Chin-Chen Chang
Chin-Chen Chang
Chair Professor
Professor Chang has worked on many different topics in information security, cryptography, multimedia image processing and published several hundreds of papers in international conferences and journals and over 40 books. He was cited over 49,194 times and has an h-factor of 101 according to Google Scholar. Several well-known concepts and algorithms were adopted in textbooks. He also worked with the National Science Council, Ministry of Technology, Ministry of Education, Ministry of Transportation, Ministry of Economic Affairs and other Government agencies on more than 100 projects and holds 36 patents, including one in US and twenty in China. He served as Honorary Professor, Consulting Professor, Distinguished Professor, Guest Professor at over 60 academic institutions and received Distinguished Alumni Award's from his Alma Master's. He also served as Editor or Chair of several international journals and conferences and had given almost a thousand invited talks at institutions including Chinese Academy of Sciences, Academia Sinica, Tokyo University, Kyoto University, National University of Singapore, Nanyang Technological University, The University of Hong Kong, National Taiwan University and Peking University. Professor Chang has mentored 7 postdoctoral, 68 PhD students and 208 master students, most of whom hold academic positions at major national or international universities. He has been the Editor-in-Chief of Information Education, a magazine that aims at providing educational materials for middle-school teachers in computer science. He is a leader in the field of information security of Taiwan. He founded the Chinese Cryptography and Information Security Association, accelerating information security the application and development and consulting on the government policy. He is also the recipient of several awards, including the Top Citation Award from Pattern Recognition Letters, Outstanding Scholar Award from Journal of Systems and Software, and Ten Outstanding Young Men Award of Taiwan. He was elected as a Fellow of IEEE in 1998, a Fellow of IET in 2000, a Fellow of CS in 2020, an AAIA Fellow in 2021, a Member of the Academy of Europe (AE) in 2022, a Member of the European Academy of Sciences and Arts (EASA) in the same year and a Member of the U.S. National Academy of Artificial Intelligence (NAAI) in 2024 . In 2023, he was awarded the Honorary Ph.D. Degree in Engineering, National Chung Cheng University, Taiwan.
Education:
Research Interest:
Current Position:
Full time experience:
Part time experience:
-
Yao, Y., Wang, D., Sheng, Y., Xu, D., Chang, C. C. and Chang, C. C., "PVO-based Reversible Data Hiding using Two-stage Embedding and FPM Mode Selection," Accepted byIEEE Transactions on Circuits and Systems for Video Technology, ., 2024-11. (SCIE) -
Xu, S., Horng, J. H., Chang, C. C. and Chang, C. C., "Reversible Data Hiding in Encrypted JPEG Images with Polynomial Secret Sharing for IoT Security," Accepted byIEEE Internet of Things Journal, ., 2024-10. (SCIE) -
Chang, Y. C., Liu, J. C., Chang, C. C. and Chang, C. C., "A Texture-image-oriented Coverless Data Hiding based on Two-dimentional Fractional Brownian Motion," Accepted byElectronics, ., 2024-10. (SCIE) -
Lin, Y., Liu, J. C., Chang C. C. and Chang, C. C., "Lossless Recompression of Vector Quantization Index Table for Texture Images based on Adaptive Huffman Coding through Multi-type Processing," Accepted bySymmetry, ., 2024-10. (SCIE) -
Gao, K., Horng, J. H. and Chang, C. C., "Linguistic Secret Sharing via Ambiguous Token Selection for IoT Security," Accepted byElectronics, ., 2024-10. (SCIE) -
Chen, Y., Duan, H., Wang, D., Liu, Y. and Chang C. C., "SERDA: Secure Enhanced and Robust Data Aggregation Scheme for Smart Grid," International Journal of Network Security, Vol. 35, No. 5, pp. 73-90, 2024-10. (EI) -
Chen, S., Liu, J. C.*, Chang, C. C. and Chang, C. C.*, "Lossless Data Hiding in VQ Compressed Images using Adaptive Prediction Difference Coding," Accepted byElectronics, ., 2024-09. (SCIE) -
Chang, C. C., Xu, S., Gao, K. and Chang, C. C., "Cryptanalysis of Dual-Stage Permutation Encryption Using Large-Kernel Convolutional Neural Network and Known Plaintext Attack," Accepted byCryptography, ., 2024-09. (SCIE) -
Fang, G., Wang, F., Zhao, C., Chang, C. C. and Lyu, W. L., "Reversible Data Hiding based on Chinese Remainder Theorem for Polynomials and Secret Sharing," Accepted byInternational Journal of Networks Security, ., 2024-09. (EI) -
Lin, Y., Lin, C. C., Chang, C. C. and Chang, C. C., "An IoT-based Electronic Health Protection Mechanism with AMBTC Compressed Images," IEEE Internet of Things Journal, ., 2024-09. (SCIE) -
Gao, K., Lin, C. C. and Chang, C. C., "Key-free Image Encryption Algorithm based on Self-triggered Gaussian Noise Sampling," Accepted byIEEE Access, ., 2024-08. (SCIE) -
Guo, C., Hwang, F. J., Chen, C. H., Chang, C. C. and Chang, C. C., "Dynamic Spatiotemporal Straight-Flow Network for Efficient Learning and Accurate Forecasting in Traffic," Accepted byIEEE Transactions on Intelligent Transportation Systems, ., 2024-08. (SCIE) -
Lin, Y., Liu, J. C., Chang, C. C. and Chang, C. C., "An Innovative Recompression Scheme for VQ Index Tables," Accepted byFuture Internet, ., 2024-08. (SCIE) -
Cui, M., Han, D., Liu, H., Li, K. C., Tang, M., Chang, C. C., Ayaz, F., Sheng, Z. and Guan, Y. L., "Secure Data Sharing for Consortium Blockchain-enabled Vehicular Social Networks," Accepted byIEEE Transactions on Vehicular Technology, ., 2024-08. (SCIE) -
Lin, J., Horng, J. H. and Chang, C. C., "Secret Image Sharing with Distinct Cover based on Improved Cycling-XOR," Accepted byJournal of Visual Communication and Image Representaion, ., 2024-08. (SCIE) -
Xu, S., Liu, J. C., Chang, C. C. and Chang, C. C., "Covert Communication for Dual Images with Two-Tier Bits Flipping," Accepted byMathematics, ., 2024-07. (SCIE) -
Zhou, Y., Luo, T., He, Z., Jiang, G., Xu,, H. and Chang, C. C., "CAISFormer: Channel-wise Attention Transformer for Image Steganography," Accepted byNeural Computing, .., 2024-07. (SCIE) -
Xie, T., Wang, B., Huang, E., Du, Y., Zhang, L, Liu, M., Chang, C. C. and Sun, Y., "Establishment abd Application of Recursive Digital Processing Algorithm with Difference Anlysis-based Parameter Setting and Difference Feedback," Accepted byElectronics, ., 2024-07. (SCIE) -
Lu, H. W., Liu, J. C.*, Chang, C. C. and Horng, J. H., "Reversible Data Hiding in Crypto-space Images with Polynomial Secret Sharing over Galois Field," Accepted byElectronics, https://doi.org/10.3390/electronics13142860., 2024-07. (SCIE) -
Yuan, L., Lin, C. C. and Chang, C. C., "Visual Quality-enhanced Reversible Data Hiding Scheme based on Interpolation and Variant Sudoku Matrics," Accepted byMultimedia Tools and Applications, ., 2024-06. (SCIE) -
Wang, X., Liu, J. C., Chang, C. C. and Chang, C. C., "Reversible Data Hiding in Encrypted 3D Mesh Models based on Multi-Group Partition and Closest Pair Prediction," Accepted byFuture Internet, ., 2024-06. (SCIE) -
Liu, J. C., Lin, Y., Chang, C. C. and Chang, C. C., "A Side Match Oriented Data Hiding Based on Absolute Moment Block Truncation Encoding Mechanism with Reversibility," Accepted byMultimedia Tools and Applications, ., 2024-06. (SCIE) -
Lin, C. C., Chen, E. and Chang, C. C., "A High-capacity HE Interpolation-based Reversible Data Hiding Method using Difference Interval-based Substitution," Accepted byJournal of Internet Technology, ., 2024-06. (SCIE) -
Tian, W., Li, S., Li, J., Zhao, L., Ye, Y. and Chang, C. C., "FSelectMix: Regularization Strategy of Convolutional Neural Networks with Attention," Accepted byJournal of Internet Technology, ., 2024-06. (SCIE) -
Zhan, C., Leng, L., Chang, C. C. and Horng, J. H., "Reversible Image Fragile Watermarking with Dual-temper Detection," Accepted byElectronics, ., 2024-05. (SCIE) -
Chi, H., Liu, J. C., Chang, C. C. and Horng, J. H., "A Simple and Efficient Data Hiding Method with Error Detection and Correction," Accepted byElectronics, ., 2024-05. (SCIE) -
Lin, I. C., Yeh, I. L., Chang, C. C., Liu, J. C. and Chang, C. C.*, "Designing a Secure and Scalable Data Sharing Mechanism Using Decentralized Identifiers," Accepted byComputer Modeling in Engineering & Sciences, ., 2024-05. (SCIE) -
Lin, Y., Liu, J. C., Chang, C. C. and Chang, C. C.*, "Emebdding Secret Data in a Vector Quantization Codebook using a Novel Thresholding Scheme," Accepted byMathematics, ., 2024-04. (SCIE) -
Gao, K., Chang, C. C.* and Lin, C. C.*, "Multiple Perspective of Multipredictor Mechanism and Multihistogram Modification for High-Fidelity Reversible Data Hiding," Computer Systems Science and Engineering, ., 2024-04. (SCIE) -
Xu, S., Chang, C. C. and Horng, J. H.*, "Data Hiding with Thumbnail-Preserving Encryption for Cloud Medical Images," Multimedia Tools and Applications, ., 2024-04. (SCIE) -
Wang, R., Liang, J., Wang, S. and Chang, C. C., "A Divide-and-Conquer Approach to Privacy-Preserving High-Dimensional Big Data Release," Accepted byJournal of Information Security and Applications, ., 2024-04. (SCIE) -
Chen, S., Chang, C. C. and Horng, J. H., "Reversible Data Hiding using Prediction Neural Network and Adaptive Modulation Mapping," Accepted byMultimedia Tools and Applications, ., 2024-04. (SCIE) -
Luo, T., Wu, J., He, Z., Xu, H., Jiang, G. and Chang, C. C., "WFormer: A Transformer-based Soft Fusion Model for Robust Image Watermarking," Accepted byIEEE Transactions on Emerging Topics in Computational Intelligence, ., 2024-04. (SCIE) -
Wu, H., Lin,C. C., Chang, C. C. and Wang, X., "Hybrid Representative Coding Scheme for AMBTC Compressed Images," Accepted byInternational Journal of Internet Technology, ., 2024-04. (SCIE) -
Gan, Q. W., Yau, W. C., Gan, Y. S., Salam, I., Guo, S.*, Chang, C. C., Wu, Y. and Zhou, L., "DSteganoM: Deep Steganography for Motion Capture Data," Expert Systems with Applications, Vol. 238, 2024-04. (SCIE) -
Chang, C. C., Xu, S., Liu, J. C. and Chang, C. C., "A Crypto-attacking Scheme for a (t, n)-threshold Image Encryption Method," Accepted byJournal of Internet Technology, ., 2024-03. (SCIE) -
Chen, C., Han, D. and Chang, C. C., "MPCCT: Multimodal vision-language learning paradigm with context-based compact Transformer," Pattern Recognition, Vol. 147, pp. 110084, 2024-03. (SCIE) -
Yang, J., Cai, X., Liu, Y., Chen, M. and Chang, C. C., "Taking LM as the Brain: A Novel Approach Intergrating Language Model and Generative Agent for Intelligent Decision Systems," Accepted byInternational Journal of Network Security, ., 2024-02. (EI) -
Gao, K., Chang, C. C., and Horng, J. H.*, "Dual Mode Data Hiding in Fully Encrypted Images with Pixel-shuffling for Cloud Applications," Displays, ., 2024-01. (SCIE) -
Ye, W.*, Cai, Y., Liu, Y. and Chang, C. C., "Joint Learning of Fuzzy Clustering and Spectral Clustering with Anchor Graph," Accepted byMultimedia Tools and Applications, ., 2024-01. (SCIE) -
Liu, J. C., Chi, H., Chang, C. C. and Chang, C. C., "An Innovative Information Hiding Scheme based on Block-wise Pixel Reordering," Future Internet, ., 2024-01. (SCIE) -
Yao, Y., Zhang, Y., Lin, C. C. and Chang, C. C., "Dual-image Reversible Data Hiding based on Sudoku Block Mapping and Adaptive Embedding," Accepted byJournal of Internet Technology, ., 2024-01. (SCIE) -
Lin, I. C., Kuo, Y. H., Chang, C. C., Liu, J. C. and Chang, C. C., "Symmetry in Blockchain-powered Secure Decentralized Data Storage: Mitigating Risks and Ensuring Confidentiality," Symmetry, Vol. 16, No, 2, pp. 147, 2024-01. (SCIE) -
Lin, Y., Lin, C. C., Liu, J. C. and Chang, C. C.*, "Verifiable (t,n) Secrect Image Sharing Scheme based on Slim Turtle Shell Matrix," Accepted byJournal of Information Security and Applications, ., 2023-12. (SCIE) -
Huang, Z., Wang F., Chang, C. C. and Chen, X., "A New Authentication Scheme for Dynamic Charging System of Electric Vehicles in Fog Environment," Accepted bySecurity and Privacy, ., 2023-12. (SCIE) -
Lyu, H., Li, J.*, Ye. Y. and Chang, C. C., "A Ranking Information based Network for Facial Beauty Prediction," Accepted byIEICE Transactions on Information and Systems, ., 2023-12. (SCIE) -
Liu, J. C., Chang, C. C., Lin, Y., Chang, C. C. and Horng, J. H., "A Matrix Coding Oriented Reversible Data Hiding Scheme Using Dual Digital Images," Accepted byMathematics, ., 2023-12. (SCIE) -
Chang, C. C., Liu, J. and Gao, K., "Cryptanalysis of Iterative Encryption and Image Sharing Scheme Based on the VQ Attack," Journal of Visual Communication and Image Representation, ., 2023-12. (SCIE) -
Su, G. D., Chang, C. C., Lin, C. C.* and Chang, C. C., "Towards Properties-Preserving JPEG Encryption with Structured Permutation and Adaptive Group Differentiation," The Visual Computer, ., 2023-12. (SCIE) -
Ji, Z., Song, X., Feng, B., Wang, H., Chen, C. H. and Chang, C. C., "RSG-Net: A Recurrent Similarity Network with Ghost Convolution for Wheelset Laser Stripe Image Inpainting," IEEE Transactions on Intelligent Transportation Systems, ., 2023-11. (SCIE) -
Liu, L., Li, J., Wu, Y., Chang, C. C. and Wang, A., "High-imperceptibility Data Hiding Scheme for JPEG Images based on Direction Modification," Computer Systems Science and Engineering, Vol. 47, No. 2, pp. 1415-1432, 2023-11. (SCIE) -
Guo, C., Chen, C. H., Hwang, F. J.*, Chang, C. C. and Chang, C. C., "Multi-View Spatiotemporal Learning for Traffic Forecasting," Accepted byInformation Sciences, ., 2023-11. (SCIE) -
Tian, H.*, Ye, W., Wang, J, Quan, H. and Chang, C. C., "Certificateless Public Auditing for Cloud-based Medical Data in Healthcare Industry 4.0," International Journal of Intelligent Systems, ., 2023-11. (SCIE) -
Fang, H., Chen, C. H., Hwang, F. J., Chang, C. C. and Chang, C. C., "Metro Station Functional Clustering and Dual-View Recurrent Graph Convolutional Network for Metro Passenger Flow Prediction," Accepted byExpert Systems with Applications, ., 2023-11. (SCIE) -
Gao, K., Horng, J. H. and Chang, C. C., "Reversible Data Hiding for Encrypted 3D Mesh Models with Secret Sharing over Galois Field," Accepted byIEEE Transactions on Multimedia, ., 2023-11. (SCIE) -
Chi, H., Lin, C. C. and Chang, C. C., "Data Hiding Methods using Voting Strategy and Mapping Table," Accepted byJournal of Internet Technology, ., 2023-10. (SCIE) -
Liu, J. C., Chang, C. C., Chang, C. C.* and Xu, S., "High-Capacity Imperceptible Data Hiding Using Permutation-Based Embedding Process for IoT Security," Electronics, ., 2023-10. (SCIE) -
Lin, J. Y., Chang, C. C. and Horng, J. H., "Crypto-space Image Steganography based on Blind Flipping," Journal of Information Security and Applications, ., 2023-10. (SCIE) -
Sun, C., Tian, H., Mazurczyk, W., Chang, C. C., Quan, H. and Chen, Y., "Steganalysis of Adaptive Multi-rate Speech with Unknown Embedding Rates Using Clustering and Ensemble Learning," Computers and Electrical Engineering, ., 2023-10. (SCIE) -
Xu, S., Horng, J. H.*, Chang, C. C. and Chang, C. C., "Reversible Data Hiding with Hierarchical Block Variable Length Coding for Cloud Security," IEEE Transactions on Dependable and Secure Computing, ., 2023-09. (SCIE) -
Chen, Y., Ye, W.*, Liu, Y. and Chang, C. C., "The High-Performance Design of a General Spiking Convolution Computation Unit for Supporting Neuromorphic Hardware Acceleration," IEEE Transactions on Circuits and Systems II-Express Briefs, ., 2023-09. (SCIE) -
Xu, S., Chang, C. C. and Horng, J. H., "Image Covert Communication with Block Regulation," IEEE Signal Processing Letters, ., 2023-09. (SCIE) -
Huang, J., Luo, T., Li, L.*, Yang, G., Xu, H. and Chang, C. C., "ARWGAN: Attention-Guided Robust Image Watermarking Model Based on GAN," IEEE Transactions on Instrumentation & Measurement, Vol. 72, pp. 5018417, 2023-06. (SCIE) -
Ye, W.*, Tan, R., Liu, Y. and Chang, C. C, "The Comparison of Attention Mechanisms with Different Embedding Modes for Performance Improvement of Fine-grained Classification," IEICE Transactions on Information and Systems, Vol. 106, No. 5, pp. 590-600, 2023-05. (SCIE) -
Li, H., Han, D.*, Chen, C., Chang, C. C., Li, K. C. and Li, D., "A Visual Question Answering Network Merging High- and Low-Level Semantic Information," IEICE Transactions on Information and Systems, Vol. 106, No. 5, pp. 581-589, 2023-05. (SCIE) -
Su, G. D., Chang, C. C. and Lin, C. C.*, "An Effective Compressed Image Authentication Scheme Based on N-Variant AMBTC," Multimedia Tools and Applications, ., 2023-05. (SCIE) -
Qiu, Y., Tian, H.*, Li, H., Chang, C. C. and Vasilakos, A. V., "Separable Convolution Network with Dual-Stream Pyramid Enhanced Strategy for Speech Steganalysis," IEEE Transactions on Information Forensics and Security, ., 2023-04. (SCIE) -
Tian, H.*, Peng, F., Quan, H. and Chang, C. C., "Identity-Based Public Auditing for Cloud Storage of Internet-of-Vehicles Data," ACM Transactions on Internet Technology, Vol. 22, No. 4, pp. 88:1-24, 2023-03. (SCIE) -
Wang, X., Liu, J. C. and Chang, C. C.*, "A Novel Reversible Data Hiding Scheme for VQ Codebooks," Security and Privacy, ., 2023-03. (EI) -
Kang, H., Leng, L.* and Chang, C. C., "Overlapped (7.4) Hamming Code for Large-capacity and Low-loss Data Hiding," Multimedia Tools and Applications, ., 2023-02. (SCIE) -
Feng, Q., Leng, L.*, Chang, C. C., Horng, J. H. and Wu, M., "Reversible Data Hiding in Encrypted Images with Extended Parametric Binary Tree Labeling," Applied Science, ., 2023-02. (SCIE) -
Xu, S., Chang, C. C. and Horng, J. H.*, "A Steganography Based on Optimal Multi-Threshold Block Labeling," Computer Systems Science and Engineering, Vol. 44, No. 1, pp. 721-739, 2023-01. (SCIE) -
Gao, K., Chang, C. C.* and Lin, C. C.*, "Cryptanalysis of Reversible Data Hiding in Encrypted Images Based on the VQ Attack," Symmetry, ., 2023-01. (SCIE) -
Lee, C. H., Sun, K. S., Horng, J. W.* and Chang, C. C.*, "A Novel CDMA-based Secret Message Multiplexing Scheme by Image Data Hiding," Mathematics, ., 2023-01. (SCIE) -
Chen, C., Han, D.* and Chang, C. C., "CAAN: Context-Aware Attention Network for Visual Question Answering," Pattern Recognition, Vol. 132, pp. 108980, 2022-12. (SCIE) -
Lin, I. C., Chang, C. C.* and Chiang, H. C., "A Novel e-Cash Payment System with Divisibility Based on Proxy Blind Signature in Web of Things," IEICE Transactions on Information and Systems, Vol. E105-D, No. 12, pp. 2092-2103, 2022-12. (SCIE) -
Tian, H.*, Wu, J., Quan, H. and Chang, C. C., "Detecting Multiple Steganography Methods in Speech Streams Using Multi-Encoder Network," IEEE Signal Processing Letters, Vol. 29, pp. 2462 - 2466, 2022-12. (SCIE) -
Ye, W., Lao, J., Liu, Y.*, Chang, C. C.*, Zhang, Z., Li, H. and Zhou, H., "Pine Pest Detection using Remote Sensing Satellite Images Combined with a Multi-scale Attention-UNet Model," Ecological Informatics, Vol. 72, pp. 101906, 2022-12. (SCIE) -
Guo, C., Chen, C.-H.*, Hwang, F.-J., Chang, C. C. and Chang, C. C., "Fast Spatiotemporal Learning Framework for Traffic Flow Forecasting," IEEE Transactions on Intelligent Transportation Systems, ., 2022-11. (SCIE) -
Xie, X., Lin, C. C. and Chang, C. C., "Reversible Data Hiding Based on Bidirectional Generalized Integer Transform," Smart Innovation, Systems and Technologies, 。, 2022-11. (EI) -
Liu, H., Wu, A., Wei, M. and Chang, C. C., "SKDStream: A Dynamic Clustering Algorithm on Time-Decaying Data Stream," EURASIP Journal on Wireless Communications and Networking, Vol. 2022, Article number: 102, 2022-10. (SCIE) -
Cao, C., Chen, C. H.*, Chang, C. C., Hwang, F. J. and Chang, C. C., "De-Correlation Neural Network for Synchronous Implementation of Estimation and Secrecy," IEEE Communications Letters, Vol. 27, No. 1, pp. 165-169, 2022-10. (SCIE) -
Chi, H., Horng, J. H., Chang, C. C.* and Li, Y. H, "Embedding Biometric Information in Interpolated Medical Images with A Reversible and Adaptive Strategy," Sensors, Vol. 22, No. 20, pp. 7942, 2022-10. (SCIE) -
Chi, H., Chang, C. C.*, Wang, X. and Lin, C. C.*, "Hiding and Extracting Important Information in Encrypted Images by Using the Transformation of All Possible Permutations and VQ Codebook," Electronics, Vol. 11, No. 21, pp. 3475, 2022-10. (SCIE) -
Lv, X., Han, D.*, Li, D.*, Xiao, L. and Chang, C. C., "Network Abnormal Traffic Detection Method based on Fusion of Chord Similarity and Multiple Loss Encoder," EURASIP Journal on Wireless Communications and Networking, Vol. 2022, No. 0, pp. Article number: 105, 2022-10. (SCIE) -
Chen, S. and Chang, C. C.*, "Reversible Data Hiding in Encrypted Images Using Block-based Adaptive MSB Prediction," Journal of Information Security and Applications, Vol. 69, pp. 103297, 2022-09. (SCIE) -
Sun, C., Tian, H.*, Mazurczyk, W., Chang, C. C., Cai, Y. and Chen, Y., "Towards Blind Detection of Steganography in Low‐Bit‐Rate Speech Streams," International Journal of Intelligent Systems, Vol. 37, No. 12, pp. 12085-12112, 2022-09. (SCIE) -
Mei, X., Han, D.*, Saeed, N., Wu, H., Chang, C. C., Han, B., Ma, T. and Xian, J., "Trajectory Optimization of Autonomous Surface Vehicles with Outliers for Underwater Target Localization," Remote Sensing, Vol. 14, No. 17, pp. 4343, 2022-09. (SCIE) -
Zhai, M., Han, D., Chang, C. C. and Sun, Z., "A Consortium Blockchain-based Information Management System for Unmanned Vehicle Logistics," Computer Science and Information Systems, Vol. 19, No. 2, pp. 935-955, 2022-09. (SCIE) -
Chen, Y., Han, D., Cui, M., Wu, Z. and Chang, C. C., "ABOS: An Attention-Based One-Stage Framework for Person Search," EURASIP Journal on Wireless Communications and Networking, Vol. 2022, Article number: 75, 2022-09. (SCIE) -
Bai, R., Li, L.*, Zhang, S., Lu, J. and Chang, C. C., "SSDeN: Framework for Screen-Shooting Resilient Watermarking via Deep Networks in the Frequency Domain," Applied Sciences, Vol. 12, No. 19, pp. 9780, 2022-09. (SCIE) -
Zhang, T., Hou, T., Weng, S.*, Zou, F., Zhang, H. and Chang, C. C., "Adaptive Reversible Data Hiding with Contrast Enhancement based on Multi-histogram Modification," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 32, No. 8, pp. 5041-5054, 2022-08. (SCIE) -
Qiu, Y., Tian, H.*, Tang, L., Mazurczyk, W. and Chang, C. C., "Steganalysis of Adaptive Multi-rate Speech Streams with Distributed Representations of Codewords," Journal of Information Security and Applications, Vol. 68, pp. 103250, 2022-08. (SCIE) -
Wang, X., Chang, C. C., Lin, C. C. and Chang, C. C., "On the Multi-Level Embedding of Crypto-Image Reversible Data Hiding," Journal of Visual Communication and Image Representation, Vol. 87, pp. 103556, 2022-08. (SCIE) -
Qin, C., Jiang, C., Mo, Q., Yan, H.* and Chang, C. C., "Reversible Data Hiding in Encrypted Image via Secret Sharing Based on GF(p) and GF(2^8)," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 32, No. 4, pp. 1928-2941, 2022-04. (SCIE) -
Shen, X, Han, D., Chang, C. C. and ZHong, L., "Dual Self-guided Attention with Sparse Question Networks for Visual Question Answering," IEICE Transactions on Information and Systems, Vol. E105-D, No.4, pp.785-796, 2022-04. (SCIE) -
Li, M., Han, D., Li, D., Liu, H. and Chang, C. C., "MFVT: An Anomaly Traffic Detection Method Merging Feature Fusion Network and Vision Transformer Architecture," EURASIP Journal on Wireless Communications and Networking, Vol. 2022, No. 2022, pp. 39, 2022-04. (SCIE) -
Sun, Z., Han, D., Li, D.*, Wang, X., Chang, C. C. and Wu, Z., "A Blockchain-based Secure Storage Scheme for Medical Information," EURASIP Journal on Wireless Communications and Networking, Vol. 40, pp. 1-25, 2022-04. (SCIE) -
Chen, S. and Chang, C. C.*, "Privacy-Preserving Data Hiding with Robustness based on Selective Encryption and Matrix Embedding," Multimedia Tools and Applications, Vol. 81, No. 23, pp. 33397–33417, 2022-04. (SCIE) -
Lin, J., Chang, C. C. and Horng, J. H., "Asymmetric Orientation Combination for Reversible and Authenticable Data Hiding of Dual Stego-images," Symmetry, Vol. 14, No. 4, pp. 819, 2022-04. (SCIE) -
Gao, K, Horng, J. H.* and Chang, C. C., "High-capacity Reversible Data Hiding in Encrypted Images Based on Adaptive Block Encoding," Journal of Visual Communication and Image Representation, Vol. 84, pp. 103481, 2022-04. (SCIE) -
Ye, W., Zeng, Q., Peng, Y., Liu, Y.* and Chang, C. C., "A Two-stage Detection Method for Copy-move Forgery based on Parallel Feature Fusion," EURASIP Journal on Wireless Communications and Networking, Vol. 2022, No. 1, pp. 30, 2022-04. (SCIE) -
Lin, J. Y., Horng, J. H. and Chang, C. C.*, "A Reversible and Authenticable Secret Sharing Scheme Using Dual Images," Multimedia Tools and Applications, Vol. 81, No. 13, pp. 17527-17545, 2022-03. (SCIE) -
Nguyen, T. S.*, Chang, C. C. and Lin, C. C., "High Capacity Reversible Data Hiding Scheme based on AMBTC for Encrypted Images," Journal of Internet Technology, Vol. 23, No. 2, pp. 255-266, 2022-03. (SCIE,EI) -
Putri, W. R., Liu, S. H., Aslam, M. S., Li, Y. H., Chang, C. C.* and Wang, J., "Self-Supervised Learning Framework Toward State-of-the-Art Iris Image Segmentation," Sensors, Vol. 22, No. 6, pp. 2133, 2022-03. (SCIE) -
Zhao, L., Li, J., Li, J.*, Wu, Y. Cheng, S., Tang, Z., Hui, G. and Chang, C. C., "Learning Stereo Disparity with Feature Consistency and Confidence," International Journal of Ad Hoc and Ubiquitous Computing, Vol. 39, Nos. 1-2, pp. 83-92, 2022-02. (EI) -
Yang, Z., Chang, H., Chang, C. C., Huang, Y. and Chang, C. C., "Real-Time Steganalysis for Streaming Media Based on Multi-Channel Convolutional Sliding Windows," Knowledge-Based Systems, Vol. 237, pp. 107561, 2022-02. (SCIE) -
Li, X. W., Han, D. Z.* and Chang, C. C., "Pre-training Model Based on Parallel Cross-Modality Fusion Layer," Plos One, Vol. 17, No. 2, pp. e0260784, 2022-02. (SCIE) -
Horng, J. H., Chen, S.* and Chang, C. C.*, "A (k,n)-Threshold Secret Image Sharing Scheme Based on Non-Full Rank Linear Model," Mathematics, Vol. 10, No. 3,. pp. 524, 2022-02. (SCIE) -
Chang, C. C.*, Su, G. D., Lin, C. C.* and Li, Y. H., "Position-Aware Guided Hiding Data Scheme with Reversibility and Adaptivity for Dual Images," Symmetry, Vol. 14, No. 3, pp 509, 2022-02. (SCIE) -
Lee, W. K., Chen, L.*, Chang, C. C. and Yao, Z., "Post-quantum Blockchain for Secure Communication in IoT based Smart Home Services," International Journal of Embedded Systems, Vol. 14, No. 5, pp. 509-524, 2022-01. (EI) -
Ye, W., Zhu, X., Xu, Z., Liu, Y. and Chang, C. C., "A Comprehensive Framework of Multiple Semantics Preservation in Neural Style Transfer," Journal of Visual Communication and Image Representation, Vol. 82, pp. 103378, 2022-01. (SCIE) -
Lin, I. C., Chang, C. C.* and Chang, Y. S., "Data Security and Preservation Mechanisms for Industrial Control Network using IOTA," Symmetry, Vol. 14, No. 2, pp. 237, 2022-01. (SCIE) -
Wang, X., Chang, C. C., Lin, C. C.* and Chang, C. C., "Reversal of Pixel Rotation: A Reversible Data Hiding System towards Cybersecurity in Encrypted Images," Journal of Visual Communication and Image Representation, Vol. 82, pp. 103421, 2022-01. (SCIE) -
Lin, C. C.*, Chang, C. C.*, Kao, W. J. and Chang, J. F., "Efficient Electronic Patient Information Hiding Scheme with Tamper Detection Function for Medical Images," IEEE Access, Vol. 10, pp. 18470-18485, 2022-01. (SCIE) -
Cai, S., Han, D., Yin, X., Li, D. and Chang, C. C., "A Hybrid Parallel Deep Learning Model for Efficient Intrusion Detection Based On Metric Learning," Connection Science, Vol. 34, No. 1, pp. 551-577, 2022-01. (SCIE) -
Lin, W., Zhu, X., Ye, W.*, Chang, C. C.*, Liu, Y. and Liu, C., "An Improved Image Steganography Framework based on Y Channel Information for Neural Style Transfer," Security and Communication Networks, Vol. 2022, Article ID 2641615, 2022-01. (SCIE) -
Xie, X. Z. and Chang, C. C.*, "Hiding Data in Dual Images Based on Turtle Shell Matrix with High Embedding Capacity and Reversibility," Multimedia Tools and Applications, Vol. 80, No. 30, pp. 36567–36584, 2021-12. (SCIE) -
Zhang, S., Su, S., Li, L., Lu, J., Zhou, Q. and Chang, C. C., "CSST-Net: An Arbitrary Image Style Transfer Network of Coverless Steganography," The Visual Computer, ., 2021-12. (SCIE) -
Lin, J., Chang, C. C. and Horng, J. H., "Asymmetric Data Hiding for Compressed Images with High Payload and Reversibility," Symmetry, Vol. 13. No. 12, pp. 2355, 2021-12. (SCIE) -
Xie, X., Chang, C. C.* and Horng, J. H.*, "An EMD-based Data Hiding Scheme for JPEG Images," Connection Science, Vol. 33, No. 3, pp. 515-531, 2021-11. (SCIE) -
Lin, J. Y., Horng, J. H.* and Chang, C. C., "A Novel (2, 3)-Threshold Reversible Secret Image Sharing Scheme Based on Optimized Crystal-Lattice Matrix," Symmetry, Vol. 13, No. 11, pp. 2063, 2021-11. (SCIE) -
Lin, C. C.*, Nguyen, T. S. and Chang, C. C., "LRW-CRDB: Lossless Robust Watermarking Scheme for Categorical Relational Databases," Symmetry, Vol. 13, No. 11, pp. 2191, 2021-11. (SCIE) -
Lin, C. C.*, Nguyen, T. S., Chang, C. C. and Chang, W. C., "Efficient Reversible Data Hiding Scheme for AMBTC-Compressed Images," Applied Sciences, Vol. 11, No. 15, pp. 6741, 2021-11. (SCIE) -
Chi, H., Chang, C. C.* and Liu, Y., "An SMVQ Compressed Data Hiding Scheme Based on Multiple Linear Regression Prediction," Connection Science, Vol. 33, No. 3, pp. 495-514, 2021-10. (SCIE) -
Chang, C. C., Wang, X. and Lin, C. C., "An Efficient Dual Prediction-based Reversible Data Hiding and Reduced Code Method for AMBTC," Multimedia Tools and Applications, Vol. 80, No. 24, pp. 33157–33176, 2021-10. (SCIE) -
Chen, S., Chang, C. C.* and Lin, C. C., "Reversible Data Hiding in Encrypted Images Based on Homomorphism and Block-based Congruence Transformation," Multimedia Tools and Applications, Vol. 80, Nos. 21-23, pp. 33115–33138, 2021-10. (SCIE) -
Zhang, X., Han, D.* and Chang, C. C., "RDMMFET: Representation of Dense Multi-Modality Fusion Encoder Based on Transformer," Mobile Information Systems, Special Issue on Machine Learning, Vol. 2021, Article ID 2662064, 2021-10. (SCIE) -
Xia, T. T., Lin, J., Chang, C. C.* and Lu, T. C., "A Novel Adjustable Reversible Data Hiding Method for AMBTC-Compressed Codes using Hamming Distance," International Journal of Embedded Systems, Vol. 14, No. 4, pp. 313, 2021-09. (EI) -
Gao, K., Chang, C. C.* and Liu, Y., "Predicting Missing Data for Data Integrity Based on the Linear Regression Model," International Journal of Embedded Systems, Vol. 14, No. 4, pp. 355-362, 2021-09. (EI) -
Horng, J. H., Chang, C. C.* and Sun, K. S., "A Two-Layer Steganography for Mosaic Image," KSII Transactions on Internet and Information Systems, Vol. 15, No. 9, pp. 3298-3321, 2021-09. (SCIE) -
Wu, H., Horng, J. H. and Chang, C. C.*, "Adaptive Data Hiding Scheme based on Magic Matrix of Flexible Dimension," KSII Transactions on Internet and Information Systems, Vol. 15, No. 9, pp. 3348-3364, 2021-09. (SCIE) -
Li, L., Bai, R., Zhang, S., Chang, C. C.* and Shi, M., "Screen-Shooting Resilient Watermarking Scheme via Learned Invariant Keypoints and QT," Sensors, Vol. 21, No. 19, pp. 6554, 2021-09. (SCIE) -
Lee, C. F., Chang, C. C.*, Wang, Z. H. and Di, Y. F., "A High Robust and Blind Image Watermarking Using Arnold Transform Mapping in the DCT Domain of YCbCr Color Space," Journal of Network Intelligence, Vol. 6, No. 3, pp. 624-636, 2021-08. (EI) -
Wang, X., Chang, C. C.* and Lin, C. C., "High Capacity Reversible Data Hiding in Encrypted Images Based on Prediction Error and Block Classification," Multimedia Tools and Applications, Vol. 80, No. 19, pp. 29915–29937, 2021-08. (SCIE) -
Chang, C. C., Chang, J. F., Kao, W. J. and Horng, J. H., "Two-Layer Reversible Data Hiding for VQ-Compressed Images Based on De-Clustering and Indicator-Free Search-Order Coding," Future Internet, Vol. 13, No. 8, pp. 215, 2021-08. (SCIE) -
Tian, H., Li, X., Quan, H., Chang, C. C. and Thar, B., "A Lightweight Attribute -based Access Control Scheme for Intelligent Transportation System with Full Privacy Protection," IEEE Sensors Journal, Vol. 21, No. 14, pp. 15793-15806, 2021-07. (SCIE) -
Su, G. D., Chang, C. C. and Lin, C. C.*, "Privacy-Preserving Reversible Data Hiding for Medical Images Employing Local Rotation," Journal of Healthcare Engineering, Vol. 2021, Article ID 5709513, 2021-07. (SCIE) -
Chi, H., Horng, J W.* and Chang, C. C.*, "Reversible Data Hiding Based on Pixel-Value-Ordering and Prediction-Error Triplet Expansion," Mathematics, Vol. 9, No. 14, pp. 1703, 2021-07. (SCIE) -
Li, L., Chang, C. C.* and Lin, C. C.*, "Reversible Data Hiding in Encrypted Image Based on (7, 4) Hamming Code and UnitSmooth Detection," Entropy, Vol. 23, No. 7, pp. 790, 2021-06. (SCIE) -
Wang, X., Chang, C. C.*, Lin, C. C. and Chang, C. C., "Privacy-Preserving Reversible Data Hiding Based on Quad-Tree Block encoding and Integer Wavelet Transform," Journal of Visual Communication and Image Representation, Vol. 79, pp. 10320, 2021-06. (SCIE) -
Lin, C. C.*, He, S. and Chang, C. C., "Pixel-based Fragile Image Watermarking Based on Absolute Moment Block Truncation Coding," Multimedia Tools and Applications, Vol. 80, No. 19, pp. 29497-29518, 2021-06. (SCIE) -
Huang, P., Chang, C. C.*, Li, Y. H. and Liu, Y., "Enhanced (n,n)-threshold QR Code Secret Sharing Scheme Based on Error Correction Mechanism," Journal of Information Security and Applications, Vol. 58. pp. 102719, 2021-05. (SCIE) -
Chen, K. M. and Chang, C. C*, "High-Capacity Separable Reversible Data-Hiding Method in Encrypted Images Based on Block-Level Encryption and Huffman Compression Coding," Connection Science, Vol. 33, No. 4, pp. 975-994, 2021-05. (SCIE) -
Meng, K., Miao, F.*, Ning, Y., Huang, W., Xiong, Y. and Chang, C. C., "A Proactive Secret Sharing Scheme Based on Chinese Remainder Theorem," Frontiers of Computer Science, Vol. 15, No. 2, pp. 152801, 2021-04. (SCIE) -
Xu, S., Horng, J. H.* and Chang, C. C.*, "Reversible Data Hiding Scheme Based on VQ Prediction and Adaptive Parametric Binary Tree Labeling for Encrypted Images," IEEE Access, Vol. 9, No. 1, Apr. 2021, pp. 55191-55204, 2021-04. (SCIE) -
Xu, S., Chang, C. C.* and Liu, Y., "A High-Capacity Reversible Data Hiding Scheme for Encrypted Images Employing Vector Quantization Prediction," Multimedia Tools and Applications, Vol. 80, No. 13, pp. 20307–20325, 2021-03. (SCIE) -
Chang, C. C, Horng, J. H.*, Shi, C. S. and Wang, X., "VQ-Oriented Data Hiding based on Adjustable Error Compensation Strategy," Connection Science, Vol. 33, No. 4, pp. 835-853, 2021-03. (SCIE) -
Chang, C. C., Horng, J. H.* and Gao, W. J., "A Secure Extended LBP Data Hiding Scheme based on Octagon-shaped Shell," International Journal of Embedded Systems, Vol. 14, No. 5, pp. 497-508, 2021-03. (EI) -
Qiu, G. H., Lee, C. F. and Chang, C. C.*, "Turtle-shell Data Embedding Method with High Image Fidelity," International Journal of Embedded Systems, Vol. 14, No. 2, pp. 149-159, 2021-03. (EI) -
Lin, J. Y., Chen, Y., Chang, C. C.* and Hu, Y. C., "An Efficient Lossless Dual Images Secret Sharing Scheme Using Turtle Shell Reference Matrix," International Journal of Network Security, Vol. 23, No. 2, pp. 195-204, 2021-03. (EI) -
Lu, R., Xu, Y., Wu, Z., Zheng, Y., Ren, L., Ding, F., Li, J.* and Chang, C. C.*, "Correction of Slanted Text Pictures Based on Modified Opencv," Journal of Network Intelligence, Vol. 6, No. 2, pp. 238-246, 2021-03. (EI) -
Su, G. D., Chang, C. C.* and Chen, C. C., "A Hybrid-Sudoku based Fragile Watermarking Scheme for Image Tampering Detection," Multimedia Tools and Applications, Vol. 80, No. 8, pp. 12881–12903, 2021-03. (SCIE) -
Chen, Y., Xu, W., Hong, Z. H., Zhu, M. M., Li, B., Li, J.* and Chang, C. C.*, "Smart Meter Fault Prediction Based on One-dimensional Convolution Neural Network Integrated Model," Journal of Network Intelligence, Vol. 6, No. 2, pp. 178-188, 2021-03. (EI) -
Liu, Y., Feng, G., Qin, C., Lu, H. and Chang, C. C.*, "High-capacity Reversible Data Hiding in Encrypted Image Based on Hierarchical Quad-tree Coding and Multi-MSB Prediction," Electronics, Vol. 10, No. 6, pp. 664, 2021-03. (SCIE) -
Miao, F., Yu, Y., Meng, K.*, Xiong, Y. and Chang, C. C., "Grouped Secret Sharing Schemes Based on Lagrange Interpolation Polynomials and Chinese Remainder Theorem," Security and Communication Networks, Vol. 2021, Article ID 6678345, 2021-03. (SCIE) -
Meng, K., Miao, F.*, Xiong, Y. and Chang, C. C., "A Reversible Extended Secret Image Sharing Scheme Based on Chinese Remainder Theorem," Signal Processing: Image Communication, Vol. 95, pp. 116221, 2021-03. (SCIE) -
Gao, K., Horng, J. H.* and Chang, C. C.*, "An Authenticatable (2,3) Secret Sharing Scheme Using Meaningful Share Images Based on Hybrid Fractal Matrix," IEEE Access, Vol. 9, No. 1, pp. 50112-50125, 2021-03. (SCIE) -
Xu Wang , Li-Yao Li, Ching-Chun Chang , and Chih-Cheng Chen, "High-Capacity Reversible Data Hiding in Encrypted Images Based on Prediction Error Compression and Block Selection," Security and Communication Networks, Volume 2021, Article ID 9606116, 12 pages, 2021-03. (SCIE) -
Liu, L., Wang, L. and Chang, C. C.*, "Separable Reversible Data Hiding in Encrypted Images Based on Flexible Preservation of the Differences," Multimedia Tools and Applications, Vol. 80, No. 5, pp. 6639–6659, 2021-02. (SCIE) -
Lu, J.*, Ni, J., Li, L., Luo, T., and Chang, C. C., "A Coverless Information Hiding Method Based on Constructing a Complete Grouped Basis with Unsupervised Learning," Journal of Network Intelligence, Vol. 6, No. 1, pp. 29-39, 2021-02. (EI) -
Chen, C. C., Chang, C. C. and Chen, K.*, "High-capacity Reversible Data Hiding in Encrypted Image Based on Huffman Coding and Differences of High Nibbles of Pixels," Journal of Visual Communication and Image Representation, Vol. 76, pp. 103060, 2021-02. (SCIE) -
Chen, S. and Chang, C. C, "Reversible Data Hiding Based on Three Shadow Images Using Rhombus Magic Matrix," Journal of Visual Communication and Image Representation, Vol. 76, pp. 103064, 2021-02. (SCIE) -
Lin, C. C.*, He, S. L. and Chang, C. C., "Pixel P Air-wise Fragile Image Watermarking based on HC-based Absolute Moment Block Truncation Coding," Electronics, Vol. 10, No. 6, pp. 690, 2021-02. (SCIE) -
Wang, X., Chang, C. C. and Lin, C. C.*, "Reversible Data Hiding in Encrypted Images with Block-based Adaptive MSB Encoding," Information Sciences, Vol. 567, pp. 375-394, 2021-02. (SCIE) -
Yan, C., Zhang, G.*, Wang, A., Liu, L. and Chang, C. C., "Visible 3D-model Watermarking Algorithm for 3D-Printing Based on Bitmap Fonts," International Journal of Network Security, Vol. 23, No. 1, pp. 172-179, 2021-01. (EI) -
Xu, S., Chang, C. C.* and Liu, Y., "A Novel Image Compression Technology Based on Vector Quantization and Linear Regression Prediction," Connection Science, Vol. 33, No. 2, pp. 219-236, 2021-01. (SCIE) -
Lin, J., Horng, J. H., Liu, Y. and Chang, C. C.*, "An Anisotropic Reference Matrix for Image Steganography," Journal of Visual Communication and Image Representation, Vol. 74, pp. 102969, 2021-01. (SCIE) -
Chen, Y. H., Chang, C. C., Lin, C. C.* and Wang, Z. M., "An Adaptive Reversible Data Hiding Scheme using AMBTC and Quantization Level Difference," Applied Sciences, Vol. 11, No. 2, pp. 635, 2021-01. (SCIE) -
Chang, Y. C. and Chang, C. C.*, "Using an Optimization Algorithm to Detect Hidden Waveforms of Signals," Sensors, Vol. 21, No. 2, pp. 588, 2021-01. (SCIE) -
Lin, C. C.*, Lin, J. and Chang, C. C., "Reversible Data Hiding for AMBTC Compressed Images Based on Matrix and Hamming Coding," Electronics, Vol. 10, No. 3, pp. 281, 2021-01. (SCIE) -
Cui, M., Han, D.*, Wang, J., Li, K. C. and Chang, C. C., "ARFV: An Efficient Shared Data Auditing Scheme Supporting Revocation for Fog-Assisted Vehicular Ad-Hoc Networks," IEEE Transactions on Vehicular Technology, Vol. 69, No. 12, pp. 15815-15827, 2020-12. (SCIE) -
Wu, X., Guo, S., Xing, G.*, Liao, M., Chang, C. C. and Chuen, Y., "Information Hiding in Motion Data of Virtual Characters," Expert Systems and Applications, Vol. 159, pp. 113516, 2020-11. (SCIE) -
Su, G. D., Chang, C. C., Lin, C. C.* and Yao, Z., "Secure High Capacity Tetris-Based Scheme for Data Hiding," IET Image Processing, Vol. 14, No. 17, pp. 4633-464, 2020-11. (SCIE) -
Lin, C. C., Chang, C. C. and Zheng, Y. Z., "A Ring Signature Based Anonymity Authentication Scheme for Group Medical Consultation," Symmetry, Vol. 12, No. 12, pp. 2009, 2020-11. (SCIE) -
Horng, J. H., Lin, J., Liu, Y. and Chang, C. C.*, "3D Multilayered Turtle Shell Models for Image Steganography," Computer Modeling in Engineering and Sciences, Vol. 125, No. 2, pp. 879-906, 2020-10. (SCIE) -
Qiu, G. H., Lee, C. F. and Chang, C. C.*, "Greedy Algorithm for Image Quality Optimization Based on Turtle-Shell Steganography," International Journal of Computational Science and Engineering, Vol. 23, No. 1, pp. 50-62, 2020-10. (EI) -
Chen, Y. Q., Sun, W. J., Li, L. Y., Chang, C. C. and Wang, X., "An Efficient General Data Hiding Scheme Based on Image Interpolation," Journal of Information Security and Applications, Vol. 54, pp. 102584, 2020-10. (SCIE) -
Chen, S. and Chang, C. C.*, "Reversible Data Hiding in Encrypted Images Based on Reversible Integer Transformation and Quadtree-based Partition," IEEE Access, Vol. 8, No. 1, pp. 184199-184209, 2020-10. (SCIE) -
Lin, C. C.*, Chang, Y. F., Chang, C. C. and Zheng, Y. Z., "A Fair and Secure Reverse Auction for Government Procurement," Sustainability, Vol 12, No. 20, pp. 8567, 2020-10. (SCIE) -
Su, G. D., Chang, C. C. and Lin, C. C.*, "Effective Self-recovery and Tampering Localization Fragile Watermarking for Medical Images," IEEE Access, Vol. 8, No. 1, pp. 160840-160857, 2020-09. (SCIE) -
Gao, K., Horng, J. H.* and Chang, C. C.*, "A Novel (2, 3) Reversible Secret Image Sharing Based on Fractal Matrix," IEEE Access, Vol. 8, No. 1, pp. 174325-174341, 2020-09. (SCIE) -
Wu, H. L., Chang, C. C.*, Zheng, Y. Z., Chen, L. S.* and Chen, C. C., "A Secure IoT-based Authentication Scheme in Cloud Computing Environment," Sensors, Vol. 20, No. 19, pp. 5604, 2020-09. (SCIE) -
Wu, H. L., Chang, C. C.* and Chen, L. S., "Secure and Anonymous Authentication Scheme for the Internet of Things with Pairing," Pervasive and Mobile Computing, Vol. 67, pp. 101177, 2020-09. (SCIE) -
Liu, Y., Chang, C. C. and Huang, P. C.*, "One-Code-Pass User Authentication Based on QR Code and Secret Sharing," International Journal of Network Security, Vol. 22, No. 5, pp. 752-762, 2020-09. (EI) -
Chang, C. C. Su, G. D.*, and Lin, C. C., "An Improved Sudoku-based Data Hiding Scheme Using Greedy Method," International Journal of Computational Science and Engineering, Vol. 23, No. 1, pp. 10-21, 2020-09. (EI) -
Xie, X. Z., Chang, C. C.* and Hu, Y. C., "An Adaptive Reversible Data Hiding Scheme Based on Prediction Error Histogram Shifting by Exploiting Signed-Digit Representation," Multimedia Tools and Applications, Vol. 79, No. 33-34, pp. 24329-24346, 2020-08. (SCIE) -
Chang, C. C., Lin, C. C.* and Su, G. D., "An Effective Image Self-Recovery based Fragile Watermarking using Self-Adaptive Weight-based Compressed AMBTC," Multimedia Tools and Apllications, Vol. 79, No. 33-34, pp. 24795-24824, 2020-08. (SCIE) -
Chen, L., Zhang, N., Sun, H. M., Chang, C. C., Yu, S. and Choo, K. K. R., "Secure Search for Encrypted Personal Health Records from Big Data NoSQL Databases in Cloud," Computing, Vol. 102, No. 6, pp. 1521–1545, 2020-08. (SCIE) -
Xia, Z., Liu, Y., Hsu, C. F. and Chang, C. C., "Cryptanalysis and Improvement of A Group Authentication Scheme with Multiple Trials and Multiple Authentications," Security and Communication Networks, Vol. 2020, Article ID 618386, 2020-07. (SCIE) -
Li, X., Chen, H., Liu, Y. and Chang, C. C.*, "Unordered Multi-secret Sharing Based on Generalized Chinese Remainder Theorem," Security and Communication Networks, Vol. 2020, No. 0, pp. Article ID 6073721, 2020-07. (SCIE) -
Tu, S., Waqas, M., Meng, Y.*, Rehman, S., Ahmed I., Koubaa, A., Halim, Z., Hanif, M., Chang, C. C. and Shi, C., "Mobile Fog Computing Security: A User-Oriented Smart Attack Defense Strategy Based on DQL," Computer Communications, Vol. 160, pp. 790-798, 2020-07. (SCIE) -
Chang, C. C., Horng, J. H.*, Shih, C. S. and Chang, C. C., "A Maze Matrix-Based Secret Image Sharing Scheme with Cheater Detection," Sensors, Vol. 20, No. 13, pp. 3802, 2020-07. (SCIE) -
Horng, J. H., Chang, C. C. and Li, G. L., "Steganography using Quotient Value Differencing and LSB Substitution for AMBTC Compressed Images," IEEE Access, Vol. 8, No. 1, pp. 129347-129358, 2020-07. (SCIE) -
Chang, C. C., Chen, J. Y., Chen, Y. H. and Liu, Y.*, "A Reversible Data Hiding Method for SMVQ Indices Based on Improved Locally Adaptive Coding," International Journal of Network Security, vol. 22, no. 4, pp. 575-583, 2020-07. (EI) -
Chen, Y., Lin, J. Y., Chang, C. C.* and Hu, Y. C., "Sharing a Secret Image in the Cloud Using Two Shadows," International Journal of Network Security, Vol. 22, No. 4, pp. 551-560, 2020-07. (EI) -
Gao, K., Horng, J. H.*, Liu, Y. and Chang, C. C.*, "A Reversible Secret Image Sharing Scheme Based on Stick Insect Matrix," IEEE Access, Vol. 8, No. 1, pp .130405-130416, 2020-07. (SCIE) -
Horng, J. H., Xie, X. Z.* and Chang, C. C., "The Analysis of Stego Image Visual Quality for a Data Hiding Scheme Based on Two-Layer Turtle Shell Matrix," International Journal of Computational Science and Engineering, vol. 23, no. 4, pp. 336-340, 2020-07. (EI) -
Lv, M., Zhou, S.*, Chen, G., Chen, L., Liu, J. and Chang, C. C., "On Reliability of Multiprocessor System Based on Star Graph," IEEE Transactions on Reliability, Vol. 69, No. 2, pp. 715-724, 2020-06. (SCIE) -
Lin, J. Y., Chen, Y., Chang, C. C.* and Hu, Y. C., "A Novel High Capacity Turtle Shell-based Data Hiding with Location Table Free," International Journal of Computational Science and Engineering, Vol. 22. No. 1, pp. 135-145, 2020-05. (EI) -
Horng, J. H., Xu, S.*, Chang, C. C. and Chang, C. C, "An Efficient Data Hiding Scheme Based on Multi-Dimensional Mini-Sudoku," Sensors, Vol. 20, pp. 2739, 2020-05. (SCIE) -
Mou, Z.*, Ye, W., Chang, C. C. and Mao, Y., "The Application Analysis of Neural Network Techniques on Lexical Tone Rehabilitation of Mandarin-speaking Patients with Post-stroke Dysarthria," IEEE Access, Vol. 8, No. 1, pp. 90709-90717, 2020-05. (SCIE) -
Gao, D. W., Chen, H.* and Chang, C. C., "Plaintext Aware Encryption in the Standard Model under the Linear Diffie-Hellman Knowledge Assumption," International Journal of Computational Science and Engineering, Vol. 22, Nos. 2-3, pp. 270-279, 2020-05. (EI) -
Tian, H.*, Wang, J., Chang, C. C. and Quan, H., "Public Auditing of Log Integrity for Shared Cloud Storage Systems via Blockchain," Accepted byWireless Networks, ., 2020-05. (Academic Search Index) -
Chen, W., Chang, C. C.*, Weng, S.* and Ou, B, "Multi-layer Mini-Sudoku Based High-Capacity Data Hiding Method," IEEE Access, Vol. 8, No. 1, pp. 69256-69267, 2020-04. (SCIE) -
Lee, C. F., Chang, C. C.* and Li, G. L., "A Data Hiding Scheme Based on Turtle-shell for AMBTC Compressed Images," KSII Transactions on Internet and Information Systems, Vol. 14, No. 6, pp. 2554-2575, 2020-04. (SCIE) -
Huang, P., Chang, C. C.*, Li, Y. H. and Liu, Y., "Efficient QR Code Secret Embedding Mechanism Based on Hamming Code," IEEE Access, Vol. 8, No. 1, pp. 86706-86714, 2020-04. (SCIE) -
Chen, Y., Lin, J. Y., Chang, C. C.* and Hu, Y. C., "Reversibly Hiding Data Using Dual Images Scheme Based on EMD Data Hiding Method," International Journal of Computational Science and Engineering, Vol. 21, No. 4, pp. 583-592, 2020-04. (EI) -
Chen, Y., Lin, J. Y., Chang, C. C.* and Hu, Y. C., "Low-computation-cost Data Hiding Scheme Based on Turtle Shell," International Journal of Network Security, Vol. 22, No. 2, pp. 296-305, 2020-03. (EI) -
Liu, M., Tu, S.*, Xiao, C., Waqas, M., Rehman, S. U., Aamir, M. and Chang, C. C., "The Allocation and Reuse Scheme of Physical Cell Identifications Based on Maximum Degree First Coloring Algorithm," IEEE Systems Journal, Vol 14, No. 1, pp. 582-591, 2020-03. (SCIE) -
Wang, R., Zhu, Y.*, Chang, C. C. and Peng, Q., "Privacy-preserving High-dimensional Data Publishing for Classification," Computers & Security, Vol. 93, pp. 101785, 2020-03. (SCIE) -
Tu, S.*, Waqas, M*., Lin, Q.*, Rehman, S. U.*, Hanif, M., Xiao, C., Butt, M. M.* and Chang, C. C., "Tracking Area List Allocation Scheme Based on Overlapping Community Algorithm," Computer Networks, Vol. 173, pp. 107182, 2020-03. (SCIE) -
Xie, X. Z., Chang, C. C.* and Chen, K. M., "A High Embedding Efficiency RDH in Encrypted Image Combining MSB Prediction and Matrix Encoding for Non-volatile Memory-Based Cloud Service," IEEE Access, Vol .8, No. 1, pp. 52028-52040, 2020-03. (SCIE) -
Xia, T. T., Lin, J., Chang, C. C.* and Lu, T. C., "Reversible Data Hiding Scheme Based on the AMBTC Compression Technique and Huffman Coding," International Journal of Computational Science and Engineering, Vol. 22, No. 4, pp. 383–393, 2020-03. (EI) -
Sun, C., Tian, H.*, Chang, C. C., Chen, Y., Cai, Y., Du, Y., Chen, Y. H. and Chen, C. C.*, "Steganalysis of Adaptive Multi-rate Speech Based on Extreme Gradient Boosting," Electronics, Vol. 9, No. 3, pp. 522, 2020-03. (SCIE) -
Wang, X., Chang, C. C. and Lin, C. C*, "Adaptive Reversible Data Hiding Scheme for AMBTC Compressed Images," Multimedia Tools and Applications, Vol. 79, No. 9, pp. 6547–656, 2020-03. (SCIE) -
Su, G. D., Chang, C. C. and Lin, C. C.*, "A High Capacity Reversible Data Hiding in Encrypted AMBTC-compressed Images," IEEE Access, Vol. 8, No. 1, pp. 26984-27000, 2020-02. (SCIE) -
Yu, Z., Chang, C. C. and Lin, C. C.*, "ABMC-DH: An Adaptive Bit-plane Data Hiding Method Based on Matrix Coding," IEEE Access, Vol. 8, No. 1, pp. 27634-27648, 2020-02. (SCIE) -
Lin, J., Weng, S.*, Zhang, T., Ou, B. and Chang, C. C., "Two-layer Reversible Data Hiding based on AMBTC Image with (7, 4) Hamming Code," IEEE Access, Vol. 8, No. 1, pp. 21534-21548, 2020-02. (SCIE) -
Chen, S., Chang, C. C.* and Liao, Q. Y., "Fidelity Preserved Data Hiding in Encrypted Images Based on Homomorphism and Matrix Embedding," IEEE Access, Vol. 8, No. 1, pp. 22345-22356, 2020-02. (SCIE) -
Li, Y., Chang, C. C.* and He, M., "High Capacity Reversible Data Hiding for VQ-compressed Images Based on Difference Transformation and Mapping Technique," IEEE Access, Vol. 8, No. 1, pp. 32226-32245, 2020-02. (SCIE) -
Liu, L.*, Wang, A. and Chang, C. C., "Separable Reversible Data Hiding in Encrypted Images With High Capacity Based on Median-Edge Detector Prediction," IEEE Access, Vol. 8, No. 1, pp. 29639-29647, 2020-02. (SCIE) -
Chen, H., Chang, C. C.* and Chen, K. M., "Reversible Data Hiding Schemes in Encrypted Images Based on the Paillier Cryptosystem," International Journal of Network Security, Vol. 22, No. 3, pp. 521-531, 2020-02. (EI) -
Tseng, K. K., He, X., An, X., Chang, C. C.*, Wang, C. and Guo, X., "Packet Watermarking With ECG Biological Feature," International Journal of Network Security, Vol. 22, No. 1, pp. 1-11, 2020-01. (EI) -
Tian, H.*, Zhu, Z., Chang, C. C., Huang, Y., Wang, T., Chen, Y. and Cai, Y., "StegoNote: Steganography in Guitar Music Using Note Modulation," International Journal of Network Security, Vol. 22, No. 1, pp. 68-79, 2020-01. (EI) -
Li, X. S., Chang, C. C.*, He, M. X. and Lin, C. C., "A Lightweight Authenticable Visual Secret Sharing Scheme based on Turtle Shell Structure Matrix," Multimedia Tools and Applications, Vol. 79, No. 1, pp 453-476, 2020-01. (SCIE) -
Zheng, W., Chang, C. C.*, and Weng, S. W.*, "A Novel Adjustable RDH Method for AMBTC-Compressed Codes Using One-to-many Map," IEEE Access, Vol. 8, No. 1, pp. 13105-13118, 2020-01. (SCIE) -
Tian, H.*, Liu, J., Chang, C. C., Huang, Y, and Cai, Y., "Detecting Steganography in Inactive Voice-over-IP Frames Based on Statistic Characteristics of Fundamental Frequency," IEEE Access, Vol. 8, No. 1, pp. 6117 - 6129, 2020-01. (SCIE) -
Xie, X. Z., Chang, C. C.* and Lin, C. C., "A Hybrid Reversible Data Hiding for Multiple Images with High Embedding Capacity," IEEE Access, Vol. 8, No. 1, pp. 37 - 52, 2020-01. (SCIE) -
Li, L., Chang, C. C.* and Chen, H., "An Improved Bidirectional Shift-Based Reversible Data Hiding Scheme Using Double-Way Prediction Strategy," Security and Communication Networks, Vol. 2019, Dec. 2019, pp. 3031506:1-17, 2019-12. (SCIE) -
Chen, K. M. and Chang, C. C.*, "Error-free Separable Reversible Data Hiding in Encrypted Images Using Linear Regression and Prediction Error Map," Multimedia Tools and Applications, Vol. 78, No. 22, pp. 31441–31465, 2019-11. (SCIE) -
Chen, L., Chen, Z., Choo, K. K. R.*, Chang, C. C. and Sun, H. M,, "Memory Leakage-resilient Dynamic and Verifiable Multi-keyword Ranked Search on Encrypted Smart Body Sensor Network Data," IEEE Sensors Journal, vol. 19, no. 19, pp. 8468-8478, 2019-10. (SCIE) -
Li, X. S., Chang, C. C., He, M. X. and Lin, C. C.*, "Secure High Capacity Data Hiding Scheme based on Reference Matrix," International Journal of Network Security, vol. 21, no. 6, pp. 918-929, 2019-10. (EI) -
Chen, H., Wu, H. L., Chang, C. C.* and Chen, L. S., "Light Repository Blockchain System with Multisecret Sharing for Industrial Big Data," Security and Communication Networks, vol. 2019, pp. 1-7, 2019-10. (SCIE) -
Su, G. D., Liu, Y.* and Chang, C. C., "A Square Lattice Oriented Reversible Information Hiding Scheme with Reversibility and Adaptivity for Dual Images," Journal of Visual Communication and Image Representation, Vol. 64, pp. 102618, 2019-10. (SCIE) -
Chen, C. C., Chang, C. C.*, Lin, C. C.* and Su, G. D., "TSIA: A Novel Image Authentication Scheme for AMBTC-Based Compressed Images Using Turtle Shell Based Reference Matrix," IEEE Access, vol. 7, no. 1, pp. 149515-149526, 2019-10. (SCIE) -
Li, J. J., Lee, C. F., Chang, C. C.*, Lin, J. Y. and Wu, Y. H., "Reversible Data Hiding Scheme based on Quad-tree and Pixel Value Ordering," IEEE Access, vol. 7, no. 1, pp. 142947-142962, 2019-10. (SCIE) -
Yu, Z., Lin, C. C.*, Chang, C. C. and Su, G. D., "HBF-DH: An Enhanced Payload Hybrid Data Hiding Method Based on A Hybrid Strategy and Block Features," IEEE Access, vol. 7, no. 1, pp. 148439-148452, 2019-10. (SCIE) -
Lin, J., Lin, C. C.* and Chang, C. C.*, "Reversible Steganographic Scheme for AMBTC-Compressed Image Based on (7, 4) Hamming Code," Symmetry, vol. 11, pp. 1236, 2019-10. (SCIE) -
Chang, C. C., Wang, X.*, and Horng, J. H., "A Hybrid Data Hiding Method for Strict AMBTC Format Images with High-Fidelity," Symmetry, Vol. 11, No. 10, pp. 1314, 2019-10. (SCIE) -
Huang, P. C., Li, Y. H., Chang, C. C.* and Liu, Y., "Efficient QR Code Authentication Mechanism Based on Sudoku," Multimedia Tools and Applications, Vol. 78, No. 18, pp. 26023–26045, 2019-09. (SCIE) -
Lin, J. Y., Chen, Y., Chang, C. C. and Hu, Y. C.*, "Dual-Image-Based Reversible Data Hiding Scheme with Integrity Verification Using Exploiting Modification Direction," Multimedia Tools and Applications, Vol. 78, No. 18, pp. 25855-25872., 2019-09. (SCIE) -
Zhang, S., Su, S., Li, L.*, Zhou, Q., Lu, J. and Chang, C. C., "An Image Style Transfer Network using Multilevel Noise Encoding and Its Application in Coverless Steganography," Symmetry, Vol. 11, No. 9, pp. 1152, 2019-09. (SCIE) -
Tian, H.*, Liu, J., Chang, C. C., Chen, C. C. and Huang, Y., "Steganalysis of AMR Speech Based on Multiple Classifiers Combination," IEEE Access, vol. 7, pp. 140957-140968, 2019-09. (SCIE) -
He, M. Z., Liu, Y.*, Chang, C. C. and He, M., "A Mini-Sudoku Matrix-Based Data Embedding Scheme with High Payload," IEEE Access, vol. 7, pp. 141414-141425, 2019-09. (SCIE) -
Tian, H.*, Huang, M., Chang, C. C., Huang, Y., Lu, J. and Du, Y., "Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pitch Delay," Journal of Universal Computer Science, vol. 25, no. 9, pp. 1131-1150., 2019-09. (SCIE) -
Li, L., He, M., Zhang, S.*, Luo, T. and Chang, C. C., "AMBTC based High Payload Data Hiding with Modulo-2 Operation and Hamming Code," Mathematical Biosciences and Engineering, vol. 16, no. 6, pp. 7934-7949, 2019-08. (SCIE) -
Lin, Q., Tu, S.*, Waqas, M., Rehman, S. and Chang, C. C., "Tracking Areas Planning Based on Spectral Clustering in Small Cell Networks," IET Communications, Vol. 13, No. 13, pp. 1921-1927, 2019-08. (SCIE) -
Huang, P. C., Chang, C. C.*, Li, Y. H. and Liu, Y., "High-payload Secret Hiding Mechanism for QR Codes," Multimedia Tools and Applications, Vol. 78, No. 16, pp. 22331-22350, 2019-08. (SCIE) -
Ye, W., Chen, H., Zhang, Z., Liu, Y.*, Weng, S. and Chang, C. C., "Hybrid Scheme of Image’s Regional Colorization Using Mask R-CNN and Poisson Editing," IEEE Access, Vol. 7, No. 1, pp. 115901-115913, 2019-08. (SCIE) -
Li, X., Liu, Y.*, Chen, H. and Chang, C. C., "A Secret Image Restoring Scheme Using Threshold Pairs of Unordered Image Shares," IEEE Access, Vol. 7, pp. 118249-118258, 2019-08. (SCIE) -
Nguyen, N. T. and Chang, C. C.*, "A Biometric-based Authenticated Key Agreement Protocol for User-to-user Communications in Mobile Satellite Networks," Wireless Personal Communications, Vol. 107, No. 4, pp. 1727-1758, 2019-08. (SCIE) -
Su, G. D., Chang, C. C. and Lin, C. C.*, "High-precision Authentication Scheme Based on Matrix Encoding for AMBTC-compressed Images," Symmetry, Vol. 11, No. 8, pp. 996, 2019-08. (SCIE) -
Xie, X. Z., Chang, C. C., Lin, C. C.* and Lin, J. L., "A Turtle Shell based RDH Scheme with Two-Dimensional Histogram Shifting," Multimedia Tools and Applications, Vol. 78, No. 14, pp. 19413-19436, 2019-07. (SCIE) -
Xie, X. Z., Liu, Y.* and Chang, C. C., "Extended Squared Magic Matrix for Embedding Secret Information with Large Payload," Multimedia Tools and Applications, Vol. 78, No. 14, pp. 19045-19059, 2019-07. (SCIE) -
Li, L.*, He, M., Yu, J., Lu, J., Zhou, Q., Feng, X. and Chang, C. C., "Aesthetic QR Code Authentication Based on Directed Periodic Texture Pattern," Accepted byJournal of Computers, Vol. 30, No. 6, pp. 263-275, 2019-07. (EI) -
Li, X., Liu, Y.*, Chen, H. and Chang, C. C., "A Novel Secret Sharing Scheme Using Multiple Share Images," Mathematical Biosciences and Engineering, Vol. 16, No. 6, pp. 6350-6366, 2019-07. (SCIE) -
Xie, X. Z., Chang, C. C.* and Lin, C. C., "Reversibility-oriented Secret Image Sharing Mechanism with Steganography and Authentication Based on Code Division Multiplexing," IET Image Processing, vol. 13, no. 9, pp. 1411-1420, 2019-07. (SCIE) -
Tian, H., Chen, Z., Chang, C. C., Huang Y., Wang, T.*, Huang, Z., Cai, Y. and Chen, Y., "Public Audit for Operation Behavior Logs with Error Locating in Cloud Storage," Soft Computing, Vol. 23, No. 11, pp. 3779-3792, 2019-06. (SCIE) -
Lin, J. Y., Liu, Y.* and Chang, C. C., "A Real-Time Dual-Image-Based Reversible Data Hiding Scheme Using Turtle Shells," Journal of Real-Time Image Processing, Special Issue on Real-Time Image Watermarking and Forensics in Cloud Computing, Vol. 16, No. 3, Jun. 2019, pp. 673-684, 2019-06. (SCIE) -
Chang, C. C.*, Lee, W. K., Liu, Y., Goi, B. M. and Phan, R. C. W., "Signature Gateway: Offloading Signature Generation to IoT Gateway Accelerated by GPU," IEEE Internet of Things Journal, Special Issue on Emerging Computing Offloading for IoTs: Architectures, Technologies, a, Vol. 6, No. 3, pp. 4448 - 4461, 2019-06. (SCIE) -
Chen, L., Lee, W. K., Chang, C. C., Choo, K. K. R.* and Zhang, N., "Blockchain based Searchable Encryption for Electronic Health Record Sharing," Future Generation Computer Systems, Vol. 95, pp. 420-429, 2019-06. (SCIE) -
Xie, X. Z., Lin, C. C.* and Chang, C. C., "A Reversible Data Hiding Scheme for JPEG Images by Doubling Small Quantized AC Coefficients," Multimedia Tools and Applications, Vol. 78, No. 9, pp. 11443-11462, 2019-05. (SCIE) -
Shiu, P. F., Tai, W. L.*, Jan, J. K., Chang, C. C. and Lin, C. C.*, "An Interpolative AMBTC-based High-Payload RDH Scheme for Encrypted Images," Signal Processing: Image Communication, Vol. 74, pp. 64-77, 2019-05. (SCIE) -
Chen, K. and Chang, C. C.*, "High-capacity Reversible Data Hiding in Encrypted Images Based on Two-phase Histogram Shifting," Mathematical Biosciences and Engineering, Special Issue on Security and Privacy Protection for Multimedia Information Pr, Vol. 16, No. 5, pp. 3947-3964, 2019-05. (SCIE) -
Zhang, S., Guo, X., Xu, X., Li, L.* and Chang, C. C., "A Video Watermark Algorithm Based on Tensor Decomposition," Mathematical Biosciences and Engineering, Vol. 16, No. 5, pp. 3435-3449, 2019-04. (SCIE) -
Liu, L.*, Wang, L.* and Chang, C. C.*, "Data Embedding Scheme Based on Multi-Matrix Structure of Turtle Shell to Avoid Human Eye Perception," Multimedia Tools and Applications, Vol. 78, No. 8, pp. 10473-10490, 2019-04. (SCIE) -
Liu, Y., Xu, Z., Ye, W.*, Zhang, Z., Weng, S., Chang, C. C. and Tang, H., "Image Neural Style Transfer with Preserving the Salient Regions," IEEE Access, Vol. 7, pp. 40027-40037, 2019-04. (SCIE) -
Huang, P. C., Chang, C. C., Li, Y. H.* and Liu, Y., "Efficient Secret Sharing Scheme with Cheater Identification Based on QR Code," KSII Transactions on Internet and Information Systems, vol. 13, no. 10, pp. 5144-5160, 2019-04. (SCIE) -
Hu, H., Lin, C.*, Chang, C. C. and Chen, L., "Enhanced Secure Data Backup Scheme Using Multi-factor Authentication," IET Information Security, vol. 13, no. 6, pp. 649-658, 2019-04. (SCIE) -
Li, L., Wang, B., Lu, J.*, Zhang, S. and Chang, C. C., "A New Aesthetic QR Code Algorithm based on Salient Region Detection and SPBVM," Journal of Internet Technology, Vol. 20, No. 3, pp. 935-946, 2019-03. (SCIE) -
Lin, J. Y., Chen, Y., Chang, C. C.* and Hu, Y. C., "Reversible Data Hiding in Encrypted Images Based on Bit-plane Block Embedding," J. of Information Hiding and Multimedia Signal Processing, Vol. 10, No. 2, pp. 408-421, 2019-03. (.) -
Liu, Y. and Chang, C. C.*, "A Cloud-assisted Passenger Authentication Scheme for Japan Rail Pass Based on Image Morphing," International Journal of Network Security, Vol. 21, No. 2, pp. 211-220, 2019-03. (EI) -
Tang, X.*, Huang, Y., Chang, C. C. and Zhou, L., "Efficient Real-time Integrity Auditing with Privacy-preserving Arbitration for Images in Cloud Storage System," IEEE Access, Vol. 7, pp. 33009-33023, 2019-03. (SCIE) -
Guo, C., Zhuang, R., Chang, C. C.* and Yuan, Q., "Dynamic Multi-Keyword Ranked Search Based on Bloom Filter over Encrypted Cloud Data," IEEE Access, Vol. 7, pp. 35826-35837, 2019-03. (SCIE) -
Liu, Y., Chang, C. C.* and Huang, P. C., "Security Protection Using Two Different Image Shadows with Authentication," Mathematical Biosciences and Engineering, Vol. 16, No. 4, pp. 1914-1932, 2019-03. (SCIE) -
Weng, S.*, Chen, Y., Ou, B., Chang, C. C. and Zhang, C., "Improved K-pass Pixel Value Ordering Based Data Hiding," IEEE Access, Vol. 7, pp. 34570-34582, 2019-03. (SCIE) -
Chen, H. and Chang, C. C.*, "A Novel (t,n) Secret Sharing Scheme Based Upon Euler's Theorem," Security and Communication Networks, Vol. 2019, pp. 1-7, 2019-03. (SCIE) -
Tian, H.*, Nan, F., Chang, C. C., Huang, Y., Lu, J. and Du, Y., "Privacy-preserving Public Auditing for Secure Data Storage in Fog-to-Cloud Computing," Journal of Network and Computer Applications, Vol. 127, No. 3, pp. 59-69, 2019-02. (SCIE) -
Tian, H.*, Nan, F., Jiang, H., Chang, C. C., Ning, J. and Huang, Y., "Public Auditing for Shared Cloud Data with Efficient and Secure Group Management," Information Sciences, Vol. 472, pp. 107-125, 2019-01. (SCIE) -
Guo, C., Tian, P. and Chang, C. C.*, "Privacy Preserving Weighted Similarity Search Scheme for Encrypted Data," IET Image Processing, Vol. 13, No. 1, pp. 61-69, 2019-01. (SCIE) -
Chen, K. M. and Chang, C. C.*, "High-capacity Reversible Data Hiding in Encrypted Images Based on Extended Run-Length Coding and Block-based MSB Plane Rearrangement," Journal of Visual Communication and Image Representation, Vol. 58, pp. 334-344, 2019-01. (SCIE) -
Chen, Y. H., Chang, C. C., Lin, C. C.* and Hsu, C. Y., "Content-based Color Image Retrieval Using Block Truncation Coding Based on Binary Ant Colony Optimization," Symmetry, Vol. 11, No. 1, pp. 21, 2019-01. (SCIE) -
Chen, K. and Chang, C. C.*, "Real-Time Error-Free Reversible Data Hiding in Encrypted Images Using (7, 4) Hamming Code and Most Significant Bit Prediction," Symmetry, Special Issue on Emerging Data Hiding Systems in Image Communication, Vol. 11, No. 1, pp. article number: 51., 2019-01. (SCIE) -
Xia, Z., Liu, Y.*, Hsu, C. F. and Chang, C. C., "An Information Theoretically Secure E-lottery Scheme Based on Symmetric Bivariate Polynomials," Symmetry, Vol. 11, No. 1, pp. 1-12, 2019-01. (SCIE) -
Liu, L.*, Wang, L., Shi, Y. Q. and Chang, C. C., "Separable Data-Hiding Scheme for Encrypted Image to Protect Privacy of User in Cloud," Symmetry, Vol. 11, No. 1, pp. 85, 2019-01. (SCIE) -
Li, L., Lin, C. C.* and Chang, C. C.*, "Using Two Meaningful Shadows to Share Secret Messages with Reversibility," Symmetry, Vol. 11, No. 1, pp. 79, 2019-01. (SCIE) -
Weng, S.*, Chen, Y., Hong, W., Pan, J. S., Chang, C. C. and Liu, Y., "An Improved Integer Transform Combining with an Irregular Block Partition," Symmetry, vol. 11, no.1, pp. 49, 2019-01. (SCIE) -
Liu, J., Tian, H.*, Chang, C. C., Wang, T., Chen, Y. and Cai, Y., "Steganalysis of Inactive Voice-over-IP Frames Based on Poker Test," Symmetry, Vol. 10, No. 8, pp. article number: 336., 2018-12. (SCIE) -
Qin, C., Zhang, W., Cao, F., Zhang, X. and Chang, C. C.*, "Separable Reversible Data Hiding in Encrypted Images via Adaptive Embedding Strategy with Block Selection," Signal Processing, Vol. 153, pp. 109-122, 2018-12. (SCIE,EI) -
Lin, C.*, Hu, H., Chang, C. C. and Tang, S., "A Publicly Verifiable Multi-secret Sharing Scheme with Outsourcing Secret Reconstruction," IEEE Access, Vol. 6, No. 1, pp. 70666-70673., 2018-12. (SCIE) -
Tu, S., Waqas, M.*, Rehman, S. R., Aamir, M., Rehman, O. U., Zhang, J. and Chang, C. C., "Security in Fog Computing: A Novel Technique to Tackle an Impersonation Attack," IEEE Access, vol 6, no. 0, pp. 74993-75001, 2018-11. (SCIE) -
Wang, R., Zhu, Y.*, Chen, T. S. and Chang, C. C., "Privacy-Preserving Algorithms for Multiple Sensitive Attributes Satisfying t-Closeness," Journal of Computer Science and Technology, Vol. 33, No. 6, pp. 1231-1242, 2018-10. (SCIE) -
Lu, J., Cheng, W., Zhang, S., Li, L.*, Yang, Z. and Chang, C. C., "A Novel Aesthetic QR Code Algorithm Based on Hybrid Basis Vector Matrices," Symmetry, Vol. 10, No. 11, article number: 543, 2018-10. (SCIE) -
Liu, Y. and Chang, C. C.*, "A Turtle Shell-based Visual Secret Sharing Scheme with Reversibility and Authentication," Multimedia Tools and Applications, Vol. 77, No. 19, pp. 25295-25310, 2018-10. (SCIE,EI) -
Huang, P. C., Chang, C. C.* and Li, Y. H., "Sudoku-based Secret Sharing Approach With Cheater Prevention Using QR Code," Multimedia Tools and Applications, Vol. 77, No. 19, pp. 25275-25294, 2018-10. (SCIE,EI) -
Nguyen, T. S.*, Chang, C. C. and Shih, T.H., "Effective Reversible Image Steganography Based on Rhombus Prediction and Local Complexity," Multimedia Tools and Applications, Vol. 77, No. 20, pp. 26449-26467, 2018-10. (SCIE) -
Chen, W., Tian, H.*, Chang, C. C., Nan, F. and Lu, J., "Adjacency-Hash-Table based Public Auditing for Data Integrity in Mobile Cloud Computing," Wireless Communications and Mobile Computing, Vol. 2018, pp. article id 3471312, 2018-09. (SCIE) -
Nguyen, N. T. and Chang, C. C.*, "A Biometric-based Authenticated Key Agreement Scheme for Session Initiation Protocol in IP-based Multimedia Networks," Multimedia Tools and Applications, Vol. 77, No. 18, pp. 23909-23947., 2018-09. (SCIE,EI) -
Xia, B., Wang, A., Chang, C. C.* and Liu, L., "Reversible Data Hiding for VQ Indices using Hierarchical State Codebook Mapping," Multimedia Tools and Applications, Vol. 77, No. 16, pp. 20519-20533., 2018-08. (SCIE,EI) -
Wang, R., Zhu, Y.*, Chen, T. S. and Chang, C. C., "An Authentication Method Based on the Turtle Shell Algorithm for Privacy-Preserving Data Mining," The Computer Journal, Vol. 61, No. 8, pp. 1123-1132, 2018-08. (SCIE,EI) -
Nguyen, D. C., Nguyen T. S.*, Chang, C. C., Hsueh, H. S., and Hsu, F. R., "High Embedding Capacity Data Hiding Algorithm for H.264/AVC Video Sequences without Intraframe Distortion Drift," Security and Communication Networks, Vol. 2018, pp. article id 2029869, 2018-08. (SCIE) -
Chang, C. C., Chiu, Y. P., Lin, C. C*. and Chen, Y. H., "Distortion Free Progressive BTC based Secret Image Sharing," Journal of Network Intelligence, Vol. 3, No. 3, pp. 195-213, 2018-08, 2018-08. (.) -
Xia, Z.*, Tong, Z., Xiao, M. and Chang, C. C., "Framework for Practical and Receipt-free Remote Voting," IET Information Security, Vol. 12, No. 2, pp. 326-331, 2018-07. (SCIE,EI) -
Zhu, Z., Tian, H.*, Chang, C. C., Chen, Y., Wang, T. and Cai, Y., "StegTab: Steganography in Guitar Tablatures," J. of Information Hiding and Multimedia Signal Processing, Vol. 9, No. 4, pp. 904-917., 2018-07. (EI) -
Qin, C., Ji, P., Chang, C. C., Dong, J. and Sun, X., "Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image Tampering Recovery," IEEE Multimedia, Special Issue on Cyber Security for Cyber-Enabled Multimedia Applications, Vol. 25, No. 3, pp. 36-48, 2018-07. (SCIE) -
Li, L.*, Li, H., Yuan, W., Feng, X., Lu, J. and Chang, C. C., "A Watermarking Mechanism With High Capacity for Three-Dimensional Mesh Objects Using Integer Planning," IEEE Multimedia, Special Issue on Cyber Security for Cyber-Enabled Multimedia Applications, Vol. 25, No. 3, pp. 49-64, 2018-07. (SCIE) -
Tan, J., Zhu, Y.*, Chen, T. S. and Chang, C. C., "Imbalanced Image Classification Approach Based on Convolution Neural Network and Cost-sensitivity," Journal of Computer Applications, Vol. 38, No. 7, pp. 1862-1865,1871, 2018-07. (.) -
Lee, C. F., Chang, C. C.*, Xie, X. Z., Mao, K. and Shi, R. H., "An Adaptive High-Fidelity Steganographic Scheme Using Edge Detection and Hybrid Hamming Codes," Displays, Vol. 53, pp. 30-39, 2018-07. (SCIE,EI) -
Li, J., Yu, J., Xu, L., Xue, X., Chang, C. C.*, Mao, X. and Hu, J., "A Cascaded Algorithm for Image Quality Assessment and Image Denoising Based on CNN for Image Security and Authorization," Security and Communication Networks, Special Issue on Security and Privacy for Smart, Connected, and Mobile IoT Devices, Vol. 2018, pp. article id 8176984, 2018-07. (SCIE,EI) -
Yang, Z. L., Peng, X. S., Huang, Y. F. and Chang, C. C.*, "A Novel Method of Speech Information Hiding Based on 3D-Magic Matrix," Accepted byJournal of Internet Technology, 2018-07. (SCIE,EI) -
Tian, H.*, Sun, J., Chang, C. C., Huang, Y. and Chen, Y., "Detecting Bitrate Modulation-Based Covert Voice-Over-IP Communication," IEEE Communications Letters, Vol. 22, No. 6, pp. 1196-1199, 2018-06. (SCIE) -
Lu, J., Xu, X., Li, X., Li, L.*, Chang, C. C., Feng, X. and Zhang, S., "Detection of Bird‘s Nest in High Power Lines in the Vicinity of Remote Campus Based on Combination Features and Cascade Classifier," IEEE Access, Vol. 6, pp. 39063 - 39071, 2018-06. (SCIE) -
Li, J.*, Peng, K. and Chang, C. C.*, "An Efficient Object Detection Algorithm Based on Compressed Networks," Symmetry, Vol. 10, No. 7, pp. article number: 235, 2018-06. (SCIE) -
Li, J., Wang, C., Chen, X., Tang, Z., Hui, G. and Chang, C. C.*, "A Selective Encryption Scheme of CABAC based on Video Context in High Efficiency Video Coding," Multimedia Tools and Applications, Vol. 77, No. 10, pp. 12837-12851, 2018-05. (SCIE,EI) -
Huang, P. C., Li, Y. H., Chang, C. C.* and Liu, Y., "Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction," KSII Transactions on Internet and Information Systems, Vol. 12, No. 5, pp. 2348-2365., 2018-05. (SCIE,EI) -
Yao, Y., Yu, C. X.*, Yang, L., Chang, C. C., "Computer-Aided Annotation for Video Tampering Dataset of Foyensic Research," J. of Information Hiding and Multimedia Signal Processing, Vol. 9, No. 3, pp. 768-774, 2018-05. (EI) -
Nguyen, N. T. and Chang, C. C.*, "Untraceable Biometric-Based Three-Party Authenticated Key Exchange for Dynamic Systems," Peer-to-Peer Networking and Applications, Vol. 11, No. 3, pp. 644-663, 2018-05. (SCIE) -
Chang, C. C., Huynh, N. T., Wang, Y. K. and Liu, Y.*, "An Improved Data Hiding Method Based on Lempel-Ziv-Welch Compression Codes," International Journal of Network Security, Vol.20, No.3, pp..478-488, 2018-05. (EI) -
Rehman, S., Tu, S.*, Rehman, O., Huang, Y., Magurawalage, C. and Chang, C. C., "Optimization of CNN through Novel Training Strategy for Visual Classification Problems," Entropy, Vol. 20, No. 4, pp. article number: 290, 2018-04. (SCIE) -
Li, J., Wang, N., Wang, Z. H.*, Li, H., Chang, C. C. and Wang, H., "New Secret Sharing Scheme Based on Faster R-CNNs Image Retrieval," IEEE Access, Vol. 6, pp. 49348-49357, 2018-04. (SCIE) -
Chang, C. C., Chen, T. S., Wang, Y. K. and Liu, Y.*, "A Reversible Data Hiding Scheme Based on Absolute Moment Block Truncation Coding Compression Using Exclusive OR Operator," Multimedia Tools and Applications, Vol. 77, No. 7, pp. 9039-9053, 2018-04. (SCIE,EI) -
Huynh, N. T., Bharanitharan, K., Chang, C. C. and Liu, Y.*, "Minima-Maxima Preserving Data Hiding Algorithm for Absolute Moment Block Truncation Coding Compressed Images," Multimedia Tools and Applications, Vol. 77, No. 5, pp. 5767-5783, 2018-03. (SCIE,EI) -
Li, F., Mao, Q. and Chang, C. C.*, "Reversible Data Hiding Scheme Based on the Haar Discrete Wavelet Transform and Interleaving Prediction Method," Multimedia Tools and Applications, Vol. 77, No. 5, pp. 5149-5168, 2018-03. (SCIE,EI) -
Guo, C., Chang, C. C.* and Chang, S. C., "A Secure and Efficient Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communication," International Journal of Network Security, Vol. 20, No. 2, pp. 323-331, 2018-03. (EI) -
Huang, P. C., Chang, C. C.*, Li, Y. H. and Liu, Y.,, "Efficient Access Control System Based on Aesthetic QR Code," Personal and Ubiquitous Computing , Special Issue on Advanced Technology for Smart Home Automation and Entertainment, Vol. 22, No. 1, pp. 81-91, 2018-02. (SCIE) -
Xie, X. Z., Lin, C. C.* and Chang, C. C., "Data Hiding Based on A Two-layer Turtle Shell Matrix," Symmetry, Special Issue on Emerging Data Hiding Systems in Image Communications, Vol. 10, No. 2, pp. article number: 47., 2018-02. (SCIE) -
Zhang, S., Wu, T.*, Xu, X., Cheng, Z., Pu. S. and Chang, C. C, "No-Reference Image Blur Assessment Based on SIFT and DCT," J. of Information Hiding and Multimedia Signal Processing, Vol. 9, No. 1, pp. 219-231, 2018-01. (EI) -
Chang, C. C., Lu, T. C.*, Zhu, Z. H and Tian, H., "An Effective Authentication Scheme Using DCT for Mobile Devices," Symmetry, Special Issue on Emerging Data Hiding Systems in Image Communications, Vol. 10, No. 1, article number: 13, 2018-01. (SCIE) -
Liu, Y., Chang, C. C.*, Huang, P. C. and Hsu, C. Y., "Efficient Information Hiding Based on Theory of Numbers," Symmetry, Special Issue on Emerging Data Hiding Systems in Image Communications, Vol. 10, No. 1, article number: 19, 2018-01. (SCIE) -
Qin, C., Sun, M. and Chang, C. C*, "Perceptual Hashing for Color Images Based on Hybrid Extraction of Structural Features," Signal Processing, Vol. 142, pp. 194-205., 2018-01. (SCIE,EI) -
Wang, J. Q., Zhu, Y.*, Chen, T. S. and Chang, C. C., "Optimum Feature Selection Based on Genetic Algorithm Under Web Spam Detection," Journal of Computer Applications, Vol. 38, No. 1, pp. 295-299., 2018-01. (.) -
Chang, C. C., Tang, R., Lin, C. C. and Lyu, W. L., "High-Capacity Reversible Data Hiding Method for JPEG Images," Journal of Software, Vol. 13, No. 1, pp. 1-17, 2018-01. (.) -
Liu, Y.* and Chang, C. C., "Reversible Data Hiding for JPEG Images Employing All Quantized Non-Zero AC Coefficients," Displays, Vol. 51, pp. 51-56, 2018-01. (SCIE,EI) -
Wu, H. L. and Chang, C. C.*, "Attacks on "A Provably Secure and Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems"," Multimedia Tools and Applications, Vol. 77, No. 2, pp. 1525-1535., 2018-01. (SCIE,EI) -
Zhuang, X., Zhu, Y.*, Chang, C. C.* and Peng, Q., "Security Issues in Ultralightweight RFID Authentication Protocols," Wireless Personal Communications, Vol. 98, No. 1, pp. 779-814, 2018-01. (SCIE) -
Li, J. J., Wu, Y. H., Lee, C. F. and Chang, C. C.*, "Generalized PVO-K Embedding Technique for Reversible Data Hiding," International Journal of Network Security, Vol. 20, No. 1, pp. 65-77., 2018-01. (EI) -
Li, J., Xu, L., Wang, Z. and Chang, C. C.*, "No-reference Image Quality Assessment for Multiple Distortions Using Saliency Map Based on A Dual-convolutional Neural Networks," Journal of Internet Technology, Vol. 18, No. 7, pp. 1701-1710, 2017-12. (SCIE,EI) -
Zhuang, X.*, Zhu, Y., Chang, C. C., Peng, Q. and Faisal, M., "A Unified Score Propagation Model for Web Spam Demotion Algorithm," Information Retrieval Journal, Vol. 20, No. 6, pp. 547-574, 2017-12. (SCIE,EI) -
Tang, R., Chang, C. C. and Lin, C. C.*, "A High-capacity Data Hiding Method Based on Sudoku Games," Accepted byJournal of Software, 2017-11. (EI) -
Bai, J., Chang, C. C. and Zhu, C.*, "A Lossless Data Hiding Scheme Based on VQ Index Frequency," Journal of Internet Technology, Vol. 18, No. 6, pp. 1297-1310., 2017-11. (SCIE,EI) -
Liu, Y. and Chang, C. C.*, "A One-Card-Pass User Authentication Scheme Using Image Morphing," Multimedia Tools and Applications, Vol. 76, No. 20, pp 21247-21264, 2017-10. (SCIE,EI) -
Liu, L., Wang, L. F. and Chang, C. C.*, "A Semantic Compression Scheme for Digital Images Based on Vector Quantization and Data Hiding," Multimedia Tools and Applications, Vol. 76, 、No. 20, pp 20833-20846, 2017-10. (SCIE) -
Chang, C. C., Lee, J. S. and Wu, J. S., "An Energy Conservation Authentication Scheme in Wireless Body Area Network,," Communications of the CCISA, Special Issue on The New Research Trend on the Multimedia and Network Securit, Vol. 23, No. 4, pp. 37-54, 2017-10. (.) -
Lin, Z.*, Zhu, Y., Chen, T. S. and Chang, C. C., "Pouncing on Web Spam Using a Random Forest-Based Tree Structure Ensemble Learning Method," Accepted byApplication Research of Computers, 2017-10. -
Huang, Y*, Tao, H., Xiao, B. and Chang, C. C., "Steganography in Low Bit-rate Speech Streams of VoIP Based on Quantization Index Modulation Controlled by Keys," Science China Technological Sciences, Vol. 60, No. 10, pp. 1585-1596, 2017-10. (SCIE) -
Jin, Q., Xiang, Y., Sun, G.,Liu, Y. and Chang, C. C., "Cybersecurity for Cyber-Enabled Multimedia Applications," IEEE MultiMedia, Vol. 24, No. 4, pp. 10-13., 2017-10. (SCIE) -
Jiang, Z., Zhang, Z., Wang, L.*, Chang, C. C. and Liu, L., "Load Balance Strategy of Data Routing Algorithm Using Semantics for Deduplication Clusters," Journal of Electronic Science and Technology, Vol. 15, No. 3, pp. 277-282, 2017-09. (SCOPUS) -
Tian, H.*, Chen, Y., Chang, C. C., Jiang, H., Huang, Y., Chen, Y. H. and Liu, J., "Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage," IEEE Transactions on Services Computing, Vol. 10, No. 5, pp. 701-714, 2017-09. (SCIE,EI) -
Mao, K., Lee, C. F.*, Chang, C. C. and Shi, R. H., "Study of Difference-Expansion Embedding Schemes," Journal of Electronic Science and Technology, Special Issue on Information Security and Applications, Vol. 15, No. 3, pp. 211-216, 2017-09. (EI) -
Chang, C. C.*, Nguyen, T. S. and Chien, T. Y., "An Efficient Steganography Scheme Based on Edge Detection for High Payload," J. of Information Hiding and Multimedia Signal Processing, Vol. 8, No. 5, pp. 967-979, 2017-09. (EI) -
Cheng, T. F., Chang, C. C.* and Lo, Y. Y., "Smart Card-Based Password Authenticated Key Agreement Protocol Using Chaotic Maps," International Journal of Communication Systems, Vol. 30, No. 12, pp. 1-15., 2017-08. (SCIE,EI) -
Wang, F., Chang, C. C.* and Wu, H. L., "Secure CAS-based Authentication Scheme for Mobile Pay-TV Systems," International Journal of Communication Systems, Vol. 30, No. 10, pp. 1-12., 2017-07. (SCIE,EI) -
Chang, C. C.*, Pai, P. Y., Tsai, M. H. and Chan, Y. K., "Vessel Detection in Chicken Chorioallantoic Membrane Image," J. of Information Hiding and Multimedia Signal Processing, Vol. 8, No. 4, pp. 784-797., 2017-07. (EI) -
Wang, L. M., Xie, Q. Q., Jiang, T. and Chang, C. C.*, "ShortHC: Self-Regenerated Short Hash Chain for Resource-Constrained System," J. of Information Hiding and Multimedia Signal Processing, Vol. 8, No. 4, pp. 847-860, 2017-07. (EI) -
Chang, C. C.*, Wu, H. L. and Sun, C. Y., "Notes on "Secure Authentication Scheme for IoT and Cloud Servers"," Pervasive and Mobile Computing, Vol. 38, pp. 275-278., 2017-07. (SCIE) -
Wu, H. L., Chang, C. C. and Nguyen, T. S., "Reversible Data Hiding Using Pixel Order Exchange," International Journal of Future Computer and Communication, Vol. 6, No. 2, pp. 72-75, 2017-06. (EI) -
Liu, L., Wang, A. Chang, C. C.* and Li, Z., "A Secret Image Sharing with Deep-steganography and Two-stage Authentication Based on Matrix Encoding," International Journal of Network Security, Vol.19, No.3, pp. 327-334, 2017-05. (EI) -
Tian, H.*, Qin, J., Chang, C. C., Huang, Y. and Chen, Y. H., "Improved Wet Paper Code Using Simplified Hamming Parity-Check Matrix and Its Application in Voice-over-IP Steganography," Journal of Internet Technology, Vol. 18, No. 3, pp. 551-559, 2017-05. (SCIE,EI) -
Tian, H.*, Wu, Y., Chang, C. C., Huang, Y., Chen, Y., Wang, T., Cai, Y. and Liu, J., "Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pulse Pairs," Signal Processing, Vol. 134, pp. 9-22, 2017-05. (SCIE,EI) -
Chu, W.*, Wang, L., Jiang, Z. and Chang, C. C., "Protecting User Privacy in a Multi-path Information-Centric-Network Using Multiple Random-Caches," Journal of Computer Science and Technology, Vol. 32, No. 3, pp. 585-598, 2017-05. (SCIE) -
Chang, C. C.*, Huang, Y. H. and Lu, T. C., "A Difference Expansion Based Reversible Information Hiding Scheme with High Stego Image Visual Quality," Multimedia Tools and Applications, Vol. 76, No. 10, pp. 12659-12681, 2017-05. (SCIE) -
Liu, L., Chang, C. C.* and Wang, A., "Data Hiding Based on Extended Turtle Shell Matrix Construction Method," Multimedia Tools and Applications, Vol. 76, No. 10, pp. 12233-12250, 2017-05. (SCIE,EI) -
Tian, H.*, Chen, Z., Chang, C. C., Kuribayashi, M., Huang, Y., Cai, Y., Chen, Y. and Wang, T., "Enabling Public Auditability for Operation Behaviors in Cloud Storage," Soft Computing, Vol. 21, No. 8, pp. 2175-218, 2017-04. (SCIE) -
Tian, H.*, Sun, J., Chang, C. C., Qin, J. and Chen, Y., "Hiding Information into Voice-over-IP Streams Using Adaptive Bitrate Modulation," IEEE Communications Letters, Vol. 21, No. 4, pp. 1-4, 2017-04. (SCIE) -
Liu, Y.*, Zhong, Q., Shen, J. and Chang, C. C., "A Novel Image Protection Scheme using Bit-plane compression and Secret Sharing," Journal of the Chinese Institute of Engineers, Vol. 40, No. 2, pp. 161-169, 2017-03. (SCIE) -
Liu, Y. N., Liu, G. and Chang, C. C.*, "Lottery Protocol Using Oblivious Transfer Based on ECC," Journal of Internet Technology, Vol. 18, No. 2, pp.279-285, 2017-03. (SCIE,EI) -
Lu, J., Yang, Z., Li, L., Yuan, W., Li, L. and Chang, C. C.*, "Multiple Schemes for Mobile Payment Authentication Using QR Code and Visual Cryptography," Mobile Information Systems, Vol. 2017, Article ID 4356038, 12 pages, 2017-03. (SCIE,EI) -
Zhuang, X.*, Zhu, Y., Chang, C. C. and Peng, Q., "Feature Bundling in Decision Tree Algorithm," Intelligent Data Analysis, Vol. 21, No. 2, pp. 371-383, 2017-03. (SCIE) -
Mao, Q. and Chang, C. C.*, "Turbo Unequal Error Protection Codes with Multiple Protection Levels," International Journal of Network Security, Vol. 19, No. 2, pp. 205-216, 2017-03. (EI) -
Zhong, H., Liu, H., Chang, C. C. and Lin, C. C.*, "A Novel Lossless Secret Image Sharing Scheme with Authentication," Accepted byMathematical Problems in Engineering, 2017-03. (SCIE) -
Li, J.*, Fan, S., Wang, Z., Li, H. and Chang, C. C., "An Optimized CLBP Descriptor Based on a Scalable Block Size for Texture Classification," KSII Transactions on Internet and Information Systems, Vol. 11, No. 1, pp. 288-301, 2017-01. (SCIE,EI) -
Yu, F.*, Chang, C. C., Shu, J., Ahmad, I., Zhang, J. and Fuentes, J. M., "Recent Advances in Security and Privacy for Wireless Sensor Networks 2016," Journal of Sensors, Vol. 2017, Article ID 3057534, 2017-01. (SCIE) -
Bai, J., Chang, C. C., Nguyen, T. S., Zhu, C. and Liu, Y.*, "A High Payload Steganographic Algorithm Based on Edge Detection," Displays, Vol. 46, pp. 42-51, 2017-01. (SCIE,EI) -
Jin, Q., Li, Z., Chang, C. C.*, Wang, A. and Liu, L., "Minimizing Turtle-Shell Matrix Based Stego Image Distortion Using Particle Swarm Optimization," International Journal of Network Security, Vol. 19, No. 1, pp. 154-162, 2017-01. (EI) -
Qin, C., Ji, P., Wang, J. and Chang, C. C.*, "Fragile Image Watermarking Scheme Based on VQ Index Sharing and Self-embedding," Multimedia Tools and Applications, Vol. 76, No. 2, pp. 2267-2287, 2017-01. (SCIE,EI) -
Liu, Y., Chang, C. C.* and Chang, S. C., "An Efficient and Secure Smart Card Based Password Authentication Scheme," International Journal of Network Security, Vol. 19, No. 1, pp. 1-10, 2017-01. (EI) -
Kuo, W. C.*, Chang, S. Y., Wang, C. C. and Chang, C. C., "Secure Multi-group Data Hiding Based on GEMD Map," Multimedia Tools and Applications, Vol. 76, No. 2, pp. 1901-1919, 2017-01. (SCIE,EI) -
Zhao, Q. Y., Liu, Y. N., Liu, G. and Chang, C. C.*, "A Novel Micropayment Scheme with Variable Denomination," International Journal of Network Security, Vol. 19, No. 1, pp. 85-90, 2017-01. (EI) -
Li, F., Bharanitharan, K., Chang, C. C.* and Mao, Q., "Bi-Stretch Reversible Data Hiding Algorithm for Absolute Moment Block Truncation Coding Compressed Images," Multimedia Tools and Applications, Vol. 75, No. 23, pp. 16153-16171, 2016-12. (SCIE,EI) -
Di, Y. F., Lee, C. F., Wang, Z. H.*, Chang, C. C. and Li, J. J., "A Robust and Removable Watermarking Scheme Using Singular Value Decomposition," KSII Transactions on Internet and Information Systems, Vol. 10, No. 12, pp. 5268-5285, 2016-12. (SCIE,EI) -
Liu, X. L., Chang, C. C., Lin, C. C.* and Yuan, S. M., "A High-Payload, Reversible Data Hiding Scheme Based on Histogram Modification in JPEG Bitstream," Imaging Science Journal, Vol. 64, No. 7, pp. 364-373, 2016-12. (SCIE) -
Hsieh, S. H.*, Li, Y. H., Tien, C. H. and Chang, C. C., "Extending the Capture Volume of an Iris Recognition System Using Wavefront Coding and Super-Resolution," IEEE Transactions on Cybernetics, Vol. 46, No. 12, pp. 3342-3350, 2016-12. (SCIE,EI) -
Chang, C. C.*, Hsueh, W. Y. and Cheng, T. F., "An Advanced Anonymous and Biometrics-based Multi-server Authentication Scheme Using Smart Cards," International Journal of Network Security, Vol. 18, No. 6, pp. 1010-1021., 2016-11. (EI) -
Mao, Q., Bharanitharan, K. and Chang, C. C.*, "Novel Lossless Morphing Algorithm for Secret Sharing via Meaningful Images," J. of Information Hiding and Multimedia Signal Processing, Vol. 7, No. 6, pp. 1168-1184, 2016-11. (EI) -
Liu, X. L., Lin, C. C.*, Chang, C. C. and Yuan, S. M., "A Survey of Fragile Watermarking-based Image Authentication Techniques," J. of Information Hiding and Multimedia Signal Processing, Vol. 7, No. 6, pp. 1282-1292, 2016-11. (EI) -
Bai, J. and Chang, C. C.*, "A High Payload Steganographic Scheme for Compressed Images with Hamming Code," International Journal of Network Security, Vol. 18, No. 6, pp. 1122-1129., 2016-11. (EI) -
Chang, C. C.*, Tseng, W. T. and Tsai, H. C., "A Universal Authentication Scheme with Anonymity for Heterogeneous Wireless Networks," J. of Information Hiding and Multimedia Signal Processing, Vol. 7, No. 6, pp. 1384-1394, 2016-11. (EI) -
Wang, Z. H., Di, Y. F., Li, J. J.*, Chang, C. C. and Liu, H., "Progressive Secret Image Sharing Scheme Using Meaningful Shadows," Security and Communication Networks, Vol. 9, No. 17, pp. 4075-4088., 2016-11. (SCIE,EI) -
Chang, C. C.* and Nguyen, N. T., "An Untraceable Biometric-based Multi-server Authenticated Key Agreement Protocol with Revocation," Wireless Personal Communications, Vol. 90, No. 4, pp. 1695-1715, 2016-10. (SCIE) -
Tian, H.*, Wu, Y., Chang, C. C., Huang, Y., Liu, J., Wang, T., Chen, Y. and Cai, Y., "Steganalysis of Analysis-by-synthesis Speech Exploiting Pulse-position Distribution Characteristics," Security and Communication Networks, Vol. 9, No. 15, pp. 2934-2944, 2016-10. (SCIE,EI) -
Chang, C. C.*, Chang, S. C. and Wu, Y. C., "Novel Electronic Check Mechanism Using Elliptic Curve Cryptosystem," Journal of Computers, Vol. 27, No. 3, oct. 2016, pp. 111-122, 2016-10. (EI) -
Lu, J., Xu, X., Li, L., Chang, C. C.* and Wang, Q., "A Robust Image Copy Detection Method Based on Feature Extraction Algorithm," J. of Information Hiding and Multimedia Signal Processing, Vol. 7, No. 5, pp. 1136-1146, 2016-09. (EI) -
Xie, Q. Q., Jiang, S. R, Wang, L. M and Chang, C. C.*, "Composable Secure Roaming Authentication Protocol for Cloud-assisted Body Sensor Networks," International Journal of Network Security, Vol. 18, No. 5, pp. 816-831, 2016-09. (EI) -
Liu, Y., Chang, C. C.* and Sun, C. Y., "Notes on "An anonymous multi-server authenticated key agreement scheme based on trust computing using smart card and biometrics"," International Journal of Network Security, Vol. 18, No. 5, pp. 997-1000, 2016-09. (EI) -
Liu, L., Chang, C. C.* and Wang, A., "Reversible Data Hiding Scheme Based on Histogram Shifting of n-bit Planes," Multimedia Tools and Applications, Vol. 75, No. 18, pp. 11311-11326, 2016-09. (SCIE,EI) -
Li, Z, Jin, Q., Chang, C. C.*, Wang, A. and Liu, L., "A Novel Pixel Grouping Scheme for AMBTC Based on Particle Swarm Optimization," J. of Information Hiding and Multimedia Signal Processing, Vol. 7, No. 5, pp. 970-982, September 2016., 2016-09. (EI) -
Luo, Y. B.*, Huang, Y. F., Li, F. F. and Chang, C. C., "Text Steganography Based on Ci-poetry Generation Using Markov Chain Model," KSII Transactions on Internet and Information Systems, Vol. 10, No. 9, pp. 4568-4584., 2016-09. (SCIE,EI) -
Wang, F., Chang, C. C.* and Chang, S. C., "Robust Off-line E-cash Scheme with Recoverability and Anonymity Revocation," Security and Communication Networks, Vol 9, No. 14, pp. 2412–2421, 2016-09. (SCIE,EI) -
Chang, C. C.*, Chen, W. Y. and Chang, S. C., "A Highly Efficient and Secure Electronic Cash System Based on Secure Sharing in Cloud Environment," Security and Communication Networks, Vol. 9, No. 14, pp. 2476-2483, 2016-09. (SCIE,EI) -
Nguyen, T. S., Chang, C. C.* and Yang, X. Q., "A Reversible Image Authentication Scheme Based on Fragile Watermarking in Discrete Wavelet Transform Domain," International Journal of Electronics and Communications, Vol. 70, No. 8, pp. 1055-1061, 2016-08. (SCIE,EI) -
Wu, H. L., Chang, C. C.* and Sun, C. Y., "A Secure Authentication Scheme with Provable Correctness for Pay-TV Systems," Security and Communication Networks, Vol. 9, No. 11, pp. 1577-1588, 2016-07. (SCIE,EI) -
Bharanitharan, K., Chang, C. C.*, Yang, H. R. and Wang, Z. H., "Efficient Pixel Prediction Algorithm for Reversible Data Hiding," International Journal of Network Security, Vol. 18, No. 4, pp. 750-757., 2016-07. (EI) -
Li, L., Zheng, D., Lu, J.*, Mao, X. and Chang, C. C., "An Effective Mobile Visual Searching Algorithm Based on the Bag-of-Words Method for Furniture Images," J. of Information Hiding and Multimedia Signal Processing, Vol. 7, No. 4, pp. 754-770, 2016-07. (EI) -
Chang, C. C.*, Hsueh, W. Y. and Cheng, T. F., "A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks," Wireless Personal Communication, Vol. 89, No. 2, pp. 447-465, 2016-07. (SCIE) -
Liu, Y., Chang, C. C.* and Sun, C. Y., "A Novel Three-party Authenticated Key Exchange Protocol Based on Secret Sharing," J. of Information Hiding and Multimedia Signal Processing, Vol. 7, No. 4, pp. 741-753, 2016-07. (EI) -
Xia, B., Wang, A., Chang, C. C.* and Liu, L., "An Image Steganography Scheme Using 3D-Sudoku," J. of Information Hiding and Multimedia Signal Processing, Vol. 7, No. 4, pp. 836-845, 2016-07. (EI) -
Liu, Y. and Chang, C. C.*, "An Integratable Verifiable Secret Sharing Mechanism," International Journal of Network Security, Vol. 18, No. 4, pp. 617-624., 2016-07. (EI) -
Nguyen, T. S., Chang, C. C.* and Hsueh, H. S., "High Capacity Data Hiding For Binary Image Based on Block Classification," Multimedia Tools and Applications, Vol. 75, No. 14, pp. 8513-8526, 2016-07. (SCIE,EI) -
Liu, Y., Chang, C. C. and Sun, C. Y., "Notes on An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics," International Journal of Network Security, Vol. 18, No. 5, Sep. 2016, pp. 997-1000, 2016-06. -
Li, L., Qiu, J., Lu, J. and Chang, C. C.*, "An Aesthetic QR Code Solution Based on Error Correction Mechanism," Journal of Systems and Software, Special Issue on JSS 35th Anniversary, Vol. 116, pp. 85-94, 2016-06. (SCIE) -
Xia, B., Wang, A., Chang, C. C.* and Liu, L., "A Fast Image Coding Algorithm Using Indirect-index Codebook Based on SMVQ," Journal of Electronic Science and Technology, Vol. 14, No. 2, pp. 183-190, 2016-06. (EI) -
Li, F., Mao, Q. and Chang, C. C.*, "A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method," International Journal of Network Security, Vol. 18, No. 3, pp. 410-419, 2016-05. (EI) -
Zhong, H., Li, S., Cheng, T. F. and Chang, C. C.*, "An Efficient Electronic English Auction System with a Secure On-shelf Mechanism and Privacy Preserving," Journal of Electrical and Computer Engineering, Special Issue on Innovations in Communications Security, Vol. 2016, Article ID 6567146, May 2016, pp. 14 pages., 2016-05. -
Wang, F., Chang, C. C.* and Lin, C. L., "Security Analysis on "Secure Untraceable Off-line Electronic Cash System"," International Journal of Network Security, Vol. 18, No. 3, pp. 454-458, 2016-05. (EI) -
Li, Z., Jin, Q., Chang, C. C.*, Wang, A. and Liu, L., "A Common Bitmap Block Truncation Coding for Color Images Based on Binary Ant Colony Optimization," KSII Transactions on Internet and Information Systems, Vol. 10, No.5, pp. 2326-2345, 2016-05. (SCIE) -
Lyu, W. L., Chang, C. C.* and Wang, F., "Image Authentication and Self-Recovery Scheme Based on the Rehashing Model," J. of Information Hiding and Multimedia Signal Processing, Vol. 7, No. 3, pp. 460-474., 2016-05. (EI) -
Xu, W. L., Chang, C. C.*, Chen, T. S. and Wang, L. M., "An Improved Least-Significant-Bit Substitution Method Using the Modulo Three Strategy," Displays, Vol. 42, pp. 36-42, 2016-04. (SCIE) -
Chang, C. C., Nguyen, T. S., Lin, M. C. and Lin, C. C.*, "A Novel Data-Hiding and Compression Scheme Based on Block Classification of SMVQ indices," Digital Signal Processing, Vol. 51, pp. 142-155., 2016-04. (SCIE,EI) -
Chang, C. C.*, Sun, C. Y. and Chang, S. C., "A Strong RSA-based and Certificateless-based Signature Scheme," International Journal of Network Security, Vol. 18, No. 2, pp. 201-208, 2016-03. (EI) -
Chang, C. C.*, Lu, T. C., Horng, G. and Huang, Y. H., "Very Efficient Variable-length Codes for the Lossless Compression of VQ Indices," Multimedia Tools and Applications, Vol. 75, No. 6, pp. 3537-3552, 2016-03. (SCIE,EI) -
Qin, C.*, Ren, H., Chang, C. C. and Chen, Q., "Novel Occlusion Object Removal with Inter-frame Editing and Texture Synthesis," J. of Information Hiding and Multimedia Signal Processing, Vol. 7, No. 2, pp. 386-398, 2016-03. (EI) -
Nguyen, N. T., Le, H. D. and Chang, C. C.*, "Provably Secure and Efficient Three-Factor Authenticated Key Agreement Scheme with Untraceability," International Journal of Network Security, Vol. 18, No. 2, pp. 335-344, 2016-03. (EI) -
Zhong, H., Liu, H. Q., Chang, C. C. and Lin, C. C.*, "A Novel Fragile Watermark-based Image Authentication Scheme for AMBTC-compressed Images," J. of Information Hiding and Multimedia Signal Processing, Vol. 7, No. 2, pp. 362-375, 2016-03. (EI) -
Wu, Q., Zhu, C., Li, J. J.*, Chang, C. C. and Wang, Z. H., "A Magic Cube Based Information Hiding Scheme of Large Payload," Journal of Information Security and Applications, Vol. 26, pp. 1-7., 2016-02. (EI) -
Wang, F., Chang, C. C.*, Lin, C. L. and Chang, S. C., "Secure and Efficient Identity-Based Proxy Multi-Signature Using Cubic Residues," International Journal of Network Security, Vol. 18, No. 1, pp. 90-98, 2016-01. (EI) -
Chang, C. C.* and Le, H. D., "A Provably Secure, Efficient and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks," IEEE Transactions on Wireless Communications, Vol. 15, No. 1, pp. 357-366., 2016-01. (SCIE,EI) -
Le, H. D., Xu, X., Wang, Q., Li, L. and Chang, C. C.*, "Zero-watermarking for Face Image Protection in Database," Journal of Internet Technology, Vol. 17, No. 1, pp. 129-135, 2016-01. (SCIE,EI) -
Lyu, W. L. and Chang, C. C.*, "An Image Compression Method Based on Block Truncation Coding and Linear Regression," J. of Information Hiding and Multimedia Signal Processing, Vol. 7, No. 1, pp. 198-215., 2016-01. (EI) -
Nguyen, T. S., Chang, C. C.* and Shih, T. H., "A High-Quality Reversible Image Authentication Scheme Based on Adaptive PEE for Digital Images," KSII Transactions on Internet and Information Systems, Vol. 10, No. 1, pp. 395-413, 2016-01. (SCIE) -
Nguyen, T. S., Chang, C. C.* and Chang, W. C., "High Capacity Reversible Data Hiding Scheme for Encrypted Images," Signal Processing: Image Communication, Vol. 44, pp. 84-91, 2016-01. (SCIE,EI) -
Liu, Y. N., Cheng, C., Jiang, T. and Chang, C. C.*, "A Practical Lottery Using Oblivious Transfer," International Journal of Communication Systems, Vol. 29, No. 2, pp. 277-282, 2016-01. (SCIE,EI) -
Chang, C. C., Nguyen, T. S. and Lin, C. C.*, "A New Distortion-Free Data Embedding Scheme for High-Dynamic Range Images," Multimedia Tools and Applications, Vol. 75, No. 1, pp. 145-163, 2016-01. (SCIE,EI) -
Chang, C. C.*, Cheng, T. F. and Hsueh, W. Y., "A Robust and Efficient Dynamic Identity Based Multi-Server Authentication Scheme Using Smart Cards," International Journal of Communication Systems, Vol. 29, No. 2, pp. 290-306, 2016-01. (SCIE,EI) -
Wang, Z. H., Zhuang, X., Chang, C. C.*, Qin, C. and Yan, Z., "Reversible Data Hiding Based on Geometric Structure of Pixel Groups," International Journal of Network Security, Vol. 18, No. 1, pp. 52-59, 2016-01. (EI) -
Wang, Z. H., Chen, K. N., Chang, C. C.* and Qin, C., "Sharing a Large Secret Image Using Meaningful Shadows Based on VQ and Inpainting," KSII Transactions on Internet and Information Systems, Vol. 9, No. 12, pp. 5170-5188., 2015-12. (SCIE) -
Chang, C. C.*, Wu, H. L. and Sun, C. Y., "Notes on “Secure Authentication Scheme for IoT and Cloud Servers”," Accepted byPervasive and Mobile Computing, 2015-12. (SCIE,EI) -
Wang, F., Chang, C. C.* and Lyu, W. L., "The Credit Card Visual Authentication Scheme Based on GF(2^8) Field," Multimedia Tools and Applications, Vol. 74, No. 24, pp. 11451-11465., 2015-12. (SCIE,EI) -
Mao, Q., Bharanitharan, K. and Chang, C. C.*, "Multi-Round Dynamic Swap Optimization for Table Based Steganograph," IET Image Processing, Vol. 9, No. 12, pp. 1073-1082, 2015-12. (SCIE,EI) -
Chang, C. C., Yang, J. H.* and Wu, Y. C., "An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks," International Journal of Network Security, Vol. 17, No. 6, pp. 702-707, 2015-11. (EI) -
Nguyen, T. S., Chang, C. C.* and Huynh, N. T., "A Novel Reversible Data Hiding Scheme Based on Difference-Histogram Modification and Optimal EMD Algorithm," Journal of Visual Communication and Image Representation, Vol. 33, pp. 389-397, 2015-11. (SCIE,EI) -
Chang, C. C., Wu, C. C. and Lin, I. C.*, "A Multi-Purpose Key Agreement Scheme in Ubiquitous Computing Environments," Mobile Information Systems, Vol. 2015, Article ID: 934716, 7 pages. doi: 10.1155/2015/934716, 2015-11. (SCIE) -
Hou, Q., Dai, J., Li, L., Lu, J. and Chang, C. C.*, "Scanned Binary Image Watermarking Based On Additive Model and Sampling," Multimedia Tools and Applications, Vol. 74, No. 21, pp. 9407-9426, 2015-11. (SCIE,EI) -
Mao, Q., Li, F. and Chang, C. C.*, "Reversible Data Hiding with Oriented and Minimized Distortions Using Cascading Trellis Coding," Information Sciences, Vol. 317, pp. 170-180, 2015-10. (SCIE,EI) -
Nguyen, T. S. and Chang, C. C.*, "A Reversible Data Hiding Scheme Based on the Sudoku Technique," Displays, Vol. 39, pp. 109-116, 2015-10. (SCIE) -
Zhai, S., Li, F., Chang, C. C.* and Mao, Q., "A Meaningful Scheme for Sharing Secret Images Using Mosaic Images," International Journal of Network Security, Vol. 17, No. 5, pp. 643-649, 2015-09. (EI) -
Chang, C. C.*, Lin, M. C. and Cheng, T. F., "Dynamic Selective Information Hiding Based on Search Order Coding with Low Bit Rate," The Imaging Science Journal, Vol. 63, No. 7, pp. 378-388, 2015-09. (SCIE) -
Liu, W., Wang, A., Chang, C. C.*, Li, Z. and Liu, L., "A Grouped-scalable Secret Image Sharing Scheme," Multimedia Tools and Applications, Vol. 74, No. 17, pp. 7095-7109, 2015-09. (SCIE,EI) -
Lee, C. F., Pai, P. Y., Chang, C. C*. and Liu, C. M., "Adjustment Hiding Method Based on Exploiting Modification Direction," International Journal of Network Security, Vol. 17, No. 5, pp. 607-618, 2015-09. (EI) -
Chang, C. C.*, Lu, T. C., Horng, G., Huang, Y. H. and Hsu, T. J., "Dual-Histograms Reversible Data Hiding Capable of Avoiding Underflow/Overflow Problems," J. of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 5, pp. 956-967, 2015-09. (EI) -
Qin, C., Chang, C. C.* and Hsu, T. J., "Reversible Data Hiding Scheme Based on Exploiting Modification Direction with Two Steganographic Images," Multimedia Tools and Applications, Vol. 74, No. 15, pp. 5861-5872, 2015-07. (SCIE,EI) -
Tang, J., Jiang, B., Luo, B. and Chang, C. C.*, "An Outlier Detection Method for Feature Point Matching Problem," J. of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 4, pp. 728-739, 2015-07. (EI) -
Wang, Z. H., Huang, Y. H., Chang, C. C.*, Yang, H. R., "Reversible Data Hiding for High Quality Using Secret Data Transformation Strategy," J. of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 4, pp. 629-638, 2015-07. (EI) -
Wang, Z. H., Wu, Q., Luo, Z. C. and Chang, C. C.*, "A Novel Information Hiding Scheme Based on Line Segments," J. of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 4, pp. 674-685, 2015-07. (EI) -
Huang, Y. H., Chang, C. C.*, Lin, M. C. and Horng, G., "Very Effective Multi-Layer Reversible Embedding Method Using Low Distortion Modification," J. of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 4, pp. 760-770, 2015-07. (EI) -
Lyu, W. L., Chang, C. C.*, Chou, Y. C. and Lin, C. C., "Hybrid Color Image Steganography Method Used for Copyright Protection and Content Authentication," J. of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 4, pp. 686-696, 2015-07. (EI) -
Kuo, W. C., Kao, M. C. and Chang, C. C.*, "A Generalization of Fully Exploiting Modification Directions Data Hiding Scheme," J. of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 4 , pp. 718-727, 2015-07. (EI) -
Liu, C., Chang, C. C.*, Wu, Z. P. and Ye, S. L., "A Study of Relationship between RSA Public Key Cryptosystem and Goldbach’s Conjecture Properties," International Journal of Network Security, Vol. 17, No. 4, pp. 445-453, 2015-07. (EI) -
Le, H. D., Chang, C. C.* and Chou, Y. C., "A Novel Untraceable Authentication Scheme for Mobile Roaming in GLOMONET," International Journal of Network Security, Vol. 17, No. 4, pp. 395-404., 2015-07. (EI) -
Wang, Z. H., Chang, C. C.*, Huang, Y. H., Yang, H. R. and Horng, G., "Embedding Information in Chinese Calligraphy Images," Journal of Computers-Special Issue on Mobile Computing in Digital Forensics, Security and Privacy, Vol. 26, No. 2, pp. 11-18, 2015-07. (EI) -
Qin, C., Chang, C. C., Horng, G., Huang, Y. H. and Chen, Y. C., "Reversible Data Embedding for VQ-Compressed Images Using Search-Order Coding and Index Parity Matching," Security and Communication Networks, Vol. 8, No. 6, pp. 899-906, 2015-04, 2015-06. -
Chang, C. C., Chou, Y. C. and Sun, C. Y., "A Novel and Practical Scheme based on Secret-sharing for Laptop Data Protection," IET Information Security, Vol. 9, No. 2, pp. 100-107, 2015-03, 2015-06. -
Mao, Q., Bharanitharan, K. and Chang, C. C*., "Multi-round Dynamic Swap Optimisation for Table-based Steganography," IET Image Processing, vol. 9, no. 12, pp. 1073-1082, 2015-06. (SCIE,EI) -
Mao, Q., Chang, C. C.*, Harn, L. and Chang, S. C., "An Image-Based Key Agreement Protocol Using the Morphing Technique," Multimedia Tools and Applications, Vol. 74, No. 9, pp. 3207-3229, 2015-05. (SCIE,EI) -
Liu, Y., Harn, L. and Chang, C. C.*, "A Novel Verifiable Secret Sharing Mechanism Using Theory of Numbers and a Method for Sharing Secrets," International Journal of Communication Systems, Vol. 28, No. 7, pp. 1282-1292, 2015-05. (SCIE,EI) -
Liu, L., Wang, A. H.*, Chang, C. C.*, Jin, Q. and Xia, B. B., "Tree-Structured Vector Quantization with Flexible Multipath Searching Method Based on Side Match Prediction," J. of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 3, pp. 568-576., 2015-05. (EI) -
Chang, C. C.* and Le, H. D., "A Provably Secure Smart-card-based Authenticated Group Key Exchange Protocol," Security and Communication Networks, Vol. 8, No. 8, pp. 1602-1607, 2015-05. (SCIE,EI) -
Lyu, W. L., Chang, C. C.* and Wang, F., "Color PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method," J. of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 3, pp. 523-533, 2015-05. (EI) -
Lu, J., Wang, M., Dai, J., Huang, Q., Li, L. and Chang, C. C.*, "Multiple Watermark Scheme based on DWT-DCT Quantization for Medical Images," J. of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 3, pp. 458-47, 2015-05. (EI) -
Liu, Y., Chang, C. C.* and Sun, C. Y., "A Secure and Efficient Scheme for Digital Gift Certificates," J. of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 3, pp 416-429, 2015-05. (EI) -
Lee, J. S.*, Chang, C. C., Huynh, N. T. and Tsai, H. Y., "Preserving User-Friendly Shadow and High-Contrast Quality for Multiple Visual Secret Sharing Technique," Digital Signal Processing, Vol. 40, pp. 131-139, 2015-05. (SCIE) -
Wang, X. T.*, Li, M. C., Wang, S. T. and Chang, C. C., "Reversible Data Hiding Exploiting High-Correlation Regulation for High-Quality Images," Security and Communication Networks, Vol. 8, No. 7, pp. 1408-1421, 2015-05. (SCIE,EI) -
Wang, D., Chang, C. C.*, Liu, Y. and Song, G., "Digital Image Scrambling Algorithm Based on Chaotic Sequence and Decomposition and Recombination of Pixel Values," International Journal of Network Security, Vol.17, No.3, pp. 322-327., 2015-05. (EI) -
Qin, C., Chang, C. C.*, Horng, G., Huang, Y. H. and Chen, Y. C., "Reversible Data Embedding for Vector Quantization Compressed Images Using Search-Order Coding and Index Parity Matching," Security and Communication Networks, Vol. 8, No. 6, pp. 899-906, 2015-04. (SCIE,EI) -
Chang, C. C., Nguyen, T. S. and Lin, C. C.*, "A Reversible Compression Code Hiding Using SOC and SMVQ Indices," Information Sciences, Vol. 300, pp. 85-99, 2015-04. (SCIE,EI) -
Yin, Z. X., Chang, C. C.*, Xu, Q. and Luo, B., "Second-Order Steganographic Method Based on Adaptive Reference Matrix," IET Image Processing, Vol. 9, No. 4, pp. 300-305, 2015-04. (SCIE,EI) -
Huynh, N. T., Bharanitharan, K. and Chang, C. C.*, "Quadri-Directional Searching Algorithm for Secret Image Sharing Using Meaningful Shadows," Journal of Visual Communication and Image Representation, Vol. 28, pp. 105-112., 2015-04. (SCIE,EI) -
Qin, C., Chang, C. C.*, and Lin C. C., "An Adaptive Reversible Steganographic Scheme Based on the Just Noticeable Distortion," Multimedia Tools and Applications, Vol. 74, No. 6, pp. 1983-1995, 2015-03. (SCIE,EI) -
Chang, C. C.*, Sun, C. Y. and Cheng, T. F., "A Dependable Storage Service System in Cloud Environment," Security and Communication Networks, Vol. 8, No. 4, pp. 574-588, 2015-03. (SCIE,EI) -
Chang, C. C.*, Chou, Y. C. and Sun, C. Y., "Novel and Practical Scheme based on Secret Sharing for Laptop Data Protection," IET Information Security, Vol. 9, No. 2, pp. 100-107, 2015-03. (SCIE,EI) -
Jia, X. D., Chang, Y. F., Chang, C. C.* and Wang, L. M., "A Critique of a Lightweight Identity Authentication Protocol for Vehicular Networks," J. of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 2, pp. 183-188., 2015-03. (EI) -
Liu, L., Wang, A. H., Chang, C. C.*, li, Z. H. and Liu, J. B., "A Lossy Secret Color Image Sharing Scheme with Small Shadows and Error-resilient Capability," J. of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 2, pp. 246-253., 2015-03. (EI) -
Guo, C. and Chang, C. C.*, "A Novel Threshold Conference-Key Agreement Protocol Based on Generalized Chinese Remainder Theorem," International Journal of Network Security, Vol. 17, No. 2, pp. 165-173, 2015-03. (EI) -
Wu, H. L. and Chang, C. C.*, "A Robust Image Encryption Scheme Based on RSA and Secret Sharing for Cloud Storage Systems," J. of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 2, pp. 288-296., 2015-03. (EI) -
Wang, F., Chang, C. C.* and Chou, Y. C., "Group Authentication and Group Key Distribution for Ad Hoc Networks," International Journal of Network Security, Vol.17, No.2, pp. 199-207, 2015-03. (EI) -
Li, Z. Q., Huang, R., Peng, B. L., Chang, C. C.* and Wang, Q. Z., "A Divide-conquer Heuristic Search Algorithm for Cutting Surplus Steel Plates of Steel & Iron Companies," Inter. Journal of Innovative Computing, Info. and Control, Vol. 11, No. 1, pp. 1-14., 2015-02. (EI) -
Lee, C. F., Chang, C. C.*, Pai, P. Y. and Liu, C. M., "An Adjustable and Reversible Data Hiding Method Based on Multiple-base Notational System without Location Map," J. of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 1, pp. 1-28, 2015-01. (EI) -
Lin, C. L., Li, Y., Lv, K. and Chang, C. C.*, "Ciphertext-Auditable Identity-Based Encryption," International Journal of Network Security, Vol. 17, No.1, pp. 23-28., 2015-01. (EI) -
Liu, Y., Chang, C. C.* and Chang, S. C., "A Group Key Distribution System Based on the Generalized Aryabhata Remainder Theorem for Enterprise Digital Rights Management," J. of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 1, pp. 140-153., 2015-01. (EI) -
Li, Li, Dong, Z., Lu, J., Dai, J., Huang, Q., Chang, C. C.* and Wu, T., "An H.264/AVC HDTV Watermarking Algorithm Robust to Camcorder Recording," Journal of Visual Communication and Image Representation, Vol. 26, pp. 1-8, 2015-01. (SCIE,EI) -
Chang, C. C., Lin, C. C.* and Lin, C. Y., "Compressing Vector Quantization Index Table Using Side Match State Codebook," J. of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 1, pp. 47-58, 2015-01. (EI) -
Zhuang, X., Zhu, Y.* and Chang, C. C., "A New Ultralightweight RFID Protocol for Low-Cost Tags: R2AP," Wireless Personal Communications, Vol. 79, No. 3, pp. 1787-1802, 2014-12. (SCIE) -
Chang, C. C.* and Nguyen, T. S., "A Reversible Data Hiding Scheme for SMVQ Indices," Informatica, Vol. 25, No. 4, pp. 523-540, 2014-12. (SCIE,EI) -
Chen, X., Liu, Y., Chang, C. C.* and Lin, C. L., "The Design of Dynamic Access Control for Hierarchical Sensor Networks with Key-lock-pair Mechanism," International Journal of Ad Hoc and Ubiquitous Computing, Vol. 17, No. 2/3, pp. 162-173, 2014-11. (SCIE,EI) -
Wang, Z. H., Jin, H., Wang, X. and Chang, C. C.*, "An Adaptable (n, n) Secret Image Sharing Mechanism Based on Boolean Operation," International Journal of Network Security, Vol. 16, No. 6 , pp. 483-489, 2014-11. (EI) -
Wang, F., Chang, C. C.* and Harn, L., "Simulatable and Secure Certificate-based Threshold Signature without Pairings," Security and Communication Networks, Vol. 7, No. 11, pp. 2094-2103, 2014-11. (SCIE,EI) -
Liu, Y., Harn, L. and Chang, C. C.*, "An Authenticated Group Key Distribution Mechanism Using Theory of Numbers," International Journal of Communication Systems, Vol. 27, No. 11, pp. 3502-3512., 2014-11. (SCIE,EI) -
Li, L., Hou, Q., Lu, J., Xu, Q., Dai, J., Mao, X. and Chang, C. C.*, "A New Pixels Flipping Method for Huge Watermarking Capacity of the Invoice Font Image," The Scientific World Journal, Special Issue on Recent Advances in Machine Learning Theory and Applications, Vol. 2014, 2014-11. (SCIE,EI) -
Chang, C. C.*, Cheng, T. F. and Wu, H. L., "An Authentication and Key Agreement Protocol for Satellite Communications," International Journal of Communication Systems, Vol. 27, No. 10, pp. 1994-2006, 2014-10. (SCIE,EI) -
Chang, C. C.* and Cheng, T. F., "A Provably Secure t-out-of-n Oblivious Transfer Mechanism Based on Blind Signature," J. of Information Hiding and Multimedia Signal Processing, Vol. 5, No. 1, pp. 1-12, 2014-10. (EI) -
Chang, C. C.*, Pai, P. Y., Tsai, M. H. and Liu, C. M., "A Novel Chicken Chorioallantoic Membrane Image Vessel Detection Detector Based on Statistic Color Distribution," J. of Information Hiding and Multimedia Signal Processing, Vol. 5, No. 4, pp. 789-805, 2014-10. (EI) -
Guo, C., Chang, C. C.* and Qin, C., "A Novel (n, t, n) Secret Image Sharing Scheme without a Trusted Third Party," Multimedia Tools and Applications, Vol. 72, No. 3, pp. 2195-2209., 2014-10. (SCIE,EI) -
Chang, C. C.* and Cheng, T. F., "A Secure Diverse Ticket-sale System in a Distributed Cloud Environment," The Computer Journal, Vol. 57, No. 10, pp. 1441-1459, 2014-10. (SCIE,EI) -
Dai, J., Liu, Y., Lu, J., Xu, J., Chang, C. C. and Li, L.*, "Watermarking Marbled Image Based on Linear Enhancement Hologram," J. of Information Hiding and Multimedia Signal Processing, Vol. 5, No. 4, pp. 757-768., 2014-10. (EI) -
Lyu, W. L., Chang, C. C.*, Nguyen, T. S. and Lin, C. C., "Image Watermarking Scheme Based on Scale-Invariant Feature Transform," KSII Transactions on Internet and Information Systems, Vol. 8, No. 10, pp. 3591-3606, 2014-10. (SCIE) -
Chang, C. C.*, Huynh, N. T. and Chung, T. F., "Efficient Searching Strategy for Secret Image Sharing with Meaningful Shadows," International Journal of Machine Learning and Computing, Vol. 4, No. 5, pp. 423-427., 2014-10. (EI) -
Liu, Y. and Chang, C. C.*, "A Database Encryption Scheme Based on the Generalized Aryabhata Remainder Theorem," J. of Information Hiding and Multimedia Signal Processing, Vol. 5, No. 4, pp. 603-613, 2014-10. (EI) -
Chang, C. C.*, Sun, C. Y. and Chang, S. C., "Practical Secure and High Efficient Authentication Scheme in Global Mobility Networks," Journal of Internet Technology, Vol. 15, No. 7, pp. 1091-1100, 2014-10. (SCIE,EI) -
Chang, C. C., Nguyen, T. S. and Lin, C. C*., "Reversible data embedding for indices based on histogram analysis," Journal of Visual Communication and Image Representation, Vol. 25, No. 7, pp. 1704-1716, 2014-10. (SCIE,EI) -
Liu, Y. and Chang, C. C.*, "A Secure Broadcasting Method Based on the Generalized Aryabhata Remainder Theorem," J. of Information Hiding and Multimedia Signal Processing, Vol. 5, No. 4, pp. 709-718, 2014-10. (EI) -
Chang, C. C., Nguyen, T. S. and Lin, C. C., "A Novel Compression Scheme based on SMVQ and Huffman Coding," International Journal of Innovative Computing Information and Control, Vol. 10, No. 3, pp. 1041-1050, 2014-10. (SCIE) -
Mao, Q., Bharanitharan, K. and Chang, C. C.*, "A Proxy User Authentication Protocol Using Source-Based Image Morphing," The Computer Journal, pp. 1-12, 2014-09. (SCIE,EI) -
Lu, T. C., Chang, C. C.* and Huang, Y. H., "High Capacity Reversible Hiding Scheme Based on Interpolation, Difference Expansion, and Histogram Shifting," Multimedia Tools and Applications, Vol. 72, No. 1, pp. 417-435, 2014-09. (SCIE,EI) -
Liu, Y., Wu, H. L. and Chang, C. C.*, "A Fast and Secure Scheme for Data Outsourcing in the Cloud," KSII Transactions on Internet and Information Systems, Vol. 8, No. 8, pp. 2708-2721, 2014-08. (SCIE) -
Wang, Z. H., Yang, H. R., Chang, C. C.*, Horng, G. and Huang, Y. H., "Lossless VQ Indices Compression Based on the High Correlation of Adjacent Image Blocks," KSII Transactions on Internet and Information Systems, Vol. 8, No. 8, pp. 2913-2929, 2014-08. (SCIE) -
Wang, Z. H.*, Mao, Q., Chang, C. C., Wu, Q. and Li, J., "A Data Lossless Message Hiding Scheme without Extra Information," Journal of Internet Technology, Vol. 15, No. 4, pp. 657-669, 2014-07. (SCIE,EI) -
Lin, C. H., Tharan, K.B. and Chang, C. C.*, "Comments and Proofs to Published Paper - A Novel Reversible Robust Watermarking Algorithm based on a Chaotic System," International Journal of Network Security, Vol. 16, No. 4, pp. 273-276, 2014-07. (EI) -
Chang, C. C.*, Harn, L. and Cheng, T. F., "Notes on "Polynomial-based Key Management for Secure Intra-group and Inter-group Communication"," International Journal of Network Security, Vol. 16, No. 4, pp. 405-410, 2014-07. (EI) -
Mao, Q., Chang, C. C.* and Chung, T. F., "A Reversible Steganography Suitable for Embedding Small Amounts of Data," International Journal of Network Security, Vol. 16, No. 4, pp. 304-312, 2014-07. (EI) -
Qin, C., Chang, C. C.* and Wang, S. T., "A Novel Lossless Steganographic Scheme for Data Hiding in Traditional Chinese Text Files," J. of Information Hiding and Multimedia Signal Processing, Vol. 5, No. 2, pp. 534-540, 2014-07. (EI) -
Chang, C. C., Nguyen, T. S., Lin, C. C.*, "Reversible Data Hiding Scheme for VQ Indices Based on Absolute Difference Trees," KSII Transactions on Internet and Information Systems, Vol. 8, No. 7, pp. 2572-2589, 2014-07. (SCIE) -
Chang, C. C., Chen, Y. H.* and Chuang, L. Y., "Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques," J. of Information Hiding and Multimedia Signal Processing, Vol. 5, No. 3, pp. 342-352, 2014-07. (EI) -
Nguyen, T. S., Chang, C. C.* and Chung, T. F., "A Tamper-Detection Scheme for BTC-Compressed Images with High-Quality Images," KSII Transactions on Internet and Information Systems, Vol. 8, No. 6, pp. 2005-2021, 2014-06. (SCIE) -
Huang, Y. H., Chang, C. C. and Wu, C. Y., "A DNA-based Data Hiding Technique with Low Modification Rates," Multimedia Tools and Applications, Vol. 70, No. 3, pp. 1439-1451., 2014-06. (SCIE,EI) -
Chang, C. C.*, Huynh, N. T. and Le, H. D., "Lossless and Unlimited Multi-image Sharing Based on Chinese Remainder Theorem and Lagrange Interpolation," Signal Processing, Vol. 99, pp. 159-170, 2014-06. (SCIE,EI) -
Harn, L, Miao, F. and Chang, C. C.*, "Verifiable Secret Sharing Based on the Chinese Remainder Theorem," Security and Communication Networks, Vol. 7, No. 6, pp. 950-957, 2014-06. (SCIE,EI) -
Nguyen, T. S., Chang, C. C.*, Lin, M. C., "Adaptive Lossless Data Hiding Scheme for SMVQ-Compressed Images using SOC Coding," Smart Computing Review, Vol. 4, No. 3, pp. 230-245, 2014-06. (EBSCO) -
Chen, X., Liu, Y., Chang, C. C.* and Guo, C., "Generalized Secret Sharing with Linear Hierarchical Secrets," International Journal of Network Security, No. 3, pp. 220-228, 2014-05. (EI) -
Chang, C. C., Nguyen, T. S., Lin, C. C.*, "Reversible Image Hiding for High Image Quality Based on Histogram Shifting and Local Complexity," International Journal of Network Security, Vol. 16, No. 3, pp. 201-213, 2014-05. (EI) -
Zhuang, X., Chang, C. C., Wang, Z. H. * and Zhu, Y., "A Simple Password Authentication Scheme Based on Geometric Hashing Function," International Journal of Network Security, Vol. 16, No. 3, pp. 237-243, 2014-05. (EI) -
Lee, J. S.*, Tsai, H. Y. and Chang, C. C., "A User-Friendly and Authenticatable Secret Image Sharing Scheme," Journal of Internet Technology, Vol. 15, No. 3, pp. 433-440, 2014-05. (SCIE,EI) -
Wang, Z. H., Wu, Q., Chang, C. C.*, Chan, C. S. and Yu, X., "Optimizing Modification Direction Data Hiding Methods Using Dynamic Programming Strategy," Accepted byJournal of Networks, 2014-04. (EI) -
Lin, C. C., Chang, C. C.* and Chen, Y. H., "A Novel SVD-based watermarking Scheme for Protecting Rightful Ownership of Digital Images," J. of Information Hiding and Multimedia Signal Processing, Vol. 5, No. 2, pp. 124-143, 2014-04. (EI) -
Horng, G., Huang, Y. H., Chang, C. C.* and Liu, Y., "(k, n)-Image Reversible Data Hiding," J. of Information Hiding and Multimedia Signal Processing, Vol. 5, No. 2, Apr. 2014, pp. 152-164., 2014-04. (EI) -
Liu, Y., Chang, C. C*. and Chang, S. C., "A Secure and Efficient t-out-of-n Oblivious Transfer Based on the Generalized Aryabhata Remainder Theorem," J. of Information Hiding and Multimedia Signal Processing, Vol. 5, No. 2, pp. 223-233, 2014-04. (EI) -
Wang, Z. H., Wang, D., Yang, H. R. and Chang, C. C.*, "A Novel Mutually-Authenticable Information-Hiding Scheme for a CAPTCHA Binary Image," Accepted byKSII Transactions on Internet and Information Systems, 2014-03. (SCIE) -
Qin, C., Chang, C. C.* and Chiu, Y. P., "A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting," IEEE Transactions on Image Processing, Vol. 23, No. 3, pp. 969-978, 2014-03. (SCIE,EI) -
Chang C. C.* and Cheng, T. F., "A Reliable Real-time Multicast Authentication Protocol with Provable Accuracy," Fundamenta Informaticae, Vol. 131, No. 2, pp. 167-186, 2014-03. (SCIE,EI) -
Wang, C. C., Chang, Y. F., Chang, C. C., Jan, J. K. and Lin, C. C.*, "A High Capacity Data Hiding Scheme for Binary Images Based on Block Patterns," Journal of Systems and Software, Vol. 93 , pp. 152-162., 2014-02. (SCIE,EI) -
Guo, C. and Chang, C. C.*, "An Authenticated Group Key Distribution Protocol Based on the Generalized Chinese Remainder Theorem," International Journal of Communication Systems, Vol. 27, No.1, pp. 126-134, 2014-01. (SCIE,EI) -
Wang, Z. H., Segalla Pizzolatti, M. and Chang, C. C*., "Efficient and Meaningful Multi-secret Image Sharing Based on Block Imitation," J. of Information Hiding and Multimedia Signal Processing, Vol. 5, No. 1, pp. 47-60, 2014-01. (EI) -
Liu, Y., Chang, C. C.* and Chang, S. C., "An Access Control Mechanism Based on the Generalized Aryabhata Remainder Theorem," International Journal of Network Security, Vol. 16, No. 1, pp. 58-64, 2014-01. (EI) -
Chang, C. C.*, Huang, Y. C. and Tsai, H. C., "Design and Analysis of Chameleon Hashing Based Handover Authentication Scheme for Wireless Networks," J. of Information Hiding and Multimedia Signal Processing, Vol. 5, No. 1, pp. 107-116, 2014-01. (EI) -
Liu, L., Wang, A.*, Chang, C. C. and Li, Z., "A Novel Real-time and Progressive Secret Image Sharing with Flexible Shadows Based on Compressive Sensing," Signal Processing: Image Communication, Vol. 29, No. 1, pp. 128-134, 2014-01. (EI) -
Chang, C. C., Wu, H. L., Wang, Z. H.* and Mao, Q., "An Efficient Smart Card Based Authentication Scheme Using Image Encryption," Journal of Information Science and Engineering, Vol. 29, No. 6, pp. 1135-1150, 2013-11. (SCIE,EI) -
Qin, C., Chang, C. C.* and Hsu, T. J., "Effective Fragile Watermarking for Image Authentication with High-quality Recovery Capability," KSII Transactions on Internet and Information Systems, Vol. 7, No. 11, pp. 2941-2956, 2013-11. (SCIE) -
Wang, Z. H., Yang, H. R., Cheng, T. F. and Chang, C. C.*, "A High-performance Reversible Data-hiding Scheme for LZW Codes," Journal of Systems and Software, Vol. 86, No. 11, pp. 2771-2778, 2013-11. (SCIE,EI) -
Chang, C. C. and Yang, J. H.*, "A Group-oriented Digital Right Management Scheme with Reliable and Flexible Access Policies," International Journal of Network Security, Vol. 15, No. 6 , pp. 471-477., 2013-11. (EI) -
Chang, C. C.*, Chou, Y. C. and Lin, C. Y., "An Indicator Elimination Method for Side-match Vector Quantization," J. of Information Hiding and Multimedia Signal Processing, Vol. 30, No. 4, pp. 233-249., 2013-10. (EI) -
Qin, C., Chang, C. C.* and Chen, Y. C., "Efficient Reversible Data Hiding for VQ-Compressed Images Based on Index Mapping Mechanism," Signal Processing, Vol. 93, No. 9, pp. 2687-2695, 2013-09. (SCIE,EI) -
Lee, J. S.*, Chang, C. C. and Wei, K. J., "Provably Secure Conference Key Distribution Mechanism Preserving the Forward and Backward Secrecy," International Journal of Network Security, Vol. 16, No. 2 , pp. 405-410., 2013-09. (EI) -
Chang, C. C.*, Chang, S. C. and Yang, J. H., "A Practical Secure and Efficient Enterprise Digital Rights Management Mechanism Suitable for Mobile Environment," Security and Communications Networks, Vol. 6, No. 8, pp. 972-984, 2013-08. (SCIE,EI) -
Guo, C. and Chang, C. C.*, "ElGamal-Based Weighted Threshold Signature Scheme," Information-An International Interdisciplinary Journal, Vol. 16, No. 8(B), pp. 6339-6348., 2013-08. (SCIE) -
Bharanitharan, K., Chen, B. W. and Chang, C. C.*, "Two Step Regionally Focused Algorithm for H.264/AVC Encoder," IETE Technical Review, Vol. 30, No. 4, pp. 280-285., 2013-08. (SCIE,EI) -
Qin, C., Chang, C. C.* and Chen, Y. C., "A Novel Reversible Data Hiding Scheme for VQ-Compressed Images Using Index Set Construction Strategy," KSII Transactions on Internet and Information Systems, Vol. 7, No. 8, pp. 2027-2041, 2013-08. (SCIE) -
Chang, C. C., Nguyen, T. S. and Lin, C. C.*, "A Blind Reversible Robust Watermarking Scheme for Relational Databases," The Scientific World Journal, Vol. 2013, 2013, pp. 1-12., 2013-08. (SCIE,EI) -
Qin, C., Chang, C. C., Lee, W. B. and Zhang, X., "A Secure Image Delivery Scheme with Regional Protection Capability Using Image Inpainting and Editing," The Imaging Science Journal, Vol. 61, No. 6, pp. 509-517, 2013-07. (SCIE,EI) -
Chang, C. C.*, Chang, S. C. and Yang, J. H., "A Digital Rights Management Mechanism for Mobile Social Platforms," ICIC Express Letters, Vol. 7, No. 7, pp. 1985-1990, 2013-07. (EI) -
Qin, C., Chang, C. C.*, Huang, Y. H. and Liao, L. T., "An Inpainting-Assisted Reversible Steganographic Scheme Using Histogram Shifting Mechanism," IEEE Trans. on Circuits and Systems for Video Technology, Vol. 23, No. 7, pp. 1109-1118, 2013-07. (SCIE,EI) -
Chang, C. C.*, Le, H. D. and Chang, C. H., "Novel Untraceable Authenticated Key Agreement Protocol Suitable for Mobile Communication," Wireless Personal Communications, Vol. 71, No. 1, pp. 425-437, 2013-07. (SCIE,EI) -
Cheng, Z. Y., Liu, Y. Chang, C. C. and Liu, C. X., "A Novel Biometric-based Remote User Authentication Scheme Using Quadratic Residues," Inte. J. of Information and Electronics Engineering, Vol. 3, No. 4, pp. 419-422, 2013-07. (EI) -
Tsai, H. C. and Chang, C. C.*, "Provably Secure Three Party Encrypted Key Exchange Scheme with Explicit Authentication," Information Sciences, Vol. 238, No. 20, pp. 242-249, 2013-07. (SCIE,EI) -
Zhuang, X., Wang, Z. H., Chang, C. C. and Zhu, Y., "Security Analysis of a new Ultra-lightweight RFID Protocol and Its Improvement," J. of Information Hiding and Multimedia Signal Processing, Vol. 4, No. 3, pp. 166-177, 2013-07. (EI) -
Chang, C. C.*, Lin, C. C. and Liao, L. T., "A DCT-based Dual Watermark Scheme for Image Authentication and Recovery," Advance in Information Science and Service Science, Vol. 5, No. 12, pp. 56-69., 2013-07. -
Harn, L., Chang, C. C. and Wu, H. L., "An Anonymous Multi-Receiver Encryption Based on RSA," International Journal of Network Security, Vol. 15, No. 4, pp. 307-312., 2013-07. (EI) -
Guo, C. and Chang, C. C., "Chaotic Maps-Based Password-Authenticated Key Agreement Using Smart Cards," Communications in Nonlinear Science and Numerical Simulation, Vol. 18, No. 6, June 2013, pp. 1433-1440, 2013-06. (SCIE,EI) -
Mao, Q., Chang, C. C.* and Wu, H. L., "An Image Encryption Scheme Based on Concatenated Torus Automorphisms," KSII Transactions on Internet and Information Systems, Vol. 7, No. 6, pp. 1492-1511, 2013-06. (SCIE) -
Li, L.*, Ma, Y. Y., Chang, C. C. and Lu, J. F., "Analyzing and Removing SureSign Watermark," Signal Processing, Vol. 93, No. 5, pp. 1374-1378, 2013-05. (SCIE,EI) -
Liu, Y., Chang, C. C.* and Chang, S. C., "A Residual Number System Oriented Group Key Distribution Mechanism," Inter. J. of Information Processing and Management, Vol. 4, No. 3, pp. 146-155, 2013-05. (EI) -
Liu, Y., Chang, C. C.* and Chang, S. C., "An Efficient Oblivious Transfer Protocol Using Residue Number System," International Journal of Network Security, Vol. 15, No. 3, pp. 212-218, 2013-05. (EI) -
Qin, C., Chang, C. C.* and Chen, K. N., "Adaptive Self-recovery for Tampered Images Based on VQ Indexing and Inpainting," Signal Processing, Vol. 93, No. 4, pp. 933-946, 2013-04. (SCIE,EI) -
Wang, Z. H., Pizzolatti, M. S. and Chang, C. C.*, "Reversible Visual Secret Sharing Based on Random Grids for Two-Image Encryption," Inter. Journal of Innovative Computing, Info. and Control, Vol. 9, No. 4, pp. 1691-1701, 2013-04. (EI) -
Guo, C., Chang, C. C.* and Sun, C. Y., "Chaotic Maps-Based Mutual Authentication and Key Agreement using Smart Cards for Wireless Communications," J. of Information Hiding and Multimedia Signal Processing, Vol. 4, No. 2, pp. 99-109, 2013-04. (EI) -
Lin, P. Y., Chen, Y. H., Chang, C. C.* and Lee, J. S., "Contrast-Adaptive Removable Visible Watermarking (CARVW) Mechanism," Image and Vision Computing, Vol. 31, No. 4, pp. 311-321, 2013-04. (SCIE,EI) -
Chang, C. C.*, Cheng, T. F. and Chen, W. Y., "A Novel Electronic English Auction System with a Secure On-shelf Mechanism," IEEE Transactions on Information Forensics and Security, Vol. 8, No. 4, pp. 657-668, 2013-04. (SCIE,EI) -
Wang, Z. H., Chen, K. N., Chang, C. C.*, Chen, P. Y. and Lee, C. F., "A Lossless Information Hiding Scheme with Large Payload Using Prediction Error Composition," Accepted byKSII Transactions on Internet and Information Systems, 2013-04. (SCIE) -
Chang, C. C.*, Chen, K. N., Wang, Z. H. and Li, M. C., "Lossless Information Hiding in the VQ Index Table," Journal of Software, Vol. 8, No. 3, pp. 547-553, 2013-03. (EI) -
Chang, C. C. Wu, C. C. and Lin, I. C.*, "A Verifiable Key Management Scheme in Hierarchical Ad Hoc Networks," Information-An International Interdisciplinary Journal, Vol. 16, No. 3(A), pp. 1929-1944, 2013-03. (SCIE) -
Wang, X. T., Chang, C. C., Nguyen, T. S. and Li, M. C., "Reversible Data Hiding For High Quality Image Exploiting Interpolation and Direction Order Mechanism," Digital Signal Processing, Vol. 23, No. 2, pp. 569-577, 2013-03. (SCIE,EI) -
Qin, C., Chang, C. C.* and Tsou, P. L., "Robust Image Hashing Using Non-Uniform Sampling in Discrete Fourier Domain," Digital Signal Processing, Vol. 23, No.2, pp. 578-585, 2013-03. (SCIE,EI) -
Wang, Z. H., Chang, C. C.* and Lin, T. Y., "An Efficient Information Hiding Scheme Based on Closest Paired Tree Structure Vector Quantization," Journal of Electronic Science and Technology, Vol. 11, No. 1, pp. 15-19, 2013-03. (EI) -
Wang, Z. H., Guo, C. and Chang, C. C.*, "A Novel (n, n) Secret Image Sharing Scheme Based on Sudoku," Journal of Electronic Science and Technology, Vol. 11, NO. 1, pp. 44-50, 2013-03. (EI) -
Chang, C. C., Nguyen, T. S. and Lin, C. C., "Distortion-Free Data Embedding Scheme for High Dynamic Range Images," Journal of Electronic Science and Technology, Vol. 11, No. 1, pp. 20-26, 2013-03. (EI) -
Chang, C. C.* and Lee, C. Y., "A Smart Card-based Authentication Scheme Using User Identify Cryptography," International Journal of Network Security, Vol. 15, No. 2, pp. 139-147, 2013-03. (EI) -
Qin, C., Chang, C. C.* and Tsou, P. L., "Dictionary-Based Data Hiding Using Image Hashing Strategy," Inter. Journal of Innovative Computing, Info. and Control, Vol. 9, No. 2, pp. 599-610, 2013-02. (EI) -
Mao, Q., Tharan, K.B. and Chang, C. C.*, "Edge Directed Automatic Control Point Selection Algorithm for Image Morphing," IETE Technical Review, 2013-02. (SCIE,EI) -
Chang, C. C.* and Yang, J. H., "A Division Algorithm Using Bisection Method in Residue Number System," International journal of Computer, Consumer and Control, Vol. 2, No. 1, pp. 59-66, 2013-02. -
Cheng, Z. Y., Liu, Y., Chang, C. C. and Chang, S. C., "A Practical Secure Chaos-Based Group Key Agreement Protocol Suitable for Distributed Network Environment," Inter. Journal of Innovative Computing, Info. and Control, Vol. 9, No. 3, pp. 1-10, 2013-01. (EI) -
Cheng, Z. Y., Liu, Y., Chang, C. C.* and Chang, S. C., "Authenticated RFID Security Mechanism Based on Chaotic Maps," Security and Communication Networks, Vol. 6, No. 2, pp. 247-256, 2013-01. (SCIE,EI) -
Guo, C. and Chang, C. C.*, "A Construction for Secret Sharing Scheme with General Access Structure," J. of Information Hiding and Multimedia Signal Processing, Vol. 4, No. 1, pp. 1-8, 2013-01. (EI) -
Cheng, Z. Y., Liu, Y., Chang, C. C.* and Guo, C., "A Fault-tolerant Group Key Agreement Protocol Exploiting Dynamic Setting," International Journal of Communication Systems, Vol. 26, No. 2, pp. 259-275, 2013-01. (SCIE,EI) -
Cheng, Z. Y., Liu, Y., Chang, C. C.* and Chang, S. C., "Advanced Constantly Updated RFID Access Control Protocol Using Challenge-Response and Indefinite-Index," Inter. Journal of Innovative Computing, Info. and Control, Vol. 8, No. 12, pp. 8341-8354, 2012-12. (EI) -
Qin, C., Chang C. C.* and Liao, L. T., "An Adaptive Prediction-Error Expansion Oriented Reversible Information Hiding Scheme," Pattern Recognition Letters, Vol. 33, No. 16, pp. 2166-2172, 2012-12. (SCIE,EI) -
Chang, C. C., Lin, C. Y. and Hsieh, Y. P., "Data Hiding for Vector Quantization Images Using Mixed-Base Notation and Dissimilar Patterns without Loss of Fidelity," Information Sciences, Vol. 201, pp. 70-79, 2012-10. (SCIE,EI) -
Chang, C. C.*, Chang, S. C. and Chen, Y. W., "Novel Efficient User Authentication Protocol for Wireless Sensor Networks Using One-Way Hash Function," ICIC Express Letters, Vol. 6, No. 10, pp. 2535-2540, 2012-10. (EI) -
Chan, C. S., Chang, C. C. and Hung, P. V., "A User-Friendly Image Sharing Scheme Using JPEG-LS Median Edge Predictor," J. of Information Hiding and Multimedia Signal Processing, Vol. 3, No. 4, pp. 340-351, 2012-10. (EI) -
Chang, C. C., Huang, Y. H., Tsai, H. Y. and Qin, C., "Prediction-Based Reversible Data Hiding with High Image Quality Using the Difference of Neighboring Pixels," International Journal of Electronics and Communications, Vol. 66, No.9, pp. 758-766, 2012-09. (SCIE,EI) -
Qin, C., Chang, C. C.* and Tsou, P. L., "Perceptual Image Hashing Based on the Error Diffusion Halftone Mechanism," Inter. Journal of Innovative Computing, Info. and Control, Vol. 8, No. 9, pp. 6161-6172, 2012-09. (EI) -
Chen, K. N., Chen, C. H. and Chang, C. C., "Efficient Illumination Compensation Techniques for Text Images," Digital Signal Processing, Vol. 22, No. 5, pp. 726-733, 2012-09. (SCIE,EI) -
Guo, C., Chang, C. C. and Qin, C., "A Multi-threshold Secret Image Sharing Scheme Based on MSP," Pattern Recognition Letters, Vol. 33, No. 12, pp. 1594-1600, 2012-09. (SCIE,EI) -
Tang, J., Jiang, B., Chang C. C. and Bin, L., "Graph Structure Analysis Based on a Complex Network," Digital Signal Processing, Vol. 22, No. 5, pp. 713-725, 2012-09. (SCIE,EI) -
Chang, C. C., Nguyen, T. S. and Lin, C. C., "A Novel VQ-based Reversible Data Hiding Scheme by Using Hybrid Encoding Strategies," Journal of Systems and Software, Vol. 86, No. 2, pp. 389-402, 2012-09. (SCIE,EI) -
Lin, C. C., Chang, C. C. and Chen, Y. H., "Reversible Data Embedding Scheme Using Relationships between Pixel-Values and Their Neighbors," Journal of Electronic Science and Technology, Vol. 10, No. 3, pp. 238-249, 2012-09. (EI) -
Guo, C. and Chang, C. C.*, "Proactive Weighted Threshold Signature Based on Generalized Chinese Remainder Theorem," Journal of Electronic Science and Technology, Vol. 10, No. 3, pp. 250-255, 2012-09. (EI) -
Cheng, Z. Y., Liu, Y., Chang, C. C.* and Chang, S. C., "A Smart Card Based Authentication Scheme for Remote User Login and Verification," Inter. Journal of Innovative Computing, Info. and Control, Vol. 8, No. 8, pp. 5499-5511, 2012-08. (EI) -
Qin, C., Wang, Z. H., Chang, C. C. and Chen, K. N., "Reversible Data Hiding Scheme Based on Image Inpainting," Fundamenta Informaticae, Vol. 120, pp. 59-70, 2012-08. (SCIE,EI) -
Qin, C, Chang, C. C. and Guo, C., "Perceptual Robust Image Hashing Scheme Based on Secret Sharing," Journal of Computer Research and Development, Vol. 49, No. 8, pp. 1690-1698, 2012-08. (EI) -
Pai, P. Y., Chang, C. C., Chan, Y. K., Tsai, M. H. and Guo, S. W., "An Image Segmentation-Based Thresholding Method," Journal of Imaging Science and Technology, Vol. 56, No. 3, pp. 1-22., 2012-08. (SCIE) -
Pai, P. Y., Chang, C. C., Chan, Y. K. and Liu, C. M., "An ROI-Based Medical Image Hiding Method," Inter. Journal of Innovative Computing, Info. and Control, Vol. 8, No. 7, pp. 1-13, 2012-07. (EI) -
Wang, Z. H., Chang, C. C.* and Pizzolatti, M. S, "A Novel Vector Quantization Technique Using Block Mining in Image Compression," Advances in Information Sciences and Service Sciences, Vol. 4, No. 12,pp. 89-97., 2012-07. (EI) -
Wang, Z. H., Chang, C. C. and Li, M. C., "Optimizing Least-significant-bit Substitution Using Cat Swarm Optimization Strategy," Information Sciences, Vol. 192, No. 1, pp. 98-108, 2012-06. (SCIE,EI) -
Wang, X. T., Chang, C. C., Lin, C. C. and Li, M. C., "A Novel Multi-group Exploiting Modification Direction Method Based on Switch Map," Signal Processing, Vol. 92, No. 6, pp. 1525-1535, 2012-06. (SCIE) -
Guo, C., Chang, C. C., Qin, C. and Li, M. C., "Encryption Scheme for Weighted Threshold Authentication," Journal of Applied Sciences - Elec. and Inf. Engineering, Vol. 30, No. 3, pp. 251-255, 2012-05. (EI) -
Liu, Y.*, Cheng, Z. Y., Chang, C. C. and Zhang, Z. J, "A Secure Dynamic Identity Based Remote User Authentication Scheme Using Secret Sharing," Journal of Internet Technology, Vol. 13, No. 3, pp. 463-470, 2012-05. (SCIE,EI) -
Qin, C., Chang, C. C. and Chen, P. Y., "Self-Embedding Fragile Watermarking with Restoration Capability Based on Adaptive Bit Allocation Mechanism," Signal Processing, Vol. 92, No. 4, pp. 1137-1150, 2012-04. (SCIE) -
Yang, J. H. and Chang, C. C., "A Low Computational-cost Electronic Payment Scheme for Mobile Commerce with Large-scale Mobile Users," Wireless Personal Communications, Vol. 63, No. 1, pp. 83-99, 2012-03. (SCIE,EI) -
Guo, C., Chang, C. C. and Qin, C., "Multi-Threshold Visual Secret Sharing," Advance in Information Science and Service Science, Vol. 4, No. 4 pp. 195-201, 2012-03. (EI) -
Kieu, T. D. and Chang, C. C., "Reversible Watermarking Schemes Based on Expansion Embedding Using Pixel Partition Strategies," Imaging Science Journal, Vol. 60, pp. 112-124, 2012-02. (SCIE,EI) -
Chen, Y. H. and Chang, C. C., "Image Tamper Detection and Recovery Based on Dual Watermarks Sharing Strategy," Journal of Digital Information Management, Vol. 10, No. 1, pp. 39-49, 2012-02. (EI) -
Chang, C. C. and Lee, C. Y., "A Secure Single Sign-on Mechanism for Distributed Computer Networks," IEEE Transactions on Industrial Electronics, Vol. 59, No. 1, PP. 629~637, 2012-01. (SCIE,EI) -
Guo, C., Chang, C. C. and Wang, Z. H., "A New Data Hiding Scheme Based on DNA Sequence," Inter. Journal of Innovative Computing, Info. and Control, Vol. 8, No. 1(A), pp. 139-149, 2012-01. (EI) -
Chang, C. C. and Hsieh, Y. P., "A Fast VQ Codebook Search with Initialization and Search Order," Information Sciences, Vol. 183, No. 1, pp. 132-139, 2012-01. (SCIE,EI) -
Cheng, Z. Y., Liu, Y., Chang, C. C. and Chang, S. C., "An Improved Protocol for Password Authentication Using Smart Cards," Journal of Computers, Vol. 22, No. 4, pp. 28-37, 2012-01. (EI) -
Cui, S. Y., Wang, Z. H., Chang, C. C. and Li, M. C., "A Data Hiding Scheme Based on Voronoi Diagram," Journal of Computers, Vol. 22, No. 4, pp. 47-58, 2012-01. (EI) -
Guo, C., Chang, C. C. and Qin, C., "A Hierarchical Threshold Secret Image Sharing," Pattern Recognition Letters, Vol. 33, No. 1, pp. 83-91, 2012-01. (SCIE,EI) -
Pai, P. Y., Chang, C. C. and Chan, Y. K., "Nucleus and Cytoplast Contour Detector from a Cervical Smear Image," Expert Systems with Applications, Vol. 39, No. 1, pp. 154-161, 2012-01. (SCIE) -
Chang, C. C., Hsieh, Y. P. and Liao, C. C., "A Visual Secret Sharing Scheme for Progressively Restoring Secrets," Journal of Electronic Science and Technology, Vol. 9, No. 4, pp. 325-331, 2011-12. (EI) -
Kieu, T. D. and Chang, C. C., "A Reversible Watermarking Scheme with High Payload and Good Visual Quality for Watermarked Images," Inter. Journal of Innovative Computing, Info. and Control, Vol. 7, No. 11, pp. 6203-6218, 2011-11. (SCIE) -
Lee, C. Y., Wang, Z. H., Harn, L. and Chang, C. C., "Secure Key Transfer Protocol Based on Secret Sharing for Group Communications," IEICE Transactions on Information and Systems, Vol. E94-D, No. 11, pp. 2069-2076, 2011-11. (SCIE,EI) -
Chen, C. C. and Chang, C. C., "Hiding Secret Information in Lossless Compression Codes," Inter. Journal of Innovative Computing, Info. and Control, Vol. 7, No. 10, pp. 5881-5892, 2011-10. (SCIE) -
Chang, C. C., Tsai, H. C. and Huang, Y. C., "Provably Secure High Entropy Three-party Authenticated Key Exchange Scheme for Network Environments," Inter. Journal of Innovative Computing, Info. and Control, Vol. 7, No. 10, pp. 5619-5630, 2011-10. (SCIE) -
Chang, C. C., Nguyen, T. S. and Lin, C. C., "A Reversible Data Hiding Scheme for VQ Indices Using Locally Adaptive Coding," Journal of Visual Communication and Image Representation, Vol. 22, No. 7, pp. 664-672, 2011-10. (SCIE,EI) -
Lee, C. F., Chang, C. C. and Wu, C. Y., "A High Payload Multiple Embedding Scheme Based Reversible Data Hiding," Journal of Computers, Vol. 22, No. 3, pp. 78-94, 2011-10. (EI) -
Lee, C. F., Huang, Y. H., Chang, C. C. and Liu, T. C., "A Prediction-Based Adaptive Reversible Data Embedding Scheme," Journal of Software, Vol. 6, No. 9, pp. 1813-1820, 2011-09. (EI) -
Chang, C. C. and Lee, C. Y., "A Secure E-mail Protocol for Mobile Devices," Inter. Journal of Innovative Computing, Info. and Control, Vol. 7, No. 9, pp. 5353-5362, 2011-09. (SCIE) -
Chang, C. C., Chen, K. N., Lee, C. F. and Liu, L. J., "A Secure Fragile Watermarking Scheme Based on Chaos-and-Hamming Code," Journal of Systems and Software, Vol. 84, No. 9, pp. 1462-1470, 2011-09. (SCIE,EI) -
Chang, C. C. and Cheng, T. F., "A Robust and Efficient Smart Card Based Remote Login Mechanism for Multi-Server Architecture," Inter. Journal of Innovative Computing, Info. and Control, Vol. 7, No. 8, pp. 4589-4602, 2011-08. (SCIE) -
Guo, C., Wang, Z. H., Chang, C. C. and Qin, C., "A Secret Image Sharing Scheme with High Quality Shadows Based on Exploiting Modification Direction," Journal of Multimedia, Vol. 6, No. 4, pp. 341-348, 2011-08. (EI) -
Harn, L., Lee, C. Y., Lin, C. and Chang, C. C., "Fully Deniable Message Authentication Protocols Preserving Confidentiality," The Computer Journal, Vol. 54, No. 10, pp. 1688-1699, 2011-08. (SCIE,EI) -
Lin, P. Y., Lee, J. S. and Chang, C. C., "Protecting the Content Integrity of Digital Imagery with Fidelity Preservation," ACM Trans. on Multimedia Computing Comm. and Applications, Vol. 7, No. 3, Article15:1-Article15:20, 2011-08. (SCIE) -
Li, L., Xu, H. and Chang, C. C., "Rotation Invariant Image Copy Detection Using DCT Domain," Inter. Journal of Innovative Computing, Info. and Control, Vol. 7, No. 7(A), pp. 3633-3644, 2011-07. (SCIE) -
Chang, C. C., Chen, K. N. and Lin, H. C., "Novel Magic Matrices Generation Method for Secret Messages Embedding," Int. Journal of Computer Sciences and Engineering Systems, Vol. 5, No. 3, pp. 235-241, 2011-07. -
Le, T. H. N., Lin, C. C., Chang, C. C.and Le, H. B., "A High Quality and Small Shadow Size Visual Secret Sharing Scheme Based on Hybrid Strategy for Grayscale Images," Digital Signal Processing, Vol. 21, No. 6, pp. 734-745, 2011-07. (SCIE,EI) -
Chang, C. C., Lin, C. C. and Tu, H. N., "Safeguarding Visual Information Using (t,n) Verifiable Secret Shares," Journal of Computers, Vol. 22, No. 2, pp. 72-88, 2011-07. (EI) -
Lee, C. F., Chen, K. N., Chang, C. C. and Tsai, M. C., "A Hierarchical Fragile Watermarking with VQ Index Recovery," Journal of Multimedia, Vol. 6, No. 3, pp. 277-284, 2011-06. (EI) -
Chang, C. C., Chen, K. N. and Tu, H. N., "Lossless Secret Sharing Scheme with High Quality Shares Based on VQ-Compressed Images," Inter. J. of Pattern Recognition and Artificial Intelligence, Vol. 25, No. 4, pp. 529-546, 2011-06. (SCIE,EI) -
Chang, C. C. and Lai, Y. P., "An Adaptive Liner Regression Approach to Still Image Compression," Inter. Journal of Innovative Computing, Info. and Control, Vol. 7, No. 6, pp. 3047-3057, 2011-06. (SCIE) -
Li, L., Yang, F. and Chang, C. C., "A Reversible Watermarking Algorithm Based on Four-Neighbors Context Prediction for Tongue Images," International Journal of Intelligent Information Processing, Vol. 2, No. 2, pp. 22-28, 2011-06. -
Li, L., Wang, R. L. and Chang, C. C., "A Digital Watermark Algorithm for QR Code," International Journal of Intelligent Information Processing, Vol. 2, No. 2, pp. 29-36, 2011-06. -
Lin, P. Y. and Chang, C. C., "Cheating Resistance and Reversibility Oriented Secret Sharing Mechanism," IET Information Security, Vol. 5, No. 2, pp. 81-92, 2011-06. (SCIE,EI) -
Cui, J., Huang, L., Zhong, H., Chang, C. C. and Yang, W., "An Improved AES S-box And Its Performance Analysis," Inter. Journal of Innovative Computing, Info. and Control, Vol. 7, No. 5(A), pp. 2291-2302, 2011-05. (SCIE,EI) -
Pai, P. Y., Chang, C. C., Chan, Y. K. and Tsai, M. H., "An Adaptable Threshold Detector," Information Sciences, Vol. 181, No. 8, pp. 1463-1483, 2011-04. (SCIE,EI) -
Kieu, T. D. and Chang, C. C., "A Steganographic Scheme by Fully Exploiting Modification Directions," Expert Systems with Applications, Vol. 38, No. 8, pp. 10648-10657, 2011-04. (SCIE) -
Chang, C. C., Chen, K. N. and Tsai, M. H., "Reversible Watermarking Using Two-passed Threshold Decision," Accepted byJournal of Multimedia, 2011-04. (EI) -
Wang, Z. H., Chang, C. C., Li, M. C. and Lu, T. C., "A Simple Image Encoding Method with Data Lossless Information Hiding," Journal of Networks, Vol. 6, No. 3, pp. 400-407, 2011-03. (EI) -
Chang, C. C., Lin, C. Y. and Fan, Y. H., "Reversible Steganography for BTC-compressed Images," Fundamenta Informaticae, Vol. 109, No. 2, pp. 121-134, 2011-03. (SCIE,EI) -
Pai, P. Y., Chang, C. C., Chan, Y. K. and Liao, C. C., "Meaningful Shadow Based Multiple Gray Level Visual Cryptography without Size Expansion," Inter. Journal of Innovative Computing, Info. and Control, Vol. 7, No. 3, pp. 1457-1465, 2011-03. (SCIE) -
Wang, Z. H., Chang, C. C., Tu, H. N. and Li, M. C., "Reversible Data Hiding for VQ Indices Using Prediction Errors," Inter. J. of Innovative Computing, Information and Control, Vol. 7, No. 3, PP. 1375~1385, 2011-03. (SCIE) -
Chang, C. C., Chen, Y. H. and Wang, H. C., "Meaningful Secret Sharing Technique with Authentication and Remedy Abilities," Information Sciences, Vol. 181, No. 14, pp. 3073-3084, 2011-03. (SCIE,EI) -
Wang, Z. H., Chang, C. C., Tu, H. N. and Li, M. C., "Sharing a Secret Image in Binary Images with Verification," J. of Information Hiding and Multimedia Signal Processing, Vol. 2, No. 1, PP. 78~90, 2011-01. (EI) -
Li, L., Xu, H. H., Chang, C. C. and Ma, Y. Y., "A Novel Image Watermarking in Redistributed Invariant Wavelet Domain," Journal of Systems and Software, Vol. 84, No. 6, pp. 923-929, 2011-01. (SCIE,EI) -
Wang, Z. H., Chang, C. C. and Tsai, P. Y., "Hiding Secret Data in an Image Using Codeword Imitation," Journal of Information Processing Systems, Vol. 6, No. 4, PP. 1~9, 2010-12. -
Chang, C. C. and Tsai, H. C., "An Anonymous and Self-verified Mobile Authentication with Authenticated Key Agreement for Large-scale Wireless Networks," IEEE Transactions on Wireless Communications, Vol. 9, No. 11, PP. 3346~3353, 2010-11. (SCIE) -
Wang, Z. H., Chang, C. C., Chen, K. N. and Li, M. C., "An Encoding Method for Both Image Compression and Data Lossless Information Hiding," Journal of Systems and Software, Vol. 83, No. 11, PP. 2073~2082, 2010-11. (SCIE,EI) -
Wang, C. C., Hwang, Y. T., Chang, C. C., and Jan, J. K., "Hiding Information in Binary Images with Complete Reversibility and High Embedding Capacity," Inter. Journal of Innovative Computing, Info. and Control, Vol. 6, No. 11, PP. 5143~5161, 2010-11. (SCIE) -
Chan, Y. K., Pai, P. Y., Chen, R. C. and Chang, C. C., "A VQ Compression Method Based on the Variations of the Image Block Groups," Inter. J. of Innovative Computing, Information and Control, Vol. 6, No. 10, PP. 4527~4537, 2010-10. (SCIE,EI) -
Lee, J. S., Lin, P. Y. and Chang, C. C., "Lightweight Secure Roaming Mechanism between GPRS/UMTS and Wireless LANs," Wireless Personal Communications, Vol. 52, No. 4, PP. 569~580, 2010-10. (SCIE,EI) -
Wu, C. C., Lin, C. C. and Chang, C. C., "Digital Rights Management for Multimedia Content over 3G Mobile Networks," Expert Systems with Applications, Vol. 37, No. 10, PP. 6787~6797, 2010-10. (SCIE) -
Chang, C. C., Lin, C. C. and Li, K. M., "A Removable Visible Watermark for Digital Images," Journal of Computers, Vol. 21, No. 3, PP. 37~49, 2010-10. (EI) -
Chang, C. C., Chen, K. N. and Wang, Z. H., "Hiding Secret Information in Modified Locally Adaptive Data Compression Code," ICIC Express Letters, Vol. 4, No. 5(B), PP. 1887~1892, 2010-10. (EI) -
Chang, C. C., Chang, S. C. and Lai, Y. W., "An Improved Biometrics-based User Authentication Scheme without Concurrency System," International Journal of Intelligent Information Processing, Vol. 1, No. 1, pp. 41-49, 2010-09. -
Lee, J. S., Lin, P. Y. and Chang, C. C., "Analysis of an Image Secret Sharing Scheme to Identify Cheaters," International Journal of Image Processing, Vol. 4, No. 4, pp. 287-292, 2010-09. -
Chang, C. C., Yang, J. H. Wang, D. W., "An Efficient and Reliable E-DRM Scheme for Mobile Environments," Expert Systems with Applications, Vol. 37, No. 9, PP. 6176~6181, 2010-09. (SCIE) -
Chang, C. C. and Kieu, T. D., "A Reversible Data Hiding Scheme Using Complementary Embedding Strategy," Information Sciences, Vol. 180, No. 16, PP. 3045~3058, 2010-08. (SCIE,EI) -
Chang, C. C., Li, B. and Lee, J. S., "Secret Sharing Using Visual Cryptography," Journal of Electronic Science and Technology, Vol. 8, No. 4, PP. 289~299, 2010-08. (EI) -
Chang, C. C., Huang, Y. H. and Li, T. C., "Reversible Secret Sharing with Distortion Control Mechanism," ICIC Express Letters, Part B, Vol. 1, No. 2, PP. 163~167, 2010-07. (EI) -
Chang, C. C., Lee, J. S. and Le, T. H. N., "Hybrid Wet Paper Coding Mechanism for Steganography Employing n-Indicator and Fuzzy Edge Detector," Digital Signal Processing, Vol.20, No. 4, PP. 1286~1307, 2010-07. (SCIE,EI) -
Chang, C. C. and Chang, S. C.,, "An Efficient Internet On-line Transaction Mechanism," Inter. Journal of Innovative Computing, Info. and Control, Vol. 6, No. 7, PP. 3239~3245, 2010-07. (SCIE) -
Yin, Z. X., Chang, C. C. and Zhang, Y. P., "An Information Hiding Scheme Based on (7,4) Hamming Code Oriented Wet Paper Codes," Inter. Journal of Innovative Computing, Info. and Control, Vol. 6, No. 7, PP. 3121~3130, 2010-07. (SCIE) -
Li, Y. C., Chang, C. C. and Yeh, C. M., "Data Hiding Based on the Similarity between Neighboring Pixels with Reversibility," Digital Signal Processing, Vol. 20, No. 4, PP. 1116~1128, 2010-07. (SCIE) -
Xiong, N., Vasilakos, A. V., Yang, L. T., Wang, C. X., Kannan, R., Chang, C. C., Pan, Y., "A Novel Self-tuning Feedback Controller for Active Queue Management Supporting TCP Flows," Information Sciences, Vol. 180, No. 11, PP. 2249~2263, 2010-06. (SCIE,EI) -
Chang, C. C., Pai, P. Y., Yeh, C. M. and Chan, Y. K., "A High Payload Frequency Based Reversible Image Hiding Method," Information Sciences, Vol. 180, No. 11, PP. 2286~2298, 2010-06. (SCIE,EI) -
Chang, C. C., Lee, C. Y., Chen, C. C. and Wang, Z. H., "A Data-hiding Scheme Based on One-way Hash Function," Inter. Journal of Multimedia Intelligence and Security, Vol. 1, No. 3, PP. 285~297, 2010-06. -
Lin, C. N., Buehrer, D. J., Chang, C. C. and Lu, T. C., "Using Quad Smoothness to Efficiently Control Capacity–distortion of Reversible Data Hiding," Journal of Systems and Software, Vol. 83, PP. 1805~1812, 2010-06. (SCIE,EI) -
Chang, C. C., Yeh, J. S. and Yang, J. H., "Generalized Aryabhata Remainder Theorem," Inter. Journal of Innovative Computing, Info. and Control, Vol. 6, No. 4, PP. 1865~1871, 2010-04. (SCIE) -
Yang, J. H. and Chang, C. C., "An Efficient Payment Scheme by Using Electronic Bill of Lading," Inter. Journal of Innovative Computing, Info. and Control, Vol. 6, No. 4, PP. 1773~1779, 2010-04. (SCIE) -
Lee, C. F., Chang, C. C., Pai, P. Y. and Huang, W. H., "An Effective Demosaicing Algorithm for CFA Image," Inter. Journal of Innovative Computing, Info. and Control, Vol. 6, No. 4, PP. 5485~5499, 2010-04. (SCIE) -
Chen, C. C. and Chang, C. C., "A Digital Image and Secret Messages Sharing Scheme Using Two Stego Images," Inter. Journal of Innovative Computing, Info. and Control, Vol. 6, No. 4, PP. 5797~5807, 2010-04. (SCIE) -
Chen, W. J., Chang, C. C. and Le, T. H. N., "High Payload Steganography Mechanism Using Hybrid Edge Detector," Expert Systems with Applications (ESWA 2010), Vol. 37, No. 4, PP. 3292~3301, 2010-04. (SCIE) -
Chang, C. C., Tsai, H. C. and Hsieh, Y. P., "An Efficient and Fair Buyer-Seller Fingerprinting Scheme for Large Scale Networks," Computers & Security, Vol. 29, No. 2, PP. 269~277, 2010-03. (SCIE) -
Chang, C. C., Lee, C. Y. and Chiu, Y. C., "An Efficient E-mail Protocol Providing Perfect Forward Secrecy for Mobile Devices," International Journal of Communication Systems, Vol. 23, PP. 1463~1473, 2010-03. (SCIE,EI) -
Chang, C. C. and Chang, S. C., "The Design of E-Traveler's Check with Efficiency and Mutual Authentication," Journal of Networks, Vol. 5, No. 3, PP. 275~282, 2010-03. (EI) -
Chang, C. C., Lin, C. C.* and Huynh, N. T., "A Visual Secret Sharing Scheme with Verification Mechanism," Inte. J. of Computer Science and Engineering Systems, Vol. 4, No. 1, 2010-03. -
Chang, C. C., Lin, P. Y. and Chuang, J. C., "A Grayscale Image Steganography Based upon Discrete Cosine Transformation," Journal of Digital Information Management (JDIM), Vol. 8, No. 2, PP. 88~94, 2010-02. -
Wu, C. C., Chang, C. C. and Lin, I. C., "3GPP SIM-based Authentication Schemes for Wireless Local Area Networks," Inter. Journal of Innovative Computing, Info. and Control, Vol. 6, No. 2, PP. 461~474, 2010-02. (SCIE) -
Cheng, T. F., Chang, C. C. and Wang, Z. H., "A Secure Protocol for Three-Party Authenticated Key Exchange with Provable Belief," Inter. Journal of Info. Sciences and Computer Engineering, Vol.1, No.1, PP. 77~87, 2010-02. -
Lin, I. C., Chang, P. Y. and Chang, C. C., "A Key Management Scheme for Sensor Networks Using Bilinear Pairings and Gap Diffie-Hellman Group," Inter. Journal of Innovative Computing, Info. and Control, Vol. 6, No. 2, PP. 809~816, 2010-02. (SCIE) -
Chang, C. C., Chen, Y. H. and Kieu, T. D., "A Watermarking Technique Using Synonym Substitution for Integrity Protection of XML Documents," ICIC Express Letters, Vol. 4, No.1, PP. 89~94, 2010-02. (EI) -
Chang, C. C., Lai, Y. W. and Yang, J. H., "An Efficient Authenticated Encryption Scheme Based on Elliptic Curve Cryptosystem for Broadcast Environments," ICIC Express Letters, Vol. 4, No.1, PP. 95~99, 2010-02. (EI) -
Chang, C. C. and Hsieh, Y. P., "A Chaotic Map Based Adaptive Variable-Size LSB Method with Pixel-Value Differencing and Modulus Function," Imaging Science Journal, Vol. 58, No. 1, PP. 49~62, 2010-02. (SCIE,EI) -
Lee, C. F., Chen, K. N., Chang, C. C. and Tsai, M. C., "A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation," the special issue of J. of Info. Assurance and Security, Vol. 5, No. 1, PP. 187~195, 2010-02. (EI) -
Wang, Z. H., Kieu, T. D., Chang, C. C. and Li, M. C., "A Novel Information Concealing Method Based on Exploiting Modification Direction," J. of Information Hiding and Multimedia Signal Processing, Vol. 1, No. 1, PP. 1~9, 2010-01. -
Chang, C. C., Lin, P. Y., Wang, Z. H. and Li, M. C., "A Sudoku-based Secret Image Sharing Scheme with Reversibility," Journal of Communications, Vol. 5, No. 1, PP. 5~12, 2010-01. (EI) -
Wang, Z. H., Chang, C. C., Chen, K. N. and Li, M. C., "A Modification of VQ Index Table for Data Embedding and Lossless Indices Recovery," Journal of Computers, Vol. 20, No. 4, PP. 42~52, 2010-01. (EI) -
Chen, C. C. and Chang, C. C., "High Capacity SMVQ-based Hiding Scheme Using Adaptive Index," Signal Processing, Vol. 90, No. 7, PP. 2141~2149, 2010-01. (SCIE) -
Chang, C. C. and Yang J. H., "A Parallel Computation Algorithm for Generalized Aryabhata Remainder Theorem," Inter. Journal of Computer Sciences and Engineering Systems, Vol. 4, No. 1, PP. 61~67, 2010-01. -
Chang, C. C., Cheng, Y. F. and Lin, I. C., "A Noble Key Management Scheme for Scalable Multicast Communications," International Journal of Communications systems, Vol. 22, pp. 53-66, 2009-12. (SCIE,EI) -
Chang, C. C., Lin, C. C., Le, T. H. N. and Le, H. B., "Self-Verifying Visual Secret Sharing Using Error Diffusion and Interpolation Techniques," IEEE Transations on Information Forensics and Security, Vol. 4, No. 4, PP. 790~801, 2009-12. (SCIE,EI) -
Wang, Z. H., Chang, C. C., Lin, C. C. and Li, M. C., "A Reversible Information Hiding Scheme Using Left-Right and Up-Down Chinese Character Representation," Journal of Systems and Software, Vol. 82, No. 8, PP. 1362~1369, 2009-12. (SCIE,EI) -
Yang, J. H. and Chang, C. C., "An Efficient Fair Electronic Payment System Based upon Non-Signature Authenticated Encryption Scheme," Inter. Journal of Innovative Computing, Info. and Control, Vol. 5, No. 11(A), PP. 3861~3873, 2009-11. (SCIE) -
Lin, C. C., Chen, Y. H. and Chang, C. C., "LSB-based High-Capacity Data Embedding Scheme for Digital Images," Inter. Journal of Innovative Computing, Info. and Control, Vol. 5, No. 11(B), PP. 4283~4289, 2009-11. (SCIE) -
Chang, C. C., Lin, C. C., Le, T. H. N. and Le, H. B., "Sharing a Verifiable Secret Image Using Two Shadows," Pattern Recognition, Vol. 42, No. 11, PP. 3097~3114, 2009-11. (SCIE,EI) -
Lee, J. S., Chan, C. S., and Chang, C. C., "Non-Iterative Privacy Preservation for Online Lotteries," IET Information Security, Vol. 3, No. 4, PP. 139~147, 2009-11. (SCIE,EI) -
Chang, C. C. and Lai, Y. P., "Modular Square-and-Multiply Operation for Quadratic Residue Bases," Inter. Journal of Innovative Computing, Info. and Control, Vol. 5, No. 10(A), PP. 3059~3069, 2009-10. (SCIE) -
Lee, C. F., Chen, K. N. and Chang, C. C., "A New Data Hiding Strategy with Restricted Region Protection," Imaging Science Journal, Vol. 57, No. 5, PP. 235~249, 2009-10. (SCIE,EI) -
Kieu, T. D. and Chang, C. C., "A High Stego-image Quality Steganographic Scheme with Reversibility and High Payload Using Multiple Embedding Strategy," Journal of Systems and Software, Vol. 82, No. 10, PP. 1743~1752, 2009-10. (SCIE,EI) -
Lin, C. N., Chang, C. C. and Tsai, M. T., "An Image Copyright Protection Scheme Using DCT and a Table Look-up Technique," Journal of Digital Information Management (JDIM), PP. 358~364, 2009-10. -
Wu, C. C., Chang, C. C. and Lin, I. C., "An Authenticated PayWord Scheme without Public Key Cryptosystems," Inter. Journal of Innovative Computing, Info. and Control, Vol. 5, No. 9, PP. 1~11, 2009-09. (SCIE) -
Chang, C. C., Chang, S. C. and Lee, J. S., "An On-line Electronic Check System with Mutual Authentication," Computers & Electrical Engineering, Vol. 35, No. 5, PP. 757~763, 2009-09. (SCIE,EI) -
Yang, J. H. and Chang, C. C., "An Efficient Three-party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography for Mobile-commerce Environments," Journal of Systems and Software, Vol. 82, PP. 1497~1502, 2009-09. (SCIE,EI) -
Ge, M., Lam, K. Y., Gollmann, D., Chung, S. L. and Chang, C. C., "A Robust Certification Service for Highly Dynamic MANET in Emergency Tasks," International Journal of Communication Systems, Vol. 29, No. 9, PP. 1177~1197, 2009-09. (SCIE,EI) -
Lin,P. Y., Lee, J. S. and Chang, C. C., "Dual Digital Watermarking for Internet Media Based on Hybrid Strategies," IEEE Trans. on Circuits and Systems for Video Technology, Vol. 19, No. 8, PP. 1169~1171, 2009-08. (SCIE,EI) -
Kieu, T. D. and Chang, C. C., "An Image Authentication Based on Discrete Fourier Transform," Fundamenta Informaticae, Vol. 97, No. 4, PP. 369~379, 2009-08. (SCIE,EI) -
Chang, C. C., Kieu, T. D. and Wu, W. C., "A Lossless Data Embedding Technique by Joint Neighboring Coding," Pattern Recognition, Vol, 42, PP. 1597~1603, 2009-07. (SCIE,EI) -
Chang, C. C. and Yang, J. H., "A Parallel Conversion Algorithm Based upon Aryabhata Remainder Theorem for Residue Number System," Inter. Journal of Innovative Computing, Info. and Control, Vol. 5, No. 7, PP. 2053~2060, 2009-07. (SCIE) -
Tai, W. L. and Chang, C. C., "Data Hiding Based on VQ Compressed Images Using Hamming Codes and Declustering," Inter. Journal of Innovative Computing, Info. and Control, Vol. 5, No. 7, PP. 8~18, 2009-07. (SCIE) -
Lu, T. C. and Chang, C. C., "An Improved Full-Search Scheme for the Vector Quantization Algorithm Based on Triangle Inequality," Inter. Journal of Innovative Computing, Info. and Control, Vol. 5, No. 6, PP. 1625~1632, 2009-07. (SCIE) -
Lee, J. S. and Chang, C. C., "A Secure Multicast Framework in Large and High-Mobility Network Groups," IEICE Transactions on Communications, Vol. E92-B, No. 7, PP. 2365~2373, 2009-07. (SCIE) -
Lee, J. S., Chen, C. H. and Chang, C. C., "A Novel Illumination-Balance Technique for Improving the Quality of Degraded Text-Photo Images," IEEE Trans. on Circuits and Systems for Video Technology, Vol. 19, No. 6, PP. 900~905, 2009-06. (SCIE,EI) -
Chang, C. C. and Cheng, T. F., "An Efficient Proxy Raffle Protocol with Anonymity-Preserving," Computer Standards & Interfaces, Vol. 31, No. 4, PP. 772~778, 2009-06. (SCIE,EI) -
Tai, W. L., Yeh, C. M. and Chang, C. C., "Reversible Data Hiding Based on Histogram Modification of Pixel Differences," IEEE Trans. on Circuits and Systems for Video Technology, Vol. 19, No. 6, PP. 906~910, 2009-06. (SCIE,EI) -
Chiou, C. W., Chang, C. C., Lee, C. Y., Hou, T. W. and Lin, J. M., "Concurrent Error Detection and Correction in Gaussian Normal Basis Multiplier over GF(2m)," IEEE Transactions on Computers, Vol. 58, No. 6, PP. 851~857, 2009-06. (SCIE,EI) -
Chang, C. C., Lin, P. Y. and Wang, H. C., "Distortion-Free Steganography Mechanism with Compression to VQ Indices," Inter. J. of Sig. Proc., Image Proc. and Pattern Recognition, Vol. 2, No. 2, PP. 39~52, 2009-06. -
Chen, R. C., Pai, P. Y., Chan, Y. K. and Chang, C. C., "Lossless Image Compression Based on Multiple-Tables Arithmetic Coding," Mathematical Problems in Engineering, Vol. 2009, PP. 1~13, 2009-06. (SCIE) -
Chang, C. C., Chen, G. M. and Lin, C. C., "Lossless Compression Schemes of Vector Quantization Indices Using State Codebook," Journal of Computers, Vol. 4, No. 4, PP. 274~282, 2009-06. -
Yang, J. H. and Chang, C. C., "An ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on Elliptic Curve Cryptosystem," Computers and Security, Vol. 28, No.3-4, PP. 138~143, 2009-05. (SCIE,EI) -
Chang, C. C., Kuo, C. L. and Chen, C. C., "Three Improved Codebook Searching Algorithms for Image Compression Using Vector Quantizer," International Journal of Computers and Applications, Vol. 31, No. 1, PP. 16~22, 2009-04. (EI) -
Kieu, T. D., Wang, Z. H., Chang, C. C. and Li, M. C., "A Sudoku Based Wet Paper Hiding Scheme," International Journal of Smart Home, Vol. 3, No. 2, PP. 1~12, 2009-04. -
Chang, C. C., Lin, P. Y. and Yeh, J. S., "Preserving Robustness and Removability for Digital Watermarks Using Subsampling and Difference Correlation," Information Sciences, Vol. 179, No. 13, PP. 2283~2293, 2009-04. (SCIE,EI) -
Chang, C. C., Lee, C. Y. and Chiu, Y. C., "Enhanced Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks," Computer Communications, Vol. 32, No. 4, PP. 611~618, 2009-03. (SCIE,EI) -
Chang, C. C., Chen, T. H. and Liu, L. J., "Preventing Cheating in Computational Visual Cryptography," Fundamenta Informaticae, Vol. 92, PP. 1~16, 2009-03. (SCIE,EI) -
Chang, C. C., Wang, Y. Z. and Chan, C. S., "An Efficient Probability-based t out of n Secret Image Sharing Scheme," Inter. J. of Sig. Proc., Image Proc. and Pattern Recognition, Vol. 2, No. 1, PP. 71~78, 2009-03. (EI) -
Chang, C. C. and Chou, H., "A New Public-key Oblivious Fragile Watermarking for Image Authentication Using Discrete Cosine Transform," Inter. J. of Sig. Proc., Image Proc. and Pattern Recognition, Vol. 2, No. 1, PP. 133~140, 2009-03. -
Chang, C. C., Lu, T. C., "Lossless Information Hiding Scheme Based on Neighboring Correlation," Inter. J. of Sig. Proc., Image Proc. and Pattern Recognition, Vol. 2, No.1, PP. 49~56, 2009-03. -
Chang, C. C., Chen, Y. H. and Lin, C. C., "A Data Embedding Scheme for Color Images Based on Genetic Algorithm and Absolute Moment Block Truncation Coding," Soft Computing, Vol. 13, No. 4, PP. 321~331, 2009-02. (SCIE) -
Lee, J. S. and Chang, C. C., "Design of Electronic t-out-of-n Lotteries on the Internet," Computer Standards and Interfaces, Vol. 31, No. 2, PP. 395~400, 2009-02. (SCIE,EI) -
Tsai, H. C., Chang, C. C. and Chang, K. J., "Roaming Across Wireless Local Area Networks Using SIM-Based Authentication Protocol," Computer Standards & Interfaces, Vol. 31, No. 2, PP. 381~389, 2009-02. (SCIE,EI) -
Chang, C. C., Lin, C. C. and Chen, Y. H., "Hiding Data in Color Palette Images with Hybrid Strategies," Imaging Science Journal, Vol. 57, No. 1, PP. 19~29, 2009-02. (SCIE,EI) -
Wang, C. C., Chang, C. C. and Jan, J. K., "Novel Watermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel Patterns," Fundamenta Informaticae, Vol. 90, No. 1-2, PP. 125~155, 2009-02. (SCIE,EI) -
Chang, C. C. and Chou, Y. C., "A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes," Fundamenta Informaticae, Vol. 90, No. 1-2, PP. 17~26, 2009-02. (SCIE,EI) -
Lu, T. C., Chang, C. C., and Liu, Y. L., "An Information-Hiding Scheme Based on Quantization-Based Embedding Technique," Fundamenta Informaticae, Vol. 91, PP. 1~14, 2009-02. (SCIE,EI) -
Chang, C. C., Chou, Y. C. and Hsieh, Y. P., "Search-Order Coding Method with Indicator-elimination Property," Journal of Systems and Software, Vol. 82, PP. 516~525, 2009-02. (SCIE,EI) -
Chang, C. C., Tsai, H. C. and Chiu, Y. C., "A Simple and Robust Authenticated Multiple Key Agreement Scheme," International Journal of Security & Its Applications (IJSIA), Vol. 3, No. 2, 2009-02. (EI) -
Chen, T. H., Chang, C. C., Wu, C. S. and Lou, D. C., "On the Security of A Copyright Protection Scheme Based on Visual Cryptography," Computer Standards & Interfaces, Vol. 31, No. 1, PP. 1~5, 2009-01. (SCIE,EI) -
Chang, C. C. and Lee, J. S., "Robust t-out-of-n Oblivious Transfer Mechanism Based on CRT," Journal of Network and Computer Applications, Vol. 32, No. 1, PP. 226~235, 2009-01. (SCIE,EI) -
Chang, C. C., Kieu, T. D. and Chou, Y. C., "Reversible Information Hiding for VQ Indices Based on Locally Adaptive Coding," Journal of Visual Communication and Image Representation, Vol. 20, No. 1, PP. 57~64, 2009-01. (SCIE,EI) -
Chang, C. C., Lee, C. F. and Chuang, L. Y., "Embedding Secret Binary Message Using Locally Adaptive Data Compression Coding," Int. Journal of Computer Sciences and Engineering Systems, Vol. 3, No. 1, PP. 55~61, 2009-01. -
Lin, P. Y., Lee, J. S. and Chang, C. C., "Distortion-Free Secret Image Sharing Mechanism Using Modulus Operator," Pattern Recognition, Vol. 42, No. 5, PP. 886~895, 2009-01. (SCIE,EI) -
Chang, C. C., Lin, P. Y. and Chuang, J. C., "Progressive Image Transmission Scheme for Lossless Images Using Prior Bitmap," Journal of Applied Sciences - Elec. and Inf. Engineering, PP. 44~50, 2009-01. (Vol. 27, No. 1) -
Lin, I. C. and Chang, C. C., "A Countable and Time-Bound Password-Based User Authentication Scheme for the Applications of Electronic Commerce," Information Sciences, Vol. 179, No. 9, PP. 1269~1277, 2009-01. (SCIE,EI) -
Chiou, C. W., Lee, C. Y., Lin, J. M., Hou, T. W. and Chang, C. C., "Concurrent Error Detection and Correction in Dual Basis Multiplier over GF(2m)," IET Circuits, Devices and Systems, 3/1, PP. 22~40, 2009-01. (SCIE,EI) -
Chang, C. C. and Cheng, T. F., "An IC-Card-Based and Flexible t-out-of-n Electronic Voting Mechanism," Journal of Computers, Vol. 19, No. 4, PP. 41~50, 2009-01. -
Chang, C. C., Chen, C. H. and Lee, J. S., "A Hybrid Strategy for Improving Illumination-Balance of Degraded Text-Photo Images," Journal of Science and Technology, Vol. 46, No. 5A, PP. 26~34, 2008-12. -
Lin, C. N., Chang, C. C. and Chan, Y. K., "Data Hiding on Two Stage VQ Compression Codes," Imaging Science Journal, Vol. 56, No. 6, PP. 342~350, 2008-11. (SCIE,EI) -
Chang, C. C., Lee, J. S. and Kuo, J. Y., "Time-bound Based Authentication Scheme for Multi-server Architecture," Inter. Journal of Innovative Computing, Info. and Control, Vol. 4, No. 11, PP. 2987~2996, 2008-11. (SCIE) -
Lin, C. C., Tai, W. L. and Chang, C. C., "Multilevel Reversible Data Hiding Based on Histogram Modification of Difference Images," Pattern Recognition, Vol. 41, No. 12, PP. 3582~3591, 2008-11. (SCIE,EI) -
Lee, C. F., Chang, C. C. and Wang, K. H., "An Improvement of EMD Embedding Method for Large Payloads by Pixel Segmentation Strategy," Image and Vision Computing, Vol. 26, No. 12, PP. 1670~1676, 2008-11. (SCIE,EI) -
Hsieh, Y. P., Chang, C. C. and Liu, L. J., "A Two-Codebook Combination and Three-Phase Block Matching Based Image Hiding Scheme with High Embedding-Capacity," Pattern Recognition, Vol. 41, No. 10, PP. 3104~3113, 2008-10. (SCIE,EI) -
Chang, C. C., Hsieh, Y. P. and Lin, C. H., "Sharing Secrets in Stego Images with Authentication," Pattern Recognition, Vol. 41, No. 10, PP. 3130~3137, 2008-10. (SCIE,EI) -
Wu, M. N., Lin, C. C. and Chang, C. C., "An Embedding Technique Based upon Block Prediction," Journal of Systems and Software, Vol. 81, No. 9, PP. 1505~1516, 2008-09. (SCIE,EI) -
Chang, C. C., Wu, W. C. and Chen, Y. H., "Joint Coding and Embedding Techniques for Multimedia Images," Information Sciences, Vol. 178, No. 18, PP. 3543~3556, 2008-09. (SCIE,EI) -
Chang, C. C., Chen, C. H. and Lin, P. Y., "Improving Line-Based Light Balancing for Text Images," Journal of Applied Sciences - Elec. and Inf. Engineering, Vol. 26, No. 5, PP. 499~505, 2008-09. -
Lee, J.S., Chang, Y.F. and Chang, C.C., "Secure Authentication Protocols for Mobile Commerce Transactions," Int. Journal of Innovative Computing,Information and Control, vo. 4, no. 9, PP. 2305~2314, 2008-09. (SCIE,EI) -
Tsou, C. C. Hu, Y. C., and Chang, C. C., "Efficient Optimal Pixel Grouping Schemes for AMBTC," Imaging Science Journal, Vol. 56, No. 4, PP. 217~231, 2008-08. (SCIE,EI) -
Lin, C. Y. and Chang, C. C., "Placing Chinese Phonetic Symbols on Mobile Phones Using Linear Programming," Inter. Journal of Innovative Computing, Info. and Control, Vol. 4, No. 8, PP. 2113~2126, 2008-08. (SCIE) -
Chou, Y. C., Chang, C. C. and Li, K. M., "A Large Payload Data Embedding Technique for Color Images," Fundamenta Informaticae, Vol. 88, No. 1-2, PP. 47~61, 2008-08. (SCIE,EI) -
Chang, C. C., Lin, C. C., Le, T. H. N. and Le, H. B., "A Probabilistic Visual Secret Sharing Scheme for Grayscale Images with Voting Strategy," International Journal of Intelligent Inf. Tech. Application, Vo. 1, No. 1, PP. 1~9, 2008-08. -
Chang, C. C. and Lin, P. Y., "Adaptive Watermark Mechanism for Rightful Ownership Protection," Journal of Systems and Software, Vol. 81, No. 7, PP. 1118~1129, 2008-07. (SCIE,EI) -
Chang, C. C., Chou, Y. C. and Kieu, T. D., "High Capacity Data Hiding for Grayscale Images," Fundamenta Informaticae, Vol. 86, No. 4, PP. 435~446, 2008-07. (SCIE,EI) -
Chang, C. C., Lin, C. Y. and Fan, Y. H., "Lossless Data Hiding for Color Images Based on Block Truncation Coding," Pattern Recognition, Vol. 41, No. 7, PP. 2347~2357, 2008-07. (SCIE,EI) -
Chang, C. C., Lin, C. C., Lin, C. H., and Chen, Y. H., "A Novel Secret Image Sharing Scheme in Color Images Using Small Shadow Images," Information Sciences, Vol. 178, No. 11, PP. 2433~2447, 2008-06. (SCIE,EI) -
Chu, C. H., Lin, H. F., Chang, C. C.and Chen, C. Y., "A Multi-policy Threshold Signature Scheme with Traceable Participant Cosigners," Inter. Journal of Innovative Computing, Info. and Control, Vol.4, No.6, PP. 1347~1356, 2008-06. (SCIE) -
Lee, J. S., Chang, Y. F. and Chang, C. C., "A Novel Authentication Protocol for Multi-server Architecture without Smart Cards," Inter. Journal of Innovative Computing, Info. and Control, Vol. 4, No. 6, PP. 1357~1364, 2008-06. (SCIE) -
Lee, J. S. and Chang, C. C., "Preserving Data Integrity in Mobile ad hoc Networks with Variant Diffie–Hellman Protocol," Security and Communication Networks, Vol. 1, No. 4, PP. 277~286, 2008-06. -
Huang, H. F. and Chang, C. C., "Low-Computation Oblivious Transfer Scheme for Private Information Retrieval," Inter. Journal of Innovative Computing, Info. and Control, Vol. 4, No. 6, PP. 1365~1370, 2008-06. (SCIE) -
Chang, C. C., Lin, C. C. and Chen, Y. H., "Adaptive Data Embedding Scheme Based on Similar and Dissimilar Clustering Strategies," Fundamenta Informaticae, Vol. 88, No. 1-2, PP. 23~45, 2008-06. (SCIE,EI) -
Chang, C. C., Cheng, Y. F. and Lin, I. C., "A Novel Key Management Scheme for Dynamic Multicast Communications," International Journal of Communication Systems, Vol. 22, No. 1, PP. 53~66, 2008-06. (SCIE,EI) -
Chang, C. C., Lin, C. C. and Chen, Y. H., "Reversible Data-Embedding Scheme Using Differences Between Original and Predicted Pixel Values," IET Information Security, Vol. 2, No. 2, PP. 35~46, 2008-06. (SCIE,EI) -
Chen, C. Y., Lin, H. F., and Chang, C. C., "An Efficient Generalized Group-Oriented Signature Scheme," Inter. Journal of Innovative Computing, Info. and Control, Vol.4, No.6, PP. 1335~1345, 2008-06. (SCIE) -
Lin, C. N., Chang, C. C. and Chan, Y. K., "Data Hiding on Two-stage VQ Compression Codes," Imaging Science Journal (ISJ), Vol. 56, No. 6, Dec. 2008, pp. 342-350, 2008-06. -
Lin, C. C., Wu, C. C. and Chang, C. C., "Digital Right Schemes for Limited Issue and Flexible Division," International Journal of Computer Science and Network Security, Vol. 8, No. 2, Feb. 2008, pp. 33-42, 2008-06. -
Lee, J. S. and Chang, C. C., "Preserving data integrity in mobile ad hoc networks with variant Diffie‐Hellman protocol," Security and Communication Networks, Vol. 1, No. 4, Jun. 2008, pp. 277-286, 2008-06. -
Hsieh, Y. P., Chang, C. C. and Liu, L. J., "A Two-Codebook Combination and Three-Phase Block Matching Based Image-Hiding Scheme with High Embedding Capacity," Pattern Recognition, Vol. 41, No. 10, Oct. 2008, pp. 3104-3113, 2008-06. -
Lu, T. C. and Chang, C. C., "Lossless Nibbled Data Embedding Scheme Based on Difference Expansion," Image and Vision Computing, Vol. 26, No. 5, PP. 632~638, 2008-05. (SCIE,EI) -
Wu, C. C., Chang, C. C. and Lin, I. C., "New Sealed-bid Electronic Auction with Fairness, Security and Efficiency," Journal of computer science and technology, Vol. 23, No. 2, PP. 253~264, 2008-05. (SCIE) -
Chang, C. C., Kieu, T. D. and Chou, Y. C., "Reversible Data Embedding for Color Images," Journal of Digital Information Management, Vol. 6, No. 2, PP. 143~150, 2008-04. -
Chen, C. C. and Chang, C. C., "LSB-Based Steganography Using Reflected Gray Code," IEICE Transactions on Information and Systems, E91-D, No. 4, PP. 1110~1116, 2008-04. (SCIE,EI) -
Wu, M. N. and Chang, C. C., "A Novel High Capacity Reversible Information Hiding Scheme Based on Side-Match Prediction and Shortest Spanning Path," Circuits, Systems and Signal Processing, Vol. 27, No. 2, PP. 137~153, 2008-04. (EI) -
Lin, C. Y., Chang, C. C. and Wang, Y. C., "Reversible Steganographic Method with High Payload for JPEG Images," IEICE Transactions on Information and Systems, Vol. E91-D, No. 3, PP. 836~845, 2008-03. (SCIE,EI) -
Chang, C. C., Li, Y. C. and Lin, C. H., "A Novel Method for Progressive Image Transmission Using Blocked Wavelets," International Journal of Electronics and Communications, Vol. 62, No. 2, PP. 159~162, 2008-03. (SCIE,EI) -
Chang, C. C. and Tseng, S. W., "Error Resilient Lempel-Ziv Data Compression Scheme with Perfect Hashing," Inter. Journal of Innovative Computing, Info. and Control, Vol. 4, No. 3, PP. 761~770, 2008-03. (SCIE) -
Chang, C. C., Fan, Y. H. and Tai, W. L., "Four-scanning Attack on Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery," Pattern Recognition, Vol. 41, No. 2, PP. 654~661, 2008-02. (SCIE,EI) -
Chen, C. Y., Hu, J. F. and Chang, C. C., "Using Dominance Searching to Speed up Temporal Join Operation," Inter. Journal of Innovative Computing, Info. and Control, Vol. 4, No. 2, PP. 335~350, 2008-02. (SCIE) -
Chang, C. C., Lin, C. Y. and Hsieh, Y. P., "Three-Phase Lossless Data Hiding Method for the VQ Index Table," Fundamenta Informaticae, Vol. 8, No. 1-2, PP. 1~13, 2008-02. (SCIE,EI) -
Chang, Y. F. and Chang, C. C., "Robust t-out-of-n Proxy Signature Based on RSA Cryptosystems," Inter. Journal of Innovative Computing, Info. and Control, Vol. 4, No. 2, PP. 425~431, 2008-02. (SCIE) -
Lin, C. C., Wu, C. C. and Chang, C. C., "Digital Right Schemes for Limited Issues and Flexible Division," Int. Journal of Computer Science and Network Security, Vol. 8, No. 2, PP. 33~42, 2008-02. -
Chuang, J. C., Chang, C. C. and Hu, Y. C., "Novel Colour Image-hiding Scheme Using Error Diffusion Technique," The Imaging Science Journal, Vol. 56, No. 1, PP. 11~22, 2008-02. (SCIE) -
Chuang, J. C., Chang, C. C. and Hu, Y. C.*, "A Novel Color Image Hiding Scheme Using Error Diffusion Technique," Imaging Science Journal, Vol. 56, No. 1, pp. 11-22, 2008-02. (SCIE,EI) -
Chang, C. C., Su, Y. W. and Lee, C. Y., "Constructing a Conversation Key in Three-Party Communications Environment," Inter. Journal of Multimedia and Ubiquitous Engineering, Vol. 3, No. 1, PP. 45~52, 2008-01. -
Chang, C. C. and Lee, C. Y., "A Friendly Password Mutual Authentication Scheme for Remote-Login Network Systems," Inter. Journal of Multimedia and Ubiquitous Engineering, Vol. 3, No. 1, PP. 59~64, 2008-01. -
Tseng, H. W. and Chang, C. C., "An Extended Difference Expansion Algorithm for Reversible Watermarking," Image and Vision Computing, Vol. 26, No. 8, PP. 1148~1153, 2008-01. (SCIE,EI) -
Chang, C. C. and Lin, P. Y., "A Color Image Authentication Method Using Partitioned Palette and Morphological Operations," IEICE Transactions on Information and Systems, Vol. E91-D, No. 1, PP. 54~61, 2008-01. (SCIE,EI) -
Chen, H. B., Chen, T. H., Lee, W. B. and Chang, C. C., "Security Enhancement for a Three-Party Encrypted Key Exchange Protocol against Undetectable On-Line Password Guessing Attacks," Computer standards & Interfaces, Vol. 30, No. 1-2, PP. 95~99, 2008-01. (SCIE,EI) -
Huang, H. F. and Chang, C. C., "A Novel Cryptographic Key Assignment Scheme with ID-Based Access Control in a Hierarchy," Fundamenta Informaticae, Vol. 84, No. 3-4, PP. 353~361, 2008-01. (SCIE,EI) -
Li, Y. C., Yeh, J. S., and Chang, C. C., "Isolated items discarding strategy for discovering high utility itemsets," Data & Knowledge Engineering, Vol. 64, No. 1, PP. 198~217, 2008-01. (SCIE,EI) -
Yang, J. H. and Chang, C. C., "Efficient Residue Number System Iterative Modular Multiplication Algorithm for Fast Modular Exponentiation," IET Computers & Digital Techniques, Vol. 2, No. 1, PP. 1~5, 2008-01. (SCIE) -
Chang, C. C., Lin, I. C. and Lin, M. H., "A Novel Location Tracking Scheme for Reducing Location Updating Traffic in a Personal Communication System," Wireless Personal Communications, Vol. 44, No. 2, PP. 139~152, 2008-01. (SCIE,EI) -
Lee, C. Y., Chiou, C. W., Lin, J. M. and Chang, C. C., "Scalable and Systolic Montgomery Multiplier over GF(2^m) Generated by Trinomials," IET Circuits, Devices & Systems, Vol. 1, No. 6, PP. 477~484, 2007-12. (EI) -
Lu, T. C. and Chang, C. C., "A Progressive Image Transmission Technique Using Haar Wavelet Transformation," Inter. Journal of Innovative Computing, Info. and Control, Vol. 3, No. 6(A), PP. 1449~1461, 2007-12. (SCIE) -
Chen, Y. H., Chang, C. C. and Lin, C. C., "Adaptive Data Embedding Using VQ and Clustering," Inter. Journal of Innovative Computing, Info. and Control, Vol. 3, No. 6(A), PP. 1471~1485, 2007-11. (SCIE) -
Chang, C. C. and Lin, I. C., "Security Enhancement for Digital Signature Schemes with Fault Tolerance in RSA," Information Sciences, Vol. 177, No. 19, PP. 4031~4039, 2007-10. (SCIE,EI) -
Chang, C. C., Lu, T. C. Chang, Y. F. and Lee, R. C. T., "Reversible Data Hiding Schemes for Deoxyribonucleic ACID (DNA) Medium," Inter. Journal of Innovative Computing, Info. and Control, Vol. 3, No. 5, PP. 1145~1160, 2007-10. (SCIE) -
Chang, C. C., Lee, C. Y. and Su, Y. W., "A Mutual Authenticated Key Agreement Scheme over Insecure Networks," Journal of Discrete Mathematical Sciences & Cryptography, Vol. 10, No. 5, PP. 603~612, 2007-10. -
Chang, C. C., Tsai, H. C. and Chen, Y. H., "An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards," International Journal of Security & Its Applications (IJSIA), Vol. 1, No. 2, PP. 33~40, 2007-10. -
Chang, C. C., Lin, C. H. and Chen, C. Y., "A Conference Key Distribution Scheme Using Interpolating Polynomials," International Journal of Security & Its Applications (IJSIA), Vol. 1, No. 2, PP. 9~20, 2007-10. -
Chang, C. C., Wu, W. C. and Tsou, C. C., "Hiding Secret Information Using Adaptive Side-Match VQ," IEICE Transactions on Information and Systems, Vol. E90-D, No. 10, PP. 1678~1686, 2007-10. (SCIE,EI) -
hang, Y. F., Chang, C. C. and Lin, P. Y., "A Concealed t-out-of-n Signer Ambiguous Signature Scheme with a Variety of Keys," Informatica, Vol. 18, No. 4, PP. 535~546, 2007-10. (SCIE,EI) -
Lee, J. S. and Chang, C. C., "Security Enhancement of Key Authentication Schemes Based on Discrete Logarithms," Journal of Discrete Mathematical Sciences & Cryptography, Vol. 10, No. 3, PP. 351~358, 2007-09. -
Chang, C. C., Hsieh, Y. P. and Lin, C. Y., "Lossless Data Embedding with High Embedding Capacity Based on Declustering for VQ-Compressed Images," IEEE Transactions on Information Forensics and Security, Vol. 2, No. 3, PP. 341~349, 2007-09. (EI) -
Chang, C. C., Li, Y. C. and Huang, W. H.,, "TFRP: An Efficient Microaggregation Algorithm for Statistical Disclosure Control," Journal of Systems and Software, Vol. 80, PP. 1866~1878, 2007-09. (SCIE,EI) -
Chang, C. C., Chou, Y. C. and Lin, C. Y., "Reversible Data Hiding in the VQ-Compressed Domain," IEICE Transactions on Information and Systems, Vol. E90-D No.9, PP. 1422~1426, 2007-09. (SCIE,EI) -
Chang, C. C., Lin, P. Y. and Chuang, J. C., "Fragile Watermarking Scheme for Digital Image Authentication Using Pixel Difference," The Imaging Science Journal, Vol. 55, No. 3, PP. 140~147, 2007-09. (SCIE) -
Yu, Y. H., Chang, C. C. and Lin, I. C., "A New Steganographic Method for Color and Grayscale Image Hiding," Computer Vision and Image Understanding, Vol. 107, No. 3, PP. 183~194, 2007-09. (SCIE,EI) -
Lee, J. S. and Chang, C. C., "Secure Communications for Cluster-based Ad Hoc Networks Using Node Identities," Journal of Network and Computer Applications, Vol. 30, PP. 1377~1396, 2007-08. (SCIE,EI) -
Chang, C. C., Tai, W. L. and Lin, C. C., "A Novel Image Hiding Scheme Based on VQ and Hamming Distance," Fundamenta Informaticae, Vol. 77, No. 3, PP. 217~228, 2007-07. (SCIE,EI) -
Wu, M. N., Lin, C. C. and Chang, C. C., "Novel Image Copy Detection with Rotating Tolerance," Journal of Systems and Software, Vol. 80, No. 7, PP. 1057~1069, 2007-07. (SCIE,EI) -
Li,Y. C., Yeh,J. S. and Chang, C. C., "MICF: An Effective Sanitization Algorithm for Hiding Sensitive Patterns on Data Mining," Advanced Engineering Informatics, Vol.21, PP. 269~280, 2007-07. (SCIE,EI) -
Lin, I. C. and Chang, C. C., "A Practical Electronic Payment System for Message Delivery Service in the Mobile Environment," Wireless Personal Communications, Vol. 42, No. 2, PP. 247~261, 2007-07. (SCIE) -
Chan, C. S. and Chang, C. C., "A Survey of Information Hiding Schemes for Digital Images," Int. Journal of Computer Sciences and Engineering Systems, Vol. 1, No. 3, PP. 187~200, 2007-07. -
Huang, H. F. and Chang, C. C., "A Novel Identity-Based Society Oriented Signature Scheme with Anonymous Signers," Applied Mathematics Sciences, Vol. 1, No. 32, PP. 1551~1562, 2007-07. -
Lee J.S., Chang, C. C. and Chang, P. Y., "Anonymous Authentication Scheme for Wireless Communications," International Journal of Mobile Communications, Vol. 5, No. 5, PP. 590~601, 2007-06. (EI) -
Cheng, T. F., Lee, J. S. and Chang, C. C., "Security Enhancement of an IC-Card-Based Remote Login Mechanism," Computer Networks, Vol. 51, No. 9, PP. 2280~2287, 2007-06. (SCIE,EI) -
Chang, C. C., Lin, C. C. and Hu, Y. S., "An SVD Oriented Watermark Embedding Scheme with High Qualities for the Restored Images," Inter. Journal of Innovative Computing, Info. and Control, Vol. 3, No. 3, PP. 1~12, 2007-06. (SCIE) -
Chang, C. C. and Wu, W. C., "Fast Planar-Oriented Ripple Search Algorithm for Hyperspace VQ Codebook," IEEE Transactions on Image Processing, Vol. 16, No. 6,, PP. 1538~1547, 2007-06. (SCIE,EI) -
Chang, C. C., Wu, W. C. and Hu, Y. C., "Lossless Recovery of a VQ Index Table with Embedded Secret Data," Journal of Visual Communication and Image Representation, Vol. 18, No. 3, PP. 207~216, 2007-06. (SCIE,EI) -
Tseng, H. W. and Chang, C. C., "Anti-Pseudo-Gray Coding for VQ Encoded Images over Noisy Channels," IEEE Communications Letters, Vol. 11, No. 5., PP. 443~445, 2007-05. (SCIE,EI) -
Chang, C. C., Lin, C. Y. and Lin, K. C., "Simple Efficient Mutual Anonymity Protocols for Peer-to-Peer Network Based on Primitive Roots," Journal of Network and Computer Applications, Vol. 30/2, PP. 662~676, 2007-04. (SCIE) -
Wu, H. C. and Chang, C. C., "An Image Retrieval Method Based on Color-Complexity and Spatial-Histogram Features," Fundamenta Informaticae, Vol.76, No.4, PP. 481~493, 2007-04. (SCIE) -
Shen, J. J., Chang, C. C. and Li, Y. C., "Combined Association Rules for Dealing with Missing Values," Journal of Information Science, Vol. 33, No. 4, PP. 468~480, 2007-04. (SSCI,SCIE,EI) -
Chang, C. C. and Lin, C. Y., "Reversible Steganographic Method Using SMVQ Approach Based on Declustering," Information Sciences, Vol. 177, No. 8, PP. 1796~1805, 2007-04. (SCIE,EI) -
Wu, C. C. and Chang, C. C., "Attacks on Provably Secure Proxy-protected Signature Schemes based on Factoring," Journal of Discrete Mathematical Sciences & Cryptography, Vol. 10, No. 2, PP. 193~204, 2007-04. -
Chang, C. C., Lin, C. Y. and Tseng, C. S., "Secret Image Hiding and Sharing Based on the (t, n)-Threshold," Fundamenta Informaticae, Vol. 76, No. 4, PP. 399~411, 2007-04. (SCIE,EI) -
Yu, Y. H., Chang, C. C. and Hu, Y. C., "Novel Scheme for Hiding Data Using Multiple Codebooks," The Imaging Science Journal, Vol. 55, No. 1, PP. 40~51, 2007-03. (SCIE) -
Chan, C. S. and Chang, C. C., "Scheme for hiding images by finding optimal one-to-two substitution table using dynamic programming strategy," Imaging Science Journal, Vol. 55, No. 1,, PP. 13~22, 2007-03. (SCIE) -
Huang, H. F. and Chang, C. C., "A New t-out-n Oblivious Transfer with Low Bandwidth," Applied Mathematics Sciences, Vol. 1, No. 7, PP. 311~320, 2007-03. -
Yu, Y. H., Chang, C. C. and Hu, Y. C.*, "Novel Scheme for Data Hiding Using Multiple Codebooks," Imaging Science Journal, Vol. 51, No. 1, pp. 40-51, 2007-03. (SCIE,EI) -
Chang, C. C., Lin, C. C., Tseng, C. S. and Tai, W. L., "Reversible Hiding in DCT-Based Compressed Images," Information Sciences, Vol. 177, PP. 2768~2786, 2007-02. (SCIE,EI) -
Chang, Y. F., Chang, C. C. and Cheng, Y.F., "Robust Non-interactive t-out-of-n Oblivious Transfer Based on the RSA Cryptosystem," Journal of Discrete Mathematical Sciences and Cryptography, Vol. 10, No. 1, PP. 93~109, 2007-02. -
Chang, C. C. and Chen, C. C., "Full-Searching-Equivalent Vector Quantization Method Using Two-Bounds Triangle Inequality," Fundamenta Informaticae, Vol. 76, No. 1-2, PP. 25~37, 2007-01. (SCIE,EI) -
Chang, Y. F. and Chang, C. C., "An RSA-based (t, n) Threshold Proxy Signature Scheme with Freewill Identities," International Journal of Information and Computer Security, Vol. 1, No. 1/2, PP. 201~209, 2007-01. -
Huang, H. F. and Chang, C. C., "A New Forward-Secure Blind Signature Scheme," Journal of Engineering and Applied Sciences, Vol. 2, No. 1, PP. 230~235, 2007-01. -
Chang, C. C., Lu, T. C. and Ya, J. B., "VQ Codebook Searching Algorithm Based on Correlation Property," Fundamenta Informaticae, Vol. 76, No. 1-2, PP. 39~57, 2007-01. (SCIE) -
Chang, Y. F. and Chang, C. C., "Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy," Fundamenta Informaticae, Vol. 76, No. 1-2, PP. 13~23, 2007-01. (SCIE) -
呂慈純、張真誠, "適用於壓縮機制之資訊隱藏技術," 資訊安全通訊 (CCISA), 第十三卷、第一期, PP. 56~73, 2007-01. -
Chang, C. C. and Lin, C. Y., "Reversible Steganography for VQ-compressed Images Using Side Matching and Relocation," IEEE Transactions on Information Forensics and Security, Vol. 1, No. 4, PP. 493~501, 2006-12. (EI) -
Chang, C. C. and Wu, C. C., "An Improvement of the Design of Integrating Subliminal Channel with Access Control," IAENG International Journal of Computer Science, Vol. 32, No. 4, PP. 436~439, 2006-12. -
Chang, C. C. and Lin, C. Y., "Reversible Data Embedding Based on Prediction Approach for VQ and SMVQ Compressed Images," Fundamenta Informaticae, Vol. 74, No. 2/3, PP. 189~207, 2006-12. (SCIE,EI) -
Chang, C. C. and Lee, J. S., "Security Enhancement of Yang-Li Hierarchical Access Control Mechanism," Journal of Discrete Mathematical Sciences & Cryptography, Vol. 9, No. 3, PP. 573~582, 2006-12. -
Lin, J. L., Lin, H. F., Chen, C. Y. and Chang, C. C., "A Multiauthority Electronic Voting Protocol Based upon a Blind Multisignature Scheme," Int.Journal of Computer Science and Network Security, Vol. 6, No. 12, PP. 266~274, 2006-12. -
Chang, C. C. and Yang, J. H., "An Efficient ID-Based User Identification Scheme for Mutual Authentication in Mobile Environments," Journal of Discrete Mathematical Sciences & Cryptography, Vol. 9, No. 3, PP. 537~548, 2006-12. -
Chang, Y. C., Chang, C. C. and Kao, C. L., "Comments on WLT Attack on An Enhanced Timestamp-based Password Authentication Scheme," Journal of Discrete Mathematical Sciences & Cryptography, Vol. 9, No. 3, PP. 549~555, 2006-12. -
Chang, Y. F., Chang, C.C. and Tai, W. L., "Comments on E-mail Protocols Providing Forward Secrecy," Journal of Discrete Mathematical Sciences and Cryptography, Vol. 9, No. 3, PP. 591~597, 2006-12. -
Chang, C. C. and Lu, T. C., "A Difference Expansion Oriented Data Hiding Scheme for Restoring the Original Host Images," The Journal of Systems and Software, 79, PP. 1754~1766, 2006-11. (SCIE,EI) -
Lin, C. C. and Chang, C. C., "An Improved Deniable Authentication Protocol," International Journal of Computer Science & Network Security, Vol. 6, No. 11, PP. 240~243, 2006-11. -
Chang, C. C., Yeh, J. S. and Li, Y. C., "Privacy-preserving mining of association rules on distributed databases," International Journal of Computer Science & Network Security, Vol. 6, No. 11, PP. 259~266, 2006-11. -
Chang, C. C., Tai, W. L. and Lin, C. C., "A Reversible Data Hiding Scheme Based on Side Match Vector Quantization," IEEE Trans. on Circuits and Systems for Video Technology, Vol. 16, No. 10, PP. 1301~1308, 2006-10. (SCIE,EI) -
Chang, C. C. and Liao, C. T., "An Image Coding Scheme Using SMVQ and Support Vector Machines," Neurocomputing, Vol. 69, No. 16-18, PP. 2327~2335, 2006-10. (SCIE,EI) -
Chuang, J. C. and Chang, C. C., "Using a Simple and Fast Image Compression Algorithm to Hide Secret Information," International Journal of Computers and Applications, Vol. 28, No. 4, PP. 329~333, 2006-10. (EI) -
Chang, C. C., Chou, H. and Lin, C. C., "Colour image-hiding scheme using human visual system," The Imaging Science Journal, Vol. 54, No. 3, PP. 152~163, 2006-09. (SCIE) -
Chang, C. C., Chan, C. S. and Tseng, C. S., "Removing Blocking Effects Using An Artificial Neural Network," Signal Processing, Vol. 86, PP. 2381~2387, 2006-07. (SCIE) -
Chang, C. C. and Lu, T. C., "Reversible Index-domain Information Hiding Scheme Based on Side-Match Vector Quantization," Journal of Systems and Software, Vol. 79, No. 8, PP. 1120~1129, 2006-07. (SCIE,EI) -
Chang, C. C., Li, Y. C. and Yeh, J. B., "Fast Codebook Search Algorithms Based on Tree-Structured Vector Quantization," Pattern Recognition Letters, Vol. 27, No. 10, PP. 1077~1086, 2006-07. (SCIE,EI) -
Tseng, S. W. and Chang, C. C., "Error Resilient Locally Adaptive Data Compression," Journal of Systems and Software, Vol. 79, No. 8, PP. 1156~1160, 2006-07. (SCIE,EI) -
Chang, C. C., Lin, C. Y. and Wang, Y. Z., "New Image Steganographic Methods Using Run-Length Approach," Information Sciences, Vol. 176, PP. 3393~3408, 2006-07. (SCIE,EI) -
Lee, J. S. and Chang, C. C., "Choosing t-out-of-n Secrets by Oblivious Transfer," Information & Security, Vol. 18, PP. 67~84, 2006-07. -
Chang, C. C. and Lee, J. S., "An Efficient and Secure Remote Authentication Scheme Using Smart Cards," Information & Security, Vol. 18, PP. 122~133, 2006-07. -
Lu, T. C., Chang, C.C. and Liu, Y. L., "A Content-based Image Authentication Scheme Based on Singular Value Decomposition," Pattern Recognition and Image Analysis: Advances in Mathemat, 16/3, PP. 506~522, 2006-07. -
Yu, Y. H. and Chang, C. C., "A New Edge Detection Approach Based on Image Context Analysis," Image and Vision Computing, Vol. 24, PP. 1090~1102, 2006-07. (SCIE,EI) -
Lin, C. Y. and Chang, C. C., "Hiding Data in VQ-compressed Images Using Dissimilar Pairs," Journal of Computers, Vol. 17, No. 2, pp. 3-10, 2006-07. (EI) -
Wu, M. N., Lin, C. C. and Chang, C. C., "A Robust Content-Based Copy Detection Scheme," Fundamenta Informaticae, Vol. 71, No. 2/3, PP. 351~366, 2006-06. (SCIE,EI) -
Chang, C. C., Chen, G. M., and Hu, Y. C., "A Novel Index Coding Scheme for Vector Quantization," Fundamenta Informaticae, Vol. 71, No. 2/3, PP. 215~227, 2006-06. (SCIE,EI) -
Chang, C. C., Chan, C. S. and Fang, Y. H., "Image Hiding Scheme with Modulus Function and Dynamic Programming Strategy on Partitioned Pixels," Pattern Recognition, Vol. 39, No. 6, PP. 1155~1167, 2006-06. (SCIE,EI) -
Wu, M. N., Lin, C. C. and Chang, C. C., "A Color Re-Indexing Scheme Using Genetic Algorithm," WSEAS Transactions on Systems, 5/6, PP. 1309~1314, 2006-06. (EI) -
Chang, Y. F., Lee, J. S. and Chang, C. C., "Comments on the Electronic Voting Protocol for General Elections," GESTS Int. Trans. on Computer Science and Engineering, Vol. 31, No. 1, PP. 174~182, 2006-06. -
Lin, C. C., Hu, Y. C. and Chang, C. C., "A Novel Watermarking Scheme Based on Rehashing and Vector Quantization," Fundamenta Informaticae, Vol. 71, No. 4, PP. 443~451, 2006-06. (SCIE,EI) -
Chan, C. S., Chang, C. C. and Hu, Y. C., "Image Hiding Scheme Using Modulus Function and Optimal Substitution Table," Pattern Recognition and Image Analysis, Vol. 16, No. 2, PP. 208~217, 2006-05. -
Lu, T. C. and Chang, C. C., "Color Image Retrieval Technique Based on Color Features and Image Bitmap," Information Processing and Management, Vol.43, No. 2, PP. 461~472, 2006-05. (SCIE,EI) -
Chan, C. S. and Chang, C. C., "An Efficient Image Authentication Method Based on Hamming Code," Pattern Recognition, Vol.40, No. 2, PP. 681~690, 2006-05. (SCIE,EI) -
Chang, C. C., and Lee, J. S., "An Anonymous and Flexible t-out-of-n Electronic Voting Scheme," Journal of Discrete Mathematical Sciences & Cryptography, Vol. 9, No. 1, PP. 133~151, 2006-04. -
Chang, C. C., Hu, Y. S. and Lu, T. C., "A Watermarking-Based Image Ownership and Tampering Authentication Scheme," Pattern Recognition Letters, Vol. 27, No. 5, PP. 439~446, 2006-04. (SCIE,EI) -
Huang, H. F. and Chang, C. C., "An Efficient and Flexible Forward-Secure Signature Scheme," International Journal of Computer Science and Network, Vol. 6, No. 3B, PP. 211~219, 2006-03. -
Huang, H. F. and Chang, C. C., "A Novel Efficient (t,n) Threshold Proxy Signature Scheme," Information Sciences, Vol. 176, No. 10, PP. 1338~1349, 2006-03. (SCIE,EI) -
Chang, C. C., Lin, I. C., and Liao, C. T., "An Access Control System with Time-constraint Using Support Vector Machines," International Journal of Network Security, Vol. 2, No. 2, PP. 150~159, 2006-03. -
Chang, C. C., Chan, C. S., and Tai, W. L., "Hiding a Halftone Secret Image in Two Camouflaged Halftone Images," Pattern Recognition and Image Analysis, Vol. 16, No. 3, PP. 486~496, 2006-03. -
Chang, Y. F., Lee, J. S., and Chang, C. C., "A Secure and Efficient Authentication Scheme for Mobile Users," International Journal of Mobile Communications, Vol. 4, No. 5, PP. 581~594, 2006-03. (EI) -
Chang, C. C. and Wu, W. C., "Hiding Secret Data Adaptively in VQ Index Tables," IEE Proceedings on Vision, Image and Signal Processing, Vol.153, No. 5, PP. 589~597, 2006-03. (SCIE,EI) -
Chuang J. C. and Chang, C. C., "An Information Hiding Scheme Based Upon Block Truncation Coding," Accepted byInternational Journal of Computers and Applications, 2006-02. (EI) -
Lin, C. C. , Hu, Y. C. and Chang, C. C., "A Novel Image Ownership Protection Scheme Based on Rehashing Concept and Vector Quantization," Fundamenta Informaticae, Vol. 71, No. 4, PP. 443~451, 2006-02. (SCIE,EI) -
Chang, C. C., Chuang, J. C. and Hu, Y. C., "Spatial Domain Image Hiding Scheme Using Pixel-Values Differencing," Fundamenta Informaticae, Vol. 70, No. 3, PP. 171~184, 2006-02. (SCIE) -
Hu, Y. C.and Chang, C. C., "An Improved Tree-Structured Codebook Search Algorithm for Grayscale Image Compression," Funamenta Informaticae, Vol. 70, No. 3, PP. 251~260, 2006-02. (SCIE) -
Chang, C. C., Lin, C. Y., Chou, H. C., "Perfect Hashing Schemes for Mining Traversal Patterns," Fundamenta Informaticae, Vol. 70, No. 3, PP. 185~202, 2006-02. (SCIE) -
Chang, Y. F. and Chang, C. C., "Efficient Multi-proxy Multi-signature Schemes Based on DLP," International Journal of Computer Science and Network Securi, Vol. 26, No. 2B, PP. 152~159, 2006-02. -
Chang, C. C. and Lai, Y. P., "A Parallel Residue-to-Binary Conversion Algorithm Without Trial Division," Computers & Electrical Engineering, Vol.32, No. 6, PP. 454~467, 2006-02. (SCIE,EI) -
Chang, C. C. and Lee, J. S., "An Anonymous Voting Mechanism Based on the Key Exchange Protocol," Computers and Security, 25, PP. 307~314, 2006-02. (SCIE,EI) -
Chang, C. C. and Lai, Y. P., "A Division Algorithm for Residue Numbers," Applied Mathematics and Computation, Vol. 172, No. 1, PP. 368~378, 2006-01. (SCIE) -
Chang, C. C., Wu, C. C. and Lin, I. C., "A Secure E-coupon System for Mobile Users," International Journal of Computer Science and Network Securi, Vol. 6, No. 1, PP. 273~278, 2006-01. -
Chang, C. C. and Lin, I. C., "A New Solution for Assigning Cryptographic Keys to Control Access in Mobile Agent Environments," Wireless Communications and Mobile Computing, Vol. 6, No. 1, PP. 137~146, 2006-01. -
Lin, K. C. and Chang, C. C., "Securing Mobile Ad Hoc Networks - Intrusion Prevention and Detection Systems," Communications of the Chinese Cryptology and Information Security Association, Vol. 12, No. 1, 2006, pp. 58-75, 2006-01. (EI) -
Chen, C. Y., Chang, C. C. and Hsueh, C. C., "A Fast Modular Multiplication Algorithm Based on the Window Metho," Journal of I-Shou University, Vol. 12, pp. 35-52, 2006-01. (.) -
Yang, J. H., Chang, C. C., and Wang, C. H., "An Iterative Modular Multiplication Algorithm in RNS," Applied Mathematics and Computation, Vol. 171, No. 1, PP. 637~645, 2005-12. (SCIE) -
Chang, C. C. and Chang Y. F., "Schemes for Digital Gift Certificates with Low Computation Complexity," Informatica, Vol. 16, No. 4, PP. 503~518, 2005-12. (SCIE,EI) -
Chang, C. C., Tai, W. L., and Lin, C. C., "Hiding a Secret Color Image in Two Color Images," Imaging Science Journal, Vol. 53, No. 4, PP. 229~240, 2005-12. (SCIE) -
Tsai, P. Y., Hu, Y. C. and Chang, C. C., "A Secure and Authentic Electronic Patient Records Transmission Scheme Based on Two-Based Number Conversion," Imaging Science Journal, Vol. 53, No. 4, PP. 199~208, 2005-12. (SCIE) -
Chang, C. C., Chou, Y. C., Yu, Y. H. and Shih, K. J., "An Image Zooming Technique Based on Vector Quantization Approximation," Image and Vision Computing, Vol. 23, No. 13, PP. 1214~1225, 2005-11. (SCIE,EI) -
Chang, C. C. and Lee, J. S., "On the Design Weakness of Chen-Huang Dynamic Access Control Mechanism," Int. Journal of Computer Science and Network Security, Vol. 5, No. 10, PP. 79~83, 2005-11. -
Chang, C. C. and Lin, I. C., "A Fast Search Algorithm for Vector Quantization without Extra Look-up Table Using Declustered Sub-codebooks," IEE Proceedings-Vision, Image and Signal Processing, Vol. 152, No. 5, PP. 513~519, 2005-10. (EI) -