Follow
Chin-Chen Chang
Title
Cited by
Cited by
Year
Reversible data hiding based on histogram modification of pixel differences
WL Tai, CM Yeh, CC Chang
IEEE transactions on circuits and systems for video technology 19 (6), 906-910, 2009
7202009
A steganographic method based upon JPEG and quantization table modification
CC Chang, TS Chen, LZ Chung
Information Sciences 141 (1-2), 123-138, 2002
5152002
Remote password authentication with smart cards
CC Chang, TC Wu
IEE Proceedings E (Computers and Digital Techniques) 138 (3), 165-168, 1991
4981991
SVD-based digital image watermarking scheme
CC Chang, P Tsai, CC Lin
Pattern Recognition Letters 26 (10), 1577-1586, 2005
4952005
Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy
CC Chang, JY Hsiao, CS Chan
Pattern Recognition 36 (7), 1583-1595, 2003
4762003
Multilevel reversible data hiding based on histogram modification of difference images
CC Lin, WL Tai, CC Chang
Pattern Recognition 41 (12), 3582-3591, 2008
4422008
Reversible hiding in DCT-based compressed images
CC Chang, CC Lin, CS Tseng, WL Tai
Information Sciences 177 (13), 2768-2786, 2007
4152007
A new encryption algorithm for image cryptosystems
CC Chang, MS Hwang, TS Chen
Journal of Systems and Software 58 (2), 83-91, 2001
4102001
Blockchain based searchable encryption for electronic health record sharing
L Chen, WK Lee, CC Chang, KKR Choo, N Zhang
Future generation computer systems 95, 420-429, 2019
3872019
A steganographic method for digital images using side match
CC Chang, HW Tseng
Pattern Recognition Letters 25 (12), 1431-1437, 2004
3582004
Isolated items discarding strategy for discovering high utility itemsets
YC Li, JS Yeh, CC Chang
Data & Knowledge Engineering 64 (1), 198-217, 2008
3552008
Anti-CD3 and nasal proinsulin combination therapy enhances remission from recent-onset autoimmune diabetes by inducing Tregs
D Bresson, L Togher, E Rodrigo, Y Chen, JA Bluestone, KC Herold, ...
The Journal of clinical investigation 116 (5), 1371-1381, 2006
3472006
A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks
CC Chang, HD Le
IEEE Transactions on wireless communications 15 (1), 357-366, 2015
3212015
Sharing secrets in stego images with authentication
CC Chang, YP Hsieh, CH Lin
Pattern Recognition 41 (10), 3130-3137, 2008
3112008
Chronological evolution of IgM, IgA, IgG and neutralisation antibodies after infection with SARS-associated coronavirus
PR Hsueh, LM Huang, PJ Chen, CL Kao, PC Yang
Clinical microbiology and infection 10 (12), 1062-1066, 2004
2972004
A virtual image cryptosystem based upon vector quantization
TS Chen, CC Chang, MS Hwang
IEEE transactions on Image Processing 7 (10), 1485-1488, 1998
2921998
A reversible data hiding scheme based on side match vector quantization
CC Chang, WL Tai, CC Lin
IEEE Transactions on Circuits and Systems for Video Technology 16 (10), 1301 …, 2006
2742006
An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
JH Yang, CC Chang
Computers & security 28 (3-4), 138-143, 2009
2722009
High payload steganography mechanism using hybrid edge detector
WJ Chen, CC Chang, THN Le
Expert Systems with applications 37 (4), 3292-3301, 2010
2672010
A new model for optimal routing and wavelength assignment in wavelength division multiplexed optical networks
C Chen, S Banerjee
Proceedings of IEEE INFOCOM'96. Conference on Computer Communications 1, 164-171, 1996
2561996
The system can't perform the operation now. Try again later.
Articles 1–20