Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Chin-Chen
    Last name: Chang
    DBLP: c/ChinChenChang
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 100 of 862  
    Select a publication
    Show Title Venue Rating Date
    Journal article
    Li Liu, Anhong Wang, Chin-Chen Chang, Zhihong Li.
    A Secret Image Sharing with Deep-steganography and Two-stage Authentication Based on Matrix Encoding.
    I. J. Network Security 2017, Volume 19 (0) 2017
    Journal article
    Qian Mao, Chin-Chen Chang.
    Turbo Unequal Error Protection Codes with Multiple Protection Levels.
    I. J. Network Security 2017, Volume 19 (0) 2017
    Conference paper
    Chuan Qin, Ping Ji, Jinwei Wang, Chin-Chen Chang.
    Fragile image watermarking scheme based on VQ index sharing and self-embedding.
    Multimedia Tools Appl. 2017, Volume 76 (0) 2017
    Conference paper
    Wen-Chung Kuo, Sheng-Yi Chang, Chun-Cheng Wang, Chin-Chen Chang.
    Secure multi-group data hiding based on gemd map.
    Multimedia Tools Appl. 2017, Volume 76 (0) 2017
    Journal article
    Zhi-Hui Wang, Xu Zhuang, Chin-Chen Chang, Chuan Qin, Yan Zhu 0001.
    Reversible Data Hiding Based on Geometric Structure of Pixel Groups.
    I. J. Network Security 2016, Volume 18 (0) 2016
    Journal article
    Feng Wang, Chin-Chen Chang, Changlu Lin, Shih-Chang Chang.
    Secure and Efficient Identity-based Proxy Multi-signature Using Cubic Residues.
    I. J. Network Security 2016, Volume 18 (0) 2016
    Conference paper
    Chin-Chen Chang, Chin-Yu Sun, Shih-Chang Chang.
    A Strong RSA-based and Certificateless-based Signature Scheme.
    I. J. Network Security 2016, Volume 18 (0) 2016
    Conference paper
    Hai-Duong Le, Ngoc-Tu Nguyen, Chin-Chen Chang.
    Provably Secure and Efficient Three-Factor Authenticated Key Agreement Scheme with Untraceability.
    I. J. Network Security 2016, Volume 18 (0) 2016
    Conference paper
    Feng Wang, Chin-Chen Chang, Changlu Lin.
    Security Analysis on Secure Untraceable Off-line Electronic Cash System.
    I. J. Network Security 2016, Volume 18 (0) 2016
    Conference paper
    Fan Li, Qian Mao, Chin-Chen Chang.
    A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method.
    I. J. Network Security 2016, Volume 18 (0) 2016
    Conference paper
    Yanjun Liu, Chin-Chen Chang.
    An Integratable Verifiable Secret Sharing Mechanism.
    I. J. Network Security 2016, Volume 18 (0) 2016
    Conference paper
    K. Bharanitharan, Chin-Chen Chang, Yang Hai Rui, Zhi-Hui Wang.
    Efficient Pixel Prediction Algorithm for Reversible Data Hiding.
    I. J. Network Security 2016, Volume 18 (0) 2016
    Journal article
    Chin-Chen Chang, Thai Son Nguyen, Chia-Chen Lin.
    A new distortion-free data embedding scheme for high-dynamic range images.
    Multimedia Tools Appl. 2016, Volume 75 (0) 2016
    Conference paper
    Chin-Chen Chang, Hai-Duong Le.
    A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks.
    IEEE Transactions on Wireless Communications 2016, Volume 15 (0) 2016
    Conference paper
    Chin-Chen Chang, Ting-Fang Cheng, Wei-Yuan Hsueh.
    A robust and efficient dynamic identity-based multi-server authentication scheme using smart cards.
    Int. J. Communication Systems 2016, Volume 29 (0) 2016
    Conference paper
    Yanjun Liu, Chin-Chen Chang, Chin-Yu Sun.
    Notes on "An Anonymous Multi-server Authenticated Key Agreement Scheme Based on Trust Computing Using Smart Card and Biometrics".
    I. J. Network Security 2016, Volume 18 (0) 2016
    Conference paper
    Qing-Qing Xie, Shunrong Jiang, Liangmin Wang, Chin-Chen Chang.
    Composable Secure Roaming Authentication Protocol for Cloud-assisted Body Sensor Networks.
    I. J. Network Security 2016, Volume 18 (0) 2016
    Journal article
    Thai Son Nguyen, Chin-Chen Chang, Tso-Hsien Shih.
    A High-Quality Reversible Image Authentication Scheme Based on Adaptive PEE for Digital Images.
    TIIS 2016, Volume 10 (0) 2016
    Conference paper
    Chin-Chen Chang, Tzu-Chuen Lu, Gwoboa Horng, Ying-Hsuan Huang.
    Very efficient variable-length codes for the lossless compression of VQ indices.
    Multimedia Tools Appl. 2016, Volume 75 (0) 2016
    Conference paper
    Yining Liu, Chi Cheng, Tao Jiang 0002, Chin-Chen Chang.
    A practical lottery using oblivious transfer.
    Int. J. Communication Systems 2016, Volume 29 (0) 2016
    Journal article
    Chin-Chen Chang, Thai Son Nguyen, Meng-Chieh Lin, Chia-Chen Lin.
    A novel data-hiding and compression scheme based on block classification of SMVQ indices.
    Digital Signal Processing 2016, Volume 51 (0) 2016
    Conference paper
    Jhen-Yao Hong, Der-Lor Way, Zen-Chung Shih, Wen-Kai Tai, Chin-Chen Chang.
    Inner engraving for the creation of a balanced LEGO sculpture.
    The Visual Computer 2016, Volume 32 (0) 2016
    Journal article
    Li Li, Jinxia Qiu, Jianfeng Lu, Chin-Chen Chang.
    An aesthetic QR code solution based on error correction mechanism.
    Journal of Systems and Software 2016, Volume 116 (0) 2016
    Journal article
    Wenlong Xu, Chin-Chen Chang, Tung-Shou Chen, Liangmin Wang.
    An improved least-significant-bit substitution method using the modulo three strategy.
    Displays 2016, Volume 42 (0) 2016
    Journal article
    Thai Son Nguyen, Chin-Chen Chang, Wen-Chi Chang.
    High capacity reversible data hiding scheme for encrypted images.
    Sig. Proc.: Image Comm. 2016, Volume 44 (0) 2016
    Conference paper
    Qiong Wu, Chen Zhu, Jianjun Li, Chin-Chen Chang, Zhi-Hui Wang.
    A magic cube based information hiding scheme of large payload.
    J. Inf. Sec. Appl. 2016, Volume 26 (0) 2016
    Conference paper
    Hong Zhong, Song Li, Ting-Fang Cheng, Chin-Chen Chang.
    An Efficient Electronic English Auction System with a Secure On-Shelf Mechanism and Privacy Preserving.
    J. Electrical and Computer Engineering 2016, Volume 2016 (0) 2016
    Conference paper
    Chin-Chen Chang, Wei-Yuan Hsueh, Ting-Fang Cheng.
    A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks.
    Wireless Personal Communications 2016, Volume 89 (0) 2016
    Conference paper
    Hsiao-Ling Wu, Chin-Chen Chang, Chin-Yu Sun.
    A secure authentication scheme with provable correctness for pay-TV systems.
    Security and Communication Networks 2016, Volume 9 (0) 2016
    Conference paper
    Zhihong Li, Qiang Jin, Chin-Chen Chang, Li Liu, Anhong Wang.
    A Common Bitmap Block Truncation Coding for Color Images Based on Binary Ant Colony Optimization.
    TIIS 2016, Volume 10 (0) 2016
    Conference paper
    Thai Son Nguyen, Chin-Chen Chang, Huan-Sheng Hsueh.
    High capacity data hiding for binary image based on block classification.
    Multimedia Tools Appl. 2016, Volume 75 (0) 2016
    Conference paper
    Junlan Bai, Chin-Chen Chang.
    A High Payload Steganographic Scheme for Compressed Images with Hamming Code.
    I. J. Network Security 2016, Volume 18 (0) 2016
    Conference paper
    Chin-Chen Chang, Wei-Yuan Hsueh, Ting-Fang Cheng.
    An Advanced Anonymous and Biometrics-based Multi-server Authentication Scheme Using Smart Cards.
    I. J. Network Security 2016, Volume 18 (0) 2016
    Conference paper
    Li Liu, Chin-Chen Chang, Anhong Wang.
    Reversible data hiding scheme based on histogram shifting of n-bit planes.
    Multimedia Tools Appl. 2016, Volume 75 (0) 2016
    Conference paper
    Feng Wang, Chin-Chen Chang, Shih-Chang Chang.
    Robust off-line e-cash scheme with recoverability and anonymity revocation.
    Security and Communication Networks 2016, Volume 9 (0) 2016
    Conference paper
    Chin-Chen Chang, Wei-yi Chen, Shih-Chang Chang.
    A highly efficient and secure electronic cash system based on secure sharing in cloud environment.
    Security and Communication Networks 2016, Volume 9 (0) 2016
    Conference paper
    Chin-Chen Chang, Ngoc-Tu Nguyen.
    An Untraceable Biometric-Based Multi-server Authenticated Key Agreement Protocol with Revocation.
    Wireless Personal Communications 2016, Volume 90 (0) 2016
    Conference paper
    Hui Tian, Yanpeng Wu, Chin-Chen Chang, Yongfeng Huang, Jin Liu, Tian Wang, Yonghong Chen, Yiqiao Cai.
    Steganalysis of analysis-by-synthesis speech exploiting pulse-position distribution characteristics.
    Security and Communication Networks 2016, Volume 9 (0) 2016
    Conference paper
    Ting-Hao Lin, Der-Lor Way, Zen-Chung Shih, Wen-Kai Tai, Chin-Chen Chang.
    An Efficient Structure-Aware Bilateral Texture Filtering for Image Smoothing.
    Comput. Graph. Forum 2016, Volume 35 (0) 2016
    Conference paper
    Fan Li, K. Bharanitharan, Chin-Chen Chang, Qian Mao.
    Bi-stretch reversible data hiding algorithm for absolute moment block truncation coding compressed images.
    Multimedia Tools Appl. 2016, Volume 75 (0) 2016
    Conference paper
    Sheng-Hsun Hsieh, Yung-Hui Li, Chung-Hao Tien, Chin-Chen Chang.
    Extending the Capture Volume of an Iris Recognition System Using Wavefront Coding and Super-Resolution.
    IEEE T. Cybernetics 2016, Volume 46 (0) 2016
    Conference paper
    Zhi-Hui Wang, Ya-Feng Di, Jianjun Li, Chin-Chen Chang, Hui Liu.
    Progressive secret image sharing scheme using meaningful shadows.
    Security and Communication Networks 2016, Volume 9 (0) 2016
    Journal article
    Li Li, Zihui Dong, Jianfeng Lu, Junping Dai, Qianru Huang, Chin-Chen Chang, Ting Wu.
    AN H.264/AVC HDTV watermarking algorithm robust to camcorder recording.
    J. Visual Communication and Image Representation 2015, Volume 26 (0) 2015
    Journal article
    Changlu Lin, Yong Li 0002, Kewei Lv, Chin-Chen Chang.
    Ciphertext-Auditable Identity-Based Encryption.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Conference paper
    Chin-Chen Chang, Chin-Yu Sun, Ting-Fang Cheng.
    A dependable storage service system in cloud environment.
    Security and Communication Networks 2015, Volume 8 (0) 2015
    Journal article
    Chin-Chen Chang, Thai Son Nguyen, Chia-Chen Lin.
    A reversible compression code hiding using SOC and SMVQ indices.
    Inf. Sci. 2015, Volume 300 (0) 2015
    Conference paper
    Cheng Guo, Chin-Chen Chang.
    A Novel Threshold Conference-Key Agreement Protocol Based on Generalized Chinese Remainder Theorem.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Conference paper
    Feng Wang, Chin-Chen Chang, Yeh-Chieh Chou.
    Group Authentication and Group Key Distribution for Ad Hoc Networks.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Conference paper
    Chuan Qin, Chin-Chen Chang, Chia-Chun Lin.
    An adaptive reversible steganographic scheme based on the just noticeable distortion.
    Multimedia Tools Appl. 2015, Volume 74 (0) 2015
    Journal article
    Ngoc-Tu Huynh, K. Bharanitharan, Chin-Chen Chang.
    Quadri-directional searching algorithm for secret image sharing using meaningful shadows.
    J. Visual Communication and Image Representation 2015, Volume 28 (0) 2015
    Conference paper
    Yanjun Liu, Lein Harn, Chin-Chen Chang.
    A novel verifiable secret sharing mechanism using theory of numbers and a method for sharing secrets.
    Int. J. Communication Systems 2015, Volume 28 (0) 2015
    Conference paper
    Qian Mao, Chin-Chen Chang, Lein Harn, Shih-Chang Chang.
    An image-based key agreement protocol using the morphing technique.
    Multimedia Tools Appl. 2015, Volume 74 (0) 2015
    Conference paper
    Xing-Tian Wang, Mingchu Li, Szu-Ting Wang, Chin-Chen Chang.
    Reversible data hiding exploiting high-correlation regulation for high-quality images.
    Security and Communication Networks 2015, Volume 8 (0) 2015
    Conference paper
    Chuan Qin, Chin-Chen Chang, Gwoboa Horng, Ying-Hsuan Huang, Yen-Chang Chen.
    Reversible data embedding for vector quantization compressed images using search-order coding and index parity matching.
    Security and Communication Networks 2015, Volume 8 (0) 2015
    Journal article
    Jung-San Lee, Chin-Chen Chang, Ngoc-Tu Huynh, Hsin-Yi Tsai.
    Preserving user-friendly shadow and high-contrast quality for multiple visual secret sharing technique.
    Digital Signal Processing 2015, Volume 40 (0) 2015
    Conference paper
    Chin-Chen Chang, Yeh-Chieh Chou, Chin-Yu Sun.
    Novel and practical scheme based on secret sharing for laptop data protection.
    IET Information Security 2015, Volume 9 (0) 2015
    Conference paper
    Zhao-Xia Yin, Chin-Chen Chang, Qin Xu, Bin Luo.
    Second-order steganographic method based on adaptive reference matrix.
    IET Image Processing 2015, Volume 9 (0) 2015
    Conference paper
    Hai-Duong Le, Chin-Chen Chang, Yeh-Chieh Chou.
    A Novel Untraceable Authentication Scheme for Mobile Roaming in GLOMONET.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Conference paper
    Chenglian Liu, Chin-Chen Chang, Zhi-Pan Wu, Shi-Lin Ye.
    A Study of Relationship between RSA Public Key Cryptosystem and Goldbach's Conjecture Properties.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Conference paper
    Chin-Chen Chang, Hai-Duong Le.
    A provably secure smart card-based authenticated group key exchange protocol.
    Security and Communication Networks 2015, Volume 8 (0) 2015
    Journal article
    Qian Mao, Fan Li, Chin-Chen Chang.
    Reversible data hiding with oriented and minimized distortions using cascading trellis coding.
    Inf. Sci. 2015, Volume 317 (0) 2015
    Conference paper
    Chin-Chen Chang, Thai Son Nguyen.
    A Reversible Data Hiding Scheme for SMVQ Indices.
    Informatica, Lith. Acad. Sci. 2014, Volume 25 (0) 2015
    Conference paper
    Chuan Qin, Chin-Chen Chang, Tai-Jung Hsu.
    Reversible data hiding scheme based on exploiting modification direction with two steganographic images.
    Multimedia Tools Appl. 2015, Volume 74 (0) 2015
    Conference paper
    Chin-Chen Chang, Iuon-Chang Lin, Yi-Lun Chi.
    Secure Electronic Coupons.
    10th Asia Joint Conference on Information Security, AsiaJCIS 2015, Kaohsiung City, Taiwan, May 24-26, 2015 2015 (0) 2015
    Conference paper
    Shengyun Zhai, Fan Li, Chin-Chen Chang, Qian Mao.
    A Meaningful Scheme for Sharing Secret Images Using Mosaic Images.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Conference paper
    Chin-Chen Chang, Jen-Ho Yang, Yu-Ching Wu.
    An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Conference paper
    Chin-Feng Lee, Chin-Chen Chang, Pei-Yan Pai, Chia-Ming Liu.
    Adjustment Hiding Method Based on Exploiting Modification Direction.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Conference paper
    Junlan Bai, Chin-Chen Chang, Ce Zhu.
    A Reversible Data Hiding Scheme Using Ordered Cluster-Based VQ Index Tables for Complex Images.
    Image and Graphics - 8th International Conference, ICIG 2015, Tianjin, China, August 13-16, 2015, Proceedings, Part I 2015 (0) 2015
    Conference paper
    Qian Mao, K. Bharanitharan, Chin-Chen Chang.
    A Proxy User Authentication Protocol Using Source-Based Image Morphing.
    Comput. J. 2015, Volume 58 (0) 2015
    Conference paper
    Wenjie Liu, Anhong Wang, Chin-Chen Chang, Zhihong Li, Li Liu.
    A grouped-scalable secret image sharing scheme.
    Multimedia Tools Appl. 2015, Volume 74 (0) 2015
    Conference paper
    Qingzheng Hou, Junping Dai, Li Li, Jianfeng Lu, Chin-Chen Chang.
    Scanned binary image watermarking based on additive model and sampling.
    Multimedia Tools Appl. 2015, Volume 74 (0) 2015
    Conference paper
    Feng Wang, Chin-Chen Chang, Wan-Li Lyu.
    The credit card visual authentication scheme based on GF(28) field.
    Multimedia Tools Appl. 2015, Volume 74 (0) 2015
    Journal article
    Fei Yu, Chin-Chen Chang, Jian Shu, Iftikhar Ahmad, Jun Zhang, José María de Fuentes.
    Recent Advances in Security and Privacy for Wireless Sensor Networks.
    J. Sensors 2015, Volume 2015 (0) 2015
    Journal article
    Thai Son Nguyen, Chin-Chen Chang, Ngoc-Tu Huynh.
    A novel reversible data hiding scheme based on difference-histogram modification and optimal EMD algorithm.
    J. Visual Communication and Image Representation 2015, Volume 33 (0) 2015
    Journal article
    Thai Son Nguyen, Chin-Chen Chang.
    A reversible data hiding scheme based on the Sudoku technique.
    Displays 2015, Volume 39 (0) 2015
    Conference paper
    Chin-Chen Chang, Ying-Hsuan Huang, Wei-Chi Chang.
    Reversible data hiding for VQ indices using XOR operator and SOC codes.
    2015 International Conference on Machine Learning and Cybernetics, ICMLC 2015, Guangzhou, China, July 12-15, 2015 2015 (0) 2015
    Conference paper
    Qian Mao, K. Bharanitharan, Chin-Chen Chang.
    Multi-round dynamic swap optimisation for table-based steganography.
    IET Image Processing 2015, Volume 9 (0) 2015
    Conference paper
    Zhi-Hui Wang, Kuo-Nan Chen, Chin-Chen Chang, Chuan Qin.
    Sharing a Large Secret Image Using Meaningful Shadows Based on VQ and Inpainting.
    TIIS 2015, Volume 9 (0) 2015
    Conference paper
    Jianjun Li, Na Wu, Zhihui Wang, Jiayou Du, Xiaofeng Fu, Chin-Chen Chang.
    Enhancement of the Quality of Images Based on Multiple Threshold Segmentation and Adaptive Gamma Correction.
    2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2015, Adelaide, Australia, September 23-25, 2015 2015 (0) 2015
    Conference paper
    Jianjun Li, Lijuan Meng, Zhihui Wang, Jiayou Du, Xiaofeng Fu, Chin-Chen Chang.
    A Modified IMM-CSRF Algorithm for Passive Tracking of Maneuvering Targets.
    2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2015, Adelaide, Australia, September 23-25, 2015 2015 (0) 2015
    Journal article
    Chin-Chen Chang, Iuon-Chang Lin, Chia-Chi Wu.
    A Multipurpose Key Agreement Scheme in Ubiquitous Computing Environments.
    Mobile Information Systems 2015, Volume 2015 (0) 2015
    Journal article
    Chi-Hsien Lin, K. Bharanitharan, Chin-Chen Chang.
    Comments and Proofs to Published Paper - A Novel Reversible Robust Watermarking Algorithm Based on a Chaotic System.
    I. J. Network Security 2014, Volume 16 (0) 2014
    Journal article
    Xi Chen, Yun Liu, Chin-Chen Chang, Cheng Guo.
    Generalized Secret Sharing with Linear Hierarchical Secrets.
    I. J. Network Security 2014, Volume 16 (0) 2014
    Conference paper
    Qian Mao, Chin-Chen Chang, Ting-Feng Chung.
    A Reversible Steganography Suitable for Embedding Small Amounts of Data.
    I. J. Network Security 2014, Volume 16 (0) 2014
    Conference paper
    Xu Zhuang, Chin-Chen Chang, Zhi-Hui Wang, Yan Zhu 0001.
    A Simple Password Authentication Scheme Based on Geometric Hashing Function.
    I. J. Network Security 2014, Volume 16 (0) 2014
    Journal article
    Yanjun Liu, Chin-Chen Chang, Shih-Chang Chang.
    An Access Control Mechanism Based on the Generalized Aryabhata Remainder Theorem.
    I. J. Network Security 2014, Volume 16 (0) 2014
    Journal article
    Chin-Chen Chang, Thai Son Nguyen, Chia-Chen Lin.
    Reversible Image Hiding for High Image Quality Based on Histogram Shifting and Local Complexity.
    I. J. Network Security 2014, Volume 16 (0) 2014
    Journal article
    Chin-Chen Chang, Ngoc-Tu Huynh, Hai-Duong Le.
    Lossless and unlimited multi-image sharing based on Chinese remainder theorem and Lagrange interpolation.
    Signal Processing 2014, Volume 99 (0) 2014
    Journal article
    Li Liu, Anhong Wang, Chin-Chen Chang, Zhihong Li.
    A novel real-time and progressive secret image sharing with flexible shadows based on compressive sensing.
    Sig. Proc.: Image Comm. 2014, Volume 29 (0) 2014
    Journal article
    Chuan Qin, Chin-Chen Chang, Yi-Ping Chiu.
    A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting.
    IEEE Transactions on Image Processing 2014, Volume 23 (0) 2014
    Journal article
    Cheng Guo, Chin-Chen Chang.
    An authenticated group key distribution protocol based on the generalized Chinese remainder theorem.
    Int. J. Communication Systems 2014, Volume 27 (0) 2014
    Journal article
    Chin-Chen Chang, Ting-Fang Cheng.
    A Reliable Real-time Multicast Authentication Protocol with Provable Accuracy.
    Fundam. Inform. 2014, Volume 131 (0) 2014
    Journal article
    Chung-Chuan Wang, Ya-Fen Chang, Chin-Chen Chang, Jinn-ke Jan, Chia-Chen Lin.
    A high capacity data hiding scheme for binary images based on block patterns.
    Journal of Systems and Software 2014, Volume 93 (0) 2014
    Conference paper
    Lein Harn, Fuyou Miao, Chin-Chen Chang.
    Verifiable secret sharing based on the Chinese remainder theorem.
    Security and Communication Networks 2014, Volume 7 (0) 2014
    Conference paper
    Ying-Hsuan Huang, Chin-Chen Chang, Chun-Yu Wu.
    A DNA-based data hiding technique with low modification rates.
    Multimedia Tools Appl. 2014, Volume 70 (0) 2014
    Conference paper
    Thai Son Nguyen, Chin-Chen Chang, Ting-Feng Chung.
    A Tamper-Detection Scheme for BTC-Compressed Images with High-Quality Images.
    TIIS 2014, Volume 8 (0) 2014
    Journal article
    Tzu-Chuen Lu, Chin-Chen Chang, Ying-Hsuan Huang.
    High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting.
    Multimedia Tools Appl. 2014, Volume 72 (0) 2014
    Conference paper
    Chi-Hsien Lin, K. Bharanitharan, Chin-Chen Chang.
    Comments and Proofs to Published Paper - A Novel Reversible Robust Watermarking Algorithm Based on a Chaotic System.
    I. J. Network Security 2014, Volume 16 (0) 2014
    Conference paper
    Chin-Chen Chang, Thai Son Nguyen, Chia-Chen Lin.
    Reversible Data Hiding Scheme for VQ Indices Based on Absolute Difference Trees.
    TIIS 2014, Volume 8 (0) 2014
    Conference paper
    Cheng Guo, Chin-Chen Chang, Chuan Qin.
    A novel (n, t, n) secret image sharing scheme without a trusted third party.
    Multimedia Tools Appl. 2014, Volume 72 (0) 2014
    Show item 1 to 100 of 862  

    Your query returned 862 matches in the database.