA Cryptosystem |
Chang, Y. F., Chang, C. C. and Cheng, Y.F. |
Journal of Discrete Mathematical Sciences and Cryptography
|
2007-01 |
期刊論文
|
A New Forward-Secure Blind Signature Scheme |
Huang, H. F. and Chang, C. C. |
Journal of Engineering and Applied Sciences
|
2007-01 |
期刊論文
|
An RSA-based (t, n) Threshold Proxy Signature Scheme with Freewill Identities |
Chang, Y. F. and Chang, C. C. |
International Journal of Information and Computer Security
|
2007-01 |
期刊論文
|
Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy |
Chang, Y. F. and Chang, C. C. |
Fundamenta Informaticae
|
2007-01 |
期刊論文
|
VQ Codebook Searching Algorithm Based on Correlation Property |
Chang, C. C., Lu, T. C. and Ya, J. B. |
Fundamenta Informaticae
|
2007- |
期刊論文
|
A Concealed t-out-of-n Signer Ambiguous Signature Scheme with a Variety of Keys |
Chang, Y. F., Chang, C. C. and Lin, P. Y. |
Informatica
|
2007- |
期刊論文
|
An Image Retrieval Method Based on Color-Complexity and Spatial-Histogram Features |
Wu, H. C. and Chang, C. C. |
Fundamenta Informaticae
|
2007- |
期刊論文
|
Anonymous Authentication Scheme for Wireless Communications |
Lee, J. S., Chang, C. C. and Chang, P. Y. |
International Journal of Mobile Communications
|
2007- |
期刊論文
|
Combined Association Rules for Dealing with Missing Values |
Shen, J. J., Chang, C. C. and Li, Y. C. |
Journal of Information Science
|
2007- |
期刊論文
|
Full-Searching-Equivalent Vector Quantization Method Using Two-Bounds Triangle Inequality |
Chang, C. C. and Chen, C. C. |
Fundamenta Informaticae
|
2006-12 |
期刊論文
|
A Multiauthority Electronic Voting Protocol Based upon a Blind Multisignature Scheme |
Lin, J. L., Lin, H. F. Chen, C. Y. and Chang, C. C. |
International Journal of Computer Science and Network Security (IJCSNS)
|
2006-12 |
期刊論文
|
An Efficient ID-Based User Identification Scheme for Mutual Authentication in Mobile Environments |
Chang, C. C. and Yang, J. H. |
Journal of Discrete Mathematical Sciences & Cryptography
|
2006-12 |
期刊論文
|
An Improvement of the Design of Integrating Subliminal Channel with Access Control |
Chang, C. C. and Wu, C. C. |
IAENG International Journal of Computer Science
|
2006-12 |
期刊論文
|
Comments on E-mail Protocols Providing Forward Secrecy |
Chang, Y. F., Chang, C. C. and Tai, W. L. |
Journal of Discrete Mathematical Sciences and Cryptography
|
2006-12 |
期刊論文
|
Comments on WLT Attack on An Enhanced Timestamp-based Password Authentication Scheme |
Chang, Y. C., Chang, C. C. and Kao, C. L. |
Journal of Discrete Mathematical Sciences & Cryptography
|
2006-12 |
期刊論文
|
Reversible Data Embedding Based on Prediction Approach for VQ and SMVQ Compressed Images |
Chang, C. C. and Lin, C. Y. |
Fundamenta Informaticae
|
2006-12 |
期刊論文
|
Reversible Steganography for VQ-compressed Images Using Side Matching and Relocation |
Chang, C. C. and Lin, C. Y. |
IEEE Transactions on Information Forensics and Security
|
2006-12 |
期刊論文
|
Security Enhancement of Yang-Li Hierarchical Access Control Mechanism |
Chang, C. C. and Lee, J. S. |
Journal of Discrete Mathematical Sciences & Cryptography
|
2006-11 |
期刊論文
|
An Improved Deniable Authentication Protocol |
Lin, C. C. and Chang, C. C. |
International Journal of Computer Science and Network Security (IJCSNS)
|
2006-11 |
期刊論文
|
New Image Steganographic Methods Using Run-Length Approach |
Chang, C. C., Lin, C. Y. and Wang, Y. Z. |
Information Sciences
|
2006-10 |
期刊論文
|
A Reversible Data Hiding Scheme Based on Side Match Vector Quantization |
Chang, C. C., Tai, W. L. and Lin, C. C. |
IEEE Transactions on Circuits and Systems for Video Technology
|
2006-10 |
期刊論文
|
An Image Coding Scheme Using SMVQ and Support Vector Machines |
Chang, C. C. and Liao, C. T. |
Neurocomputing
|
2006-10 |
期刊論文
|
Hiding Secret Data Adaptively in VQ Index Tables |
Chang, C. C. and Wu, W. C. |
IEE Proceedings-Vision, Image and Signal Processing
|
2006-10 |
期刊論文
|
Using a Simple and Fast Image Compression Algorithm to Hide Secret Information |
Chuang, J. C. and Chang, C. C. |
International Journal of Computers and Applications
|
2006-09 |
期刊論文
|
Colour Image-hiding Scheme Using Human Visual System |
Chang, C. C., Chou, H. and Lin, C. C. |
The Imaging Science Journal
|
2006-08 |
期刊論文
|
Secure Communications for Cluster-based Ad Hoc Networks Using Node Identities |
Lee, J. S. and Chang, C. C. |
Journal of Network and Computer Applications
|
2006-07 |
期刊論文
|
A Content-based Image Authentication Scheme Based on Singular Value Decomposition |
Lu, T. C., Chang, C. C. and Liu, Y. L. |
Pattern Recognition and Image Analysis: Advances in Mathematical Theory and Applications
|
2006-07 |
期刊論文
|
An Efficient and Secure Remote Authentication Scheme Using Smart Cards |
Chang, C. C. and Lee, J. S. |
Information & Security
|
2006-07 |
期刊論文
|
Choosing t-out-of-n Secrets by Oblivious Transfer |
Lee, J. S. and Chang, C. C. |
Information & Security
|
2006-07 |
期刊論文
|
Fast Codebook Search Algorithms Based on Tree-Structured Vector Quantization |
Chang, C. C., Li, Y. C. and Yeh, J. B. |
Pattern Recognition Letters
|
2006-06 |
期刊論文
|
A Color Re-Indexing Scheme Using Genetic Algorithm |
Wu, M. N., Lin, C. C. and Chang, C. C. |
WSEAS Transactions on Systems
|
2006-06 |
期刊論文
|
A Novel Index Coding Scheme for Vector Quantization |
Chang, C. C., Chen, G. M. and Hu, Y. C. |
Fundamenta Informaticae
|
2006-06 |
期刊論文
|
A Novel Watermarking Scheme Based on Rehashing and Vector Quantization |
Lin, C. C., Hu, Y. C. and Chang, C. C. |
Fundamenta Informaticae
|
2006-06 |
期刊論文
|
A Robust Content-Based Copy Detection Scheme |
Wu, M. N., Lin, C. C. and Chang, C. C. |
Fundamenta Informaticae
|
2006-06 |
期刊論文
|
Image Hiding Scheme with Modulus Function and Dynamic Programming Strategy on Partitioned Pixels |
Chang, C. C., Chan, C. S. and Fan, Y. H. |
Pattern Recognition
|
2006-05 |
期刊論文
|
A Novel Efficient (t,n) Threshold Proxy Signature Scheme |
Huang, H. F. and Chang, C. C. |
Information Sciences
|
2006-04 |
期刊論文
|
A Watermarking-Based Image Ownership and Tampering Authentication Scheme |
Chang, C. C., Hu, Y. S. and Lu, T. C. |
Pattern Recognition Letters
|
2006-04 |
期刊論文
|
An Anonymous and Flexible t-out-of-n Electronic Voting Scheme |
Lee, J. S. and Chang, C. C. |
Journal of Discrete Mathematical Sciences & Cryptography
|
2006-03 |
期刊論文
|
A Secure and Efficient Authentication Scheme for Mobile Users |
Chang, Y. F., Lee, J. S. and Chang, C. C. |
International Journal of Mobile Communications
|
2006-03 |
期刊論文
|
An Efficient and Flexible Forward-Secure Signature Scheme |
Huang, H. F. and Chang, C. C. |
International Journal of Computer Science and Network Security (IJCSNS)
|
2006-03 |
期刊論文
|
Hiding a Halftone Secret Image in Two Camouflaged Halftone Images |
Chang, C. C., Chan, C. S. and Tai, W. L. |
Pattern Recognition and Image Analysis: Advances in Mathematical Theory and Applications
|
2006-02 |
期刊論文
|
Efficient Multi-proxy Multi-signature Schemes Based on DLP |
Chang, Y. F. and Chang, C. C. |
International Journal of Computer Science and Network Security
|
2006-01 |
期刊論文
|
A New Solution for Assigning Cryptographic Keys to Control Access in Mobile Agent Environments |
Chang, C. C. and Lin, I. C. |
Wireless Communications and Mobile Computing
|
2006-01 |
期刊論文
|
A Secure E-coupon System for Mobile Users |
Chang, C. C., Wu, C. C. and Lin, I. C. |
International Journal of Computer Science & Network Security
|
2006- |
期刊論文
|
A Difference Expansion Oriented Data Hiding Scheme for Restoring the Original Host Images |
Chang, C. C. and Lu, T. C. |
The Journal of Systems and Software
|
2006- |
期刊論文
|
A New Edge Detection Approach Based on Image Context Analysis |
Yu, Y. H. and Chang, C. C. |
Image and Vision Computing
|
2006- |
期刊論文
|
A Novel Image Ownership Protection Scheme Based on Rehashing Concept and Vector Quantization |
Lin, C. C. , Hu, Y. C. and Chang, C. C. |
Fundamenta Informaticae
|
2006- |
期刊論文
|
A Parallel Residue-to-Binary Conversion Algorithm Without Trial Division |
Chang, C. C. and Lai, Y. P. |
Computers and Electrical Engineering
|
2006- |
期刊論文
|
An Access Control System with Time-constraint Using Support Vector Machines |
Chang, C. C., Lin, I. C. and Liao, C. T. |
International Journal of Network Security
|
2006- |
期刊論文
|
An Anonymous Voting Mechanism Based on the Key Exchange Protocol |
Chang, C. C. and Lee, J. S. |
Computers and Security
|
2006- |
期刊論文
|
An Improved Tree-Structured Codebook Search Algorithm for Grayscale Image Compression |
Hu, Y. C. and Chang, C. C. |
Funamenta Informaticae
|
2006- |
期刊論文
|
Color Image Retrieval Technique Based on Color Features and Image Bitmap |
Lu, T. C. and Chang, C. C. |
Information Processing and Management (IP&M)
|
2006- |
期刊論文
|
Comments on the Electronic Voting Protocol for General Elections |
Chang, Y. F., Lee, J. S. and Chang, C. C. |
GESTS International Transactions on Computer Science and Engineering
|
2006- |
期刊論文
|
Error Resilient Locally Adaptive Data Compression |
Tseng, S. W. and Chang, C. C. |
Journal of Systems and Software
|
2006- |
期刊論文
|
Image Hiding Scheme Using Modulus Function and Optimal Substitution Table |
Chan, C. S., Chang, C. C. and Hu, Y. C. |
Pattern Recognition and Image Analysis
|
2006- |
期刊論文
|
Perfect Hashing Schemes for Mining Traversal Patterns |
Chang, C. C., Lin, C. Y. and Chou, H. C. |
Fundamenta Informaticae
|
2006- |
期刊論文
|
Privacy-preserving Mining of Association Rules on Distributed Databases |
Chang, C. C., Yeh, J. S. and Li, Y. C. |
International Journal of Computer Science and Network Security (IJCSNS)
|
2006- |
期刊論文
|
Removing Blocking Effects Using An Artificial Neural Network |
Chang, C. C., Chan, C. S. and Tseng, C. S. |
Signal Processing
|
2006- |
期刊論文
|
Reversible Index-domain Information Hiding Scheme Based on Side-Match Vector Quantization |
Chang, C. C. and Lu, T. C. |
Journal of Systems and Software
|
2006- |
期刊論文
|
Spatial Domain Image Hiding Scheme Using Pixel-Values Differencing |
Chang, C. C., Chuang, J. C. and Hu, Y. C. |
Fundamenta Informaticae
|
2005-12 |
期刊論文
|
A Secure and Authentic Electronic Patient Records Transmission Scheme Based on Two-Based Number Conversion |
Tsai, P. Y., Hu, Y. C. and Chang, C. C. |
The Imaging Science Journal
|
2005-12 |
期刊論文
|
An Iterative Modular Multiplication Algorithm in RNS |
Yang, J. H., Chang, C. C. and Wang, C. H. |
Applied Mathematics and Computation
|
2005-12 |
期刊論文
|
Hiding a Secret Color Image in Two Color Images |
Chang, C. C., Tai, W. L. and Lin, C. C. |
The Imaging Science Journal
|
2005-11 |
期刊論文
|
An Image Zooming Technique Based on Vector Quantization Approximation |
Chang, C. C., Chou, Y. C., Yu, Y. H. and Shih, K. J. |
Image and Vision Computing
|
2005-10 |
期刊論文
|
A Time-Stamping Protocol for Digital Watermarking |
Hwang, M. S., Hwang, K. F. and Chang, C. C. |
Applied Mathematics and Computation
|
2005-10 |
期刊論文
|
Fast Search Algorithm for Vector Quantization without Extra Look-up Table Using Declustered Sub-codebooks |
Chang, C. C. and Lin, I. C. |
IEE Proceedings-Vision, Image and Signal Processing
|
2005-09 |
期刊論文
|
A (t,n) Threshold Secret Sharing System with Efficient Identification of Cheaters |
Lin, I. C. and Chang, C. C. |
Computing and Informatics
|
2005-09 |
期刊論文
|
A Novel Digital Image Watermarking Scheme Based on the Vector Quantization Technique |
Wu, H. C. and Chang, C. C. |
Computers & Security
|
2005-09 |
期刊論文
|
A Novel Image Authentication Scheme Based on Quadtree Segmentation |
Chan, C. S., Chang, C. C. and Hu, Y. C. |
The Imaging Science Journal
|
2005-09 |
期刊論文
|
A Steganographic Method for Hiding Secret Data Using Side Match Vector Quantization |
Chang, C. C. and Wu, W. C. |
IEICE Transactions on Information and Systems
|
2005-09 |
期刊論文
|
A Very Low Bit Rate Image Compressor Using Transformed Classified Vector Quantization |
Tseng, H. W. and Chang, C. C. |
Informatica
|
2005-09 |
期刊論文
|
Hiding Data in Halftone Images |
Tseng, H. W. and Chang, C. C. |
Informatica
|
2005-09 |
期刊論文
|
Novel Image Authentication Scheme Based on Quadtree Segmentation |
Tsai, P. Y., Hu, Y. C. and Chang, C. C. |
The Imaging Science Journal
|
2005-08 |
期刊論文
|
Authentication Schemes with No Verification Table |
Chang, Y. F. and Chang, C. C. |
Applied Mathematics and Computation
|
2005-07 |
期刊論文
|
A Scheme for Threshold Multi-secret Sharing |
Chan, C. W. and Chang, C. C. |
Applied Mathematics and Computation
|
2005-07 |
期刊論文
|
SVD-based Digital Image Watermarking Scheme |
Chang, C. C., Tsai, P. Y., and Lin, M. H. |
Pattern Recognition Letters
|
2005-07 |
期刊論文
|
Sharing Visual Multi-secrets Using Circle Shares |
Wu, H. C. and Chang, C. C. |
Computer Standards & Interfaces
|
2005-07 |
期刊論文
|
The General Pay-Word: A Micro-payment Scheme Based on n-dimension One-way Hash Chain |
Lin, I. C., Hwang, M. S. and Chang, C. C. |
The International Journal of Designs, Codes, and Cryptography
|
2005-05 |
期刊論文
|
A Novel Steganography Mechanism Using Evolutionary Approach for Color Images |
Wu, M. N., Lin, C. C., Tai, W. L. and Chang, C. C. |
GESTS International Transaction on Computer Science and Engineering
|
2005-05 |
期刊論文
|
Efficient Authentication Protocols of GSM |
Chang, C. C., Lee, J. S. and Chang, Y. F. |
Computer Communications
|
2005-05 |
期刊論文
|
Hiding Secret Data in Images via Predictive Coding |
Yu, Y. H., Chang, C. C. and Hu, Y. C. |
Pattern Recognition
|
2005-04 |
期刊論文
|
An ID-Based Multisignature Scheme without Reblocking and Predetermined Signing Order |
Chang, C. C., Lin, I. C. and Lam, K. Y. |
Computer Standards and Interfaces
|
2005-03 |
期刊論文
|
An Information Hiding Scheme Based Upon Block Truncation Coding |
Chuang J. C. and Chang, C. C. |
International Journal of Computers and Applications
|
2005-03 |
期刊論文
|
Perfect Hashing Schemes for Mining Association Rules |
Chang, C. C. and Lin, C. Y. |
The Computer Journal
|
2005-02 |
期刊論文
|
A Fast Modular Square Computing Method Based on The Generalized Chinese Remainder Theorem for Prime Module |
Chang, C. C. and Lai, Y. P. |
Applied Mathematics and Computation
|
2005-02 |
期刊論文
|
A Side Match Reconstruction Method Using Tree-Structured VQ for Transmitting Images Progressively |
Hung, K. L, Chang, C. C. and Chen, T. S. |
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science
|
2005-02 |
期刊論文
|
Digital Signature with Message Recovery Using Self-certified Public Keys without Trustworthy System Authority |
Chang, Y. F., Chang, C. C. and Huang, H. F. |
Applied Mathematics and Computation
|
2005-01 |
期刊論文
|
A Color Image Hiding Scheme Using Image Differencing |
Chan, C. S., Chang, C. C. and Hu, Y. C. |
Optical Engineering
|
2005-01 |
期刊論文
|
A Division Algorithm for Residue Numbers |
Chang, C. C. and Lai, Y. P. |
Applied Mathematics and Computation
|
2005-01 |
期刊論文
|
An Efficient Authentication Protocol for Mobile Satellite Communication Systems |
Chang, Y. F. and Chang, C. C. |
ACM Operating Systems Review
|
2005-01 |
期刊論文
|
Color Image Hiding Scheme Using Image Differencing |
Chan, C. S., Chang, C. C. and Hu, Y. C. |
Optical Engineering
|
2005- |
期刊論文
|
A Dynamic Mechanism for Determining Relationships in a Partially Ordered User Hierarchy |
Chang, C. C., Lin, I. C. and Tsai, H. M. |
International Journal of High Performance Computing and Networking
|
2005- |
期刊論文
|
A Genetic-Based Adaptive Threshold Selection Method for Dynamic Path Tree Structured Vector Quantization |
Yu, Y. H., Chang, C. C. and Hu, Y. C. |
Image and Vision Computing
|
2005- |
期刊論文
|
A New Density-Based Scheme for Clustering Based on Genetic Algorithm |
Lin, C. Y., Chang, C. C. and Lin, C. C. |
Fundamenta Informaticae
|
2005- |
期刊論文
|
An Image Hiding Scheme Based on Multi-bit-reference Substitution Table Using Dynamic Programming Strategy |
Chan, C. S. and Chang, C. C. |
Fundamenta Informaticae
|
2005- |
期刊論文
|
An Inverse Halftoning Technique Using Modified Look-Up Tables |
Chang, C. C. and Chan, C. S. |
Fundamenta Informaticae
|
2005- |
期刊論文
|
Cryptanalysis of the Modified Remote Login Authentication Scheme Based on a Geometric Approach |
Chang, C. C. and Lin, I. C. |
Informatica
|
2005- |
期刊論文
|
Data Compressor for VQ Index Tables |
Lu, T. C. and Chang, C. C. |
Fundamenta Informaticae
|
2005- |
期刊論文
|
Mobile Payment for Off-line Vender Machines |
Chang, C. C., Chang, Y. F. and Lee, J. S. |
International Journal of Computer Science and Network Security
|
2005- |
期刊論文
|
On the Design Weakness of Chen-Huang Dynamic Access Control Mechanism |
Chang, C. C. and Lee, J. S. |
International Journal of Computer Science and Network Security
|
2005- |
期刊論文
|
Schemes for Digital Gift Certificates with Low Computation Complexity |
Chang, C. C. and Chang Y. F. |
Informatica
|
2004-11 |
期刊論文
|
A New Design of Efficient Partially Blind Signature Scheme |
Hwang, H. F. and Chang, C. C. |
Journal of Systems and Software
|
2004-11 |
期刊論文
|
Embedding Invisible Watermarks into Digital Images Based on Side-Match Vector Quantization |
Wu, H. C. and Chang, C. C. |
Fundamenta Informaticae
|
2004-10 |
期刊論文
|
A Convertible Group Signature Scheme |
Chang, C. C. and Lai, Y. P. |
ACM Operating Systems Review
|
2004-10 |
期刊論文
|
An Improvement of Delegated Multi signature Scheme with Document Decomposition |
Chang, C. C. and Lin, I. C. |
ACM Operating Systems Review
|
2004-10 |
期刊論文
|
Remarks on Fingerprint-based Remote User Authentication Scheme Using Smart Cards |
Chang, C. C. and Lin, I. C. |
ACM Operating Systems Review
|
2004-09 |
期刊論文
|
A New Scheme to Protect Confidential Image |
Chang, C. C. and Hwang, R. J. |
Journal of Interconnection Networks
|
2004-09 |
期刊論文
|
A Steganographic Method for Digital Images Using Side Match |
Chang, C. C. and Tseng, H. W. |
Pattern Recognition Letters
|
2004-08 |
期刊論文
|
Information Hiding Based on Search-Order Coding for VQ Indices |
Chang, C. C., Chen, G. M. and Lin, M. H. |
Pattern Recognition Letters
|
2004-08 |
期刊論文
|
Signing a Digital Signature without Using One-way Hash Functions and Message Redundancy Schemes |
Chang, C. C. and Chang, Y. F. |
IEEE Communications Letters
|
2004-07 |
期刊論文
|
A Secure and Efficient Strong-password Authentication Protocol |
Chang, Y. F. and Chang, C. C. |
ACM Operating Systems Review
|
2004-07 |
期刊論文
|
An Improvement on a Deniable Authentication Protocol |
Chang, Y. F., Chang, C. C. and Kao, C. L. |
ACM Operating Systems Review
|
2004-07 |
期刊論文
|
Multisignatures with Distinguished Signing Authorities for Sequential and Broadcasting Architectures |
Huang, H. F. and Chang, C. C. |
Computer Standards and Interfaces
|
2004-06 |
期刊論文
|
Fast Edge-Based Method for Image Magnification |
Chang, C. C. and Chen, G. I. |
The Imaging Science Journal
|
2004-05 |
期刊論文
|
An Adaptive Bit Rate Encoding Mechanism Based on Irregular Sampling and Side-Match Vector Quantization |
Tsai, P. Y., Chang, C. C., Lin, M. H. and Hu, Y. C. |
Image Science Journal
|
2004-02 |
期刊論文
|
An Efficient Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks |
Chang, Y. F., Chang, C. C. and Yang, J. H. |
Computer Standards and Interfaces
|
2004-01 |
期刊論文
|
A Color Image Watermarking Scheme Based on Color Quantization |
Tsai, P. Y., Hu, Y. C. and Chang, C. C. |
Signal Processing
|
2004- |
期刊論文
|
A Branch-and-Bound Algorithm for the Construction of Reversible Variable Length Codes |
Tseng, H. W. and Chang, C. C. |
The Computer Journal
|
2004- |
期刊論文
|
A Fair and Secure Mobile Agent Environment Based on Blind Signature and Proxy Host |
Lin, M. H, Chang, C. C. and Chen, Y. R. |
Computers & Security
|
2004- |
期刊論文
|
A High-Speed Division Algorithm in Residue Number System Using Parity-Checking Technique |
Yang, J. H., Chang, C. C. and Chen, C. Y. |
International Journal of Computer Mathematics (IJCM)
|
2004- |
期刊論文
|
A Lossless Compression-based Progressive Image Transmission Scheme |
Hung, K. L., Chang, C. C. and Lin, I. C. |
The Imaging Science Journal
|
2004- |
期刊論文
|
A New Cryptographic Key Assignment Scheme with Time-Constraint Access Control in a Hierarchy |
Hwang, H. F. and Chang, C. C. |
Computer Standards and Interfaces
|
2004- |
期刊論文
|
A New Scheme for Server-Aided Secret Exponentiation Computation Based on Interpolating Polynomials |
Chan, C. W. and Chang, C. C. |
International Journal of Computational and Numerical Analysis and Applications
|
2004- |
期刊論文
|
A Novel Data Hiding Scheme for Halftone Images |
Chang, C. C. and Chuang, J. C. |
Pattern Recognition and Image Analysis
|
2004- |
期刊論文
|
A Novel Lower Cost Crypto-scheme Based on the Theory of Sharing Secrets |
Chan, C. W. and Chang, C. C. |
Information & Security
|
2004- |
期刊論文
|
A Novel Three-party Encrypted Key Exchange Protocol |
Chang, C. C. and Chang, Y. F. |
Computer Standards and Interfaces
|
2004- |
期刊論文
|
A Pattern Mapping Based Digital Image Watermarking |
Tsai, C. S. and Chang, C. C. |
Informatica
|
2004- |
期刊論文
|
A Progressive Secret Reveal System Based on SPIHT Image Transmission |
Tsai, P. Y., Hu, Y. C. and Chang, C. C. |
Signal Processing: Image Communication
|
2004- |
期刊論文
|
A Repeating Color Watermarking Scheme Based on Human Visual Model |
Tsai, C. S. and Chang, C. C. |
EURASIP Journal on Applied Signal Processing
|
2004- |
期刊論文
|
A Secure One-time Password Authentication Scheme Using Smart Cards without Limiting Login Times |
Chang, Y. F., Chang, C. C. and Kuo, J. Y. |
ACM Operating Systems Review
|
2004- |
期刊論文
|
A Secure One-time Password Authentication Scheme with Low Computation for Mobile Communications |
Lin, M. H. and Chang, C. C. |
ACM Operating Systems Review
|
2004- |
期刊論文
|
Adaptive Bit Rate Encoding Mechanism Based on Irregular Sampling and Side-match Vector Quantization |
Tsai, P. Y., Chang, C. C., Lin, M. H. and Hu, Y. C. |
The Image Science Journal
|
2004- |
期刊論文
|
An Adaptive Steganographic Scheme for Color Image |
Chang, C. C., Tsai, P. Y. and Lin, M. H. |
Fundamenta Informaticae
|
2004- |
期刊論文
|
An Effective Codebook Search Algorithm for Vector Quantization |
Hu, Y. C. and Chang, C. C. |
Image Science Journal
|
2004- |
期刊論文
|
An Efficient Approach for Face Detection and Facial Feature Location Using Prune-and-Search Technique |
Chang, C. C. and Yu, Y. H. |
International Journal of Pattern Recognition and Artificial Intelligence
|
2004- |
期刊論文
|
An Efficient Data Structure for Automatic Knowledge Discovery from Database |
Changchien, S. W., Lu, T. C. and Chang, C. C. |
International Journal of Computational and Numerical Analysis and Applications
|
2004- |
期刊論文
|
An Efficient Graph-Based Method for Parallel Mining Problems |
Chang, C. C., Lin, C. Y. and Lin, P. Y. |
Journal of Information & Knowledge Management (JIKM)
|
2004- |
期刊論文
|
An Efficient and Practical Remote User Authentication Scheme |
Chang, Y. F. and Chang, C. C. |
Information & Security
|
2004- |
期刊論文
|
An Improvement to Image Segment Based on Human Visual System for Object-based Coding |
Tsai, C. S. and Chang, C. C. |
Fundamenta Informaticae
|
2004- |
期刊論文
|
Block Image Retrieval Based on a Compressed Linear Quadtree |
Chan, Y. K. and Chang, C. C. |
Image and Vision Computing Journal
|
2004- |
期刊論文
|
E-traveler’s Checks with Reciprocal Authentication |
Chang, Y. F. and Chang, C. C. |
Journal of Electronic Commerce Research
|
2004- |
期刊論文
|
End-to-End Security Protocols for Mobile Communications with End-User Identification/Authentication |
Chang, C. C., Chen, K. L. and Hwang, M. S. |
Wireless Personal Communications
|
2004- |
期刊論文
|
Fast Cascade Exponentiation Schemes Based on String Compression Algorithm |
Wang, C. T., Chang, C. C. and Lin, C. H. |
Asian Journal of Information Technology
|
2004- |
期刊論文
|
Hiding Data in Multitone Images for Data Communications |
Chang, C. C., Chuang, J. C. and Lai, Y. P. |
IEE Proceedings-Vision, Images, and Signal Processing
|
2004- |
期刊論文
|
High Capacity Data Hiding in JPEG-Compressed Images |
Tseng, H. W. and Chang, C. C. |
Informatica
|
2004- |
期刊論文
|
Improvement of Password Authentication Schemes without Adopting the Public-key Cryptosystem |
Chang, C. C. and Lee, J. S. |
International Journal of Computational and Numerical Analysis and Applications
|
2004- |
期刊論文
|
Novel Full-Search Schemes for Speeding up Image Coding Using Vector Quantization |
Chang, C. C. and Lin, I. C. |
Real-Time Imaging
|
2004- |
期刊論文
|
Password Authentication without the Server Public Key |
Chang, Y. F., Chang, C. C. and Liu, Y. L. |
IEICE Transactions on Communications
|
2004- |
期刊論文
|
Public-Key Inter-Block Dependence Fragile Watermarking for Image Authentication Using Continued Fraction |
Chang, C. C., Wu, W. C. and Hu, Y. C. |
Informatica
|
2004- |
期刊論文
|
Quadtree-Segmented Image Compression Method Using Vector Quantization and Cubic B-Spline Interpolation |
Chang, C. C., Chuang, J. C. and Chung, C. Y. |
The Imaging Science Journal
|
2004- |
期刊論文
|
Retrieving Digital Images from a JPEG Compressed Image Database |
Chang, C. C., Chuang, J. C. and Hu, Y. S. |
Image and Vision Computing
|
2004- |
期刊論文
|
Scenery Image Segmentation Using Support Vector Machines |
Yu, Y. H. and Chang, C. C. |
Fundamenta Informaticae
|
2004- |
期刊論文
|
Side-match Prediction Encoding Scheme for Predefined Vector Quantization Approximation Rates |
Tsai P. Y., Lin, M. H. and Chang, C. C. |
The Imaging Science Journal
|
2004- |
期刊論文
|
Similar Image Retrieval Based on Wavelet Transformation |
Chang, C. C., Chuang, J. C. and Hu, Y. S. |
International Journal of Wavelets, Multiresolution and Information Processing (IJWMIP)
|
2004- |
期刊論文
|
VQ-Based Image Watermarking Using Anti-Gray Coding |
Chang, C. C. and Tseng, H. W. |
Informatica
|
2003-10 |
期刊論文
|
Using Set Partitioning in Hierarchical Trees to Authenticate Digital images |
Tsai, P. Y., Hu, Y. C. and Chang, C. C. |
Signal Processing: Image Communication
|
2003-09 |
期刊論文
|
Taiwan: Focus on the Information Security Market |
Chang, C. C. and Lee, W. B. |
IT Professional Magazine
|
2003-09 |
期刊論文
|
The Strategy of Reducing the Location Update Traffic Using Forwarding Pointers in Virtual Layer Architecture |
Chang, C. C. and Lin, I. C. |
Computer Standards and Interfaces
|
2003-08 |
期刊論文
|
Guessing by Neighbors: An Efficient Reconstruction Method for Transmitting Image Progressively |
Chang, C. C., Shih, T. K. and Lin, I. C. |
Visual Computer
|
2003-07 |
期刊論文
|
Finding Optimal Least-Significant-Bit Substitution in Image Hiding by Dynamic Programming Strategy |
Chang, C. C., Hsiao, J. Y. and Chan, C. S. |
Pattern Recognition
|
2003-05 |
期刊論文
|
Security Enhancement for the Anonymous Secure E-Voting over a Network |
Lin, I. C., Hwang, M. S. and Chang, C. C. |
Computer Standards and Interfaces
|
2003-03 |
期刊論文
|
A Fast and Simple Algorithm for the Construction of Asymmetrical Reversible Variable Length Codes |
Tseng, H. W. and Chang, C. C. |
Journal of Real Time Imaging
|
2003-03 |
期刊論文
|
A Self-Encryption Mechanism for Authentication of Roaming and Teleconference Services |
Hwang, K. F. and Chang, C. C. |
IEEE Transactions on Wireless Communications
|
2003-02 |
期刊論文
|
Enhancement Algorithm for Nonlinear Context-Based Predictors |
Chang, C. C. and Chen, G. I. |
IEE Proceedings-Vision Image and Signal Processing
|
2003-02 |
期刊論文
|
Error Prevention and Resilience of VQ Encoded Images |
Hung, K. L. and Chang, C. C. |
Signal Processing
|
2003-02 |
期刊論文
|
New Irregular Sampling Coding Method for Transmitting Images Progressively |
Hung, K. L. and Chang, C. C. |
IEE Proceedings-Vision Image and Signal Processing
|
2003-02 |
期刊論文
|
Parallel Computational Algorithms for Generalized Chinese Remainder Theorem |
Lai, Y. P. and Chang, C. C. |
Computers and Electrical Engineering
|
2003- |
期刊論文
|
A DWT-based Deblocking Technique Based on Edge Detection and Zero Masking for Blocking Effect |
Tsai, C. S. and Chang, C. C. |
Fundamenta Informaticae
|
2003- |
期刊論文
|
A Flexible Date Attachment Scheme on E-Cash |
Chang, C. C. and Lai, Y. P. |
Computers and Security
|
2003- |
期刊論文
|
A New Channel for Image Hiding Based on Interpolating polynomials |
Chan, C. W. and Chang, C. C. |
Fundamenta Informaticae
|
2003- |
期刊論文
|
A New Key Assignment Scheme for Enforcing Complicated Access Control Policies in Hierarchy |
Lin, I. C., Hwang, M. S. and Chang, C. C. |
Future Generation Computer Systems
|
2003- |
期刊論文
|
A Watermarking Scheme Based on Principal Component Analysis Technique |
Chang, C. C. and Chan, C. S. |
Informatica
|
2003- |
期刊論文
|
An Efficient Multi-Exponentiation Scheme Based on Modified Booth’s Method |
Lai, Y. P. and Chang, C. C. |
International Journal of Electronics
|
2003- |
期刊論文
|
An Efficient Protocol for Anonymous Multicast and Reception |
Chang, C. C. and Chung, C. Y. |
Information Processing Letters
|
2003- |
期刊論文
|
An Efficient and Practical (t, n) Threshold Proxy Signature Scheme with Known Signers |
Huang, H. F. and Chang, C. C. |
Fundamenta Informaticae
|
2003- |
期刊論文
|
Construction of Symmetrical Reversible Variable Length Codes Using Backtracking |
Tseng, H. W. and Chang, C. C. |
The Computer Journal
|
2003- |
期刊論文
|
Edge Detection Using Block Truncation Coding |
Hu, Y. C. and Chang, C. C. |
International Journal of Pattern Recognition and Artificial Intelligence
|
2003- |
期刊論文
|
Efficient Anonymous Auction Protocols with Freewheeling Bids |
Chang, C. C. and Chang, Y. F. |
Computers & Security
|
2003- |
期刊論文
|
Hiding Digital Data in Music Scores Using Musical Features |
Chang, C. C., Wu, W. C., Hu, Y. C. and Li, Y. C. |
Journal of Applied Systems Studies
|
2003- |
期刊論文
|
Hiding Digital Watermarks Using Fractal Compression Technique |
Wu, H. C. and Chang, C. C. |
Fundamenta Informaticae
|
2003- |
期刊論文
|
Security Enhancement for a Modified Authenticated Key Agreement Protocol |
Chang, C. C., Hwang, K. F. and Lin, I. C. |
International Journal of Computational and Numerical Analysis and Applications
|
2003- |
期刊論文
|
Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards |
Chang, C. C. and Hwang, K. F. |
Informatica
|
2003- |
期刊論文
|
Using Set Partitioning in Hierarchical Trees to Authenticate Digital Image |
Tsai, P. Y., Hu, Y. C. and Chang, C. C. |
Signal Processing: Image Communication Journal
|
2002-11 |
期刊論文
|
A Fast Codebook Training Algorithm for Vector Quantization |
Chang, C. C. and Hu, Y. C. |
IEEE Transactions on Consumer Electronics
|
2002-09 |
期刊論文
|
Both Color and Gray Scale Secret Image Hiding in a Color Image |
Lin, M. H., Hu, Y. C. and Chang, C. C. |
International Journal of Pattern Recognition and Artificial Intelligence
|
2002-08 |
期刊論文
|
A Novel Two-stage Edge Detection Scheme for Digital Color Images |
Tsai, P. Y., Chang, C. C. and Hu, Y. C. |
Signal Processing: Image Communication
|
2002-06 |
期刊論文
|
A Fast Pixel Mapping Algorithm Using Principal Component Analysis |
Hwang, K. F. and Chang, C. C. |
Pattern Recognition Letters
|
2002-06 |
期刊論文
|
An Image Intellectual Property Protection Scheme for Gray-Level Images Using Visual Secret Sharing Strategy |
Chang, C. C. and Chuang, J. C. |
Pattern Recognition Letters
|
2002-03 |
期刊論文
|
An ELGamal-like Cryptosystem for Enciphering Large Messages |
Hwang, M. S., Chang, C. C. and Hwang, K. F. |
IEEE Transactions on Knowledge and Data Engineering
|
2002-03 |
期刊論文
|
Error Prevention and Concealment for Chinese Calligraphy Based on Block Truncation Coding |
Hung, K. L. and Chang, C. C. |
Journal of Computer Processing of Oriental Languages
|
2002- |
期刊論文
|
A Color Image Copyright Protection Scheme Based on Visual Cryptography and Discrete Cosine Transform |
Chang, C. C., Hsiao, J. Y. and Yeh, J. C. |
Image Science Journal
|
2002- |
期刊論文
|
A Color Image Retrieval Method Based on Color Moment and Color Variance of Adjacent Pixels |
Chan, Y. K and Chang, C. C. |
International Journal on Pattern Recognition and Artificial Intelligence
|
2002- |
期刊論文
|
A Fast and Secure Image Hiding Scheme Based on LSB Substitution |
Chang, C. C., Lin, M. H. and Hu, Y. C. |
International Journal of Pattern Recognition and Artificial Intelligence
|
2002- |
期刊論文
|
A Feature-Oriented Copyright Owner Proving Technique for Still Image |
Chang, C. C., Hwang, K. F. and Hwang, M. S. |
International Journal of Software Engineering and Knowledge Engineering
|
2002- |
期刊論文
|
A New Micro-Payment System Using General Payword Chain |
Wang, C. T, Chang, C. C. and Lin, C. H. |
Electronic Commerce Research Journal
|
2002- |
期刊論文
|
A Steganographic Method Based upon JPEG and Quantization Table Modification |
Chang, C. C., Chen, T. S. and Chung, L. Z. |
Information Science: an International Journal
|
2002- |
期刊論文
|
An Adaptive Two-Stage Edge Detection Scheme for Digital Color Images |
Tsai, P. Y., Chang, C. C. and Hu, Y. C. |
Journal of Real Time Imaging
|
2002- |
期刊論文
|
An Improved Authentication Protocol without Trusted Third Party |
Hwang, M. S., Chang, C. C. and Hwang, K. F. |
International Journal of Computational and Numerical Analysis and Applications
|
2002- |
期刊論文
|
An Improvement of a Technique for Color Quantization Using Reduction of Color Space Dimentionality |
Hung, K. L. and Chang, C. C. |
Informatica
|
2002- |
期刊論文
|
Both Color and Gray Scale Secret Images Hiding in a Color Image |
Lin, M. H., Hu, Y. C. and Chang, C. C. |
International Journal on Pattern Recognition and Artificial Intelligence
|
2002- |
期刊論文
|
Cryptanalysis of an Encryption Scheme for Binary Images |
Chang, C. C. and Yu, T. X. |
Pattern Recognition Letters
|
2002- |
期刊論文
|
Detection and Restoration of Tampered JPEG Compressed Images |
Wu, H. C. and Chang, C. C. |
Journal of Systems and Software
|
2002- |
期刊論文
|
Recognition of Image Authenticity Using Significant DCT Coefficients Quantization |
Chang, C. C., Chuang, L. Z. and Chen, T. S. |
Informatica
|
2002- |
期刊論文
|
Robust Authentication scheme for Protecting Copyrights of Images and Graphics |
Chang, C. C., Hwang, K. F. and Hwang, M. S. |
IEE Proceedings-Vision Image and Signal Processing
|
2002- |
期刊論文
|
Sharing Multiple Secrets in Digital Images |
Tsai, C. S., Chang, C. C. and Chen, T. S. |
Journal of Systems and Software
|
2001-09 |
期刊論文
|
Secure Discrete Cosine Transform based Technique for Recoverable Tamper Proofing |
Hung, K. L., Chang, C. C. and Chen, T. S. |
Optical Engineering
|
2001-04 |
期刊論文
|
Image Matching Using Run-Length Feature |
Chan, Y. K. and Chang, C. C. |
Pattern Recognition
|
2001-01 |
期刊論文
|
Employ a Data Compression Scheme to Speed up the Computations on Elliptic Curves |
Chang, C. C. and Kuo, Y. T. |
International Journal of Applied Mathematics
|
2001- |
期刊論文
|
A New Fast Search Algorithm of Block Motion Estimation Using Clustering Technique |
Chang, C. C., Chen, L. L. and Chen, T. S. |
Journal of Applied Systems Studies
|
2001- |
期刊論文
|
A New Two-way Search Algorithm for Block Motion Estimation Estimation of Video Data |
Chang, C. C., Chen, L. L. and Chen T. S. |
Journal of Information Science and Engineering
|
2001- |
期刊論文
|
A Novel Progressive Image Transmission Technique for Chinese Calligraphy |
Hung, K. L. and Chang, C. C. |
Journal of Computer Processing of Oriental Languages
|
2001- |
期刊論文
|
A Secure and Robust Digital Image Copyright Protection Scheme |
Chang, C. C. and Wu, H. C. |
Journal of Applied Systems Studies
|
2001- |
期刊論文
|
An Efficient Threshold Decryption Scheme without Session Keys |
Hwang, M. S., Chang, C. C. and Hwang, K. F. |
Computer & Electrical Engineering
|
2001- |
期刊論文
|
Bi-level Lossless Calligraphy Compression Using Location Propagation and Width Inheritance |
Chang, C. C. and Chen, G. I. |
Computer Processing of Oriental Languages
|
2001- |
期刊論文
|
Cryptographic Key Assignment Scheme for Hierarchical Access Control |
Wu, T. C. and Chang, C. C. |
International Journal of Computer Systems Science and Engineering
|
2001- |
期刊論文
|
Hiding a Picture in two Pictures |
Hwang, R. J. and Chang, C. C. |
Optical Engineering
|
2001- |
期刊論文
|
IA Copyright Protection Scheme of Images Based on Visual Cryptography |
Chang, C. C. and Wu, H. C. |
The Imaging Science Journal
|
2001- |
期刊論文
|
Image Coding Schemes Based on Subsampling Vector Quantization |
Hu, Y. C. and Chang, C. C. |
Optical Engineering
|
2001- |
期刊論文
|
Image Steganography Using Vector Quantization and Discrete Cosine Transformation |
Tsai, C. S., Chang, C. C. and Chen, T. S. |
The Imaging Science Journal
|
2001- |
期刊論文
|
Improved Nearest Codeword Search Scheme Using a Tighter Kick-out Condition |
Hwang, K. F. and Chang, C. C. |
Optical Engineering
|
2001- |
期刊論文
|
New Encryption Algorithm for Image Cryptosystems |
Chang, C. C., Hwang, M. S. and Chen, T. S. |
Journal of Systems and Software
|
2001- |
期刊論文
|
New Method of Secret Image Sharing Based on Vector Quantization |
Chen, T. S. and Chang, C. C. |
Journal of Electronic Imaging
|
2001- |
期刊論文
|
Spatial Similarity Retrieval in Video Database |
Chan, Y. K. and Chang, C. C. |
Journal of Visual Communication and Image Representation
|
2000-10 |
期刊論文
|
Digital Watermarking of Images Using Neural Networks |
Hwang, M. S., Chang, C. C. and Hwang, K. F. |
Journal of Electronic Imaging
|
2000-06 |
期刊論文
|
A Technique for Computing Watermarks from Digital Images |
Chang, C. C. and Tsai, C. S. |
Informatica
|
2000-06 |
期刊論文
|
An Efficient Computation of Euclidean Distance Using Approximated Look-Up Table |
Chang, C. C., Chou, J. S. and Chen, T. S. |
IEEE Transactions on Circuits and Systems for Video Technology
|
2000-06 |
期刊論文
|
Generalization of Threshold Signature and Authenticated Encryption for Group Communications |
Wang, C. T, Chang, C. C. and Lin, C. H. |
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
|
2000-03 |
期刊論文
|
A New Efficient Server-Aided RSA Secret Computation Protocol Against Active Attacks |
Hwang, S. J. and Chang, C. C. |
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
|
2000-03 |
期刊論文
|
A Technique of Watermarking for Digital Images Using (t, n)-Threshold Scheme |
Chang, C. C., Chen, T. S. and Chung, P. F. |
Informatica
|
2000-03 |
期刊論文
|
An Efficient Divide-and-Conquer Technique for Parallel Computation of Modular Multi-Exponentiation |
Chang, C. C. and Lou, D. C. |
Computer Systems Science and Engineering
|
2000-02 |
期刊論文
|
Fast Modular Reduction and Multi-multiplication Method |
Chang, C. C. and Kuo, Y. T. |
International Journal of Applied Mathematics
|
2000- |
期刊論文
|
A Breadth First Oriented Symbolic Picture Representation for Spatial Match Retrieval |
Lee, C. F. and Chang, C. C. |
Journal of Systems and Software
|
2000- |
期刊論文
|
A Colour Image Compression Scheme Based on Two-Layer Absolute Moment Block Truncation Coding |
Chang, C. C., Chen, T. S. and Chung, L. Z. |
The Imaging Science Journal
|
2000- |
期刊論文
|
A Digital Watermarking Scheme Using Human Visual Effects |
Chang, C. C., Hwang, K. F. and Hwang, M.S. |
Informatica
|
2000- |
期刊論文
|
A Fast Filter of Spatial Video Retrieval |
Chan, Y. K. and Chang, C. C. |
International Journal of Applied Mathematics
|
2000- |
期刊論文
|
A New Lossless Compression Scheme Based on Huffman Coding for Image Compression |
Hu, Y. C. and Chang, C. C. |
Signal Processing: Image Communication
|
2000- |
期刊論文
|
A Predictive Subcodebook Search Algorithm for Vector Quantization |
Hu, Y. C. and Chang, C. C. |
Optical Engineering
|
2000- |
期刊論文
|
Computing Lucas Functions Using Addition Chains |
Chang, C. C. and Chan, C. W. |
International Journal of Applied Mathematics
|
2000- |
期刊論文
|
Conference Key Distributions Using Self-Certified Public Keys |
Chang, C. C., Wang, C. T. and Lin, C. H. |
International Journal of Applied Mathematics
|
2000- |
期刊論文
|
Pattern-based Side Match Vector Quantization for Image Compression |
Chang, C. C., Shine, F. C. and Chen, T. S. |
The Imaging Science Journal
|
2000- |
期刊論文
|
Quadtree-Segmented Image Coding Schemes Using Vector Quantization and Block Truncation Coding |
Hu, Y. C. and Chang, C. C. |
Optical Engineering
|
2000- |
期刊論文
|
User Identification and Key Distribution Maintaining Anonymity for Distributed Computer Networks |
Lee, W. B. and Chang, C. C. |
Computer Systems Science and Engineering
|
1999-02 |
期刊論文
|
A Multi-Channel Storage Arrangement Scheme of Pictorial Databases for Concurrent Spatial Match Retrieval |
Chang, C. C. and Shen J. J. |
Computer and Mathematics with Applications
|
1999-02 |
期刊論文
|
Low Complexity Index-Compressed Vector Quantization for Image Compression |
Hu, Y. C and Chang, C. C. |
IEEE Transactions on Consumer Electronics
|
1999- |
期刊論文
|
(t, n) Threshold Digital Signature with Traceability Property |
Lee, W. B. and Chang, C. C. |
Journal of Information Science and Engineering
|
1999- |
期刊論文
|
A Compact Sparse Matrix Representation Using Random Hash Functions |
Jiang, J. H., Chang, C. C. and Chen, T. S. |
Data & Knowledge Engineering
|
1999- |
期刊論文
|
A Concept of Designing Cheater Identification Methods for Secret Sharing |
Hwang, R. J., Lee, W. B. and Chang, C. C. |
Journal of Systems and Software
|
1999- |
期刊論文
|
A Fast Modular Multiplication Algorithm for Calculating the Product AB Modulo N |
Chen, C. Y. and Chang, C. C. |
Information Processing Letters
|
1999- |
期刊論文
|
A Method for Computing Lucas Sequence |
Wang, C. T., Chang, C. C. and Lin, C. H. |
Computer and Mathematics with Applications
|
1999- |
期刊論文
|
A Watermarking Technique Based on One-way Hash Functions |
Hwang, M. S., Chang, C. C. and Hwang, K. F. |
IEEE Transactions on Consumer Electronics
|
1999- |
期刊論文
|
An Improved Threshold Scheme Based on Modular Arithmetic |
Hwang, R. J. and Chang, C. C. |
Journal of Information Science and Engineering
|
1999- |
期刊論文
|
Calligraphy Compression Using Quadtree Decomposition and Pattern Matching |
Jiang, J. H., Chang, C. C. and Chen, T. S. |
Computer Processing of Oriental Languages
|
1999- |
期刊論文
|
Conference Key Distribution Scheme for Portable Communication System |
Chang, C. C. and Hwang, P. C. and Lee, W. B. |
Computer Communications
|
1999- |
期刊論文
|
Hybrid Image Compression Methods Based on Vector Quantization and Block Truncation Coding |
Chang, C. C. and Hu, Y. C. |
Optical Engineering
|
1999- |
期刊論文
|
Partition Search Filter and Its Performance Analysis |
Chang, C. C., Lee, T. F. and Leu, J. J. |
Journal of Systems and Software
|
1999- |
期刊論文
|
Reconstruction of Lost Blocks Using Codeword Estimation |
Hung, K. L., Chang, C. C. and Chen T. S. |
IEEE Transactions on Consumer Electronics
|
1999- |
期刊論文
|
Variable Rate Vector Quantization Scheme Based on Quadtree Segmentation |
Hu, Y. C. and Chang, C. C. |
IEEE Transactions on Consumer Electronics
|
1998-11 |
期刊論文
|
A Fast LBG Codebook Training Algorithm for Vector Quantization |
Chang, C. C. and Hu, Y. C. |
IEEE Transactions on Consumer Electronics
|
1998-11 |
期刊論文
|
A Fast Modular Multiplication Method |
Lou, D. C. and Chang, C. C. |
Computer Systems Science and Engineering
|
1998-11 |
期刊論文
|
A Fast Reconstruction Method for Transmitting Images Progressively |
Chang, C. C., Jau, J. J. and Chen, T. S. |
IEEE Transactions on Consumer Electronics
|
1998-11 |
期刊論文
|
An Improvement of Bottom-Up Variable-Sized Block Matching Technique for Video Compression |
Chang, C. C., Chen, L. L. and Chen, T. S. |
IEEE Transactions on Consumer Electronics
|
1998-11 |
期刊論文
|
Sharing Secret Images Using Shadow Codebooks |
Chang, C. C. and Hwang, R. J. |
Information Sciences
|
1998-10 |
期刊論文
|
A New Data Compression Scheme for Chinese Text Using Chinese Words and Multilist Structure |
Chang, C. C., Sung, C. H. and Chen, T. S. |
Computer Processing of Chinese and Oriental Languages
|
1998-10 |
期刊論文
|
A Virtual Image Cryptosystem Based on Vector Quantization |
Chen, T. S., Chang, C. C. and Hwang, M. S. |
IEEE Transactions on Image Processing
|
1998-10 |
期刊論文
|
Conference Key Supervision in a Level-Based Hierarchy |
Wang, C. T., Chang, C. C. and Lin, C. H. |
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
|
1998-04 |
期刊論文
|
Two Improved Codebook Search Methods of Vector Quantization Based on Orthogonal Checking and Fixed Range Search |
Chang, C. C., Lee, W. T. and Chen, T. S. |
Journal of Electronic Imaging
|
1998-01 |
期刊論文
|
Efficient Group Signature Scheme Based on Discrete Logarithm |
Lee, W. B. and Chang, C. C. |
IEE Proceedings - Computers and Digital Techniques
|
1998- |
期刊論文
|
A Bin-Tree Oriented Iconic Indexing Scheme for Retrieving Symbolic Pictures |
Chang, C. C. and Lee, C. F. |
Data and Knowledge Engineering
|
1998- |
期刊論文
|
A Dynamic Secret Sharing Scheme Based on the Factoring and Diffie-Hellman Problems |
Lee, W. B. and Chang, C. C. |
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
|
1998- |
期刊論文
|
A Predictive Image Coding Scheme Using a Smaller Codebook |
Chang, C. C., Chou, J. S. and Chen, T. S. |
Image Communication
|
1998- |
期刊論文
|
A Simple Picture Hiding Scheme |
Chang, C. C. and Hwang, R. J. |
Computer Processing of Oriental Languages
|
1998- |
期刊論文
|
A Spatial Match Retrieval Mechanism for Symbolic Pictures |
Chang, C. C. and Lee, C. F. |
Journal of Systems and Software
|
1998- |
期刊論文
|
An Adaptive Exponentiation Method |
Lou, D. C. and Chang, C. C. |
Journal of Systems and Software
|
1998- |
期刊論文
|
An Encryption/Multisignature Scheme with Specified Receiving Groups |
Hwang, S. J., Chen, C. Y. and Chang, C. C. |
Computer Systems Science and Engineering
|
1998- |
期刊論文
|
An On-line Secret Sharing Scheme for Multi-secrets |
Hwang, R. J. and Chang, C. C. |
Computer Communications
|
1998- |
期刊論文
|
Authenticity of Public Keys in Asymmetric Cryptosystems |
Lee, W. B. and Chang, C. C. |
Computer Communications
|
1998- |
期刊論文
|
Broadcasting Secrets in Communication Networks |
Chang, C. C., Wu, T. C. and Yeh, Y. S. |
Computer Systems Science and Engineering
|
1998- |
期刊論文
|
Multiple Disk Allocation Based on Round-Robin Hilbert Curve for Spatial Data |
Chang, C. C. and Jiang, J. H. |
International Journal of Information and Management Sciences
|
1998- |
期刊論文
|
Three ID-Based Information Security Functions |
Lee, W. B. and Chang, C. C. |
Computer Communications
|
1998- |
期刊論文
|
Threshold Signature Schemes with Traceable Signers in Group Communications |
Wang, C. T., Lin, C. H. and Chang, C. C. |
Computer Communications
|
1998- |
期刊論文
|
Using RSA with Low Exponent in a Public Network |
Lee, W. B. and Chang, C. C. |
Computer Communications
|
1997-10 |
期刊論文
|
Spatial Match Retrieval Based on Direction Signatures Using Multiple Key Hashing Scheme |
Chang, C. C. and Lee, C. F. |
International Journal of Intelligent Systems
|
1997-09 |
期刊論文
|
A Smart Card Oriented Password Authentication Scheme Based on Rabin’s Public Key Cryptosystem |
Chang, C. C. and Wu, T. C. |
International Journal on Information and Management Sciences
|
1997-08 |
期刊論文
|
A New Image Coding Algorithm Using Variable-Rate Side-Match Finite-State Vector Quantization |
Chen, T. S. and Chang, C. C. |
IEEE Transactions on Image Processing
|
1997-06 |
期刊論文
|
Diagonal Axes Method (DAM): A Fast Search Algorithm for Vector Quantization |
Chen, T. S. and Chang, C. C. |
IEEE Transactions on Circuits and Systems for Video Technology
|
1997-02 |
期刊論文
|
A Locally Adaptive Data Compression Strategy for Chinese-English Characters |
Chang, C. C. and Wang, C. H. |
Journal of Systems and Software
|
1997-01 |
期刊論文
|
A Binary Access Control Method Using Prime Factorization |
Chang, C. C., Lou, D. C. and Wu, T. C. |
Information Sciences
|
1997-01 |
期刊論文
|
A Digital Signature Scheme Based upon Theory of Quadratic Residues |
Chang, C. C., Jan, J. K. and Kowng, H. C. |
Cryptologia
|
1997-01 |
期刊論文
|
Efficient Cheater Identification Method for Threshold Schemes |
Chang, C. C. and Hwang, R. J. |
IEE Proceedings - Computers and Digital Techniques
|
1997-01 |
期刊論文
|
Optimal Bucket Allocation Design of K-ary MKH Files for Concurrent Partial Match Retrieval |
Chen, C. Y., Lin, H. F., Chang, C. C. and Lee, R. C. T. |
IEEE Transactions on Knowledge and Data Engineering
|
1997-01 |
期刊論文
|
Parallel Computation of the Multi-Exponentiation for Cryptosystems |
Chang, C. C. and Lou, D. C. |
International Journal of Computer Mathematics
|
1997- |
期刊論文
|
A Cost Optimal Search Technique for the Knapsack Problem |
Lou, D. C. and Chang, C. C. |
International Journal of High Speed Computing
|
1997- |
期刊論文
|
A Generalized Secret Sharing Scheme |
Chang, C. C. and Tsai, H. M. |
Journal of Systems and Software
|
1997- |
期刊論文
|
A New Method for Temporal Join Using a Priority Search Tree |
Chang, C. C., Jiang, J. H. and Buehrer, D. J. |
International Journal of Information and Management Sciences
|
1997- |
期刊論文
|
A Secure Voting System on a Public Network |
Chang, C. C. and Wu, W. B. |
Networks
|
1997- |
期刊論文
|
A Simple Approach for Generating RSA Keys |
Chang, C. C. and Hwang, S. J. |
Information Processing Letters
|
1997- |
期刊論文
|
An Improved VQ Codebook Search Algorithm Using Principal Component Analysis |
Chang, C. C., Lin, D. C. and Chen, T. S. |
Journal of Visual Communication and Image Representation
|
1997- |
期刊論文
|
Authenticated Encryption Schemes with Linkage between Message Blocks |
Lee, W. B. and Chang, C. C. |
Information Processing Letters
|
1997- |
期刊論文
|
Multidisk Smaller Sized MKH File Allocation for Partial Match Retrieval |
Chen, C. Y., Lin, H. F., Chang, C. C. and Lee, R. C. T. |
Journal of Information Science and Engineering
|
1997- |
期刊論文
|
New Tree-Structured Vector Quantization with Closest-Coupled Multipath Searching Method |
Chang, C. C. and Chen, T. S. |
Optical Engineering
|
1997- |
期刊論文
|
On the Number of Messages Cannot be Concealed in LUC |
Kuo, W. C., Laih, C. S., Gau, M. J. and Chang, C. C. |
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
|
1996-12 |
期刊論文
|
A Spatial Filter for Similarity Retrieval |
Chang, C. C. and Jiang, J. H. |
International Journal on Pattern Recognition and Artificial Intelligence
|
1996-12 |
期刊論文
|
Fast Algorithms for Vector Quantization |
Chang, C. C., Chang, R. F., Lee, W. T. and Kuo, C. L. |
Journal of Information Science and Engineering
|
1996-12 |
期刊論文
|
Redundant MKH Files Design among Multiple Disks for Concurrent Partial Match Retrieval |
Chen, C. Y., Lin, H. F., Chang, C. C. and Lee, R. C. T. |
Journal of Systems and Software
|
1996-10 |
期刊論文
|
An Improvement to Ziegler's Sparse Matrix Compression Algorithm |
Chang, C. C., Kowng, H. C. and Buehrer, D. J. |
Journal of Systems and Software
|
1996-09 |
期刊論文
|
On Key Changeable ID-Based Digital Signature Scheme |
Lee, W. B. and Chang, C. C. |
Journal of Information Science and Engineering
|
1996-09 |
期刊論文
|
On the Security of Chang and Wu's Broadcasting Cryptosystem for Computer Network |
Hwang, T., Lee, N. Y., Li, C. M. and Chang, C. C. |
Computer Systems Science and Engineering
|
1996-09 |
期刊論文
|
Two Efficient Server-Aided RSA Secret Computation Protocols against Active Attacks |
Hwang, S. J., Chang, C. C. and Yang, W. P. |
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
|
1996-07 |
期刊論文
|
An Efficient Dynamic Threshold Scheme |
Hwang, S. J., Chang, C. C. and Yang, W. P. |
IEICE Transactions on Information and Systems
|
1996-07 |
期刊論文
|
Parallel Computation of the Generating Keys for RSA Cryptosystems |
Chang, C. C. and Hwang, M. S. |
IEE Electronics Letters
|
1996-06 |
期刊論文
|
Retrieving Chinese Characters with Similar Appearance from a Reorganized Chinese Dictionary |
Wu, T. C. and Chang, C. C. |
International Journal of Information and Management Sciences
|
1996-05 |
期刊論文
|
Fast Exponentiation Method Obtained by Folding the Exponent in Half |
Lou, D. C. and Chang, C. C. |
IEE Electronics Letters
|
1996-04 |
期刊論文
|
Some Properties of Optimal Cartesian Product Files for Orthogonal Range Queries |
Chou, A. Y. H., Chang, C. C. and Yang, W. P. |
Information Sciences
|
1996-03 |
期刊論文
|
Hybrid Method for Modular Exponentiation with Precomputation |
Chen, C. Y., Chang, C. C. and Yang, W. P. |
IEE Electronics Letters
|
1996-02 |
期刊論文
|
A Spatial Data Representation: An Adaptive 2D-H String |
Chang, C. C. and Lin, D. C. |
Pattern Recognition Letters
|
1996- |
期刊論文
|
A Parallel Two-list Algorithm for the Knapsack Problem |
Lou, D. C. and Chang, C. C. |
Parallel Computing
|
1996- |
期刊論文
|
Authenticated Encryption Schemes with Message Linkage |
Hwang, S. J., Chang, C. C. and Yang, W. P. |
Information Processing Letters
|
1996- |
期刊論文
|
Cryptanalysis of an Improved Remote Password Authentication with Smart Card |
Lee, W. B. and Chang, C. C. |
International Journal of Information Management and Engineering
|
1996- |
期刊論文
|
Cryptanalysis of the Secret Exponent of RSA |
Chen, C. Y., Chang, C. C. and Yang, W. P. |
Journal of Information Science and Engineering
|
1996- |
期刊論文
|
Integrating Authentication in Public Key Distribution System |
Lee, W. B. and Chang, C. C. |
Information Processing Letters
|
1996- |
期刊論文
|
Two 2D Search Filters and Their Performance Analyses |
Chang, C. C. and Leu, J. J. |
International Journal of Computer Mathematics
|
1995-12 |
期刊論文
|
Optimal Two-Dimensional Cartesian Product Files for Orthogonal Range Queries |
Chou, A. Y. H., Yang, W. P. and Chang, C. C. |
Journal of Information Science and Engineering
|
1995-12 |
期刊論文
|
Remote Scheme for Password Authentication Based on Theory of Quadratic Residues |
Chang, C. C., Tsu, S. M. and Chen, C. Y. |
Computer Communications
|
1995-11 |
期刊論文
|
Dynamic Pictorial Databases Design for Similarity Retrieval |
Chang, C. C. and Liang, J. |
Information Sciences
|
1995-09 |
期刊論文
|
A Cascade Exponentiation Evaluation Scheme Based on the Lempel-Ziv-Welch Compression Algorithm |
Chang, C. C., Horng, W. J. and Buehrer, D. J. |
Journal of Information Science and Engineering
|
1995-09 |
期刊論文
|
Authenticated Encryption Scheme without Using a One Way Function |
Lee, W. B. and Chang, C. C. |
IEE Electronics Letters
|
1995-09 |
期刊論文
|
Cryptanalysis of a Cryptosystem Based upon Continuned Fraction |
Lee, W. B., Chang, C. C. and Jan, J. K. |
International Journal of Information and Management Sciences
|
1995-06 |
期刊論文
|
The Shortest Weighted Length Addition Chains |
Chen, Y. J., Chang, C. C. and Yang, W. P. |
Journal of Information Science and Engineering
|
1995-05 |
期刊論文
|
An Exact Match Retrieval Scheme Based upon Principal Component Analysis |
Chang, C. C. and Wu, T. C. |
Pattern Recognition Letters
|
1995-04 |
期刊論文
|
A Near Pattern-matching Scheme Based upon Principal Component Analysis |
Chen, C. Y., Chang, C. C. and Lee, R. C. T. |
Pattern Recognition Letters
|
1995-04 |
期刊論文
|
Relative Coordinates Oriented Symbolic String for Spatial Relationship Retrieval |
Chang, C. C. and Lee, C. F. |
Pattern Recognition
|
1995-02 |
期刊論文
|
Cryptanalysis on an Access Control in a Hierarchy |
Chang, C. C., Fan, S. W., Liaw, H. T. and Chiou, M. Y. |
Computers and Mathematics with Applications
|
1995-01 |
期刊論文
|
A New Public-key Cipher System Based upon the Diophantine Equations |
Lin, C. H., Chang, C. C. and Lee, R. C. T. |
IEEE Transactions on Computers
|
1995-01 |
期刊論文
|
Arithmetic Operations on Encrypted Data |
Chang, C. C. and Tsu, S. M. |
International Journal of Computer Mathematics
|
1995-01 |
期刊論文
|
Cryptanalysis of a Password Authentication Scheme Using Quadratic Residues |
Chang, C. C., Wu, T. C. and Laih, C. S. |
Computer Communications
|
1995- |
期刊論文
|
A Cryptographic Implementation for Dynamic Access Control in a User Hierarchy |
Tsai, H. M. and Chang, C. C. |
Computers and Security
|
1995- |
期刊論文
|
Comment on Digital Signature with (t, n) Shared Verification Based on Discrete Logarithms |
Lee, W. B. and Chang, C. C. |
IEE Electronics Letters
|
1995- |
期刊論文
|
Parallel Computation of the Modular Cascade Exponentiation |
Chen, Y. J., Chang, C. C. and Yang, W. P. |
Journal of Parallel Algorithms and Applications
|
1994-12 |
期刊論文
|
A New Access Control Scheme with High Data Security |
Tseng, J. C. R., Yang, W. P. and Chang, C. C. |
International Journal of Management and Information Sciences
|
1994-12 |
期刊論文
|
Utilizing the Concept of Longest Common Subsequence to Retrieve Similar Chinese Characters |
Chang, C. C. and Lin, D. C. |
Chinese and Oriental Languages Computing
|
1994-11 |
期刊論文
|
Method for Constructing a Group-Oriented Cipher System |
Lin, C. H. and Chang, C. C. |
Computer Communications
|
1994-10 |
期刊論文
|
Assigning Digital Key Pairs to Determine Relationships in a User Hierarchy Structure |
Chang, C. C. and Liaw, H. T. |
Transactions of Information Processing Society of Japan
|
1994-10 |
期刊論文
|
New Concepts for Multiple Stack Systems: Born and Reborn |
Chang, C. C., Hwang, S. J. and Buehrer, D. J. |
Journal of Systems and Software
|
1994-09 |
期刊論文
|
A Digital Multisignature Scheme Based upon the Digital Signature Scheme of a Modified ElGamal's Public Key Cryptosystem |
Chang, C. C. and Liou, F. Y. |
Journal of Information Science and Engineering
|
1994-09 |
期刊論文
|
Application of Geometric Hashing to Iconic Database Retrieval |
Wu, T. C. and Chang, C. C. |
Pattern Recognition Letters
|
1994-09 |
期刊論文
|
Attacks on ID-based Signature Scheme Based upon Rabin's Public Key Cryptosystem |
Ko, M. Y., Hwang, T. and Chang, C. C. |
Computer Communications
|
1994-07 |
期刊論文
|
Optimal Multiple Key Hashing Files for Orthogonal Range Queries |
Liang, J., Chang, C. C., McFadyen, R. G. and Lee, R. C. T. |
Information Sciences
|
1994-05 |
期刊論文
|
A Scheme to Determine the Relationship between Two Users in a Hierarchy |
Chang, C. C., Jan, J. K. and Buehrer, D. J. |
Computers and Security
|
1994-05 |
期刊論文
|
An Authentication-Combined Access Control Scheme Using a One-Way Function |
Wu, T. C., Chang, C. C. and Yeh, Y. S. |
Computers and Mathematics with Applications
|
1994-05 |
期刊論文
|
Controlling Access in Tree Hierarchies |
Wu, T. C. and Chang, C. C. |
Information Sciences
|
1994-04 |
期刊論文
|
A Remote Password Authentication Scheme Based upon ElGamal's Signature Scheme |
Chang, C. C. and Liao, W. Y. |
Computers and Security
|
1994- |
期刊論文
|
A Server-Aided Computation Protocol for RSA Enciphering Algorithm |
Lin, C. H. and Chang, C. C. |
International Journal of Computer Mathematics
|
1994- |
期刊論文
|
A Two-Dimensional Shape Recognition Scheme Based on Principal Component Analysis |
Chang, C. C., Chen, Y. W. and Buehrer, D. J. |
International Journal of Pattern Recognition and Artificial Intelligence
|
1994- |
期刊論文
|
Access Control with Binary Keys |
Chang, C. C., Shen, J. J. and Wu, T. C. |
Computers and Security
|
1994- |
期刊論文
|
Authentication and Protection of Public Keys |
Laih, C. S., Chiou, W. H. and Chang, C. C. |
Computers and Security
|
1994- |
期刊論文
|
Parallel Computation of the Cascade Exponentiation |
Laih, C. S., Chang, C. C. and Yeh, S. M. |
International Journal of Information Management and Engineering
|
1994- |
期刊論文
|
Some Properties of Vectorial Addition Chains |
Chen, Y. J., Chang, C. C. and Yang, W. P. |
International Journal of Computer Mathematics
|
1993-11 |
期刊論文
|
Modified Chang-Hwang-Wu Access Control Scheme |
Hwang, M. S., Chang, C. C. and Yang, W. P. |
IEE Electronics Letters
|
1993-08 |
期刊論文
|
A Hashing-Oriented Nearest Neighbor Searching Scheme |
Chang, C. C. and Wu, T. C. |
Pattern Recognition Letters
|
1993-07 |
期刊論文
|
A Chinese Seal Imprints Recognition Scheme |
Chang, C. C., Lu, C. S. and Buehrer, D. J. |
Computer Processing of Chinese and Oriental Languages
|
1993-06 |
期刊論文
|
A New Generalized Group-Oriented Cryptoscheme without Trusted Centers |
Chang, C. C. and Lee, H. C. |
IEEE Journal on Selected Areas in Communications
|
1993-06 |
期刊論文
|
An Object-Oriented Similarity Retrieval Algorithm for Iconic Image Database |
Chen, C. Y. and Chang, C. C. |
Pattern Recognition Letters
|
1993-04 |
期刊論文
|
Master Keys for an M3 Cryptoscheme |
Chang, C. C. and Hwang, R. J. |
Cryptologia
|
1993-02 |
期刊論文
|
Optimal MMI File Systems for Orthogonal Range Retrieval |
Chen, C. Y., Chang, C. C. and Lee, R. C. T. |
Information Systems
|
1993- |
期刊論文
|
A Key-Lock-Pair Oriented Access Control Scheme for the Growth of Users and Files |
Jan, J. K. and Chang, C. C. |
BIT
|
1993- |
期刊論文
|
A Refinement of a Compression-Oriented Addressing Scheme for Letter-Oriented Keywords |
Chang, C. C., Kowng, H. C. and Wu, T. C. |
BIT
|
1993- |
期刊論文
|
Access Control in a Hierarchy Using a One-Way Trap Door Function |
Chang, C. C. and Buehrer, D. J. |
Computers and Mathematics with Applications
|
1993- |
期刊論文
|
Algebraic Operations on Encrypted Relational Databases |
Wu, T. C., Yeh, Y. S. and Chang, C. C. |
Information Systems
|
1993- |
期刊論文
|
Controlling the Access Requests in Information Protection Systems |
Chang, C. C. and Wu, T. C. |
Information Processing and Management
|
1993- |
期刊論文
|
Using Smart Cards to Authenticate Remote Passwords |
Chang, C. C. and Hwang, S. J. |
Computers and Mathematics with Applications
|
1992-12 |
期刊論文
|
Encoding Chinese Words Using Mandarin Phonetic Symbols |
Liu, C. C., Chang, C. C. and Buehrer, D. J. |
Computer Processing of Chinese and Oriental Languages
|
1992-10 |
期刊論文
|
Hierarchy Representations Based on Arithmetic Coding for Dynamic Information Protection Systems |
Lin, C. H., Chang, C. C. and Lee, R. C. T. |
Information Sciences
|
1992-10 |
期刊論文
|
On GDM Allocation Method for Partial Range Queries |
Chen, C. Y. and Chang, C. C. |
Information Systems
|
1992-09 |
期刊論文
|
A Chinese Character Retrieval Scheme Using Shuang Pinyin |
Chen, J. N. and Chang, C. C. |
Journal of Information Science and Engineering
|
1992-07 |
期刊論文
|
Remote Password Authentication with Smart Cards |
Chang, C. C. and Laih, C. S. |
IEE Proceedings - Part E
|
1992- |
期刊論文
|
A Conference Key Broadcasting System Using Sealed Locks |
Lin, C. H., Chang, C. C. and Lee, R. C. T. |
Information Systems
|
1992- |
期刊論文
|
A Fast Algorithm to Retrieve Symbolic Pictures |
Chang, C. C. |
International Journal of Computer Mathematics
|
1992- |
期刊論文
|
A Record-Oriented Cryptosystem for Database Sharing |
Lin, C. H., Chang, C. C. and Lee, R. C. T. |
The Computer Journal
|
1992- |
期刊論文
|
A Secure Broadcasting Scheme Based on Discrete Logarithms |
Chang, C. C. and Hwang, S. J. |
International Journal of Control and Computers
|
1992- |
期刊論文
|
A Solution to Generalized Group Cryptography |
Chang, C. C. and Lee, H. C. |
IT SECURITY: The Need for International Security, North-Holland
|
1992- |
期刊論文
|
Cryptographic Key Assignment Scheme for Access Control in a Hierarchy |
Chang, C. C., Hwang, R. J. and Wu, T. C. |
Information Systems
|
1992- |
期刊論文
|
Greedy File - A New Data Organization Concept for Partial Match Retrieval |
Chou, Y. H., Yang, W. P. and Chang, C. C. |
The Computer Journal
|
1992- |
期刊論文
|
Optimality Properties of DM Allocation Method for K-ary Multiple Key Hashing Files |
Chang, C. C., Lin, H. F. and Chen, C. Y. |
The Computer Journal
|
1992- |
期刊論文
|
Retrieving the Most Similar Symbolic Pictures from Pictorial Databases |
Chang, C. C. and Wu, T. C. |
Information Processing and Management
|
1992- |
期刊論文
|
Symbolic Gray Code as a Data Allocation Scheme for Two-Disk Systems |
Chang, C. C., Chen, H. Y. and Chen, C. Y. |
The Computer Journal
|
1991-10 |
期刊論文
|
On the Design of a Machine-Independent Perfect Hashing Scheme |
Chang, C. C., Chen, C. Y. and Jan, J. K. |
The Computer Journal
|
1991-09 |
期刊論文
|
A Study of Input Rates for a Chinese Characters Input System |
Jan, J. K., Chang, C. C., Wang, F. S. and Chen, C. P. |
Communications of Chinese and Oriental Languages Information Processing Society
|
1991-06 |
期刊論文
|
A Note on Allocating K-ary Multiple Key Hashing Files Among Multiple Disks |
Chang, C. C. and Chen, C. Y. |
Information Sciences
|
1991-05 |
期刊論文
|
Remote Password Authentication with Smart Cards |
Chang, C. C. and Wu, T. C. |
IEE Proceedings - Part E
|
1991-03 |
期刊論文
|
A Data Compression Scheme for Chinese and English Characters |
Chang, C. C. and Tsai, W. H. |
Computer Processing of Chinese and Oriental Languages
|
1991-01 |
期刊論文
|
A Letter-Oriented Perfect Hashing Scheme Based upon Sparse Table Compression |
Chang, C. C. and Wu, T. C. |
Software-Practice and Experience
|
1991-01 |
期刊論文
|
A Shape Recognition Scheme Based on Relative Distances of Feature Points from the Centroid |
Chang, C. C., Hwang, S. M. and Buehrer, D. J. |
Pattern Recognition
|
1991-01 |
期刊論文
|
Retrieval of Similar Pictures on Pictorial Databases |
Chang, C. C. and Lee, S. Y. |
Pattern Recognition
|
1991- |
期刊論文
|
A Broadcasting Cryptosystem in Computer Networks Using Interpolating Polynomials |
Chang, C. C. and Wu, T. C. |
Computer Systems Science and Engineering
|
1991- |
期刊論文
|
A Composite Perfect Hashing Scheme for Large Letter-oriented Key Sets |
Chang, C. C. |
Journal of Information Science and Engineering
|
1991- |
期刊論文
|
A Dynamic Key-Lock-Pair Access Control Scheme |
Jan, J. K., Chang, C. C. and Wang, S. J. |
Computers and Security
|
1991- |
期刊論文
|
A Password Authentication Scheme Based on Discrete Logarithms |
Wu, T. C. and Chang, C. C. |
International Journal of Computer Mathematics
|
1991- |
期刊論文
|
On the Design of MKH Files for Concurrent Orthogonal Range Retrieval among Two Disks |
Chen, C. Y., Chang, C. C. and Lee, R. C. T. |
Information Systems
|
1991- |
期刊論文
|
Password Authentication Using Newton's Interpolation Polynomials |
Lin, C. H., Chang, C. C., Wu, T. C. and Lee, R. C. T. |
Information Systems
|
1991- |
期刊論文
|
Spatial Match Retrieval of Symbolic Pictures |
Chang, C. C. |
Journal of Information Science and Engineering
|
1990-09 |
期刊論文
|
The Design of Two Compression Mechanisms for Chinese Textual Files |
Chang, C. C., Jan, J. K. and Chen, C. P. |
Computer Processing of Chinese and Oriental Languages
|
1990-06 |
期刊論文
|
An Arithmetic Coding Oriented Single Key Access Control Scheme |
Jan, J. K., Chang, C. C. and Wu, L. H. |
International Journal of Information and Management Science
|
1990- |
期刊論文
|
A Dynamic Access Control Mechanism in Information Protection Systems |
Lin, C. H., Chang, C. C. and Lee, R. C. T. |
Journal of Information Science and Engineering
|
1990- |
期刊論文
|
A New Password Authentication Scheme |
Chang, C. C. and Wu, L. H. |
Journal of Information Science and Engineering
|
1990- |
期刊論文
|
A Reciprocal Confluence Tree Unit and Its Applications |
Chang, C. C. and Lin, C. H. |
BIT
|
1990- |
期刊論文
|
A Survey of Key-to-Key User Hierarchic Representation Mechanism |
Chang, C. C. |
Journal of Information Processing, Japan, invited paper
|
1989-12 |
期刊論文
|
Broadcasting Cryptosystem Based upon Euclidean Geometry |
Chang, C. C. and Wu, T. C. |
International Journal on Policy and Information
|
1989-06 |
期刊論文
|
Optimality Properties of Binary Cartesian Product File Systems |
Chang, C. C., Chen, C. Y. and Chang, S. S. |
International Journal on Policy and Information
|
1988-12 |
期刊論文
|
A Recursive Performance Formula of the DM Allocation Method for BCPFs |
Chang, C. C. and Chen, C. Y. |
The Computer Journal
|
1988-12 |
期刊論文
|
An Access Control Scheme for New Users and Files |
Chang, C. C. and Jan, J. K. |
International Journal on Policy and Information
|
1988-02 |
期刊論文
|
An Ordered Minimal Perfect Hashing Scheme with Single Parameter |
Chang, C. C. and Chang, C. H. |
Information Processing Letters
|
1988- |
期刊論文
|
A Fast Chinese Characters Accessing Technique Using Mandarin Phonetic Transcriptions |
Chang, C. C. and Wu, H. C. |
The International Journal of Pattern Recognition and Artificial Intelligence
|
1988- |
期刊論文
|
Application of Principal Component Analysis to Multi-Disk Concurrent Accessing |
Chang, C. C. |
BIT
|
1987-12 |
期刊論文
|
Performance Analysis of the Generalized Disk Modulo Allocation Method for Multiple Key Hashing Files on Multi-Disk Systems |
Chang, C. C. and Chen, C. Y. |
The Computer Journal
|
1987-07 |
期刊論文
|
Gray Code as a De-clustering Scheme for Concurrent Disk Retrieval |
Chang, C. C. and Chen, C. Y. |
Journal of Information Science and Engineering
|
1987-07 |
期刊論文
|
Some Properties of Cartesian Product Files for Disk Modulo Allocation Method in a Two-disk System |
Chang, C. C. and Chen, C. Y. |
Journal of Information Science and Engineering
|
1987- |
期刊論文
|
An Information Protection Scheme Based upon Number Theory |
Chang, C. C. |
The Computer Journal
|
1987- |
期刊論文
|
Performance of Two-disk Partition Data Allocations |
Chang, C. C. and Chen, C. Y. |
BIT
|
1986-09 |
期刊論文
|
A Scheme for Constructing Ordered Minimal Perfect Hashing Functions |
Chang, C. C. |
Information Sciences
|
1986-06 |
期刊論文
|
Letter Oriented Reciprocal Hashing Scheme |
Chang, C. C. |
Information Sciences
|
1986- |
期刊論文
|
A Letter Oriented Minimal Perfect Hashing Scheme |
Chang, C. C. and Lee, R. C. T. |
The Computer Journal
|
1986- |
期刊論文
|
On the Design of a Key-Lock-Pair Mechanism in Information Protection Systems |
Chang, C. C. |
BIT
|
1984-12 |
期刊論文
|
Optimal Information Retrieval when Queries Are Not Random |
Chang, C. C. |
Information Sciences
|
1984-06 |
期刊論文
|
An Ordered Minimal Perfect Hashing Scheme Based upon Euler's Theorem |
Chang, C. C. |
Information Sciences
|
1984-04 |
期刊論文
|
The Study of an Ordered Minimal Perfect Hashing Scheme |
Chang, C. C. |
Communications of the Association for Computing Machinery
|
1984-01 |
期刊論文
|
Performance Analyses of Cartesian Product Files and Random Files |
Chang, C. C., Du, M. W. and Lee, R. C. T. |
IEEE Transactions on Software Engineering
|
1983-10 |
期刊論文
|
The Hierarchical Ordering in Multi-attribute Files |
Chang, C. C., Du, M. W. and Lee, R. C. T. |
Information Sciences
|
1982-05 |
期刊論文
|
Symbolic Gray Code as a Perfect Multi-attribute Hashing Scheme for Partial Match Queries |
Chang, C. C., Lee, R. C. T. and Du, M. W. |
IEEE Transactions on Software Engineering
|