Jen-Chun Chang

According to our database1, Jen-Chun Chang authored at least 24 papers between 2001 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
The Log-Rank Conjecture for Read- k XOR Functions.
J. Inf. Sci. Eng., 2018

2017
A separable reversible data hiding scheme for encrypted JPEG bitstreams.
Signal Processing, 2017

2016
On Constant-Time-Identification and Privacy-Preserving RFID Protocols: Trade-Off Between Time and Memory.
J. Inf. Sci. Eng., 2016

A High Embedding Capacity Data Hiding Scheme Based upon Permutation Vectors.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Reversible SMVQ Image Hiding Using Adaptive Search Order Coding.
Proceedings of the 2016 International Conference on Digital Image Computing: Techniques and Applications, 2016

Reversible Data Hiding in Pairwisely Encrypted Images.
Proceedings of the Third International Conference on Computing Measurement Control and Sensor Network, 2016

2014
On Reversible Data Hiding Schemes for JPEG Images from the Modified Quantization Table.
Proceedings of the Intelligent Systems and Applications, 2014

2013
On Constant-Time-Identification and Privacy-Preserving RFID Protocols: Trade-Off between Time and Memory.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

2012
Constructing Constant Composition Codes via Distance-Increasing Mappings.
SIAM J. Discrete Math., 2012

An Efficient Fragile Watermarking Scheme for Pixel-Wise Tamper Detection.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

2011
A New Scheme for Data Hiding on Halftone Images.
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011

2010
Efficient decoding algorithm for constant composition codes.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

2009
A Hybrid RFID Protocol against Tracking Attacks.
IACR Cryptology ePrint Archive, 2009

Distance-increasing mappings from binary vectors to constant composition vectors.
Proceedings of the IEEE International Symposium on Information Theory, 2009

A Hybrid RFID Protocol against Tracking Attacks.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

2008
Distance-Preserving and Distance-Increasing Mappings From Ternary Vectors to Permutations.
IEEE Trans. Information Theory, 2008

2007
New Constructions of Distance-Increasing Mappings and Permutation Arrays.
J. Inf. Sci. Eng., 2007

2006
Distance-increasing mappings from binary vectors to permutations that increase hamming distances by at least two.
IEEE Trans. Information Theory, 2006

New simple constructions of distance-increasing mappings from binary vectors to permutations.
Inf. Process. Lett., 2006

2005
Application-Layer conference trees for multimedia multipoint conferences using megaco/H.248.
IEEE Trans. Multimedia, 2005

Distance-increasing mappings from binary vectors to permutations.
IEEE Trans. Information Theory, 2005

2003
Distance-preserving mappings from binary vectors to permutations.
IEEE Trans. Information Theory, 2003

An Efficient Algorithm for the Reliability of Consecutive-k-n Networks.
J. Inf. Sci. Eng., 2003

2001
Application-Layer Conference Trees for Multimedia Multipoint Conferences Using Megaco/H.248.
Proceedings of the 2001 IEEE International Conference on Multimedia and Expo, 2001


  Loading...