Chin-Chen Chang
Cited by
Cited by
Reversible data hiding based on histogram modification of pixel differences
WL Tai, CM Yeh, CC Chang
IEEE transactions on circuits and systems for video technology 19 (6), 906-910, 2009
A steganographic method based upon JPEG and quantization table modification
CC Chang, TS Chen, LZ Chung
Information Sciences 141 (1-2), 123-138, 2002
Remote password authentication with smart cards
CC Chang, TC Wu
IEE Proceedings E (Computers and Digital Techniques) 138 (3), 165-168, 1991
SVD-based digital image watermarking scheme
CC Chang, P Tsai, CC Lin
Pattern Recognition Letters 26 (10), 1577-1586, 2005
Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy
CC Chang, JY Hsiao, CS Chan
Pattern Recognition 36 (7), 1583-1595, 2003
Multilevel reversible data hiding based on histogram modification of difference images
CC Lin, WL Tai, CC Chang
Pattern Recognition 41 (12), 3582-3591, 2008
Reversible hiding in DCT-based compressed images
CC Chang, CC Lin, CS Tseng, WL Tai
Information Sciences 177 (13), 2768-2786, 2007
A new encryption algorithm for image cryptosystems
CC Chang, MS Hwang, TS Chen
Journal of Systems and Software 58 (2), 83-91, 2001
Blockchain based searchable encryption for electronic health record sharing
L Chen, WK Lee, CC Chang, KKR Choo, N Zhang
Future generation computer systems 95, 420-429, 2019
A steganographic method for digital images using side match
CC Chang, HW Tseng
Pattern Recognition Letters 25 (12), 1431-1437, 2004
Isolated items discarding strategy for discovering high utility itemsets
YC Li, JS Yeh, CC Chang
Data & Knowledge Engineering 64 (1), 198-217, 2008
Anti-CD3 and nasal proinsulin combination therapy enhances remission from recent-onset autoimmune diabetes by inducing Tregs
D Bresson, L Togher, E Rodrigo, Y Chen, JA Bluestone, KC Herold, ...
The Journal of clinical investigation 116 (5), 1371-1381, 2006
A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks
CC Chang, HD Le
IEEE Transactions on wireless communications 15 (1), 357-366, 2015
Sharing secrets in stego images with authentication
CC Chang, YP Hsieh, CH Lin
Pattern Recognition 41 (10), 3130-3137, 2008
Chronological evolution of IgM, IgA, IgG and neutralisation antibodies after infection with SARS-associated coronavirus
PR Hsueh, LM Huang, PJ Chen, CL Kao, PC Yang
Clinical microbiology and infection 10 (12), 1062-1066, 2004
A virtual image cryptosystem based upon vector quantization
TS Chen, CC Chang, MS Hwang
IEEE transactions on Image Processing 7 (10), 1485-1488, 1998
A reversible data hiding scheme based on side match vector quantization
CC Chang, WL Tai, CC Lin
IEEE Transactions on Circuits and Systems for Video Technology 16 (10), 1301 …, 2006
An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
JH Yang, CC Chang
Computers & security 28 (3-4), 138-143, 2009
High payload steganography mechanism using hybrid edge detector
WJ Chen, CC Chang, THN Le
Expert Systems with applications 37 (4), 3292-3301, 2010
A new model for optimal routing and wavelength assignment in wavelength division multiplexed optical networks
C Chen, S Banerjee
Proceedings of IEEE INFOCOM'96. Conference on Computer Communications 1, 164-171, 1996
The system can't perform the operation now. Try again later.
Articles 1–20