Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Chin-Chen
    Last name: Chang
    DBLP: c/ChinChenChang
    Rating: (not rated yet)

    Below you find the publications which have been written by this author.

    Show item 1 to 10 of 882  
    Select a publication
    Show Title Venue Rating Date
    Journal article
    Li Liu, Anhong Wang, Chin-Chen Chang, Zhihong Li.
    A Secret Image Sharing with Deep-steganography and Two-stage Authentication Based on Matrix Encoding.
    I. J. Network Security 2017, Volume 19 (0) 2017
    Journal article
    Qian Mao, Chin-Chen Chang.
    Turbo Unequal Error Protection Codes with Multiple Protection Levels.
    I. J. Network Security 2017, Volume 19 (0) 2017
    Conference paper
    Chuan Qin, Ping Ji, Jinwei Wang, Chin-Chen Chang.
    Fragile image watermarking scheme based on VQ index sharing and self-embedding.
    Multimedia Tools Appl. 2017, Volume 76 (0) 2017
    Conference paper
    Hui Tian, Yanpeng Wu, Chin-Chen Chang, Yongfeng Huang, Yonghong Chen, Tian Wang, Yiqiao Cai, Jin Liu.
    Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs.
    Signal Processing 2017, Volume 134 (0) 2017
    Journal article
    Junlan Bai, Chin-Chen Chang, Thai-Son Nguyen, Ce Zhu, Yanjun Liu.
    A high payload steganographic algorithm based on edge detection.
    Displays 2017, Volume 46 (0) 2017
    Conference paper
    Xu Zhuang, Yan Zhu 0001, Chin-Chen Chang, Qiang Peng.
    Feature bundling in decision tree algorithm.
    Intell. Data Anal. 2017, Volume 21 (0) 2017
    Conference paper
    Hui Tian, Zhaoyi Chen, Chin-Chen Chang, Minoru Kuribayashi, Yongfeng Huang, Yiqiao Cai, Yonghong Chen, Tian Wang.
    Enabling public auditability for operation behaviors in cloud storage.
    Soft Comput. 2017, Volume 21 (0) 2017
    Conference paper
    Jianfeng Lu, Zaorang Yang, Lina Li, Wenqiang Yuan, Li Li, Chin-Chen Chang.
    Multiple Schemes for Mobile Payment Authentication Using QR Code and Visual Cryptography.
    Mobile Information Systems 2017, Volume 2017 (0) 2017
    Conference paper
    Hui Tian, Jun Sun, Chin-Chen Chang, Jie Qin, Yonghong Chen.
    Hiding Information Into Voice-Over-IP Streams Using Adaptive Bitrate Modulation.
    IEEE Communications Letters 2017, Volume 21 (0) 2017
    Conference paper
    Weibo Chu, Li-Fang Wang, Ze-Jun Jiang, Chin-Chen Chang.
    Protecting User Privacy in a Multi-Path Information-Centric Network Using Multiple Random-Caches.
    J. Comput. Sci. Technol. 2017, Volume 32 (0) 2017
    Show item 1 to 25 of 882  

    Your query returned 882 matches in the database.