# Jen-Chun Chang

According to our database

^{1}, Jen-Chun Chang## Timeline

#### Legend:

Book In proceedings Article PhD thesis Other## Links

#### On csauthors.net:

## Bibliography

2018

The Log-Rank Conjecture for Read- k XOR Functions.

J. Inf. Sci. Eng., 2018

2017

A separable reversible data hiding scheme for encrypted JPEG bitstreams.

Signal Processing, 2017

2016

On Constant-Time-Identification and Privacy-Preserving RFID Protocols: Trade-Off Between Time and Memory.

J. Inf. Sci. Eng., 2016

A High Embedding Capacity Data Hiding Scheme Based upon Permutation Vectors.

Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Reversible SMVQ Image Hiding Using Adaptive Search Order Coding.

Proceedings of the 2016 International Conference on Digital Image Computing: Techniques and Applications, 2016

Reversible Data Hiding in Pairwisely Encrypted Images.

Proceedings of the Third International Conference on Computing Measurement Control and Sensor Network, 2016

2014

On Reversible Data Hiding Schemes for JPEG Images from the Modified Quantization Table.

Proceedings of the Intelligent Systems and Applications, 2014

2013

On Constant-Time-Identification and Privacy-Preserving RFID Protocols: Trade-Off between Time and Memory.

Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

2012

Constructing Constant Composition Codes via Distance-Increasing Mappings.

SIAM J. Discrete Math., 2012

An Efficient Fragile Watermarking Scheme for Pixel-Wise Tamper Detection.

Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

2011

A New Scheme for Data Hiding on Halftone Images.

Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011

2009

A Hybrid RFID Protocol against Tracking Attacks.

IACR Cryptology ePrint Archive, 2009

Distance-increasing mappings from binary vectors to constant composition vectors.

Proceedings of the IEEE International Symposium on Information Theory, 2009

A Hybrid RFID Protocol against Tracking Attacks.

Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

2008

Distance-Preserving and Distance-Increasing Mappings From Ternary Vectors to Permutations.

IEEE Trans. Information Theory, 2008

2007

New Constructions of Distance-Increasing Mappings and Permutation Arrays.

J. Inf. Sci. Eng., 2007

Distance preserving mappings from ternary vectors to permutations

CoRR, 2007

2006

Distance-increasing mappings from binary vectors to permutations that increase hamming distances by at least two.

IEEE Trans. Information Theory, 2006

New simple constructions of distance-increasing mappings from binary vectors to permutations.

Inf. Process. Lett., 2006

2005

Application-Layer conference trees for multimedia multipoint conferences using megaco/H.248.

IEEE Trans. Multimedia, 2005

Distance-increasing mappings from binary vectors to permutations.

IEEE Trans. Information Theory, 2005

2003

Distance-preserving mappings from binary vectors to permutations.

IEEE Trans. Information Theory, 2003

An Efficient Algorithm for the Reliability of Consecutive-k-n Networks.

J. Inf. Sci. Eng., 2003

2001

Application-Layer Conference Trees for Multimedia Multipoint Conferences Using Megaco/H.248.

Proceedings of the 2001 IEEE International Conference on Multimedia and Expo, 2001