2009 | ||
---|---|---|
489 | EE | Chin-Feng Lee, Kuo-Hui Wang, Chin-Chen Chang, Yu-Lin Huang: A reversible data hiding scheme based on dual steganographic images. ICUIMC 2009: 228-237 |
488 | EE | Chin-Chen Chang, Shih-Chang Chang: The design of e-traveler's check with efficiency and mutual authentication. ICUIMC 2009: 309-316 |
487 | EE | Kuo-Nan Chen, Chin-Feng Lee, Chin-Chen Chang: Embedding secret messages based on chaotic map and Huffman coding. ICUIMC 2009: 336-341 |
486 | EE | Chin-Chen Chang, Chia-Yin Lee, Yen-Chang Chiu: Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications 32(4): 611-618 (2009) |
485 | EE | Chung-Chuan Wang, Chin-Chen Chang, Jinn-ke Jan: NovelWatermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel Patterns. Fundam. Inform. 90(1-2): 125-155 (2009) |
484 | EE | Chin-Chen Chang, Yung-Chen Chou: A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes. Fundam. Inform. 90(1-2): 17-26 (2009) |
483 | EE | Chin-Chen Chang, Yi-Fang Cheng, Iuon-Chang Lin: A novel key management scheme for dynamic multicast communications. Int. J. Communication Systems 22(1): 53-66 (2009) |
482 | EE | Chin-Chen Chang, Jung-San Lee: Robust t-out-of-n oblivious transfer mechanism based on CRT. J. Network and Computer Applications 32(1): 226-235 (2009) |
481 | EE | Fei Yu, Chin-Chen Chang, Ben M. Chen, Jian Shu, Guangxue Yue: Editorial. JCP 4(1): 1-2 (2009) |
480 | EE | Fei Yu, Chin-Chen Chang, Ben M. Chen, Jun Zhang, Guangxue Yue: Editorial. JSW 4(1): 1-2 (2009) |
479 | EE | Chin-Chen Chang, Yi-Hui Chen, Chia-Chen Lin: A data embedding scheme for color images based on genetic algorithm and absolute moment block truncation coding. Soft Comput. 13(4): 321-331 (2009) |
2008 | ||
478 | EE | Chin-Chen Chang, The Duc Kieu, Yung-Chen Chou: Using nearest covering codes to embed secret information in grayscale images. ICUIMC 2008: 315-320 |
477 | EE | Chin-Chen Chang, Jung-San Lee, Ting-Fang Cheng: Security design for three-party encrypted key exchange protocol using smart cards. ICUIMC 2008: 329-333 |
476 | EE | Chin-Feng Lee, Yi-Ren Wang, Chin-Chen Chang: An adaptive EMD embedding method by condensing secret messages based on consecutive ones transformation and token substitution. ICUIMC 2008: 390-395 |
475 | EE | Chin-Chen Chang, The Duc Kieu, Yung-Chen Chou: A High Payload Steganographic Scheme Based on (7, 4) Hamming Code for Digital Images. ISECS 2008: 16-21 |
474 | EE | Chin-Chen Chang, Chia-Chen Lin, T. Hoang Ngan Le, Hoai Bac Le: A Probabilistic Visual Secret Sharing Scheme for Grayscale Images with Voting Strategy. ISECS 2008: 184-188 |
473 | EE | Yu-Chiang Li, Jieh-Shan Yeh, Chin-Chen Chang: Isolated items discarding strategy for discovering high utility itemsets. Data Knowl. Eng. 64(1): 198-217 (2008) |
472 | EE | Chin-Chen Chang, Chih-Yang Lin, Yi-Pei Hsieh: Three-Phase Lossless Data Hiding Method for the VQ Index Table. Fundam. Inform. 82(1-2): 1-13 (2008) |
471 | EE | Hui-Feng Huang, Chin-Chen Chang: A Novel Cryptographic Key Assignment Scheme with ID-Based Access Control in a Hierachy. Fundam. Inform. 84(3-4): 353-361 (2008) |
470 | EE | Chin-Chen Chang, Yung-Chen Chou, The Duc Kieu: High Capacity Data Hiding for Grayscale Images. Fundam. Inform. 86(4): 435-446 (2008) |
469 | EE | Chin-Chen Chang, Chia-Chen Lin, Yi-Hui Chen: Adaptive Data Embedding Scheme Based on Similar and Dissimilar Clustering Strategies. Fundam. Inform. 88(1-2): 23-45 (2008) |
468 | EE | Yung-Chen Chou, Chin-Chen Chang, Kuan-Ming Li: A Large Payload Data Embedding Technique for Color Images. Fundam. Inform. 88(1-2): 47-61 (2008) |
467 | EE | Chin-Chen Chang, Pei-Yu Lin: A Color Image Authentication Method Using Partitioned Palette and Morphological Operations. IEICE Transactions 91-D(1): 54-61 (2008) |
466 | EE | Chih-Yang Lin, Chin-Chen Chang, Yu-Zheng Wang: Reversible Steganographic Method with High Payload for JPEG Images. IEICE Transactions 91-D(3): 836-845 (2008) |
465 | EE | Chang-Chu Chen, Chin-Chen Chang: LSB-Based Steganography Using Reflected Gray Code. IEICE Transactions 91-D(4): 1110-1116 (2008) |
464 | EE | Chin-Feng Lee, Chin-Chen Chang, Kuo-Hua Wang: An improvement of EMD embedding method for large payloads by pixel segmentation strategy. Image Vision Comput. 26(12): 1670-1676 (2008) |
463 | EE | Tzu-Chuen Lu, Chin-Chen Chang: Lossless nibbled data embedding scheme based on difference expansion. Image Vision Comput. 26(5): 632-638 (2008) |
462 | EE | Hsien-Wen Tseng, Chin-Chen Chang: An extended difference expansion algorithm for reversible watermarking. Image Vision Comput. 26(8): 1148-1153 (2008) |
461 | EE | Chin-Chen Chang, Chia-Chen Lin, Chia-Hsuan Lin, Yi-Hui Chen: A novel secret image sharing scheme in color images using small shadow images. Inf. Sci. 178(11): 2433-2447 (2008) |
460 | EE | Chin-Chen Chang, Wen-Chuan Wu, Yi-Hui Chen: Joint coding and embedding techniques for multimedia images. Inf. Sci. 178(18): 3543-3556 (2008) |
459 | EE | Chin-Chen Chang, Yen-Ting Kuo, Wen-Kai Tai: Genetic-Based Approach for Synthesizing Texture. International Journal on Artificial Intelligence Tools 17(4): 731-743 (2008) |
458 | EE | Chia-Chi Wu, Chin-Chen Chang, Iuon-Chang Lin: New Sealed-Bid Electronic Auction with Fairness, Security and Efficiency. J. Comput. Sci. Technol. 23(2): 253-264 (2008) |
457 | EE | Fei Yu, Chin-Chen Chang, Ben M. Chen, Wen Chen, Yongjun Chen: Editorial. JCM 3(6): 1-2 (2008) |
456 | EE | Wen Chen, Fei Yu, Chin-Chen Chang, Jiexian Zeng, Guangxue Yue: Editorial. JCM 3(7): 1-2 (2008) |
455 | EE | Fei Yu, Chin-Chen Chang, Ben M. Chen, Zhigang Chen, Jun Ni: Editorial. JCP 3(12): 1-2 (2008) |
454 | EE | Fei Yu, Chin-Chen Chang, Ben M. Chen, Yongjun Chen, Zhigang Chen: Editorial. JSW 3(9): 1-2 (2008) |
453 | EE | Chin-Chen Chang, Pei-Yu Lin: Adaptive watermark mechanism for rightful ownership protection. Journal of Systems and Software 81(7): 1118-1129 (2008) |
452 | EE | Ming-Ni Wu, Chia-Chen Lin, Chin-Chen Chang: An embedding technique based upon block prediction. Journal of Systems and Software 81(9): 1505-1516 (2008) |
451 | EE | Chin-Chen Chang, Cheng-Yi Liu, Wen-Kai Tai: Feature alignment approach for hand posture recognition based on curvature scale space. Neurocomputing 71(10-12): 1947-1953 (2008) |
450 | EE | Yi-Pei Hsieh, Chin-Chen Chang, Li-Jen Liu: A two-codebook combination and three-phase block matching based image-hiding scheme with high embedding capacity. Pattern Recognition 41(10): 3104-3113 (2008) |
449 | EE | Chin-Chen Chang, Yi-Pei Hsieh, Chia-Hsuan Lin: Sharing secrets in stego images with authentication. Pattern Recognition 41(10): 3130-3137 (2008) |
448 | EE | Chia-Chen Lin, Wei-Liang Tai, Chin-Chen Chang: Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recognition 41(12): 3582-3591 (2008) |
447 | EE | Chin-Chen Chang, Yi-Hsuan Fan, Wei-Liang Tai: Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 41(2): 654-661 (2008) |
446 | EE | Chin-Chen Chang, Chih-Yang Lin, Yi-Hsuan Fan: Lossless data hiding for color images based on block truncation coding. Pattern Recognition 41(7): 2347-2357 (2008) |
445 | EE | Jung-San Lee, Chin-Chen Chang: Preserving data integrity in mobile ad hoc networks with variant Diffie-Hellman protocol. Security and Communication Networks 1(4): 277-286 (2008) |
444 | EE | Yu-Ting Tsai, Chin-Chen Chang, Qing-Zhen Jiang, Shr-Ching Weng: Importance sampling of products from illumination and BRDF using spherical radial basis functions. The Visual Computer 24(7-9): 817-826 (2008) |
2007 | ||
443 | EE | Chia-Chi Wu, Chin-Chen Chang, Shang-Ru Yang: An Efficient Fragile Watermarking for Web Pages Tamper-Proof. APWeb/WAIM Workshops 2007: 654-663 |
442 | EE | Kuo-Lung Hung, Chin-Chen Chang: Recoverable Tamper Proofing Technique for Image Authentication Using Irregular Sampling Coding. ATC 2007: 333-343 |
441 | EE | Chin-Chen Chang, Yih-Shin Hu, Chia-Chen Lin: A Digital Watermarking Scheme Based on Singular Value Decomposition. ESCAPE 2007: 82-93 |
440 | EE | Chao-Wen Chan, Chin-Chen Chang: A New (t, n)-Threshold Scheme Based on Difference Equations. ESCAPE 2007: 94-106 |
439 | EE | Chin-Chen Chang, Pei-Yu Lin: Significance-Preserving Codebook Using Generic Algorithm. FSKD (3) 2007: 660-664 |
438 | EE | Chin-Chen Chang, Yung-Chen Chou, Tzu-Chuen Lu: A Semi-blind Watermarking Based on Discrete Wavelet Transform. ICICS 2007: 164-176 |
437 | EE | Chin-Chen Chang, Wen-Chuan Wu: Reversible Quantization-Index Modulation Using Neighboring Correlation. IWDW 2007: 222-232 |
436 | EE | Chin-Chen Chang, Chih-Yang Lin, Yu-Zheng Wang: A High Payload VQ Steganographic Method for Binary Images. IWDW 2007: 467-481 |
435 | EE | Chin-Chen Chang, Yu-Wei Su, Iuon-Chang Lin: A broadcast-encryption-based key management scheme for dynamic multicast communications work-in-progress. Infoscale 2007: 69 |
434 | EE | Kai-Jie Chang, Chin-Chen Chang: An e-mail signature protocol for anti-spam work-in-progress. Infoscale 2007: 70 |
433 | EE | Chin-Chen Chang, Yi-Fang Cheng, Iuon-Chang Lin: Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control. Inscrypt 2007: 457-462 |
432 | EE | Chin-Chen Chang, Yi-Hui Chen, Yung-Chen Chou: Reversible Data Embedding Technique for Palette Images Using De-clustering. MCAM 2007: 130-139 |
431 | EE | Chung-Chuan Wang, Chin-Chen Chang, Xinpeng Zhang, Jinn-ke Jan: Senary Huffman Compression - A Reversible Data Hiding Scheme for Binary Images. MCAM 2007: 351-360 |
430 | EE | Chin-Chen Chang, Chih-Yang Lin: Density-Based Image Vector Quantization Using a Genetic Algorithm. MMM (1) 2007: 289-298 |
429 | EE | Chi-Shiang Chan, Chin-Chen Chang: A Color Image Hiding Scheme Based on SMVQ and Modulo Operator. MMM (2) 2007: 461-470 |
428 | EE | Chin-Chen Chang, Hao-Chuan Tsai, Yi-Hui Chen: An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards. MUE 2007: 1210-1215 |
427 | EE | Chin-Chen Chang, Chu-Hsing Lin, Chien-Yuan Chen: A Conference Key Distribution Scheme Using Interpolating Polynomials. MUE 2007: 963-967 |
426 | EE | Hui-Feng Huang, Chin-Chen Chang: An Efficient Key-Lock-Pair Mechanism Based on Division Algorithm. MUE 2007: 982-986 |
425 | EE | Jieh-Shan Yeh, Yu-Chiang Li, Chin-Chen Chang: Two-Phase Algorithms for a Novel Utility-Frequent Mining Model. PAKDD Workshops 2007: 433-444 |
424 | EE | Chin-Chen Chang, Chih-Chiang Tsou, Yung-Chen Chou: A Remediable Image Authentication Scheme Based on Feature Extraction and Clustered VQ. PCM 2007: 446-449 |
423 | EE | Chin-Chen Chang, Yu-Zheng Wang, Yu-Chen Hu: Adaptive Data Hiding Scheme for Palette Images. Intelligent Multimedia Data Hiding: New Directions 2007: 103-122 |
422 | EE | Chin-Chen Chang, Tzu-Chuen Lu, Yi-Hsuan Fan: A Bit-Level Visual Secret Sharing Scheme for Multi-Secret Images Using Rotation and Reversion Operatations. Intelligent Multimedia Data Hiding: New Directions 2007: 83-101 |
421 | EE | Yu-Chiang Li, Jieh-Shan Yeh, Chin-Chen Chang: MICF: An effective sanitization algorithm for hiding sensitive patterns on data mining. Advanced Engineering Informatics 21(3): 269-280 (2007) |
420 | EE | Ting-Fang Cheng, Jung-San Lee, Chin-Chen Chang: Security enhancement of an IC-card-based remote login mechanism. Computer Networks 51(9): 2280-2287 (2007) |
419 | EE | Yuan-Hui Yu, Chin-Chen Chang, Iuon-Chang Lin: A new steganographic method for color and grayscale image hiding. Computer Vision and Image Understanding 107(3): 183-194 (2007) |
418 | EE | Ya-Fen Chang, Chin-Chen Chang: Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy. Fundam. Inform. 76(1-2): 13-23 (2007) |
417 | EE | Chin-Chen Chang, Chang-Chu Chen: Full-Searching-Equivalent Vector Quantization Using Two-Bounds Triangle Inequality. Fundam. Inform. 76(1-2): 25-37 (2007) |
416 | EE | Chin-Chen Chang, Tzu-Chuen Lu, Jun-Bin Ya: VQ Codebook Searching Algorithm Based on Correlation Property. Fundam. Inform. 76(1-2): 39-57 (2007) |
415 | EE | Chin-Chen Chang, Chih-Yang Lin, Chun-Sen Tseng: Secret Image Hiding and Sharing Based on the (t, n)-Threshold. Fundam. Inform. 76(4): 399-411 (2007) |
414 | EE | Hsien-Chu Wu, Chin-Chen Chang: An Image Retrieval Method Based on Color-Complexity and Spatial-Histogram Features. Fundam. Inform. 76(4): 481-493 (2007) |
413 | EE | Chin-Chen Chang, Wei-Liang Tai, Chia-Chen Lin: A Novel Image Hiding Scheme Based on VQ and Hamming Distance. Fundam. Inform. 77(3): 217-228 (2007) |
412 | EE | Chin-Chen Chang, Wen-Chuan Wu: Fast Planar-Oriented Ripple Search Algorithm for Hyperspace VQ Codebook. IEEE Transactions on Image Processing 16(6): 1538-1547 (2007) |
411 | EE | Chin-Chen Chang, Yi-Pei Hsieh, Chih-Yang Lin: Lossless Data Embedding With High Embedding Capacity Based on Declustering for VQ-Compressed Codes. IEEE Transactions on Information Forensics and Security 2(3-1): 341-349 (2007) |
410 | EE | Chin-Chen Chang, Wen-Chuan Wu, Chih-Chiang Tsou: Hiding Secret Information Using Adaptive Side-Match VQ. IEICE Transactions 90-D(10): 1678-1686 (2007) |
409 | EE | Chin-Chen Chang, Yung-Chen Chou, Chih-Yang Lin: Reversible Data Hiding in the VQ-Compressed Domain. IEICE Transactions 90-D(9): 1422-1429 (2007) |
408 | EE | Jung-San Lee, Chin-Chen Chang, Pen-Yi Chang, Chin-Chen Chang: Anonymous authentication scheme for wireless communications. IJMC 5(5): 590-601 (2007) |
407 | EE | Jung-San Lee, Chin-Chen Chang, Pen-Yi Chang, Chin-Chen Chang: Anonymous authentication scheme for wireless communications. IJMC 5(5): 590-601 (2007) |
406 | EE | Tzu-Chuen Lu, Chin-Chen Chang: Color image retrieval technique based on color features and image bitmap. Inf. Process. Manage. 43(2): 461-472 (2007) |
405 | EE | Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng, Wei-Liang Tai: Reversible hiding in DCT-based compressed images. Inf. Sci. 177(13): 2768-2786 (2007) |
404 | EE | Iuon-Chang Lin, Chin-Chen Chang: Security enhancement for digital signature schemes with fault tolerance in RSA. Inf. Sci. 177(19): 4031-4039 (2007) |
403 | EE | Chin-Chen Chang, Chih-Yang Lin: Reversible steganographic method using SMVQ approach based on declustering. Inf. Sci. 177(8): 1796-1805 (2007) |
402 | EE | Ya-Fen Chang, Chin-Chen Chang, Pei-Yu Lin: A Concealed t-out-of-n Signer Ambiguous Signature Scheme with Variety of Keys. Informatica, Lith. Acad. Sci. 18(4): 535-546 (2007) |
401 | EE | Chin-Chen Chang, Chih-Yang Lin, Keng-Chu Lin: Simple efficient mutual anonymity protocols for peer-to-peer network based on primitive roots. J. Network and Computer Applications 30(2): 662-676 (2007) |
400 | EE | Jung-San Lee, Chin-Chen Chang: Secure communications for cluster-based ad hoc networks using node identities. J. Network and Computer Applications 30(4): 1377-1396 (2007) |
399 | EE | Chin-Chen Chang, Wen-Chuan Wu, Yu-Chen Hu: Lossless recovery of a VQ index table with embedded secret data. J. Visual Communication and Image Representation 18(3): 207-216 (2007) |
398 | EE | Chin-Chen Chang, Yu-Chiang Li, Wen-Hung Huang: TFRP: An efficient microaggregation algorithm for statistical disclosure control. Journal of Systems and Software 80(11): 1866-1878 (2007) |
397 | EE | Ming-Ni Wu, Chia-Chen Lin, Chin-Chen Chang: Novel image copy detection with rotating tolerance. Journal of Systems and Software 80(7): 1057-1069 (2007) |
396 | EE | Ya-Lun Zeng, Charlie Irawan Tan, Wen-Kai Tai, Mau-Tsuen Yang, Cheng-Chin Chiang, Chin-Chen Chang: A momentum-based deformation system for granular material. Journal of Visualization and Computer Animation 18(4-5): 289-300 (2007) |
395 | EE | Chi-Shiang Chan, Chin-Chen Chang: An efficient image authentication method based on Hamming code. Pattern Recognition 40(2): 681-690 (2007) |
2006 | ||
394 | EE | Ya-Fen Chang, Chin-Chen Chang: Enhanced Anonymous Auction Protocols with Freewheeling Bids. AINA (1) 2006: 353-358 |
393 | EE | Ya-Fen Chang, Chin-Chen Chang, Yu-Wei Su: A secure improvement on the user-friendly remote authentication scheme with no time concurrency mech. AINA (2) 2006: 741-745 |
392 | EE | Iuon-Chang Lin, Chin-Chen Chang: An Efficient Fault-Tolerant Digital Signature Scheme Based on the Discrete Logarithm Problem. ATC 2006: 601-610 |
391 | EE | Chin-Chen Chang, Chi-Shiang Chan, Yi-Hsuan Fan: A Secret Image Sharing Scheme Based on Vector Quantization Mechanism. EUC 2006: 469-478 |
390 | EE | Chao-Wen Chan, Chin-Chen Chang: A New Scheme for the Electronic Coin. ICEBE 2006: 339-343 |
389 | EE | Hui-Feng Huang, Chin-Chen Chang: An Untraceable Electronic Cash System Using Fair Blind Signatures. ICEBE 2006: 39-46 |
388 | EE | Chin-Chen Chang, Kuo-Lung Hung: An Efficient Euclidean Distance Estimation Scheme for Accelerating VQ Encoding. ICICIC (1) 2006: 194-196 |
387 | EE | Chin-Chen Chang, Yung-Chen Chou, Jau-Ji Shen: A Discrete Wavelet Transform Based State-Codebook Search Algorithm for Vector Quantization. ICICIC (1) 2006: 197-200 |
386 | EE | Ming-Ni Wu, Chia-Chen Lin, Chin-Chen Chang: A Fast Wavelet-Based Image Progressive Transmission Method Based on Vector Quantization. ICICIC (2) 2006: 677-680 |
385 | EE | Chin-Chen Chang, Tzu-Chuen Lu: A Wavelet-Based Progressive Digital Image Transmission Scheme. ICICIC (2) 2006: 681-684 |
384 | EE | Chin-Chen Chang, Tung-Shou Chen, Hsien-Chu Hsia: An ImageWatermarking Scheme Using Pattern Coding Technique. ICICIC (3) 2006: 467-470 |
383 | EE | Chin-Chen Chang, Wei-Liang Tai, Chia-Chen Lin: A Multipurpose Wavelet-Based Image Watermarking. ICICIC (3) 2006: 70-73 |
382 | EE | Timothy K. Shih, Chin-Chen Chang, Hsiau Wen Lin: Reusability on Learning Object Repository. ICWL 2006: 203-214 |
381 | EE | Chung-Chuan Wang, Chin-Chen Chang, Jinn-ke Jan, Jieh-Shan Yeh: Novel Steganographic Schemes Based on Row-Major Mapping Relation. IIH-MSP 2006: 392-395 |
380 | EE | Chin-Chen Chang, Yung-Chen Chang, Jau-Ji Shen: A Heuristic Method for Extracting Enhanced Watermarks from Digital Images. IIH-MSP 2006: 453-456 |
379 | EE | Chin-Chen Chang, Yi-Hui Chen, Kuan-Ming Li: Improved SMVQ Scheme with Edge-Directed Prediction. IIH-MSP 2006: 541-544 |
378 | EE | Chin-Chen Chang, Yung-Chen Chang, Jau-Ji Shen: A Novel Image Compression Algorithm Based on Sixteen Most Lately Used Encoded Codewords. IIH-MSP 2006: 545-548 |
377 | EE | Chin-Chen Chang, Yung-Chen Chou: Quantization Index Modulation Using Vector Quantization with DWT Based State-Codebook Search. IIH-MSP 2006: 549-554 |
376 | EE | Chia-Chen Lin, Chin-Chen Chang: An Image Hiding Scheme Based on Du's Disk Allocation Method. IIH-MSP 2006: 617-620 |
375 | EE | Chin-Chen Chang, Jun-Chou Chuang: Progressive Image Transmission Using Significant Features and Linear Regression Prediction. IIH-MSP 2006: 681-684 |
374 | Ya-Fen Chang, Chin-Chen Chang, Wei-Liang Tai: Comments on Distributed Sign-and-Encryption Schemes. IMECS 2006: 178-180 | |
373 | Chin-Chen Chang, Chia-Chi Wu: An Improvement of the Design of Integrating Subliminal Channel with Access Control. IMECS 2006: 276-279 | |
372 | Hui-Feng Huang, Chin-Chen Chang: An Untraceable Forward-Secure Blind Signature Scheme. IMECS 2006: 441-446 | |
371 | Chin-Chen Chang, Wen-Bin Wu, Jieh-Shan Yeh: A Cryptanalysis on a Generalized Threshold Cryptosystem. IMECS 2006: 452-455 | |
370 | Chao-Wen Chan, Chin-Chen Chang: A Scheme for (t, n)-Threshold Secret Image Sharing. IMECS 2006: 619-624 | |
369 | Chin-Chen Chang, Keng-Chu Lin: Yet Another Attack on Mutual Authentication and Key Exchange Protocols for Low Power Wireless Communications. IMECS 2006: 959-962 | |
368 | EE | Tzu-Chuen Lu, Chin-Chen Chang: A Bandwidth Efficiency of the Locally Adaptive Compression Method for Hiding Secret Messages. JCIS 2006 |
367 | EE | Hsien-Chu Wu, Chin-Chen Chang, Ting-Wei Yu: A DCT-based Recoverable Image Authentication. JCIS 2006 |
366 | EE | Ya-Fen Chang, Chin-Chen Chang: Comments on Abe et al.'s Threshold Signer-ambiguous Signature Scheme from Variety of Keys. JCIS 2006 |
365 | EE | Hsien-Chu Wu, Hui-Chuan Lin, Chin-Chen Chang: Reversible Palette Image Steganography Based on De-clustering and Predictive Coding. JCIS 2006 |
364 | EE | Chin-Chen Chang, Wen-Chuan Wu: A novel data hiding scheme for keeping high stego-image quality. MMM 2006 |
363 | EE | Chin-Chen Chang, Kuo-Lun Chen, Chu-Hsing Lin, Jen-Chieh Chang: A Group-Oriented (t, n) Threshold Signature Scheme Against Replay Attacks. UIC 2006: 816-825 |
362 | EE | Jen-Ho Yang, Chin-Chen Chang, Chih-Hung Wang: A Practical Solution to the (t, n) Threshold Untraceable Signature with (k, l) Verification Scheme. UIC 2006: 998-1007 |
361 | EE | Chin-Chen Chang, Chia-Chi Wu: A Novel Key Agreement Scheme in a Multiple Server Environment. WISA 2006: 187-197 |
360 | EE | Chin-Chen Chang, Yeu-Pong Lai: A division algorithm for residue numbers. Applied Mathematics and Computation 172(1): 368-378 (2006) |
359 | EE | Chin-Chen Chang, Yeu-Pong Lai: A parallel residue-to-binary conversion algorithm without trial division. Computers & Electrical Engineering 32(6): 454-467 (2006) |
358 | EE | Chin-Chen Chang, Jung-San Lee: An anonymous voting mechanism based on the key exchange protocol. Computers & Security 25(4): 307-314 (2006) |
357 | EE | Chin-Chen Chang, Jun-Chou Chuang, Yu-Chen Hu: Spatial Domain Image Hiding Scheme Using Pixel-Values Differencing. Fundam. Inform. 70(3): 171-184 (2006) |
356 | EE | Chin-Chen Chang, Chih-Yang Lin, Henry Chou: Perfect Hashing Schemes for Mining Traversal Patterns. Fundam. Inform. 70(3): 185-202 (2006) |
355 | EE | Yu-Chen Hu, Chin-Chen Chang: An Improved Tree-Structured Codebook Search Algorithm for Grayscale Image Compression. Fundam. Inform. 70(3): 251-260 (2006) |
354 | EE | Chin-Chen Chang, Guei-Mei Chen, Yu-Chen Hu: A Novel Index Coding Scheme for Vector Quantization. Fundam. Inform. 71(2-3): 215-227 (2006) |
353 | EE | Ming-Ni Wu, Chia-Chen Lin, Chin-Chen Chang: A Robust Content-Based Copy Detection Scheme. Fundam. Inform. 71(2-3): 351-366 (2006) |
352 | EE | Chia-Chen Lin, Yu-Chen Hu, Chin-Chen Chang: A Novel Image Ownership Protection Scheme Based on Rehashing Concept and Vector Quantization. Fundam. Inform. 71(4): 443-451 (2006) |
351 | Chin-Chen Chang, Chih-Yang Lin: Reversible Data Embedding Based on Prediction Approach for VQ and SMVQ Compressed Images. Fundam. Inform. 74(2-3): 189-207 (2006) | |
350 | EE | Chin-Chen Chang, Wei-Liang Tai, Chia-Chen Lin: A Reversible Data Hiding Scheme Based on Side Match Vector Quantization. IEEE Trans. Circuits Syst. Video Techn. 16(10): 1301-1308 (2006) |
349 | EE | Chin-Chen Chang, Chih-Yang Lin: Reversible Steganography for VQ-Compressed Images Using Side Matching and Relocation. IEEE Transactions on Information Forensics and Security 1(4): 493-501 (2006) |
348 | EE | Ya-Fen Chang, Jung-San Lee, Chin-Chen Chang: A secure and efficient authentication scheme for mobile users. IJMC 4(5): 581-594 (2006) |
347 | EE | Yuan-Hui Yu, Chin-Chen Chang: A new edge detection approach based on image context analysis. Image Vision Comput. 24(10): 1090-1102 (2006) |
346 | EE | Hui-Feng Huang, Chin-Chen Chang: A novel efficient (t, n) threshold proxy signature scheme. Inf. Sci. 176(10): 1338-1349 (2006) |
345 | EE | Chin-Chen Chang, Chih-Yang Lin, Yu-Zheng Wang: New image steganographic methods using run-length approach. Inf. Sci. 176(22): 3393-3408 (2006) |
344 | EE | Chin-Chen Chang, Jiann-Jone Chen, Wen-Kai Tai, Chin-Chuan Han: New Approach for Static Gesture Recognition. J. Inf. Sci. Eng. 22(5): 1047-1057 (2006) |
343 | EE | Chin-Chen Chang, Tzu-Chuen Lu: A difference expansion oriented data hiding scheme for restoring the original host images. Journal of Systems and Software 79(12): 1754-1766 (2006) |
342 | EE | Chin-Chen Chang, Tzu-Chuen Lu: Reversible index-domain information hiding scheme based on side-match vector quantization. Journal of Systems and Software 79(8): 1120-1129 (2006) |
341 | EE | Hsien-Wen Tseng, Chin-Chen Chang: Error resilient locally adaptive data compression. Journal of Systems and Software 79(8): 1156-1160 (2006) |
340 | EE | Chin-Chen Chang: Adaptive multiple sets of CSS features for hand posture recognition. Neurocomputing 69(16-18): 2017-2025 (2006) |
339 | EE | Chin-Chen Chang, Chia-Te Liao: An image coding scheme using SMVQ and support vector machines. Neurocomputing 69(16-18): 2327-2335 (2006) |
338 | EE | Chin-Chen Chang, Chi-Shiang Chan, Yi-Hsuan Fan: Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels. Pattern Recognition 39(6): 1155-1167 (2006) |
337 | EE | Chin-Chen Chang, Yu-Chiang Li, Jun-Bin Yeh: Fast codebook search algorithms based on tree-structured vector quantization. Pattern Recognition Letters 27(10): 1077-1086 (2006) |
336 | EE | Chin-Chen Chang, Yih-Shin Hu, Tzu-Chuen Lu: A watermarking-based image ownership and tampering authentication scheme. Pattern Recognition Letters 27(5): 439-446 (2006) |
335 | EE | Chin-Chen Chang, Chi-Shiang Chan, Chun-Sen Tseng: Removing blocking effects using an artificial neural network. Signal Processing 86(9): 2381-2387 (2006) |
334 | EE | Chin-Chen Chang, Iuon-Chang Lin: A new solution for assigning cryptographic keys to control access in mobile agent environments. Wireless Communications and Mobile Computing 6: 137-146 (2006) |
2005 | ||
333 | EE | Yeu-Pong Lai, Chin-Chen Chang: A Simple Forward Secure Blind Signature Scheme Based on Master Keys and Blind Signatures. AINA 2005: 139-144 |
332 | EE | Chia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang: An Improved Low Computation Cost User Authentication Scheme for Mobile Communication. AINA 2005: 249-252 |
331 | EE | Chin-Chen Chang, Jui-Yi Kuo: An Efficient Multi-Server Password Authenticated Key Agreement Scheme Using Smart Cards with Access Control. AINA 2005: 257-260 |
330 | EE | Chi-Hsiung Huang, Chia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang, Kuo-Lun Chen: Authenticated Encryption Schemes with Message Linkage for Threshold Signatures. AINA 2005: 261-264 |
329 | EE | Hui-Feng Huang, Chin-Chen Chang: A New Design for Efficient t-out-n Oblivious Transfer Scheme. AINA 2005: 499-502 |
328 | EE | Chi-Shiang Chan, Chin-Chen Chang: A Lossless Medical Image Compression Scheme Using Modified S-Tree Structure. AINA 2005: 75-78 |
327 | EE | Chin-Chen Chang, Chi-Lung Chiang, Ju Yuan Hsiao: A DCT-Domain System for Hiding Fractal Compressed Images. AINA 2005: 83-86 |
326 | EE | Chin-Chen Chang, Wei-Liang Tai, Min-Hui Lin: A Reversible Data Hiding Scheme with Modified Side Match Vector Quantization. AINA 2005: 947-952 |
325 | EE | Chin-Chen Chang, Tzu-Chuen Lu: A Color-Based Image Retrieval Method Using Color Distribution and Common Bitmap. AIRS 2005: 56-71 |
324 | EE | Chin-Chen Chang, Yeu-Pong Lai: A Parallel Modular Exponentiation Scheme for Transformed Exponents. APPT 2005: 443-452 |
323 | EE | Yu-Chiang Li, Jieh-Shan Yeh, Chin-Chen Chang: A Fast Algorithm for Mining Share-Frequent Itemsets. APWeb 2005: 417-428 |
322 | EE | Ming-Ni Wu, Chia-Chen Lin, Chin-Chen Chang: Image Copy Detection with Rotating Tolerance. CIS (1) 2005: 464-469 |
321 | EE | Chin-Chen Chang, Jung-San Lee: Improvement on an Optimized Protocol for Mobile Network Authentication and Security. CIS (2) 2005: 538-541 |
320 | EE | Hui-Feng Huang, Chin-Chen Chang: Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function. CIS (2) 2005: 554-559 |
319 | EE | Chin-Chen Chang, Chia-Chen Lin, Jun-Bin Yeh: Adaptive Hiding Scheme Based on VQ-Indices Using Commutable Codewords. CIS (2) 2005: 567-572 |
318 | EE | Chin-Chen Chang, Jung-San Lee, Chang-Chu Chen: On the Forward and Backward Secrecy of HLL Group Key Exchange Mechanism. CIT 2005: 702-705 |
317 | EE | Chin-Chen Chang, Jui-Yi Kuo, Jung-San Lee: Time-bounded Based Password Authentication Scheme. CW 2005: 117-122 |
316 | EE | Hui-Feng Huang, Chin-Chen Chang: An efficient deniable authentication protocol. CW 2005: 307-310 |
315 | EE | Ya-Fen Chang, Chin-Chen Chang: Password-authenticated 3PEKE with Round Efficiency without Server's Public Key. CW 2005: 340-344 |
314 | EE | Chin-Chen Chang, Ya-Fen Chang, Wen-Chuan Wu: An Extendable-Message-Passing Protocol with Signatures Based on Two Hard Problems and Its Applications. CW 2005: 93-100 |
313 | EE | Yu-Chiang Li, Jieh-Shan Yeh, Chin-Chen Chang: Direct Candidates Generation: A Novel Algorithm for Discovering Complete Share-Frequent Itemsets. FSKD (2) 2005: 551-560 |
312 | EE | Yueh-Yi Lai, Wen-Kai Tai, Chin-Chen Chang, Chen-Duo Liu: Synthesizing transition textures on succession patterns. GRAPHITE 2005: 273-276 |
311 | EE | Hui-Feng Huang, Chin-Chen Chang: A Novel Conference Key Distribution System with Re-keying Protocol. Human.Society@Internet 2005: 282-290 |
310 | EE | Ya-Fen Chang, Chin-Chen Chang: An Improvement on Strong-Password Authentication Protocols. ICESS 2005: 629-637 |
309 | EE | Kuo-Feng Hwang, Chin-Chen Chang, Chao-Wen Chan: A Search Scheme Resulting in Mixing Compressed Text Files. ICPADS (1) 2005: 762-768 |
308 | EE | Chin-Chen Chang, Jun-Chou Chuang, Pei-Yu Lin: Sharing a Secret Two-Tone Image in Two Gray-Level Images. ICPADS (2) 2005: 300-304 |
307 | EE | Chin-Chen Chang, Po-Wen Lu: An Image Refining Method Using Digital Watermark via Vector Quantization. ICPADS (2) 2005: 585-589 |
306 | EE | Chin-Chen Chang, Chun-Sen Tseng, Chia-Chen Lin: Hiding Data in Binary Images. ISPEC 2005: 338-349 |
305 | EE | Chin-Chen Chang, Tzu-Chuen Lu: Method for Searching Similar Images Using Quality Index Measurement. KES (2) 2005: 1224-1230 |
304 | EE | Chin-Chen Chang, Chih-Yang Lin, Yu-Zheng Wang: VQ Image Steganographic Method with High Embedding Capacity Using Multi-way Search Approach. KES (3) 2005: 1058-1064 |
303 | EE | Chin-Chen Chang, Wen-Chuan Wu: A Reversible Information Hiding Scheme Based on Vector Quantization. KES (3) 2005: 1101-1107 |
302 | EE | Chin-Chen Chang, Yung-Chen Chou, Jau-Ji Shen: Improving Image Quality for JPEG Compression. KES (3) 2005: 442-448 |
301 | EE | Chin-Chen Chang, Tzu-Chuen Lu, Jun-Bin Yeh: A Bandwidth Efficiency of Lempel-Ziv Scheme for Data Authentication. KES (4) 2005: 249-256 |
300 | EE | Chin-Chen Chang, Yung-Chen Chou, Wen-Chuan Wu: Image Retrieval Using Spatial Color and Edge Detection. PCM (1) 2005: 981-992 |
299 | EE | Chin-Chen Chang, Yu-Chiang Li, Jung-San Lee: An Efficient Algorithm for Incremental Mining of Association Rules. RIDE 2005: 3-10 |
298 | EE | Chin-Chen Chang, Jau-Ji Shen, Yung-Chen Chou: FA-Tree - A Dynamic Indexing Structure for Spatial Data. WSTST 2005: 1071-1080 |
297 | EE | Chin-Chen Chang, Wei-Liang Tai, Chia-Chen Lin: Secret Hiding Using Side Match Vector Quantization. WSTST 2005: 172-181 |
296 | Yung-Kuan Chan, Chin-Chen Chang: Content-Based Retrieval Concept. Encyclopedia of Information Science and Technology (I) 2005: 564-568 | |
295 | EE | Chin-Chen Chang, Yeu-Pong Lai: A fast modular square computing method based on the generalized Chinese remainder theorem for prime moduli. Applied Mathematics and Computation 161(1): 181-194 (2005) |
294 | EE | Ya-Fen Chang, Chin-Chen Chang, Hui-Feng Huang: Digital signature with message recovery using self-certified public keys without trustworthy system authority. Applied Mathematics and Computation 161(1): 211-227 (2005) |
293 | EE | Chao-Wen Chan, Chin-Chen Chang: A scheme for threshold multi-secret sharing. Applied Mathematics and Computation 166(1): 1-14 (2005) |
292 | EE | Ya-Fen Chang, Chin-Chen Chang: Authentication schemes with no verification table. Applied Mathematics and Computation 167(2): 820-832 (2005) |
291 | EE | Min-Shiang Hwang, Kuo-Feng Hwang, Chin-Chen Chang: A time-stamping protocol for digital watermarking. Applied Mathematics and Computation 169(2): 1276-1284 (2005) |
290 | EE | Jen-Ho Yang, Chin-Chen Chang, Chih-Hung Wang: An iterative modular multiplication algorithm in RNS. Applied Mathematics and Computation 171(1): 637-645 (2005) |
289 | EE | Chin-Chen Chang, Chih-Yang Lin: Perfect Hashing Schemes for Mining Association Rules. Comput. J. 48(2): 168-179 (2005) |
288 | EE | Chin-Chen Chang, Jung-San Lee, Ya-Fen Chang: Efficient authentication protocols of GSM. Computer Communications 28(8): 921-928 (2005) |
287 | EE | Hsien-Chu Wu, Chin-Chen Chang: A novel digital image watermarking scheme based on the vector quantization technique. Computers & Security 24(6): 460-471 (2005) |
286 | Iuon-Chang Lin, Chin-Chen Chang: A (t, n) Threshold Secret Sharing System with Efficient Identification of Cheaters. Computers and Artificial Intelligence 24(5): (2005) | |
285 | EE | Iuon-Chang Lin, Min-Shiang Hwang, Chin-Chen Chang: The General Pay-Word: A Micro-payment Scheme Based on n-dimension One-way Hash Chain. Des. Codes Cryptography 36(1): 53-67 (2005) |
284 | EE | Chi-Shiang Chan, Chin-Chen Chang: An Image Hiding Scheme Based on Multi-bit-reference Substitution Table Using Dynamic Programming Strategy. Fundam. Inform. 65(4): 291-305 (2005) |
283 | EE | Tzu-Chuen Lu, Chin-Chen Chang: Data Compressor for VQ Index Tables. Fundam. Inform. 65(4): 353-371 (2005) |
282 | EE | Chin-Chen Chang, Chi-Shiang Chan: An Inverse Halftoning Technique Using Modified Look-Up Tables. Fundam. Inform. 68(3): 207-220 (2005) |
281 | EE | Chih-Yang Lin, Chin-Chen Chang, Chia-Chen Lin: A New Density-Based Scheme for Clustering Based on Genetic Algorithm. Fundam. Inform. 68(4): 315-331 (2005) |
280 | EE | Chin-Chen Chang, Wen-Chuan Wu: A Steganographic Method for Hiding Secret Data Using Side Match Vector Quantization. IEICE Transactions 88-D(9): 2159-2167 (2005) |
279 | EE | Chin-Chen Chang, Iuon-Chang Lin, Hui-Min Tsai: A dynamic mechanism for determining relationships in a partially ordered user hierarchy. IJHPCN 3(5/6): 378-384 (2005) |
278 | EE | Chin-Chen Chang, Yung-Chen Chou, Yuan-Hui Yu, Kai-Jung Shih: An image zooming technique based on vector quantization approximation. Image Vision Comput. 23(13): 1214-1225 (2005) |
277 | EE | Yuan-Hui Yu, Chin-Chen Chang, Yu-Chen Hu: A genetic-based adaptive threshold selection method for dynamic path tree structured vector quantization. Image Vision Comput. 23(6): 597-609 (2005) |
276 | EE | Hsien-Wen Tseng, Chin-Chen Chang: A Very Low Bit Rate Image Compressor Using Transformed Classified Vector Quantization. Informatica (Slovenia) 29(3): 335-342 (2005) |
275 | EE | Chin-Chen Chang, Iuon-Chang Lin: Cryptanalysis of the Modified Remote Login Authentication Scheme Based on a Geometric Approach. Informatica, Lith. Acad. Sci. 16(1): 37-44 (2005) |
274 | EE | Hsien-Wen Tseng, Chin-Chen Chang: Hiding Data in Halftone Images. Informatica, Lith. Acad. Sci. 16(3): 419-430 (2005) |
273 | EE | Ya-Fen Chang, Chin-Chen Chang: Schemes for Digital Gift Certificates with Low Computation Complexity. Informatica, Lith. Acad. Sci. 16(4): 503-518 (2005) |
272 | EE | Ya-Fen Chang, Chin-Chen Chang: An efficient authentication protocol for mobile satellite communication systems. Operating Systems Review 39(1): 70-84 (2005) |
271 | EE | Yuan-Hui Yu, Chin-Chen Chang, Yu-Chen Hu: Hiding secret data in images via predictive coding. Pattern Recognition 38(5): 691-705 (2005) |
270 | EE | Chin-Chen Chang, Piyu Tsai, Chia-Chen Lin: SVD-based digital image watermarking scheme. Pattern Recognition Letters 26(10): 1577-1586 (2005) |
2004 | ||
269 | EE | Chin-Chen Chang, Iuon-Chang Lin, Hui-Min Tsai: A Dynamic Mechanism for Determining Relationships in a Partially Ordered User Hierarchy. AINA (1) 2004: 133-138 |
268 | EE | Chin-Chen Chang, Ren-Junn Hwang: A New Scheme to Protect Confidential Images. AINA (1) 2004: 158-164 |
267 | EE | Yung-Kuan Chan, Chin-Chen Chang: Spatial Video Retrieval Based on the Piecewise Method. AINA (1) 2004: 171-176 |
266 | EE | Ren-Junn Hwang, Chin-Chen Chang: Enhancing the Efficiency of (v, r, n)-Fairness Secret Sharing Scheme. AINA (1) 2004: 208-212 |
265 | EE | Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang: Supervising Secret-Key Agreements in a Level-Based Hierarchy. AINA (1) 2004: 309-314 |
264 | EE | Ching-Te Wang, Chin-Chen Chang, Chu-Hsing Lin: Using IC Cards to Remotely Login Passwords without Verification Tables. AINA (1) 2004: 321-326 |
263 | EE | Chin-Chen Chang, Tzu-Chuen Lu, Yi-Long Liu: Bandwidth Efficiency of an Image Compression Method for Information Hiding. AINA (1) 2004: 426-432 |
262 | EE | Chin-Chen Chang, Ya-Fen Chang: Yet Another Attack on a QR-based Password Authentication System. AINA (2) 2004: 170-173 |
261 | EE | Chin-Chen Chang, Chu-Hsing Lin, Wei Lee, Pai-Cheng Hwang: Secret Sharing with Access Structures in a Hierarchy. AINA (2) 2004: 31-34 |
260 | EE | Chin-Chen Chang, Iuon-Chang Lin, Hui-Min Tsai, Hsiao-Hsi Wang: A Key Assignment Scheme for Controlling Access in Partially Ordered User Hierarchies. AINA (2) 2004: 376-379 |
259 | EE | Ming-Ni Wu, Min-Hui Lin, Chin-Chen Chang: A LSB Substitution Oriented Image Hiding Strategy Using Genetic Algorithms. AWCC 2004: 219-229 |
258 | EE | Chih-Yang Lin, Chin-Chen Chang: A Prediction Scheme for Image Vector Quantization Based on Mining Association Rules. AWCC 2004: 230-240 |
257 | EE | Yu-Chiang Li, Chin-Chen Chang: A New FP-Tree Algorithm for Mining Frequent Itemsets. AWCC 2004: 266-277 |
256 | EE | Hsien-Wen Tseng, Chin-Chen Chang: Steganography Using JPEG-Compressed Images. CIT 2004: 12-17 |
255 | EE | Min-Hui Lin, Chin-Chen Chang: A Novel Information Hiding Scheme Based on BTC. CIT 2004: 66-71 |
254 | EE | Chin-Chen Chang, Pei-Yu Lin: A Compression-Based Data Hiding Scheme Using Vector Quantization and Principle Component Analysis. CW 2004: 369-375 |
253 | EE | Chin-Chen Chang, Jung-San Lee: An Efficient and Secure Multi-Server Password Authentication Scheme using Smart Cards. CW 2004: 417-422 |
252 | Chin-Chen Chang, Ya-Fen Chang: The Security Flaw of an Untraceable Signature Scheme. ICEB 2004: 1379-1381 | |
251 | Chin-Chen Chang, Chung-Mou Pengwu: Gesture recognition approach for sign language using curvature scale space and hidden Markov model. ICME 2004: 1187-1190 | |
250 | Chin-Chen Chang: Novel hierarchical approach for radiosity. ICME 2004: 863-866 | |
249 | EE | Jun-Chou Chuang, Chin-Chen Chang: Detection and Restoration of a Tampered Medical Image. MIAR 2004: 78-85 |
248 | EE | Chin-Chen Chang, Piyu Tsai, Min-Hui Lin: An Adaptive Steganography for Index-Based Images Using Codeword Grouping. PCM (3) 2004: 731-738 |
247 | Chin-Chen Chang, Kuo-Lun Chen: A Signature Scheme with (t, n) Shared Verification and Message Recovery. iiWAS 2004 | |
246 | EE | Hsien-Wen Tseng, Chin-Chen Chang: A Branch-and-Bound Algorithm for the Construction of Reversible Variable Length Codes. Comput. J. 47(6): 701-707 (2004) |
245 | EE | Min-Hui Lin, Chin-Chen Chang, Yan-Ren Chen: A fair and secure mobile agent environment based on blind signature and proxy host. Computers & Security 23(3): 199-212 (2004) |
244 | EE | Yuan-Hui Yu, Chin-Chen Chang: Scenery Image Segmentation Using Support Vector Machines. Fundam. Inform. 61(3-4): 379-388 (2004) |
243 | EE | Chin-Chen Chang, Piyu Tsai, Min-Hui Lin: An Adaptive Steganographic Scheme for Color Images. Fundam. Inform. 62(3-4): 275-289 (2004) |
242 | EE | Hsien-Chu Wu, Chin-Chen Chang: Embedding Invisible Watermarks into Digital Images Based on Side-Match Vector Quantization. Fundam. Inform. 63(1): 89-106 (2004) |
241 | EE | Chin-Chen Chang, Yuan-Hui Yu: An Efficient Approach For Face Detection And Facial Feature Location Using Prune-And-Search Technique. IJPRAI 18(6): 987-1005 (2004) |
240 | EE | Chin-Chen Chang, Jun-Chou Chuang, Yih-Shin Hu: Retrieving digital images from a JPEG compressed image database. Image Vision Comput. 22(6): 471-484 (2004) |
239 | EE | Hsien-Wen Tseng, Chin-Chen Chang: High Capacity Data Hiding in JPEG-Compressed Images. Informatica, Lith. Acad. Sci. 15(1): 127-142 (2004) |
238 | EE | Chin-Chen Chang, Hsien-Wen Tseng: VQ-Based Image Watermarking Using Anti-Gray Coding. Informatica, Lith. Acad. Sci. 15(2): 147-160 (2004) |
237 | EE | Jen-Ho Yang, Chin-Chen Chang, Chien-Yuan Chen: A high-speed division algorithm in residue number system using parity. Int. J. Comput. Math. 81(6): 775-780 (2004) |
236 | EE | Chin-Chen Chang, Chih-Yang Lin, Pei-Yu Lin: An Efficient Graph-Based Method for Parallel Mining Problems. JIKM 3(2): 143-154 (2004) |
235 | EE | Chin-Chen Chang, Ren-Junn Hwang: A new scheme to protect confidential images. Journal of Interconnection Networks 5(3): 221-232 (2004) |
234 | EE | Hui-Feng Huang, Chin-Chen Chang: A new design of efficient partially blind signature scheme. Journal of Systems and Software 73(3): 397-403 (2004) |
233 | EE | Min-Hui Lin, Chin-Chen Chang: A secure one-time password authentication scheme with low-computation for mobile communications. Operating Systems Review 38(2): 76-84 (2004) |
232 | EE | Ya-Fen Chang, Chin-Chen Chang, Chia-Lin Kao: An improvement on a deniable authentication protocol. Operating Systems Review 38(3): 65-74 (2004) |
231 | EE | Ya-Fen Chang, Chin-Chen Chang: A secure and efficient strong-password authentication protocol. Operating Systems Review 38(3): 79-90 (2004) |
230 | EE | Chin-Chen Chang, Iuon-Chang Lin: An improvement of delegated multisignature scheme with document decomposition. Operating Systems Review 38(4): 52-57 (2004) |
229 | EE | Chin-Chen Chang, Yeu-Pong Lai: A convertible group signature scheme. Operating Systems Review 38(4): 58-65 (2004) |
228 | EE | Ya-Fen Chang, Chin-Chen Chang, Jui-Yi Kuo: A secure one-time password authentication scheme using smart cards without limiting login times. Operating Systems Review 38(4): 80-90 (2004) |
227 | EE | Chin-Chen Chang, Iuon-Chang Lin: Remarks on fingerprint-based remote user authentication scheme using smart cards. Operating Systems Review 38(4): 91-96 (2004) |
226 | EE | Chin-Chen Chang, Guei-Mei Chen, Min-Hui Lin: Information hiding based on search-order coding for VQ indices. Pattern Recognition Letters 25(11): 1253-1261 (2004) |
225 | EE | Chin-Chen Chang, Hsien-Wen Tseng: A steganographic method for digital images using side match. Pattern Recognition Letters 25(12): 1431-1437 (2004) |
224 | EE | Chin-Chen Chang, Iuon-Chang Lin: Novel full-search schemes for speeding up image coding using vector quantization. Real-Time Imaging 10(2): 95-102 (2004) |
223 | EE | Piyu Tsai, Yu-Chen Hu, Chin-Chen Chang: A color image watermarking scheme based on color quantization. Signal Processing 84(1): 95-106 (2004) |
2003 | ||
222 | EE | Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang: Signature Schemes Based on Two Hard Problems Simultaneously. AINA 2003: 557-560 |
221 | EE | Chao-Wen Chan, Chin-Chen Chang: Huffman Tree Decomposition and Its Coding Applications. AINA 2003: 683-688 |
220 | EE | Chin-Chen Chang, Ying-Tse Kuo, Chu-Hsing Lin: Fast Algorithms for Common-Multiplicand Multiplication and Exponentiation by Performing Complements. AINA 2003: 807-811 |
219 | EE | Chin-Chen Chang, Chi-Shiang Chan, Ju Yuan Hsiao: Lossless Image Compression Based on Two-Way Smaller Difference. AINA 2003: 821-824 |
218 | EE | Kuo-Lung Hung, Chin-Chen Chang: A Robust and Recoverable Tamper Proofing Technique for Image Authentication. Human.Society@Internet 2003 2003: 44-53 |
217 | EE | Hui-Feng Huang, Chin-Chen Chang: An Efficient Convertible Authenticated Encryption Scheme and Its Variant. ICICS 2003: 382-392 |
216 | Chin-Chen Chang, Cheng-Yi Liu: Modified curvature scale space feature alignment approach for hand posture recognition. ICIP (3) 2003: 309-312 | |
215 | EE | Ren-Junn Hwang, Chin-Chen Chang: A Method for Sending Confidential Messages to a Group without Trusted Parties. ISPA 2003: 375-381 |
214 | Kuo-Lung Hung, Chin-Chen Chang, Tung-Shou Chen: An Efficient Block-based Scheme for Progressively Transmitting Lossless Images. MMM 2003: 313-328 | |
213 | Chin-Chen Chang, Jun-Chou Chuang, Yih-Shin Hu: Similar Image Retrieval Based on Wavelet Transformation. WAA 2003: 294- | |
212 | EE | Hsien-Wen Tseng, Chin-Chen Chang: Construction of Symmetrical Reversible Variable Length Codes Using Backtracking. Comput. J. 46(1): 100-105 (2003) |
211 | Chin-Chen Chang, Yeu-Pong Lai: A flexible date-attachment scheme on e-cash. Computers & Security 22(2): 160-166 (2003) | |
210 | EE | Chin-Chen Chang, Ya-Fen Chang: Efficient anonymous auction protocols with freewheeling bids. Computers & Security 22(8): 728-734 (2003) |
209 | EE | Hui-Feng Huang, Chin-Chen Chang: An Efficient and Practical (t, n) Threshold Proxy Signature Scheme with Known Signers. Fundam. Inform. 56(3): 243-253 (2003) |
208 | EE | Chwei-Shyong Tsai, Chin-Chen Chang: An Improvement to Image Segment Based on Human Visual System for Object-based Coding. Fundam. Inform. 58(2): 167-178 (2003) |
207 | EE | Chwei-Shyong Tsai, Chin-Chen Chang: A DWT-based Deblocking Technique Based on Edge Detection and Zero Masking for Reducing Blocking Effect. Fundam. Inform. 58(2): 179-188 (2003) |
206 | EE | Hsien-Chu Wu, Chin-Chen Chang: Hiding Digital Watermarks Using Fractal Compression Technique. Fundam. Inform. 58(2): 189-202 (2003) |
205 | EE | Chao-Wen Chan, Chin-Chen Chang: A New Channel for Image Hiding Based on Interpolating polynomials. Fundam. Inform. 58(2): 93-104 (2003) |
204 | EE | Iuon-Chang Lin, Min-Shiang Hwang, Chin-Chen Chang: A new key assignment scheme for enforcing complicated access control policies in hierarchy. Future Generation Comp. Syst. 19(4): 457-462 (2003) |
203 | EE | Yu-Chen Hu, Chin-Chen Chang: Edge Detection Using Block Truncation Coding. IJPRAI 17(6): 951-966 (2003) |
202 | EE | Chin-Chen Chang, Chi-Yien Chung: An efficient protocol for anonymous multicast and reception. Inf. Process. Lett. 85(2): 99-103 (2003) |
201 | EE | Chin-Chen Chang, Kuo-Feng Hwang: Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards. Informatica, Lith. Acad. Sci. 14(3): 289-294 (2003) |
200 | EE | Chin-Chen Chang, Chi-Shiang Chan: A Watermarking Scheme Based on Principal Component Analysis Technique. Informatica, Lith. Acad. Sci. 14(4): 431-444 (2003) |
199 | EE | Chin-Chen Chang, Ju Yuan Hsiao, Chi-Shiang Chan: Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recognition 36(7): 1583-1595 (2003) |
198 | EE | Hsien-Wen Tseng, Chin-Chen Chang: A Fast and Simple Algorithm for the Construction of Asymmetrical Reversible Variable Length Codes. Real-Time Imaging 9(1): 3-10 (2003) |
197 | EE | Kuo-Lung Hung, Chin-Chen Chang: Error prevention and resilience of VQ encoded images. Signal Processing 83(2): 431-437 (2003) |
196 | EE | Chin-Chen Chang, Timothy K. Shih, Iuon-Chang Lin: Guessing by neighbors: an efficient reconstruction method for transmitting image progressively. The Visual Computer 19(5): 342-353 (2003) |
2002 | ||
195 | EE | Chin-Chen Chang, Po-Wen Lu, Ju Yuan Hsiao: A Hybrid Method for Estimating the Euclidean Distance between Two Vectors. CW 2002: 183-190 |
194 | EE | Chin-Chen Chang, Ju Yuan Hsiao, Chi-Lung Chiang: An Image Copyright Protection Scheme Based on Torus Automorphism. CW 2002: 217-224 |
193 | EE | Chin-Chen Chang, Tai-Xing Yu: Sharing a Secret Gray Image in Multiple Images. CW 2002: 230-240 |
192 | EE | Chao-Wen Chan, Chin-Chen Chang: Key Exchange Protocols for Multiparty Communication Services. CW 2002: 241-248 |
191 | EE | Hui-Feng Huang, Chin-Chen Chang: Cryptanalysis of the WD Public-Key Cryptosystem. CW 2002: 249-254 |
190 | EE | Chin-Chen Chang, I-Yen Chen, Yea-Shuan Huang: Hand Pose Recognition Using Curvature Scale Space. ICPR (2) 2002: 386-389 |
189 | EE | Chin-Chen Chang, Yuan-Yuan Su: A Dynamic Color Palette for Color Images Coding. IEEE Pacific Rim Conference on Multimedia 2002: 369-376 |
188 | EE | Chin-Chen Chang, Chih-Ping Hsieh, Ju Yuan Hsiao: A Fast and Efficient Noise Reduction Method Suitable for Low Noise Density. IEEE Pacific Rim Conference on Multimedia 2002: 386-392 |
187 | EE | Chin-Chen Chang, Ju Yuan Hsiao, Chi-Lung Chiang: A Cross-Type Peak-and-Valley Filter for Error Prevention and Resilience in Image Communications. IEEE Pacific Rim Conference on Multimedia 2002: 393-400 |
186 | Chin-Chen Chang, Chi-Shiang Chan, Ya-Ping Pan: An Inverse Halftoning Technique using Genetic Algorithm. ISDB 2002: 184-189 | |
185 | Tzu-Chuen Lu, Chin-Chen Chang, S. Wesley Changchien: An Association Rule Mining Method for Spatial Database. ISDB 2002: 281-286 | |
184 | Yung-Kuan Chan, Chin-Chen Chang, Jau-Ji Shen: A Compact Patricia Trie for a Large Set of Keys. ISDB 2002: 31-36 | |
183 | Chin-Chen Chang, Iuon-Chang Lin, Timothy K. Shih: An Efficient Edge Detection Technique for Chinese Calligraphy. JCIS 2002: 960-963 | |
182 | Chin-Chen Chang, Ming-Ni Wu: An Algorithm for Color Image Compression Base on Common Bit Map Block Truncation Coding. JCIS 2002: 964-967 | |
181 | Ching-Te Wang, Chin-Chen Chang, Chu-Hsing Lin: A New Micro-Payment System Using General Payword Chain. Electronic Commerce Research 2(1-2): 159-168 (2002) | |
180 | EE | Min-Shiang Hwang, Chin-Chen Chang, Kuo-Feng Hwang: An ElGamal-Like Cryptosystem for Enciphering Large Messages. IEEE Trans. Knowl. Data Eng. 14(2): 445-446 (2002) |
179 | EE | Yung-Kuan Chan, Chin-Chen Chang: A Color Image Retrieval Method Based on Color Moment and Color Variance of Adjacent Pixels. IJPRAI 16(1): 113-125 (2002) |
178 | EE | Chin-Chen Chang, Min-Hui Lin, Yu-Chen Hu: A Fast and Secure Image Hiding Scheme Based on LSB Substitution. IJPRAI 16(4): 399-416 (2002) |
177 | EE | Min-Hui Lin, Yu-Chen Hu, Chin-Chen Chang: Both Color and Gray Scale Secret Images Hiding in a Color Image. IJPRAI 16(6): 697-714 (2002) |
176 | Chin-Chen Chang, Tung-Shou Chen, Lou-Zo Chung: A steganographic method based upon JPEG and quantization table modification. Inf. Sci. 141(1-2): 123-138 (2002) | |
175 | Kuo-Lung Hung, Chin-Chen Chang: An improvement of a technique for color quantization using reduction of color space dimensionality. Informatica (Slovenia) 26(1): (2002) | |
174 | Chin-Chen Chang, Jun-Chou Chuang, Tung-Shou Chen: Recognition of Image Authenticity Using Significant DCT Coefficients Quantization. Informatica (Slovenia) 26(4): (2002) | |
173 | EE | Kuo-Lung Hung, Chin-Chen Chang: Error Prevention and Concealment for Chinese Calligraphy Based on Block Truncation Coding. Int. J. Comput. Proc. Oriental Lang. 15(1): 101-113 (2002) |
172 | EE | Chin-Chen Chang, Kuo-Feng Hwang, Min-Shiang Hwang: A Feature-Oriented Copyright Owner Proving Technique for Still Images. International Journal of Software Engineering and Knowledge Engineering 12(3): 317- (2002) |
171 | EE | Chin-Chen Chang, Shu-Kai Yang, Ding-Zhou Duan, Ming-Fen Lin: A Fuzzy-based Approach to Mesh Simplification. J. Inf. Sci. Eng. 18(3): 459-466 (2002) |
170 | EE | Chin-Chen Chang, Shu-Kai Yang, Ding-Zhou Duan, Ming-Fen Lin: A Fuzzy-based Approach to Mesh Simplification. J. Inf. Sci. Eng. 18(3): 459-466 (2002) |
169 | EE | Hsien-Chu Wu, Chin-Chen Chang: Detection and restoration of tampered JPEG compressed images. Journal of Systems and Software 64(2): 151-161 (2002) |
168 | EE | Chwei-Shyong Tsai, Chin-Chen Chang, Tung-Shou Chen: Sharing multiple secrets in digital images. Journal of Systems and Software 64(2): 163-170 (2002) |
167 | EE | Shu-Kai Yang, Chin-Chen Chang, Ding-Zhou Duan, Ming-Fen Lin: A novel progressive modelling algorithm for 3D models. Journal of Visualization and Computer Animation 13(3): 187-198 (2002) |
166 | EE | Kuo-Feng Hwang, Chin-Chen Chang: A fast pixel mapping algorithm using principal component analysis. Pattern Recognition Letters 23(14): 1747-1753 (2002) |
165 | EE | Chin-Chen Chang, Tai-Xing Yu: Cryptanalysis of an encryption scheme for binary images. Pattern Recognition Letters 23(14): 1847-1852 (2002) |
164 | EE | Chin-Chen Chang, Jun-Chou Chuang: An image intellectual property protection scheme for gray-level images using visual secret sharing strategy. Pattern Recognition Letters 23(8): 931-94 (2002) |
163 | EE | Piyu Tsai, Chin-Chen Chang, Yu-Chen Hu: An Adaptive Two-Stage Edge Detection Scheme for Digital Color Images. Real-Time Imaging 8(4): 329-343 (2002) |
2001 | ||
162 | Yung-Kuan Chan, Chin-Chen Chang: Concealing a Secret Image Using the Breadth First Traversal Linear Quadtree Structure. CODAS 2001: 213- | |
161 | EE | Chin-Chen Chang, Hsien-Chu Hsia, Tung-Shou Chen: A Progressive Image Transmission Scheme Based on Block Truncation Coding. Human.Society@Internet 2001: 383-397 |
160 | EE | Chin-Chen Chang, Iuon-Chang Lin: Cryptanalysis of the Improved User Efficient Blind Signatures. ICICS 2001: 42-46 |
159 | EE | Chin-Chen Chang, Kuo-Feng Hwang: Towards the Forgery of a Group Signature without Knowing the Group Center's Secret. ICICS 2001: 47-51 |
158 | EE | Yung-Kuan Chan, Chin-Chen Chang: Image Retrieval Based on Tolerable Difference of Direction. ICOIN 2001: 387-392 |
157 | EE | Chin-Chen Chang, Shu-Kai Yang, Jun-Wei Hsieh, Ding-Zhou Duan, Ming-Fen Lin: A Fuzzy Inference System for Simplifying Surfaces with Color. IEEE Pacific Rim Conference on Multimedia 2001: 1078-1083 |
156 | EE | Chin-Chen Chang, Jyh-Chiang Yeh, Ju Yuan Hsiao: A Novel Scheme for Securing Image Steganography. IEEE Pacific Rim Conference on Multimedia 2001: 804-811 |
155 | EE | Chin-Chen Chang, Chi-Shiang Chan, Ju Yuan Hsiao: A Color Image Retrieval Method Based on Local Histogram. IEEE Pacific Rim Conference on Multimedia 2001: 831-836 |
154 | EE | Chwei-Shyong Tsai, Chin-Chen Chang: A Generalized Secret Image Sharing and Recovery Scheme. IEEE Pacific Rim Conference on Multimedia 2001: 963-968 |
153 | Tzong-Chen Wu, Chin-Chen Chang: Cryptographic key assignment scheme for hierarchical access control. Comput. Syst. Sci. Eng. 16(1): 25-28 (2001) | |
152 | EE | Kuo-Lung Hung, Chin-Chen Chang: A Novel Progressive Image Transmission Technique for Chinese Calligraphy. Int. J. Comput. Proc. Oriental Lang. 14(4): 293-307 (2001) |
151 | EE | Chin-Chen Chang, Guu-In Chen: Bi-level Lossless Calligraphy Compression Using Location Propagation and Width Inheritance. Int. J. Comput. Proc. Oriental Lang. 14(4): 309-339 (2001) |
150 | EE | Chin-Chen Chang, Lin-Li Chen, Tung-Shou Chen: A New Two-Path Search Algorithm for Block Motion Estimation of Video Data. J. Inf. Sci. Eng. 17(3): 405-415 (2001) |
149 | EE | Chin-Chen Chang, Min-Shiang Hwang, Tung-Shou Chen: A new encryption algorithm for image cryptosystems. Journal of Systems and Software 58(2): 83-91 (2001) |
148 | Yung-Kuan Chan, Chin-Chen Chang: Image matching using run-length feature. Pattern Recognition Letters 22(5): 447-455 (2001) | |
2000 | ||
147 | EE | Iuon-Chang Lin, Chin-Chen Chang, Min-Shiang Hwang: Security Enhancement for the "Simple Authentication Key Agreement Algorithm". COMPSAC 2000: 113-115 |
146 | EE | Chin-Chen Chang, Kuo-Feng Hwang, Yi Lin: A Proof of Copyright Ownership Using Moment-Preserving. COMPSAC 2000: 198-203 |
145 | EE | Chin-Chen Chang, Chao-Wen Chan: Detecting Dealer Cheating in Secret Sharing Systems. COMPSAC 2000: 449-453 |
144 | EE | Chin-Chen Chang, Chwei-Shyong Tsai, Tung-Shou Chen: A New Scheme for Sharing Secret Color Images in Computer Network. ICPADS 2000: 21-27 |
143 | EE | Chin-Chen Chang, Tung-Shou Chen, Yi Lin: An efficient accessing technique of Chinese characters using Boshiamy Chinese input system. IRAL 2000: 61-67 |
142 | EE | Chin-Chen Chang, Tung-Shou Chen: An Improved Prediction Method for Quadtree Image Coding. ISMSE 2000: 269-275 |
141 | Chin-Chen Chang, Jyh-Chiang Yeh, Ju Yuan Hsiao: A Method for Protecting Digital Images from Being Copied Illegally. Kyoto International Conference on Digital Libraries 2000: 348-355 | |
140 | Chin-Chen Chang: A Perspective on the Development of Digital Libraries in Taiwan. Kyoto International Conference on Digital Libraries 2000: 44-46 | |
139 | EE | Ji-Han Jiang, Chin-Chen Chang, Tung-Shou Chen: A Compact Sparse Matrix Representation Using Random Hash Functions. Data Knowl. Eng. 32(1): 29-49 (2000) |
138 | Chin-Chen Chang, Jer-Sheng Chou, Tung-Shou Chen: An efficient computation of Euclidean distances using approximated look-up table. IEEE Trans. Circuits Syst. Video Techn. 10(4): 594-599 (2000) | |
137 | Chin-Chen Chang, Pei-Fang Chung: A Technique of Watermarking for Digital Images Using (t, n)-Threshold Scheme. Informatica (Slovenia) 24(1): (2000) | |
136 | Chin-Chen Chang, Chwei-Shyong Tsai: A Technique for Computing Watermarks from Digital Images. Informatica (Slovenia) 24(3): (2000) | |
135 | Chin-Chen Chang, Kuo-Feng Hwang, Min-Shiang Hwang: A Digital Watermarking Scheme Using Human Visual Effects. Informatica (Slovenia) 24(4): (2000) | |
134 | EE | Chin-Feng Lee, Chin-Chen Chang: Breadth-first search oriented symbolic picture representation for spatial match retrieval. Journal of Systems and Software 52(1): 11-23 (2000) |
1999 | ||
133 | EE | Chin-Chen Chang, Fun-Chou Shiue, Tung-Shou Chen: Tree Structured Vector Quantization with Dynamic Path Search. ICPP Workshops 1999: 536-541 |
132 | EE | Chin-Chen Chang, Pai-Cheng Huang, Wei-Bin Lee: Conference key distribution schemes for portable communication systems. Computer Communications 22(12): 1160-1164 (1999) |
131 | EE | Chien-Yuan Chen, Chin-Chen Chang: A fast modular multiplication algorithm for calculating the product AB modulo N. Inf. Process. Lett. 72(3-4): 77-81 (1999) |
130 | EE | Wei-Bin Lee, Chin-Chen Chang: (t, n) Threshold Digital Signature With Traceability Property. J. Inf. Sci. Eng. 15(5): 669-678 (1999) |
129 | EE | Ren-Junn Hwang, Chin-Chen Chang: An Improved Threshold Scheme Based on Modular ARithmetic. J. Inf. Sci. Eng. 15(5): 691-699 (1999) |
128 | EE | Ren-Junn Hwang, Wei-Bin Lee, Chin-Chen Chang: A concept of designing cheater identification methods for secret sharing. Journal of Systems and Software 46(1): 7-11 (1999) |
127 | EE | Chin-Chen Chang, Tian-Fu Lee, Jyh-Jong Leu: Partition search filter and its performance analysis. Journal of Systems and Software 47(1): 35-43 (1999) |
1998 | ||
126 | Yung-Kuan Chan, Chin-Chen Chang: An Efficient Data Structure for Storing Similar Binary Images. FODO 1998: 268-275 | |
125 | EE | Chin-Chen Chang, Jyh-Jong Leu, Pai-Cheng Huang, Wei-Bin Lee: A Scheme for Obtaining a Message from the Digital Multisignature. Public Key Cryptography 1998: 154-163 |
124 | EE | Ren-Junn Hwang, Chin-Chen Chang: An on-line secret sharing scheme for multi-secrets. Computer Communications 21(13): 1170-1176 (1998) |
123 | EE | Wei-Bin Lee, Chin-Chen Chang: Authenticity of public keys in asymmetric cryptosystems. Computer Communications 21(2): 195-198 (1998) |
122 | EE | Wei-Bin Lee, Chin-Chen Chang: Using RSA with low exponent in a public network. Computer Communications 21(3): 284-286 (1998) |
121 | EE | Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang: Threshold signature schemes with traceable signers in group communications. Computer Communications 21(8): 771-776 (1998) |
120 | EE | Chin-Chen Chang, Zen-Chung Shih: An accuracy enhancement algorithm for hierarchical radiosity. Computers & Graphics 22(2-3): 225-232 (1998) |
119 | EE | Chin-Chen Chang, Chin-Feng Lee: A Bin-Tree Oriented Iconic Indexing Scheme for Retrieving Symbolic Pictures. Data Knowl. Eng. 26(2): 121-133 (1998) |
118 | EE | Tung-Shou Chen, Chin-Chen Chang, Min-Shiang Hwang: A virtual image cryptosystem based upon vector quantization. IEEE Transactions on Image Processing 7(10): 1485-1488 (1998) |
117 | Chin-Chen Chang, Ren-Junn Hwang: Sharing Secret Omages using Shadow Codebooks. Inf. Sci. 111(1-4): 335-345 (1998) | |
116 | EE | Der-Chyuan Lou, Chin-Chen Chang: An adaptive exponentiation method. Journal of Systems and Software 42(1): 59-69 (1998) |
115 | EE | Chin-Chen Chang, Chin-Feng Lee: A spatial match retrieval mechanism for symbolic pictures. Journal of Systems and Software 44(1): 73-83 (1998) |
114 | Chin-Chen Chang, Zen-Chung Shih: Tighter error bounds and weighted error metrics for hierarchical radiosity. Journal of Visualization and Computer Animation 9(2): 53-63 (1998) | |
1997 | ||
113 | EE | Wei-Bin Lee, Chin-Chen Chang: Three ID-based information security functions. Computer Communications 20(14): 1301-1307 (1997) |
112 | EE | Chiuyuan Chen, Chin-Chen Chang, Gerard J. Chang: Proper interval graphs and the guard problem. Discrete Mathematics 170(1-3): 223-230 (1997) |
111 | EE | C. Y. Chen, H. F. Lin, Chin-Chen Chang, Richard C. T. Lee: Optimal Bucket Allocation Design of k-ary MKH Files for Partial Match Retrieval. IEEE Trans. Knowl. Data Eng. 9(1): 148-160 (1997) |
110 | EE | Tung-Shou Chen, Chin-Chen Chang: A new image coding algorithm using variable-rate side-match finite-state vector quantization. IEEE Transactions on Image Processing 6(8): 1185-1187 (1997) |
109 | EE | Chin-Chen Chang, Shin-Jia Hwang: A Simple Approach for Generating RSA Keys. Inf. Process. Lett. 63(1): 19-21 (1997) |
108 | EE | Wei-Bin Lee, Chin-Chen Chang: Authenticated Encryption Schemes with Linkage Between Message Blocks. Inf. Process. Lett. 63(5): 247-250 (1997) |
107 | Chin-Chen Chang, Der-Chyuan Lou, Tzong-Chen Wu: A Binary Access Control Method Using Prime Factorization. Inf. Sci. 96(1&2): 15-26 (1997) | |
106 | EE | Der-Chyuan Lou, Chin-Chen Chang: A Cost Optimal Search Technique for the Knapsack Problem. International Journal of High Speed Computing 9(1): 1-12 (1997) |
105 | EE | C. Y. Chen, H. F. Lin, Chin-Chen Chang, Richard C. T. Lee: Multidisk Smaller Sized MKH file Allocation for Partial Match Retrieval. J. Inf. Sci. Eng. 13(1): 125-141 (1997) |
104 | EE | Chin-Chen Chang, Wen-Bin Wu: A secure voting system on a public network. Networks 29(2): 81-87 (1997) |
103 | Der-Chyuan Lou, Chin-Chen Chang: A Parallel Two-List Algorithm for the Knapsack Problem. Parallel Computing 22(14): 1985-1996 (1997) | |
1996 | ||
102 | Chu-Hsing Lin, Ching-Te Wang, Chin-Chen Chang: A group-oriented (t, n) undeniable signature scheme without trusted center. ACISP 1996: 266-274 | |
101 | Shin-Jia Hwang, Chin-Chen Chang: A dynamic secret sharing scheme with cheater detection. ACISP 1996: 48-55 | |
100 | C. Y. Chen, Chin-Chen Chang, Richard C. T. Lee, D. C. Lin: A Temporal Join Mechanism Based on Trie-Ranking Data Structure. CODAS 1996: 428-435 | |
99 | Chin-Feng Lee, Chin-Chen Chang: Optimal Bit Lengths of Direction Signatures for Spatial Match Accessing Using Basic Linear Hashing Scheme. CODAS 1996: 526-529 | |
98 | EE | C. Y. Chen, Chin-Chen Chang, Richard C. T. Lee, D. C. Lin: Optimal Linear Hashing Files for Orthogonal Range Retrieval. COMPSAC 1996: 406-413 |
97 | Chin-Chen Chang, Ji-Han Jiang: A Spatial Filter for Similarity Retrieval. IJPRAI 10(6): 711-730 (1996) | |
96 | EE | Wei-Bin Lee, Chin-Chen Chang: Integrating Authentication in Public Key Distribution System. Inf. Process. Lett. 57(1): 49-52 (1996) |
95 | EE | Shin-Jia Hwang, Chin-Chen Chang, Wei-Pang Yang: Autenticated Encryption Schemes with Message Linkage. Inf. Process. Lett. 58(4): 189-195 (1996) |
94 | Annie Y. H. Chou, Wei-Pang Yang, Chin-Chen Chang: Some Properties of Optimal Cartesian Product Files for Orthogonal Range Queries. Inf. Sci. 90(1-4): 91-107 (1996) | |
93 | EE | Chien-Yuan Chen, Chin-Chen Chang, Wei-Pang Yang: Cryptanalysis of the Secret Exponent of the RSA Scheme. J. Inf. Sci. Eng. 12(2): 277-290 (1996) |
92 | EE | Wei-Bin Lee, Chin-Chen Chang: On Key Changeable ID-Based Digital Signature Scheme. J. Inf. Sci. Eng. 12(3): 381-386 (1996) |
91 | EE | Chin-Chen Chang, Ruey-Feng Chang, Wen-Tsai Lee, Ching-Lin Kuo: A Fast Search Algorithm for Vector Quantization. J. Inf. Sci. Eng. 12(4): 593-602 (1996) |
90 | Chin-Chen Chang, Daniel J. Buehrer: An Improvement to Ziegler's Sparse Matrix Compression Algorithm. Journal of Systems and Software 35(1): 67-71 (1996) | |
89 | EE | Chin-Chen Chang, D. C. Lin: A spatial data representation: an adaptive 2D-H string. Pattern Recognition Letters 17(2): 175-185 (1996) |
1995 | ||
88 | Chiuyuan Chen, Chin-Chen Chang: Connected Proper Interval Graphs and the Guard Problem in Spiral Polygons. Combinatorics and Computer Science 1995: 39-47 | |
87 | Shin-Jia Hwang, Chin-Chen Chang, Wei-Pang Yang: Some Active Attacks on Fast Server-Aided Secret Computation Protocols for Modular Exponentiation. Cryptography: Policy and Algorithms 1995: 215-227 | |
86 | Chin-Chen Chang, Tzong-Chen Wu, Chi-Sung Laih: Cryptanalysis of a Password Authentication Scheme Using Quadratic Residues. Computer Communications 18(1): 45-47 (1995) | |
85 | EE | Chin-Chen Chang, Sun-Min Tsu, Chien-Yuan Chen: Remote scheme for password authentication based on theory of quadratic residues. Computer Communications 18(12): 936-942 (1995) |
84 | EE | Hui-Min Tsai, Chin-Chen Chang: A cryptographic implementation for dynamic access control in a user hierarchy. Computers & Security 14(2): 159-166 (1995) |
83 | Chu-Hsing Lin, Chin-Chen Chang, Richard C. T. Lee: New Public-Key Cipher System Based Upon the Diophantine Equations. IEEE Trans. Computers 44(1): 13-19 (1995) | |
82 | Chin-Chen Chang, J. Liang: Dynamic Pictorial Databases Design for Similarity Retrieval. Inf. Sci. 87(1-3): 29-46 (1995) | |
81 | EE | Yuh-Jiun Chen, Chin-Chen Chang, Wei-Pang Yang: Shortest Weighted Length Addition Chains. J. Inf. Sci. Eng. 11(2): 295-305 (1995) |
80 | EE | Chin-Chen Chang, Woan-Jing Horng, Daniel J. Buehrer: A Cascade Exponentiation Evaluation Scheme Based on the Lempel-Ziv-Welch Compression Algorithm. J. Inf. Sci. Eng. 11(3): 417-431 (1995) |
79 | EE | Annie Y. H. Chou, Wei-Pang Yang, Chin-Chen Chang: Optimal Two-Attribute Cartesian Product Files for Orthogonal Range Queries. J. Inf. Sci. Eng. 11(4): 625-647 (1995) |
78 | EE | Yuh-Jiun Chen, Chin-Chen Chang, Wei-Pang Yang: Parallel Computation of the Modular Cascade Exponentiation. Parallel Algorithms Appl. 7(1-2): 29-42 (1995) |
77 | EE | Chin-Chen Chang, Chin-Feng Lee: Relative coordinates oriented symbolic string for spatial relationship retrieval. Pattern Recognition 28(4): 563-570 (1995) |
76 | EE | C. Y. Chen, Chin-Chen Chang, Richard Chia-Tung Lee: A near pattern-matching scheme based upon principal component analysis. Pattern Recognition Letters 16(4): 339-345 (1995) |
75 | EE | Chin-Chen Chang, Tzong-Chen Wu: An exact match retrieval scheme based upon principal component analysis. Pattern Recognition Letters 16(5): 465-470 (1995) |
1994 | ||
74 | EE | Chu-Hsing Lin, Chin-Chen Chang: Method for constructing a group-oriented cipher system. Computer Communications 17(11): 805-808 (1994) |
73 | EE | Ming-Yung Ko, Tzonelih Hwang, Chin-Chen Chang: Attacks on an ID-based signature scheme based on Rabin's public key cryptosystem. Computer Communications 17(9): 674-676 (1994) |
72 | EE | Chin-Chen Chang, J. K. Jan, Daniel J. Buehrer: A scheme to determine the relationship between two users in a hierarchy. Computers & Security 13(3): 255-261 (1994) |
71 | EE | Chi-Sung Laih, Wen-Hong Chiou, Chin-Chen Chang: Authentication and protection of public keys. Computers & Security 13(7): 581-585 (1994) |
70 | EE | Chin-Chen Chang, Jao-Ji Shen, Tzong-Chen Wu: Access control with binary keys. Computers & Security 13(8): 681-686 (1994) |
69 | Chin-Chen Chang, Yaw-Wen Chen, Daniel J. Buehrer: A Two-Dimensional Shape Recognition Scheme Based on Principal Component Analysis. IJPRAI 8(4): 859-875 (1994) | |
68 | Tzong-Chen Wu, Chin-Chen Chang: Controlling Access in Tree Hierarchies. Inf. Sci. 78(1-2): 69-76 (1994) | |
67 | J. Liang, Chin-Chen Chang, Ron McFadyen, Richard C. T. Lee: Optimal Multiple Key Hashing Files for Orthogonal Range Queries. Inf. Sci. 79(1-2): 145-158 (1994) | |
66 | EE | Chin-Chen Chang, Feng-Yi Liou: A Digital Multisignature Scheme Based upon the Digital Signature Scheme of a Modified ElGamal Public Key Cryptosystem. J. Inf. Sci. Eng. 11(3): 423-432 (1994) |
65 | EE | Chin-Chen Chang, Shin-Jia Hwang, Daniel J. Buehrer: New concepts for multiple stack systems: Born and reborn. Journal of Systems and Software 27(1): 45-54 (1994) |
64 | EE | Tzong-Chen Wu, Chin-Chen Chang: Application of geometric hashing to iconic database retrieval. Pattern Recognition Letters 15(9): 871-876 (1994) |
1993 | ||
63 | EE | J. Liang, Chin-Chen Chang: Similarity Retrieval on Pictorial Databases Based upon Module Operation. DASFAA 1993: 19-26 |
62 | EE | Daniel J. Buehrer, Chin-Chen Chang: Application of a Reciprocal Confluence Tree Unit to Similar-Picture Retrieval. SSD 1993: 437-442 |
61 | J. K. Jan, Chin-Chen Chang: A Key-Lock-Pair Oriented Access Control Scheme for the Growth of Users and Files. BIT 33(3): 382-389 (1993) | |
60 | Chin-Chen Chang, Huey-Cheue Kowng, Tzong-Chen Wu: A Refinement of a Compression-Oriented Addressing Scheme. BIT 33(4): 530-535 (1993) | |
59 | Chin-Chen Chang, Horng-Chin Lee: A New Generalized Group-Oriented Cryptoscheme Without Trusted Centers. IEEE Journal on Selected Areas in Communications 11(5): 725-729 (1993) | |
58 | Chin-Chen Chang, Tzong-Chen Wu: Controlling the Access Requests in an Information Protection System. Inf. Process. Manage. 29(1): 61-68 (1993) | |
57 | C. Y. Chen, Chin-Chen Chang, Richard C. T. Lee: Optimal MMI file systems for orthogonal range retrieval. Inf. Syst. 18(1): 37-54 (1993) | |
56 | Tzong-Chen Wu, Yi-Shiung Yeh, Chin-Chen Chang: Algebraic operations on encryped relational databases. Inf. Syst. 18(1): 55-62 (1993) | |
55 | EE | C. Y. Chen, Chin-Chen Chang: An object-oriented similarity retrieval algorithm for iconic image databases. Pattern Recognition Letters 14(6): 465-470 (1993) |
54 | EE | Chin-Chen Chang, Tzong-Chen Wu: A hashing-oriented nearest neighbor searching scheme. Pattern Recognition Letters 14(8): 625-630 (1993) |
1992 | ||
53 | Chin-Chen Chang, Tzong-Chen Wu, C. P. Chen: The Design of a Conference Key Distribution System. AUSCRYPT 1992: 459-466 | |
52 | Chin-Chen Chang, Daniel J. Buehrer: De-Clustering Image Databases. Future Databases 1992: 142-145 | |
51 | Chin-Chen Chang, Horng-Chin Lee: A Solution to Generalized Group Oriented Cryptography. SEC 1992: 265-275 | |
50 | Chin-Chen Chang, H. Y. Chen, C. Y. Chen: Symbolic Gray Code As A Data Allocation Scheme For Two-Disc Systems. Comput. J. 35(3): 299-305 (1992) | |
49 | Chin-Chen Chang, H. F. Lin, C. Y. Chen: Optimality Properties of the Disc Modulo Allocation Method for k-ary Multiple Key Hashing Files. Comput. J. 35(4): 390-394 (1992) | |
48 | Chu-Hsing Lin, Chin-Chen Chang, Richard C. T. Lee: A Record-Oriented Cryptosystem for Database Sharing (Short Note). Comput. J. 35(6): 658-660 (1992) | |
47 | Chin-Chen Chang, Tzong-Chen Wu: Retrieving the Most Similar Symbolic Pictures from Pictorial Databases. Inf. Process. Manage. 28(5): 581-588 (1992) | |
46 | EE | Chin-Chen Chang, Chu-Hsing Lin, Richard C. T. Lee: Hierarchy representations based on arithmetic coding for dynamic information protection systems. Inf. Sci. 64(1-2): 35-48 (1992) |
45 | Chin-Chen Chang, Ren-Junn Hwang, Tzong-Chen Wu: Crypographic key assignment scheme for access control in a hierarchy. Inf. Syst. 17(3): 243-247 (1992) | |
44 | Chu-Hsing Lin, Chin-Chen Chang, Richard C. T. Lee: A conference key broadcasting system using sealed locks. Inf. Syst. 17(4): 323-328 (1992) | |
43 | C. Y. Chen, Chin-Chen Chang: On GDM allocation for partial range queries. Inf. Syst. 17(5): 381-394 (1992) | |
42 | EE | Jen Nan Chen, Chin-Chen Chang: A Chinese Character Retrieval Scheme Using Shuang Pinyin. J. Inf. Sci. Eng. 8(3): 487-507 (1992) |
1991 | ||
41 | Chin-Chen Chang, C. Y. Chen, J. K. Jan: On the Design of a Machine-Independent Perfect Hashing Scheme. Comput. J. 34(5): 469-474 (1991) | |
40 | EE | J. K. Jan, Chin-Chen Chang, S. J. Wang: A dynamic key-lock-pair access control scheme. Computers & Security 10(2): 129-139 (1991) |
39 | EE | Chin-Chen Chang, C. Y. Chen: A note on allocating k-ary multiple key hashing files among multiple disks. Inf. Sci. 55(1-3): 69-76 (1991) |
38 | Chu-Hsing Lin, Chin-Chen Chang, Tzong-Chen Wu, Richard C. T. Lee: Password authentication using Newton's interpolating polynomials. Inf. Syst. 16(1): 97-102 (1991) | |
37 | C. Y. Chen, Chin-Chen Chang, Richard C. T. Lee: On the design of multiple key hashing files for concurrent orthogonal range retrieval between two disks. Inf. Syst. 16(6): 613-625 (1991) | |
36 | EE | Chin-Chen Chang: A Composite Perfect Hashing Scheme for Large Letter-Oriented Key Sets. J. Inf. Sci. Eng. 7(2): 173-186 (1991) |
35 | EE | Chin-Chen Chang: Spatial Match Retrieval of Symbolic Pictures. J. Inf. Sci. Eng. 7(3): 405-422 (1991) |
34 | EE | Chin-Chen Chang, S. M. Hwang, Daniel J. Buehrer: A shape recognition scheme based on relative distances of feature points from the centroid. Pattern Recognition 24(11): 1053-1063 (1991) |
33 | EE | Chin-Chen Chang, Suh-Yin Lee: Retrieval of similar pictures on pictorial databases. Pattern Recognition 24(7): 675-680 (1991) |
32 | Chin-Chen Chang, Tzong-Chen Wu: A Letter-oriented Perfect Hashing Scheme Based upon Sparse Table Compression. Softw., Pract. Exper. 21(1): 35-49 (1991) | |
1990 | ||
31 | Chin-Chen Chang, Chu-Hsing Lin: A Reciprocal Confluence Tree Unit and Its Applications. BIT 30(1): 27-33 (1990) | |
30 | EE | Chu-Hsing Lin, Richard C. T. Lee, Chin-Chen Chang: A Dynamic Access Control Mechanism in Information Protection Systems. J. Inf. Sci. Eng. 6(1): 25-35 (1990) |
29 | EE | Chin-Chen Chang, Ling-Hua Wu: A New Password Authentication Scheme. J. Inf. Sci. Eng. 6(2): 139-147 (1990) |
1989 | ||
28 | EE | Chin-Chen Chang, D. F. Leu: Multikey Sorting as a File Organization Scheme When Queries Are Not Equally Likely. DASFAA 1989: 219-224 |
1988 | ||
27 | EE | Chin-Chen Chang, C. Y. Chen: Orthogonal Range Retrieval Using Bucket Address Hashing. SSDBM 1988: 133-140 |
26 | Chin-Chen Chang: Application of Principal Component Analysis to Multi-Disk Concurrent Accessing. BIT 28(2): 205-214 (1988) | |
25 | Chin-Chen Chang, C. Y. Chen: A Recursive Performance Formula of the Disc Modulo Allocation Method for Binary Cartesian Product Files. Comput. J. 31(6): 565-566 (1988) | |
24 | Chin-Chen Chang, C. H. Chang: An Ordered Minimal Perfect Hashing Scheme with Single Parameter. Inf. Process. Lett. 27(2): 79-83 (1988) | |
1987 | ||
23 | Chin-Chen Chang, C. Y. Chen: Performance of Two-Disk Partition Data Allocations. BIT 27(3): 306-314 (1987) | |
22 | Chin-Chen Chang: An Information Protection Scheme Based Upon Number Theory. Comput. J. 30(3): 249-253 (1987) | |
21 | Chin-Chen Chang, C. Y. Chen: Performance Analysis of the Generalised Disc Modulo Allocation method for Multiple Key Hashing Files on Multi-Disc Systems. Comput. J. 30(6): 535-540 (1987) | |
20 | EE | Chin-Chen Chang, C. Y. Chen: Some Properties of Cartesian Product Files for Disk Modulo Allocation Method in a Two-disk System. J. Inf. Sci. Eng. 3(2): 151-176 (1987) |
19 | EE | Chin-Chen Chang, C. Y. Chen: Gray Code as a De-clustering Scheme for Concurrent Disk Retrieval. J. Inf. Sci. Eng. 3(2): 177-188 (1987) |
1986 | ||
18 | EE | Chin-Chen Chang, J. C. Shieh: On the Design of Ordered Minimal Perfect Hashing Functions. ICDE 1986: 112-115 |
17 | EE | M. T. Fang, Richard C. T. Lee, Chin-Chen Chang: The Idea of De-Clustering and its Applications. VLDB 1986: 181-188 |
16 | Chin-Chen Chang: On the Design of a Key-Lock-Pair Mechanism in Information Protection Systems. BIT 26(4): 410-417 (1986) | |
15 | Chin-Chen Chang, Richard C. T. Lee: A Letter-Oriented Minimal Perfect Hashing Scheme. Comput. J. 29(3): 277-281 (1986) | |
14 | EE | Chin-Chen Chang: Letter-oriented reciprocal hashing scheme. Inf. Sci. 38(3): 243-255 (1986) |
13 | EE | Chin-Chen Chang: A scheme for constructing ordered minimal perfect hashing functions. Inf. Sci. 39(2): 187-195 (1986) |
1985 | ||
12 | Chin-Chen Chang, Jaw-Ji Shen: Consecutive Retrieval Organization as a File Allocation Scheme on Multiple Disk Systems. FODO 1985: 113-124 | |
11 | Chin-Chen Chang, L. S. Lian: On Strict Optimality Property of Allocating Binary Cartesian Product Files on Multiple Disk Systems. FODO 1985: 159-175 | |
10 | Chin-Chen Chang, J. C. Shieh: On the Complexity of File Allocation Problem. FODO 1985: 177-181 | |
9 | Chin-Chen Chang: Database Research and Development in Taiwan. FODO 1985: 603-605 | |
8 | Chin-Chen Chang: The Study of a Letter Oriented Minimal Perfect Hashing Scheme. FODO 1985: 91-99 | |
7 | Clement T. Yu, Chin-Chen Chang, Marjorie Templeton, David Brill, Eric Lund: Query Processing in a Fragmented Relational Distributed System: Mermaid. IEEE Trans. Software Eng. 11(8): 795-810 (1985) | |
1984 | ||
6 | Chin-Chen Chang, M. W. Du, Richard C. T. Lee: Performance Analyses of Cartesian Product Files and Random Files. IEEE Trans. Software Eng. 10(1): 88-99 (1984) | |
5 | EE | Chin-Chen Chang: An ordered minimal perfect hashing scheme based upon Euler's theorem. Inf. Sci. 32(3): 165-172 (1984) |
4 | EE | Chin-Chen Chang: Optimal information retrieval when queries are not random. Inf. Sci. 34(3): 199-223 (1984) |
1983 | ||
3 | EE | Chin-Chen Chang, M. W. Du, Richard C. T. Lee: The hierarchical ordering in multiattribute files. Inf. Sci. 31(1): 41-75 (1983) |
1982 | ||
2 | Chin-Chen Chang, Richard C. T. Lee, M. W. Du: Symbolic Gray Code as a Perfect Multiattribute Hashing Scheme for Partial Match Queries. IEEE Trans. Software Eng. 8(3): 235-249 (1982) | |
1980 | ||
1 | EE | Chin-Chen Chang, Richard C. T. Lee, David Hung-Chang Du: Some Properties of Cartesian Product Files. SIGMOD Conference 1980: 157-168 |