Chin-Chen Chang

According to our database1, Chin-Chen Chang authored at least 47 papers between 1985 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Adjacency-Hash-Table Based Public Auditing for Data Integrity in Mobile Cloud Computing.
Wireless Communications and Mobile Computing, 2018

Data Hiding Based on a Two-Layer Turtle Shell Matrix.
Symmetry, 2018

New Secret Sharing Scheme Based on Faster R-CNNs Image Retrieval.
IEEE Access, 2018

Efficient Cross-User Deduplication of Encrypted Data Through Re-Encryption.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Multiple Schemes for Bike-Share Service Authentication Using QR Code and Visual Cryptography.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Novel Framework of Robust Video Watermarking Based on Statistical Model.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2012
Image Tamper Detection and Recovery Based on Dual Watermarks Sharing Strategy.
JDIM, 2012

2010
Guest Editorial.
JNW, 2010

2009
An Image Copyright Protection Scheme Using DCT and a Table Look-up Technique.
JDIM, 2009

A Secure Multicast Framework in Large and High-Mobility Network Groups.
IEICE Transactions, 2009

2008
Reversible Data Embedding for Color Images.
JDIM, 2008

2007
Hiding Secret Information Using Adaptive Side-Match VQ.
IEICE Transactions, 2007

Reversible Data Hiding in the VQ-Compressed Domain.
IEICE Transactions, 2007

Recoverable Tamper Proofing Technique for Image Authentication Using Irregular Sampling Coding.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006
A novel data hiding scheme for keeping high stego-image quality.
Proceedings of the 12th International Conference on Multi Media Modeling (MMM 2006), 2006

An Untraceable Forward-Secure Blind Signature Scheme.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006

A Cryptanalysis on a Generalized Threshold Cryptosystem.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006

An Improvement of the Design of Integrating Subliminal Channel with Access Control.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006

Comments on Distributed Sign-and-Encryption Schemes.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006

A Scheme for (t, n)-Threshold Secret Image Sharing.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006

A secure improvement on the user-friendly remote authentication scheme with no time concurrency mech.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

Enhanced Anonymous Auction Protocols with Freewheeling Bids.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
A Steganographic Method for Hiding Secret Data Using Side Match Vector Quantization.
IEICE Transactions, 2005

A Simple Forward Secure Blind Signature Scheme Based on Master Keys and Blind Signatures.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Content-Based Retrieval Concept.
Proceedings of the Encyclopedia of Information Science and Technology (5 Volumes), 2005

2004
A Pattern Mapping Based Digital Image Watermarking.
Informatica (Slovenia), 2004

Public-Key Inter-Block Dependence Fragile Watermarking for Image Authentication Using Continued Fraction.
Informatica (Slovenia), 2004

Gesture recognition approach for sign language using curvature scale space and hidden Markov model.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

Novel hierarchical approach for radiosity.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

The Security Flaw of an Untraceable Signature Scheme.
Proceedings of the Fourth International Conference on Electronic Business, 2004

2003
An Efficient Block-based Scheme for Progressively Transmitting Lossless Images.
Proceedings of the 9th International Conference on Multi-Media Modeling, 2003

2002
A novel progressive modelling algorithm for 3D models.
Journal of Visualization and Computer Animation, 2002

A Fuzzy-based Approach to Mesh Simplification.
J. Inf. Sci. Eng., 2002

An improvement of a technique for color quantization using reduction of color space dimensionality.
Informatica (Slovenia), 2002

An Algorithm for Color Image Compression Base on Common Bit Map Block Truncation Coding.
Proceedings of the 6th Joint Conference on Information Science, 2002

An Inverse Halftoning Technique using Genetic Algorithm.
Proceedings of the Information Systems and Databases (ISDB 2002), 2002

A Compact Patricia Trie for a Large Set of Keys.
Proceedings of the Information Systems and Databases (ISDB 2002), 2002

Hand Pose Recognition Using Curvature Scale Space.
Proceedings of the 16th International Conference on Pattern Recognition, 2002

2001
Image matching using run-length feature.
Pattern Recognition Letters, 2001

Cryptographic key assignment scheme for hierarchical access control.
Comput. Syst. Sci. Eng., 2001

A Fuzzy Inference System for Simplifying Surfaces with Color.
Proceedings of the Advances in Multimedia Information Processing, 2001

Concealing a Secret Image Using the Breadth First Traversal Linear Quadtree Structure.
CODAS, 2001

2000
A Technique for Computing Watermarks from Digital Images.
Informatica (Slovenia), 2000

A Digital Watermarking Scheme Using Human Visual Effects.
Informatica (Slovenia), 2000

1997
Proper interval graphs and the guard problem.
Discrete Mathematics, 1997

1995
Connected Proper Interval Graphs and the Guard Problem in Spiral Polygons.
Proceedings of the Combinatorics and Computer Science, 1995

1985
Query Processing in a Fragmented Relational Distributed System: Mermaid.
IEEE Trans. Software Eng., 1985


  Loading...