2009 |
489 | EE | Chin-Feng Lee,
Kuo-Hui Wang,
Chin-Chen Chang,
Yu-Lin Huang:
A reversible data hiding scheme based on dual steganographic images.
ICUIMC 2009: 228-237 |
488 | EE | Chin-Chen Chang,
Shih-Chang Chang:
The design of e-traveler's check with efficiency and mutual authentication.
ICUIMC 2009: 309-316 |
487 | EE | Kuo-Nan Chen,
Chin-Feng Lee,
Chin-Chen Chang:
Embedding secret messages based on chaotic map and Huffman coding.
ICUIMC 2009: 336-341 |
486 | EE | Chin-Chen Chang,
Chia-Yin Lee,
Yen-Chang Chiu:
Enhanced authentication scheme with anonymity for roaming service in global mobility networks.
Computer Communications 32(4): 611-618 (2009) |
485 | EE | Chung-Chuan Wang,
Chin-Chen Chang,
Jinn-ke Jan:
NovelWatermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel Patterns.
Fundam. Inform. 90(1-2): 125-155 (2009) |
484 | EE | Chin-Chen Chang,
Yung-Chen Chou:
A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes.
Fundam. Inform. 90(1-2): 17-26 (2009) |
483 | EE | Chin-Chen Chang,
Yi-Fang Cheng,
Iuon-Chang Lin:
A novel key management scheme for dynamic multicast communications.
Int. J. Communication Systems 22(1): 53-66 (2009) |
482 | EE | Chin-Chen Chang,
Jung-San Lee:
Robust t-out-of-n oblivious transfer mechanism based on CRT.
J. Network and Computer Applications 32(1): 226-235 (2009) |
481 | EE | Fei Yu,
Chin-Chen Chang,
Ben M. Chen,
Jian Shu,
Guangxue Yue:
Editorial.
JCP 4(1): 1-2 (2009) |
480 | EE | Fei Yu,
Chin-Chen Chang,
Ben M. Chen,
Jun Zhang,
Guangxue Yue:
Editorial.
JSW 4(1): 1-2 (2009) |
479 | EE | Chin-Chen Chang,
Yi-Hui Chen,
Chia-Chen Lin:
A data embedding scheme for color images based on genetic algorithm and absolute moment block truncation coding.
Soft Comput. 13(4): 321-331 (2009) |
2008 |
478 | EE | Chin-Chen Chang,
The Duc Kieu,
Yung-Chen Chou:
Using nearest covering codes to embed secret information in grayscale images.
ICUIMC 2008: 315-320 |
477 | EE | Chin-Chen Chang,
Jung-San Lee,
Ting-Fang Cheng:
Security design for three-party encrypted key exchange protocol using smart cards.
ICUIMC 2008: 329-333 |
476 | EE | Chin-Feng Lee,
Yi-Ren Wang,
Chin-Chen Chang:
An adaptive EMD embedding method by condensing secret messages based on consecutive ones transformation and token substitution.
ICUIMC 2008: 390-395 |
475 | EE | Chin-Chen Chang,
The Duc Kieu,
Yung-Chen Chou:
A High Payload Steganographic Scheme Based on (7, 4) Hamming Code for Digital Images.
ISECS 2008: 16-21 |
474 | EE | Chin-Chen Chang,
Chia-Chen Lin,
T. Hoang Ngan Le,
Hoai Bac Le:
A Probabilistic Visual Secret Sharing Scheme for Grayscale Images with Voting Strategy.
ISECS 2008: 184-188 |
473 | EE | Yu-Chiang Li,
Jieh-Shan Yeh,
Chin-Chen Chang:
Isolated items discarding strategy for discovering high utility itemsets.
Data Knowl. Eng. 64(1): 198-217 (2008) |
472 | EE | Chin-Chen Chang,
Chih-Yang Lin,
Yi-Pei Hsieh:
Three-Phase Lossless Data Hiding Method for the VQ Index Table.
Fundam. Inform. 82(1-2): 1-13 (2008) |
471 | EE | Hui-Feng Huang,
Chin-Chen Chang:
A Novel Cryptographic Key Assignment Scheme with ID-Based Access Control in a Hierachy.
Fundam. Inform. 84(3-4): 353-361 (2008) |
470 | EE | Chin-Chen Chang,
Yung-Chen Chou,
The Duc Kieu:
High Capacity Data Hiding for Grayscale Images.
Fundam. Inform. 86(4): 435-446 (2008) |
469 | EE | Chin-Chen Chang,
Chia-Chen Lin,
Yi-Hui Chen:
Adaptive Data Embedding Scheme Based on Similar and Dissimilar Clustering Strategies.
Fundam. Inform. 88(1-2): 23-45 (2008) |
468 | EE | Yung-Chen Chou,
Chin-Chen Chang,
Kuan-Ming Li:
A Large Payload Data Embedding Technique for Color Images.
Fundam. Inform. 88(1-2): 47-61 (2008) |
467 | EE | Chin-Chen Chang,
Pei-Yu Lin:
A Color Image Authentication Method Using Partitioned Palette and Morphological Operations.
IEICE Transactions 91-D(1): 54-61 (2008) |
466 | EE | Chih-Yang Lin,
Chin-Chen Chang,
Yu-Zheng Wang:
Reversible Steganographic Method with High Payload for JPEG Images.
IEICE Transactions 91-D(3): 836-845 (2008) |
465 | EE | Chang-Chu Chen,
Chin-Chen Chang:
LSB-Based Steganography Using Reflected Gray Code.
IEICE Transactions 91-D(4): 1110-1116 (2008) |
464 | EE | Chin-Feng Lee,
Chin-Chen Chang,
Kuo-Hua Wang:
An improvement of EMD embedding method for large payloads by pixel segmentation strategy.
Image Vision Comput. 26(12): 1670-1676 (2008) |
463 | EE | Tzu-Chuen Lu,
Chin-Chen Chang:
Lossless nibbled data embedding scheme based on difference expansion.
Image Vision Comput. 26(5): 632-638 (2008) |
462 | EE | Hsien-Wen Tseng,
Chin-Chen Chang:
An extended difference expansion algorithm for reversible watermarking.
Image Vision Comput. 26(8): 1148-1153 (2008) |
461 | EE | Chin-Chen Chang,
Chia-Chen Lin,
Chia-Hsuan Lin,
Yi-Hui Chen:
A novel secret image sharing scheme in color images using small shadow images.
Inf. Sci. 178(11): 2433-2447 (2008) |
460 | EE | Chin-Chen Chang,
Wen-Chuan Wu,
Yi-Hui Chen:
Joint coding and embedding techniques for multimedia images.
Inf. Sci. 178(18): 3543-3556 (2008) |
459 | EE | Chin-Chen Chang,
Yen-Ting Kuo,
Wen-Kai Tai:
Genetic-Based Approach for Synthesizing Texture.
International Journal on Artificial Intelligence Tools 17(4): 731-743 (2008) |
458 | EE | Chia-Chi Wu,
Chin-Chen Chang,
Iuon-Chang Lin:
New Sealed-Bid Electronic Auction with Fairness, Security and Efficiency.
J. Comput. Sci. Technol. 23(2): 253-264 (2008) |
457 | EE | Fei Yu,
Chin-Chen Chang,
Ben M. Chen,
Wen Chen,
Yongjun Chen:
Editorial.
JCM 3(6): 1-2 (2008) |
456 | EE | Wen Chen,
Fei Yu,
Chin-Chen Chang,
Jiexian Zeng,
Guangxue Yue:
Editorial.
JCM 3(7): 1-2 (2008) |
455 | EE | Fei Yu,
Chin-Chen Chang,
Ben M. Chen,
Zhigang Chen,
Jun Ni:
Editorial.
JCP 3(12): 1-2 (2008) |
454 | EE | Fei Yu,
Chin-Chen Chang,
Ben M. Chen,
Yongjun Chen,
Zhigang Chen:
Editorial.
JSW 3(9): 1-2 (2008) |
453 | EE | Chin-Chen Chang,
Pei-Yu Lin:
Adaptive watermark mechanism for rightful ownership protection.
Journal of Systems and Software 81(7): 1118-1129 (2008) |
452 | EE | Ming-Ni Wu,
Chia-Chen Lin,
Chin-Chen Chang:
An embedding technique based upon block prediction.
Journal of Systems and Software 81(9): 1505-1516 (2008) |
451 | EE | Chin-Chen Chang,
Cheng-Yi Liu,
Wen-Kai Tai:
Feature alignment approach for hand posture recognition based on curvature scale space.
Neurocomputing 71(10-12): 1947-1953 (2008) |
450 | EE | Yi-Pei Hsieh,
Chin-Chen Chang,
Li-Jen Liu:
A two-codebook combination and three-phase block matching based image-hiding scheme with high embedding capacity.
Pattern Recognition 41(10): 3104-3113 (2008) |
449 | EE | Chin-Chen Chang,
Yi-Pei Hsieh,
Chia-Hsuan Lin:
Sharing secrets in stego images with authentication.
Pattern Recognition 41(10): 3130-3137 (2008) |
448 | EE | Chia-Chen Lin,
Wei-Liang Tai,
Chin-Chen Chang:
Multilevel reversible data hiding based on histogram modification of difference images.
Pattern Recognition 41(12): 3582-3591 (2008) |
447 | EE | Chin-Chen Chang,
Yi-Hsuan Fan,
Wei-Liang Tai:
Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery.
Pattern Recognition 41(2): 654-661 (2008) |
446 | EE | Chin-Chen Chang,
Chih-Yang Lin,
Yi-Hsuan Fan:
Lossless data hiding for color images based on block truncation coding.
Pattern Recognition 41(7): 2347-2357 (2008) |
445 | EE | Jung-San Lee,
Chin-Chen Chang:
Preserving data integrity in mobile ad hoc networks with variant Diffie-Hellman protocol.
Security and Communication Networks 1(4): 277-286 (2008) |
444 | EE | Yu-Ting Tsai,
Chin-Chen Chang,
Qing-Zhen Jiang,
Shr-Ching Weng:
Importance sampling of products from illumination and BRDF using spherical radial basis functions.
The Visual Computer 24(7-9): 817-826 (2008) |
2007 |
443 | EE | Chia-Chi Wu,
Chin-Chen Chang,
Shang-Ru Yang:
An Efficient Fragile Watermarking for Web Pages Tamper-Proof.
APWeb/WAIM Workshops 2007: 654-663 |
442 | EE | Kuo-Lung Hung,
Chin-Chen Chang:
Recoverable Tamper Proofing Technique for Image Authentication Using Irregular Sampling Coding.
ATC 2007: 333-343 |
441 | EE | Chin-Chen Chang,
Yih-Shin Hu,
Chia-Chen Lin:
A Digital Watermarking Scheme Based on Singular Value Decomposition.
ESCAPE 2007: 82-93 |
440 | EE | Chao-Wen Chan,
Chin-Chen Chang:
A New (t, n)-Threshold Scheme Based on Difference Equations.
ESCAPE 2007: 94-106 |
439 | EE | Chin-Chen Chang,
Pei-Yu Lin:
Significance-Preserving Codebook Using Generic Algorithm.
FSKD (3) 2007: 660-664 |
438 | EE | Chin-Chen Chang,
Yung-Chen Chou,
Tzu-Chuen Lu:
A Semi-blind Watermarking Based on Discrete Wavelet Transform.
ICICS 2007: 164-176 |
437 | EE | Chin-Chen Chang,
Wen-Chuan Wu:
Reversible Quantization-Index Modulation Using Neighboring Correlation.
IWDW 2007: 222-232 |
436 | EE | Chin-Chen Chang,
Chih-Yang Lin,
Yu-Zheng Wang:
A High Payload VQ Steganographic Method for Binary Images.
IWDW 2007: 467-481 |
435 | EE | Chin-Chen Chang,
Yu-Wei Su,
Iuon-Chang Lin:
A broadcast-encryption-based key management scheme for dynamic multicast communications work-in-progress.
Infoscale 2007: 69 |
434 | EE | Kai-Jie Chang,
Chin-Chen Chang:
An e-mail signature protocol for anti-spam work-in-progress.
Infoscale 2007: 70 |
433 | EE | Chin-Chen Chang,
Yi-Fang Cheng,
Iuon-Chang Lin:
Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control.
Inscrypt 2007: 457-462 |
432 | EE | Chin-Chen Chang,
Yi-Hui Chen,
Yung-Chen Chou:
Reversible Data Embedding Technique for Palette Images Using De-clustering.
MCAM 2007: 130-139 |
431 | EE | Chung-Chuan Wang,
Chin-Chen Chang,
Xinpeng Zhang,
Jinn-ke Jan:
Senary Huffman Compression - A Reversible Data Hiding Scheme for Binary Images.
MCAM 2007: 351-360 |
430 | EE | Chin-Chen Chang,
Chih-Yang Lin:
Density-Based Image Vector Quantization Using a Genetic Algorithm.
MMM (1) 2007: 289-298 |
429 | EE | Chi-Shiang Chan,
Chin-Chen Chang:
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator.
MMM (2) 2007: 461-470 |
428 | EE | Chin-Chen Chang,
Hao-Chuan Tsai,
Yi-Hui Chen:
An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards.
MUE 2007: 1210-1215 |
427 | EE | Chin-Chen Chang,
Chu-Hsing Lin,
Chien-Yuan Chen:
A Conference Key Distribution Scheme Using Interpolating Polynomials.
MUE 2007: 963-967 |
426 | EE | Hui-Feng Huang,
Chin-Chen Chang:
An Efficient Key-Lock-Pair Mechanism Based on Division Algorithm.
MUE 2007: 982-986 |
425 | EE | Jieh-Shan Yeh,
Yu-Chiang Li,
Chin-Chen Chang:
Two-Phase Algorithms for a Novel Utility-Frequent Mining Model.
PAKDD Workshops 2007: 433-444 |
424 | EE | Chin-Chen Chang,
Chih-Chiang Tsou,
Yung-Chen Chou:
A Remediable Image Authentication Scheme Based on Feature Extraction and Clustered VQ.
PCM 2007: 446-449 |
423 | EE | Chin-Chen Chang,
Yu-Zheng Wang,
Yu-Chen Hu:
Adaptive Data Hiding Scheme for Palette Images.
Intelligent Multimedia Data Hiding: New Directions 2007: 103-122 |
422 | EE | Chin-Chen Chang,
Tzu-Chuen Lu,
Yi-Hsuan Fan:
A Bit-Level Visual Secret Sharing Scheme for Multi-Secret Images Using Rotation and Reversion Operatations.
Intelligent Multimedia Data Hiding: New Directions 2007: 83-101 |
421 | EE | Yu-Chiang Li,
Jieh-Shan Yeh,
Chin-Chen Chang:
MICF: An effective sanitization algorithm for hiding sensitive patterns on data mining.
Advanced Engineering Informatics 21(3): 269-280 (2007) |
420 | EE | Ting-Fang Cheng,
Jung-San Lee,
Chin-Chen Chang:
Security enhancement of an IC-card-based remote login mechanism.
Computer Networks 51(9): 2280-2287 (2007) |
419 | EE | Yuan-Hui Yu,
Chin-Chen Chang,
Iuon-Chang Lin:
A new steganographic method for color and grayscale image hiding.
Computer Vision and Image Understanding 107(3): 183-194 (2007) |
418 | EE | Ya-Fen Chang,
Chin-Chen Chang:
Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy.
Fundam. Inform. 76(1-2): 13-23 (2007) |
417 | EE | Chin-Chen Chang,
Chang-Chu Chen:
Full-Searching-Equivalent Vector Quantization Using Two-Bounds Triangle Inequality.
Fundam. Inform. 76(1-2): 25-37 (2007) |
416 | EE | Chin-Chen Chang,
Tzu-Chuen Lu,
Jun-Bin Ya:
VQ Codebook Searching Algorithm Based on Correlation Property.
Fundam. Inform. 76(1-2): 39-57 (2007) |
415 | EE | Chin-Chen Chang,
Chih-Yang Lin,
Chun-Sen Tseng:
Secret Image Hiding and Sharing Based on the (t, n)-Threshold.
Fundam. Inform. 76(4): 399-411 (2007) |
414 | EE | Hsien-Chu Wu,
Chin-Chen Chang:
An Image Retrieval Method Based on Color-Complexity and Spatial-Histogram Features.
Fundam. Inform. 76(4): 481-493 (2007) |
413 | EE | Chin-Chen Chang,
Wei-Liang Tai,
Chia-Chen Lin:
A Novel Image Hiding Scheme Based on VQ and Hamming Distance.
Fundam. Inform. 77(3): 217-228 (2007) |
412 | EE | Chin-Chen Chang,
Wen-Chuan Wu:
Fast Planar-Oriented Ripple Search Algorithm for Hyperspace VQ Codebook.
IEEE Transactions on Image Processing 16(6): 1538-1547 (2007) |
411 | EE | Chin-Chen Chang,
Yi-Pei Hsieh,
Chih-Yang Lin:
Lossless Data Embedding With High Embedding Capacity Based on Declustering for VQ-Compressed Codes.
IEEE Transactions on Information Forensics and Security 2(3-1): 341-349 (2007) |
410 | EE | Chin-Chen Chang,
Wen-Chuan Wu,
Chih-Chiang Tsou:
Hiding Secret Information Using Adaptive Side-Match VQ.
IEICE Transactions 90-D(10): 1678-1686 (2007) |
409 | EE | Chin-Chen Chang,
Yung-Chen Chou,
Chih-Yang Lin:
Reversible Data Hiding in the VQ-Compressed Domain.
IEICE Transactions 90-D(9): 1422-1429 (2007) |
408 | EE | Jung-San Lee,
Chin-Chen Chang,
Pen-Yi Chang,
Chin-Chen Chang:
Anonymous authentication scheme for wireless communications.
IJMC 5(5): 590-601 (2007) |
407 | EE | Jung-San Lee,
Chin-Chen Chang,
Pen-Yi Chang,
Chin-Chen Chang:
Anonymous authentication scheme for wireless communications.
IJMC 5(5): 590-601 (2007) |
406 | EE | Tzu-Chuen Lu,
Chin-Chen Chang:
Color image retrieval technique based on color features and image bitmap.
Inf. Process. Manage. 43(2): 461-472 (2007) |
405 | EE | Chin-Chen Chang,
Chia-Chen Lin,
Chun-Sen Tseng,
Wei-Liang Tai:
Reversible hiding in DCT-based compressed images.
Inf. Sci. 177(13): 2768-2786 (2007) |
404 | EE | Iuon-Chang Lin,
Chin-Chen Chang:
Security enhancement for digital signature schemes with fault tolerance in RSA.
Inf. Sci. 177(19): 4031-4039 (2007) |
403 | EE | Chin-Chen Chang,
Chih-Yang Lin:
Reversible steganographic method using SMVQ approach based on declustering.
Inf. Sci. 177(8): 1796-1805 (2007) |
402 | EE | Ya-Fen Chang,
Chin-Chen Chang,
Pei-Yu Lin:
A Concealed t-out-of-n Signer Ambiguous Signature Scheme with Variety of Keys.
Informatica, Lith. Acad. Sci. 18(4): 535-546 (2007) |
401 | EE | Chin-Chen Chang,
Chih-Yang Lin,
Keng-Chu Lin:
Simple efficient mutual anonymity protocols for peer-to-peer network based on primitive roots.
J. Network and Computer Applications 30(2): 662-676 (2007) |
400 | EE | Jung-San Lee,
Chin-Chen Chang:
Secure communications for cluster-based ad hoc networks using node identities.
J. Network and Computer Applications 30(4): 1377-1396 (2007) |
399 | EE | Chin-Chen Chang,
Wen-Chuan Wu,
Yu-Chen Hu:
Lossless recovery of a VQ index table with embedded secret data.
J. Visual Communication and Image Representation 18(3): 207-216 (2007) |
398 | EE | Chin-Chen Chang,
Yu-Chiang Li,
Wen-Hung Huang:
TFRP: An efficient microaggregation algorithm for statistical disclosure control.
Journal of Systems and Software 80(11): 1866-1878 (2007) |
397 | EE | Ming-Ni Wu,
Chia-Chen Lin,
Chin-Chen Chang:
Novel image copy detection with rotating tolerance.
Journal of Systems and Software 80(7): 1057-1069 (2007) |
396 | EE | Ya-Lun Zeng,
Charlie Irawan Tan,
Wen-Kai Tai,
Mau-Tsuen Yang,
Cheng-Chin Chiang,
Chin-Chen Chang:
A momentum-based deformation system for granular material.
Journal of Visualization and Computer Animation 18(4-5): 289-300 (2007) |
395 | EE | Chi-Shiang Chan,
Chin-Chen Chang:
An efficient image authentication method based on Hamming code.
Pattern Recognition 40(2): 681-690 (2007) |
2006 |
394 | EE | Ya-Fen Chang,
Chin-Chen Chang:
Enhanced Anonymous Auction Protocols with Freewheeling Bids.
AINA (1) 2006: 353-358 |
393 | EE | Ya-Fen Chang,
Chin-Chen Chang,
Yu-Wei Su:
A secure improvement on the user-friendly remote authentication scheme with no time concurrency mech.
AINA (2) 2006: 741-745 |
392 | EE | Iuon-Chang Lin,
Chin-Chen Chang:
An Efficient Fault-Tolerant Digital Signature Scheme Based on the Discrete Logarithm Problem.
ATC 2006: 601-610 |
391 | EE | Chin-Chen Chang,
Chi-Shiang Chan,
Yi-Hsuan Fan:
A Secret Image Sharing Scheme Based on Vector Quantization Mechanism.
EUC 2006: 469-478 |
390 | EE | Chao-Wen Chan,
Chin-Chen Chang:
A New Scheme for the Electronic Coin.
ICEBE 2006: 339-343 |
389 | EE | Hui-Feng Huang,
Chin-Chen Chang:
An Untraceable Electronic Cash System Using Fair Blind Signatures.
ICEBE 2006: 39-46 |
388 | EE | Chin-Chen Chang,
Kuo-Lung Hung:
An Efficient Euclidean Distance Estimation Scheme for Accelerating VQ Encoding.
ICICIC (1) 2006: 194-196 |
387 | EE | Chin-Chen Chang,
Yung-Chen Chou,
Jau-Ji Shen:
A Discrete Wavelet Transform Based State-Codebook Search Algorithm for Vector Quantization.
ICICIC (1) 2006: 197-200 |
386 | EE | Ming-Ni Wu,
Chia-Chen Lin,
Chin-Chen Chang:
A Fast Wavelet-Based Image Progressive Transmission Method Based on Vector Quantization.
ICICIC (2) 2006: 677-680 |
385 | EE | Chin-Chen Chang,
Tzu-Chuen Lu:
A Wavelet-Based Progressive Digital Image Transmission Scheme.
ICICIC (2) 2006: 681-684 |
384 | EE | Chin-Chen Chang,
Tung-Shou Chen,
Hsien-Chu Hsia:
An ImageWatermarking Scheme Using Pattern Coding Technique.
ICICIC (3) 2006: 467-470 |
383 | EE | Chin-Chen Chang,
Wei-Liang Tai,
Chia-Chen Lin:
A Multipurpose Wavelet-Based Image Watermarking.
ICICIC (3) 2006: 70-73 |
382 | EE | Timothy K. Shih,
Chin-Chen Chang,
Hsiau Wen Lin:
Reusability on Learning Object Repository.
ICWL 2006: 203-214 |
381 | EE | Chung-Chuan Wang,
Chin-Chen Chang,
Jinn-ke Jan,
Jieh-Shan Yeh:
Novel Steganographic Schemes Based on Row-Major Mapping Relation.
IIH-MSP 2006: 392-395 |
380 | EE | Chin-Chen Chang,
Yung-Chen Chang,
Jau-Ji Shen:
A Heuristic Method for Extracting Enhanced Watermarks from Digital Images.
IIH-MSP 2006: 453-456 |
379 | EE | Chin-Chen Chang,
Yi-Hui Chen,
Kuan-Ming Li:
Improved SMVQ Scheme with Edge-Directed Prediction.
IIH-MSP 2006: 541-544 |
378 | EE | Chin-Chen Chang,
Yung-Chen Chang,
Jau-Ji Shen:
A Novel Image Compression Algorithm Based on Sixteen Most Lately Used Encoded Codewords.
IIH-MSP 2006: 545-548 |
377 | EE | Chin-Chen Chang,
Yung-Chen Chou:
Quantization Index Modulation Using Vector Quantization with DWT Based State-Codebook Search.
IIH-MSP 2006: 549-554 |
376 | EE | Chia-Chen Lin,
Chin-Chen Chang:
An Image Hiding Scheme Based on Du's Disk Allocation Method.
IIH-MSP 2006: 617-620 |
375 | EE | Chin-Chen Chang,
Jun-Chou Chuang:
Progressive Image Transmission Using Significant Features and Linear Regression Prediction.
IIH-MSP 2006: 681-684 |
374 | | Ya-Fen Chang,
Chin-Chen Chang,
Wei-Liang Tai:
Comments on Distributed Sign-and-Encryption Schemes.
IMECS 2006: 178-180 |
373 | | Chin-Chen Chang,
Chia-Chi Wu:
An Improvement of the Design of Integrating Subliminal Channel with Access Control.
IMECS 2006: 276-279 |
372 | | Hui-Feng Huang,
Chin-Chen Chang:
An Untraceable Forward-Secure Blind Signature Scheme.
IMECS 2006: 441-446 |
371 | | Chin-Chen Chang,
Wen-Bin Wu,
Jieh-Shan Yeh:
A Cryptanalysis on a Generalized Threshold Cryptosystem.
IMECS 2006: 452-455 |
370 | | Chao-Wen Chan,
Chin-Chen Chang:
A Scheme for (t, n)-Threshold Secret Image Sharing.
IMECS 2006: 619-624 |
369 | | Chin-Chen Chang,
Keng-Chu Lin:
Yet Another Attack on Mutual Authentication and Key Exchange Protocols for Low Power Wireless Communications.
IMECS 2006: 959-962 |
368 | EE | Tzu-Chuen Lu,
Chin-Chen Chang:
A Bandwidth Efficiency of the Locally Adaptive Compression Method for Hiding Secret Messages.
JCIS 2006 |
367 | EE | Hsien-Chu Wu,
Chin-Chen Chang,
Ting-Wei Yu:
A DCT-based Recoverable Image Authentication.
JCIS 2006 |
366 | EE | Ya-Fen Chang,
Chin-Chen Chang:
Comments on Abe et al.'s Threshold Signer-ambiguous Signature Scheme from Variety of Keys.
JCIS 2006 |
365 | EE | Hsien-Chu Wu,
Hui-Chuan Lin,
Chin-Chen Chang:
Reversible Palette Image Steganography Based on De-clustering and Predictive Coding.
JCIS 2006 |
364 | EE | Chin-Chen Chang,
Wen-Chuan Wu:
A novel data hiding scheme for keeping high stego-image quality.
MMM 2006 |
363 | EE | Chin-Chen Chang,
Kuo-Lun Chen,
Chu-Hsing Lin,
Jen-Chieh Chang:
A Group-Oriented (t, n) Threshold Signature Scheme Against Replay Attacks.
UIC 2006: 816-825 |
362 | EE | Jen-Ho Yang,
Chin-Chen Chang,
Chih-Hung Wang:
A Practical Solution to the (t, n) Threshold Untraceable Signature with (k, l) Verification Scheme.
UIC 2006: 998-1007 |
361 | EE | Chin-Chen Chang,
Chia-Chi Wu:
A Novel Key Agreement Scheme in a Multiple Server Environment.
WISA 2006: 187-197 |
360 | EE | Chin-Chen Chang,
Yeu-Pong Lai:
A division algorithm for residue numbers.
Applied Mathematics and Computation 172(1): 368-378 (2006) |
359 | EE | Chin-Chen Chang,
Yeu-Pong Lai:
A parallel residue-to-binary conversion algorithm without trial division.
Computers & Electrical Engineering 32(6): 454-467 (2006) |
358 | EE | Chin-Chen Chang,
Jung-San Lee:
An anonymous voting mechanism based on the key exchange protocol.
Computers & Security 25(4): 307-314 (2006) |
357 | EE | Chin-Chen Chang,
Jun-Chou Chuang,
Yu-Chen Hu:
Spatial Domain Image Hiding Scheme Using Pixel-Values Differencing.
Fundam. Inform. 70(3): 171-184 (2006) |
356 | EE | Chin-Chen Chang,
Chih-Yang Lin,
Henry Chou:
Perfect Hashing Schemes for Mining Traversal Patterns.
Fundam. Inform. 70(3): 185-202 (2006) |
355 | EE | Yu-Chen Hu,
Chin-Chen Chang:
An Improved Tree-Structured Codebook Search Algorithm for Grayscale Image Compression.
Fundam. Inform. 70(3): 251-260 (2006) |
354 | EE | Chin-Chen Chang,
Guei-Mei Chen,
Yu-Chen Hu:
A Novel Index Coding Scheme for Vector Quantization.
Fundam. Inform. 71(2-3): 215-227 (2006) |
353 | EE | Ming-Ni Wu,
Chia-Chen Lin,
Chin-Chen Chang:
A Robust Content-Based Copy Detection Scheme.
Fundam. Inform. 71(2-3): 351-366 (2006) |
352 | EE | Chia-Chen Lin,
Yu-Chen Hu,
Chin-Chen Chang:
A Novel Image Ownership Protection Scheme Based on Rehashing Concept and Vector Quantization.
Fundam. Inform. 71(4): 443-451 (2006) |
351 | | Chin-Chen Chang,
Chih-Yang Lin:
Reversible Data Embedding Based on Prediction Approach for VQ and SMVQ Compressed Images.
Fundam. Inform. 74(2-3): 189-207 (2006) |
350 | EE | Chin-Chen Chang,
Wei-Liang Tai,
Chia-Chen Lin:
A Reversible Data Hiding Scheme Based on Side Match Vector Quantization.
IEEE Trans. Circuits Syst. Video Techn. 16(10): 1301-1308 (2006) |
349 | EE | Chin-Chen Chang,
Chih-Yang Lin:
Reversible Steganography for VQ-Compressed Images Using Side Matching and Relocation.
IEEE Transactions on Information Forensics and Security 1(4): 493-501 (2006) |
348 | EE | Ya-Fen Chang,
Jung-San Lee,
Chin-Chen Chang:
A secure and efficient authentication scheme for mobile users.
IJMC 4(5): 581-594 (2006) |
347 | EE | Yuan-Hui Yu,
Chin-Chen Chang:
A new edge detection approach based on image context analysis.
Image Vision Comput. 24(10): 1090-1102 (2006) |
346 | EE | Hui-Feng Huang,
Chin-Chen Chang:
A novel efficient (t, n) threshold proxy signature scheme.
Inf. Sci. 176(10): 1338-1349 (2006) |
345 | EE | Chin-Chen Chang,
Chih-Yang Lin,
Yu-Zheng Wang:
New image steganographic methods using run-length approach.
Inf. Sci. 176(22): 3393-3408 (2006) |
344 | EE | Chin-Chen Chang,
Jiann-Jone Chen,
Wen-Kai Tai,
Chin-Chuan Han:
New Approach for Static Gesture Recognition.
J. Inf. Sci. Eng. 22(5): 1047-1057 (2006) |
343 | EE | Chin-Chen Chang,
Tzu-Chuen Lu:
A difference expansion oriented data hiding scheme for restoring the original host images.
Journal of Systems and Software 79(12): 1754-1766 (2006) |
342 | EE | Chin-Chen Chang,
Tzu-Chuen Lu:
Reversible index-domain information hiding scheme based on side-match vector quantization.
Journal of Systems and Software 79(8): 1120-1129 (2006) |
341 | EE | Hsien-Wen Tseng,
Chin-Chen Chang:
Error resilient locally adaptive data compression.
Journal of Systems and Software 79(8): 1156-1160 (2006) |
340 | EE | Chin-Chen Chang:
Adaptive multiple sets of CSS features for hand posture recognition.
Neurocomputing 69(16-18): 2017-2025 (2006) |
339 | EE | Chin-Chen Chang,
Chia-Te Liao:
An image coding scheme using SMVQ and support vector machines.
Neurocomputing 69(16-18): 2327-2335 (2006) |
338 | EE | Chin-Chen Chang,
Chi-Shiang Chan,
Yi-Hsuan Fan:
Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels.
Pattern Recognition 39(6): 1155-1167 (2006) |
337 | EE | Chin-Chen Chang,
Yu-Chiang Li,
Jun-Bin Yeh:
Fast codebook search algorithms based on tree-structured vector quantization.
Pattern Recognition Letters 27(10): 1077-1086 (2006) |
336 | EE | Chin-Chen Chang,
Yih-Shin Hu,
Tzu-Chuen Lu:
A watermarking-based image ownership and tampering authentication scheme.
Pattern Recognition Letters 27(5): 439-446 (2006) |
335 | EE | Chin-Chen Chang,
Chi-Shiang Chan,
Chun-Sen Tseng:
Removing blocking effects using an artificial neural network.
Signal Processing 86(9): 2381-2387 (2006) |
334 | EE | Chin-Chen Chang,
Iuon-Chang Lin:
A new solution for assigning cryptographic keys to control access in mobile agent environments.
Wireless Communications and Mobile Computing 6: 137-146 (2006) |
2005 |
333 | EE | Yeu-Pong Lai,
Chin-Chen Chang:
A Simple Forward Secure Blind Signature Scheme Based on Master Keys and Blind Signatures.
AINA 2005: 139-144 |
332 | EE | Chia-Yin Lee,
Chu-Hsing Lin,
Chin-Chen Chang:
An Improved Low Computation Cost User Authentication Scheme for Mobile Communication.
AINA 2005: 249-252 |
331 | EE | Chin-Chen Chang,
Jui-Yi Kuo:
An Efficient Multi-Server Password Authenticated Key Agreement Scheme Using Smart Cards with Access Control.
AINA 2005: 257-260 |
330 | EE | Chi-Hsiung Huang,
Chia-Yin Lee,
Chu-Hsing Lin,
Chin-Chen Chang,
Kuo-Lun Chen:
Authenticated Encryption Schemes with Message Linkage for Threshold Signatures.
AINA 2005: 261-264 |
329 | EE | Hui-Feng Huang,
Chin-Chen Chang:
A New Design for Efficient t-out-n Oblivious Transfer Scheme.
AINA 2005: 499-502 |
328 | EE | Chi-Shiang Chan,
Chin-Chen Chang:
A Lossless Medical Image Compression Scheme Using Modified S-Tree Structure.
AINA 2005: 75-78 |
327 | EE | Chin-Chen Chang,
Chi-Lung Chiang,
Ju Yuan Hsiao:
A DCT-Domain System for Hiding Fractal Compressed Images.
AINA 2005: 83-86 |
326 | EE | Chin-Chen Chang,
Wei-Liang Tai,
Min-Hui Lin:
A Reversible Data Hiding Scheme with Modified Side Match Vector Quantization.
AINA 2005: 947-952 |
325 | EE | Chin-Chen Chang,
Tzu-Chuen Lu:
A Color-Based Image Retrieval Method Using Color Distribution and Common Bitmap.
AIRS 2005: 56-71 |
324 | EE | Chin-Chen Chang,
Yeu-Pong Lai:
A Parallel Modular Exponentiation Scheme for Transformed Exponents.
APPT 2005: 443-452 |
323 | EE | Yu-Chiang Li,
Jieh-Shan Yeh,
Chin-Chen Chang:
A Fast Algorithm for Mining Share-Frequent Itemsets.
APWeb 2005: 417-428 |
322 | EE | Ming-Ni Wu,
Chia-Chen Lin,
Chin-Chen Chang:
Image Copy Detection with Rotating Tolerance.
CIS (1) 2005: 464-469 |
321 | EE | Chin-Chen Chang,
Jung-San Lee:
Improvement on an Optimized Protocol for Mobile Network Authentication and Security.
CIS (2) 2005: 538-541 |
320 | EE | Hui-Feng Huang,
Chin-Chen Chang:
Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function.
CIS (2) 2005: 554-559 |
319 | EE | Chin-Chen Chang,
Chia-Chen Lin,
Jun-Bin Yeh:
Adaptive Hiding Scheme Based on VQ-Indices Using Commutable Codewords.
CIS (2) 2005: 567-572 |
318 | EE | Chin-Chen Chang,
Jung-San Lee,
Chang-Chu Chen:
On the Forward and Backward Secrecy of HLL Group Key Exchange Mechanism.
CIT 2005: 702-705 |
317 | EE | Chin-Chen Chang,
Jui-Yi Kuo,
Jung-San Lee:
Time-bounded Based Password Authentication Scheme.
CW 2005: 117-122 |
316 | EE | Hui-Feng Huang,
Chin-Chen Chang:
An efficient deniable authentication protocol.
CW 2005: 307-310 |
315 | EE | Ya-Fen Chang,
Chin-Chen Chang:
Password-authenticated 3PEKE with Round Efficiency without Server's Public Key.
CW 2005: 340-344 |
314 | EE | Chin-Chen Chang,
Ya-Fen Chang,
Wen-Chuan Wu:
An Extendable-Message-Passing Protocol with Signatures Based on Two Hard Problems and Its Applications.
CW 2005: 93-100 |
313 | EE | Yu-Chiang Li,
Jieh-Shan Yeh,
Chin-Chen Chang:
Direct Candidates Generation: A Novel Algorithm for Discovering Complete Share-Frequent Itemsets.
FSKD (2) 2005: 551-560 |
312 | EE | Yueh-Yi Lai,
Wen-Kai Tai,
Chin-Chen Chang,
Chen-Duo Liu:
Synthesizing transition textures on succession patterns.
GRAPHITE 2005: 273-276 |
311 | EE | Hui-Feng Huang,
Chin-Chen Chang:
A Novel Conference Key Distribution System with Re-keying Protocol.
Human.Society@Internet 2005: 282-290 |
310 | EE | Ya-Fen Chang,
Chin-Chen Chang:
An Improvement on Strong-Password Authentication Protocols.
ICESS 2005: 629-637 |
309 | EE | Kuo-Feng Hwang,
Chin-Chen Chang,
Chao-Wen Chan:
A Search Scheme Resulting in Mixing Compressed Text Files.
ICPADS (1) 2005: 762-768 |
308 | EE | Chin-Chen Chang,
Jun-Chou Chuang,
Pei-Yu Lin:
Sharing a Secret Two-Tone Image in Two Gray-Level Images.
ICPADS (2) 2005: 300-304 |
307 | EE | Chin-Chen Chang,
Po-Wen Lu:
An Image Refining Method Using Digital Watermark via Vector Quantization.
ICPADS (2) 2005: 585-589 |
306 | EE | Chin-Chen Chang,
Chun-Sen Tseng,
Chia-Chen Lin:
Hiding Data in Binary Images.
ISPEC 2005: 338-349 |
305 | EE | Chin-Chen Chang,
Tzu-Chuen Lu:
Method for Searching Similar Images Using Quality Index Measurement.
KES (2) 2005: 1224-1230 |
304 | EE | Chin-Chen Chang,
Chih-Yang Lin,
Yu-Zheng Wang:
VQ Image Steganographic Method with High Embedding Capacity Using Multi-way Search Approach.
KES (3) 2005: 1058-1064 |
303 | EE | Chin-Chen Chang,
Wen-Chuan Wu:
A Reversible Information Hiding Scheme Based on Vector Quantization.
KES (3) 2005: 1101-1107 |
302 | EE | Chin-Chen Chang,
Yung-Chen Chou,
Jau-Ji Shen:
Improving Image Quality for JPEG Compression.
KES (3) 2005: 442-448 |
301 | EE | Chin-Chen Chang,
Tzu-Chuen Lu,
Jun-Bin Yeh:
A Bandwidth Efficiency of Lempel-Ziv Scheme for Data Authentication.
KES (4) 2005: 249-256 |
300 | EE | Chin-Chen Chang,
Yung-Chen Chou,
Wen-Chuan Wu:
Image Retrieval Using Spatial Color and Edge Detection.
PCM (1) 2005: 981-992 |
299 | EE | Chin-Chen Chang,
Yu-Chiang Li,
Jung-San Lee:
An Efficient Algorithm for Incremental Mining of Association Rules.
RIDE 2005: 3-10 |
298 | EE | Chin-Chen Chang,
Jau-Ji Shen,
Yung-Chen Chou:
FA-Tree - A Dynamic Indexing Structure for Spatial Data.
WSTST 2005: 1071-1080 |
297 | EE | Chin-Chen Chang,
Wei-Liang Tai,
Chia-Chen Lin:
Secret Hiding Using Side Match Vector Quantization.
WSTST 2005: 172-181 |
296 | | Yung-Kuan Chan,
Chin-Chen Chang:
Content-Based Retrieval Concept.
Encyclopedia of Information Science and Technology (I) 2005: 564-568 |
295 | EE | Chin-Chen Chang,
Yeu-Pong Lai:
A fast modular square computing method based on the generalized Chinese remainder theorem for prime moduli.
Applied Mathematics and Computation 161(1): 181-194 (2005) |
294 | EE | Ya-Fen Chang,
Chin-Chen Chang,
Hui-Feng Huang:
Digital signature with message recovery using self-certified public keys without trustworthy system authority.
Applied Mathematics and Computation 161(1): 211-227 (2005) |
293 | EE | Chao-Wen Chan,
Chin-Chen Chang:
A scheme for threshold multi-secret sharing.
Applied Mathematics and Computation 166(1): 1-14 (2005) |
292 | EE | Ya-Fen Chang,
Chin-Chen Chang:
Authentication schemes with no verification table.
Applied Mathematics and Computation 167(2): 820-832 (2005) |
291 | EE | Min-Shiang Hwang,
Kuo-Feng Hwang,
Chin-Chen Chang:
A time-stamping protocol for digital watermarking.
Applied Mathematics and Computation 169(2): 1276-1284 (2005) |
290 | EE | Jen-Ho Yang,
Chin-Chen Chang,
Chih-Hung Wang:
An iterative modular multiplication algorithm in RNS.
Applied Mathematics and Computation 171(1): 637-645 (2005) |
289 | EE | Chin-Chen Chang,
Chih-Yang Lin:
Perfect Hashing Schemes for Mining Association Rules.
Comput. J. 48(2): 168-179 (2005) |
288 | EE | Chin-Chen Chang,
Jung-San Lee,
Ya-Fen Chang:
Efficient authentication protocols of GSM.
Computer Communications 28(8): 921-928 (2005) |
287 | EE | Hsien-Chu Wu,
Chin-Chen Chang:
A novel digital image watermarking scheme based on the vector quantization technique.
Computers & Security 24(6): 460-471 (2005) |
286 | | Iuon-Chang Lin,
Chin-Chen Chang:
A (t, n) Threshold Secret Sharing System with Efficient Identification of Cheaters.
Computers and Artificial Intelligence 24(5): (2005) |
285 | EE | Iuon-Chang Lin,
Min-Shiang Hwang,
Chin-Chen Chang:
The General Pay-Word: A Micro-payment Scheme Based on n-dimension One-way Hash Chain.
Des. Codes Cryptography 36(1): 53-67 (2005) |
284 | EE | Chi-Shiang Chan,
Chin-Chen Chang:
An Image Hiding Scheme Based on Multi-bit-reference Substitution Table Using Dynamic Programming Strategy.
Fundam. Inform. 65(4): 291-305 (2005) |
283 | EE | Tzu-Chuen Lu,
Chin-Chen Chang:
Data Compressor for VQ Index Tables.
Fundam. Inform. 65(4): 353-371 (2005) |
282 | EE | Chin-Chen Chang,
Chi-Shiang Chan:
An Inverse Halftoning Technique Using Modified Look-Up Tables.
Fundam. Inform. 68(3): 207-220 (2005) |
281 | EE | Chih-Yang Lin,
Chin-Chen Chang,
Chia-Chen Lin:
A New Density-Based Scheme for Clustering Based on Genetic Algorithm.
Fundam. Inform. 68(4): 315-331 (2005) |
280 | EE | Chin-Chen Chang,
Wen-Chuan Wu:
A Steganographic Method for Hiding Secret Data Using Side Match Vector Quantization.
IEICE Transactions 88-D(9): 2159-2167 (2005) |
279 | EE | Chin-Chen Chang,
Iuon-Chang Lin,
Hui-Min Tsai:
A dynamic mechanism for determining relationships in a partially ordered user hierarchy.
IJHPCN 3(5/6): 378-384 (2005) |
278 | EE | Chin-Chen Chang,
Yung-Chen Chou,
Yuan-Hui Yu,
Kai-Jung Shih:
An image zooming technique based on vector quantization approximation.
Image Vision Comput. 23(13): 1214-1225 (2005) |
277 | EE | Yuan-Hui Yu,
Chin-Chen Chang,
Yu-Chen Hu:
A genetic-based adaptive threshold selection method for dynamic path tree structured vector quantization.
Image Vision Comput. 23(6): 597-609 (2005) |
276 | EE | Hsien-Wen Tseng,
Chin-Chen Chang:
A Very Low Bit Rate Image Compressor Using Transformed Classified Vector Quantization.
Informatica (Slovenia) 29(3): 335-342 (2005) |
275 | EE | Chin-Chen Chang,
Iuon-Chang Lin:
Cryptanalysis of the Modified Remote Login Authentication Scheme Based on a Geometric Approach.
Informatica, Lith. Acad. Sci. 16(1): 37-44 (2005) |
274 | EE | Hsien-Wen Tseng,
Chin-Chen Chang:
Hiding Data in Halftone Images.
Informatica, Lith. Acad. Sci. 16(3): 419-430 (2005) |
273 | EE | Ya-Fen Chang,
Chin-Chen Chang:
Schemes for Digital Gift Certificates with Low Computation Complexity.
Informatica, Lith. Acad. Sci. 16(4): 503-518 (2005) |
272 | EE | Ya-Fen Chang,
Chin-Chen Chang:
An efficient authentication protocol for mobile satellite communication systems.
Operating Systems Review 39(1): 70-84 (2005) |
271 | EE | Yuan-Hui Yu,
Chin-Chen Chang,
Yu-Chen Hu:
Hiding secret data in images via predictive coding.
Pattern Recognition 38(5): 691-705 (2005) |
270 | EE | Chin-Chen Chang,
Piyu Tsai,
Chia-Chen Lin:
SVD-based digital image watermarking scheme.
Pattern Recognition Letters 26(10): 1577-1586 (2005) |
2004 |
269 | EE | Chin-Chen Chang,
Iuon-Chang Lin,
Hui-Min Tsai:
A Dynamic Mechanism for Determining Relationships in a Partially Ordered User Hierarchy.
AINA (1) 2004: 133-138 |
268 | EE | Chin-Chen Chang,
Ren-Junn Hwang:
A New Scheme to Protect Confidential Images.
AINA (1) 2004: 158-164 |
267 | EE | Yung-Kuan Chan,
Chin-Chen Chang:
Spatial Video Retrieval Based on the Piecewise Method.
AINA (1) 2004: 171-176 |
266 | EE | Ren-Junn Hwang,
Chin-Chen Chang:
Enhancing the Efficiency of (v, r, n)-Fairness Secret Sharing Scheme.
AINA (1) 2004: 208-212 |
265 | EE | Ching-Te Wang,
Chu-Hsing Lin,
Chin-Chen Chang:
Supervising Secret-Key Agreements in a Level-Based Hierarchy.
AINA (1) 2004: 309-314 |
264 | EE | Ching-Te Wang,
Chin-Chen Chang,
Chu-Hsing Lin:
Using IC Cards to Remotely Login Passwords without Verification Tables.
AINA (1) 2004: 321-326 |
263 | EE | Chin-Chen Chang,
Tzu-Chuen Lu,
Yi-Long Liu:
Bandwidth Efficiency of an Image Compression Method for Information Hiding.
AINA (1) 2004: 426-432 |
262 | EE | Chin-Chen Chang,
Ya-Fen Chang:
Yet Another Attack on a QR-based Password Authentication System.
AINA (2) 2004: 170-173 |
261 | EE | Chin-Chen Chang,
Chu-Hsing Lin,
Wei Lee,
Pai-Cheng Hwang:
Secret Sharing with Access Structures in a Hierarchy.
AINA (2) 2004: 31-34 |
260 | EE | Chin-Chen Chang,
Iuon-Chang Lin,
Hui-Min Tsai,
Hsiao-Hsi Wang:
A Key Assignment Scheme for Controlling Access in Partially Ordered User Hierarchies.
AINA (2) 2004: 376-379 |
259 | EE | Ming-Ni Wu,
Min-Hui Lin,
Chin-Chen Chang:
A LSB Substitution Oriented Image Hiding Strategy Using Genetic Algorithms.
AWCC 2004: 219-229 |
258 | EE | Chih-Yang Lin,
Chin-Chen Chang:
A Prediction Scheme for Image Vector Quantization Based on Mining Association Rules.
AWCC 2004: 230-240 |
257 | EE | Yu-Chiang Li,
Chin-Chen Chang:
A New FP-Tree Algorithm for Mining Frequent Itemsets.
AWCC 2004: 266-277 |
256 | EE | Hsien-Wen Tseng,
Chin-Chen Chang:
Steganography Using JPEG-Compressed Images.
CIT 2004: 12-17 |
255 | EE | Min-Hui Lin,
Chin-Chen Chang:
A Novel Information Hiding Scheme Based on BTC.
CIT 2004: 66-71 |
254 | EE | Chin-Chen Chang,
Pei-Yu Lin:
A Compression-Based Data Hiding Scheme Using Vector Quantization and Principle Component Analysis.
CW 2004: 369-375 |
253 | EE | Chin-Chen Chang,
Jung-San Lee:
An Efficient and Secure Multi-Server Password Authentication Scheme using Smart Cards.
CW 2004: 417-422 |
252 | | Chin-Chen Chang,
Ya-Fen Chang:
The Security Flaw of an Untraceable Signature Scheme.
ICEB 2004: 1379-1381 |
251 | | Chin-Chen Chang,
Chung-Mou Pengwu:
Gesture recognition approach for sign language using curvature scale space and hidden Markov model.
ICME 2004: 1187-1190 |
250 | | Chin-Chen Chang:
Novel hierarchical approach for radiosity.
ICME 2004: 863-866 |
249 | EE | Jun-Chou Chuang,
Chin-Chen Chang:
Detection and Restoration of a Tampered Medical Image.
MIAR 2004: 78-85 |
248 | EE | Chin-Chen Chang,
Piyu Tsai,
Min-Hui Lin:
An Adaptive Steganography for Index-Based Images Using Codeword Grouping.
PCM (3) 2004: 731-738 |
247 | | Chin-Chen Chang,
Kuo-Lun Chen:
A Signature Scheme with (t, n) Shared Verification and Message Recovery.
iiWAS 2004 |
246 | EE | Hsien-Wen Tseng,
Chin-Chen Chang:
A Branch-and-Bound Algorithm for the Construction of Reversible Variable Length Codes.
Comput. J. 47(6): 701-707 (2004) |
245 | EE | Min-Hui Lin,
Chin-Chen Chang,
Yan-Ren Chen:
A fair and secure mobile agent environment based on blind signature and proxy host.
Computers & Security 23(3): 199-212 (2004) |
244 | EE | Yuan-Hui Yu,
Chin-Chen Chang:
Scenery Image Segmentation Using Support Vector Machines.
Fundam. Inform. 61(3-4): 379-388 (2004) |
243 | EE | Chin-Chen Chang,
Piyu Tsai,
Min-Hui Lin:
An Adaptive Steganographic Scheme for Color Images.
Fundam. Inform. 62(3-4): 275-289 (2004) |
242 | EE | Hsien-Chu Wu,
Chin-Chen Chang:
Embedding Invisible Watermarks into Digital Images Based on Side-Match Vector Quantization.
Fundam. Inform. 63(1): 89-106 (2004) |
241 | EE | Chin-Chen Chang,
Yuan-Hui Yu:
An Efficient Approach For Face Detection And Facial Feature Location Using Prune-And-Search Technique.
IJPRAI 18(6): 987-1005 (2004) |
240 | EE | Chin-Chen Chang,
Jun-Chou Chuang,
Yih-Shin Hu:
Retrieving digital images from a JPEG compressed image database.
Image Vision Comput. 22(6): 471-484 (2004) |
239 | EE | Hsien-Wen Tseng,
Chin-Chen Chang:
High Capacity Data Hiding in JPEG-Compressed Images.
Informatica, Lith. Acad. Sci. 15(1): 127-142 (2004) |
238 | EE | Chin-Chen Chang,
Hsien-Wen Tseng:
VQ-Based Image Watermarking Using Anti-Gray Coding.
Informatica, Lith. Acad. Sci. 15(2): 147-160 (2004) |
237 | EE | Jen-Ho Yang,
Chin-Chen Chang,
Chien-Yuan Chen:
A high-speed division algorithm in residue number system using parity.
Int. J. Comput. Math. 81(6): 775-780 (2004) |
236 | EE | Chin-Chen Chang,
Chih-Yang Lin,
Pei-Yu Lin:
An Efficient Graph-Based Method for Parallel Mining Problems.
JIKM 3(2): 143-154 (2004) |
235 | EE | Chin-Chen Chang,
Ren-Junn Hwang:
A new scheme to protect confidential images.
Journal of Interconnection Networks 5(3): 221-232 (2004) |
234 | EE | Hui-Feng Huang,
Chin-Chen Chang:
A new design of efficient partially blind signature scheme.
Journal of Systems and Software 73(3): 397-403 (2004) |
233 | EE | Min-Hui Lin,
Chin-Chen Chang:
A secure one-time password authentication scheme with low-computation for mobile communications.
Operating Systems Review 38(2): 76-84 (2004) |
232 | EE | Ya-Fen Chang,
Chin-Chen Chang,
Chia-Lin Kao:
An improvement on a deniable authentication protocol.
Operating Systems Review 38(3): 65-74 (2004) |
231 | EE | Ya-Fen Chang,
Chin-Chen Chang:
A secure and efficient strong-password authentication protocol.
Operating Systems Review 38(3): 79-90 (2004) |
230 | EE | Chin-Chen Chang,
Iuon-Chang Lin:
An improvement of delegated multisignature scheme with document decomposition.
Operating Systems Review 38(4): 52-57 (2004) |
229 | EE | Chin-Chen Chang,
Yeu-Pong Lai:
A convertible group signature scheme.
Operating Systems Review 38(4): 58-65 (2004) |
228 | EE | Ya-Fen Chang,
Chin-Chen Chang,
Jui-Yi Kuo:
A secure one-time password authentication scheme using smart cards without limiting login times.
Operating Systems Review 38(4): 80-90 (2004) |
227 | EE | Chin-Chen Chang,
Iuon-Chang Lin:
Remarks on fingerprint-based remote user authentication scheme using smart cards.
Operating Systems Review 38(4): 91-96 (2004) |
226 | EE | Chin-Chen Chang,
Guei-Mei Chen,
Min-Hui Lin:
Information hiding based on search-order coding for VQ indices.
Pattern Recognition Letters 25(11): 1253-1261 (2004) |
225 | EE | Chin-Chen Chang,
Hsien-Wen Tseng:
A steganographic method for digital images using side match.
Pattern Recognition Letters 25(12): 1431-1437 (2004) |
224 | EE | Chin-Chen Chang,
Iuon-Chang Lin:
Novel full-search schemes for speeding up image coding using vector quantization.
Real-Time Imaging 10(2): 95-102 (2004) |
223 | EE | Piyu Tsai,
Yu-Chen Hu,
Chin-Chen Chang:
A color image watermarking scheme based on color quantization.
Signal Processing 84(1): 95-106 (2004) |
2003 |
222 | EE | Ching-Te Wang,
Chu-Hsing Lin,
Chin-Chen Chang:
Signature Schemes Based on Two Hard Problems Simultaneously.
AINA 2003: 557-560 |
221 | EE | Chao-Wen Chan,
Chin-Chen Chang:
Huffman Tree Decomposition and Its Coding Applications.
AINA 2003: 683-688 |
220 | EE | Chin-Chen Chang,
Ying-Tse Kuo,
Chu-Hsing Lin:
Fast Algorithms for Common-Multiplicand Multiplication and Exponentiation by Performing Complements.
AINA 2003: 807-811 |
219 | EE | Chin-Chen Chang,
Chi-Shiang Chan,
Ju Yuan Hsiao:
Lossless Image Compression Based on Two-Way Smaller Difference.
AINA 2003: 821-824 |
218 | EE | Kuo-Lung Hung,
Chin-Chen Chang:
A Robust and Recoverable Tamper Proofing Technique for Image Authentication.
Human.Society@Internet 2003 2003: 44-53 |
217 | EE | Hui-Feng Huang,
Chin-Chen Chang:
An Efficient Convertible Authenticated Encryption Scheme and Its Variant.
ICICS 2003: 382-392 |
216 | | Chin-Chen Chang,
Cheng-Yi Liu:
Modified curvature scale space feature alignment approach for hand posture recognition.
ICIP (3) 2003: 309-312 |
215 | EE | Ren-Junn Hwang,
Chin-Chen Chang:
A Method for Sending Confidential Messages to a Group without Trusted Parties.
ISPA 2003: 375-381 |
214 | | Kuo-Lung Hung,
Chin-Chen Chang,
Tung-Shou Chen:
An Efficient Block-based Scheme for Progressively Transmitting Lossless Images.
MMM 2003: 313-328 |
213 | | Chin-Chen Chang,
Jun-Chou Chuang,
Yih-Shin Hu:
Similar Image Retrieval Based on Wavelet Transformation.
WAA 2003: 294- |
212 | EE | Hsien-Wen Tseng,
Chin-Chen Chang:
Construction of Symmetrical Reversible Variable Length Codes Using Backtracking.
Comput. J. 46(1): 100-105 (2003) |
211 | | Chin-Chen Chang,
Yeu-Pong Lai:
A flexible date-attachment scheme on e-cash.
Computers & Security 22(2): 160-166 (2003) |
210 | EE | Chin-Chen Chang,
Ya-Fen Chang:
Efficient anonymous auction protocols with freewheeling bids.
Computers & Security 22(8): 728-734 (2003) |
209 | EE | Hui-Feng Huang,
Chin-Chen Chang:
An Efficient and Practical (t, n) Threshold Proxy Signature Scheme with Known Signers.
Fundam. Inform. 56(3): 243-253 (2003) |
208 | EE | Chwei-Shyong Tsai,
Chin-Chen Chang:
An Improvement to Image Segment Based on Human Visual System for Object-based Coding.
Fundam. Inform. 58(2): 167-178 (2003) |
207 | EE | Chwei-Shyong Tsai,
Chin-Chen Chang:
A DWT-based Deblocking Technique Based on Edge Detection and Zero Masking for Reducing Blocking Effect.
Fundam. Inform. 58(2): 179-188 (2003) |
206 | EE | Hsien-Chu Wu,
Chin-Chen Chang:
Hiding Digital Watermarks Using Fractal Compression Technique.
Fundam. Inform. 58(2): 189-202 (2003) |
205 | EE | Chao-Wen Chan,
Chin-Chen Chang:
A New Channel for Image Hiding Based on Interpolating polynomials.
Fundam. Inform. 58(2): 93-104 (2003) |
204 | EE | Iuon-Chang Lin,
Min-Shiang Hwang,
Chin-Chen Chang:
A new key assignment scheme for enforcing complicated access control policies in hierarchy.
Future Generation Comp. Syst. 19(4): 457-462 (2003) |
203 | EE | Yu-Chen Hu,
Chin-Chen Chang:
Edge Detection Using Block Truncation Coding.
IJPRAI 17(6): 951-966 (2003) |
202 | EE | Chin-Chen Chang,
Chi-Yien Chung:
An efficient protocol for anonymous multicast and reception.
Inf. Process. Lett. 85(2): 99-103 (2003) |
201 | EE | Chin-Chen Chang,
Kuo-Feng Hwang:
Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards.
Informatica, Lith. Acad. Sci. 14(3): 289-294 (2003) |
200 | EE | Chin-Chen Chang,
Chi-Shiang Chan:
A Watermarking Scheme Based on Principal Component Analysis Technique.
Informatica, Lith. Acad. Sci. 14(4): 431-444 (2003) |
199 | EE | Chin-Chen Chang,
Ju Yuan Hsiao,
Chi-Shiang Chan:
Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy.
Pattern Recognition 36(7): 1583-1595 (2003) |
198 | EE | Hsien-Wen Tseng,
Chin-Chen Chang:
A Fast and Simple Algorithm for the Construction of Asymmetrical Reversible Variable Length Codes.
Real-Time Imaging 9(1): 3-10 (2003) |
197 | EE | Kuo-Lung Hung,
Chin-Chen Chang:
Error prevention and resilience of VQ encoded images.
Signal Processing 83(2): 431-437 (2003) |
196 | EE | Chin-Chen Chang,
Timothy K. Shih,
Iuon-Chang Lin:
Guessing by neighbors: an efficient reconstruction method for transmitting image progressively.
The Visual Computer 19(5): 342-353 (2003) |
2002 |
195 | EE | Chin-Chen Chang,
Po-Wen Lu,
Ju Yuan Hsiao:
A Hybrid Method for Estimating the Euclidean Distance between Two Vectors.
CW 2002: 183-190 |
194 | EE | Chin-Chen Chang,
Ju Yuan Hsiao,
Chi-Lung Chiang:
An Image Copyright Protection Scheme Based on Torus Automorphism.
CW 2002: 217-224 |
193 | EE | Chin-Chen Chang,
Tai-Xing Yu:
Sharing a Secret Gray Image in Multiple Images.
CW 2002: 230-240 |
192 | EE | Chao-Wen Chan,
Chin-Chen Chang:
Key Exchange Protocols for Multiparty Communication Services.
CW 2002: 241-248 |
191 | EE | Hui-Feng Huang,
Chin-Chen Chang:
Cryptanalysis of the WD Public-Key Cryptosystem.
CW 2002: 249-254 |
190 | EE | Chin-Chen Chang,
I-Yen Chen,
Yea-Shuan Huang:
Hand Pose Recognition Using Curvature Scale Space.
ICPR (2) 2002: 386-389 |
189 | EE | Chin-Chen Chang,
Yuan-Yuan Su:
A Dynamic Color Palette for Color Images Coding.
IEEE Pacific Rim Conference on Multimedia 2002: 369-376 |
188 | EE | Chin-Chen Chang,
Chih-Ping Hsieh,
Ju Yuan Hsiao:
A Fast and Efficient Noise Reduction Method Suitable for Low Noise Density.
IEEE Pacific Rim Conference on Multimedia 2002: 386-392 |
187 | EE | Chin-Chen Chang,
Ju Yuan Hsiao,
Chi-Lung Chiang:
A Cross-Type Peak-and-Valley Filter for Error Prevention and Resilience in Image Communications.
IEEE Pacific Rim Conference on Multimedia 2002: 393-400 |
186 | | Chin-Chen Chang,
Chi-Shiang Chan,
Ya-Ping Pan:
An Inverse Halftoning Technique using Genetic Algorithm.
ISDB 2002: 184-189 |
185 | | Tzu-Chuen Lu,
Chin-Chen Chang,
S. Wesley Changchien:
An Association Rule Mining Method for Spatial Database.
ISDB 2002: 281-286 |
184 | | Yung-Kuan Chan,
Chin-Chen Chang,
Jau-Ji Shen:
A Compact Patricia Trie for a Large Set of Keys.
ISDB 2002: 31-36 |
183 | | Chin-Chen Chang,
Iuon-Chang Lin,
Timothy K. Shih:
An Efficient Edge Detection Technique for Chinese Calligraphy.
JCIS 2002: 960-963 |
182 | | Chin-Chen Chang,
Ming-Ni Wu:
An Algorithm for Color Image Compression Base on Common Bit Map Block Truncation Coding.
JCIS 2002: 964-967 |
181 | | Ching-Te Wang,
Chin-Chen Chang,
Chu-Hsing Lin:
A New Micro-Payment System Using General Payword Chain.
Electronic Commerce Research 2(1-2): 159-168 (2002) |
180 | EE | Min-Shiang Hwang,
Chin-Chen Chang,
Kuo-Feng Hwang:
An ElGamal-Like Cryptosystem for Enciphering Large Messages.
IEEE Trans. Knowl. Data Eng. 14(2): 445-446 (2002) |
179 | EE | Yung-Kuan Chan,
Chin-Chen Chang:
A Color Image Retrieval Method Based on Color Moment and Color Variance of Adjacent Pixels.
IJPRAI 16(1): 113-125 (2002) |
178 | EE | Chin-Chen Chang,
Min-Hui Lin,
Yu-Chen Hu:
A Fast and Secure Image Hiding Scheme Based on LSB Substitution.
IJPRAI 16(4): 399-416 (2002) |
177 | EE | Min-Hui Lin,
Yu-Chen Hu,
Chin-Chen Chang:
Both Color and Gray Scale Secret Images Hiding in a Color Image.
IJPRAI 16(6): 697-714 (2002) |
176 | | Chin-Chen Chang,
Tung-Shou Chen,
Lou-Zo Chung:
A steganographic method based upon JPEG and quantization table modification.
Inf. Sci. 141(1-2): 123-138 (2002) |
175 | | Kuo-Lung Hung,
Chin-Chen Chang:
An improvement of a technique for color quantization using reduction of color space dimensionality.
Informatica (Slovenia) 26(1): (2002) |
174 | | Chin-Chen Chang,
Jun-Chou Chuang,
Tung-Shou Chen:
Recognition of Image Authenticity Using Significant DCT Coefficients Quantization.
Informatica (Slovenia) 26(4): (2002) |
173 | EE | Kuo-Lung Hung,
Chin-Chen Chang:
Error Prevention and Concealment for Chinese Calligraphy Based on Block Truncation Coding.
Int. J. Comput. Proc. Oriental Lang. 15(1): 101-113 (2002) |
172 | EE | Chin-Chen Chang,
Kuo-Feng Hwang,
Min-Shiang Hwang:
A Feature-Oriented Copyright Owner Proving Technique for Still Images.
International Journal of Software Engineering and Knowledge Engineering 12(3): 317- (2002) |
171 | EE | Chin-Chen Chang,
Shu-Kai Yang,
Ding-Zhou Duan,
Ming-Fen Lin:
A Fuzzy-based Approach to Mesh Simplification.
J. Inf. Sci. Eng. 18(3): 459-466 (2002) |
170 | EE | Chin-Chen Chang,
Shu-Kai Yang,
Ding-Zhou Duan,
Ming-Fen Lin:
A Fuzzy-based Approach to Mesh Simplification.
J. Inf. Sci. Eng. 18(3): 459-466 (2002) |
169 | EE | Hsien-Chu Wu,
Chin-Chen Chang:
Detection and restoration of tampered JPEG compressed images.
Journal of Systems and Software 64(2): 151-161 (2002) |
168 | EE | Chwei-Shyong Tsai,
Chin-Chen Chang,
Tung-Shou Chen:
Sharing multiple secrets in digital images.
Journal of Systems and Software 64(2): 163-170 (2002) |
167 | EE | Shu-Kai Yang,
Chin-Chen Chang,
Ding-Zhou Duan,
Ming-Fen Lin:
A novel progressive modelling algorithm for 3D models.
Journal of Visualization and Computer Animation 13(3): 187-198 (2002) |
166 | EE | Kuo-Feng Hwang,
Chin-Chen Chang:
A fast pixel mapping algorithm using principal component analysis.
Pattern Recognition Letters 23(14): 1747-1753 (2002) |
165 | EE | Chin-Chen Chang,
Tai-Xing Yu:
Cryptanalysis of an encryption scheme for binary images.
Pattern Recognition Letters 23(14): 1847-1852 (2002) |
164 | EE | Chin-Chen Chang,
Jun-Chou Chuang:
An image intellectual property protection scheme for gray-level images using visual secret sharing strategy.
Pattern Recognition Letters 23(8): 931-94 (2002) |
163 | EE | Piyu Tsai,
Chin-Chen Chang,
Yu-Chen Hu:
An Adaptive Two-Stage Edge Detection Scheme for Digital Color Images.
Real-Time Imaging 8(4): 329-343 (2002) |
2001 |
162 | | Yung-Kuan Chan,
Chin-Chen Chang:
Concealing a Secret Image Using the Breadth First Traversal Linear Quadtree Structure.
CODAS 2001: 213- |
161 | EE | Chin-Chen Chang,
Hsien-Chu Hsia,
Tung-Shou Chen:
A Progressive Image Transmission Scheme Based on Block Truncation Coding.
Human.Society@Internet 2001: 383-397 |
160 | EE | Chin-Chen Chang,
Iuon-Chang Lin:
Cryptanalysis of the Improved User Efficient Blind Signatures.
ICICS 2001: 42-46 |
159 | EE | Chin-Chen Chang,
Kuo-Feng Hwang:
Towards the Forgery of a Group Signature without Knowing the Group Center's Secret.
ICICS 2001: 47-51 |
158 | EE | Yung-Kuan Chan,
Chin-Chen Chang:
Image Retrieval Based on Tolerable Difference of Direction.
ICOIN 2001: 387-392 |
157 | EE | Chin-Chen Chang,
Shu-Kai Yang,
Jun-Wei Hsieh,
Ding-Zhou Duan,
Ming-Fen Lin:
A Fuzzy Inference System for Simplifying Surfaces with Color.
IEEE Pacific Rim Conference on Multimedia 2001: 1078-1083 |
156 | EE | Chin-Chen Chang,
Jyh-Chiang Yeh,
Ju Yuan Hsiao:
A Novel Scheme for Securing Image Steganography.
IEEE Pacific Rim Conference on Multimedia 2001: 804-811 |
155 | EE | Chin-Chen Chang,
Chi-Shiang Chan,
Ju Yuan Hsiao:
A Color Image Retrieval Method Based on Local Histogram.
IEEE Pacific Rim Conference on Multimedia 2001: 831-836 |
154 | EE | Chwei-Shyong Tsai,
Chin-Chen Chang:
A Generalized Secret Image Sharing and Recovery Scheme.
IEEE Pacific Rim Conference on Multimedia 2001: 963-968 |
153 | | Tzong-Chen Wu,
Chin-Chen Chang:
Cryptographic key assignment scheme for hierarchical access control.
Comput. Syst. Sci. Eng. 16(1): 25-28 (2001) |
152 | EE | Kuo-Lung Hung,
Chin-Chen Chang:
A Novel Progressive Image Transmission Technique for Chinese Calligraphy.
Int. J. Comput. Proc. Oriental Lang. 14(4): 293-307 (2001) |
151 | EE | Chin-Chen Chang,
Guu-In Chen:
Bi-level Lossless Calligraphy Compression Using Location Propagation and Width Inheritance.
Int. J. Comput. Proc. Oriental Lang. 14(4): 309-339 (2001) |
150 | EE | Chin-Chen Chang,
Lin-Li Chen,
Tung-Shou Chen:
A New Two-Path Search Algorithm for Block Motion Estimation of Video Data.
J. Inf. Sci. Eng. 17(3): 405-415 (2001) |
149 | EE | Chin-Chen Chang,
Min-Shiang Hwang,
Tung-Shou Chen:
A new encryption algorithm for image cryptosystems.
Journal of Systems and Software 58(2): 83-91 (2001) |
148 | | Yung-Kuan Chan,
Chin-Chen Chang:
Image matching using run-length feature.
Pattern Recognition Letters 22(5): 447-455 (2001) |
2000 |
147 | EE | Iuon-Chang Lin,
Chin-Chen Chang,
Min-Shiang Hwang:
Security Enhancement for the "Simple Authentication Key Agreement Algorithm".
COMPSAC 2000: 113-115 |
146 | EE | Chin-Chen Chang,
Kuo-Feng Hwang,
Yi Lin:
A Proof of Copyright Ownership Using Moment-Preserving.
COMPSAC 2000: 198-203 |
145 | EE | Chin-Chen Chang,
Chao-Wen Chan:
Detecting Dealer Cheating in Secret Sharing Systems.
COMPSAC 2000: 449-453 |
144 | EE | Chin-Chen Chang,
Chwei-Shyong Tsai,
Tung-Shou Chen:
A New Scheme for Sharing Secret Color Images in Computer Network.
ICPADS 2000: 21-27 |
143 | EE | Chin-Chen Chang,
Tung-Shou Chen,
Yi Lin:
An efficient accessing technique of Chinese characters using Boshiamy Chinese input system.
IRAL 2000: 61-67 |
142 | EE | Chin-Chen Chang,
Tung-Shou Chen:
An Improved Prediction Method for Quadtree Image Coding.
ISMSE 2000: 269-275 |
141 | | Chin-Chen Chang,
Jyh-Chiang Yeh,
Ju Yuan Hsiao:
A Method for Protecting Digital Images from Being Copied Illegally.
Kyoto International Conference on Digital Libraries 2000: 348-355 |
140 | | Chin-Chen Chang:
A Perspective on the Development of Digital Libraries in Taiwan.
Kyoto International Conference on Digital Libraries 2000: 44-46 |
139 | EE | Ji-Han Jiang,
Chin-Chen Chang,
Tung-Shou Chen:
A Compact Sparse Matrix Representation Using Random Hash Functions.
Data Knowl. Eng. 32(1): 29-49 (2000) |
138 | | Chin-Chen Chang,
Jer-Sheng Chou,
Tung-Shou Chen:
An efficient computation of Euclidean distances using approximated look-up table.
IEEE Trans. Circuits Syst. Video Techn. 10(4): 594-599 (2000) |
137 | | Chin-Chen Chang,
Pei-Fang Chung:
A Technique of Watermarking for Digital Images Using (t, n)-Threshold Scheme.
Informatica (Slovenia) 24(1): (2000) |
136 | | Chin-Chen Chang,
Chwei-Shyong Tsai:
A Technique for Computing Watermarks from Digital Images.
Informatica (Slovenia) 24(3): (2000) |
135 | | Chin-Chen Chang,
Kuo-Feng Hwang,
Min-Shiang Hwang:
A Digital Watermarking Scheme Using Human Visual Effects.
Informatica (Slovenia) 24(4): (2000) |
134 | EE | Chin-Feng Lee,
Chin-Chen Chang:
Breadth-first search oriented symbolic picture representation for spatial match retrieval.
Journal of Systems and Software 52(1): 11-23 (2000) |
1999 |
133 | EE | Chin-Chen Chang,
Fun-Chou Shiue,
Tung-Shou Chen:
Tree Structured Vector Quantization with Dynamic Path Search.
ICPP Workshops 1999: 536-541 |
132 | EE | Chin-Chen Chang,
Pai-Cheng Huang,
Wei-Bin Lee:
Conference key distribution schemes for portable communication systems.
Computer Communications 22(12): 1160-1164 (1999) |
131 | EE | Chien-Yuan Chen,
Chin-Chen Chang:
A fast modular multiplication algorithm for calculating the product AB modulo N.
Inf. Process. Lett. 72(3-4): 77-81 (1999) |
130 | EE | Wei-Bin Lee,
Chin-Chen Chang:
(t, n) Threshold Digital Signature With Traceability Property.
J. Inf. Sci. Eng. 15(5): 669-678 (1999) |
129 | EE | Ren-Junn Hwang,
Chin-Chen Chang:
An Improved Threshold Scheme Based on Modular ARithmetic.
J. Inf. Sci. Eng. 15(5): 691-699 (1999) |
128 | EE | Ren-Junn Hwang,
Wei-Bin Lee,
Chin-Chen Chang:
A concept of designing cheater identification methods for secret sharing.
Journal of Systems and Software 46(1): 7-11 (1999) |
127 | EE | Chin-Chen Chang,
Tian-Fu Lee,
Jyh-Jong Leu:
Partition search filter and its performance analysis.
Journal of Systems and Software 47(1): 35-43 (1999) |
1998 |
126 | | Yung-Kuan Chan,
Chin-Chen Chang:
An Efficient Data Structure for Storing Similar Binary Images.
FODO 1998: 268-275 |
125 | EE | Chin-Chen Chang,
Jyh-Jong Leu,
Pai-Cheng Huang,
Wei-Bin Lee:
A Scheme for Obtaining a Message from the Digital Multisignature.
Public Key Cryptography 1998: 154-163 |
124 | EE | Ren-Junn Hwang,
Chin-Chen Chang:
An on-line secret sharing scheme for multi-secrets.
Computer Communications 21(13): 1170-1176 (1998) |
123 | EE | Wei-Bin Lee,
Chin-Chen Chang:
Authenticity of public keys in asymmetric cryptosystems.
Computer Communications 21(2): 195-198 (1998) |
122 | EE | Wei-Bin Lee,
Chin-Chen Chang:
Using RSA with low exponent in a public network.
Computer Communications 21(3): 284-286 (1998) |
121 | EE | Ching-Te Wang,
Chu-Hsing Lin,
Chin-Chen Chang:
Threshold signature schemes with traceable signers in group communications.
Computer Communications 21(8): 771-776 (1998) |
120 | EE | Chin-Chen Chang,
Zen-Chung Shih:
An accuracy enhancement algorithm for hierarchical radiosity.
Computers & Graphics 22(2-3): 225-232 (1998) |
119 | EE | Chin-Chen Chang,
Chin-Feng Lee:
A Bin-Tree Oriented Iconic Indexing Scheme for Retrieving Symbolic Pictures.
Data Knowl. Eng. 26(2): 121-133 (1998) |
118 | EE | Tung-Shou Chen,
Chin-Chen Chang,
Min-Shiang Hwang:
A virtual image cryptosystem based upon vector quantization.
IEEE Transactions on Image Processing 7(10): 1485-1488 (1998) |
117 | | Chin-Chen Chang,
Ren-Junn Hwang:
Sharing Secret Omages using Shadow Codebooks.
Inf. Sci. 111(1-4): 335-345 (1998) |
116 | EE | Der-Chyuan Lou,
Chin-Chen Chang:
An adaptive exponentiation method.
Journal of Systems and Software 42(1): 59-69 (1998) |
115 | EE | Chin-Chen Chang,
Chin-Feng Lee:
A spatial match retrieval mechanism for symbolic pictures.
Journal of Systems and Software 44(1): 73-83 (1998) |
114 | | Chin-Chen Chang,
Zen-Chung Shih:
Tighter error bounds and weighted error metrics for hierarchical radiosity.
Journal of Visualization and Computer Animation 9(2): 53-63 (1998) |
1997 |
113 | EE | Wei-Bin Lee,
Chin-Chen Chang:
Three ID-based information security functions.
Computer Communications 20(14): 1301-1307 (1997) |
112 | EE | Chiuyuan Chen,
Chin-Chen Chang,
Gerard J. Chang:
Proper interval graphs and the guard problem.
Discrete Mathematics 170(1-3): 223-230 (1997) |
111 | EE | C. Y. Chen,
H. F. Lin,
Chin-Chen Chang,
Richard C. T. Lee:
Optimal Bucket Allocation Design of k-ary MKH Files for Partial Match Retrieval.
IEEE Trans. Knowl. Data Eng. 9(1): 148-160 (1997) |
110 | EE | Tung-Shou Chen,
Chin-Chen Chang:
A new image coding algorithm using variable-rate side-match finite-state vector quantization.
IEEE Transactions on Image Processing 6(8): 1185-1187 (1997) |
109 | EE | Chin-Chen Chang,
Shin-Jia Hwang:
A Simple Approach for Generating RSA Keys.
Inf. Process. Lett. 63(1): 19-21 (1997) |
108 | EE | Wei-Bin Lee,
Chin-Chen Chang:
Authenticated Encryption Schemes with Linkage Between Message Blocks.
Inf. Process. Lett. 63(5): 247-250 (1997) |
107 | | Chin-Chen Chang,
Der-Chyuan Lou,
Tzong-Chen Wu:
A Binary Access Control Method Using Prime Factorization.
Inf. Sci. 96(1&2): 15-26 (1997) |
106 | EE | Der-Chyuan Lou,
Chin-Chen Chang:
A Cost Optimal Search Technique for the Knapsack Problem.
International Journal of High Speed Computing 9(1): 1-12 (1997) |
105 | EE | C. Y. Chen,
H. F. Lin,
Chin-Chen Chang,
Richard C. T. Lee:
Multidisk Smaller Sized MKH file Allocation for Partial Match Retrieval.
J. Inf. Sci. Eng. 13(1): 125-141 (1997) |
104 | EE | Chin-Chen Chang,
Wen-Bin Wu:
A secure voting system on a public network.
Networks 29(2): 81-87 (1997) |
103 | | Der-Chyuan Lou,
Chin-Chen Chang:
A Parallel Two-List Algorithm for the Knapsack Problem.
Parallel Computing 22(14): 1985-1996 (1997) |
1996 |
102 | | Chu-Hsing Lin,
Ching-Te Wang,
Chin-Chen Chang:
A group-oriented (t, n) undeniable signature scheme without trusted center.
ACISP 1996: 266-274 |
101 | | Shin-Jia Hwang,
Chin-Chen Chang:
A dynamic secret sharing scheme with cheater detection.
ACISP 1996: 48-55 |
100 | | C. Y. Chen,
Chin-Chen Chang,
Richard C. T. Lee,
D. C. Lin:
A Temporal Join Mechanism Based on Trie-Ranking Data Structure.
CODAS 1996: 428-435 |
99 | | Chin-Feng Lee,
Chin-Chen Chang:
Optimal Bit Lengths of Direction Signatures for Spatial Match Accessing Using Basic Linear Hashing Scheme.
CODAS 1996: 526-529 |
98 | EE | C. Y. Chen,
Chin-Chen Chang,
Richard C. T. Lee,
D. C. Lin:
Optimal Linear Hashing Files for Orthogonal Range Retrieval.
COMPSAC 1996: 406-413 |
97 | | Chin-Chen Chang,
Ji-Han Jiang:
A Spatial Filter for Similarity Retrieval.
IJPRAI 10(6): 711-730 (1996) |
96 | EE | Wei-Bin Lee,
Chin-Chen Chang:
Integrating Authentication in Public Key Distribution System.
Inf. Process. Lett. 57(1): 49-52 (1996) |
95 | EE | Shin-Jia Hwang,
Chin-Chen Chang,
Wei-Pang Yang:
Autenticated Encryption Schemes with Message Linkage.
Inf. Process. Lett. 58(4): 189-195 (1996) |
94 | | Annie Y. H. Chou,
Wei-Pang Yang,
Chin-Chen Chang:
Some Properties of Optimal Cartesian Product Files for Orthogonal Range Queries.
Inf. Sci. 90(1-4): 91-107 (1996) |
93 | EE | Chien-Yuan Chen,
Chin-Chen Chang,
Wei-Pang Yang:
Cryptanalysis of the Secret Exponent of the RSA Scheme.
J. Inf. Sci. Eng. 12(2): 277-290 (1996) |
92 | EE | Wei-Bin Lee,
Chin-Chen Chang:
On Key Changeable ID-Based Digital Signature Scheme.
J. Inf. Sci. Eng. 12(3): 381-386 (1996) |
91 | EE | Chin-Chen Chang,
Ruey-Feng Chang,
Wen-Tsai Lee,
Ching-Lin Kuo:
A Fast Search Algorithm for Vector Quantization.
J. Inf. Sci. Eng. 12(4): 593-602 (1996) |
90 | | Chin-Chen Chang,
Daniel J. Buehrer:
An Improvement to Ziegler's Sparse Matrix Compression Algorithm.
Journal of Systems and Software 35(1): 67-71 (1996) |
89 | EE | Chin-Chen Chang,
D. C. Lin:
A spatial data representation: an adaptive 2D-H string.
Pattern Recognition Letters 17(2): 175-185 (1996) |
1995 |
88 | | Chiuyuan Chen,
Chin-Chen Chang:
Connected Proper Interval Graphs and the Guard Problem in Spiral Polygons.
Combinatorics and Computer Science 1995: 39-47 |
87 | | Shin-Jia Hwang,
Chin-Chen Chang,
Wei-Pang Yang:
Some Active Attacks on Fast Server-Aided Secret Computation Protocols for Modular Exponentiation.
Cryptography: Policy and Algorithms 1995: 215-227 |
86 | | Chin-Chen Chang,
Tzong-Chen Wu,
Chi-Sung Laih:
Cryptanalysis of a Password Authentication Scheme Using Quadratic Residues.
Computer Communications 18(1): 45-47 (1995) |
85 | EE | Chin-Chen Chang,
Sun-Min Tsu,
Chien-Yuan Chen:
Remote scheme for password authentication based on theory of quadratic residues.
Computer Communications 18(12): 936-942 (1995) |
84 | EE | Hui-Min Tsai,
Chin-Chen Chang:
A cryptographic implementation for dynamic access control in a user hierarchy.
Computers & Security 14(2): 159-166 (1995) |
83 | | Chu-Hsing Lin,
Chin-Chen Chang,
Richard C. T. Lee:
New Public-Key Cipher System Based Upon the Diophantine Equations.
IEEE Trans. Computers 44(1): 13-19 (1995) |
82 | | Chin-Chen Chang,
J. Liang:
Dynamic Pictorial Databases Design for Similarity Retrieval.
Inf. Sci. 87(1-3): 29-46 (1995) |
81 | EE | Yuh-Jiun Chen,
Chin-Chen Chang,
Wei-Pang Yang:
Shortest Weighted Length Addition Chains.
J. Inf. Sci. Eng. 11(2): 295-305 (1995) |
80 | EE | Chin-Chen Chang,
Woan-Jing Horng,
Daniel J. Buehrer:
A Cascade Exponentiation Evaluation Scheme Based on the Lempel-Ziv-Welch Compression Algorithm.
J. Inf. Sci. Eng. 11(3): 417-431 (1995) |
79 | EE | Annie Y. H. Chou,
Wei-Pang Yang,
Chin-Chen Chang:
Optimal Two-Attribute Cartesian Product Files for Orthogonal Range Queries.
J. Inf. Sci. Eng. 11(4): 625-647 (1995) |
78 | EE | Yuh-Jiun Chen,
Chin-Chen Chang,
Wei-Pang Yang:
Parallel Computation of the Modular Cascade Exponentiation.
Parallel Algorithms Appl. 7(1-2): 29-42 (1995) |
77 | EE | Chin-Chen Chang,
Chin-Feng Lee:
Relative coordinates oriented symbolic string for spatial relationship retrieval.
Pattern Recognition 28(4): 563-570 (1995) |
76 | EE | C. Y. Chen,
Chin-Chen Chang,
Richard Chia-Tung Lee:
A near pattern-matching scheme based upon principal component analysis.
Pattern Recognition Letters 16(4): 339-345 (1995) |
75 | EE | Chin-Chen Chang,
Tzong-Chen Wu:
An exact match retrieval scheme based upon principal component analysis.
Pattern Recognition Letters 16(5): 465-470 (1995) |
1994 |
74 | EE | Chu-Hsing Lin,
Chin-Chen Chang:
Method for constructing a group-oriented cipher system.
Computer Communications 17(11): 805-808 (1994) |
73 | EE | Ming-Yung Ko,
Tzonelih Hwang,
Chin-Chen Chang:
Attacks on an ID-based signature scheme based on Rabin's public key cryptosystem.
Computer Communications 17(9): 674-676 (1994) |
72 | EE | Chin-Chen Chang,
J. K. Jan,
Daniel J. Buehrer:
A scheme to determine the relationship between two users in a hierarchy.
Computers & Security 13(3): 255-261 (1994) |
71 | EE | Chi-Sung Laih,
Wen-Hong Chiou,
Chin-Chen Chang:
Authentication and protection of public keys.
Computers & Security 13(7): 581-585 (1994) |
70 | EE | Chin-Chen Chang,
Jao-Ji Shen,
Tzong-Chen Wu:
Access control with binary keys.
Computers & Security 13(8): 681-686 (1994) |
69 | | Chin-Chen Chang,
Yaw-Wen Chen,
Daniel J. Buehrer:
A Two-Dimensional Shape Recognition Scheme Based on Principal Component Analysis.
IJPRAI 8(4): 859-875 (1994) |
68 | | Tzong-Chen Wu,
Chin-Chen Chang:
Controlling Access in Tree Hierarchies.
Inf. Sci. 78(1-2): 69-76 (1994) |
67 | | J. Liang,
Chin-Chen Chang,
Ron McFadyen,
Richard C. T. Lee:
Optimal Multiple Key Hashing Files for Orthogonal Range Queries.
Inf. Sci. 79(1-2): 145-158 (1994) |
66 | EE | Chin-Chen Chang,
Feng-Yi Liou:
A Digital Multisignature Scheme Based upon the Digital Signature Scheme of a Modified ElGamal Public Key Cryptosystem.
J. Inf. Sci. Eng. 11(3): 423-432 (1994) |
65 | EE | Chin-Chen Chang,
Shin-Jia Hwang,
Daniel J. Buehrer:
New concepts for multiple stack systems: Born and reborn.
Journal of Systems and Software 27(1): 45-54 (1994) |
64 | EE | Tzong-Chen Wu,
Chin-Chen Chang:
Application of geometric hashing to iconic database retrieval.
Pattern Recognition Letters 15(9): 871-876 (1994) |
1993 |
63 | EE | J. Liang,
Chin-Chen Chang:
Similarity Retrieval on Pictorial Databases Based upon Module Operation.
DASFAA 1993: 19-26 |
62 | EE | Daniel J. Buehrer,
Chin-Chen Chang:
Application of a Reciprocal Confluence Tree Unit to Similar-Picture Retrieval.
SSD 1993: 437-442 |
61 | | J. K. Jan,
Chin-Chen Chang:
A Key-Lock-Pair Oriented Access Control Scheme for the Growth of Users and Files.
BIT 33(3): 382-389 (1993) |
60 | | Chin-Chen Chang,
Huey-Cheue Kowng,
Tzong-Chen Wu:
A Refinement of a Compression-Oriented Addressing Scheme.
BIT 33(4): 530-535 (1993) |
59 | | Chin-Chen Chang,
Horng-Chin Lee:
A New Generalized Group-Oriented Cryptoscheme Without Trusted Centers.
IEEE Journal on Selected Areas in Communications 11(5): 725-729 (1993) |
58 | | Chin-Chen Chang,
Tzong-Chen Wu:
Controlling the Access Requests in an Information Protection System.
Inf. Process. Manage. 29(1): 61-68 (1993) |
57 | | C. Y. Chen,
Chin-Chen Chang,
Richard C. T. Lee:
Optimal MMI file systems for orthogonal range retrieval.
Inf. Syst. 18(1): 37-54 (1993) |
56 | | Tzong-Chen Wu,
Yi-Shiung Yeh,
Chin-Chen Chang:
Algebraic operations on encryped relational databases.
Inf. Syst. 18(1): 55-62 (1993) |
55 | EE | C. Y. Chen,
Chin-Chen Chang:
An object-oriented similarity retrieval algorithm for iconic image databases.
Pattern Recognition Letters 14(6): 465-470 (1993) |
54 | EE | Chin-Chen Chang,
Tzong-Chen Wu:
A hashing-oriented nearest neighbor searching scheme.
Pattern Recognition Letters 14(8): 625-630 (1993) |
1992 |
53 | | Chin-Chen Chang,
Tzong-Chen Wu,
C. P. Chen:
The Design of a Conference Key Distribution System.
AUSCRYPT 1992: 459-466 |
52 | | Chin-Chen Chang,
Daniel J. Buehrer:
De-Clustering Image Databases.
Future Databases 1992: 142-145 |
51 | | Chin-Chen Chang,
Horng-Chin Lee:
A Solution to Generalized Group Oriented Cryptography.
SEC 1992: 265-275 |
50 | | Chin-Chen Chang,
H. Y. Chen,
C. Y. Chen:
Symbolic Gray Code As A Data Allocation Scheme For Two-Disc Systems.
Comput. J. 35(3): 299-305 (1992) |
49 | | Chin-Chen Chang,
H. F. Lin,
C. Y. Chen:
Optimality Properties of the Disc Modulo Allocation Method for k-ary Multiple Key Hashing Files.
Comput. J. 35(4): 390-394 (1992) |
48 | | Chu-Hsing Lin,
Chin-Chen Chang,
Richard C. T. Lee:
A Record-Oriented Cryptosystem for Database Sharing (Short Note).
Comput. J. 35(6): 658-660 (1992) |
47 | | Chin-Chen Chang,
Tzong-Chen Wu:
Retrieving the Most Similar Symbolic Pictures from Pictorial Databases.
Inf. Process. Manage. 28(5): 581-588 (1992) |
46 | EE | Chin-Chen Chang,
Chu-Hsing Lin,
Richard C. T. Lee:
Hierarchy representations based on arithmetic coding for dynamic information protection systems.
Inf. Sci. 64(1-2): 35-48 (1992) |
45 | | Chin-Chen Chang,
Ren-Junn Hwang,
Tzong-Chen Wu:
Crypographic key assignment scheme for access control in a hierarchy.
Inf. Syst. 17(3): 243-247 (1992) |
44 | | Chu-Hsing Lin,
Chin-Chen Chang,
Richard C. T. Lee:
A conference key broadcasting system using sealed locks.
Inf. Syst. 17(4): 323-328 (1992) |
43 | | C. Y. Chen,
Chin-Chen Chang:
On GDM allocation for partial range queries.
Inf. Syst. 17(5): 381-394 (1992) |
42 | EE | Jen Nan Chen,
Chin-Chen Chang:
A Chinese Character Retrieval Scheme Using Shuang Pinyin.
J. Inf. Sci. Eng. 8(3): 487-507 (1992) |
1991 |
41 | | Chin-Chen Chang,
C. Y. Chen,
J. K. Jan:
On the Design of a Machine-Independent Perfect Hashing Scheme.
Comput. J. 34(5): 469-474 (1991) |
40 | EE | J. K. Jan,
Chin-Chen Chang,
S. J. Wang:
A dynamic key-lock-pair access control scheme.
Computers & Security 10(2): 129-139 (1991) |
39 | EE | Chin-Chen Chang,
C. Y. Chen:
A note on allocating k-ary multiple key hashing files among multiple disks.
Inf. Sci. 55(1-3): 69-76 (1991) |
38 | | Chu-Hsing Lin,
Chin-Chen Chang,
Tzong-Chen Wu,
Richard C. T. Lee:
Password authentication using Newton's interpolating polynomials.
Inf. Syst. 16(1): 97-102 (1991) |
37 | | C. Y. Chen,
Chin-Chen Chang,
Richard C. T. Lee:
On the design of multiple key hashing files for concurrent orthogonal range retrieval between two disks.
Inf. Syst. 16(6): 613-625 (1991) |
36 | EE | Chin-Chen Chang:
A Composite Perfect Hashing Scheme for Large Letter-Oriented Key Sets.
J. Inf. Sci. Eng. 7(2): 173-186 (1991) |
35 | EE | Chin-Chen Chang:
Spatial Match Retrieval of Symbolic Pictures.
J. Inf. Sci. Eng. 7(3): 405-422 (1991) |
34 | EE | Chin-Chen Chang,
S. M. Hwang,
Daniel J. Buehrer:
A shape recognition scheme based on relative distances of feature points from the centroid.
Pattern Recognition 24(11): 1053-1063 (1991) |
33 | EE | Chin-Chen Chang,
Suh-Yin Lee:
Retrieval of similar pictures on pictorial databases.
Pattern Recognition 24(7): 675-680 (1991) |
32 | | Chin-Chen Chang,
Tzong-Chen Wu:
A Letter-oriented Perfect Hashing Scheme Based upon Sparse Table Compression.
Softw., Pract. Exper. 21(1): 35-49 (1991) |
1990 |
31 | | Chin-Chen Chang,
Chu-Hsing Lin:
A Reciprocal Confluence Tree Unit and Its Applications.
BIT 30(1): 27-33 (1990) |
30 | EE | Chu-Hsing Lin,
Richard C. T. Lee,
Chin-Chen Chang:
A Dynamic Access Control Mechanism in Information Protection Systems.
J. Inf. Sci. Eng. 6(1): 25-35 (1990) |
29 | EE | Chin-Chen Chang,
Ling-Hua Wu:
A New Password Authentication Scheme.
J. Inf. Sci. Eng. 6(2): 139-147 (1990) |
1989 |
28 | EE | Chin-Chen Chang,
D. F. Leu:
Multikey Sorting as a File Organization Scheme When Queries Are Not Equally Likely.
DASFAA 1989: 219-224 |
1988 |
27 | EE | Chin-Chen Chang,
C. Y. Chen:
Orthogonal Range Retrieval Using Bucket Address Hashing.
SSDBM 1988: 133-140 |
26 | | Chin-Chen Chang:
Application of Principal Component Analysis to Multi-Disk Concurrent Accessing.
BIT 28(2): 205-214 (1988) |
25 | | Chin-Chen Chang,
C. Y. Chen:
A Recursive Performance Formula of the Disc Modulo Allocation Method for Binary Cartesian Product Files.
Comput. J. 31(6): 565-566 (1988) |
24 | | Chin-Chen Chang,
C. H. Chang:
An Ordered Minimal Perfect Hashing Scheme with Single Parameter.
Inf. Process. Lett. 27(2): 79-83 (1988) |
1987 |
23 | | Chin-Chen Chang,
C. Y. Chen:
Performance of Two-Disk Partition Data Allocations.
BIT 27(3): 306-314 (1987) |
22 | | Chin-Chen Chang:
An Information Protection Scheme Based Upon Number Theory.
Comput. J. 30(3): 249-253 (1987) |
21 | | Chin-Chen Chang,
C. Y. Chen:
Performance Analysis of the Generalised Disc Modulo Allocation method for Multiple Key Hashing Files on Multi-Disc Systems.
Comput. J. 30(6): 535-540 (1987) |
20 | EE | Chin-Chen Chang,
C. Y. Chen:
Some Properties of Cartesian Product Files for Disk Modulo Allocation Method in a Two-disk System.
J. Inf. Sci. Eng. 3(2): 151-176 (1987) |
19 | EE | Chin-Chen Chang,
C. Y. Chen:
Gray Code as a De-clustering Scheme for Concurrent Disk Retrieval.
J. Inf. Sci. Eng. 3(2): 177-188 (1987) |
1986 |
18 | EE | Chin-Chen Chang,
J. C. Shieh:
On the Design of Ordered Minimal Perfect Hashing Functions.
ICDE 1986: 112-115 |
17 | EE | M. T. Fang,
Richard C. T. Lee,
Chin-Chen Chang:
The Idea of De-Clustering and its Applications.
VLDB 1986: 181-188 |
16 | | Chin-Chen Chang:
On the Design of a Key-Lock-Pair Mechanism in Information Protection Systems.
BIT 26(4): 410-417 (1986) |
15 | | Chin-Chen Chang,
Richard C. T. Lee:
A Letter-Oriented Minimal Perfect Hashing Scheme.
Comput. J. 29(3): 277-281 (1986) |
14 | EE | Chin-Chen Chang:
Letter-oriented reciprocal hashing scheme.
Inf. Sci. 38(3): 243-255 (1986) |
13 | EE | Chin-Chen Chang:
A scheme for constructing ordered minimal perfect hashing functions.
Inf. Sci. 39(2): 187-195 (1986) |
1985 |
12 | | Chin-Chen Chang,
Jaw-Ji Shen:
Consecutive Retrieval Organization as a File Allocation Scheme on Multiple Disk Systems.
FODO 1985: 113-124 |
11 | | Chin-Chen Chang,
L. S. Lian:
On Strict Optimality Property of Allocating Binary Cartesian Product Files on Multiple Disk Systems.
FODO 1985: 159-175 |
10 | | Chin-Chen Chang,
J. C. Shieh:
On the Complexity of File Allocation Problem.
FODO 1985: 177-181 |
9 | | Chin-Chen Chang:
Database Research and Development in Taiwan.
FODO 1985: 603-605 |
8 | | Chin-Chen Chang:
The Study of a Letter Oriented Minimal Perfect Hashing Scheme.
FODO 1985: 91-99 |
7 | | Clement T. Yu,
Chin-Chen Chang,
Marjorie Templeton,
David Brill,
Eric Lund:
Query Processing in a Fragmented Relational Distributed System: Mermaid.
IEEE Trans. Software Eng. 11(8): 795-810 (1985) |
1984 |
6 | | Chin-Chen Chang,
M. W. Du,
Richard C. T. Lee:
Performance Analyses of Cartesian Product Files and Random Files.
IEEE Trans. Software Eng. 10(1): 88-99 (1984) |
5 | EE | Chin-Chen Chang:
An ordered minimal perfect hashing scheme based upon Euler's theorem.
Inf. Sci. 32(3): 165-172 (1984) |
4 | EE | Chin-Chen Chang:
Optimal information retrieval when queries are not random.
Inf. Sci. 34(3): 199-223 (1984) |
1983 |
3 | EE | Chin-Chen Chang,
M. W. Du,
Richard C. T. Lee:
The hierarchical ordering in multiattribute files.
Inf. Sci. 31(1): 41-75 (1983) |
1982 |
2 | | Chin-Chen Chang,
Richard C. T. Lee,
M. W. Du:
Symbolic Gray Code as a Perfect Multiattribute Hashing Scheme for Partial Match Queries.
IEEE Trans. Software Eng. 8(3): 235-249 (1982) |
1980 |
1 | EE | Chin-Chen Chang,
Richard C. T. Lee,
David Hung-Chang Du:
Some Properties of Cartesian Product Files.
SIGMOD Conference 1980: 157-168 |