According to our database1, Jen-Chun Chang authored at least 23 papers between 2001 and 2018.
Legend:Book In proceedings Article PhD thesis Other
The Log-Rank Conjecture for Read- k XOR Functions.
J. Inf. Sci. Eng., 2018
A separable reversible data hiding scheme for encrypted JPEG bitstreams.
Signal Processing, 2017
On Constant-Time-Identification and Privacy-Preserving RFID Protocols: Trade-Off Between Time and Memory.
J. Inf. Sci. Eng., 2016
A High Embedding Capacity Data Hiding Scheme Based upon Permutation Vectors.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
Reversible SMVQ Image Hiding Using Adaptive Search Order Coding.
Proceedings of the 2016 International Conference on Digital Image Computing: Techniques and Applications, 2016
Reversible Data Hiding in Pairwisely Encrypted Images.
Proceedings of the Third International Conference on Computing Measurement Control and Sensor Network, 2016
On Reversible Data Hiding Schemes for JPEG Images from the Modified Quantization Table.
Proceedings of the Intelligent Systems and Applications, 2014
On Constant-Time-Identification and Privacy-Preserving RFID Protocols: Trade-Off between Time and Memory.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013
Constructing Constant Composition Codes via Distance-Increasing Mappings.
SIAM J. Discrete Math., 2012
An Efficient Fragile Watermarking Scheme for Pixel-Wise Tamper Detection.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012
A New Scheme for Data Hiding on Halftone Images.
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011
Efficient decoding algorithm for constant composition codes.
Proceedings of the International Symposium on Information Theory and its Applications, 2010
Distance-increasing mappings from binary vectors to constant composition vectors.
Proceedings of the IEEE International Symposium on Information Theory, 2009
A Hybrid RFID Protocol against Tracking Attacks.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Distance-Preserving and Distance-Increasing Mappings From Ternary Vectors to Permutations.
IEEE Trans. Information Theory, 2008
New Constructions of Distance-Increasing Mappings and Permutation Arrays.
J. Inf. Sci. Eng., 2007
Distance-increasing mappings from binary vectors to permutations that increase hamming distances by at least two.
IEEE Trans. Information Theory, 2006
New simple constructions of distance-increasing mappings from binary vectors to permutations.
Inf. Process. Lett., 2006
Application-Layer conference trees for multimedia multipoint conferences using megaco/H.248.
IEEE Trans. Multimedia, 2005
Distance-increasing mappings from binary vectors to permutations.
IEEE Trans. Information Theory, 2005
Distance-preserving mappings from binary vectors to permutations.
IEEE Trans. Information Theory, 2003
An Efficient Algorithm for the Reliability of Consecutive-k-n Networks.
J. Inf. Sci. Eng., 2003
Application-Layer Conference Trees for Multimedia Multipoint Conferences Using Megaco/H.248.
Proceedings of the 2001 IEEE International Conference on Multimedia and Expo, 2001