:::

研究人才詳細資料


出版年月 著作類別 著作名稱 作者 收錄出處
2023-06 期刊論文 A Steganography Based on Optimal Multi-Threshold Block Labeling Xu, S., Chang, C. C. and Horng, J. H. Computer Systems Science and Engineering
2022-11 期刊論文 Pine Pest Detection using Remote Sensing Satellite Images Combined with a Multi-scale Attention-UNet Model Ye, W., Lao, J., Liu, Y., Chang, C. C., Zhang, Z., Li, H. and Zhou, H. Ecological Informatics
2022-11 期刊論文 Reversible Data Hiding with Hierarchical Block Variable Length Coding for Cloud Security Xu, S., Horng, J. H., Chang, C. C. and Chang, C. C. IEEE Transactions on Dependable and Secure Computing
2022-10 期刊論文 De-Correlation Neural Network for Synchronous Implementation of Estimation and Secrecy Cao, C., Chen, C. H., Chang, C. C., Hwang, F. J. and Chang, C. C. IEEE Communications Letters
2022-10 期刊論文 Detecting Multiple Steganography Methods in Speech Streams Using Multi-Encoder Network Tian, H., Wu, J., Quan, H., and Chang, C. C. IEEE Signal Processing Letters
2022-10 期刊論文 Embedding Biometric Information in Interpolated Medical Images with A Reversible and Adaptive Strategy Chi, H., Horng, J. H., Chang, C. C. and Li, Y. H Sensors
2022-10 期刊論文 Hiding and Extracting Important Information in Encrypted Images by Using the Transformation of All Possible Permutations and VQ Codebook Chi, Z., Chang, C. C., Wang, X. and Lin, C. C. Electronics
2022-09 期刊論文 A Consortium Blockchain-based Information Management System for Unmanned Vehicle Logistics Zhai, M., Han, D., Chang, C. C. and Sun, Z. Computer Science and Information Systems
2022-09 期刊論文 ABOS: An Attention-Based One-Stage Framework for Person Search Chen, Y., Han, D., Cui, M., Wu, Z. and Chang, C. C. EURASIP Journal on Wireless Communications and Networking
2022-09 期刊論文 SKDStream: A Dynamic Clustering Algorithm in Time-Decaying Data Stream Liu, H., Wu, A., Wei, M. and Chang, C. C. EURASIP Journal on Wireless Communications and Networking
2022-09 期刊論文 Trajectory Optimization of Autonomous Surface Vehicles with Outliers for Underwater Target Localization Mei, X., Han, D., Saeed, N., Wu, H., Chang, C. C., Han, B., Ma, T. and Xian, J. Remote Sensing
2022-08 期刊論文 A Novel e-Cash Payment System with Divisibility Based on Proxy Blind Signature in Web of Things Lin, I. C., Chang, C. C. and Chiang, H. C. IEICE Transactions on Information and Systems
2022-08 期刊論文 CAAN: Context-Aware Attention Network for Visual Question Answering Chen, C., Han, D. and Chang, C. C. Pattern Recognition
2022-08 期刊論文 Towards Blind Detection of Steganography in Low‐Bit‐Rate Speech Streams Sun, C., Tian, H., Mazurczyk, W., Chang, C. C., Cai, Y. and Chen, Y. International Journal of Intelligent Systems
2022-07 期刊論文 Reversible Data Hiding in Encrypted Images Using Block-based Adaptive MSB Prediction Chen, S. and Chang, C. C. Journal of Security and Applications
2022-07 期刊論文 Steganalysis of Adaptive Multi-rate Speech Streams with Distributed Representations of Codewords Qiu, Y., Tian, H., Tang, L., Mazurczyk, W. and Chang, C. C. Journal of Information Security and Applications
2022-06 期刊論文 On the Multi-Level Embedding of Crypto-Image Reversible Data Hiding Wang, X., Chang, C. C., Lin, C. C. and Chang, C. C. Journal of Visual Communication and Image Representation
2022-05 期刊論文 RSG-Net: A Recurrent Similarity Network with Ghost Convolution for Wheelset Laser Stripe Image Inpainting Ji, Z., Song, X., Feng, B., Wang, H., Chen, C. H. and Chang, C. C. IEEE Transactions on Intelligent Transportation Systems
2022-04 期刊論文 A Blockchain-based Secure Storage Scheme for Medical Information Sun, Z., Han, D., Li, D., Wang, X., Chang, C. C. and Wu, Z. EURASIP Journal on Wireless Communications and Networking
2022-04 期刊論文 Asymmetric Orientation Combination for Reversible and Authenticable Data Hiding of Dual Stego Images Lin, J., Chang, C. C. and Horng, J. H. Symmetry
2022-04 期刊論文 Dual Self-guided Attention with Sparse Question Networks for Visual Question Answering Shen, X., Han, D., Chang, C. C. and Zong, L. IEICE Transactions on Information and Systems
2022-04 期刊論文 Privacy-Preserving Data Hiding with Robustness based on Selective Encryption and Matrix Embedding Chen, S. and Chang, C. C. Multimedia Tools and Applications
2022-04 期刊論文 Public Auditing of Log Integrity for Shared Cloud Storage Systems via Blockchain Tian, H., Wang, J., Chang, C. C. and Quan, H. Wireless Networks
2022-04 期刊論文 Reversible Data Hiding in Encrypted Image via Secret Sharing Based on GF(p) and GF(2^8) Qin, C., Jiang, C., Mo, Q., Yan, H. and Chang, C. C. IEEE Transactions on Circuits and Systems for Video Technology
2022-03 期刊論文 A Two-stage Detection Method for Copy-move Forgery based on Parallel Feature Fusion Ye, W., Zeng, Q., Peng, Y., Liu, Y.* and Chang, C. C. EURASIP Journal on Wireless Communications and Networking
2022-02 期刊論文 A (k,n)-Threshold Secret Image Sharing Scheme Based on Non-Full Rank Linear Model Horng, J. H., Chen, S. and Chang, C. C. Mathematics
2022-02 期刊論文 High-capacity Reversible Data Hiding in Encrypted Images Based on Adaptive Block Encoding Gao, K, Horng, J. H. and Chang, C. C. Journal of Visual Communication and Image Representation
2022-02 期刊論文 Learning Stereo Disparity with Feature Consistency and Confidence Zhao, L., Li, J., Li, J., Wu, Y. Cheng, S., Tang, Z., Hui, G. and Chang, C. C. International Journal of Ad Hoc and Ubiquitous Computing
2022-02 期刊論文 Position-Aware Guided Hiding Data Scheme with Reversibility and Adaptivity for Dual Images Chang, C. C., Su, G. D., Lin, C. C.* and Li, Y. H. Symmetry
2022-02 期刊論文 Post-quantum Blockchain for Secure Communication in IoT based Smart Home Services Lee, W. K., Chen, L., Chang, C. C., Xiong, N., Goi, B. M. and Phan, C. W. International Journal of Embedded Systems
2022-02 期刊論文 Pre-training Model Based on the Parallel Multimodal Fusion Layer Li, X. W., Han, D. Z. and Chang, C. C. Plos One
2022-02 期刊論文 Real-Time Steganalysis for Stream Media Based on Multi-Channel Convolutional Sliding Windows Yang, Z., Chang, H., Chang, C. C., Huang, Y. and Chang, C. C. Knowledge-Based Systems
2022-02 期刊論文 Self-Supervised Learning Framework Toward State-of-the-Art Iris Image Segmentation Putri, W. R., Liu, S. H., Aslam, M. S., Li, Y. H., Chang, C. C. and Wang, J. Sensors
2022-02 期刊論文 The Speech Recognition of Post-stroke Dysarthria by Combining Spectrograms and CNN Network Ye, W., Mou, Z., Li, Q., Liu, Y. and Chang, C. C. Journal of Medical Imaging and Health Informatics
2022-01 期刊論文 A Comprehensive Framework of Multiple Semantic Preservation in Neural Style Transfer Ye, W., Zhu, X., Xu, Z., Liu, Y. and Chang, C. C. Journal of Visual Communication and Image Representation
2022-01 期刊論文 A Hybrid Parallel Deep Learning Model for Efficient Intrusion Detection Based On Metric Learning Han, D., Cai, S., Yin, X., Li, D. and Chang, C. C. Connection Science
2022-01 期刊論文 A Reversible and Authenticable Secret Sharing Scheme Using Dual Images Lin, J. Y., Horng, J. H. and Chang, C. C. Multimedia Tools and Applications
2022-01 期刊論文 A Visual Question Answering Network Merging High- and Low-Level Semantic Information Li, H., Han, D., Chen, C. Q., Li, K. J.C, Chang, C. C. and Li, D. IEICE Transactions on Information and Systems
2022-01 期刊論文 Adaptive Reversible Data Hiding with Contrast Enhancement based on Multi-histogram Modification Zhang, T., Hou, T., Weng, S., Zou, F., Zhang, H. and Chang, C. C. IEEE Transactions on Circuits and Systems for Video Technology
2022-01 期刊論文 An Improved Image Steganography Framework based on Y-channel Information for Neural Style Transfer Lin, W., Zhu, X., Ye, W., Chang, C. C., Liu, Y. and Liu, C. Security and Communication Networks
2022-01 期刊論文 Data Security and Preservation Mechanism for Industrial Control Network using IOTA Lin, I. C., Chang, C. C. and Chang, Y. S. Symmetry
2022-01 期刊論文 Dual Self-guided Attention with Sparse Question Networks for Visual Quenstion Answering Shen, X, Han, D., Chang, C. C. and Liang, Z. IEICE Transactions on Information and Systems
2022-01 期刊論文 Efficient Electronic Patient Information Hiding Scheme with Tamper Detection Function for Medical Images Lin, C. C., Chang, C. C., Kao, W. J. and Chang, J. F. IEEE Access
2022-01 期刊論文 Identity-Based Public Auditing for Cloud Storage of Internet-of-Vehicles Data Tian, H., Peng, F., Quan, H. and Chang, C. C. ACM Transactions on Internet Technology
2022-01 期刊論文 MFVT: An Anomaly Traffic Detection Method Merging Feature Fusion Network and Vision Transformer Architecture Li, M., Han, D., Li, D., Liu, H., and Chang, C. C. EURASIP Journal on Wireless Communications and Networking
2022-01 期刊論文 Reversal of Pixel Rotation: A Reversible Data Hiding System towards Cybersecurity in Encrypted Images Wang, X., Chang, C. C., Lin, C. C. and Chang, C. C. Journal of Visual Communication and Image Representation
2022-01 期刊論文 Signal Decomposition by Differential Evolution Chang, Y. C. and Chang, C. C. Sensors
2022-01 期刊論文 The Comparison of Attention Mechanisms with Different Embedding Modes for Performance Improvement of Fine-grained Classification Ye, W., Tan, R., Liu, Y. and Chang, C. C IEICE Transactions on Information and Systems
2021-12 期刊論文 Asymmetric Data Hiding for Compressed Images with High Payload and Reversibility Lin, J., Chang, C. C. and Horng, J. H. Symmetry
2021-12 期刊論文 CSST-Net: An Arbitrary Image Style Transfer Network of Coverless Steganography Zhang, S., Su, S., Li, L., Lu, J., Zhou, Q. and Chang, C. C. The Visual Computer
2021-12 期刊論文 Hiding Data in Dual Images Based on Turtle Shell Matrix with High Embedding Capacity and Reversibility Xie, X. Z. and Chang, C. C. Multimedia Tools and Applications
2021-11 期刊論文 A Novel (2, 3)-Threshold Reversible Secret Image Sharing Scheme Based on Optimized Crystal-Lattice Matrix Lin, J. Y., Horng, J. H. and Chang, C. C. Symmetry
2021-11 期刊論文 An EMD-based Data Hiding Scheme for JPEG Images Xie, X., Chang, C. C. and Horng, J. H.* Connection Science
2021-11 期刊論文 Efficient Reversible Data Hiding Scheme for AMBTC-Compressed Images Lin, C. C., Nguyen, T. S., Chang, C. C. and Chang, W. C. Applied Sciences
2021-11 期刊論文 LRW-CRDB: Lossless Robust Watermarking Scheme for Categorical Relational Databases Lin, C. C., Nguyen, T. S. and Chang, C. C. Symmetry
2021-10 期刊論文 An Efficient Dual Prediction-based Reversible Data Hiding and Reduced Code Method for AMBTC Chang, C. C., Wang, X. and Lin, C. C. Multimedia Tools and Applications
2021-10 期刊論文 An SMVQ Compressed Data Hiding Scheme Based on Multiple Linear Regression Prediction Chi, H., Chang, C. C. and Liu, Y. Connection Science
2021-10 期刊論文 RDMMFET: Representation of Dense Multi-Modality Fusion Encoder Based on Transformer Zhang, X., Han, D. and Chang, C. C. Mobile Information Systems, Special Issue on Machine Learning
2021-10 期刊論文 Reversible Data Hiding in Encrypted Images Based on Homomorphism and Block-based Congruence Transformation Chen, S., Chang, C. C. and Lin, C. C. Multimedia Tools and Applications
2021-09 期刊論文 A Novel Adjustable Reversible Data Hiding Method for AMBTC-Compressed Codes using Hamming Distance Xia, T. T., Lin, J., Chang, C. C. and Lu, T. C. International Journal of Embedded Systems
2021-09 期刊論文 A Two-Layer Steganography for Mosaic Image Horng, J. H., Chang, C. C. and Sun, K. S. KSII Transactions on Internet and Information Systems
2021-09 期刊論文 Adaptive Data Hiding Scheme based on Magic Matrix of Flexible Dimension Wu, H., Horng, J. H. and Chang, C. C. KSII Transactions on Internet and Information Systems
2021-09 期刊論文 Predicting Missing Data for Data Integrity Based on the Linear Regression Model Gao, K., Chang, C. C. and Liu, Y. International Journal of Embedded Systems
2021-09 期刊論文 Screen-Shooting Resilient Watermarking Scheme via Learned Invariant Keypoints and QT Li, L., Bai, R., Zhang, S., Chang, C. C. and Shi, M. Sensors
2021-08 期刊論文 A High Robust and Blind Image Watermarking Using Arnold Transform Mapping in the DCT Domain of YCbCr Color Space Lee, C. F., Chang, C. C., Wang, Z. H. and Di, Y. F. Journal of Network Intelligence
2021-08 期刊論文 High Capacity Reversible Data Hiding in Encrypted Images Based on Prediction Error and Block Classification Wang, X., Chang, C. C. and Lin, C. C. Multimedia Tools and Applications
2021-08 期刊論文 Two-Layer Reversible Data Hiding for VQ-Compressed Images Based on De-Clustering and Indicator-Free Search-Order Coding Chang, C. C., Chang, J. F., Kao, W. J. and Horng, J. H. Future Internet
2021-07 期刊論文 A Lightweight Attribute -based Access Control Scheme for Intelligent Transportation System with Full Privacy Protection Tian, H., Li, X., Quan, H., Chang, C. C. and Thar, B. IEEE Sensors Journal
2021-07 期刊論文 Privacy-Preserving Reversible Data Hiding for Medical Images Employing Local Rotation Su, G. D., Chang, C. C. and Lin, C. C. Journal of Healthcare Engineering
2021-07 期刊論文 Reversible Data Hiding Based on Pixel-Value-Ordering and Prediction-Error Triplet Expansion Chi, H., Horng, J W. and Chang, C. C. Mathematics
2021-06 期刊論文 Pixel-based Fragile Image Watermarking Based on Absolute Moment Block Truncation Coding Lin, C. C., He, S. and Chang, C. C. Multimedia Tools and Applications
2021-06 期刊論文 Privacy-Preserving Reversible Data Hiding Based on Quad-Tree Block encoding and Integer Wavelet Transform Wang, X., Chang, C. C., Lin, C. C. and Chang, C. C. Journal of Visual Communication and Image Representation
2021-06 期刊論文 Reversible Data Hiding in Encrypted Image Based on (7, 4) Hamming Code and UnitSmooth Detection Li, L., Chang, C. C. and Lin, C. C. Entropy
2021-05 期刊論文 Enhanced (n,n)-threshold QR Code Secret Sharing Scheme Based on Error Correction Mechanism Huang, P., Chang, C. C., Li, Y. H. and Liu, Y. Journal of Information Security and Applications
2021-05 期刊論文 High-Capacity Separable Reversible Data-Hiding Method in Encrypted Images Based on Block-Level Encryption and Huffman Compression Coding Chen, K. M. and Chang, C. C Connection Science
2021-04 期刊論文 A Proactive Secret Sharing Scheme Based on Chinese Remainder Theorem Meng, K., Miao, F., Ning, Y., Huang, W., Xiong, Y. and Chang, C. C. Frontiers of Computer Science
2021-04 期刊論文 Reversible Data Hiding Scheme Based on VQ Prediction and Adaptive Parametric Binary Tree Labeling for Encrypted Images Xu, S., Horng, J. H. and Chang, C. C. IEEE Access
2021-03 期刊論文 A High-Capacity Reversible Data Hiding Scheme for Encrypted Images Employing Vector Quantization Prediction Xu, S., Chang, C. C. and Liu, Y. Multimedia Tools and Applications
2021-03 期刊論文 A Hybrid-Sudoku based Fragile Watermarking Scheme for Image Tampering Detection Su, G. D., Chang, C. C. and Chen, C. C. Multimedia Tools and Applications
2021-03 期刊論文 A Reversible Extended Secret Image Sharing Scheme Based on Chinese Remainder Theorem Meng, K., Miao, F., Xiong, Y. and Chang, C. C. Signal Processing: Image Communication
2021-03 期刊論文 A Secure Extended LBP Data Hiding Scheme based on Octagon-shaped Shell Chang, C. C., Horng, J. H. and Gao, W. J. International Journal of Embedded Systems
2021-03 期刊論文 An Authenticatable (2,3) Secret Sharing Scheme Using Meaningful Share Images Based on Hybrid Fractal Matrix Gao, K., Horng, J. H. and Chang, C. C. IEEE Access
2021-03 期刊論文 An Efficient Lossless Dual Images Secret Sharing Scheme Using Turtle Shell Reference Matrix Lin, J. Y., Chen, Y., Chang, C. C. and Hu, Y. C. International Journal of Network Security
2021-03 期刊論文 Correction of Slanted Text Pictures Based on Modified Opencv Lu, R., Xu, Y., Wu, Z., Zheng, Y., Ren, L., Ding, F., Li, J.* and Chang, C. C. Journal of Network Intelligence
2021-03 期刊論文 Grouped Secret Sharing Schemes Based on Lagrange Interpolation Polynomials and Chinese Remainder Theorem Miao, F., Yu, Y., Meng, K., Xiong, Y. and Chang, C. C. Security and Communication Networks
2021-03 期刊論文 High-Capacity Reversible Data Hiding in Encrypted Images Based on Prediction Error Compression and Block Selection Wang,X., Li, L., Chang C. C., and Chang C. C. Security and Communication Networks
2021-03 期刊論文 High-capacity Reversible Data Hiding in Encrypted Image Based on Hierarchical Quad-tree Coding and Multi-MSB Prediction Liu, Y., Feng, G., Qin, C., Lu, H. and Chang, C. C. Electronics
2021-03 期刊論文 Smart Meter Fault Prediction Based on One-dimensional Convolution Neural Network Integrated Model Chen, Y., Xu, W., Hong, Z. H., Zhu, M. M., Li, B., Li, J. and Chang, C. C. Journal of Network Intelligence
2021-03 期刊論文 Turtle-shell Data Embedding Method with High Image Fidelity Qiu, G. H., Lee, C. F. and Chang, C. C. International Journal of Embedded Systems
2021-03 期刊論文 VQ-Oriented Data Hiding based on Adjustable Error Compensation Strategy Chang, C. C, Horng, J. H., Shi, C. S. and Wang, X. Connection Science
2021-02 期刊論文 A Coverless Information Hiding Method Based on Constructing a Complete Grouped Basis with Unsupervised Learning Lu, J., Ni, J., Li, L., Luo, T., and Chang, C. C. Journal of Network Intelligence
2021-02 期刊論文 High-capacity Reversible Data Hiding in Encrypted Image Based on Huffman Coding and Differences of High Nibbles of Pixels Chen, C. C., Chang, C. C. and Chen, K. Journal of Visual Communication and Image Representation
2021-02 期刊論文 Pixel P Air-wise Fragile Image Watermarking based on HC-based Absolute Moment Block Truncation Coding Lin, C. C., He, S. L. and Chang, C. C. Electronics
2021-02 期刊論文 Reversible Data Hiding Based on Three Shadow Images Using Rhombus Magic Matrix Chen, S. and Chang, C. C Journal of Visual Communication and Image Representation
2021-02 期刊論文 Reversible Data Hiding in Encrypted Images with Block-based Adaptive MSB Encoding Wang, X., Chang, C. C. and Lin, C. C. Information Sciences
2021-02 期刊論文 Separable Reversible Data Hiding in Encrypted Images Based on Flexible Preservation of the Differences Liu, L., Wang, L. and Chang, C. C. Multimedia Tools and Applications
2021-01 期刊論文 A Novel Image Compression Technology Based on Vector Quantization and Linear Regression Prediction Xu, S., Chang, C. C. and Liu, Y. Connection Science
2021-01 期刊論文 An Adaptive Reversible Data Hiding Scheme using AMBTC and Quantization Level Difference Chen, Y. H., Chang, C. C., Lin, C. C. and Wang, Z. M. Applied Sciences
2021-01 期刊論文 An Anisotropic Reference Matrix for Image Steganography Lin, J., Horng, J. H., Liu, Y. and Chang, C. C. Journal of Visual Communication and Image Representation
2021-01 期刊論文 Reversible Data Hiding for AMBTC Compressed Images Based on Matrix and Hamming Coding Lin, C. C., Lin, J. and Chang, C. C. Electronics
2021-01 期刊論文 Using an Optimization Algorithm to Detect Hidden Waveforms of Signals Chang, Y. C. and Chang, C. C. Sensors
2021-01 期刊論文 Visible 3D-model Watermarking Algorithm for 3D-Printing Based on Bitmap Fonts Yan, C., Zhang, G., Wang, A., Liu, L. and Chang, C. C. International Journal of Network Security
2020-12 期刊論文 ARFV: An Efficient Shared Data Auditing Scheme Supporting Revocation for Fog-Assisted Vehicular Ad-Hoc Networks Cui, M., Han, D., Wang, J., Li, K. C. and Chang, C. C. IEEE Transactions on Vehicular Technology
2020-11 期刊論文 A Ring Signature Based Anonymity Authentication Scheme for Group Medical Consultation Lin, C. C., Chang, C. C. and Zheng, Y. Z. Symmetry
2020-11 期刊論文 Information Hiding in Motion Data of Virtual Characters Wu, X., Guo, S., Xing, G., Liao, M., Chang, C. C. and Chuen, Y. Expert Systems and Applications
2020-11 期刊論文 Secure High Capacity Tetris-Based Scheme for Data Hiding Su, G. D., Chang, C. C., Lin, C. C. and Yao, Z. IET Image Processing
2020-10 期刊論文 3D Multilayered Turtle Shell Models for Image Steganography Horng, J. H., Lin, J., Liu, Y. and Chang, C. C. Computer Modeling in Engineering and Sciences
2020-10 期刊論文 A Fair and Secure Reverse Auction for Government Procurement Lin, C. C., Chang, Y. F., Chang, C. C. and Zheng, Y. Z. Sustainability
2020-10 期刊論文 An Efficient General Data Hiding Scheme Based on Image Interpolation Chen, Y. Q., Sun, W. J., Li, L. Y., Chang, C. C. and Wang, X. Journal of Information Security and Applications
2020-10 期刊論文 Greedy Algorithm for Image Quality Optimization Based on Turtle-Shell Steganography Qiu, G. H., Lee, C. F. and Chang, C. C. International Journal of Computational Science and Engineering
2020-10 期刊論文 Reversible Data Hiding in Encrypted Images Based on Reversible Integer Transformation and Quadtree-based Partition Chen, S. and Chang, C. C. IEEE Access
2020-09 期刊論文 A Novel (2, 3) Reversible Secret Image Sharing Based on Fractal Matrix Gao, K., Horng, J. H. and Chang, C. C. IEEE Access
2020-09 期刊論文 A Secure IoT-based Authentication Scheme in Cloud Computing Environment Wu, H. L., Chang, C. C., Zheng, Y. Z., Chen, L. S. and Chen, C. C. Sensors
2020-09 期刊論文 An Improved Sudoku-based Data Hiding Scheme Using Greedy Method Chang, C. C. Su, G. D., and Lin, C. C. International Journal of Computational Science and Engineering
2020-09 期刊論文 Effective Self-recovery and Tampering Localization Fragile Watermarking for Medical Images Su, G. D., Chang, C. C. and Lin, C. C. IEEE Access
2020-09 期刊論文 One-Code-Pass User Authentication Based on QR Code and Secret Sharing Liu, Y., Chang, C. C. and Huang, P. C. International Journal of Network Security
2020-09 期刊論文 Secure and Anonymous Authentication Scheme for the Internet of Things with Pairing Wu, H. L., Chang, C. C. and Chen, L. S. Pervasive and Mobile Computing
2020-08 期刊論文 An Adaptive Reversible Data Hiding Scheme Based on Prediction Error Histogram Shifting by Exploiting Signed-Digit Representation Xie, X. Z., Chang, C. C. and Hu, Y. C. Multimedia Tools and Applications
2020-08 期刊論文 An Effective Image Self-Recovery based Fragile Watermarking using Self-Adaptive Weight-based Compressed AMBTC Chang, C. C., Lin, C. C. and Su, G. D. Multimedia Tools and Apllications
2020-08 期刊論文 Secure Search for Encrypted Personal Health Records from Big Data NoSQL Databases in Cloud Chen, L., Zhang, N., Sun, H. M., Chang, C. C., Yu, S. and Choo, K. K. R. Computing
2020-07 期刊論文 A Maze Matrix-Based Secret Image Sharing Scheme with Cheater Detection Chang, C. C., Horng, J. H., Shih, C. S. and Chang, C. C. Sensors
2020-07 期刊論文 A Reversible Data Hiding Method for SMVQ Indices Based on Improved Locally Adaptive Coding Chang, C. C., Chen, J. Y., Chen, Y. H. and Liu, Y. International Journal of Network Security
2020-07 期刊論文 A Reversible Secret Image Sharing Scheme Based on Stick Insect Matrix Gao, K., Horng, J. H., Liu, Y. and Chang, C. C. IEEE Access
2020-07 期刊論文 Cryptanalysis and Improvement of A Group Authentication Scheme with Multiple Trials and Multiple Authentications Xia, Z., Liu, Y., Hsu, C. F. and Chang, C. C. Security and Communication Networks
2020-07 期刊論文 Mobile Fog Computing Security: A User-Oriented Smart Attack Defense Strategy Based on DQL Tu, S., Waqas, M., Meng, Y., Rehman, S., Ahmed I., Koubaa, A., Halim, Z., Hanif, M., Chang, C. C. and Shi, C. Computer Communications
2020-07 期刊論文 Sharing a Secret Image in the Cloud Using Two Shadows Chen, Y., Lin, J. Y., Chang, C. C. and Hu, Y. C. International Journal of Network Security
2020-07 期刊論文 Steganography using Quotient Value Differencing and LSB Substitution for AMBTC Compressed Images Horng, J. H., Chang, C. C. and Li, G. L. IEEE Access
2020-07 期刊論文 The Analysis of Stego Image Visual Quality for a Data Hiding Scheme Based on Two-Layer Turtle Shell Matrix Horng, J. H., Xie, X. Z. and Chang, C. C. International Journal of Computational Science and Engineering
2020-07 期刊論文 Unordered Multi-secret Sharing Based on Generalized Chinese Remainder Theorem Li, X., Chen, H., Liu, Y. and Chang, C. C. Security and Communication Networks
2020-06 期刊論文 On Reliability of Multiprocessor System Based on Star Graph Lv, M., Zhou, S., Chen, G., Chen, L., Liu, J. and Chang, C. C. IEEE Transactions on Reliability
2020-05 期刊論文 A Novel High Capacity Turtle Shell-based Data Hiding with Location Table Free Lin, J. Y., Chen, Y., Chang, C. C. and Hu, Y. C. International Journal of Computational Science and Engineering
2020-05 期刊論文 An Efficient Data Hiding Scheme Based on Multi-Dimensional Mini-Sudoku Horng, J. H., Xu, S., Chang, C. C. and Chang, C. C Sensors
2020-05 期刊論文 Plaintext Aware Encryption in the Standard Model under the Linear Diffie-Hellman Knowledge Assumption Gao, D. W., Chen, H. and Chang, C. C. International Journal of Computational Science and Engineering
2020-05 期刊論文 The Application Analysis of Neural Network Techniques on Lexical Tone Rehabilitation of Mandarin-speaking Patients with Post-stroke Dysarthria Mou, Z., Ye, W., Chang, C. C. and Mao, Y. IEEE Access
2020-04 期刊論文 A Data Hiding Scheme Based on Turtle-shell for AMBTC Compressed Images Lee, C. F., Chang, C. C. and Li, G. L. KSII Transactions on Internet and Information Systems
2020-04 期刊論文 Efficient QR Code Secret Embedding Mechanism Based on Hamming Code Huang, P., Chang, C. C., Li, Y. H. and Liu, Y. IEEE Access
2020-04 期刊論文 Multi-layer Mini-Sudoku Based High-Capacity Data Hiding Method Chen, W., Chang, C. C., Weng, S. and Ou, B IEEE Access
2020-04 期刊論文 Reversibly Hiding Data Using Dual Images Scheme Based on EMD Data Hiding Method Chen, Y., Lin, J. Y., Chang, C. C. and Hu, Y. C. International Journal of Computational Science and Engineering
2020-03 期刊論文 A High Embedding Efficiency RDH in Encrypted Image Combining MSB Prediction and Matrix Encoding for Non-volatile Memory-Based Cloud Service Xie, X. Z., Chang, C. C. and Chen, K. M. IEEE Access
2020-03 期刊論文 Adaptive Reversible Data Hiding Scheme for AMBTC Compressed Images Wang, X., Chang, C. C. and Lin, C. C Multimedia Tools and Applications
2020-03 期刊論文 Low-computation-cost Data Hiding Scheme Based on Turtle Shell Chen, Y., Lin, J. Y., Chang, C. C. and Hu, Y. C. International Journal of Network Security
2020-03 期刊論文 Privacy-preserving High-dimensional Data Publishing for Classification Wang, R., Zhu, Y., Chang, C. C. and Peng, Q. Computers & Security
2020-03 期刊論文 Reversible Data Hiding Scheme Based on the AMBTC Compression Technique and Huffman Coding Xia, T. T., Lin, J., Chang, C. C. and Lu, T. C. International Journal of Computational Science and Engineering
2020-03 期刊論文 Steganalysis of Adaptive Multi-rate Speech Based on Extreme Gradient Boosting Sun, C., Tian, H., Chang, C. C., Chen, Y., Cai, Y., Du, Y., Chen, Y. H. and Chen, C. C.* Electronics
2020-03 期刊論文 The Allocation and Reuse Scheme of Physical Cell Identifications Based on Maximum Degree First Coloring Algorithm Liu, M., Tu, S., Xiao, C., Waqas, M., Rehman, S. U., Aamir, M. and Chang, C. C. IEEE Systems Journal
2020-03 期刊論文 Tracking Area List Allocation Scheme Based on Overlapping Community Algorithm Tu, S., Waqas, M., Lin, Q., Rehman, S. U., Hanif, M., Xiao, C., Butt, M. M. and Chang, C. C. Computer Networks
2020-02 期刊論文 A High Capacity Reversible Data Hiding in Encrypted AMBTC-compressed Images Su, G. D., Chang, C. C. and Lin, C. C. IEEE Access
2020-02 期刊論文 ABMC-DH: An Adaptive Bit-plane Data Hiding Method Based on Matrix Coding Yu, Z., Chang, C. C. and Lin, C. C. IEEE Access
2020-02 期刊論文 Fidelity Preserved Data Hiding in Encrypted Images Based on Homomorphism and Matrix Embedding Chen, S., Chang, C. C. and Liao, Q. Y. IEEE Access
2020-02 期刊論文 High Capacity Reversible Data Hiding for VQ-compressed Images Based on Difference Transformation and Mapping Technique Li, Y., Chang, C. C. and He, M. IEEE Access
2020-02 期刊論文 Reversible Data Hiding Schemes in Encrypted Images Based on the Paillier Cryptosystem Chen, H., Chang, C. C. and Chen, K. M. International Journal of Network Security
2020-02 期刊論文 Separable Reversible Data Hiding in Encrypted Images With High Capacity Based on Median-Edge Detector Prediction Liu, L., Wang, A. and Chang, C. C. IEEE Access
2020-02 期刊論文 Two-layer Reversible Data Hiding based on AMBTC Image with (7, 4) Hamming Code Lin, J., Weng, S., Zhang, T., Ou, B. and Chang, C. C. IEEE Access
2020-01 期刊論文 A Hybrid Reversible Data Hiding for Multiple Images with High Embedding Capacity Xie, X. Z., Chang, C. C. and Lin, C. C. IEEE Access
2020-01 期刊論文 A Lightweight Authenticable Visual Secret Sharing Scheme based on Turtle Shell Structure Matrix Li, X. S., Chang, C. C., He, M. X. and Lin, C. C. Multimedia Tools and Applications
2020-01 期刊論文 A Novel Adjustable RDH Method for AMBTC-Compressed Codes Using One-to-many Map Zheng, W., Chang, C. C., and Weng, S. W. IEEE Access
2020-01 期刊論文 Detecting Steganography in Inactive Voice-over-IP Frames Based on Statistic Characteristics of Fundamental Frequency Tian, H., Liu, J., Chang, C. C., Huang, Y, and Cai, Y. IEEE Access
2020-01 期刊論文 Packet Watermarking With ECG Biological Feature Tseng, K. K., He, X., An, X., Chang, C. C., Wang, C. and Guo, X. International Journal of Network Security
2020-01 期刊論文 StegoNote: Steganography in Guitar Music Using Note Modulation Tian, H., Zhu, Z., Chang, C. C., Huang, Y., Wang, T., Chen, Y. and Cai, Y. International Journal of Network Security
2019-12 期刊論文 An Improved Bidirectional Shift-Based Reversible Data Hiding Scheme Using Double-Way Prediction Strategy Li, L., Chang, C. C. and Chen, H. Security and Communication Networks
2019-11 期刊論文 Error-free Separable Reversible Data Hiding in Encrypted Images Using Linear Regression and Prediction Error Map Chen, K. M. and Chang, C. C. Multimedia Tools and Applications
2019-10 期刊論文 A Hybrid Data Hiding Method for Strict AMBTC Format Images with High-Fidelity Chang, C. C., Wang, X., and Horng, J. H. Symmetry
2019-10 期刊論文 A Square Lattice Oriented Reversible Information Hiding Scheme with Reversibility and Adaptivity for Dual Images Su, G. D., Liu, Y. and Chang, C. C. Journal of Visual Communication and Image Representation
2019-10 期刊論文 HBF-DH: An Enhanced Payload Hybrid Data Hiding Method Based on A Hybrid Strategy and Block Features Yu, Z., Lin, C. C., Chang, C. C. and Su, G. D. IEEE Access
2019-10 期刊論文 Light Repository Blockchain System with Multisecret Sharing for Industrial Big Data Chen, H., Wu, H. L., Chang, C. C. and Chen, L. S. Security and Communication Networks
2019-10 期刊論文 Memory Leakage-resilient Dynamic and Verifiable Multi-keyword Ranked Search on Encrypted Smart Body Sensor Network Data Chen, L., Chen, Z., Choo, K. K. R., Chang, C. C. and Sun, H. M IEEE Sensors Journal
2019-10 期刊論文 Reversible Data Hiding Scheme based on Quad-tree and Pixel Value Ordering Li, J. J., Lee, C. F., Chang, C. C., Lin, J. Y. and Wu, Y. H. IEEE Access
2019-10 期刊論文 Reversible Steganographic Scheme for AMBTC-Compressed Image Based on (7, 4) Hamming Code Lin, J., Lin, C. C. and Chang, C. C. Symmetry
2019-10 期刊論文 Secure High Capacity Data Hiding Scheme based on Reference Matrix Li, X. S., Chang, C. C., He, M. X. and Lin, C. C. International Journal of Network Security
2019-10 期刊論文 TSIA: A Novel Image Authentication Scheme for AMBTC-Based Compressed Images Using Turtle Shell Based Reference Matrix Chen, C. C., Chang, C. C., Lin, C. C. and Su, G. D IEEE Access
2019-09 期刊論文 A Mini-Sudoku Matrix-Based Data Embedding Scheme with High Payload He, M. Z., Liu, Y., Chang, C. C. and He, M. IEEE Access
2019-09 期刊論文 An Image Style Transfer Network using Multilevel Noise Encoding and Its Application in Coverless Steganography Zhang, S., Su, S., Li, L., Zhou, Q., Lu, J. and Chang, C. C. Symmetry
2019-09 期刊論文 Dual-Image-Based Reversible Data Hiding Scheme with Integrity Verification Based on Exploiting Modification Direction Lin, J. Y., Chen, Y., Chang, C. C. and Hu, Y. C. Multimedia Tools and Applications
2019-09 期刊論文 Efficient QR Code Authentication Mechanism Based on Sudoku Huang, P. C., Li, Y. H., Chang, C. C. and Liu, Y. Multimedia Tools and Applications
2019-09 期刊論文 Steganalysis of AMR Speech Based on Multiple Classifiers Combination Tian, H., Liu, J., Chang, C. C., Chen, C. C. and Huang, Y. IEEE Access
2019-09 期刊論文 Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pitch Delay Tian, H., Huang, M., Chang, C. C., Huang, Y., Lu, J. and Du, Y. Journal of Universal Computer Science
2019-08 期刊論文 A Biometric-based Authenticated Key Agreement Protocol for User-to-user Communications in Mobile Satellite Networks Nguyen, N. T. and Chang, C. C. Wireless Personal Communications
2019-08 期刊論文 A Secret Image Restoring Scheme Using Threshold Pairs of Unordered Image Shares Li, X., Liu, Y., Chen, H. and Chang, C. C. IEEE Access
2019-08 期刊論文 AMBTC based High Payload Data Hiding with Modulo-2 Operation and Hamming Code Li, L., He, M., Zhang, S., Luo, T. and Chang, C. C. Mathematical Biosciences and Engineering
2019-08 期刊論文 High-payload Secret Hiding Mechanism for QR Codes Huang, P. C., Chang, C. C., Li, Y. H. and Liu, Y. Multimedia Tools and Applications
2019-08 期刊論文 High-precision Authentication Scheme Based on Matrix Encoding for AMBTC-compressed Images Su, G. D., Chang, C. C. and Lin, C. C. Symmetry
2019-08 期刊論文 Hybrid Scheme of Image’s Regional Colorization Using Mask R-CNN and Poisson Editing Ye, W., Chen, H., Zhang, Z., Liu, Y., Weng, S. and Chang, C. C. IEEE Access
2019-08 期刊論文 Tracking Areas Planning Based on Spectral Clustering in Small Cell Networks Lin, Q., Tu, S., Waqas, M., Rehman, S. and Chang, C. C. IET Communications
2019-07 期刊論文 A Novel Secret Sharing Scheme Using Multiple Share Images Li, X., Liu, Y., Chen, H. and Chang, C. C. Mathematical Biosciences and Engineering
2019-07 期刊論文 A Turtle Shell based RDH Scheme with Two-Dimensional Histogram Shifting Xie, X. Z., Chang, C. C., Lin, C. C. and Lin, C. L. Multimedia Tools and Applications
2019-07 期刊論文 Aesthetic QR Code Authentication Based on Directed Periodic Texture Pattern Li, L., He, M., Yu, J., Lu, J., Zhou, Q., Feng, X. and Chang, C. C. Journal of Computers
2019-07 期刊論文 Extended Squared Magic Matrix for Embedding Secret Information with Large Payload Xie, X. Z., Liu, Y. and Chang, C. C. Multimedia Tools and Applications
2019-07 期刊論文 Reversibility-oriented Secret Image Sharing Mechanism with Steganography and Authentication Based on Code Division Multiplexing Xie, X. Z., Chang, C. C. and Lin, C. C. IET Image Processing
2019-06 期刊論文 A Real-Time Dual-Image-Based Reversible Data Hiding Scheme Using Turtle Shells Lin, J. Y., Liu, Y. and Chang, C. C. Journal of Real-Time Image Processing
2019-06 期刊論文 Blockchain based Searchable Encryption for Electronic Health Record Sharing Chen, L., Lee, W. K., Chang, C. C., Choo, K. K. and Zhang, N. Future Generation Computer Systems
2019-06 期刊論文 Public Audit for Operation Behavior Logs with Error Locating in Cloud Storage Tian, H., Chen, Z., Chang, C. C., Huang Y., Wang, T., Huang, Z., Cai, Y. and Chen, Y. Soft Computing
2019-06 期刊論文 Signature Gateway: Offloading Signature Generation to IoT Gateway Accelerated by GPU Chang, C. C., Lee, W. K., Liu, Y., Goi, B. M. and Phan, C. W. IEEE Internet of Things Journal
2019-05 期刊論文 A Reversible Data Hiding Scheme for JPEG Images by Doubling Small Quantized AC Coefficients Xie, X. Z., Lin, C. C. and Chang, C. C. Multimedia Tools and Applications
2019-05 期刊論文 An Interpolative AMBTC-based High-Payload RDH Scheme for Encrypted Images Shiu, P. F., Tai, W. L., Jan, J. K., Chang, C. C. and Lin, C. C. Signal Processing: Image Communication
2019-05 期刊論文 High-capacity Reversible Data Hiding in Encrypted Images Based on Two-phase Histogram Shifting Chen, K. and Chang, C. C. Mathematical Biosciences and Engineering
2019-04 期刊論文 A Video Watermark Algorithm Based on Tensor Decomposition Zhang, S., Guo, X., Xu, X., Li, L. and Chang, C. C. Mathematical Biosciences and Engineering
2019-04 期刊論文 Data Embedding Scheme Based on Multi-Matrix Structure of Turtle Shell to Avoid Human Eye Perception Liu, L., Wang, L. and Chang, C. C. Multimedia Tools and Applications
2019-04 期刊論文 Efficient Secret Sharing Scheme with Cheater Identification Based on QR Code Huang, P. C., Chang, C. C., Li, Y. H. and Liu, Y. KSII Transactions on Internet and Information Systems
2019-04 期刊論文 Enhanced Secure Data Backup Scheme Using Multi-factor Authenticatio Hu, H., Lin, C., Chang, C. C. and Chen, L. IET Information Security
2019-04 期刊論文 Image Neural Style Transfer with Preserving the Salient Regions Xu, Z., Ye, W., Weng, S., Zhang, Z., Chang, C. C. and Tang, H. IEEE Access
2019-03 期刊論文 A Cloud-assisted Passenger Authentication Scheme for Japan Rail Pass Based on Image Morphing Liu, Y. and Chang, C. C. International Journal of Network Security
2019-03 期刊論文 A New Aesthetic QR Code Algorithm based on Salient Region Detection and SPBVM Li, L., Wang, B., Lu, J., Zhang, S. and Chang, C. C. Journal of Internet Technology
2019-03 期刊論文 A Novel (t,n) Secret Sharing Scheme Based Upon Euler's Theorem Chen, H. and Chang, C. C. Security and Communication Networks
2019-03 期刊論文 Dynamic Multi-Keyword Ranked Search Based on Bloom Filter over Encrypted Cloud Data Guo, C., Zhuang, R., Chang, C. C. and Yuan, Q. IEEE Access
2019-03 期刊論文 Efficient Real-time Integrity Auditing with Privacy-preserving Arbitration for Images in Cloud Storage System Tang, X., Huang, Y., Chang, C. C. and Zhou, L. IEEE Access
2019-03 期刊論文 Improved K-pass Pixel Value Ordering Based Data Hiding Weng, S., Chen, Y., Chang, C. C. and Zhang, C. IEEE Access
2019-03 期刊論文 Reversible Data Hiding in Encrypted Images Based on Bit-plane Block Embedding Lin, J. Y., Chen, Y., Chang, C. C. and Hu, Y. C. Journal of Information Hiding and Multimedia Signal Processing
2019-03 期刊論文 Security Protection Using Two Different Image Shadows with Authentication Liu, Y., Chang, C. C. and Huang, P. C. Mathematical Biosciences and Engineering
2019-02 期刊論文 Privacy-preserving Public Auditing for Secure Data Storage in Fog-to-Cloud Computing Tian, H., Nan, F., Chang, C. C., Huang, Y., Chen, Y. and Cai, S. Journal of Network and Computer Applications
2019-01 期刊論文 An Improved Integer Transform Combining with an Irregular Block Partition Weng, S., Chen, Y., Hong, W., Pan, J. S., Chang, C. C. and Liu, Y. Symmetry
2019-01 期刊論文 An Information Theoretically Secure E-lottery Scheme Based on Symmetric Bivariate Polynomials Xia, Z., Liu, Y., Hsu, C. F. and Chang, C. C. Symmetry
2019-01 期刊論文 Content-based Color Image Retrieval Using Block Truncation Coding Based on Binary Ant Colony Optimization Chen, Y. H., Chang, C. C., Lin, C. C. and Hsu, C. Y. Symmetry
2019-01 期刊論文 High-capacity Reversible Data Hiding in Encrypted Images Based on Extended Run-Length Coding and Block-based MSB Plane Rearrangement Chen, K. M. and Chang, C. C. Journal of Visual Communication and Image Representation
2019-01 期刊論文 Privacy Preserving Weighted Similarity Search Scheme for Encrypted Data Guo, C., Tian, P. and Chang, C. C. IET Image Processing
2019-01 期刊論文 Public Auditing for Shared Cloud Data with Efficient and Secure Group Management Tian, H., Nan, F., Jiang, H., Chang, C. C., Ning, J. and Huamg, Y. Information Sciences
2019-01 期刊論文 Real-Time Error-Free Reversible Data Hiding in Encrypted Images Using (7, 4) Hamming Code and Most Significant Bit Prediction Chen, K. and Chang, C. C. Symmetry
2019-01 期刊論文 Separable Data-Hiding Scheme for Encrypted Image to Protect Privacy of User in Cloud Liu, L., Wang, L., Shi, Y. Q. and Chang, C. C. Symmetry
2018-12 期刊論文 A Publicly Verifiable Multi-secret Sharing Scheme with Outsourcing Secret Reconstruction Lin, C., Hu, H., Chang, C. C. and Tang, S. IEEE Access
2018-12 期刊論文 Separable Reversible Data Hiding in Encrypted Images via Adaptive Embedding Strategy with Block Selection Qin, C., Zhang, W., Cao, F., Zhang, X. and Chang, C. C. Signal Processing
2018-12 期刊論文 Steganalysis of Inactive Voice-over-IP Frames Based on Poker Test Liu, J., Tian, H., Chang, C. C., Wang, T., Chen, Y. and Cai, Y. Symmetry
2018-11 期刊論文 Security in Fog Computing: A Novel Technique to Tackle an Impersonation Attack Tu, S., Waqas, M., Rehman, S. R., Aamir, M., Rehman, O. U., Zhang, J. and Chang, C. C. IEEE Access
2018-10 期刊論文 A Novel Aesthetic QR Code Algorithm Based on Hybrid Basis Vector Matrices Lu, J., Cheng, W., Zhang, S., Li, L., Yang, Z. and Chang, C. C. Symmetry
2018-10 期刊論文 A Turtle Shell-based Visual Secret Sharing Scheme with Reversibility and Authentication Liu, Y. and Chang, C. C. Multimedia Tools and Applications
2018-10 期刊論文 Effective Reversible Image Steganography Based on Rhombus Prediction and Local Complexity Nguyen, T. S., Chang, C. C. and Shih, T.H. Multimedia Tools and Applications
2018-10 期刊論文 Privacy-Preserving Algorithms for Multiple Sensitive Attributes Satisfying t-Closeness Wang, R., Zhu, Y., Chen, T. S. and Chang, C. C. Journal of Computer Science and Technology
2018-10 期刊論文 Sudoku-based Secret Sharing Approach With Cheater Prevention Using QR Code Huang, P. C., Chang, C. C. and Li, Y. H. Multimedia Tools and Applications
2018-09 期刊論文 A Biometric-based Authenticated Key Agreement Scheme for Session Initiation Protocol in IP-based Multimedia Networks Nguyen, N. T. and Chang, C. C. Multimedia Tools and Applications
2018-09 期刊論文 Adjacency-Hash-Table based Public Auditing for Data Integrity in Mobile Cloud Computing Chen, W., Tian, H., Chang, C. C., Nan, F. and Lu, J. Wireless Communications and Mobile Computing
2018-08 期刊論文 A New Aesthetic QR Code Algorithm based on Salient Region Detection and SPBVM Li, L., Wang, B., Lu, J., Zhang, S. and Chang, C. C. Journal of Internet Technology
2018-08 期刊論文 An Authentication Method Based on the Turtle Shell Algorithm for Privacy-Preserving Data Mining Wang, R., Zhu, Y., Chen, T. S. and Chang, C. C. The Computer Journal
2018-08 期刊論文 High Embedding Capacity Data Hiding Algorithm for H.264/AVC Video Sequences without Intraframe Distortion Drift Nguyen, D. C., Nguyen T. S., Chang, C. C., Hsueh, H. S., and Hsu, F. R. Security and Communication Networks
2018-08 期刊論文 Reversible Data Hiding for VQ Indices using Hierarchical State Codebook Mapping Xia, B., Wang, A., Chang, C. C. and Liu, L. Multimedia Tools and Applications
2018-07 期刊論文 A Cascaded Algorithm for Image Quality Assessment and Image Denoising Based on CNN for Image Security and Authorization Li, J., Yu, J., Xu, L., Xue, X., Chang, C. C., Mao, X. and Hu, J. Security and Communication Networks
2018-07 期刊論文 A Novel Method of Speech Information Hiding Based on 3D-Magic Matrix Yang, Z. L., Peng, X. S., Huang, Y. F. and Chang, C. C. Journal of Internet Technology
2018-07 期刊論文 A Watermarking Mechanism With High Capacity for Three-Dimensional Mesh Objects Using Integer Planning Li, L., Li, H., Yuan, W., Feng, X., Lu, J. and Chang, C. C. IEEE Multimedia
2018-07 期刊論文 An Adaptive High-Fidelity Steganographic Scheme Using Edge Detection and Hybrid Hamming Codes Lee, C. F., Chang, C. C., Xie, X. Z., Mao, K. and Shi, R. H. Displays
2018-07 期刊論文 Framework for Practical and Receipt-free Remote Voting Xia, Z., Tong, Z., Xiao, M. and Chang, C. C. IET Information Security
2018-07 期刊論文 Imbalanced Image Classification Approach Based on Convolution Neural Network and Cost-sensitivity Tan, J., Zhu, Y., Chen, T. S. and Chang, C. C. Journal of Computer Applications
2018-07 期刊論文 Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image Tampering Recovery Qin, C., Ji, P., Chang, C. C., Dong, J. and Sun, X. IEEE Multimedia
2018-07 期刊論文 StegTab: Steganography in Guitar Tablatures Zhu, Z., Tian, H., Chang, C. C., Chen, Y., Wang, T. and Cai, Y. Journal of Information Hiding and Multimedia Signal Processing
2018-06 期刊論文 An Efficient Object Detection Algorithm Based on Compressed Networks Li, J., Peng, K. and Chang, C. C. Symmetry
2018-06 期刊論文 Detecting Bitrate Modulation-Based Covert Voice-Over-IP Communication Tian, H., Sun, J., Chang, C. C., Huang, Y. and Chen, Y. IEEE Communications Letters
2018-06 期刊論文 Detection of Bird‘s Nest in High Power Lines in the Vicinity of Remote Campus Based on Combination Features and Cascade Classifier Lu, J., Xu, X., Li, X., Li, L., Chang, C. C., Feng, X. and Zhang, S. IEEE Access
2018-05 期刊論文 A Selective Encryption Scheme of CABAC based on Video Context in High Efficiency Video Coding Li, J. Wang, C., Chen, X., Tang, Z., Hui, G. and Chang, C. C. Multimedia Tools and Applications
2018-05 期刊論文 An Improved Data Hiding Method Based on Lempel-Ziv-Welch Compression Codes Chang, C. C., Huynh, N. T., Wang, Y. K. and Liu, Y. International Journal of Network Security
2018-05 期刊論文 Computer-Aided Annotation for Video Tampering Dataset of Foyensic Research Yao, Y., Yu, C. X., Yang, L., Chang, C. C. Journal of Information Hiding and Multimedia Signal Processing
2018-05 期刊論文 Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction Huang, P. C., Li, Y. H., Chang, C. C. and Liu, Y. KSII Transactions on Internet and Information Systems
2018-05 期刊論文 Untraceable Biometric-Based Three-Party Authenticated Key Exchange for Dynamic Systems Nguyen, N. T. and Chang, C. C. Peer-to-Peer Networking and Applications
2018-04 期刊論文 A Reversible Data Hiding Scheme Based on Absolute Moment Block Truncation Coding Compression Using Exclusive OR Operator Chang, C. C., Chen, T. S., Wang, Y. K. and Liu, Y. Multimedia Tools and Applications
2018-04 期刊論文 New Secret Sharing Scheme Based on Faster R-CNNs Image Retrieval Li, J., Wang, N., Wang, Z. H., Li, H., Chang, C. C. and Wang, H. IEEE Access
2018-04 期刊論文 Optimization of CNN through Novel Training Strategy for Visual Classification Problems Rehman, S., Tu, S., Rehman, O., Huang, Y, Magurawalage, C. and Chang, C. C. Entropy
2018-03 期刊論文 A Secure and Efficient Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communication Guo, C., Chang, C. C. and Chang, S. C. International Journal of Network Security
2018-03 期刊論文 Minima-Maxima Preserving Data Hiding Algorithm for Absolute Moment Block Truncation Coding Compressed Images Huynh, N. T., Bharanitharan, K., Chang, C. C. and Liu, Y. Multimedia Tools and Applications
2018-03 期刊論文 Reversible Data Hiding Scheme Based on the Haar Discrete Wavelet Transform and Interleaving Prediction Method Li, F., Mao, Q. and Chang, C. C. Multimedia Tools and Applications
2018-02 期刊論文 Data Hiding Based on A Two-layer Turtle Shell Matrix Xie, X. Z., Lin, C. C. and Chang, C. C. Symmetry
2018-02 期刊論文 Efficient Access Control System Based on Aesthetic QR Code Huang, P. C., Chang, C. C., Li, Y. H. and Liu, Y. Personal and Ubiquitous Computing
2018-01 期刊論文 An Effective Authentication Scheme Using DCT for Mobile Devices Chang, C. C., Lu, T. C., Zhu, Z. H and Tian, H. Symmetry
2018-01 期刊論文 Attacks on "A Provably Secure and Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems" Wu, H. L. and Chang, C. C. Multimedia Tools and Applications
2018-01 期刊論文 Detecting Bitrate Modulation-Based Covert Voice-Over-IP Communication Tian, H., Sun, J., Chang, C. C., Huang, Y. and Chen, Y. IEEE Communications Letters
2018-01 期刊論文 Efficient Information Hiding Based on Theory of Numbers Liu, Y., Chang, C. C., Huang, P. C. and Hsu, C. Y. Symmetry
2018-01 期刊論文 Generalized PVO-K Embedding Technique for Reversible Data Hiding Li, J. J., Wu, Y. H., Lee, C. F. and Chang, C. C. International Journal of Network Securit
2018-01 期刊論文 High-Capacity Reversible Data Hiding Method for JPEG Images Chang, C. C., Tang, R., Lin, C. C. and Lyu, W. L. Journal of Software
2018-01 期刊論文 No-Reference Image Blur Assessment Based on SIFT and DCT Zhang, S., Wu, T., Xu, X., Cheng, Z., Pu. S. and Chang, C. C Journal of Information Hiding and Multimedia Signal Processing
2018-01 期刊論文 Optimum Feature Selection Based on Genetic Algorithm Under Web Spam Detection Wang, J. Q., Zhu, Y., Chen, T. S. and Chang, C. C. Journal of Computer Applications
2018-01 期刊論文 Perceptual Hashing for Color Images Based on Hybrid Extraction of Structural Features Qin, C., Sun, M. and Chang, C. C. Signal Processing
2018-01 期刊論文 Reversible Data Hiding for JPEG Images Employing All Quantized Non-Zero AC Coefficients Liu, Y. and Chang, C. C. Displays
2018-01 期刊論文 Security Issues in Ultralightweight RFID Authentication Protocols Zhuang, X., Zhu, Y., Chang, C. C.* and Peng, Q. Wireless Personal Communications
2017-12 期刊論文 A Unified Score Propagation Model for Web Spam Demotion Algorithm Zhuang, X., Zhu, Y., Chang, C. C., Peng, Q. and Faisal, M. Information Retrieval Journal
2017-11 期刊論文 A Lossless Data Hiding Scheme Based on VQ Index Frequency Bai, J., Chang, C. C. and Zhu, C. Journal of Internet Technology
2017-10 期刊論文 A One-Card-Pass User Authentication Scheme Using Image Morphing Liu, Y. and Chang, C. C. Multimedia Tools and Applications
2017-10 期刊論文 A Semantic Compression Scheme for Digital Images Based on Vector Quantization and Data Hiding Liu, L., Wang, L. F. and Chang, C. C. Multimedia Tools and Applications
2017-10 期刊論文 Cybersecurity for Cyber-Enabled Multimedia Applications Jin, Q., Xiang, Y., Sun, G.,Liu, Y. and Chang, C. C. IEEE MultiMedia
2017-10 期刊論文 Steganography in Low Bit-rate Speech Streams of VoIP Based on Quantization Index Modulation Controlled by Keys Huang, Y, Tao, H., Xiao, B. and Chang, C. C. Science China Technological Sciences
2017-09 期刊論文 An Efficient Steganography Scheme Based on Edge Detection for High Payload Chang, C. C., Nguyen, T. S. and Chien, T. Y. J. of Information Hiding and Multimedia Signal Processing
2017-09 期刊論文 Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage Tian, H., Chen, Y., Chang, C. C., Huang, Y. and Chen, Y. H. IEEE Transactions on Services Computing
2017-07 期刊論文 High Capacity Data Hiding For Binary Image Based on Block Classification Nguyen, T. S., Chang, C. C. and Hsueh, H. S. Multimedia Tools and Applications
2017-07 期刊論文 Notes on Secure Authentication Scheme for IoT and Cloud Servers Chang, C. C., Wu, H. L. and Sun, C. Y. Pervasive and Mobile Computing
2017-07 期刊論文 ShortHC: Self-Regenerated Short Hash Chain for Resource-Constrained System Wang, L. M., Xie, Q. Q., Jiang, T. and Chang, C. C. J. of Information Hiding and Multimedia Signal Processing
2017-07 期刊論文 Vessel Detection in Chicken Chorioallantoic Membrane Image Chang, C. C., Pai, P. Y., Tsai, M. H. and Chan, Y. K. J. of Information Hiding and Multimedia Signal Processing
2017-06 期刊論文 Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pulse Pairs Tian, H., Wu, Y., Chang, C. C., Huang, Y., Chen, Y., Wang, T., Liu, J. and Cai, Y. Signal Processing
2017-05 期刊論文 A Difference Expansion Based Reversible Information Hiding Scheme with High Stego Image Visual Quality Chang, C. C., Huang, Y. H. and Lu, T. C. Multimedia Tools and Applications
2017-05 期刊論文 A Secret Image Sharing with Deep-steganography and Two-stage Authentication Based on Matrix Encoding Liu, L., Wang, A. Chang, C. C. and Li, Z. International Journal of Network Security
2017-05 期刊論文 Data Hiding Based on Extended Turtle Shell Matrix Construction Method Liu, L., Chang, C. C. and Wang, A. Multimedia Tools and Applications
2017-05 期刊論文 Protecting User Privacy in a Multi-path ICN Using Multiple Random-Caches Chu, W., Wang, L., Jiang, Z. and Chang, C. C. Journal of Computer Science and Technology
2017-04 期刊論文 Enabling Public Auditability for Operation Behaviors in Cloud Storage Tian, H., Chen, Z., Chang, C. C., Kuribayashi, M. and Huang, Y. Software Computing
2017-04 期刊論文 Hiding Information into Voice-over-IP Streams Using Adaptive Bitrate Modulation Tian, H., Sun, J., Qin, J., Chang, C. C. and Chen, Y. IEEE Communications Letters
2017-04 研討會論文 A Reversible Data Hiding Scheme for Image Interpolation Based on Reference Matrix Chang, C. C., Nguyen, T. S. and Liu, Y.
2017-04 研討會論文 An Offline User-Verifiable Electronic Traveler's Check System Chang, C. C., Yang, J. H. and Lai, Y. W. and Liu, Y.
2017-04 研討會論文 Reversible Data Hiding in Encrypted Images Using Reformed JPEG Compression Xie, X. Z. and Chang, C. C.
2017-03 期刊論文 Feature Bundling for Decision Tree Algorithm Zhuang, X., Zhu, Y., Chang, C. C. and Peng, Q. Intelligent Data Analysis
2017-03 期刊論文 Lottery Protocol Using Oblivious Transfer Based on ECC Liu, Y. N., Liu, G. and Chang, C. C. Journal of Internet Technology
2017-03 期刊論文 Multiple Schemes for Mobile Payment Authentication Using QR Code and Visual Cryptography Lu, J., Yang, Z., Li, L., Yuan, W., Li, L. and Chang, C. C. Mobile Information Systems
2017-03 期刊論文 Turbo Unequal Error Protection Codes with Multiple Protection Levels Mao, Q. and Chang, C. C. International Journal of Network Security
2017-02 期刊論文 A Secure and Efficient Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communication Guo, C., Chang, C. C. and Chang, S. C. International Journal of Network Security
2017-02 期刊論文 Minima-Maxima Preserving Data Hiding Algorithm for Absolute Moment Block Truncation Coding Compressed Images Huynh, N. T., Bharanitharan, K., Chang, C. C. and Liu, Y. Multimedia Tools and Applications
2017-02 期刊論文 Recent Advances in Security and Privacy for Wireless Sensor Networks 2016 Yu, F., Chang, C. C., Shu, J., Ahmad, J. S., Zhang, J. and Fuentes, J. M. Journal of Sensors
2017-01 期刊論文 "Fragile Image Watermarking Scheme Based on VQ Index Sharing and Self-embedding Qin, C., Ji, P., Wang, J. and Chang, C. C. Multimedia Tools and Applications
2017-01 期刊論文 A High Payload Steganographic Algorithm Based on Edge Detection Bai, J., Chang, C. C., Nguyen, T. S., Zhu, C. and Liu, Y. Displays
2017-01 期刊論文 A Novel Micropayment Scheme with Variable Denomination Zhao, Q. Y., Liu, Y. N., Liu, G. and Chang, C. C. International Journal of Network Security
2017-01 期刊論文 Attacks on "A Provably Secure and Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems" Wu, H. L. and Chang, C. C. Multimedia Tools and Applications
2017-01 期刊論文 Attacks on A Provably Secure and Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems Wu, H. L. and Chang, C. C. Multimedia Tools and Applications
2017-01 期刊論文 Minimizing Turtle-Shell Matrix Based Stego Image Distortion Using Particle Swarm Optimization Jin, Q., Li, Z., Chang, C. C., Wang, A. and Liu, L. International Journal of Network Security
2017-01 期刊論文 Reversible Data Hiding Using Pixel Order Exchange Wu, H. L., Chang, C. C. and Nguyen, T. S. International Journal of Future Computer and Communication
2017-01 期刊論文 Secure Multi-group Data Hiding Based on GEMD Map Kuo, W. C., Chang, S. Y., Wang, C. C. and Chang, C. C. Multimedia Tools and Applications
2016-12 期刊論文 A Robust and Removable Watermarking Scheme Using Singular Value Decomposition Di, Y. F., Lee, C. F., Wang, Z. H., Chang, C. C. and Li, J. J. KSII Transactions on Internet and Information Systems
2016-12 期刊論文 Bi-Stretch Reversible Data Hiding Algorithm for Absolute Moment Block Truncation Coding Compressed Images Li, F., Bharanitharan, K., Chang, C. C. and Mao, Q. Multimedia tools and Applications
2016-12 期刊論文 Generalized PVO-K Embedding Technique for Reversible Data Hiding Li, J. J., Wu, Y. H., Lee, C. F. and Chang, C. C. International Journal of Network Security
2016-12 期刊論文 Reversible Data Hiding Scheme Based on the Haar Discrete Wavelet Transform and Interleaving Prediction Method Li, F., Mao, Q. and Chang, C. C. Multimedia Tools and Applications
2016-11 期刊論文 A High Payload Steganographic Scheme for Compressed Images with Hamming Code Bai, J. and Chang, C. C. International Journal of Network Security
2016-11 期刊論文 A Survey of Fragile Watermarking-based Image Authentication Techniques Liu, X. L., Lin, C. C., Chang, C. C. and Yuan, S. M. Journal of Information Hiding and Multimedia Signal Processing
2016-11 期刊論文 A Universal Authentication Scheme with Anonymity for Heterogeneous Wireless Networks Chang, C. C., Tseng, W. T. and Tsai, H. C. Journal of Information Hiding and Multimedia Signal Processing
2016-11 期刊論文 An Advanced Anonymous and Biometrics-based Multi-server Authentication Scheme Using Smart Cards Chang, C. C., Hsueh, W. Y. and Cheng, T. F. International Journal of Network Security
2016-11 期刊論文 Novel Lossless Morphing Algorithm for Secret Sharing via Meaningful Images Mao, Q., Bharanitharan, K. and Chang, C. C. Journal of Information Hiding and Multimedia Signal Processing
2016-11 期刊論文 Smart Card Based Password Authenticated Key Agreement Protocol Using Chaotic Maps Cheng, T. F., Chang, C. C. and Lo, Y. Y. International Journal of Communication Systems
2016-11 期刊論文 The Study of Difference-Expansion Embedding Schemes Mao, K., Lee, C. F., Chang, C. C. and Shi, R. H. Journal of Electronic Science and Technology, Special Issue on Information Security and Applications
2016-11 研討會論文 A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Liu, Y., Chang, C. C. and Chien, T. Y.
2016-11 研討會論文 A Secure Authentication Scheme for Telecare Medical Information Systems Chang, C. C., Lee, J. S., Lo, Y. Y. and Liu, Y.
2016-11 研討會論文 The Reduction of VQ Index Table Size by Matching Side Pixels Di, Y. F., Wang, Z. H., Lee, C. F. and Chang, C. C.
2016-10 期刊論文 A Novel Image Protection Scheme using Bit-plane compression and Secret Sharing Strategies Liu, Y., Zhong, Q. and Chang, C. C. Journal of the Chinese Institute of Engineers
2016-09 期刊論文 A Novel Pixel Grouping Scheme for AMBTC Based on Particle Swarm Optimization Li, Z, Jin, Q., Chang, C. C., Wang, A. and Liu, L. Journal of Information Hiding and Multimedia Signal Processing
2016-09 期刊論文 A Robust Image Copy Detection Method Based on Feature Extraction Algorithm Wang, Q., Xu, X., Li, L., Lu, J., Chang, C. C. and Wang, Q. Journal of Information Hiding and Multimedia Signal Processing
2016-09 期刊論文 Composable Secure Roaming Authentication Protocol for Cloud-assisted Body Sensor Networks Xie, Q. Q., Jiang, S. R, Wang, L. M and Chang, C. C. International Journal of Network Security
2016-09 期刊論文 Reversible Data Hiding Scheme Based on Histogram Shifting of n-bit Planes Liu, L., Chang, C. C. and Wang, A. Multimedia Tools and Applications
2016-09 期刊論文 Robust Off-line E-cash Scheme with Recoverability and Anonymity Revocation Wang, F., Chang, C. C. and Chang, S. C. Security and Communication Networks
2016-09 期刊論文 Text Steganography Based on Ci-poetry Generation Using Markov Chain Model Luo, Y. B., Huang, Y. F., Li, F. F. and Chang, C. C. KSII Transactions on Internet and Information Systems
2016-08 期刊論文 A CAS-based Authentication Scheme for Mobile Pay-TV Systems Wang, F., Chang, C. C. and Wu, H. L. International Journal of Communication Systems
2016-08 期刊論文 A Load Balance Strategy of Data Routing Algorithm Using Semantics for Deduplication Clusters Jiang, Z., Zhang, Z., Wang, L., Chang, C. C. and Liu, L. Journal of Electronic Science and Technology
2016-08 期刊論文 A Reversible Image Authentication Scheme Based on Fragile Watermarking in Discrete Wavelet Transform Domain Nguyen, T. S., Chang, C. C. and Yang, X. Q. International Journal of Electronics and Communications
2016-08 研討會論文 A Novel Reversible Ternary Embedding Algorithm Based on Modified Full Context Prediction Errors Li, L., Chang, C. C., Bharanitharan, K. and Liu, Y.
2016-07 期刊論文 A Fast Image Coding Algorithm Using Indirect-index Codebook Based on SMVQ Xia, B., Wang, A., Chang, C. C. and Liu, L. Journal of Electronic Science and Technology
2016-07 期刊論文 A High-Payload, Reversible Data Hiding Scheme Based on Histogram Modification in JPEG Bitstream Lin, C. C., Chang, C. C. and Liu, X. L. Imaging Science Journal
2016-07 期刊論文 A Novel Three-party Authenticated Key Exchange Protocol Based on Secret Sharing Liu, Y., Chang, C. C. and Sun, C. Y. Journal of Information Hiding and Multimedia Signal Processing
2016-07 期刊論文 An Effective Mobile Visual Searching Algorithm Based on the Bag-of-Words Method for Furniture Images Li, L., Zheng, D., Lu, J., Mao, X. and Chang, C. C. Journal of Information Hiding and Multimedia Signal Processing
2016-07 期刊論文 An Image Steganography Scheme Using 3D-Sudoku Xia, B., Wang, A., Chang, C. C. and Liu, L. Journal of Information Hiding and Multimedia Signal Processing
2016-07 期刊論文 An Integratable Verifiable Secret Sharing Mechanism Liu, Y. and Chang, C. C. International Journal of Network Security
2016-07 期刊論文 Efficient Pixel Prediction Algorithm for Reversible Data Hiding Bharanitharan, K., Chang, C. C., Yang, H. R. and Wang, Z. H. International Journal of Network Security
2016-06 期刊論文 An Aesthetic QR Code Solution Based on Error Correction Mechanism Li, L., Qiu, J., Lu, J. and Chang, C. C. Journal of Systems and Software, Special Issue on JSS 35th Anniversary
2016-06 期刊論文 An Untraceable Biometric-based Multi-server Authenticated Key Agreement Protocol with Revocation Chang, C. C. and Nguyen, N. T. Wireless Personal Communications
2016-05 期刊論文 A Common Bitmap Block Truncation Coding for Color Images Based on Binary Ant Colony Optimization Li, Z., Jin, Q., Chang, C. C., Wang, A. and Liu, L. KSII Transactions on Internet and Information Systems
2016-05 期刊論文 A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method Li, F., Mao, Q. and Chang, C. C. International Journal of Network Security
2016-05 期刊論文 An Efficient Electronic English Auction System with a Secure On-shelf Mechanism and Privacy Preserving Zhong, H., Li, S., Cheng, T. F. and Chang, C. C. Journal of Electrical and Computer Engineering, Special Issue on Innovations in Communications Security
2016-05 期刊論文 Image Authentication and Self-Recovery Scheme Based on the Rehashing Model Lyu, W. L., Chang, C. C. and Wang, F. Journal of Information Hiding and Multimedia Signal Processing
2016-05 期刊論文 Security Analysis on "Secure Untraceable Off-line Electronic Cash System" Wang, F., Chang, C. C. and Lin, C. L. International Journal of Network Security
2016-04 期刊論文 A Novel Data-Hiding and Compression Scheme Based on Block Classification of SMVQ indices Chang, C. C., Nguyen, T. S., Lin, M. C. and Lin, C. C. Digital Signal Processing
2016-04 期刊論文 An Improved Least-Significant-Bit Substitution Method Using the Modulo Three Strategy Xu, W. L., Chang, C. C., Chen, T. S. and Wang, L. M. Displays
2016-03 期刊論文 A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks Chang, C. C., Hsueh, W. Y. and Cheng, T. F. Wireless Personal Communication
2016-03 期刊論文 A Highly Efficient and Secure Electronic Cash System Based on Secure Sharing in Cloud Environment Chang, C. C., Chen, W. Y. and Chang, S. C. Security and Communication Networks
2016-03 期刊論文 A Novel Fragile Watermark-based Image Authentication Scheme for AMBTC-compressed Images Zhong, H., Liu, H. Q., Chang, C. C. and Lin, C. C. Journal of Information Hiding and Multimedia Signal Processing
2016-03 期刊論文 A Strong RSA-based and Certificateless-based Signature Scheme Chang, C. C., Sun, C. Y. and Chang, S. C. International Journal of Network Security
2016-03 期刊論文 Novel Occlusion Object Removal with Inter-frame Editing and Texture Synthesis Qin, C., Ren, H., Chang, C. C. and Chen, Q. Journal of Information Hiding and Multimedia Signal Processing
2016-03 期刊論文 Provably Secure and Efficient Three-Factor Authenticated Key Agreement Scheme with Untraceability Nguyen, N. T., Le, H. D. and Chang, C. C. International Journal of Network Security
2016-03 期刊論文 Very Efficient Variable-length Codes for the Lossless Compression of VQ Indices Chang, C. C., Lu, T. C., Horng, G. and Huang, Y. H. Multimedia Tools and Applications
2016-02 期刊論文 A Magic Cube Based Information Hiding Scheme of Large Payload Wu, Q., Zhu, C., Li, J. J., Chang, C. C. and Wang, Z. H. Journal of Information Security and Applications
2016-01 期刊論文 A High-Quality Reversible Image Authentication Scheme Based on Adaptive PEE for Digital Images Nguyen, T. S., Chang, C. C. and Shih, T. H. KSII Transactions on Internet and Information Systems
2016-01 期刊論文 A New Distortion-Free Data Embedding Scheme for High-Dynamic Range Images Chang, C. C., Nguyen, T. S. and Lin, C. C. Multimedia Tools and Applications
2016-01 期刊論文 A Practical Lottery Using Oblivious Transfer Liu, Y. N., Cheng, C., Jiang, T. and Chang, C. C. International Journal of Communication Systems
2016-01 期刊論文 A Provably Secure, Efficient and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks Chang, C. C. and Le, H. D. IEEE Transactions on Wireless Communications
2016-01 期刊論文 A Robust and Efficient Dynamic Identity Based Multi-Server Authentication Scheme Using Smart Cards Chang, C. C., Cheng, T. F. and Hsueh, W. Y. International Journal of Communication Systems
2016-01 期刊論文 A Secure Authentication Scheme with Provable Correctness for Pay-TV Systems Wu, H. L., Chang, C. C. and Sun, C. Y. Security and Communication Networks
2016-01 期刊論文 An Image Compression Method Based on Block Truncation Coding and Linear Regression Lyu, W. L. and Chang, C. C. Journal of Information Hiding and Multimedia Signal Processing
2016-01 期刊論文 High Capacity Reversible Data Hiding Scheme for Encrypted Images Nguyen, T. S., Chang, C. C.* and Chang, W. C. Signal Processing: Image Communication
2016-01 期刊論文 Reversible Data Hiding Based on Geometric Structure of Pixel Groups Wang, Z. H., Zhuang, X., Chang, C. C., Qin, C. and Yan, Z. International Journal of Network Security
2016-01 期刊論文 Secure Multi-group Data Hiding Based on GEMD Map Kuo, W. C., Chang, S. Y., Wang, C. C. and Chang, C. C. Multimedia Tools and Applications
2016-01 期刊論文 Secure and Efficient Identity-Based Proxy Multi-Signature Using Cubic Residues Wang, F., Chang, C. C., Lin, C. L. and Chang, S. C. International Journal of Network Security
2016-01 期刊論文 Zero-watermarking for Face Image Protection in Database Le, H. D., Xu, X., Wang, Q., Li, L. and Chang, C. C. Journal of Internet Technology
2015-12 期刊論文 An Efficient and Secure Smart Card Based Password Authentication Scheme Liu, Y., Chang, C. C. and Chang, S. C. International Journal of Network Security
2015-12 期刊論文 Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage Tian, H., Chen, Y., Chang, C. C., Huang, Y. and Chen, Y. H. IEEE Transactions on Service Computing
2015-12 期刊論文 Extending the Capture Volume of an Iris Recognition System Using Wavefront Coding and Super-Resolution Hsieh, S. H., Li, Y. H., Tien, C. H. and Chang, C. C. IEEE Transactions on Cybernetics
2015-12 期刊論文 Multi-Round Dynamic Swap Optimization for Table Based Steganograph Mao, Q., Bharanitharan, K. and Chang, C. C.  IET Image Processing
2015-12 期刊論文 Notes on “Secure Authentication Scheme for IoT and Cloud Servers” Chang, C. C., Wu, H. L. and Sun, C. Y. Pervasive and Mobile Computing
2015-12 期刊論文 Sharing a Large Secret Image Using Meaningful Shadows Based on VQ and Inpainting Wang, Z. H., Chen, K. N., Chang, C. C. and Qin, C. KSII Transactions on Internet and Information Systems
2015-12 期刊論文 Steganalysis of Analysis-by-synthesis Speech Exploiting Pulse-position Distribution Characteristics Tian, H., Wu, Y., Chang, C. C., Huang, Y., Liu, J., Wang, T., Chen, Y. and Cai, Y. Security and Communication Networks
2015-12 期刊論文 The Credit Card Visual Authentication Scheme Based on GF(2^8) Field Wang, F., Chang, C. C.and Lyu, W. L. Multimedia Tools and Applications
2015-11 期刊論文 A Multi-Purpose Key Agreement Scheme in Ubiquitous Computing Environments Chang, C. C., Wu, C. C. and Lin, I. C. Mobile Information Systems
2015-11 期刊論文 A Novel Reversible Data Hiding Scheme Based on Difference-Histogram Modification and Optimal EMD Algorithm Nguyen, T. S., Chang, C. C. and Huynh, N. T.  Journal of Visual Communication and Image Representation
2015-11 期刊論文 An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks Chang, C. C., Yang, J. H. and Wu, Y. C. International Journal of Network Security
2015-11 期刊論文 Scanned Binary Image Watermarking Based On Additive Model and Sampling Hou, Q., Dai, J., Li, L., Lu, J. and Chang, C. C. Multimedia Tools and Applications
2015-10 期刊論文 A Reversible Data Hiding Scheme Based on the Sudoku Technique Nguyen, T. S. and Chang, C. C. Displays
2015-10 期刊論文 Improved Wet Paper Code Using Simplified Hamming Parity-Check Matrix and Its Application in Voice-over-IP Steganography Tian, H., Qin, J., Chang, C. C., Huang, Y. Liu, J. and Chen, Y. H. Journal of Internet Technology
2015-10 期刊論文 Reversible Data Hiding with Oriented and Minimized Distortions Using Cascading Trellis Coding Mao, Q., Li, F. and Chang, C. C. Information Sciences
2015-09 期刊論文 A Grouped-scalable Secret Image Sharing Scheme Liu, W., Wang, A., Chang, C. C., Li, Z. and Liu, L. Multimedia Tools and Applications
2015-09 期刊論文 A Meaningful Scheme for Sharing Secret Images Using Mosaic Images Zhai, S., Li, F., Chang, C. C. and Mao, Q. International Journal of Network Security
2015-09 期刊論文 Adjustment Hiding Method Based on Exploiting Modification Direction Lee, C. F., Pai, P. Y., Chang, C. C. and Liu, C. M. International Journal of Network Security
2015-09 期刊論文 Dual-Histograms Reversible Data Hiding Capable of Avoiding Underflow/Overflow Problems Chang, C. C., Lu, T. C., Horng, G., Huang, Y. H. and Hsu, T. J. Journal of Information Hiding and Multimedia Signal Processing
2015-09 期刊論文 Dynamic Selective Information Hiding Based on Search Order Coding with Low Bit Rate Chang, C. C., Lin, M. C. and Cheng, T. F. The Imaging Science Journal
2015-09 期刊論文 Lottery Protocol Using Oblivious Transfer Based on ECC Liu, Y. N., Liu, G. and Chang, C. C. Journal of Internet Technology
2015-09 研討會論文 A Modified IMM-CSRF Algorithm for Passive Tracking of Maneuvering Targets Li, J., Meng, L. Wang, Z., Du, J., Fu, X. and Chang, C. C.
2015-09 研討會論文 Enhancement of the Quality of Images Based on Multiple Threshold Segmentation and Adaptive Gamma Correction Li, J., Wu, N. Wang, Z., Du, J., Fu, X. and Chang, C. C.
2015-08 研討會論文 A Reversible Data Hiding Scheme Using Ordered Cluster-based VQ Index Tables for Complex Images Bai, J., Chang, C. C. and Zhu, C.
2015-07 期刊論文 A Generalization of Fully Exploiting Modification Directions Data Hiding Scheme Kuo, W. C., Kao, M. C. and Chang, C. C. Journal of Information Hiding and Multimedia Signal Processing
2015-07 期刊論文 A Novel Information Hiding Scheme Based on Line Segments Wang, Z. H., Wu, Q., Luo, Z. C. and Chang, C. C. Journal of Information Hiding and Multimedia Signal Processing
2015-07 期刊論文 A Novel Untraceable Authentication Scheme for Mobile Roaming in GLOMONET Le, H. D., Chang, C. C. and Chou, Y. C. International Journal of Network Security
2015-07 期刊論文 A Study of Relationship between RSA Public Key Cryptosystem and Goldbach’s Conjecture Properties Liu, C., Chang, C. C., Wu, Z. P. and Ye, S. L. International Journal of Network Security
2015-07 期刊論文 An Outlier Detection Method for Feature Point Matching Problem Tang, J., Jiang, B., Luo, B. and Chang, C. C. An Outlier Detection Method for Feature Point Matching Problem
2015-07 期刊論文 Embedding Information in Chinese Calligraphy Images Wang, Z. H., Chang, C. C., Huang, Y. H., Yang, H. R. and Horng, G. Journal of Computers
2015-07 期刊論文 Hybrid Color Image Steganography Method Used for Copyright Protection and Content Authentication Lyu, W. L., Chang, C. C., Chou, Y. C. and Lin, C. C. Journal of Information Hiding and Multimedia Signal Processing
2015-07 期刊論文 Reversible Data Hiding Scheme Based on Exploiting Modification Direction with Two Steganographic Images Qin, C., Chang, C. C. and Hsu, T. J. Multimedia Tools and Applications
2015-07 期刊論文 Reversible Data Hiding for High Quality Using Secret Data Transformation Strategy Wang, Z. H., Huang, Y. H., Chang, C. C., Yang, H. R. Journal of Information Hiding and Multimedia Signal Processing
2015-07 期刊論文 Very Effective Multi-Layer Reversible Embedding Method Using Low Distortion Modification Huang, Y. H., Chang, C. C., Lin, M. C. and Horng, G. Journal of Information Hiding and Multimedia Signal Processing
2015-07 研討會論文 Reversible Data Hiding for VQ Indices Using XOR Operation and SOC codes Chang, C. C., Huang, Y. H., and Chang, W. C.
2015-05 期刊論文 A Novel Verifiable Secret Sharing Mechanism Using Theory of Numbers and a Method for Sharing Secrets Liu, Y., Harn, L. and Chang, C. C. International Journal of Communication Systems
2015-05 期刊論文 A Provably Secure Smart-card-based Authenticated Group Key Exchange Protocol Chang, C. C. and Le, H. D. Security and Communication Networks
2015-05 期刊論文 A Secure and Efficient Scheme for Digital Gift Certificates Liu, Y., Chang, C. C. and Sun, C. Y. Journal of Information Hiding and Multimedia Signal Processing
2015-05 期刊論文 An Image-Based Key Agreement Protocol Using the Morphing Technique Mao, Q., Chang, C. C., Harn, L. and Chang, S. C. Multimedia Tools and Applications
2015-05 期刊論文 Color PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method Lyu, W. L., Chang, C. C. and Wang, F. Journal of Information Hiding and Multimedia Signal Processing
2015-05 期刊論文 Digital Image Scrambling Algorithm Based on Chaotic Sequence and Decomposition and Recombination of Pixel Values Wang, D., Chang, C. C., Liu, Y. and Song, G. International Journal of Network Security
2015-05 期刊論文 Multiple Watermark Scheme based on DWT-DCT Quantization for Medical Images Lu, J., Wang, M., Dai, J., Huang, Q., Li, L. and Chang, C. C. Journal of Information Hiding and Multimedia Signal Processing
2015-05 期刊論文 Preserving User-Friendly Shadow and High-Contrast Quality for Multiple Visual Secret Sharing Technique Lee, J. S., Chang, C. C., Huynh, N. T. and Tsai, H. Y. Digital Signal Processing
2015-05 期刊論文 Reversible Data Hiding Exploiting High-Correlation Regulation for High-Quality Images Wang, X. T., Li, M. C., Wang, S. T. and Chang, C. C. Security and Communication Networks
2015-05 期刊論文 Tree-Structured Vector Quantization with Flexible Multipath Searching Method Based on Side Match Prediction Liu, L., Wang, A. H., Chang, C. C., Jin, Q. and Xia, B. B. Journal of Information Hiding and Multimedia Signal Processing
2015-05 研討會論文 Secure Electronic Coupons Chang, C. C., Lin, I. C., and Chi, Y. L.
2015-04 期刊論文 A Reversible Compression Code Hiding Using SOC and SMVQ Indices Chang, C. C., Nguyen, T. S. and Lin, C. C. Information Sciences
2015-04 期刊論文 Quadri-Directional Searching Algorithm for Secret Image Sharing Using Meaningful Shadows Huynh, N. T., Bharanitharan, K. and Chang, C. C. Journal of Visual Communication and Image Representation
2015-04 期刊論文 Reversible Data Embedding for Vector Quantization Compressed Images Using Search-Order Coding and Index Parity Matching Qin, C., Chang, C. C., Horng, G., Huang, Y. H. and Chen, Y. C. Security and Communication Networks
2015-04 期刊論文 Second-Order Steganographic Method Based on Adaptive Reference Matrix Yin, Z. X., Chang, C. C., Xu, Q. and Luo, B. IET Image Processing
2015-03 期刊論文 A Critique of a Lightweight Identity Authentication Protocol for Vehicular Networks Jia, X. D., Chang, Y. F., Chang, C. C. and Wang, L. M. Journal of Information Hiding and Multimedia Signal Processing
2015-03 期刊論文 A Dependable Storage Service System in Cloud Environment Chang, C. C., Sun, C. Y. and Cheng, T. F. Security and Communication Networks
2015-03 期刊論文 A Lossy Secret Color Image Sharing Scheme with Small Shadows and Error-resilient Capability Liu, L., Wang, A. H., Chang, C. C., li, Z. H. and Liu, J. B. Journal of Information Hiding and Multimedia Signal Processing
2015-03 期刊論文 A Novel Threshold Conference-Key Agreement Protocol Based on Generalized Chinese Remainder Theorem Guo, C. and Chang, C. C. International Journal of Network Security
2015-03 期刊論文 A Robust Image Encryption Scheme Based on RSA and Secret Sharing for Cloud Storage Systems Wu, H. L. and Chang, C. C. Journal of Information Hiding and Multimedia Signal Processing
2015-03 期刊論文 An Adaptive Reversible Steganographic Scheme Based on the Just Noticeable Distortion Qin, C., Chang, C. C. and Lin C. C. Multimedia Tools and Applications
2015-03 期刊論文 Group Authentication and Group Key Distribution for Ad Hoc Networks Wang, F., Chang, C. C. and Chou, Y. C. International Journal of Network Security
2015-03 期刊論文 Novel and Practical Scheme based on Secret Sharing for Laptop Data Protection Chang, C. C., Chou, Y. C. and Sun, C. Y. IET Information Security
2015-02 期刊論文 A Divide-conquer Heuristic Search Algorithm for Cutting Surplus Steel Plates of Steel & Iron Companies Li, Z. Q., Huang, R., Peng, B. L., Chang, C. C. and Wang, Q. Z. Inter. Journal of Innovative Computing, Info. and Control
2015-01 期刊論文 A Group Key Distribution System Based on the Generalized Aryabhata Remainder Theorem for Enterprise Digital Rights Management Liu, Y., Chang, C. C. and Chang, S. C. Journal of Information Hiding and Multimedia Signal Processing
2015-01 期刊論文 An Adjustable and Reversible Data Hiding Method Based on Multiple-base Notational System without Location Map Lee, C. F., Chang, C. C., Liu, C. M. and Pai, P. Y. Journal of Information Hiding and Multimedia Signal Processing
2015-01 期刊論文 An H.264/AVC HDTV Watermarking Algorithm Robust to Camcorder Recording Li, Li, Dong, Z., Lu, J., Dai, J., Huang, Q., Chang, C. C. and Wu, T. Journal of Visual Communication and Image Representation
2015-01 期刊論文 Ciphertext-Auditable Identity-Based Encryptiong Lin, C. L., Li, Y., Lv, K. and Chang, C. C. International Journal of Network Security
2015-01 期刊論文 Compressing Vector Quantization Index Table Using Side Match State Codebook Chang, C. C., Lin, C. C. and Lin, C. Y. Journal of Information Hiding and Multimedia Signal Processing
2014-12 期刊論文 A New Ultralightweight RFID Protocol for Low-Cost Tags: R2AP Zhuang, X., Zhu, Y. and Chang, C. C. Wireless Personal Communications
2014-12 期刊論文 A Reversible Data Hiding Scheme for SMVQ Indices Chang, C. C. and Nguyen, T. S. Informatica
2014-12 研討會論文 A Virtual Primary Key for Watermarking Textual Relational Databases Chang, C. C., Nguyen, T. S. and Lin, C. C.
2014-11 期刊論文 A New Pixels Flipping Method for Huge Watermarking Capacity of the Invoice Font Image Li, L., Hou, Q., Lu, J., Xu, Q., Dai, J., Mao, X. and Chang, C. C. The Scientific World Journal, Special Issue on Recent Advances in Machine Learning Theory and Applications
2014-11 期刊論文 An Adaptable (n, n) Secret Image Sharing Mechanism Based on Boolean Operation Wang, Z. H., Jin, H., Wang, X. and Chang, C. C. International Journal of Network Security
2014-11 期刊論文 An Authenticated Group Key Distribution Mechanism Using Theory of Numbers Liu, Y., Harn, L. and Chang, C. C. International Journal of Communication Systems
2014-11 期刊論文 Simulatable and Secure Certificate-based Threshold Signature without Pairings Wang, F., Chang, C. C. and Harn, L. Security and Communication Networks
2014-11 期刊論文 The Design of Dynamic Access Control for Hierarchical Sensor Networks with Key-lock-pair Mechanism Chen, X., Liu, Y., Chang, C. C. and Lin, C. L. International Journal of Ad Hoc and Ubiquitous Computing
2014-10 期刊論文 A Database Encryption Scheme Based on the Generalized Aryabhata Remainder Theorem Liu, Y. and Chang, C. C. Journal of Information Hiding and Multimedia Signal Processing
2014-10 期刊論文 A Novel (n, t, n) Secret Image Sharing Scheme without a Trusted Third Party Guo, C., Chang, C. C. and Qin, C. Multimedia Tools and Applications
2014-10 期刊論文 A Novel Chicken Chorioallantoic Membrane Image Vessel Detection Detector Based on Statistic Color Distribution Chang, C. C., Pai, P. Y., Tsai, M. H. and Chan, Y. K. Journal of Information Hiding and Multimedia Signal Processing
2014-10 期刊論文 A Secure Broadcasting Method Based on the Generalized Aryabhata Remainder Theorem Liu, Y. and Chang, C. C. Journal of Information Hiding and Multimedia Signal Processing
2014-10 期刊論文 A Secure Diverse Ticket-sale System in a Distributed Cloud Environment Chang, C. C. and Cheng, T. F. The Computer Journal
2014-10 期刊論文 An Authentication and Key Agreement Protocol for Satellite Communications Chang, C. C., Cheng, T. F. and Wu, H. L. International Journal of Communication Systems
2014-10 期刊論文 Efficient Searching Strategy for Secret Image Sharing with Meaningful Shadows Chang, C. C., Huynh, N. T. and Chung, T. F. International Journal of Machine Learning and Computing
2014-10 期刊論文 Image Watermarking Scheme Based on Scale-Invariant Feature Transform Lyu, W. L., Chang, C. C., Nguyen, T. S. and Lin, C. C. KSII Transactions on Internet and Information Systems
2014-10 期刊論文 Practical Secure and High Efficient Authentication Scheme in Global Mobility Networks Chang, C. C., Sun, C. Y. and Chang, S. C. Journal of Internet Technology
2014-10 期刊論文 Watermarking Marbled Image Based on Linear Enhancement Hologram Dai, J., Liu, Y., Lu, J., Xu, J., Li, L. and Chang, C. C. Journal of Information Hiding and Multimedia Signal Processing
2014-10 研討會論文 A Blind Robust Reversible Watermark Scheme for Textual Relational Databases with Virtual Primary Key Chang, C. C., Nguyen, T. S. and Lin, C. C.
2014-10 研討會論文 Zero-watermarking Based on Improved ORB Features Against Print-cam Attack Lu, J., Huang, Q., Wang, M., Li, L., Dai, J. and Chang, C. C.
2014-09 期刊論文 A Proxy User Authentication Protocol Using Source-Based Image Morphing Mao, Q., Bharanitharan, K. and Chang, C. C. The Computer Journal
2014-09 期刊論文 High Capacity Reversible Hiding Scheme Based on Interpolation, Difference Expansion, and Histogram Shifting Lu, T. C., Chang, C. C. and Huang, Y. H. Multimedia Tools and Applications
2014-08 期刊論文 A Fast and Secure Scheme for Data Outsourcing in the Cloud Liu, Y., Wu, H. L. and Chang, C. C. KSII Transactions on Internet and Information Systems
2014-08 期刊論文 Lossless VQ Indices Compression Based on the High Correlation of Adjacent Image Blocks Wang, Z. H., Yang, H. R., Chang, C. C., Horng, G. and Huang, Y. H. KSII Transactions on Internet and Information Systems
2014-08 研討會論文 Applying Histogram Modification to Embed Secret Message in AMBTC Chang, C. C. Wu, H. L. and Chung, T. F.
2014-08 研討會論文 Polynomial-based Secret Sharing Scheme Based on the Absolute Moment Block Truncation Coding Technique Chang, C. C. and Sun, C. Y.
2014-07 期刊論文 A Data Lossless Message Hiding Scheme without Extra Information Wang, Z. H., Mao, Q. and Chang, C. C. Journal of Internet Technology
2014-07 期刊論文 A Novel Lossless Steganographic Scheme for Data Hiding in Traditional Chinese Text Files Qin, C., Chang, C. C. and Wang, S. T. Journal of Information Hiding and Multimedia Signal Processing
2014-07 期刊論文 Comments and Proofs to Published Paper - A Novel Reversible Robust Watermarking Algorithm Based on a Chaotic System Lin, C. H., Tharan, K.B. and Chang, C. C. International Journal of Network Security
2014-07 期刊論文 Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques Chang, C. C., Chen, Y. H. and Chuang, L. Y. Journal of Information Hiding and Multimedia Signal Processing
2014-07 期刊論文 Notes on"Polynomial-based Key Management for Secure Intra-group and Inter-group Communication" Chang, C. C., Harn, L. and Cheng, T. F. International Journal of Network Security
2014-07 期刊論文 Reversible Data Hiding Scheme for VQ Indices Based on Absolute Difference Trees Chang, C. C., Nguyen, T. S., Lin, C. C. KSII Transactions on Internet and Information Systems
2014-06 期刊論文 A DNA-based Data Hiding Technique with Low Modification Rates Huang, Y. H., Chang, C. C. and Wu, C. Y. Multimedia Tools and Applications
2014-06 期刊論文 A Tamper-Detection Scheme for BTC-Compressed Images with High-Quality Images Nguyen, T. S., Chang, C. C. and Chung, T. F. KSII Transactions on Internet and Information Systems
2014-06 期刊論文 Adaptive Lossless Data Hiding Scheme for SMVQ-Compressed Images using SOC Coding Nguyen, T. S., Chang, C. C., Lin, M. C. Smart Computing Review
2014-06 期刊論文 Lossless and Unlimited Multi-image Sharing Based on Chinese Remainder Theorem and Lagrange Interpolation Chang, C. C., Huynh, N. T. and Le, H. D. Signal Processing
2014-06 期刊論文 Verifiable Secret Sharing Based on the Chinese Remainder Theorem Harn, L, Miao, F. and Chang, C. C. Security and Communication Networks
2014-05 期刊論文 A Reversible Steganography Suitable for Embedding Small Amounts of Data Mao, Q., Chang, C. C. and Chung, T. F. International Journal of Network Security
2014-05 期刊論文 A Simple Password Authentication Scheme Based on Geometric Hashing Function Zhuang, X., Chang, C. C., Wang, Z. H. and Zhu, Y. International Journal of Network Security
2014-05 期刊論文 A User-Friendly and Authenticatable Secret Image Sharing Scheme Lee, J. S., Tsai, H. Y. and Chang, C. C. Journal of Internet Technology
2014-05 期刊論文 Generalized Secret Sharing with Linear Hierarchical Secrets Chen, X., Liu, Y., Chang, C. C. and Guo, C. International Journal of Network Security
2014-05 期刊論文 Reversible Image Hiding for High Image Quality Based on Histogram Shifting and Local Complexity Chang, C. C., Nguyen, T. S. and Lin, C. C. International Journal of Network Security
2014-05 期刊論文 Reversible Image Hiding for High Image Quality based on Histogram Shifting and Local Complexity Chang, C. C., Nguyen, T. S. and Lin, C. C. International Journal of Network and Security
2014-04 期刊論文 (k, n)-Image Reversible Data Hiding Horng, G., Huang, Y. H., Chang, C. C. and Liu, Y. Journal of Information Hiding and Multimedia Signal Processing
2014-04 期刊論文 A Novel SVD-based watermarking Scheme for Protecting Rightful Ownership of Digital Images Lin, C. C., Chang, C. C. and Chen, Y. H. Journal of Information Hiding and Multimedia Signal Processing
2014-03 期刊論文 A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting Qin, C., Chang, C. C. and Chiu, Y. P. IEEE Transactions on Image Processing
2014-02 期刊論文 A High Capacity Data Hiding Scheme for Binary Images Based on Block Patterns Wang, C. C., Lin, C. C., Chang, C. C., Jan, J. K. and Chang, Y. F. Journal of Systems and Software
2014-01 期刊論文 A Novel Real-time and Progressive Secret Image Sharing with Flexible Shadows Based on Compressive Sensing Liu, L., Wang, A., Chang, C. C. and Li, Z. Signal Processing: Image Communication
2014-01 期刊論文 A Novel SD Card Oriented Authentication Protocol with Anonymity for Wireless Roaming Service Cheng, Z. Y., Liu, Y., Chang, C. C. and Chang, C. H. Information-An International Interdisciplinary Journal
2014-01 期刊論文 A Provably Secure t-out-of-n Oblivious Transfer Mechanism Based on Blind Signature Chang, C. C. and Cheng, T. F. Journal of Information Hiding and Multimedia Signal Processing
2014-01 期刊論文 A Reliable Real-time Multicast Authentication Protocol with Provable Accuracy Chang C. C. and Cheng, T. F. Fundamenta Informaticae
2014-01 期刊論文 An Access Control Mechanism Based on the Generalized Aryabhata Remainder Theorem Liu, Y., Chang, C. C. and Chang, S. C. International Journal of Network Security
2014-01 期刊論文 An Authenticated Group Key Distribution Protocol Based on the Generalized Chinese Remainder Theorem Guo, C. and Chang, C. C. International Journal of Communication Systems
2014-01 期刊論文 Design and Analysis of Chameleon Hashing Based Handover Authentication Scheme for Wireless Networks Chang, C. C., Huang, Y. C. and Tsai, H. C. Journal of Information Hiding and Multimedia Signal Processing
2014-01 期刊論文 Distortion Free Progressive BTC based Secret Image Sharing Chang, C. C., Chiu, Y. P., Lin, C. C. and Chen, Y. H. Journal of Information Hiding and Multimedia Signal Processing
2014-01 期刊論文 Efficient and Meaningful Multi-secret Image Sharing Based on Block Imitation Wang, Z. H., Segalla Pizzolatti, M. and Chang, C. C. Journal of Information Hiding and Multimedia Signal Processing
2013-12 研討會論文 A High Payload Data Embedding Scheme Using Dual Stego-images with Reversibility Chang, C. C., Lu, T. C., Horng, G., Huang, Y. H. and Hsu, Y. M.
2013-12 研討會論文 A High-Capacity Reversible Secret Sharing Scheme Using Two Steganographic Images Chang, C. C., Lyu, W. L. and Lin, C. C.
2013-12 研討會論文 A Novel Watermark Scheme for Calligraphy Images Wang, Z. H., Chang, C. C., Huang, Y. H., Yang, H. R. and Horng, G.
2013-11 期刊論文 A Group-oriented Digital Right Management Scheme with Reliable and Flexible Access Policies Chang, C. C. and Yang, J. H. International Journal of Network Security
2013-11 期刊論文 A High-performance Reversible Data-hiding Scheme for LZW Codes Wang, Z. H., Yang, H. R., Cheng, T. F. and Chang, C. C. Journal of Systems and Software
2013-11 期刊論文 An Efficient Smart Card Based Authentication Scheme Using Image Encryption Chang, C. C., Wu, H. L., Wang, Z. H. and Mao, Q. Journal of Information Science and Engineering
2013-11 期刊論文 Effective Fragile Watermarking for Image Authentication with High-quality Recovery Capability Qin, C., Chang, C. C. and Hsu, T. J. KSII Transactions on Internet and Information Systems
2013-10 期刊論文 An Indicator Elimination Method for Side-match Vector Quantization Chang, C. C., Chou, Y. C. and Lin, C. Y. Journal of Information Hiding and Multimedia Signal Processing
2013-10 研討會論文 A Two-staged Multi-level Reversible Data Hiding Exploiting Lagrange Interpolation Lee, C. F., Chang, C. C. and Gao, C. Y.
2013-09 期刊論文 Efficient Reversible Data Hiding for VQ-Compressed Images Based on Index Mapping Mechanism Qin, C., Chang, C. C. and Chen, Y. C. Signal Processing
2013-09 期刊論文 Provably Secure Conference Key Distribution Mechanism Preserving the Forward and Backward Secrecy Lee, J. S., Chang, C. C. and Wei, K. J. International Journal of Network Security
2013-08 期刊論文 A Blind Reversible Robust Watermarking Scheme for Relational Databases Chang, C. C., Nguyen, T. S. and Lin, C. C. The Scientific World Journal
2013-08 期刊論文 A Novel Reversible Data Hiding Scheme for VQ-Compressed Images Using Index Set Construction Strategy Qin, C., Chang, C. C. and Chen, Y. C. KSII Transactions on Internet and Information Systems
2013-08 期刊論文 A Practical Secure and Efficient Enterprise Digital Rights Management Mechanism Suitable for Mobile Environment Chang, C. C., Chang, S. C. and Yang, J. H. Security and Communications Networks
2013-08 期刊論文 Edge Directed Automatic Control Point Selection Algorithm for Image Morphing Mao, Q., Bharanitharan, K. and Chang, C. C. IETE Technical Review
2013-08 期刊論文 ElGamal-Based Weighted Threshold Signature Scheme Guo, C. and Chang, C. C. Information-An International Interdisciplinary Journal
2013-08 期刊論文 Two Step Regionally Focused Algorithm for H.264/AVC Encoder Bharanitharan, K., Chen, B. W. and Chang, C. C. IETE Technical Review
2013-07 期刊論文 A DCT-based Dual Watermark Scheme for Image Authentication and Recovery Chang, C. C., Lin, C. C. and Liao, L. T. Advance in Information Science and Service Science
2013-07 期刊論文 A Digital Rights Management Mechanism for Mobile Social Platforms Chang, C. C., Chang, S. C. and Yang, J. H. ICIC Express Letters
2013-07 期刊論文 A Novel Biometric-based Remote User Authentication Scheme Using Quadratic Residues Cheng, Z. Y., Liu, Y. Chang, C. C. and Liu, C. X. International Journal of Information and Electronics Engineering
2013-07 期刊論文 An Anonymous Multi-Receiver Encryption Based on RSA Harn, L., Chang, C. C. and Wu, H. L. International Journal of Network Security
2013-07 期刊論文 An Inpainting-Assisted Reversible Steganographic Scheme Using Histogram Shifting Mechanism Qin, C., Chang, C. C., Huang, Y. H. and Liao, L. T. IEEE Transactions on Circuits and Systems for Video Technology
2013-07 期刊論文 Novel Untraceable Authenticated Key Agreement Protocol Suitable for Mobile Communication Chang, C. C., Le, H. D. and Chang, C. H. Wireless Personal Communications
2013-07 期刊論文 Provably Secure Three Party Encrypted Key Exchange Scheme with Explicit Authentication Tsai, H. C. and Chang, C. C. Information Sciences
2013-07 期刊論文 Security Analysis of a new Ultra-lightweight RFID Protocol and Its Improvement Zhuang, X., Wang, Z. H., Chang, C. C. and Zhu, Y. Journal of Information Hiding and Multimedia Signal Processing
2013-06 期刊論文 An Image Encryption Scheme Based on Concatenated Torus Automorphisms Mao, Q., Chang, C. C. and Wu, H. L. KSII Transactions on Internet and Information Systems
2013-06 期刊論文 Chaotic Maps-Based Password-Authenticated Key Agreement Using Smart Cards Guo, C. and Chang, C. C. Communications in Nonlinear Science and Numerical Simulation
2013-05 期刊論文 A Residual Number System Oriented Group Key Distribution Mechanism Liu, Y., Chang, C. C. and Chang, S. C. International Journal of Information Processing and Management
2013-05 期刊論文 An Efficient Oblivious Transfer Protocol Using Residue Number System Liu, Y., Chang, C. C. and Chang, S. C. International Journal of Network Security
2013-05 期刊論文 Analyzing and Removing SureSign Watermark Li, L., Ma, Y. Y., Chang, C. C. and Lu, J. F. Signal Processing
2013-05 研討會論文 Mathematical Analysis of Extended Matrix Coding for Steganography Fan, L., Gao, T. and Chang, C. C.
2013-04 期刊論文 A Lossless Information Hiding Scheme with Large Payload Using Prediction Error Composition Wang, Z. H., Chen, K. N., Chang, C. C., Chen, P. Y. and Lee, C. F. KSII Transactions on Internet and Information Systems
2013-04 期刊論文 A Novel Electronic English Auction System with a Secure On-shelf Mechanism Chang, C. C., Cheng, T. F. and Chen, W. Y. IEEE Transactions on Information Forensics and Security
2013-04 期刊論文 A Secure and Efficient t-out-of-n Oblivious Transfer Based on the Generalized Aryabhata Remainder Theorem Liu, Y., Chang, C. C. and Chang, S. C. Journal of Information Hiding and Multimedia Signal Processing
2013-04 期刊論文 Adaptive Self-recovery for Tampered Images Based on VQ Indexing and Inpainting Qin, C., Chang, C. C. and Chen, K. N. Signal Processing
2013-04 期刊論文 Chaotic Maps-Based Mutual Authentication and Key Agreement using Smart Cards for Wireless Communications Guo, C., Chang, C. C. and Sun, C. Y. Journal of Information Hiding and Multimedia Signal Processing
2013-04 期刊論文 Contrast-Adaptive Removable Visible Watermarking (CARVW) Mechanism Lin, P. Y., Chen, Y. H., Chang, C. C. and Lee, J. S. Image and Vision Computing
2013-04 期刊論文 Reversible Visual Secret Sharing Based on Random Grids for Two-Image Encryption Wang, Z. H., Pizzolatti, M. S. and Chang, C. C. International Journal of Innovative Computing, Information and Control
2013-04 專書 Steganography and Watermarking Ching-Nung Yang, Chia-Chen Lin and Chin-Chen Chang Nova Science Publishers Inc.
2013-03 期刊論文 A Novel (n, n) Secret Image Sharing Scheme Based on Sudoku Wang, Z. H., Guo, C. and Chang, C. C. Journal of Electronic Science and Technology
2013-03 期刊論文 A Smart Card-based Authentication Scheme Using User Identify Cryptography Chang, C. C. and Lee, C. Y. International Journal of Network Security
2013-03 期刊論文 A Verifiable Key Management Scheme in Hierarchical Ad Hoc Networks Chang, C. C., Wu, C. C. and Lin, I. C. Information-An International Interdisciplinary Journal
2013-03 期刊論文 An Efficient Information Hiding Scheme Based on Closest Paired Tree Structure Vector Quantization Wang, Z. H., Chang, C. C. and Lin, T. Y. Journal of Electronic Science and Technology
2013-03 期刊論文 Distortion-Free Data Embedding Scheme for High Dynamic Range Images Chang, C. C., Nguyen, T. S. and Lin, C. C. Journal of Electronic Science and Technology
2013-03 期刊論文 Lossless Information Hiding in the VQ Index Table Chang, C. C., Chen, K. N., Wang, Z. H. and Li, M. C. Journal of Software
2013-03 期刊論文 Reversible Data Hiding For High Quality Image Exploiting Interpolation and Direction Order Mechanism Wang, X. T., Chang, C. C., Nguyen, T. S. and Li, M. C. Digital Signal Processing
2013-03 期刊論文 Robust Image Hashing Using Non-Uniform Sampling in Discrete Fourier Domain Qin, C., Chang, C. C. and Tsou, P. L. Digital Signal Processing
2013-02 期刊論文 A Division Algorithm Using Bisection Method in Residue Number System Chang, C. C. and Yang, J. H. International journal of Computer, Consumer and Control
2013-02 期刊論文 A Novel VQ-based Reversible Data Hiding Scheme by Using Hybrid Encoding Strategies Chang, C. C., Nguyen, T. S. and Lin, C. C. Journal of Systems and Software
2013-02 期刊論文 Dictionary-Based Data Hiding Using Image Hashing Strategy Qin, C., Chang, C. C. and Tsou, P. L. International Journal of Innovative Computing, Information and Control
2013-01 期刊論文 A Construction for Secret Sharing Scheme with General Access Structure Guo, C. and Chang, C. C. Journal of Information Hiding and Multimedia Signal Processing
2013-01 期刊論文 A Fault-tolerant Group Key Agreement Protocol Exploiting Dynamic Setting Cheng, Z. Y., Liu, Y., Chang, C. C. and Guo, C. International Journal of Communication Systems
2013-01 期刊論文 A Practical Secure Chaos-Based Group Key Agreement Protocol Suitable for Distributed Network Environment Cheng, Z. Y., Liu, Y., Chang, C. C. and Chang, S. C. International Journal of Innovative Computing, Information and Control
2013-01 期刊論文 Authenticated RFID Security Mechanism Based on Chaotic Maps Cheng, Z. Y., Liu, Y., Chang, C. C. and Chang, S. C. Security and Communication Networks
2013-01 研討會論文 A Fair Hash Chain-based On-line Application Services Granting Scheme for Cloud Computing Environment Lin, C. C., Wu, C. C. and Chang, C. C.
2012-12 期刊論文 Advanced Constantly Updated RFID Access Control Protocol Using Challenge-Response and Indefinite-Index Cheng, Z. Y., Liu, Y., Chang, C. C. and Chang, S. C. International Journal of Innovative Computing, Information and Control
2012-12 期刊論文 An Adaptive Prediction-Error Expansion Oriented Reversible Information Hiding Scheme Qin, C., Chang C. C. and Liao, L. T. Pattern Recognition Letters
2012-12 研討會論文 A UMTS Enhanced Cocktail Protocol Chang, C. C., Wu, C. C. and Lin, I. C.
2012-11 研討會論文 A Novel Distortion-free Data Hiding Scheme for High Dynamic Range Images Wang, Z. H., Lin, T. Y., Chang, C. C. and Lin, C. C.
2012-10 期刊論文 A User-Friendly Image Sharing Scheme Using JPEG-LS Median Edge Predictor Chan, C. S., Chang, C. C. and Hung, P. V. Journal of Information Hiding and Multimedia Signal Processing
2012-10 期刊論文 Data Hiding for Vector Quantization Images Using Mixed-Base Notation and Dissimilar Patterns without Loss of Fidelity Chang, C. C., Lin, C. Y. and Hsieh, Y. P. Information Sciences
2012-10 期刊論文 Novel Efficient User Authentication Protocol for Wireless Sensor Networks Using One-Way Hash Function Chang, C. C., Chang, S. C. and Chen, Y. W. ICIC Express Letters
2012-09 期刊論文 A Multi-threshold Secret Image Sharing Scheme Based on MSP Guo, C., Chang, C. C. and Qin, C. Pattern Recognition Letters
2012-09 期刊論文 Efficient Illumination Compensation Techniques for Text Images Chen, K. N., Chen, C. H. and Chang, C. C. Digital Signal Processing
2012-09 期刊論文 Graph Structure Analysis Based on a Complex Network Tang, J., Jiang, B., Chang C. C. and Bin, L. Digital Signal Processing
2012-09 期刊論文 Perceptual Image Hashing Based on the Error Diffusion Halftone Mechanism Qin, C., Chang, C. C. and Tsou, P. L. International Journal of Innovative Computing, Information and Control
2012-09 期刊論文 Prediction-Based Reversible Data Hiding with High Image Quality Using the Difference of Neighboring Pixels Chang, C. C., Huang, Y. H., Tsai, H. Y. and Qin, C. International Journal of Electronics and Communications
2012-09 期刊論文 Proactive Weighted Threshold Signature Based on Generalized Chinese Remainder Theorem Guo, C. and Chang, C. C. Journal of Electronic Science and Technology
2012-09 期刊論文 Reversible Data Embedding Scheme Using Relationships between Pixel-Values and Their Neighbors Lin, C. C., Chang, C. C. and Chen, Y. H. Journal of Electronic Science and Technology
2012-08 期刊論文 A Smart Card Based Authentication Scheme for Remote User Login and Verification Cheng, Z. Y., Liu, Y., Chang, C. C. and Chang, S. C. International Journal of Innovative Computing, Information and Control
2012-08 期刊論文 An Image Segmentation-Based Thresholding Method Pai, P. Y., Chang, C. C., Chan, Y. K., Tsai, M. H. and Guo, S. W. Journal of Imaging Science and Technology
2012-08 期刊論文 Perceptual Robust Image Hashing Scheme Based on Secret Sharing Qin, C, Chang, C. C. and Guo, C. Journal of Computer Research and Development
2012-08 期刊論文 Reversible Data Hiding Scheme Based on Image Inpainting Qin, C., Wang, Z. H., Chang, C. C. and Chen, K. N. Fundamenta Informaticae
2012-08 研討會論文 Mobile Friendly and Highly Efficient Authenticated Key Agreement Protocol Featuring Untraceability Chang, C. C., Le, H. D., and Chang, C. H.
2012-08 研討會論文 Strong Tamper-Localization Visual Secret Sharing Scheme Based on Exploiting Modification Direction Chang, C. C., Tu, H. N., and Lin, C. C.
2012-07 期刊論文 A Novel Vector Quantization Technique Using Block Mining in Image Compression Wang, Z. H., Chang, C. C. and Pizzolatti, M. S. Advances in Information Sciences and Service Sciences
2012-07 期刊論文 A Secure Image Delivery Scheme with Regional Protection Capability Using Image Inpainting and Editing Qin, C., Chang, C. C., Lee, W. B. and Zhang, X. The Imaging Science Journal
2012-07 期刊論文 An ROI-Based Medical Image Hiding Method Pai, P. Y., Chang, C. C., Chan, Y. K. and Liu, C. M. International Journal of Innovative Computing, Information and Control
2012-06 期刊論文 A Novel Multi-group Exploiting Modification Direction Method Based on Switch Map Wang, X. T., Chang C. C., Lin, C. C. and Li, M. C. Signal Processing
2012-06 期刊論文 Optimizing Least-significant-bit Substitution Using Cat Swarm Optimization Strategy Wang, Z. H., Chang, C. C. and Li, M. C. Information Sciences
2012-05 期刊論文 A Secure Dynamic Identity Based Remote User Authentication Scheme Using Secret Sharing Liu, Y., Cheng, Z. Y., Chang, C. C. and Zhang, Z. J. Journal of Internet Technology
2012-05 期刊論文 Encryption Scheme for Weighted Threshold Authentication Guo, C., Chang, C. C., Qin, C. and Li, M. C. Journal of Applied Sciences - Electronics and Information Engineering
2012-04 期刊論文 Self-Embedding Fragile Watermarking with Restoration Capability Based on Adaptive Bit Allocation Mechanism Qin, C., Chang, C. C. and Chen, P. Y. Signal Processing
2012-03 期刊論文 A Low Computational-cost Electronic Payment Scheme for Mobile Commerce with Large-scale Mobile Users Yang, J. H. and Chang, C. C. Wireless Personal Communications
2012-03 期刊論文 Multi-Threshold Visual Secret Sharing Guo, C., Chang, C. C. and Qin, C. Advance in Information Science and Service Science
2012-02 期刊論文 Image Tamper Detection and Recovery Based on Dual Watermarks Sharing Strategy Chen, Y. H. and Chang, C. C. Journal of Digital Information Management
2012-02 期刊論文 Reversible Watermarking Schemes Based on Expansion Embedding Using Pixel Partition Strategies Kieu, T. D. and Chang, C. C. The Imaging Science Journal
2012-01 期刊論文 A Data Hiding Scheme Based on Voronoi Diagram Cui, S. Y., Wang, Z. H., Chang, C. C. and Li, M. C. Journal of Computers
2012-01 期刊論文 A Fast VQ Codebook Search with Initialization and Search Order Chang, C. C. and Hsieh, Y. P. Information Sciences
2012-01 期刊論文 A Hierarchical Threshold Secret Image Sharing Guo, C., Chang, C. C. and Qin, C. Pattern Recognition Letters
2012-01 期刊論文 A New Data Hiding Scheme Based on DNA Sequence Guo, C., Chang, C. C. and Wang, Z. H. International Journal of Innovative Computing, Information and Control
2012-01 期刊論文 A Secure Single Sign-on Mechanism for Distributed Computer Networks Chang, C. C. and Lee, C. Y. IEEE Transactions on Industrial Electronics
2012-01 期刊論文 An Improved Protocol for Password Authentication Using Smart Cards Cheng, Z. Y., Liu, Y., Chang, C. C. and Chang, S. C. Journal of Computers
2012-01 期刊論文 Novel Electronic Check Mechanism Using Elliptic Curve Cryptosystem Chang, C. C., Chang, S. C. and Wu, Y. C. Journal of Computers
2012-01 期刊論文 Nucleus and Cytoplast Contour Detector from a Cervical Smear Image Pai, P. Y., Chang, C. C. and Chan, Y. K. Expert Systems with Applications
2011-9 研討會論文 A New Reversible Secret Image Sharing Scheme Based on Multi-Level Encoding Wang, Z. H., Chang, C. C. and Pizzolatti, M. S.
2011-9 研討會論文 Image Data Hiding Schemes Based on Graph Coloring Yue, S., Wang, Z. H., Chang. C. Y., Chang, C. C. and Li, M. C.
2011-8 研討會論文 An Efficient V-Fairness (t, n) Threshold Secret Sharing Scheme Yang, J. H., Chang, C. C. and Wang, C. H.
2011-5 研討會論文 Adaptive Data Hiding Based on Exploiting Modification Direction with High Embedding Capacity Lee, C. F., Liu, C. M., Wang, X. T. and Chang, C. C.
2011-12 期刊論文 A Visual Secret Sharing Scheme for Progressively Restoring Secrets Chang, C. C., Hsieh, Y. P. and Liao, C. C. Journal of Electronic Science and Technology
2011-11 期刊論文 A Reversible Watermarking Scheme with High Payload and Good Visual Quality for Watermarked Images Kieu, T. D. and Chang, C. C. International Journal of Innovative Computing, Information and Control
2011-11 期刊論文 Secure Key Transfer Protocol Based on Secret Sharing for Group Communications Lee, C. Y., Wang, Z. H., Harn, L. and Chang, C. C. IEICE Transactions on Information and Systems
2011-11 研討會論文 A Progressive Digital Image Recovery Scheme Based on EMD Data Embedding Method Chang, C. C., Wang, S. T. and Chen, K. N.
2011-10 期刊論文 A High Payload Multiple Embedding Scheme Based Reversible Data Hiding Lee, C. F., Chang, C. C. and Wu, C. Y. Journal of Computers
2011-10 期刊論文 A Reversible Data Hiding Scheme for VQ Indices Using Locally Adaptive Coding Chang, C. C., Nguyen, T. S. and Lin, C. C. Journal of Visual Communication and Image Representation
2011-10 期刊論文 Hiding Secret Information in Lossless Compression Codes Chen, C. C. and Chang, C. C. International Journal of Innovative Computing, Information and Control
2011-10 期刊論文 Provably Secure High Entropy Three-party Authenticated Key Exchange Scheme for Network Environments Chang, C. C., Tsai, H. C. and Huang, Y. C. International Journal of Innovative Computing, Information and Control
2011-10 研討會論文 A Robust and Efficient Smart Card Oriented Remote User Authentication Protocol Chang, C. C., Le, H. D., Lee, C. Y. and Chang, C. H.
2011-10 研討會論文 An Efficient Mutual Authentication with Key Agreement Protocol for Mobile Devices Chang, C. C., Yang, J. H. and Lin, S. Y.
2011-10 研討會論文 General Threshold Signature based on the Chinese Remainder Theorem Guo, C. and Chang, C. C.
2011-10 研討會論文 Low Computational Color Secret Sharing Schemes with High Shares Quality Color Secret Sharing Chang, C. C., Chen, K. N. and Huang, Y. H.
2011-09 期刊論文 A Prediction-Based Adaptive Reversible Data Embedding Scheme Lee, C. F., Huang, Y. H., Chang, C. C. and Liu, T. C. Journal of Software
2011-09 期刊論文 A Secure E-mail Protocol for Mobile Devices Chang, C. C. and Lee, C. Y. International Journal of Innovative Computing, Information and Control
2011-09 期刊論文 A Secure Fragile Watermarking Scheme Based on Chaos-and-Hamming Code Chang, C. C., Chen, K. N., Lee, C. F. and Liu, L. J. Journal of Systems and Software
2011-08 期刊論文 A Robust and Efficient Smart Card Based Remote Login Mechanism for Multi-Server Architecture Chang, C. C. and Cheng, T. F. International Journal of Innovative Computing, Information and Control
2011-08 期刊論文 A Secret Image Sharing Scheme with High Quality Shadows Based on Exploiting Modification Direction Guo, C., Wang, Z. H., Chang, C. C. and Qin, C. Journal of Multimedia
2011-08 期刊論文 Fully Deniable Message Authentication Protocols Preserving Confidentiality Harn, L., Lee, C. Y., Lin, C. and Chang, C. C. The Computer Journal
2011-08 期刊論文 Protecting the Content Integrity of Digital Imagery with Fidelity Preservation Lin, P. Y., Lee, J. S. and Chang, C. C. ACM Transactions on Multimedia Computing Communications and Applications
2011-07 期刊論文 A High Quality and Small Shadow Size Visual Secret Sharing Scheme Based on Hybrid Strategy for Grayscale Images Le, T. H. N., Lin, C. C., Chang, C. C.and Le, H. B. Digital Signal Processing
2011-07 期刊論文 Novel Magic Matrices Generation Method for Secret Messages Embedding Chang, C. C., Chen, K. N. and Lin, H. C. International Journal of Computer Sciences and Engineering Systems
2011-07 期刊論文 Reversible Watermarking Using Two-passed Threshold Decision Chang, C. C., Chen, K. N. and Tsai, M. H. Journal of Multimedia
2011-07 期刊論文 Rotation Invariant Image Copy Detection Using DCT Domain Li, L., Xu, H. and Chang, C. C. International Journal of Innovative Computing, Information and Control
2011-07 期刊論文 Safeguarding Visual Information Using (t,n) Verifiable Secret Shares Chang, C. C., Lin, C. C. and Huynh, N. T. Journal of Computers
2011-06 期刊論文 A Digital Watermark Algorithm for QR Code Li, L., Wang, R. L. and Chang, C. C. International Journal of Intelligent Information Processing
2011-06 期刊論文 A Hierarchical Fragile Watermarking with VQ Index Recovery Lee, C. F., Chen, K. N., Chang, C. C. and Tsai, M. C. Journal of Multimedia
2011-06 期刊論文 A Reversible Watermarking Algorithm Based on Four-Neighbors Context Prediction for Tongue Images Li, L., Yang, F. and Chang, C. C. International Journal of Intelligent Information Processing
2011-06 期刊論文 Cheating Resistance and Reversibility Oriented Secret Sharing Mechanism Lin, P. Y. and Chang, C. C. IET Information Security
2011-06 期刊論文 Lossless Secret Sharing Scheme with High Quality Shares Based on VQ-Compressed Images Chang, C. C., Chen, K. N. and Huynh, N. T. International Journal of Pattern Recognition and Artificial Intelligence (IJPRAI)
2011-05 期刊論文 An Improved AES S-box And Its Performance Analysis Cui, J., Huang, L., Zhong, H., Chang, C. C. and Yang, W. International Journal of Innovative Computing, Information and Control
2011-04 期刊論文 A Steganographic Scheme by Fully Exploiting Modification Directions Kieu, T. D. and Chang, C. C. Expert Systems with Applications
2011-04 期刊論文 An Adaptable Threshold Detector Pai, P. Y., Chang, C. C., Chan, Y. K. and Tsai, M. H. Information Sciences
2011-03 期刊論文 A Simple Image Encoding Method with Data Lossless Information Hiding Wang, Z. H., Chang, C. C., Li, M. C. and Lu, T. C. Journal of Networks
2011-03 期刊論文 Meaningful Secret Sharing Technique with Authentication and Remedy Abilities Chang, C. C., Chen, Y. H. and Wang, H. C. Information Sciences
2011-03 期刊論文 Meaningful Shadow Based Multiple Gray Level Visual Cryptography without Size Expansion Pai, P. Y., Chang, C. C., Chan, Y. K. and Liao, C. C. International Journal of Innovative Computing, Information and Control
2011-03 期刊論文 Reversible Data Hiding for VQ Indices Using Prediction Errors Wang, Z. H., Chang, C. C., Huynh, N. T. and Li, M. C. International Journal of Innovative Computing, Information and Control
2011-03 期刊論文 Reversible Steganography for BTC-compressed Images Chang, C. C., Lin, C. Y. and Fan, Y. H. Fundamenta Informaticae
2011-01 期刊論文 A Novel Image Watermarking in Redistributed Invariant Wavelet Domain Li, L., Xu, H. H., Chang, C. C. and Ma, Y. Y. Journal of Systems and Software
2011-01 期刊論文 An Adaptive Liner Regression Approach to Still Image Compression Chang, C. C. and Lai, Y. P. International Journal of Innovative Computing, Information and Control
2011-01 期刊論文 Sharing a Secret Image in Binary Images with Verification Wang, Z. H., Chang, C. C., Huynh, N. T. and Li, M. C. Journal of Information Hiding and Multimedia Signal Processing
2010-9 研討會論文 A Large Payload EMD Embedding Scheme with High Stego-image Quality Chen, K. N., Chang, C. C. and Lin, H. C.
2010-8 研討會論文 Embedding Data and Sharing Original Image in Two Stego Images Using Sudoku Chang, C. C., Chou, Y. C. and Kieu, T. D.
2010-12 期刊論文 Hiding Secret Data in an Image Using Codeword Imitation Wang, Z. H., Chang, C. C. and Tsai, P. Y. Journal of Information Processing Systems
2010-12 期刊論文 Reversible Secret Sharing with Distortion Control Mechanism Chang, C. C., Huang, Y. H. and Li, T. C. ICIC Express Letters, Part B
2010-12 研討會論文 Data Hiding Scheme with High Embedding Capacity and Good Visual Image Quality Based on Edge Detection Lee, C. F., Chang, C. C. and Tsou, P. L.
2010-12 研討會論文 Providing Anonymous Channels and Mutual Authentication for Mobile Communications Li, B., Chang, C. C. and Lee, J. S.
2010-11 期刊論文 An Anonymous and Self-verified Mobile Authentication with Authenticated Key Agreement for Large-scale Wireless Networks Chang, C. C. and Tsai, H. C. IEEE Transactions on Wireless Communications
2010-11 期刊論文 An Encoding Method for Both Image Compression and Data Lossless Information Hiding Wang, Z. H., Chang, C. C., Chen, K. N. and Li, M. C. Journal of Systems and Software
2010-11 期刊論文 Hiding Information in Binary Images with Complete Reversibility and High Embedding Capacity Wang, C. C., Hwang, Y. T., Chang, C. C. and Jan, J. K. International Journal of Innovative Computing, Information and Control
2010-10 期刊論文 A Removable Visible Watermark for Digital Images Chang, C. C., Lin, C. C. and Li, K. M. Journal of Computers
2010-10 期刊論文 A VQ Compression Method Based on the Variations of the Image Block Groups Chan, Y. K., Pai, P. Y., Chen, R. C. and Chang, C. C. International Journal of Innovative Computing, Information and Control
2010-10 期刊論文 Digital Rights Management for Multimedia Content over 3G Mobile Networks Wu, C. C., Lin, C. C. and Chang, C. C. Expert Systems with Applications
2010-10 期刊論文 Hiding Secret Information in Modified Locally Adaptive Data Compression Code Chang, C. C., Chen, K. N. and Wang, Z. H. ICIC Express Letters
2010-10 研討會論文 A Robust Public Watermarking Scheme Based on DWT Chang, C. C., Chen, K. N. and Hsieh, M. H.
2010-1 研討會論文 A Reversible and Multiple-layer Embedding Strategy with High Capacity Lee, C. F., Chang, C. C. and Wu, C. Y.
2010-1 研討會論文 A Technique of Embedding Digital Data in an Image Compression Code Reversibly Chang, C. C., Chen, K. N., Wang, Z. H. and Li, M. C.
2010-1 研討會論文 High-capacity Reversible Data-hiding for LZW Codes Chen, C. C. and Chang, C. C.
2010-09 期刊論文 An Efficient and Reliable E-DRM Scheme for Mobile Environments Chang, C. C., Yang, J. H. and Wang, D. W. Expert Systems with Applications (ESWP 2010)
2010-09 期刊論文 An Improved Biometrics-based User Authentication Scheme without Concurrency System Chang, C. C., Chang, S. C. and Lai, Y. W. International Journal of Intelligent Information Processing
2010-09 期刊論文 Analysis of an Image Secret Sharing Scheme to Identify Cheaters Lee, J. S., Lin, P. Y. and Chang, C. C. International Journal of Image Processing
2010-08 期刊論文 A Reversible Data Hiding Scheme Using Complementary Embedding Strategy Chang, C. C. and Kieu, T. D. Information Sciences
2010-08 期刊論文 Secret Sharing Using Visual Cryptography Chang, C. C., Li, B. and Lee, J. S. Journal of Electronic Science and Technology
2010-07 期刊論文 An Efficient Internet On-line Transaction Mechanism Chang, C. C. and Chang, S. C. International Journal of Innovative Computing, Information and Control
2010-07 期刊論文 An Information Hiding Scheme Based on (7,4) Hamming Code Oriented Wet Paper Codes Yin, Z. X., Chang, C. C. and Zhang, Y. P. International Journal of Innovative Computing, Information and Control
2010-07 期刊論文 Data Hiding Based on the Similarity between Neighboring Pixels with Reversibility Li, Y. C., Chang, C. C. and Yeh, C. M. Digital Signal Processing
2010-07 期刊論文 High Capacity SMVQ-based Hiding Scheme Using Adaptive Index Chen, C. C. and Chang, C. C. Signal Processing
2010-07 期刊論文 Hybrid Wet Paper Coding Mechanism for Steganography Employing n-Indicator and Fuzzy Edge Detector Chang, C. C., Lee, J. S. and Le, T. H. N. Digital Signal Processing
2010-06 期刊論文 A Data-hiding Scheme Based on One-way Hash Function Chang, C. C., Lee, C. Y., Chen, C. C. and Wang, Z. H. International Journal of Multimedia Intelligence and Security (IJMIS)
2010-06 期刊論文 A High Payload Frequency Based Reversible Image Hiding Method Chang, C. C., Pai, P. Y., Yeh, C. M. and Chan, Y. K. Information Sciences
2010-06 期刊論文 A Novel Self-tuning Feedback Controller for Active Queue Management Supporting TCP Flows Xiong, N., Vasilakos, A. V., Yang, L. T., Wang, C. X., Kannan, R., Chang, C. C. and Pan, Y. Information Sciences
2010-06 期刊論文 Lightweight Secure Roaming Mechanism between GPRS/UMTS and Wireless LANs Lee, J. S., Lin, P. Y. and Chang, C. C. Wireless Personal Communications
2010-06 期刊論文 Using Quad Smoothness to Efficiently Control Capacity–distortion of Reversible Data Hiding Lin, C. N., Buehrer, D. J., Chang, C. C. and Lu, T. C. the Journal of Systems and Software
2010-04 期刊論文 A Digital Image and Secret Messages Sharing Scheme Using Two Stego Images Chen, C. C. and Chang, C. C. International Journal of Innovative Computing, Information and Control
2010-04 期刊論文 A Grayscale Image Steganography Based upon Discrete Cosine Transformation Chang, C. C., Lin, P. Y. and Chuang, J. C. Journal of Digital Information Management
2010-04 期刊論文 An Effective Demosaicing Algorithm for CFA Image Lee, C. F., Chang, C. C., Pai, P. Y. and Huang, W. H. International Journal of Innovative Computing, Information and Control
2010-04 期刊論文 An Efficient Payment Scheme by Using Electronic Bill of Lading Yang, J. H. and Chang, C. C. International Journal of Innovative Computing, Information and Control
2010-04 期刊論文 Generalized Aryabhata Remainder Theorem Chang, C. C., Yeh, J. S. and Yang, J. H. International Journal of Innovative Computing, Information and Control
2010-04 期刊論文 High Payload Steganography Mechanism Using Hybrid Edge Detector Chen, W. J., Chang, C. C. and Le, T. H. N. Expert Systems with Applications (ESWA 2010)
2010-03 期刊論文 A Visual Secret Sharing Scheme with Verification Mechanism Chang, C. C., Lin, C. C. and Huynh, N. T. International Journal of Computer Science and Engineering Systems
2010-03 期刊論文 An Efficient E-mail Protocol Providing Perfect Forward Secrecy for Mobile Devices Chang, C. C., Lee, C. Y. and Chiu, Y. C. International Journal of Communication Systems
2010-03 期刊論文 An Efficient and Fair Buyer-Seller Fingerprinting Scheme for Large Scale Networks Chang, C. C., Tsai, H. C. and Hsieh, Y. P. Computers & Security
2010-03 期刊論文 An Enhancement of JPEG Still Image Compression with Adaptive Linear Regression and Golomb-Rice Coding Chang, C. C. and Lai, Y. P. International Journal of Innovative Computing, Information and Control
2010-03 期刊論文 The Design of E-Traveler's Check with Efficiency and Mutual Authentication Chang, C. C. and Chang, S. C. Journal of Networks
2010-02 期刊論文 3GPP SIM-based Authentication Schemes for Wireless Local Area Networks Wu, C. C., Chang, C. C. and Lin, I. C. International Journal of Innovative Computing, Information and Control
2010-02 期刊論文 A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation Lee, C. F., Chen, K. N., Chang, C. C. and Tsai, M. C. the special issue of Journal of Information Assurance and Security (JIAS)
2010-02 期刊論文 A Chaotic Map Based Adaptive Variable-Size LSB Method with Pixel-Value Differencing and Modulus Function Chang, C. C. and Hsieh, Y. P. The Imaging Science Journal
2010-02 期刊論文 A Key Management Scheme for Sensor Networks Using Bilinear Pairings and Gap Diffie-Hellman Group Lin, I. C., Chang, P. Y. and Chang, C. C. International Journal of Innovative Computing, Information and Control
2010-02 期刊論文 A Secure Protocol for Three-Party Authenticated Key Exchange with Provable Belief Cheng, T. F., Chang, C. C. and Wang, Z. H. International Journal of Information Sciences and Computer Engineering (IJISCE)
2010-02 期刊論文 A Watermarking Technique Using Synonym Substitution for Integrity Protection of XML Documents Chang, C. C., Chen, Y. H. and Kieu, T. D. ICIC Express Letters
2010-02 期刊論文 An Efficient Authenticated Encryption Scheme Based on Elliptic Curve Cryptosystem for Broadcast Environments Chang, C. C., Lai, Y. W. and Yang, J. H. ICIC Express Letters
2010-01 期刊論文 A Modification of VQ Index Table for Data Embedding and Lossless Indices Recovery Wang, Z. H., Chang, C. C., Chen, K. N. and Li, M. C. Journal of Computers
2010-01 期刊論文 A Novel Information Concealing Method Based on Exploiting Modification Direction Wang, Z. H., Kieu, T. D., Chang, C. C. and Li, M. C. Journal of Information Hiding and Multimedia Signal Processing
2010-01 期刊論文 A Parallel Computation Algorithm for Generalized Aryabhata Remainder Theorem Chang, C. C. and Yang J. H. International Journal of Computer Sciences and Engineering Systems
2010-01 期刊論文 A Sudoku-based Secret Image Sharing Scheme with Reversibility Chang, C. C., Lin, P. Y., Wang, Z. H. and Li, M. C. Journal of Communications
2009-9 研討會論文 A Novel Retinal Blood Vessel Segmentation Method Based on Line Operator and Edge Detector Chang, C. C., Lin, C. C., Pai, P. Y. and Chen, Y. C.
2009-9 研討會論文 A Novel Secure Data Hiding Scheme Using a Secret Reference Matrix Lin, C. N., Chang, C. C., Lee, W. B. and Lin, J.
2009-9 研討會論文 A Novel Secure Data Hiding Scheme Using a Secret Reference Matrix Lin, C. N., Chang, C. C., Lee, W. B., and Lin, J.
2009-9 研討會論文 A Simple and Efficient Data Hiding Scheme Suitable for Low Power Computation Environments Chang, C. C., Chou, Y. C. and Hsieh, M. H.
2009-9 研討會論文 Cryptanalysis and Improvement of a Secure Authentication Scheme with Anonymity for Wireless Communications Chang, C. C., Lee, C. Y., and Lee, W. B.
2009-9 研討會論文 Embedding Secret Messages Using Modified Huffman Coding Chen, K. N., Lee, C. F., Chang, C. C. and Lin, H. C.
2009-9 研討會論文 Novel Efficient Electronic Voting Mechanism Based upon Elliptic Curve Lai, Y. W., Chang, C. C. and Chang, S. C.
2009-9 研討會論文 Reversible Steganography for VQ Indices Using the Modified State Codebook Chang, C. C., Chan, C. S., Wang, Z. H. and Li, M. C.
2009-9 研討會論文 Sharing Secrets and Reversibly Reconstructing the Cover Image Using Two Meaningful Shadows Kieu, T. D., Wang, Z. H., Chang, C. C. and Li, M. C.
2009-8 研討會論文 A High Embedding Efficiency Steganography Scheme for Wet Paper Codes Yin, Z. X., Chang, C. C., and Zhang, Y. P.
2009-8 研討會論文 A New Intelligent Authorization Agent Model in Grid Wang, Z. H., Li, M. C., Chen, M. H. and Chang, C. C.
2009-8 研討會論文 A Quadratic-residue-based Fragile Watermarking Scheme Chang, C. C., Chen, K. N., Wang, Z. H. and Li, M. C.
2009-8 研討會論文 A Resistant Secret Sharing Scheme Chang, C. C., Chen, Y. C. and Lin, C. C.
2009-8 研討會論文 A Reversible Data Embedding Scheme Based on Chinese Remainder Theorem for VQ Index Tables Chang, C. C., Chen, Y. H., Wang, Z. H. and Li, M. C.
2009-8 研討會論文 A Self-Reference Watermarking Scheme Based on Wet Paper Coding Chang, C. C., Lin, P. Y. and Lee, J. S.
2009-8 研討會論文 A Steganographic Scheme for Reversible Information Hiding with Good Visual Quality Suitable for Small Embedded Data Chang, C. C., Kieu, T. D., Wang, Z. H. and Li, M. C.
2009-8 研討會論文 A VSS Scheme of Image Size Invariant for Vertical Edge Enhancement Lee, C. F., Chang, C. C. and Liu, T. C.
2009-8 研討會論文 An Enhancement of JPEG Still Image Compression with Adaptive Linear Regression and Golomb-Rice Coding Chang, C. C. and Lai, Y. P.
2009-8 研討會論文 An Image Authentication Scheme Using Magic Square Chang, C. C., Kieu, T. D., Wang, Z. H. and Li, M. C.
2009-8 研討會論文 Information Hiding Technology Based on Block-Sigmentation Strategy Lu, T. C., Liao, S. R., Chen, P. L., Chang, C. C. and Wang, Z. H.
2009-7 研討會論文 A New Classification Mechanism for Retinal Images Chang, C. C., Chen, Y. C. and Lin, C. C.
2009-6 研討會論文 A Data Embedding Scheme Based on a Magic Matrix and Wet Paper Codes Chang, C. C., Chen, Y. H., Wang, Z. H. and Li, M. C.
2009-6 研討會論文 Data Hiding in Images by Hybrid LSB Substitution Chang, C. C. and Tseng, H. W.
2009-6 研討會論文 Information Hiding in Dual Images with Reversibility Chang, C. C., Kieu, T. D. and Chou, Y. C.
2009-6 研討會論文 Secret Image Sharing with Reversible Steganography Chang, C. C., Lin, P. Y. and Chan, C. S.
2009-5 研討會論文 A Novel Reversible Data Embedding Scheme Using Dissimilar Pairing for Palette-based Images Chang, C. C., Wang, Z. H., Chen, Y. H. and Li, M. C.
2009-5 研討會論文 A Steganographic Scheme Based on Wet Paper Codes Suitable for Uniformly Distributed Wet Pixels Chang, C. C., Chou, Y. C., and Lin, C. C.
2009-5 研討會論文 Hiding Information in Region-based Wet Images Chang, C. C., Chen, K. N., Lee, C. F. and Wang, Z. H.
2009-4 研討會論文 Cheating Resistance for Secret Sharing Chan, C. W., Chang, C. C.and Wang, Z. H.
2009-4 研討會論文 Design of a Distributed Flow Control Scheme based on Wireless Multi-rate Multicast Networks Xiong, N., Jia, X., Yang, Y. R., Vasilakos, A. V., Pan, Y., Chang, C. C., Li, Y.
2009-12 期刊論文 A Novle Key Management Scheme for Scalable Multicast Communications Chang, C. C., Cheng, Y. F. and Lin, I. C. International Journal of Communication systems
2009-12 期刊論文 An Image Copyright Protection Scheme Using DCT and a Table Look-up Technique Lin, C. N., Chang, C. C. and Tsai, M. T. Journal of Digital Information Management (JDIM)
2009-12 期刊論文 Self-Verifying Visual Secret Sharing Using Error Diffusion and Interpolation Techniques Chang, C. C., Lin, C. C., Le, T. H. N. and Le, H. B. IEEE Transactions on Information Forensics and Security
2009-12 研討會論文 A Data Hiding Method for Text Documents Using Multiple-Base Encoding Chang, C. C., Wu, C. C. and Lin, I. C.
2009-12 研討會論文 A High Quality Steganographic Scheme for ROI Images Chang, C. C., Lee, C. F., Chen, K. N. and Liu, T. C.
2009-12 研討會論文 An Ingenious Data Hiding Scheme for Color Retinal Images Chang, C.C., Wang, Z. H. and Yin, Z. X.
2009-12 研討會論文 High Payload Reversible Data Embedding Scheme Suitable for VQ Compressed Smooth Images Using Index Lookup Wang, Z. H., Chang, C. C., Chen, Y. H. and Li, M. C.
2009-11 期刊論文 An Efficient Fair Electronic Payment System Based upon Non-Signature Authenticated Encryption Scheme Yang, J. H. and Chang, C. C. International Journal of Innovative Computing, Information and Control
2009-11 期刊論文 LSB-based High-Capacity Data Embedding Scheme for Digital Images Lin, C. C., Chen, Y. H. and Chang, C. C. International Journal of Innovative Computing, Information and Control
2009-11 期刊論文 Sharing a Verifiable Secret Image Using Two Shadows Chang, C. C., Lin, C. C., Le, T. H. N. and Le, H. B. Pattern Recognition
2009-11 研討會論文 A Simple and Efficient Edge Detection Method Chang, C. C., Wang, Z. H. and Yin, Z. X.
2009-11 研討會論文 A Watermark Extraction Model to Enhance the Correlation of Digimarc Plug-ins in Photoshop Li, L., Xu, H. H. and Chang, C. C.
2009-11 研討會論文 A Wet Image Data Hiding Scheme Based on Coordinate Modifications C. C. Chang, Z. H. Wang, Y.H. Chen and M. C. Li
2009-11 研討會論文 An Improvement of Proxy Certificate Chain Authentication Scheme Based on Proxy Certificate Trust List Wang, Z. H., Li, M. C. and Chang, C. C.
2009-11 研討會論文 Emoticon-based Text Steganography in Chat Wang, Z. H., Kieu, T. D., Chang, C. C. and Li, M. C.
2009-10 期刊論文 A High Stego-image Quality Steganographic Scheme with Reversibility and High Payload Using Multiple Embedding Strategy Kieu, T. D. and Chang, C. C. Journal of Systems and Software
2009-10 期刊論文 A New Data Hiding Strategy with Restricted Region Protection Lee, C. F., Chen, K. N. and Chang, C. C. The Imaging Science Journal
2009-10 期刊論文 Modular Square-and-Multiply Operation for Quadratic Residue Bases Chang, C. C. and Lai, Y. P. International Journal of Innovative Computing, Information and Control
2009-10 研討會論文 Efficient User Authentication and Key Establishment Protocols with Perfect Forward Secrecy for Mobile Devices Chang, C. C., Lin, S. Y. and Yang, J. H.
2009-10 研討會論文 Hiding Information in VQ Index Tables with Reversibility Chang, C. C., Chen, K. N., Wang, Z. H. and Li, M. C.
2009-1 研討會論文 A Reversible Data Hiding Scheme Based on Dual Steganographic Images Lee, C. F., Wang, K. H., Chang, C. C. and Huang, Y. L.
2009-1 研討會論文 Embedding Secret Messages Based on Chaotic Map and Huffman Coding Chen, K. N., Lee, C. F. and Chang, C. C.
2009-09 期刊論文 A Robust Certification Service for Highly Dynamic MANET in Emergency Tasks Ge, M., Lam, K. Y., Gollmann, D., Chung, S. L. and Chang, C. C. International Journal of Communication Systems
2009-09 期刊論文 An Authenticated PayWord Scheme without Public Key Cryptosystems Wu, C. C., Chang, C. C. and Lin, I. C. International Journal of Innovative Computing, Information and Control
2009-09 期刊論文 An Efficient Three-party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography for Mobile-commerce Environments Yang, J. H. and Chang, C. C. Journal of Systems and Software
2009-09 期刊論文 An On-line Electronic Check System with Mutual Authentication Chang, C. C., Chang, S. C. and Lee, J. S. Computers & Electrical Engineering
2009-08 期刊論文 A Reversible Information Hiding Scheme Using Left-Right and Up-Down Chinese Character Representation Wang, Z. H., Chang, C. C., Lin, C. C. and Li, M. C. Journal of Systems and Software
2009-08 期刊論文 An Image Authentication Based on Discrete Fourier Transform Kieu, T. D. and Chang, C. C. Fundamenta Informaticae
2009-08 期刊論文 Dual Digital Watermarking for Internet Media Based on Hybrid Strategies Lin, P. Y., Lee, J. S. and Chang, C. C. IEEE Transactions on Circuits and Systems for Video Technology
2009-07 期刊論文 A Lossless Data Embedding Technique by Joint Neighboring Coding Chang, C. C., Kieu, T. D. and Wu, W. C. Pattern Recognition
2009-07 期刊論文 A Parallel Conversion Algorithm Based upon Aryabhata Remainder Theorem for Residue Number System Chang, C. C. and Yang, J. H. International Journal of Innovative Computing, Information and Control
2009-07 期刊論文 A Secure Multicast Framework in Large and High-Mobility Network Groups Lee, J. S. and Chang, C. C. IEICE Transactions on Communications
2009-07 期刊論文 Data Hiding Based on VQ Compressed Images Using Hamming Codes and Declustering Tai, W. L. and Chang, C. C. International Journal of Innovative Computing, Information and Control
2009-06 期刊論文 A Novel Illumination-Balance Technique for Improving the Quality of Degraded Text-Photo Images Lee, J. S., Chen, C. H. and Chang, C. C. IEEE Transactions on Circuits and Systems for Video Technology
2009-06 期刊論文 An Efficient Proxy Raffle Protocol with Anonymity-Preserving Chang, C. C. and Cheng, T. F. Computer Standards & Interfaces
2009-06 期刊論文 An Improved Full-Search Scheme for the Vector Quantization Algorithm Based on Triangle Inequality Lu, T. C. and Chang, C. C. International Journal of Innovative Computing, Information and Control
2009-06 期刊論文 Concurrent Error Detection and Correction in Gaussian Normal Basis Multiplier over GF(2m) Chiou, C. W., Chang, C. C., Lee, C. Y., Hou, T. W. and Lin, J. M. IEEE Transactions on Computers
2009-06 期刊論文 Distortion-Free Steganography Mechanism with Compression to VQ Indices Chang, C. C., Lin, P. Y. and Wang, H. C. International Journal of Signal Processing, Image Processing and Pattern Recognition
2009-06 期刊論文 Lossless Compression Schemes of Vector Quantization Indices Using State Codebook Chang, C. C., Chen, G. M. and Lin, C. C. Journal of Computers
2009-06 期刊論文 Lossless Image Compression Based on Multiple-Tables Arithmetic Coding Chen, R. C., Pai, P. Y., Chan, Y. K. and Chang, C. C. Mathematical Problems in Engineering
2009-06 期刊論文 Preserving Robustness and Removability for Digital Watermarks Using Subsampling and Difference Correlation Chang, C. C., Lin, P. Y. and Yeh, J. S. Information Sciences
2009-06 期刊論文 Reversible Data Hiding Based on Histogram Modification of Pixel Differences Tai, W. L., Yeh, C. M. and Chang, C. C. IEEE Transactions on Circuits and Systems for Video Technology
2009-05 期刊論文 An ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on Elliptic Curve Cryptosystem Yang, J. H. and Chang, C. C. Computers and Security
2009-05 期刊論文 Distortion-Free Secret Image Sharing Mechanism Using Modulus Operator Lin, P. Y., Lee, J. S. and Chang, C. C. Pattern Recognition
2009-04 期刊論文 A Countable and Time-Bound Password-Based User Authentication Scheme for the Applications of Electronic Commerce Lin, I. C. and Chang, C. C. Information Sciences
2009-04 期刊論文 A Sudoku Based Wet Paper Hiding Scheme Kieu, T. D., Wang, Z. H., Chang, C. C. and Li, M. C. International Journal of Smart Home
2009-04 期刊論文 Three Improved Codebook Searching Algorithms for Image Compression Using Vector Quantizer Chang, C. C., Kuo, C. L. and Chen, C. C. International Journal of Computers and Applications
2009-03 期刊論文 A New Public-key Oblivious Fragile Watermarking for Image Authentication Using Discrete Cosine Transform Chang, C. C. and Chou, H. International Journal of Signal Processing, Image Processing and Pattern Recognition
2009-03 期刊論文 An Efficient Probability-based t out of n Secret Image Sharing Scheme Chang, C. C., Wang, Y. Z. and Chan, C. S. International Journal of Signal Processing, Image Processing and Pattern Recognition
2009-03 期刊論文 Enhanced Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks Chang, C. C., Lee, C. Y. and Chiu, Y. C. Computer Communications
2009-03 期刊論文 Lossless Information Hiding Scheme Based on Neighboring Correlation Chang, C. C. and Lu, T. C. International Journal of Signal Processing, Image Processing and Pattern Recognition
2009-03 期刊論文 Non-Iterative Privacy Preservation for Online Lotteries Lee, J. S., Chan, C. S. and Chang, C. C. IET Information Security
2009-03 期刊論文 Preventing Cheating in Computational Visual Cryptography Chang, C. C., Chen, T. H. and Liu, L. J. Fundamenta Informaticae
2009-02 期刊論文 A Data Embedding Scheme for Color Images Based on Genetic Algorithm and Absolute Moment Block Truncation Coding Chang, C. C., Chen, Y. H. and Lin, C. C. Soft Computing
2009-02 期刊論文 A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes Chang, C. C. and Chou, Y. C. Fundamenta Informaticae
2009-02 期刊論文 A Simple and Robust Authenticated Multiple Key Agreement Scheme Chang, C. C., Tsai, H. C. and Chiu, Y. C. International Journal of Security and Its Applications (IJSIA)
2009-02 期刊論文 An Information-Hiding Scheme Based on Quantization-Based Embedding Technique Lu, T. C., Chang, C. C. and Liu, Y. L. Fundamenta Informaticae
2009-02 期刊論文 Design of Electronic t-out-of-n Lotteries on the Internet Lee, J. S. and Chang, C. C. Computer Standards and Interfaces
2009-02 期刊論文 Hiding Data in Color Palette Images with Hybrid Strategies Chang, C. C., Lin, C. C. and Chen, Y. H. The Imaging Science Journal
2009-02 期刊論文 Novel Watermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel Patterns Wang, C. C., Chang, C. C. and Jan, J. K. Fundamenta Informaticae
2009-02 期刊論文 Roaming Across Wireless Local Area Networks Using SIM-Based Authentication Protocol Tsai, H. C., Chang, C. C. and Chang, K. J. Computer Standards & Interfaces
2009-02 期刊論文 Search-Order Coding Method with Indicator-elimination Property Chang, C. C., Chou, Y. C. and Hsieh, Y. P. Journal of Systems and Software
2009-01 期刊論文 An IC-Card-Based and Flexible t-out-of-n Electronic Voting Mechanism Chang, C. C. and Cheng, T. F. Journal of Computers
2009-01 期刊論文 Concurrent Error Detection and Correction in Dual Basis Multiplier over GF(2m) Chiou, C. W., Lee, C. Y., Lin, J. M., Hou, T. W. and Chang, C. C. IET Circuits, Devices and Systems
2009-01 期刊論文 Embedding Secret Binary Message Using Locally Adaptive Data Compression Coding Chang, C. C., Lee, C. F. and Chuang, L. Y. International Journal of Computer Sciences and Engineering Systems
2009-01 期刊論文 On the Security of A Copyright Protection Scheme Based on Visual Cryptography Chen, T. H., Chang, C. C., Wu, C. S. and Lou, D. C. Computer Standards & Interfaces
2009-01 期刊論文 Progressive Image Transmission Scheme for Lossless Images Using Prior Bitmap Chang, C. C., Lin, P. Y. and Chuang, J. C. Journal of Applied Sciences - Electronics and Information Engineering
2009-01 期刊論文 Reversible Information Hiding for VQ Indices Based on Locally Adaptive Coding Chang, C. C., Kieu, T. D. and Chou, Y. C. Journal of Visual Communication and Image Representation
2009-01 期刊論文 Robust t-out-of-n Oblivious Transfer Mechanism Based on CRT Chang, C. C. and Lee, J. S. Journal of Network and Computer Applications
2008-12 期刊論文 An Improvement of EMD Embedding Method for Large Payloads by Pixel Segmentation Strategy Lee, C. F., Chang, C. C. and Wang, K. H. Image and Vision Computing
2008-12 期刊論文 Data Hiding on Two-stage VQ Compression Codes Lin, C. N., Chang, C. C. and Chan, Y. K. The Imaging Science Journal (ISJ)
2008-12 期刊論文 Multilevel Reversible Data Hiding Based on Histogram Modification of Difference Images Lin, C. C., Tai, W. L. and Chang, C. C. Pattern Recognition
2008-11 期刊論文 Time-bound Based Authentication Scheme for Multi-server Architecture Chang, C. C., Lee, J. S. and Kuo, J. Y. International Journal of Innovative Computing, Information and Control
2008-10 期刊論文 A Two-Codebook Combination and Three-Phase Block Matching Based Image-Hiding Scheme with High Embedding Capacity Hsieh, Y. P., Chang, C. C. and Liu, L. J. Pattern Recognition
2008-10 期刊論文 Sharing Secrets in Stego Images with Authenticatio Chang, C. C., Hsieh, Y. P. and Lin, C. H. Pattern Recognition
2008-09 期刊論文 An Embedding Technique Based upon Block Prediction Wu, M. N., Lin, C. C. and Chang, C. C. Journal of Systems and Software
2008-09 期刊論文 Improving Line-Based Light Balancing for Text Images Chang, C. C., Chen, C. H. and Lin, P. Y. Journal of Applied Sciences - Electronics and Information Engineering
2008-09 期刊論文 Joint Coding and Embedding Techniques for Multimedia Images Chang, C. C., Wu, W. C. and Chen, Y. H. Information Sciences
2008-09 期刊論文 Secure Authentication Protocols for Mobile Commerce Transactions Lee, J. S., Chang, Y. F. and Chang, C. C. International Journal of Innovative Computing, Information and Control
2008-08 期刊論文 A Novel Key Management Scheme for Dynamic Multicast Communications Chang, C. C., Cheng, Y. F. and Lin, I. C. International Journal of Communication Systems
2008-08 期刊論文 An Extended Difference Expansion Algorithm for Reversible Watermarking Tseng, H. W. and Chang, C. C. Image and Vision Computing
2008-08 期刊論文 Efficient Optimal Pixel Grouping Schemes for AMBTC Tsou, C. C. Hu, Y. C. and Chang, C. C. The Imaging Science Journal
2008-08 期刊論文 Placing Chinese Phonetic Symbols on Mobile Phones Using Linear Programming Lin, C. Y. and Chang, C. C. International Journal of Innovative Computing, Information and Control
2008-07 期刊論文 A Probabilistic Visual Secret Sharing Scheme for Grayscale Images with Voting Strategy Chang, C. C., Lin, C. C., Le, T. H. N. and Le, H. B. International Journal of Intelligent Information Technology Application (IJIITA)
2008-07 期刊論文 Adaptive Watermark Mechanism for Rightful Ownership Protection Chang, C. C. and Lin, P. Y. Journal of Systems and Software
2008-07 期刊論文 High Capacity Data Hiding for Grayscale Images Chang, C. C., Chou, Y. C. and Kieu, T. D. Fundamenta Informaticae
2008-07 期刊論文 Lossless Data Hiding for Color Images Based on Block Truncation Coding Chang, C. C., Lin, C. Y. and Fan, Y. H. Pattern Recognition
2008-06 期刊論文 A Multi-policy Threshold Signature Scheme with Traceable Participant Cosigners Chu, C. H., Lin, H. F., Chang, C. C. and Chen, C. Y. International Journal of Innovative Computing, Information and Control
2008-06 期刊論文 A Novel Authentication Protocol for Multi-server Architecture without Smart Cards Lee, J. S., Chang, Y. F. and Chang, C. C. International Journal of Innovative Computing, Information and Control
2008-06 期刊論文 A Novel Secret Image Sharing Scheme in Color Images Using Small Shadow Images Chang, C. C., Lin, C. C., Lin, C. H. and Chen, Y. H. Information Sciences
2008-06 期刊論文 An Efficient Generalized Group-Oriented Signature Scheme Chen, C. Y., Lin, H. F. and Chang, C. C. International Journal of Innovative Computing, Information and Control
2008-06 期刊論文 Low-Computation Oblivious Transfer Scheme for Private Information Retrieval Huang, H. F. and Chang, C. C. International Journal of Innovative Computing, Information and Control
2008-06 期刊論文 Preserving Data Integrity with Variant Diffie-Hellman Protocol for Mobile Ad Hoc Networks Lee, J. S. and Chang, C. C. Security and Communication Networks
2008-06 期刊論文 Reversible Data-Embedding Scheme Using Differences Between Original and Predicted Pixel Values Chang, C. C., Lin, C. C. and Chen, Y. H. IET Information Security
2008-05 期刊論文 Lossless Nibbled Data Embedding Scheme Based on Difference Expansion Lu, T. C. and Chang, C. C. Image and Vision Computing
2008-04 期刊論文 A Novel High Capacity Reversible Information Hiding Scheme Based on Side-Match Prediction and Shortest Spanning Path Wu, M. N. and Chang, C. C. Circuits, Systems and Signal Processing
2008-04 期刊論文 LSB-Based Steganography Using Reflected Gray Code Chen, C. C. and Chang, C. C. IEICE Transactions on Information and Systems
2008-04 期刊論文 Reversible Data Embedding for Color Images Chang, C. C., Kieu, T. D. and Chou, Y. C. Journal of Digital Information Management
2008-03 期刊論文 A Novel Method for Progressive Image Transmission Using Blocked Wavelets Chang, C. C., Li, Y. C. and Lin, C. H. International Journal of Electronics and Communications
2008-03 期刊論文 Error Resilient Lempel-Ziv Data Compression Scheme with Perfect Hashing Chang, C. C. and Tseng, H. W. International Journal of Innovative Computing, Information and Control
2008-03 期刊論文 New Sealed-bid Electronic Auction with Fairness, Security and Efficiency Wu, C. C., Chang, C. C. and Lin, I. C. Journal of computer science and technology
2008-03 期刊論文 Reversible Steganographic Method with High Payload for JPEG Images Lin, C. Y., Chang, C. C. and Wang, Y. C. IEICE Transactions on Information and Systems
2008-02 期刊論文 A Novel Color Image Hiding Scheme Using Error Diffusion Technique Chuang, J. C., Chang, C. C. and Hu, Y. C. The Imaging Science Journal
2008-02 期刊論文 Digital Right Schemes for Limited Issues and Flexible Division Lin, C. C., Wu, C. C. and Chang, C. C. International Journal of Computer Science and Network Security
2008-02 期刊論文 Four-scanning Attack on Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery Chang, C. C., Fan, Y. H. and Tai, W. L. Pattern Recognition
2008-02 期刊論文 Novel Colour Image-hiding Scheme Using Error Diffusion Technique Chuang, J. C., Chang, C. C. and Hu, Y. C. The Imaging Science Journal
2008-02 期刊論文 Robust t-out-of-n Proxy Signature Based on RSA Cryptosystems Chang, Y. F. and Chang, C. C. International Journal of Innovative Computing, Information and Control
2008-02 期刊論文 Three-Phase Lossless Data Hiding Method for the VQ Index Table Chang, C. C., Lin, C. Y. and Hsieh, Y. P. Fundamenta Informaticae
2008-02 期刊論文 Using Dominance Searching to Speed up Temporal Join Operation Chen, C. Y., Hu, J. F. and Chang, C. C. International Journal of Innovative Computing, Information and Control
2008-01 期刊論文 A Color Image Authentication Method Using Partitioned Palette and Morphological Operations Chang, C. C. and Lin, P. Y. IEICE Transactions on Information and Systems
2008-01 期刊論文 A Friendly Password Mutual Authentication Scheme for Remote-Login Network Systems Chang, C. C. and Lee, C. Y. International Journal of Multimedia and Ubiquitous Engineering (IJMUE)
2008-01 期刊論文 A Novel Cryptographic Key Assignment Scheme with ID-Based Access Control in a Hierarchy Huang, H. F. and Chang, C. C. Fundamenta Informaticae
2008-01 期刊論文 A Novel Location Tracking Scheme for Reducing Location Updating Traffic in a Personal Communication System Chang, C. C., Lin, I. C. and Lin, M. H. Wireless Personal Communications
2008-01 期刊論文 Constructing a Conversation Key in Three-Party Communications Environment Chang, C. C., Su, Y. W. and Lee, C. Y. International Journal of Multimedia and Ubiquitous Engineering (IJMUE)
2008-01 期刊論文 Efficient Residue Number System Iterative Modular Multiplication Algorithm for Fast Modular Exponentiation Yang, J. H. and Chang, C. C. IET Computers & Digital Techniques
2008-01 期刊論文 Isolated Items Discarding Strategy for Discovering High Utility Itemsets Li, Y. C., Yeh, J. S. and Chang, C. C. Data & Knowledge Engineering
2008-01 期刊論文 Security Enhancement for a Three-Party Encrypted Key Exchange Protocol against Undetectable On-Line Password Guessing Attacks Chen, H. B., Chen, T. H., Lee, W. B. and Chang, C. C. Computer standards & Interfaces
2008- 期刊論文 A Hybrid Strategy for Improving Illumination-Balance of Degraded Text-Photo Images Chang, C. C., Chen, C. H. and Lee, J. S. Journal of Science and Technology
2008- 期刊論文 A Large Payload Data Embedding Technique for Color Images Chou, Y. C., Chang, C. C. and Li, K. M. Fundamenta Informaticae
2008- 期刊論文 Adaptive Data Embedding Scheme Based on Similar and Dissimilar Clustering Strategies Chang, C. C., Lin, C. C. and Chen, Y. H. Fundamenta Informaticae
2007-12 期刊論文 A Progressive Image Transmission Technique Using Haar Wavelet Transformation Lu, T. C. and Chang, C. C. International Journal of Innovative Computing, Information and Control
2007-12 期刊論文 Adaptive Data Embedding Using VQ and Clustering Chen, Y. H., Chang, C. C. and Lin, C. C. International Journal of Innovative Computing, Information and Control
2007-12 期刊論文 Scalable and Systolic montgomery Multiplier over GF(2m) Generated by Trinomials Lee, C. Y., Chiou, C. W., Lin, J. M. and Chang, C. C. IET Circuits, Devices & Systems
2007-10 期刊論文 A Conference Key Distribution Scheme Using Interpolating Polynomials Chang, C. C., Lin, C. H. and Chen, C. Y. International Journal of Security and Its Applications (IJSIA)
2007-10 期刊論文 A Mutual Authenticated Key Agreement Scheme over Insecure Networks Chang, C. C., Lee, C. Y. and Su, Y. W. Journal of Discrete Mathematical Sciences & Cryptography
2007-10 期刊論文 An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards Chang, C. C., Tsai, H. C. and Chen, Y. H. International Journal of Security and Its Applications (IJSIA)
2007-10 期刊論文 Hiding Secret Information Using Adaptive Side-Match VQ Chang, C. C., Wu, W. C. and Tsou, C. C. IEICE Transactions on Information and Systems
2007-10 期刊論文 Reversible Data Hiding Schemes for Deoxyribonucleic ACID (DNA) Medium Chang, C. C., Lu, T. C. Chang, Y. F. and Lee, R. C. T. International Journal of Innovative Computing, Information and Control
2007-10 期刊論文 Security Enhancement for Digital Signature Schemes with Fault Tolerance in RSA Chang, C. C. and Lin, I. C. Information Sciences
2007-09 期刊論文 A New Steganographic Method for Color and Grayscale Image Hiding Yu, Y. H., Chang, C. C. and Lin, I. C. Computer Vision and Image Understanding
2007-09 期刊論文 Fragile Watermarking Scheme for Digital Image Authentication Using Pixel Difference Chang, C. C., Lin, P. Y. and Chuang, J. C. The Imaging Science Journal
2007-09 期刊論文 Lossless Data Embedding with High Embedding Capacity Based on Declustering for VQ-Compressed Images Chang, C. C., Hsieh, Y. P. and Lin, C. Y. IEEE Transactions on Information Forensics and Security
2007-09 期刊論文 Reversible Data Hiding in the VQ-Compressed Domain Chang, C. C., Chou, Y. C. and Lin, C. Y. IEICE Transactions on Information and Systems
2007-09 期刊論文 Security Enhancement of Key Authentication Schemes Based on Discrete Logarithms Lee, J. S. and Chang, C. C. Journal of Discrete Mathematical Sciences & Cryptography
2007-09 期刊論文 TFRP: An Efficient Microaggregation Algorithm for Statistical Disclosure Control Chang, C. C., Li, Y. C. and Huang, W. H. Journal of Systems and Software
2007-07 期刊論文 A Novel Image Hiding Scheme Based on VQ and Hamming Distance Chang, C. C., Tai, W. L. and Lin, C. C. Fundamenta Informaticae
2007-07 期刊論文 A Practical Electronic Payment System for Message Delivery Service in the Mobile Environment Lin, I. C. and Chang, C. C. Wireless Personal Communications
2007-07 期刊論文 A Survey of Information Hiding Schemes for Digital Images Chan, C. S. and Chang, C. C. International Journal of Computer Sciences and Engineering Systems
2007-07 期刊論文 MICF: An Effective Sanitization Algorithm for Hiding Sensitive Patterns on Data Mining Lee, Y. C., Yeh, J. S. and Chang, C. C. Advanced Engineering Informatics
2007-07 期刊論文 Novel Image Copy Detection with Rotating Tolerance Wu, M. N., Lin, C. C. and Chang, C. C. Journal of Systems and Software
2007-07 期刊論文 Reversible Hiding in DCT-Based Compressed Images Chang, C. C., Lin, C. C., Tseng, C. S. and Tai, W. L. Information Sciences
2007-06 期刊論文 A Novel Identity-Based Society Oriented Signature Scheme with Anonymous Signers Huang, H. F. and Chang, C. C. Applied Mathematics Sciences
2007-06 期刊論文 An SVD Oriented Watermark Embedding Scheme with High Qualities for the Restored Images Chang, C. C., Lin, C. C. and Hu, Y. S. International Journal of Innovative Computing, Information and Control
2007-06 期刊論文 Fast Planar-Oriented Ripple Search Algorithm for Hyperspace VQ Codebook Chang, C. C. and Wu, W. C. IEEE Transactions on Image Processing
2007-06 期刊論文 Lossless Recovery of a VQ Index Table with Embedded Secret Data Chang, C. C., Wu, W. C. and Hu, Y. C. Journal of Visual Communication and Image Representation
2007-06 期刊論文 Security Enhancement of an IC-Card-Based Remote Login Mechanism Cheng, T. F., Lee, J. S. and Chang, C. C. Computer Networks
2007-05 期刊論文 Anti-Pseudo-Gray Coding for VQ Encoded Images over Noisy Channels Tseng, H. W. and Chang, C. C. IEEE Communications Letters
2007-04 期刊論文 Attacks on Provably Secure Proxy-protected Signature Schemes Based on Factoring Wu, C. C. and Chang, C. C. Journal of Discrete Mathematical Sciences & Cryptography
2007-04 期刊論文 Reversible Steganographic Method Using SMVQ Approach Based on Declustering Chang, C. C. and Lin, C. Y. Information Sciences
2007-04 期刊論文 Secret Image Hiding and Sharing Based on the (t, n)-Threshold Chang, C. C., Lin, C. Y. and Tseng, C. S. Fundamenta Informaticae
2007-04 期刊論文 Simple Efficient Mutual Anonymity Protocols for Peer-to-Peer Network Based on Primitive Roots Chang, C. C., Lin, C. Y. and Lin, K. C. Journal of Network and Computer Applications
2007-03 期刊論文 A New t-out-n Oblivious Transfer with Low Bandwidth Huang, H. F. and Chang, C. C. Applied Mathematics Sciences
2007-03 期刊論文 Novel Scheme for Data Hiding Using Multiple Codebooks Yu, Y. H., Chang, C. C. and Hu, Y. C. The Imaging Science Journal
2007-03 期刊論文 Novel Scheme for Hiding Data Using Multiple Codebooks Yu, Y. H., Chang, C. C. and Hu, Y. C. The Imaging Science Journal
2007-03 期刊論文 Scheme for Hiding Images by Finding Optimal One-to-two Substitution Table Using Dynamic Programming Strategy Chan, C. S. and Chang, C. C. The Imaging Science Journal
2007-02 期刊論文 An Efficient Image Authentication Method Based on Hamming Code Chan, C. S. and Chang, C. C. Pattern Recognition
2007-02 期刊論文 Robust Non-interactive t-out-of-n Oblivious Transfer Based on the RSA Cryptosystem Chang, Y. F., Chang, C. C. and Cheng, Y.F. Journal of Discrete Mathematical Sciences and Cryptography
2007-01 期刊論文 A New Forward-Secure Blind Signature Scheme Huang, H. F. and Chang, C. C. Journal of Engineering and Applied Sciences
2007-01 期刊論文 An RSA-based (t, n) Threshold Proxy Signature Scheme with Freewill Identities Chang, Y. F. and Chang, C. C. International Journal of Information and Computer Security
2007-01 期刊論文 Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy Chang, Y. F. and Chang, C. C. Fundamenta Informaticae
2007-01 期刊論文 VQ Codebook Searching Algorithm Based on Correlation Property Chang, C. C., Lu, T. C. and Ya, J. B. Fundamenta Informaticae
2007- 期刊論文 A Concealed t-out-of-n Signer Ambiguous Signature Scheme with a Variety of Keys Chang, Y. F., Chang, C. C. and Lin, P. Y. Informatica
2007- 期刊論文 An Image Retrieval Method Based on Color-Complexity and Spatial-Histogram Features Wu, H. C. and Chang, C. C. Fundamenta Informaticae
2007- 期刊論文 Anonymous Authentication Scheme for Wireless Communications Lee, J. S., Chang, C. C. and Chang, P. Y. International Journal of Mobile Communications
2007- 期刊論文 Combined Association Rules for Dealing with Missing Values Shen, J. J., Chang, C. C. and Li, Y. C. Journal of Information Science
2007- 期刊論文 Full-Searching-Equivalent Vector Quantization Method Using Two-Bounds Triangle Inequality Chang, C. C. and Chen, C. C. Fundamenta Informaticae
2006-12 期刊論文 A Multiauthority Electronic Voting Protocol Based upon a Blind Multisignature Scheme Lin, J. L., Lin, H. F. Chen, C. Y. and Chang, C. C. International Journal of Computer Science and Network Security (IJCSNS)
2006-12 期刊論文 An Efficient ID-Based User Identification Scheme for Mutual Authentication in Mobile Environments Chang, C. C. and Yang, J. H. Journal of Discrete Mathematical Sciences & Cryptography
2006-12 期刊論文 An Improvement of the Design of Integrating Subliminal Channel with Access Control Chang, C. C. and Wu, C. C. IAENG International Journal of Computer Science
2006-12 期刊論文 Comments on E-mail Protocols Providing Forward Secrecy Chang, Y. F., Chang, C. C. and Tai, W. L. Journal of Discrete Mathematical Sciences and Cryptography
2006-12 期刊論文 Comments on WLT Attack on An Enhanced Timestamp-based Password Authentication Scheme Chang, Y. C., Chang, C. C. and Kao, C. L. Journal of Discrete Mathematical Sciences & Cryptography
2006-12 期刊論文 Reversible Data Embedding Based on Prediction Approach for VQ and SMVQ Compressed Images Chang, C. C. and Lin, C. Y. Fundamenta Informaticae
2006-12 期刊論文 Reversible Steganography for VQ-compressed Images Using Side Matching and Relocation Chang, C. C. and Lin, C. Y. IEEE Transactions on Information Forensics and Security
2006-12 期刊論文 Security Enhancement of Yang-Li Hierarchical Access Control Mechanism Chang, C. C. and Lee, J. S. Journal of Discrete Mathematical Sciences & Cryptography
2006-11 期刊論文 An Improved Deniable Authentication Protocol Lin, C. C. and Chang, C. C. International Journal of Computer Science and Network Security (IJCSNS)
2006-11 期刊論文 New Image Steganographic Methods Using Run-Length Approach Chang, C. C., Lin, C. Y. and Wang, Y. Z. Information Sciences
2006-10 期刊論文 A Reversible Data Hiding Scheme Based on Side Match Vector Quantization Chang, C. C., Tai, W. L. and Lin, C. C. IEEE Transactions on Circuits and Systems for Video Technology
2006-10 期刊論文 An Image Coding Scheme Using SMVQ and Support Vector Machines Chang, C. C. and Liao, C. T. Neurocomputing
2006-10 期刊論文 Hiding Secret Data Adaptively in VQ Index Tables Chang, C. C. and Wu, W. C. IEE Proceedings-Vision, Image and Signal Processing
2006-10 期刊論文 Using a Simple and Fast Image Compression Algorithm to Hide Secret Information Chuang, J. C. and Chang, C. C. International Journal of Computers and Applications
2006-09 期刊論文 Colour Image-hiding Scheme Using Human Visual System Chang, C. C., Chou, H. and Lin, C. C. The Imaging Science Journal
2006-08 期刊論文 Secure Communications for Cluster-based Ad Hoc Networks Using Node Identities Lee, J. S. and Chang, C. C. Journal of Network and Computer Applications
2006-07 期刊論文 A Content-based Image Authentication Scheme Based on Singular Value Decomposition Lu, T. C., Chang, C. C. and Liu, Y. L. Pattern Recognition and Image Analysis: Advances in Mathematical Theory and Applications
2006-07 期刊論文 An Efficient and Secure Remote Authentication Scheme Using Smart Cards Chang, C. C. and Lee, J. S. Information & Security
2006-07 期刊論文 Choosing t-out-of-n Secrets by Oblivious Transfer Lee, J. S. and Chang, C. C. Information & Security
2006-07 期刊論文 Fast Codebook Search Algorithms Based on Tree-Structured Vector Quantization Chang, C. C., Li, Y. C. and Yeh, J. B. Pattern Recognition Letters
2006-06 期刊論文 A Color Re-Indexing Scheme Using Genetic Algorithm Wu, M. N., Lin, C. C. and Chang, C. C. WSEAS Transactions on Systems
2006-06 期刊論文 A Novel Index Coding Scheme for Vector Quantization Chang, C. C., Chen, G. M. and Hu, Y. C. Fundamenta Informaticae
2006-06 期刊論文 A Novel Watermarking Scheme Based on Rehashing and Vector Quantization Lin, C. C., Hu, Y. C. and Chang, C. C. Fundamenta Informaticae
2006-06 期刊論文 A Robust Content-Based Copy Detection Scheme Wu, M. N., Lin, C. C. and Chang, C. C. Fundamenta Informaticae
2006-06 期刊論文 Image Hiding Scheme with Modulus Function and Dynamic Programming Strategy on Partitioned Pixels Chang, C. C., Chan, C. S. and Fan, Y. H. Pattern Recognition
2006-05 期刊論文 A Novel Efficient (t,n) Threshold Proxy Signature Scheme Huang, H. F. and Chang, C. C. Information Sciences
2006-04 期刊論文 A Watermarking-Based Image Ownership and Tampering Authentication Scheme Chang, C. C., Hu, Y. S. and Lu, T. C. Pattern Recognition Letters
2006-04 期刊論文 An Anonymous and Flexible t-out-of-n Electronic Voting Scheme Lee, J. S. and Chang, C. C. Journal of Discrete Mathematical Sciences & Cryptography
2006-03 期刊論文 A Secure and Efficient Authentication Scheme for Mobile Users Chang, Y. F., Lee, J. S. and Chang, C. C. International Journal of Mobile Communications
2006-03 期刊論文 An Efficient and Flexible Forward-Secure Signature Scheme Huang, H. F. and Chang, C. C. International Journal of Computer Science and Network Security (IJCSNS)
2006-03 期刊論文 Hiding a Halftone Secret Image in Two Camouflaged Halftone Images Chang, C. C., Chan, C. S. and Tai, W. L. Pattern Recognition and Image Analysis: Advances in Mathematical Theory and Applications
2006-02 期刊論文 Efficient Multi-proxy Multi-signature Schemes Based on DLP Chang, Y. F. and Chang, C. C. International Journal of Computer Science and Network Security
2006-01 期刊論文 A New Solution for Assigning Cryptographic Keys to Control Access in Mobile Agent Environments Chang, C. C. and Lin, I. C. Wireless Communications and Mobile Computing
2006-01 期刊論文 A Secure E-coupon System for Mobile Users Chang, C. C., Wu, C. C. and Lin, I. C. International Journal of Computer Science & Network Security
2006- 期刊論文 A Difference Expansion Oriented Data Hiding Scheme for Restoring the Original Host Images Chang, C. C. and Lu, T. C. The Journal of Systems and Software
2006- 期刊論文 A New Edge Detection Approach Based on Image Context Analysis Yu, Y. H. and Chang, C. C. Image and Vision Computing
2006- 期刊論文 A Novel Image Ownership Protection Scheme Based on Rehashing Concept and Vector Quantization Lin, C. C. , Hu, Y. C. and Chang, C. C. Fundamenta Informaticae
2006- 期刊論文 A Parallel Residue-to-Binary Conversion Algorithm Without Trial Division Chang, C. C. and Lai, Y. P. Computers and Electrical Engineering
2006- 期刊論文 An Access Control System with Time-constraint Using Support Vector Machines Chang, C. C., Lin, I. C. and Liao, C. T. International Journal of Network Security
2006- 期刊論文 An Anonymous Voting Mechanism Based on the Key Exchange Protocol Chang, C. C. and Lee, J. S. Computers and Security
2006- 期刊論文 An Improved Tree-Structured Codebook Search Algorithm for Grayscale Image Compression Hu, Y. C. and Chang, C. C. Funamenta Informaticae
2006- 期刊論文 Color Image Retrieval Technique Based on Color Features and Image Bitmap Lu, T. C. and Chang, C. C. Information Processing and Management (IP&M)
2006- 期刊論文 Comments on the Electronic Voting Protocol for General Elections Chang, Y. F., Lee, J. S. and Chang, C. C. GESTS International Transactions on Computer Science and Engineering
2006- 期刊論文 Error Resilient Locally Adaptive Data Compression Tseng, S. W. and Chang, C. C. Journal of Systems and Software
2006- 期刊論文 Image Hiding Scheme Using Modulus Function and Optimal Substitution Table Chan, C. S., Chang, C. C. and Hu, Y. C. Pattern Recognition and Image Analysis
2006- 期刊論文 Perfect Hashing Schemes for Mining Traversal Patterns Chang, C. C., Lin, C. Y. and Chou, H. C. Fundamenta Informaticae
2006- 期刊論文 Privacy-preserving Mining of Association Rules on Distributed Databases Chang, C. C., Yeh, J. S. and Li, Y. C. International Journal of Computer Science and Network Security (IJCSNS)
2006- 期刊論文 Removing Blocking Effects Using An Artificial Neural Network Chang, C. C., Chan, C. S. and Tseng, C. S. Signal Processing
2006- 期刊論文 Reversible Index-domain Information Hiding Scheme Based on Side-Match Vector Quantization Chang, C. C. and Lu, T. C. Journal of Systems and Software
2006- 期刊論文 Spatial Domain Image Hiding Scheme Using Pixel-Values Differencing Chang, C. C., Chuang, J. C. and Hu, Y. C. Fundamenta Informaticae
2005-12 期刊論文 A Secure and Authentic Electronic Patient Records Transmission Scheme Based on Two-Based Number Conversion Tsai, P. Y., Hu, Y. C. and Chang, C. C. The Imaging Science Journal
2005-12 期刊論文 An Iterative Modular Multiplication Algorithm in RNS Yang, J. H., Chang, C. C. and Wang, C. H. Applied Mathematics and Computation
2005-12 期刊論文 Hiding a Secret Color Image in Two Color Images Chang, C. C., Tai, W. L. and Lin, C. C. The Imaging Science Journal
2005-11 期刊論文 An Image Zooming Technique Based on Vector Quantization Approximation Chang, C. C., Chou, Y. C., Yu, Y. H. and Shih, K. J. Image and Vision Computing
2005-10 期刊論文 A Time-Stamping Protocol for Digital Watermarking Hwang, M. S., Hwang, K. F. and Chang, C. C. Applied Mathematics and Computation
2005-10 期刊論文 Fast Search Algorithm for Vector Quantization without Extra Look-up Table Using Declustered Sub-codebooks Chang, C. C. and Lin, I. C. IEE Proceedings-Vision, Image and Signal Processing
2005-09 期刊論文 A (t,n) Threshold Secret Sharing System with Efficient Identification of Cheaters Lin, I. C. and Chang, C. C. Computing and Informatics
2005-09 期刊論文 A Novel Digital Image Watermarking Scheme Based on the Vector Quantization Technique Wu, H. C. and Chang, C. C. Computers & Security
2005-09 期刊論文 A Novel Image Authentication Scheme Based on Quadtree Segmentation Chan, C. S., Chang, C. C. and Hu, Y. C. The Imaging Science Journal
2005-09 期刊論文 A Steganographic Method for Hiding Secret Data Using Side Match Vector Quantization Chang, C. C. and Wu, W. C. IEICE Transactions on Information and Systems
2005-09 期刊論文 A Very Low Bit Rate Image Compressor Using Transformed Classified Vector Quantization Tseng, H. W. and Chang, C. C. Informatica
2005-09 期刊論文 Hiding Data in Halftone Images Tseng, H. W. and Chang, C. C. Informatica
2005-09 期刊論文 Novel Image Authentication Scheme Based on Quadtree Segmentation Tsai, P. Y., Hu, Y. C. and Chang, C. C. The Imaging Science Journal
2005-08 期刊論文 Authentication Schemes with No Verification Table Chang, Y. F. and Chang, C. C. Applied Mathematics and Computation
2005-07 期刊論文 A Scheme for Threshold Multi-secret Sharing Chan, C. W. and Chang, C. C. Applied Mathematics and Computation
2005-07 期刊論文 SVD-based Digital Image Watermarking Scheme Chang, C. C., Tsai, P. Y., and Lin, M. H. Pattern Recognition Letters
2005-07 期刊論文 Sharing Visual Multi-secrets Using Circle Shares Wu, H. C. and Chang, C. C. Computer Standards & Interfaces
2005-07 期刊論文 The General Pay-Word: A Micro-payment Scheme Based on n-dimension One-way Hash Chain Lin, I. C., Hwang, M. S. and Chang, C. C. The International Journal of Designs, Codes, and Cryptography
2005-05 期刊論文 A Novel Steganography Mechanism Using Evolutionary Approach for Color Images Wu, M. N., Lin, C. C., Tai, W. L. and Chang, C. C. GESTS International Transaction on Computer Science and Engineering
2005-05 期刊論文 Efficient Authentication Protocols of GSM Chang, C. C., Lee, J. S. and Chang, Y. F. Computer Communications
2005-05 期刊論文 Hiding Secret Data in Images via Predictive Coding Yu, Y. H., Chang, C. C. and Hu, Y. C. Pattern Recognition
2005-04 期刊論文 An ID-Based Multisignature Scheme without Reblocking and Predetermined Signing Order Chang, C. C., Lin, I. C. and Lam, K. Y. Computer Standards and Interfaces
2005-03 期刊論文 An Information Hiding Scheme Based Upon Block Truncation Coding Chuang J. C. and Chang, C. C. International Journal of Computers and Applications
2005-03 期刊論文 Perfect Hashing Schemes for Mining Association Rules Chang, C. C. and Lin, C. Y. The Computer Journal
2005-02 期刊論文 A Fast Modular Square Computing Method Based on The Generalized Chinese Remainder Theorem for Prime Module Chang, C. C. and Lai, Y. P. Applied Mathematics and Computation
2005-02 期刊論文 A Side Match Reconstruction Method Using Tree-Structured VQ for Transmitting Images Progressively Hung, K. L, Chang, C. C. and Chen, T. S. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science
2005-02 期刊論文 Digital Signature with Message Recovery Using Self-certified Public Keys without Trustworthy System Authority Chang, Y. F., Chang, C. C. and Huang, H. F. Applied Mathematics and Computation
2005-01 期刊論文 A Color Image Hiding Scheme Using Image Differencing Chan, C. S., Chang, C. C. and Hu, Y. C. Optical Engineering
2005-01 期刊論文 A Division Algorithm for Residue Numbers Chang, C. C. and Lai, Y. P. Applied Mathematics and Computation
2005-01 期刊論文 An Efficient Authentication Protocol for Mobile Satellite Communication Systems Chang, Y. F. and Chang, C. C. ACM Operating Systems Review
2005-01 期刊論文 Color Image Hiding Scheme Using Image Differencing Chan, C. S., Chang, C. C. and Hu, Y. C. Optical Engineering
2005- 期刊論文 A Dynamic Mechanism for Determining Relationships in a Partially Ordered User Hierarchy Chang, C. C., Lin, I. C. and Tsai, H. M. International Journal of High Performance Computing and Networking
2005- 期刊論文 A Genetic-Based Adaptive Threshold Selection Method for Dynamic Path Tree Structured Vector Quantization Yu, Y. H., Chang, C. C. and Hu, Y. C. Image and Vision Computing
2005- 期刊論文 A New Density-Based Scheme for Clustering Based on Genetic Algorithm Lin, C. Y., Chang, C. C. and Lin, C. C. Fundamenta Informaticae
2005- 期刊論文 An Image Hiding Scheme Based on Multi-bit-reference Substitution Table Using Dynamic Programming Strategy Chan, C. S. and Chang, C. C. Fundamenta Informaticae
2005- 期刊論文 An Inverse Halftoning Technique Using Modified Look-Up Tables Chang, C. C. and Chan, C. S. Fundamenta Informaticae
2005- 期刊論文 Cryptanalysis of the Modified Remote Login Authentication Scheme Based on a Geometric Approach Chang, C. C. and Lin, I. C. Informatica
2005- 期刊論文 Data Compressor for VQ Index Tables Lu, T. C. and Chang, C. C. Fundamenta Informaticae
2005- 期刊論文 Mobile Payment for Off-line Vender Machines Chang, C. C., Chang, Y. F. and Lee, J. S. International Journal of Computer Science and Network Security
2005- 期刊論文 On the Design Weakness of Chen-Huang Dynamic Access Control Mechanism Chang, C. C. and Lee, J. S. International Journal of Computer Science and Network Security
2005- 期刊論文 Schemes for Digital Gift Certificates with Low Computation Complexity Chang, C. C. and Chang Y. F. Informatica
2004-11 期刊論文 A New Design of Efficient Partially Blind Signature Scheme Hwang, H. F. and Chang, C. C. Journal of Systems and Software
2004-11 期刊論文 Embedding Invisible Watermarks into Digital Images Based on Side-Match Vector Quantization Wu, H. C. and Chang, C. C. Fundamenta Informaticae
2004-10 期刊論文 A Convertible Group Signature Scheme Chang, C. C. and Lai, Y. P. ACM Operating Systems Review
2004-10 期刊論文 An Improvement of Delegated Multi signature Scheme with Document Decomposition Chang, C. C. and Lin, I. C. ACM Operating Systems Review
2004-10 期刊論文 Remarks on Fingerprint-based Remote User Authentication Scheme Using Smart Cards Chang, C. C. and Lin, I. C. ACM Operating Systems Review
2004-09 期刊論文 A New Scheme to Protect Confidential Image Chang, C. C. and Hwang, R. J. Journal of Interconnection Networks
2004-09 期刊論文 A Steganographic Method for Digital Images Using Side Match Chang, C. C. and Tseng, H. W. Pattern Recognition Letters
2004-08 期刊論文 Information Hiding Based on Search-Order Coding for VQ Indices Chang, C. C., Chen, G. M. and Lin, M. H. Pattern Recognition Letters
2004-08 期刊論文 Signing a Digital Signature without Using One-way Hash Functions and Message Redundancy Schemes Chang, C. C. and Chang, Y. F. IEEE Communications Letters
2004-07 期刊論文 A Secure and Efficient Strong-password Authentication Protocol Chang, Y. F. and Chang, C. C. ACM Operating Systems Review
2004-07 期刊論文 An Improvement on a Deniable Authentication Protocol Chang, Y. F., Chang, C. C. and Kao, C. L. ACM Operating Systems Review
2004-07 期刊論文 Multisignatures with Distinguished Signing Authorities for Sequential and Broadcasting Architectures Huang, H. F. and Chang, C. C. Computer Standards and Interfaces
2004-06 期刊論文 Fast Edge-Based Method for Image Magnification Chang, C. C. and Chen, G. I. The Imaging Science Journal
2004-05 期刊論文 An Adaptive Bit Rate Encoding Mechanism Based on Irregular Sampling and Side-Match Vector Quantization Tsai, P. Y., Chang, C. C., Lin, M. H. and Hu, Y. C. Image Science Journal
2004-02 期刊論文 An Efficient Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks Chang, Y. F., Chang, C. C. and Yang, J. H. Computer Standards and Interfaces
2004-01 期刊論文 A Color Image Watermarking Scheme Based on Color Quantization Tsai, P. Y., Hu, Y. C. and Chang, C. C. Signal Processing
2004- 期刊論文 A Branch-and-Bound Algorithm for the Construction of Reversible Variable Length Codes Tseng, H. W. and Chang, C. C. The Computer Journal
2004- 期刊論文 A Fair and Secure Mobile Agent Environment Based on Blind Signature and Proxy Host Lin, M. H, Chang, C. C. and Chen, Y. R. Computers & Security
2004- 期刊論文 A High-Speed Division Algorithm in Residue Number System Using Parity-Checking Technique Yang, J. H., Chang, C. C. and Chen, C. Y. International Journal of Computer Mathematics (IJCM)
2004- 期刊論文 A Lossless Compression-based Progressive Image Transmission Scheme Hung, K. L., Chang, C. C. and Lin, I. C. The Imaging Science Journal
2004- 期刊論文 A New Cryptographic Key Assignment Scheme with Time-Constraint Access Control in a Hierarchy Hwang, H. F. and Chang, C. C. Computer Standards and Interfaces
2004- 期刊論文 A New Scheme for Server-Aided Secret Exponentiation Computation Based on Interpolating Polynomials Chan, C. W. and Chang, C. C. International Journal of Computational and Numerical Analysis and Applications
2004- 期刊論文 A Novel Data Hiding Scheme for Halftone Images Chang, C. C. and Chuang, J. C. Pattern Recognition and Image Analysis
2004- 期刊論文 A Novel Lower Cost Crypto-scheme Based on the Theory of Sharing Secrets Chan, C. W. and Chang, C. C. Information & Security
2004- 期刊論文 A Novel Three-party Encrypted Key Exchange Protocol Chang, C. C. and Chang, Y. F. Computer Standards and Interfaces
2004- 期刊論文 A Pattern Mapping Based Digital Image Watermarking Tsai, C. S. and Chang, C. C. Informatica
2004- 期刊論文 A Progressive Secret Reveal System Based on SPIHT Image Transmission Tsai, P. Y., Hu, Y. C. and Chang, C. C. Signal Processing: Image Communication
2004- 期刊論文 A Repeating Color Watermarking Scheme Based on Human Visual Model Tsai, C. S. and Chang, C. C. EURASIP Journal on Applied Signal Processing
2004- 期刊論文 A Secure One-time Password Authentication Scheme Using Smart Cards without Limiting Login Times Chang, Y. F., Chang, C. C. and Kuo, J. Y. ACM Operating Systems Review
2004- 期刊論文 A Secure One-time Password Authentication Scheme with Low Computation for Mobile Communications Lin, M. H. and Chang, C. C. ACM Operating Systems Review
2004- 期刊論文 Adaptive Bit Rate Encoding Mechanism Based on Irregular Sampling and Side-match Vector Quantization Tsai, P. Y., Chang, C. C., Lin, M. H. and Hu, Y. C. The Image Science Journal
2004- 期刊論文 An Adaptive Steganographic Scheme for Color Image Chang, C. C., Tsai, P. Y. and Lin, M. H. Fundamenta Informaticae
2004- 期刊論文 An Effective Codebook Search Algorithm for Vector Quantization Hu, Y. C. and Chang, C. C. Image Science Journal
2004- 期刊論文 An Efficient Approach for Face Detection and Facial Feature Location Using Prune-and-Search Technique Chang, C. C. and Yu, Y. H. International Journal of Pattern Recognition and Artificial Intelligence
2004- 期刊論文 An Efficient Data Structure for Automatic Knowledge Discovery from Database Changchien, S. W., Lu, T. C. and Chang, C. C. International Journal of Computational and Numerical Analysis and Applications
2004- 期刊論文 An Efficient Graph-Based Method for Parallel Mining Problems Chang, C. C., Lin, C. Y. and Lin, P. Y. Journal of Information & Knowledge Management (JIKM)
2004- 期刊論文 An Efficient and Practical Remote User Authentication Scheme Chang, Y. F. and Chang, C. C. Information & Security
2004- 期刊論文 An Improvement to Image Segment Based on Human Visual System for Object-based Coding Tsai, C. S. and Chang, C. C. Fundamenta Informaticae
2004- 期刊論文 Block Image Retrieval Based on a Compressed Linear Quadtree Chan, Y. K. and Chang, C. C. Image and Vision Computing Journal
2004- 期刊論文 E-traveler’s Checks with Reciprocal Authentication Chang, Y. F. and Chang, C. C. Journal of Electronic Commerce Research
2004- 期刊論文 End-to-End Security Protocols for Mobile Communications with End-User Identification/Authentication Chang, C. C., Chen, K. L. and Hwang, M. S. Wireless Personal Communications
2004- 期刊論文 Fast Cascade Exponentiation Schemes Based on String Compression Algorithm Wang, C. T., Chang, C. C. and Lin, C. H. Asian Journal of Information Technology
2004- 期刊論文 Hiding Data in Multitone Images for Data Communications Chang, C. C., Chuang, J. C. and Lai, Y. P. IEE Proceedings-Vision, Images, and Signal Processing
2004- 期刊論文 High Capacity Data Hiding in JPEG-Compressed Images Tseng, H. W. and Chang, C. C. Informatica
2004- 期刊論文 Improvement of Password Authentication Schemes without Adopting the Public-key Cryptosystem Chang, C. C. and Lee, J. S. International Journal of Computational and Numerical Analysis and Applications
2004- 期刊論文 Novel Full-Search Schemes for Speeding up Image Coding Using Vector Quantization Chang, C. C. and Lin, I. C. Real-Time Imaging
2004- 期刊論文 Password Authentication without the Server Public Key Chang, Y. F., Chang, C. C. and Liu, Y. L. IEICE Transactions on Communications
2004- 期刊論文 Public-Key Inter-Block Dependence Fragile Watermarking for Image Authentication Using Continued Fraction Chang, C. C., Wu, W. C. and Hu, Y. C. Informatica
2004- 期刊論文 Quadtree-Segmented Image Compression Method Using Vector Quantization and Cubic B-Spline Interpolation Chang, C. C., Chuang, J. C. and Chung, C. Y. The Imaging Science Journal
2004- 期刊論文 Retrieving Digital Images from a JPEG Compressed Image Database Chang, C. C., Chuang, J. C. and Hu, Y. S. Image and Vision Computing
2004- 期刊論文 Scenery Image Segmentation Using Support Vector Machines Yu, Y. H. and Chang, C. C. Fundamenta Informaticae
2004- 期刊論文 Side-match Prediction Encoding Scheme for Predefined Vector Quantization Approximation Rates Tsai P. Y., Lin, M. H. and Chang, C. C. The Imaging Science Journal
2004- 期刊論文 Similar Image Retrieval Based on Wavelet Transformation Chang, C. C., Chuang, J. C. and Hu, Y. S. International Journal of Wavelets, Multiresolution and Information Processing (IJWMIP)
2004- 期刊論文 VQ-Based Image Watermarking Using Anti-Gray Coding Chang, C. C. and Tseng, H. W. Informatica
2003-10 期刊論文 Using Set Partitioning in Hierarchical Trees to Authenticate Digital images Tsai, P. Y., Hu, Y. C. and Chang, C. C. Signal Processing: Image Communication
2003-09 期刊論文 Taiwan: Focus on the Information Security Market Chang, C. C. and Lee, W. B. IT Professional Magazine
2003-09 期刊論文 The Strategy of Reducing the Location Update Traffic Using Forwarding Pointers in Virtual Layer Architecture Chang, C. C. and Lin, I. C. Computer Standards and Interfaces
2003-08 期刊論文 Guessing by Neighbors: An Efficient Reconstruction Method for Transmitting Image Progressively Chang, C. C., Shih, T. K. and Lin, I. C. Visual Computer
2003-07 期刊論文 Finding Optimal Least-Significant-Bit Substitution in Image Hiding by Dynamic Programming Strategy Chang, C. C., Hsiao, J. Y. and Chan, C. S. Pattern Recognition
2003-05 期刊論文 Security Enhancement for the Anonymous Secure E-Voting over a Network Lin, I. C., Hwang, M. S. and Chang, C. C. Computer Standards and Interfaces
2003-03 期刊論文 A Fast and Simple Algorithm for the Construction of Asymmetrical Reversible Variable Length Codes Tseng, H. W. and Chang, C. C. Journal of Real Time Imaging
2003-03 期刊論文 A Self-Encryption Mechanism for Authentication of Roaming and Teleconference Services Hwang, K. F. and Chang, C. C. IEEE Transactions on Wireless Communications
2003-02 期刊論文 Enhancement Algorithm for Nonlinear Context-Based Predictors Chang, C. C. and Chen, G. I. IEE Proceedings-Vision Image and Signal Processing
2003-02 期刊論文 Error Prevention and Resilience of VQ Encoded Images Hung, K. L. and Chang, C. C. Signal Processing
2003-02 期刊論文 New Irregular Sampling Coding Method for Transmitting Images Progressively Hung, K. L. and Chang, C. C. IEE Proceedings-Vision Image and Signal Processing
2003-02 期刊論文 Parallel Computational Algorithms for Generalized Chinese Remainder Theorem Lai, Y. P. and Chang, C. C. Computers and Electrical Engineering
2003- 期刊論文 A DWT-based Deblocking Technique Based on Edge Detection and Zero Masking for Blocking Effect Tsai, C. S. and Chang, C. C. Fundamenta Informaticae
2003- 期刊論文 A Flexible Date Attachment Scheme on E-Cash Chang, C. C. and Lai, Y. P. Computers and Security
2003- 期刊論文 A New Channel for Image Hiding Based on Interpolating polynomials Chan, C. W. and Chang, C. C. Fundamenta Informaticae
2003- 期刊論文 A New Key Assignment Scheme for Enforcing Complicated Access Control Policies in Hierarchy Lin, I. C., Hwang, M. S. and Chang, C. C. Future Generation Computer Systems
2003- 期刊論文 A Watermarking Scheme Based on Principal Component Analysis Technique Chang, C. C. and Chan, C. S. Informatica
2003- 期刊論文 An Efficient Multi-Exponentiation Scheme Based on Modified Booth’s Method Lai, Y. P. and Chang, C. C. International Journal of Electronics
2003- 期刊論文 An Efficient Protocol for Anonymous Multicast and Reception Chang, C. C. and Chung, C. Y. Information Processing Letters
2003- 期刊論文 An Efficient and Practical (t, n) Threshold Proxy Signature Scheme with Known Signers Huang, H. F. and Chang, C. C. Fundamenta Informaticae
2003- 期刊論文 Construction of Symmetrical Reversible Variable Length Codes Using Backtracking Tseng, H. W. and Chang, C. C. The Computer Journal
2003- 期刊論文 Edge Detection Using Block Truncation Coding Hu, Y. C. and Chang, C. C. International Journal of Pattern Recognition and Artificial Intelligence
2003- 期刊論文 Efficient Anonymous Auction Protocols with Freewheeling Bids Chang, C. C. and Chang, Y. F. Computers & Security
2003- 期刊論文 Hiding Digital Data in Music Scores Using Musical Features Chang, C. C., Wu, W. C., Hu, Y. C. and Li, Y. C. Journal of Applied Systems Studies
2003- 期刊論文 Hiding Digital Watermarks Using Fractal Compression Technique Wu, H. C. and Chang, C. C. Fundamenta Informaticae
2003- 期刊論文 Security Enhancement for a Modified Authenticated Key Agreement Protocol Chang, C. C., Hwang, K. F. and Lin, I. C. International Journal of Computational and Numerical Analysis and Applications
2003- 期刊論文 Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards Chang, C. C. and Hwang, K. F. Informatica
2003- 期刊論文 Using Set Partitioning in Hierarchical Trees to Authenticate Digital Image Tsai, P. Y., Hu, Y. C. and Chang, C. C. Signal Processing: Image Communication Journal
2002-11 期刊論文 A Fast Codebook Training Algorithm for Vector Quantization Chang, C. C. and Hu, Y. C. IEEE Transactions on Consumer Electronics
2002-09 期刊論文 Both Color and Gray Scale Secret Image Hiding in a Color Image Lin, M. H., Hu, Y. C. and Chang, C. C. International Journal of Pattern Recognition and Artificial Intelligence
2002-08 期刊論文 A Novel Two-stage Edge Detection Scheme for Digital Color Images Tsai, P. Y., Chang, C. C. and Hu, Y. C. Signal Processing: Image Communication
2002-06 期刊論文 A Fast Pixel Mapping Algorithm Using Principal Component Analysis Hwang, K. F. and Chang, C. C. Pattern Recognition Letters
2002-06 期刊論文 An Image Intellectual Property Protection Scheme for Gray-Level Images Using Visual Secret Sharing Strategy Chang, C. C. and Chuang, J. C. Pattern Recognition Letters
2002-03 期刊論文 An ELGamal-like Cryptosystem for Enciphering Large Messages Hwang, M. S., Chang, C. C. and Hwang, K. F. IEEE Transactions on Knowledge and Data Engineering
2002-03 期刊論文 Error Prevention and Concealment for Chinese Calligraphy Based on Block Truncation Coding Hung, K. L. and Chang, C. C. Journal of Computer Processing of Oriental Languages
2002- 期刊論文 A Color Image Copyright Protection Scheme Based on Visual Cryptography and Discrete Cosine Transform Chang, C. C., Hsiao, J. Y. and Yeh, J. C. Image Science Journal
2002- 期刊論文 A Color Image Retrieval Method Based on Color Moment and Color Variance of Adjacent Pixels Chan, Y. K and Chang, C. C. International Journal on Pattern Recognition and Artificial Intelligence
2002- 期刊論文 A Fast and Secure Image Hiding Scheme Based on LSB Substitution Chang, C. C., Lin, M. H. and Hu, Y. C. International Journal of Pattern Recognition and Artificial Intelligence
2002- 期刊論文 A Feature-Oriented Copyright Owner Proving Technique for Still Image Chang, C. C., Hwang, K. F. and Hwang, M. S. International Journal of Software Engineering and Knowledge Engineering
2002- 期刊論文 A New Micro-Payment System Using General Payword Chain Wang, C. T, Chang, C. C. and Lin, C. H. Electronic Commerce Research Journal
2002- 期刊論文 A Steganographic Method Based upon JPEG and Quantization Table Modification Chang, C. C., Chen, T. S. and Chung, L. Z. Information Science: an International Journal
2002- 期刊論文 An Adaptive Two-Stage Edge Detection Scheme for Digital Color Images Tsai, P. Y., Chang, C. C. and Hu, Y. C. Journal of Real Time Imaging
2002- 期刊論文 An Improved Authentication Protocol without Trusted Third Party Hwang, M. S., Chang, C. C. and Hwang, K. F. International Journal of Computational and Numerical Analysis and Applications
2002- 期刊論文 An Improvement of a Technique for Color Quantization Using Reduction of Color Space Dimentionality Hung, K. L. and Chang, C. C. Informatica
2002- 期刊論文 Both Color and Gray Scale Secret Images Hiding in a Color Image Lin, M. H., Hu, Y. C. and Chang, C. C. International Journal on Pattern Recognition and Artificial Intelligence
2002- 期刊論文 Cryptanalysis of an Encryption Scheme for Binary Images Chang, C. C. and Yu, T. X. Pattern Recognition Letters
2002- 期刊論文 Detection and Restoration of Tampered JPEG Compressed Images Wu, H. C. and Chang, C. C. Journal of Systems and Software
2002- 期刊論文 Recognition of Image Authenticity Using Significant DCT Coefficients Quantization Chang, C. C., Chuang, L. Z. and Chen, T. S. Informatica
2002- 期刊論文 Robust Authentication scheme for Protecting Copyrights of Images and Graphics Chang, C. C., Hwang, K. F. and Hwang, M. S. IEE Proceedings-Vision Image and Signal Processing
2002- 期刊論文 Sharing Multiple Secrets in Digital Images Tsai, C. S., Chang, C. C. and Chen, T. S. Journal of Systems and Software
2001-09 期刊論文 Secure Discrete Cosine Transform based Technique for Recoverable Tamper Proofing Hung, K. L., Chang, C. C. and Chen, T. S. Optical Engineering
2001-04 期刊論文 Image Matching Using Run-Length Feature Chan, Y. K. and Chang, C. C. Pattern Recognition
2001-01 期刊論文 Employ a Data Compression Scheme to Speed up the Computations on Elliptic Curves Chang, C. C. and Kuo, Y. T. International Journal of Applied Mathematics
2001- 期刊論文 A New Fast Search Algorithm of Block Motion Estimation Using Clustering Technique Chang, C. C., Chen, L. L. and Chen, T. S. Journal of Applied Systems Studies
2001- 期刊論文 A New Two-way Search Algorithm for Block Motion Estimation Estimation of Video Data Chang, C. C., Chen, L. L. and Chen T. S. Journal of Information Science and Engineering
2001- 期刊論文 A Novel Progressive Image Transmission Technique for Chinese Calligraphy Hung, K. L. and Chang, C. C. Journal of Computer Processing of Oriental Languages
2001- 期刊論文 A Secure and Robust Digital Image Copyright Protection Scheme Chang, C. C. and Wu, H. C. Journal of Applied Systems Studies
2001- 期刊論文 An Efficient Threshold Decryption Scheme without Session Keys Hwang, M. S., Chang, C. C. and Hwang, K. F. Computer & Electrical Engineering
2001- 期刊論文 Bi-level Lossless Calligraphy Compression Using Location Propagation and Width Inheritance Chang, C. C. and Chen, G. I. Computer Processing of Oriental Languages
2001- 期刊論文 Cryptographic Key Assignment Scheme for Hierarchical Access Control Wu, T. C. and Chang, C. C. International Journal of Computer Systems Science and Engineering
2001- 期刊論文 Hiding a Picture in two Pictures Hwang, R. J. and Chang, C. C. Optical Engineering
2001- 期刊論文 IA Copyright Protection Scheme of Images Based on Visual Cryptography Chang, C. C. and Wu, H. C. The Imaging Science Journal
2001- 期刊論文 Image Coding Schemes Based on Subsampling Vector Quantization Hu, Y. C. and Chang, C. C. Optical Engineering
2001- 期刊論文 Image Steganography Using Vector Quantization and Discrete Cosine Transformation Tsai, C. S., Chang, C. C. and Chen, T. S. The Imaging Science Journal
2001- 期刊論文 Improved Nearest Codeword Search Scheme Using a Tighter Kick-out Condition Hwang, K. F. and Chang, C. C. Optical Engineering
2001- 期刊論文 New Encryption Algorithm for Image Cryptosystems Chang, C. C., Hwang, M. S. and Chen, T. S. Journal of Systems and Software
2001- 期刊論文 New Method of Secret Image Sharing Based on Vector Quantization Chen, T. S. and Chang, C. C. Journal of Electronic Imaging
2001- 期刊論文 Spatial Similarity Retrieval in Video Database Chan, Y. K. and Chang, C. C. Journal of Visual Communication and Image Representation
2000-10 期刊論文 Digital Watermarking of Images Using Neural Networks Hwang, M. S., Chang, C. C. and Hwang, K. F. Journal of Electronic Imaging
2000-06 期刊論文 A Technique for Computing Watermarks from Digital Images Chang, C. C. and Tsai, C. S. Informatica
2000-06 期刊論文 An Efficient Computation of Euclidean Distance Using Approximated Look-Up Table Chang, C. C., Chou, J. S. and Chen, T. S. IEEE Transactions on Circuits and Systems for Video Technology
2000-06 期刊論文 Generalization of Threshold Signature and Authenticated Encryption for Group Communications Wang, C. T, Chang, C. C. and Lin, C. H. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
2000-03 期刊論文 A New Efficient Server-Aided RSA Secret Computation Protocol Against Active Attacks Hwang, S. J. and Chang, C. C. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
2000-03 期刊論文 A Technique of Watermarking for Digital Images Using (t, n)-Threshold Scheme Chang, C. C., Chen, T. S. and Chung, P. F. Informatica
2000-03 期刊論文 An Efficient Divide-and-Conquer Technique for Parallel Computation of Modular Multi-Exponentiation Chang, C. C. and Lou, D. C. Computer Systems Science and Engineering
2000-02 期刊論文 Fast Modular Reduction and Multi-multiplication Method Chang, C. C. and Kuo, Y. T. International Journal of Applied Mathematics
2000- 期刊論文 A Breadth First Oriented Symbolic Picture Representation for Spatial Match Retrieval Lee, C. F. and Chang, C. C. Journal of Systems and Software
2000- 期刊論文 A Colour Image Compression Scheme Based on Two-Layer Absolute Moment Block Truncation Coding Chang, C. C., Chen, T. S. and Chung, L. Z. The Imaging Science Journal
2000- 期刊論文 A Digital Watermarking Scheme Using Human Visual Effects Chang, C. C., Hwang, K. F. and Hwang, M.S. Informatica
2000- 期刊論文 A Fast Filter of Spatial Video Retrieval Chan, Y. K. and Chang, C. C. International Journal of Applied Mathematics
2000- 期刊論文 A New Lossless Compression Scheme Based on Huffman Coding for Image Compression Hu, Y. C. and Chang, C. C. Signal Processing: Image Communication
2000- 期刊論文 A Predictive Subcodebook Search Algorithm for Vector Quantization Hu, Y. C. and Chang, C. C. Optical Engineering
2000- 期刊論文 Computing Lucas Functions Using Addition Chains Chang, C. C. and Chan, C. W. International Journal of Applied Mathematics
2000- 期刊論文 Conference Key Distributions Using Self-Certified Public Keys Chang, C. C., Wang, C. T. and Lin, C. H. International Journal of Applied Mathematics
2000- 期刊論文 Pattern-based Side Match Vector Quantization for Image Compression Chang, C. C., Shine, F. C. and Chen, T. S. The Imaging Science Journal
2000- 期刊論文 Quadtree-Segmented Image Coding Schemes Using Vector Quantization and Block Truncation Coding Hu, Y. C. and Chang, C. C. Optical Engineering
2000- 期刊論文 User Identification and Key Distribution Maintaining Anonymity for Distributed Computer Networks Lee, W. B. and Chang, C. C. Computer Systems Science and Engineering
1999-02 期刊論文 A Multi-Channel Storage Arrangement Scheme of Pictorial Databases for Concurrent Spatial Match Retrieval Chang, C. C. and Shen J. J. Computer and Mathematics with Applications
1999-02 期刊論文 Low Complexity Index-Compressed Vector Quantization for Image Compression Hu, Y. C and Chang, C. C. IEEE Transactions on Consumer Electronics
1999- 期刊論文 (t, n) Threshold Digital Signature with Traceability Property Lee, W. B. and Chang, C. C. Journal of Information Science and Engineering
1999- 期刊論文 A Compact Sparse Matrix Representation Using Random Hash Functions Jiang, J. H., Chang, C. C. and Chen, T. S. Data & Knowledge Engineering
1999- 期刊論文 A Concept of Designing Cheater Identification Methods for Secret Sharing Hwang, R. J., Lee, W. B. and Chang, C. C. Journal of Systems and Software
1999- 期刊論文 A Fast Modular Multiplication Algorithm for Calculating the Product AB Modulo N Chen, C. Y. and Chang, C. C. Information Processing Letters
1999- 期刊論文 A Method for Computing Lucas Sequence Wang, C. T., Chang, C. C. and Lin, C. H. Computer and Mathematics with Applications
1999- 期刊論文 A Watermarking Technique Based on One-way Hash Functions Hwang, M. S., Chang, C. C. and Hwang, K. F. IEEE Transactions on Consumer Electronics
1999- 期刊論文 An Improved Threshold Scheme Based on Modular Arithmetic Hwang, R. J. and Chang, C. C. Journal of Information Science and Engineering
1999- 期刊論文 Calligraphy Compression Using Quadtree Decomposition and Pattern Matching Jiang, J. H., Chang, C. C. and Chen, T. S. Computer Processing of Oriental Languages
1999- 期刊論文 Conference Key Distribution Scheme for Portable Communication System Chang, C. C. and Hwang, P. C. and Lee, W. B. Computer Communications
1999- 期刊論文 Hybrid Image Compression Methods Based on Vector Quantization and Block Truncation Coding Chang, C. C. and Hu, Y. C. Optical Engineering
1999- 期刊論文 Partition Search Filter and Its Performance Analysis Chang, C. C., Lee, T. F. and Leu, J. J. Journal of Systems and Software
1999- 期刊論文 Reconstruction of Lost Blocks Using Codeword Estimation Hung, K. L., Chang, C. C. and Chen T. S. IEEE Transactions on Consumer Electronics
1999- 期刊論文 Variable Rate Vector Quantization Scheme Based on Quadtree Segmentation Hu, Y. C. and Chang, C. C. IEEE Transactions on Consumer Electronics
1998-11 期刊論文 A Fast LBG Codebook Training Algorithm for Vector Quantization Chang, C. C. and Hu, Y. C. IEEE Transactions on Consumer Electronics
1998-11 期刊論文 A Fast Modular Multiplication Method Lou, D. C. and Chang, C. C. Computer Systems Science and Engineering
1998-11 期刊論文 A Fast Reconstruction Method for Transmitting Images Progressively Chang, C. C., Jau, J. J. and Chen, T. S. IEEE Transactions on Consumer Electronics
1998-11 期刊論文 An Improvement of Bottom-Up Variable-Sized Block Matching Technique for Video Compression Chang, C. C., Chen, L. L. and Chen, T. S. IEEE Transactions on Consumer Electronics
1998-11 期刊論文 Sharing Secret Images Using Shadow Codebooks Chang, C. C. and Hwang, R. J. Information Sciences
1998-10 期刊論文 A New Data Compression Scheme for Chinese Text Using Chinese Words and Multilist Structure Chang, C. C., Sung, C. H. and Chen, T. S. Computer Processing of Chinese and Oriental Languages
1998-10 期刊論文 A Virtual Image Cryptosystem Based on Vector Quantization Chen, T. S., Chang, C. C. and Hwang, M. S. IEEE Transactions on Image Processing
1998-10 期刊論文 Conference Key Supervision in a Level-Based Hierarchy Wang, C. T., Chang, C. C. and Lin, C. H. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
1998-04 期刊論文 Two Improved Codebook Search Methods of Vector Quantization Based on Orthogonal Checking and Fixed Range Search Chang, C. C., Lee, W. T. and Chen, T. S. Journal of Electronic Imaging
1998-01 期刊論文 Efficient Group Signature Scheme Based on Discrete Logarithm Lee, W. B. and Chang, C. C. IEE Proceedings - Computers and Digital Techniques
1998- 期刊論文 A Bin-Tree Oriented Iconic Indexing Scheme for Retrieving Symbolic Pictures Chang, C. C. and Lee, C. F. Data and Knowledge Engineering
1998- 期刊論文 A Dynamic Secret Sharing Scheme Based on the Factoring and Diffie-Hellman Problems Lee, W. B. and Chang, C. C. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
1998- 期刊論文 A Predictive Image Coding Scheme Using a Smaller Codebook Chang, C. C., Chou, J. S. and Chen, T. S. Image Communication
1998- 期刊論文 A Simple Picture Hiding Scheme Chang, C. C. and Hwang, R. J. Computer Processing of Oriental Languages
1998- 期刊論文 A Spatial Match Retrieval Mechanism for Symbolic Pictures Chang, C. C. and Lee, C. F. Journal of Systems and Software
1998- 期刊論文 An Adaptive Exponentiation Method Lou, D. C. and Chang, C. C. Journal of Systems and Software
1998- 期刊論文 An Encryption/Multisignature Scheme with Specified Receiving Groups Hwang, S. J., Chen, C. Y. and Chang, C. C. Computer Systems Science and Engineering
1998- 期刊論文 An On-line Secret Sharing Scheme for Multi-secrets Hwang, R. J. and Chang, C. C. Computer Communications
1998- 期刊論文 Authenticity of Public Keys in Asymmetric Cryptosystems Lee, W. B. and Chang, C. C. Computer Communications
1998- 期刊論文 Broadcasting Secrets in Communication Networks Chang, C. C., Wu, T. C. and Yeh, Y. S. Computer Systems Science and Engineering
1998- 期刊論文 Multiple Disk Allocation Based on Round-Robin Hilbert Curve for Spatial Data Chang, C. C. and Jiang, J. H. International Journal of Information and Management Sciences
1998- 期刊論文 Three ID-Based Information Security Functions Lee, W. B. and Chang, C. C. Computer Communications
1998- 期刊論文 Threshold Signature Schemes with Traceable Signers in Group Communications Wang, C. T., Lin, C. H. and Chang, C. C. Computer Communications
1998- 期刊論文 Using RSA with Low Exponent in a Public Network Lee, W. B. and Chang, C. C. Computer Communications
1997-10 期刊論文 Spatial Match Retrieval Based on Direction Signatures Using Multiple Key Hashing Scheme Chang, C. C. and Lee, C. F. International Journal of Intelligent Systems
1997-09 期刊論文 A Smart Card Oriented Password Authentication Scheme Based on Rabin’s Public Key Cryptosystem Chang, C. C. and Wu, T. C. International Journal on Information and Management Sciences
1997-08 期刊論文 A New Image Coding Algorithm Using Variable-Rate Side-Match Finite-State Vector Quantization Chen, T. S. and Chang, C. C. IEEE Transactions on Image Processing
1997-06 期刊論文 Diagonal Axes Method (DAM): A Fast Search Algorithm for Vector Quantization Chen, T. S. and Chang, C. C. IEEE Transactions on Circuits and Systems for Video Technology
1997-02 期刊論文 A Locally Adaptive Data Compression Strategy for Chinese-English Characters Chang, C. C. and Wang, C. H. Journal of Systems and Software
1997-01 期刊論文 A Binary Access Control Method Using Prime Factorization Chang, C. C., Lou, D. C. and Wu, T. C. Information Sciences
1997-01 期刊論文 A Digital Signature Scheme Based upon Theory of Quadratic Residues Chang, C. C., Jan, J. K. and Kowng, H. C. Cryptologia
1997-01 期刊論文 Efficient Cheater Identification Method for Threshold Schemes Chang, C. C. and Hwang, R. J. IEE Proceedings - Computers and Digital Techniques
1997-01 期刊論文 Optimal Bucket Allocation Design of K-ary MKH Files for Concurrent Partial Match Retrieval Chen, C. Y., Lin, H. F., Chang, C. C. and Lee, R. C. T. IEEE Transactions on Knowledge and Data Engineering
1997-01 期刊論文 Parallel Computation of the Multi-Exponentiation for Cryptosystems Chang, C. C. and Lou, D. C. International Journal of Computer Mathematics
1997- 期刊論文 A Cost Optimal Search Technique for the Knapsack Problem Lou, D. C. and Chang, C. C. International Journal of High Speed Computing
1997- 期刊論文 A Generalized Secret Sharing Scheme Chang, C. C. and Tsai, H. M. Journal of Systems and Software
1997- 期刊論文 A New Method for Temporal Join Using a Priority Search Tree Chang, C. C., Jiang, J. H. and Buehrer, D. J. International Journal of Information and Management Sciences
1997- 期刊論文 A Secure Voting System on a Public Network Chang, C. C. and Wu, W. B. Networks
1997- 期刊論文 A Simple Approach for Generating RSA Keys Chang, C. C. and Hwang, S. J. Information Processing Letters
1997- 期刊論文 An Improved VQ Codebook Search Algorithm Using Principal Component Analysis Chang, C. C., Lin, D. C. and Chen, T. S. Journal of Visual Communication and Image Representation
1997- 期刊論文 Authenticated Encryption Schemes with Linkage between Message Blocks Lee, W. B. and Chang, C. C. Information Processing Letters
1997- 期刊論文 Multidisk Smaller Sized MKH File Allocation for Partial Match Retrieval Chen, C. Y., Lin, H. F., Chang, C. C. and Lee, R. C. T. Journal of Information Science and Engineering
1997- 期刊論文 New Tree-Structured Vector Quantization with Closest-Coupled Multipath Searching Method Chang, C. C. and Chen, T. S. Optical Engineering
1997- 期刊論文 On the Number of Messages Cannot be Concealed in LUC Kuo, W. C., Laih, C. S., Gau, M. J. and Chang, C. C. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
1996-12 期刊論文 A Spatial Filter for Similarity Retrieval Chang, C. C. and Jiang, J. H. International Journal on Pattern Recognition and Artificial Intelligence
1996-12 期刊論文 Fast Algorithms for Vector Quantization Chang, C. C., Chang, R. F., Lee, W. T. and Kuo, C. L. Journal of Information Science and Engineering
1996-12 期刊論文 Redundant MKH Files Design among Multiple Disks for Concurrent Partial Match Retrieval Chen, C. Y., Lin, H. F., Chang, C. C. and Lee, R. C. T. Journal of Systems and Software
1996-10 期刊論文 An Improvement to Ziegler's Sparse Matrix Compression Algorithm Chang, C. C., Kowng, H. C. and Buehrer, D. J. Journal of Systems and Software
1996-09 期刊論文 On Key Changeable ID-Based Digital Signature Scheme Lee, W. B. and Chang, C. C. Journal of Information Science and Engineering
1996-09 期刊論文 On the Security of Chang and Wu's Broadcasting Cryptosystem for Computer Network Hwang, T., Lee, N. Y., Li, C. M. and Chang, C. C. Computer Systems Science and Engineering
1996-09 期刊論文 Two Efficient Server-Aided RSA Secret Computation Protocols against Active Attacks Hwang, S. J., Chang, C. C. and Yang, W. P. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
1996-07 期刊論文 An Efficient Dynamic Threshold Scheme Hwang, S. J., Chang, C. C. and Yang, W. P. IEICE Transactions on Information and Systems
1996-07 期刊論文 Parallel Computation of the Generating Keys for RSA Cryptosystems Chang, C. C. and Hwang, M. S. IEE Electronics Letters
1996-06 期刊論文 Retrieving Chinese Characters with Similar Appearance from a Reorganized Chinese Dictionary Wu, T. C. and Chang, C. C. International Journal of Information and Management Sciences
1996-05 期刊論文 Fast Exponentiation Method Obtained by Folding the Exponent in Half Lou, D. C. and Chang, C. C. IEE Electronics Letters
1996-04 期刊論文 Some Properties of Optimal Cartesian Product Files for Orthogonal Range Queries Chou, A. Y. H., Chang, C. C. and Yang, W. P. Information Sciences
1996-03 期刊論文 Hybrid Method for Modular Exponentiation with Precomputation Chen, C. Y., Chang, C. C. and Yang, W. P. IEE Electronics Letters
1996-02 期刊論文 A Spatial Data Representation: An Adaptive 2D-H String Chang, C. C. and Lin, D. C. Pattern Recognition Letters
1996- 期刊論文 A Parallel Two-list Algorithm for the Knapsack Problem Lou, D. C. and Chang, C. C. Parallel Computing
1996- 期刊論文 Authenticated Encryption Schemes with Message Linkage Hwang, S. J., Chang, C. C. and Yang, W. P. Information Processing Letters
1996- 期刊論文 Cryptanalysis of an Improved Remote Password Authentication with Smart Card Lee, W. B. and Chang, C. C. International Journal of Information Management and Engineering
1996- 期刊論文 Cryptanalysis of the Secret Exponent of RSA Chen, C. Y., Chang, C. C. and Yang, W. P. Journal of Information Science and Engineering
1996- 期刊論文 Integrating Authentication in Public Key Distribution System Lee, W. B. and Chang, C. C. Information Processing Letters
1996- 期刊論文 Two 2D Search Filters and Their Performance Analyses Chang, C. C. and Leu, J. J. International Journal of Computer Mathematics
1995-12 期刊論文 Optimal Two-Dimensional Cartesian Product Files for Orthogonal Range Queries Chou, A. Y. H., Yang, W. P. and Chang, C. C. Journal of Information Science and Engineering
1995-12 期刊論文 Remote Scheme for Password Authentication Based on Theory of Quadratic Residues Chang, C. C., Tsu, S. M. and Chen, C. Y. Computer Communications
1995-11 期刊論文 Dynamic Pictorial Databases Design for Similarity Retrieval Chang, C. C. and Liang, J. Information Sciences
1995-09 期刊論文 A Cascade Exponentiation Evaluation Scheme Based on the Lempel-Ziv-Welch Compression Algorithm Chang, C. C., Horng, W. J. and Buehrer, D. J. Journal of Information Science and Engineering
1995-09 期刊論文 Authenticated Encryption Scheme without Using a One Way Function Lee, W. B. and Chang, C. C. IEE Electronics Letters
1995-09 期刊論文 Cryptanalysis of a Cryptosystem Based upon Continuned Fraction Lee, W. B., Chang, C. C. and Jan, J. K. International Journal of Information and Management Sciences
1995-06 期刊論文 The Shortest Weighted Length Addition Chains Chen, Y. J., Chang, C. C. and Yang, W. P. Journal of Information Science and Engineering
1995-05 期刊論文 An Exact Match Retrieval Scheme Based upon Principal Component Analysis Chang, C. C. and Wu, T. C. Pattern Recognition Letters
1995-04 期刊論文 A Near Pattern-matching Scheme Based upon Principal Component Analysis Chen, C. Y., Chang, C. C. and Lee, R. C. T. Pattern Recognition Letters
1995-04 期刊論文 Relative Coordinates Oriented Symbolic String for Spatial Relationship Retrieval Chang, C. C. and Lee, C. F. Pattern Recognition
1995-02 期刊論文 Cryptanalysis on an Access Control in a Hierarchy Chang, C. C., Fan, S. W., Liaw, H. T. and Chiou, M. Y. Computers and Mathematics with Applications
1995-01 期刊論文 A New Public-key Cipher System Based upon the Diophantine Equations Lin, C. H., Chang, C. C. and Lee, R. C. T. IEEE Transactions on Computers
1995-01 期刊論文 Arithmetic Operations on Encrypted Data Chang, C. C. and Tsu, S. M. International Journal of Computer Mathematics
1995-01 期刊論文 Cryptanalysis of a Password Authentication Scheme Using Quadratic Residues Chang, C. C., Wu, T. C. and Laih, C. S. Computer Communications
1995- 期刊論文 A Cryptographic Implementation for Dynamic Access Control in a User Hierarchy Tsai, H. M. and Chang, C. C. Computers and Security
1995- 期刊論文 Comment on Digital Signature with (t, n) Shared Verification Based on Discrete Logarithms Lee, W. B. and Chang, C. C. IEE Electronics Letters
1995- 期刊論文 Parallel Computation of the Modular Cascade Exponentiation Chen, Y. J., Chang, C. C. and Yang, W. P. Journal of Parallel Algorithms and Applications
1994-12 期刊論文 A New Access Control Scheme with High Data Security Tseng, J. C. R., Yang, W. P. and Chang, C. C. International Journal of Management and Information Sciences
1994-12 期刊論文 Utilizing the Concept of Longest Common Subsequence to Retrieve Similar Chinese Characters Chang, C. C. and Lin, D. C. Chinese and Oriental Languages Computing
1994-11 期刊論文 Method for Constructing a Group-Oriented Cipher System Lin, C. H. and Chang, C. C. Computer Communications
1994-10 期刊論文 Assigning Digital Key Pairs to Determine Relationships in a User Hierarchy Structure Chang, C. C. and Liaw, H. T. Transactions of Information Processing Society of Japan
1994-10 期刊論文 New Concepts for Multiple Stack Systems: Born and Reborn Chang, C. C., Hwang, S. J. and Buehrer, D. J. Journal of Systems and Software
1994-09 期刊論文 A Digital Multisignature Scheme Based upon the Digital Signature Scheme of a Modified ElGamal's Public Key Cryptosystem Chang, C. C. and Liou, F. Y. Journal of Information Science and Engineering
1994-09 期刊論文 Application of Geometric Hashing to Iconic Database Retrieval Wu, T. C. and Chang, C. C. Pattern Recognition Letters
1994-09 期刊論文 Attacks on ID-based Signature Scheme Based upon Rabin's Public Key Cryptosystem Ko, M. Y., Hwang, T. and Chang, C. C. Computer Communications
1994-07 期刊論文 Optimal Multiple Key Hashing Files for Orthogonal Range Queries Liang, J., Chang, C. C., McFadyen, R. G. and Lee, R. C. T. Information Sciences
1994-05 期刊論文 A Scheme to Determine the Relationship between Two Users in a Hierarchy Chang, C. C., Jan, J. K. and Buehrer, D. J. Computers and Security
1994-05 期刊論文 An Authentication-Combined Access Control Scheme Using a One-Way Function Wu, T. C., Chang, C. C. and Yeh, Y. S. Computers and Mathematics with Applications
1994-05 期刊論文 Controlling Access in Tree Hierarchies Wu, T. C. and Chang, C. C. Information Sciences
1994-04 期刊論文 A Remote Password Authentication Scheme Based upon ElGamal's Signature Scheme Chang, C. C. and Liao, W. Y. Computers and Security
1994- 期刊論文 A Server-Aided Computation Protocol for RSA Enciphering Algorithm Lin, C. H. and Chang, C. C. International Journal of Computer Mathematics
1994- 期刊論文 A Two-Dimensional Shape Recognition Scheme Based on Principal Component Analysis Chang, C. C., Chen, Y. W. and Buehrer, D. J. International Journal of Pattern Recognition and Artificial Intelligence
1994- 期刊論文 Access Control with Binary Keys Chang, C. C., Shen, J. J. and Wu, T. C. Computers and Security
1994- 期刊論文 Authentication and Protection of Public Keys Laih, C. S., Chiou, W. H. and Chang, C. C. Computers and Security
1994- 期刊論文 Parallel Computation of the Cascade Exponentiation Laih, C. S., Chang, C. C. and Yeh, S. M. International Journal of Information Management and Engineering
1994- 期刊論文 Some Properties of Vectorial Addition Chains Chen, Y. J., Chang, C. C. and Yang, W. P. International Journal of Computer Mathematics
1993-11 期刊論文 Modified Chang-Hwang-Wu Access Control Scheme Hwang, M. S., Chang, C. C. and Yang, W. P. IEE Electronics Letters
1993-08 期刊論文 A Hashing-Oriented Nearest Neighbor Searching Scheme Chang, C. C. and Wu, T. C. Pattern Recognition Letters
1993-07 期刊論文 A Chinese Seal Imprints Recognition Scheme Chang, C. C., Lu, C. S. and Buehrer, D. J. Computer Processing of Chinese and Oriental Languages
1993-06 期刊論文 A New Generalized Group-Oriented Cryptoscheme without Trusted Centers Chang, C. C. and Lee, H. C. IEEE Journal on Selected Areas in Communications
1993-06 期刊論文 An Object-Oriented Similarity Retrieval Algorithm for Iconic Image Database Chen, C. Y. and Chang, C. C. Pattern Recognition Letters
1993-04 期刊論文 Master Keys for an M3 Cryptoscheme Chang, C. C. and Hwang, R. J. Cryptologia
1993-02 期刊論文 Optimal MMI File Systems for Orthogonal Range Retrieval Chen, C. Y., Chang, C. C. and Lee, R. C. T. Information Systems
1993- 期刊論文 A Key-Lock-Pair Oriented Access Control Scheme for the Growth of Users and Files Jan, J. K. and Chang, C. C. BIT
1993- 期刊論文 A Refinement of a Compression-Oriented Addressing Scheme for Letter-Oriented Keywords Chang, C. C., Kowng, H. C. and Wu, T. C. BIT
1993- 期刊論文 Access Control in a Hierarchy Using a One-Way Trap Door Function Chang, C. C. and Buehrer, D. J. Computers and Mathematics with Applications
1993- 期刊論文 Algebraic Operations on Encrypted Relational Databases Wu, T. C., Yeh, Y. S. and Chang, C. C. Information Systems
1993- 期刊論文 Controlling the Access Requests in Information Protection Systems Chang, C. C. and Wu, T. C. Information Processing and Management
1993- 期刊論文 Using Smart Cards to Authenticate Remote Passwords Chang, C. C. and Hwang, S. J. Computers and Mathematics with Applications
1992-12 期刊論文 Encoding Chinese Words Using Mandarin Phonetic Symbols Liu, C. C., Chang, C. C. and Buehrer, D. J. Computer Processing of Chinese and Oriental Languages
1992-10 期刊論文 Hierarchy Representations Based on Arithmetic Coding for Dynamic Information Protection Systems Lin, C. H., Chang, C. C. and Lee, R. C. T. Information Sciences
1992-10 期刊論文 On GDM Allocation Method for Partial Range Queries Chen, C. Y. and Chang, C. C. Information Systems
1992-09 期刊論文 A Chinese Character Retrieval Scheme Using Shuang Pinyin Chen, J. N. and Chang, C. C. Journal of Information Science and Engineering
1992-07 期刊論文 Remote Password Authentication with Smart Cards Chang, C. C. and Laih, C. S. IEE Proceedings - Part E
1992- 期刊論文 A Conference Key Broadcasting System Using Sealed Locks Lin, C. H., Chang, C. C. and Lee, R. C. T. Information Systems
1992- 期刊論文 A Fast Algorithm to Retrieve Symbolic Pictures Chang, C. C. International Journal of Computer Mathematics
1992- 期刊論文 A Record-Oriented Cryptosystem for Database Sharing Lin, C. H., Chang, C. C. and Lee, R. C. T. The Computer Journal
1992- 期刊論文 A Secure Broadcasting Scheme Based on Discrete Logarithms Chang, C. C. and Hwang, S. J. International Journal of Control and Computers
1992- 期刊論文 A Solution to Generalized Group Cryptography Chang, C. C. and Lee, H. C. IT SECURITY: The Need for International Security, North-Holland
1992- 期刊論文 Cryptographic Key Assignment Scheme for Access Control in a Hierarchy Chang, C. C., Hwang, R. J. and Wu, T. C. Information Systems
1992- 期刊論文 Greedy File - A New Data Organization Concept for Partial Match Retrieval Chou, Y. H., Yang, W. P. and Chang, C. C. The Computer Journal
1992- 期刊論文 Optimality Properties of DM Allocation Method for K-ary Multiple Key Hashing Files Chang, C. C., Lin, H. F. and Chen, C. Y. The Computer Journal
1992- 期刊論文 Retrieving the Most Similar Symbolic Pictures from Pictorial Databases Chang, C. C. and Wu, T. C. Information Processing and Management
1992- 期刊論文 Symbolic Gray Code as a Data Allocation Scheme for Two-Disk Systems Chang, C. C., Chen, H. Y. and Chen, C. Y. The Computer Journal
1991-10 期刊論文 On the Design of a Machine-Independent Perfect Hashing Scheme Chang, C. C., Chen, C. Y. and Jan, J. K. The Computer Journal
1991-09 期刊論文 A Study of Input Rates for a Chinese Characters Input System Jan, J. K., Chang, C. C., Wang, F. S. and Chen, C. P. Communications of Chinese and Oriental Languages Information Processing Society
1991-06 期刊論文 A Note on Allocating K-ary Multiple Key Hashing Files Among Multiple Disks Chang, C. C. and Chen, C. Y. Information Sciences
1991-05 期刊論文 Remote Password Authentication with Smart Cards Chang, C. C. and Wu, T. C. IEE Proceedings - Part E
1991-03 期刊論文 A Data Compression Scheme for Chinese and English Characters Chang, C. C. and Tsai, W. H. Computer Processing of Chinese and Oriental Languages
1991-01 期刊論文 A Letter-Oriented Perfect Hashing Scheme Based upon Sparse Table Compression Chang, C. C. and Wu, T. C. Software-Practice and Experience
1991-01 期刊論文 A Shape Recognition Scheme Based on Relative Distances of Feature Points from the Centroid Chang, C. C., Hwang, S. M. and Buehrer, D. J. Pattern Recognition
1991-01 期刊論文 Retrieval of Similar Pictures on Pictorial Databases Chang, C. C. and Lee, S. Y. Pattern Recognition
1991- 期刊論文 A Broadcasting Cryptosystem in Computer Networks Using Interpolating Polynomials Chang, C. C. and Wu, T. C. Computer Systems Science and Engineering
1991- 期刊論文 A Composite Perfect Hashing Scheme for Large Letter-oriented Key Sets Chang, C. C. Journal of Information Science and Engineering
1991- 期刊論文 A Dynamic Key-Lock-Pair Access Control Scheme Jan, J. K., Chang, C. C. and Wang, S. J. Computers and Security
1991- 期刊論文 A Password Authentication Scheme Based on Discrete Logarithms Wu, T. C. and Chang, C. C. International Journal of Computer Mathematics
1991- 期刊論文 On the Design of MKH Files for Concurrent Orthogonal Range Retrieval among Two Disks Chen, C. Y., Chang, C. C. and Lee, R. C. T. Information Systems
1991- 期刊論文 Password Authentication Using Newton's Interpolation Polynomials Lin, C. H., Chang, C. C., Wu, T. C. and Lee, R. C. T. Information Systems
1991- 期刊論文 Spatial Match Retrieval of Symbolic Pictures Chang, C. C. Journal of Information Science and Engineering
1990-09 期刊論文 The Design of Two Compression Mechanisms for Chinese Textual Files Chang, C. C., Jan, J. K. and Chen, C. P. Computer Processing of Chinese and Oriental Languages
1990-06 期刊論文 An Arithmetic Coding Oriented Single Key Access Control Scheme Jan, J. K., Chang, C. C. and Wu, L. H. International Journal of Information and Management Science
1990- 期刊論文 A Dynamic Access Control Mechanism in Information Protection Systems Lin, C. H., Chang, C. C. and Lee, R. C. T. Journal of Information Science and Engineering
1990- 期刊論文 A New Password Authentication Scheme Chang, C. C. and Wu, L. H. Journal of Information Science and Engineering
1990- 期刊論文 A Reciprocal Confluence Tree Unit and Its Applications Chang, C. C. and Lin, C. H. BIT
1990- 期刊論文 A Survey of Key-to-Key User Hierarchic Representation Mechanism Chang, C. C. Journal of Information Processing, Japan, invited paper
1989-12 期刊論文 Broadcasting Cryptosystem Based upon Euclidean Geometry Chang, C. C. and Wu, T. C. International Journal on Policy and Information
1989-06 期刊論文 Optimality Properties of Binary Cartesian Product File Systems Chang, C. C., Chen, C. Y. and Chang, S. S. International Journal on Policy and Information
1988-12 期刊論文 A Recursive Performance Formula of the DM Allocation Method for BCPFs Chang, C. C. and Chen, C. Y. The Computer Journal
1988-12 期刊論文 An Access Control Scheme for New Users and Files Chang, C. C. and Jan, J. K. International Journal on Policy and Information
1988-02 期刊論文 An Ordered Minimal Perfect Hashing Scheme with Single Parameter Chang, C. C. and Chang, C. H. Information Processing Letters
1988- 期刊論文 A Fast Chinese Characters Accessing Technique Using Mandarin Phonetic Transcriptions Chang, C. C. and Wu, H. C. The International Journal of Pattern Recognition and Artificial Intelligence
1988- 期刊論文 Application of Principal Component Analysis to Multi-Disk Concurrent Accessing Chang, C. C. BIT
1987-12 期刊論文 Performance Analysis of the Generalized Disk Modulo Allocation Method for Multiple Key Hashing Files on Multi-Disk Systems Chang, C. C. and Chen, C. Y. The Computer Journal
1987-07 期刊論文 Gray Code as a De-clustering Scheme for Concurrent Disk Retrieval Chang, C. C. and Chen, C. Y. Journal of Information Science and Engineering
1987-07 期刊論文 Some Properties of Cartesian Product Files for Disk Modulo Allocation Method in a Two-disk System Chang, C. C. and Chen, C. Y. Journal of Information Science and Engineering
1987- 期刊論文 An Information Protection Scheme Based upon Number Theory Chang, C. C. The Computer Journal
1987- 期刊論文 Performance of Two-disk Partition Data Allocations Chang, C. C. and Chen, C. Y. BIT
1986-09 期刊論文 A Scheme for Constructing Ordered Minimal Perfect Hashing Functions Chang, C. C. Information Sciences
1986-06 期刊論文 Letter Oriented Reciprocal Hashing Scheme Chang, C. C. Information Sciences
1986- 期刊論文 A Letter Oriented Minimal Perfect Hashing Scheme Chang, C. C. and Lee, R. C. T. The Computer Journal
1986- 期刊論文 On the Design of a Key-Lock-Pair Mechanism in Information Protection Systems Chang, C. C. BIT
1984-12 期刊論文 Optimal Information Retrieval when Queries Are Not Random Chang, C. C. Information Sciences
1984-06 期刊論文 An Ordered Minimal Perfect Hashing Scheme Based upon Euler's Theorem Chang, C. C. Information Sciences
1984-04 期刊論文 The Study of an Ordered Minimal Perfect Hashing Scheme Chang, C. C. Communications of the Association for Computing Machinery
1984-01 期刊論文 Performance Analyses of Cartesian Product Files and Random Files Chang, C. C., Du, M. W. and Lee, R. C. T. IEEE Transactions on Software Engineering
1983-10 期刊論文 The Hierarchical Ordering in Multi-attribute Files Chang, C. C., Du, M. W. and Lee, R. C. T. Information Sciences
1982-05 期刊論文 Symbolic Gray Code as a Perfect Multi-attribute Hashing Scheme for Partial Match Queries Chang, C. C., Lee, R. C. T. and Du, M. W. IEEE Transactions on Software Engineering