Chin-Chen Chang

Chair Professor

Professor Chang has worked on many different topics in information security, cryptography, multimedia image processing and published several hundreds of papers in international conferences and journals and over 37 books. He was cited over 47,383 times and has an h-factor of 99 according to Google Scholar. Several well-known concepts and algorithms were adopted in textbooks. He also worked with the National Science Council, Ministry of Technology, Ministry of Education, Ministry of Transportation, Ministry of Economic Affairs and other Government agencies on more than 100 projects and holds 33 patents, including one in US and sixteen in China. He served as Honorary Professor, Consulting Professor, Distinguished Professor, Guest Professor at over 60 academic institutions and received Distinguished Alumni Award's from his Alma Master's. He also served as Editor or Chair of several international journals and conferences and had given almost a thousand invited talks at institutions including Chinese Academy of Sciences, Academia Sinica, Tokyo University, Kyoto University, National University of Singapore, Nanyang Technological University, The University of Hong Kong, National Taiwan University and Peking University. Professor Chang has mentored 7 postdoctoral, 66 PhD students and 202 master students, most of whom hold academic positions at major national or international universities. He has been the Editor-in-Chief of Information Education, a magazine that aims at providing educational materials for middle-school teachers in computer science. He is a leader in the field of information security of Taiwan. He founded the Chinese Cryptography and Information Security Association, accelerating information security the application and development and consulting on the government policy. He is also the recipient of several awards, including the Top Citation Award from Pattern Recognition Letters, Outstanding Scholar Award from Journal of Systems and Software, and Ten Outstanding Young Men Award of Taiwan. He was elected as a Fellow of IEEE in 1998, a Fellow of IET in 2000, a Fellow of CS in 2020, an AAIA Fellow in 2021, a Member of the Academy of Europe (AE) in 2022, and a Member of the European Academy of Sciences and Arts (EASA) in the same year for his contribution in the area of information security. In 2023, he was awarded the Honorary Ph.D. Degree in Engineering, National Chung Cheng University, Taiwan.


Education:

  • 1980, 09 - 1982, 06, Ph.D., Institute of Computer Engineering, National Chiao Tung University, Taiwan
  • 1977, 09 - 1979, 06, MS, Institute of Computer and Decision Sciences, National Tsing Hua University, Taiwan
  • 1973, 09 - 1977, 06, BS, Department of Applied Mathematics, National Tsing Hua University, Taiwan

Research Interest:

  • Database Design
  • E-Business Security
  • Electronic Imaging Techniques
  • Computer Cryptography
  • Image and Signal Processing
  • Information Forensics and Security
  • Deep Learning

Current Position:

  • 2005, 02 - present, Ho Yi-Wu Chair Professor, Feng Chia University, Taiwan
  • 2005, 02 - present, Honorary Professor and Joint Appointment Professor, National Chung Cheng University, Taiwan
  • 2002, 08 - present, Joint Appointment Professor, National Tsing Hua University, Taiwan

Full time experience:

  • 2003, 01 - 2005, 01, Chair Professor, National Chung Cheng University, Taiwan
  • 1998, 07 - 2000, 06, Director of Advisory Office, Ministry of Education, Taiwan
  • 1996, 09 - 1997, 10, Acting President, National Chung Cheng University, Taiwan
  • 1995, 08 - 1997, 10, Provost and Director of Common Section, National Chung Cheng University, Taiwan
  • 1992, 08 - 1995, 07, Dean of College of Engineering, National Chung Cheng University, Taiwan
  • 1990, 08 - 1992, 07 and 1993, 08 - 1995, 07, Director of Automation Research Center of College of Engineering, National Chung Cheng University, Taiwan
  • 1989, 08 - 2005, 01, Professor of Institute of Computer Science and Information Engineering, National Chung Cheng University, Taiwan
  • 1989, 08 - 1992, 07, Professor and Director of Institute of Computer Science and Information Engineering, National Chung Cheng University, Taiwan
  • 1989, 08 - 1990, 01, Acting Director of Computer Center, National Chung Cheng University, Taiwan
  • 1985, 08 - 1989, 07, Professor of Institute of Applied Mathematics, National Chung Hsing University, Taiwan
  • 1983, 08 - 1985, 07, Associate Professor of Institute of Applied Mathematics, National Chung Hsing University, Taiwan
  • 1982, 08 - 1983, 07, Associate Professor of Institute of Computer Engineering, National Chiao Tung University, Taiwan
  • 1980, 08 - 1982, 07, Lecturer of Institute of Computer Engineering, National Chiao Tung University, Taiwan
  • 1980, 02 - 1980, 07, Lecturer of Institute of Applied Mathematics, National Chung Hsing University, Taiwan
  • 1979, 06 - 1980, 01, System Consulting Engineer, Institute for Information Industry, Taiwan
  • 1978, 12 - 1979, 05, System Engineer, Hewlett-Packard Computer Company, Taiwan

Part time experience:

  • 2018, 08 - present, Honorary Chair Professor, Chaoyang University of Science and Technology, Taiwan
  • 2018, 04 - present, Chair Professor, National Quemoy University, Quemoy
  • 2016, 11 - present, Honorary Professor, National Dong Hwa University, Taiwan
  • 2010, 08 - present, Adjunct Chair Professor, China Medical University, Taiwan
  • 2009, 02 - present, Adjunct Chair Professor, National Chung Hsing University, Taiwan
  • 2007, 08 - present, Adjunct Chair Professor, Asia University, Taiwan
  • 2006, 02 - present, Honorary Chair Professor, Tunghai University, Taiwan
  • 2002, 08 - 2005, 07, Adjunct Chair Professor, Providence University, Taiwan
  • 1997, 08 - 1998, 07, Adjunct Chair Professor, Chaoyang University of Science and Technology, Taiwan
  • 1987, 08 - 1989, 07, Adjunct Professor of Department of Information Science, Tunghai University, Taiwan
  • 1986, 08 - 1987, 07, Adjunct Professor of Department of Statistics, Tunghai University, Taiwan
  1. Chang, C. C., Xu, S., Liu, J. C. and Chang, C. C., "A Crypto-attacking Scheme for a (t, n)-threshold Image Encryption Method," Accepted byJournal of Internet Technology, ., 2024-03. (SCIE)
  2. Yang, J., Cai, X., Liu, Y., Chen, M. and Chang, C. C., "Taking LM as the Brain: A Novel Approach Intergrating Language Model and Generative Agent for Intelligent Decision Systems," Accepted byInternational Journal of Network Security, ., 2024-02. (EI)
  3. Ye, W.*, Cai, Y., Liu, Y. and Chang, C. C., "Joint Learning of Fuzzy Clustering and Spectral Clustering with Anchor Graph," Accepted byMultimedia Tools and Applications, ., 2024-01. (SCIE)
  4. Liu, J. C., Chi, H., Chang, C. C. and Chang, C. C., "An Innovative Information Hiding Scheme based on Block-wise Pixel Reordering," Accepted byFuture Internet, ., 2024-01. (SCIE)
  5. Yao, Y., Zhang, Y., Lin, C. C. and Chang, C. C., "Dual-image Reversible Data Hiding based on Sudoku Block Mapping and Adaptive Embedding," Accepted byJournal of Internet Technology, ., 2024-01. (SCIE)
  6. Lin, I. C., Kuo, Y. H., Chang, C. C., Liu, J. C. and Chang, C. C., "Symmetry in Blockchain-powered Secure Decentralized Data Storage: Mitigating Risks and Ensuring Confidentiality," Accepted bySymmetry, ., 2024-01. (SCIE)
  7. Gao, K., Chang, C. C., and Horng, J. H.*, "Covert Communication with Pixel-Shuffling for Fully Encrypted Images in Cloud Applications," Accepted byDisplays, ., 2023-12. (SCIE)
  8. Lin, Y., Lin, C. C., Liu, J. and Chang, C. C.*, "Verifiable (t,n) Secrect Image Sharing Scheme based on Slim Turtle Shell Matrix," Accepted byJournal of Information Security and Applications, ., 2023-12. (SCIE)
  9. Huang, Z., Wang F., Chang, C. C. and Chen, X., "A New Authentication Scheme for Dynamic Charging System of Electric Vehicles in Fog Environment," Accepted bySecurity and Privacy, ., 2023-12. (SCIE)
  10. Lyu, H., Li, J.*, Ye. Y. and Chang, C. C., "A Ranking Information based Network for Facial Beauty Prediction," Accepted byIEICE Transactions on Information and Systems, ., 2023-12. (SCIE)
  11. Liu, J., Chang, C. C., Lin, Y., Chang, C. C. and Horng, J. H., "A Matrix Coding Oriented Reversible Data Hiding Scheme Using Dual Digital Images," Accepted byMathematics, ., 2023-12. (SCIE)
  12. Guo, C., Chen, C. H., Hwang, F. J.*, Chang, C. C. and Chang, C. C., "Multi-View Spatiotemporal Learning for Traffic Forecasting," Accepted byInformation Sciences, ., 2023-11. (SCIE)
  13. Chen, C., Han, D. and Chang, C. C., "MPCCT: Multimodal vision-language learning paradigm with context-based compact Transformer," Pattern Recognition, Vol. 147, pp. 110084, 2023-11. (SCIE)
  14. Tian, H.*, Ye, W., Wang, J, Quan, H. and Chang, C. C., "Certificateless Public Auditing for Cloud-based Medical Data in Healthcare Industry 4.0," Accepted byInternational Journal of Intelligent Systems, ., 2023-11. (SCIE)
  15. Fang, H., Chen, C. H., Hwang, F. J., Chang, C. C. and Chang, C. C., "Metro Station Functional Clustering and Dual-View Recurrent Graph Convolutional Network for Metro Passenger Flow Prediction," Accepted byExpert Systems with Applications, ., 2023-11. (SCIE)
  16. Chang, C. C., Liu, J. and Gao, K., "Cryptanalysis of Iterative Encryption and Image Sharing Scheme Based on the VQ Attack," Accepted byJournal of Visual Communication and Image Representation, ., 2023-11. (SCIE)
  17. Su, G. D., Chang, C. C., Lin, C. C.* and Chang, C. C., "Towards Properties-Preserving JPEG Bitstream Encryption with Structured Permutation and Adaptive Group Differentiation," Accepted byThe Visual Computer, ., 2023-11. (SCIE)
  18. Gao, K., Horng, J. H. and Chang, C. C., "Reversible Data Hiding for Encrypted 3D Mesh Models with Secret Sharing over Galois Field," Accepted byIEEE Transactions on Multimedia, ., 2023-11. (SCIE)
  19. Lin, J. Y., Chang, C. C. and Horng, J. H., "Crypto-space Image Steganography based on Blind Flipping," Accepted byJournal of Information Security and Applications, ., 2023-11. (SCIE)
  20. Gan, Q. W., Yau, W. C., Gan, Y. S., Salam, I., Guo, S.*, Chang, C. C., Wu, Y. and Zhou, L., "DSteganoM: Deep Steganography for Motion Capture Data," Accepted byExpert Systems with Applications, ., 2023-10. (SCIE)
  21. Chi, H., Lin, C. C. and Chang, C. C., "Data Hiding Methods using Voting Strategy and Mapping Table," Accepted byJournal of Internet Technology, ., 2023-10. (SCIE)
  22. Liu, J. C., Chang, C. C., Chang, C. C.* and Xu, S., "High-Capacity Imperceptible Data Hiding Using Permutation-Based Embedding Process for IoT Security," Accepted byElectronics, ., 2023-10. (SCIE)
  23. Xie, X., Lin, C. C. and Chang, C. C., "Reversible Data Hiding Based on Bidirectional Generalized Integer Transform," Smart Innovation, Systems and Technologies, 。, 2023-10. (EI)
  24. Xu, S., Chang, C. C. and Horng, J. H., "Image Covert Communication with Block Regulation," Accepted byIEEE Signal Processing Letters, ., 2023-09. (SCIE)
  25. Sun, C., Tian, H., Mazurczyk, W., Chang, C. C., Quan, H. and Chen, Y., "Steganalysis of Adaptive Multi-rate Speech with Unknown Embedding Rates Using Clustering and Ensemble Learning," Accepted byComputers and Electrical Engineering, ., 2023-07. (SCIE)
  26. Xu, S., Chang, C. C. and Horng, J. H.*, "A Steganography Based on Optimal Multi-Threshold Block Labeling," Computer Systems Science and Engineering, Vol. 44, No. 1, pp. 721-739, 2023-06. (SCIE)
  27. Huang, J., Luo, T., Li, L.*, Yang, G., Xu, H. and Chang, C. C., "ARWGAN: Attention-Guided Robust Image Watermarking Model Based on GAN," IEEE Transactions on Instrumentation & Measurement, Vol. 72, pp. 5018417, 2023-06. (SCIE)
  28. Ye, W.*, Tan, R., Liu, Y. and Chang, C. C, "The Comparison of Attention Mechanisms with Different Embedding Modes for Performance Improvement of Fine-grained Classification," IEICE Transactions on Information and Systems, Vol. 106, No. 5, pp. 590-600, 2023-05. (SCIE)
  29. Li, H., Han, D.*, Chen, C., Chang, C. C., Li, K. C. and Li, D., "A Visual Question Answering Network Merging High- and Low-Level Semantic Information," IEICE Transactions on Information and Systems, Vol. 106, No. 5, pp. 581-589, 2023-05. (SCIE)
  30. Chen, Y., Ye, W.*, Liu, Y. and Chang, C. C., "The High-Performance Design of a General Spiking Convolution Computation Unit for Supporting Neuromorphic Hardware Acceleration," IEEE Transactions on Circuits and Systems II-Express Briefs, ., 2023-04. (SCIE)
  31. Qiu, Y., Tian, H.*, Li, H., Chang, C. C. and Vasilakos, A. V., "Separable Convolution Network with Dual-Stream Pyramid Enhanced Strategy for Speech Steganalysis," Accepted byIEEE Transactions on Information Forensics and Security, ., 2023-04. (SCIE)
  32. Liu, L., Li, J., Wu, Y., Chang, C. C. and Wang, A., "High-imperceptibility Data Hiding Scheme for JPEG Images based on Direction Modification," Computer Systems Science and Engineering, Vol. 47, No. 2, pp. 1415-1432, 2023-04. (SCIE)
  33. Su, G. D., Chang, C. C. and Lin, C. C.*, "An Effective Compressed Image Authentication Scheme Based on N-Variant AMBTC," Accepted byMultimedia Tools and Applications, ., 2023-04. (SCIE)
  34. Tian, H.*, Peng, F., Quan, H. and Chang, C. C., "Identity-Based Public Auditing for Cloud Storage of Internet-of-Vehicles Data," Accepted byACM Transactions on Internet Technology, Vol. 22, No. 4, pp. 88:1-24, 2023-03. (SCIE)
  35. Wang, X., Liu, J. C. and Chang, C. C.*, "A Novel Rerversible Data Hiding Scheme for VQ Codebooks," Accepted bySecurity and Privacy, ., 2023-03. (SCIE)
  36. Feng, Q., Leng, L.*, Chang, C. C., Horng, J. H. and Wu, M., "Reversible Data Hiding in Encrypted Images with Extended Parametric Binary Tree Labeling," Accepted byApplied Science, ., 2023-02. (SCIE)
  37. Gao, K., Chang, C. C.* and Lin, C. C.*, "Multiple Perspective of Multipredictor Mechanism and Multihistogram Modification for High-Fidelity Reversible Data Hiding," Accepted byComputer Systems Science and Engineering, ., 2023-02. (SCIE)
  38. Ye, W., Mou, Z., Li, Q., Liu, Y.* and Chang, C. C., "The Speech Recognition of Post-stroke Dysarthria by Combining Spectrograms and CNN Network," Accepted byJournal of Medical Imaging and Health Informatics, ., 2023-02. (SCIE)
  39. Chang, Y. C. and Chang, C. C., "Signal Decomposition by Differential Evolution," Accepted bySensors, ., 2023-01. (SCIE)
  40. Gao, K., Chang, C. C.* and Lin, C. C.*, "Cryptanalysis of Reversible Data Hiding in Encrypted Images Based on the VQ Attack," Accepted bySymmetry, ., 2023-01. (SCIE)
  41. Lee, C. H., Sun, K. S., Horng, J. W.* and Chang, C. C.*, "A Novel CDMA-based Secret Message Multiplexing Scheme by Image Data Hiding," Accepted byMathematics, ., 2023-01. (SCIE)
  42. Kang, H., Leng, L.* and Chang, C. C., "Overlapped (7.4) Hamming Code for Large-capacity and Low-loss Data Hiding," Multimedia Tools and Applications, ., 2023-01. (SCIE)
  43. Chen, C., Han, D.* and Chang, C. C., "CAAN: Context-Aware Attention Network for Visual Question Answering," Pattern Recognition, Vol. 132, pp. 108980, 2022-12. (SCIE)
  44. Lin, I. C., Chang, C. C.* and Chiang, H. C., "A Novel e-Cash Payment System with Divisibility Based on Proxy Blind Signature in Web of Things," IEICE Transactions on Information and Systems, Vol. E105-D, No. 12, pp. 2092-2103, 2022-12. (SCIE)
  45. Tian, H.*, Wu, J., Quan, H. and Chang, C. C., "Detecting Multiple Steganography Methods in Speech Streams Using Multi-Encoder Network," IEEE Signal Processing Letters, Vol. 29, pp. 2462 - 2466, 2022-12. (SCIE)
  46. Ye, W., Lao, J., Liu, Y.*, Chang, C. C.*, Zhang, Z., Li, H. and Zhou, H., "Pine Pest Detection using Remote Sensing Satellite Images Combined with a Multi-scale Attention-UNet Model," Ecological Informatics, Vol. 72, pp. 101906, 2022-12. (SCIE)
  47. Xu, S., Horng, J. H.*, Chang, C. C. and Chang, C. C., "Reversible Data Hiding with Hierarchical Block Variable Length Coding for Cloud Security," IEEE Transactions on Dependable and Secure Computing, ., 2022-11. (SCIE)
  48. Guo, C., Chen, C.-H.*, Hwang, F.-J., Chang, C. C. and Chang, C. C., "Fast Spatiotemporal Learning Framework for Traffic Flow Forecasting," IEEE Transactions on Intelligent Transportation Systems, ., 2022-11. (SCIE)
  49. Liu, H., Wu, A., Wei, M. and Chang, C. C., "SKDStream: A Dynamic Clustering Algorithm on Time-Decaying Data Stream," EURASIP Journal on Wireless Communications and Networking, Vol. 2022, Article number: 102, 2022-10. (SCIE)
  50. Cao, C., Chen, C. H.*, Chang, C. C., Hwang, F. J. and Chang, C. C., "De-Correlation Neural Network for Synchronous Implementation of Estimation and Secrecy," IEEE Communications Letters, Vol. 27, No. 1, pp. 165-169, 2022-10. (SCIE)
  51. Chi, H., Horng, J. H., Chang, C. C.* and Li, Y. H, "Embedding Biometric Information in Interpolated Medical Images with A Reversible and Adaptive Strategy," Sensors, Vol. 22, No. 20, pp. 7942, 2022-10. (SCIE)
  52. Chi, H., Chang, C. C.*, Wang, X. and Lin, C. C.*, "Hiding and Extracting Important Information in Encrypted Images by Using the Transformation of All Possible Permutations and VQ Codebook," Electronics, Vol. 11, No. 21, pp. 3475, 2022-10. (SCIE)
  53. Lv, X., Han, D.*, Li, D.*, Xiao, L. and Chang, C. C., "Network Abnormal Traffic Detection Method based on Fusion of Chord Similarity and Multiple Loss Encoder," EURASIP Journal on Wireless Communications and Networking, Vol. 2022, No. 0, pp. Article number: 105, 2022-10. (SCIE)
  54. Chen, S. and Chang, C. C.*, "Reversible Data Hiding in Encrypted Images Using Block-based Adaptive MSB Prediction," Journal of Information Security and Applications, Vol. 69, pp. 103297, 2022-09. (SCIE)
  55. Sun, C., Tian, H.*, Mazurczyk, W., Chang, C. C., Cai, Y. and Chen, Y., "Towards Blind Detection of Steganography in Low‐Bit‐Rate Speech Streams," International Journal of Intelligent Systems, Vol. 37, No. 12, pp. 12085-12112, 2022-09. (SCIE)
  56. Mei, X., Han, D.*, Saeed, N., Wu, H., Chang, C. C., Han, B., Ma, T. and Xian, J., "Trajectory Optimization of Autonomous Surface Vehicles with Outliers for Underwater Target Localization," Remote Sensing, Vol. 14, No. 17, pp. 4343, 2022-09. (SCIE)
  57. Zhai, M., Han, D., Chang, C. C. and Sun, Z., "A Consortium Blockchain-based Information Management System for Unmanned Vehicle Logistics," Computer Science and Information Systems, Vol. 19, No. 2, pp. 935-955, 2022-09. (SCIE)
  58. Chen, Y., Han, D., Cui, M., Wu, Z. and Chang, C. C., "ABOS: An Attention-Based One-Stage Framework for Person Search," EURASIP Journal on Wireless Communications and Networking, Vol. 2022, Article number: 75, 2022-09. (SCIE)
  59. Bai, R., Li, L.*, Zhang, S., Lu, J. and Chang, C. C., "SSDeN: Framework for Screen-Shooting Resilient Watermarking via Deep Networks in the Frequency Domain," Applied Sciences, Vol. 12, No. 19, pp. 9780, 2022-09. (SCIE)
  60. Zhang, T., Hou, T., Weng, S.*, Zou, F., Zhang, H. and Chang, C. C., "Adaptive Reversible Data Hiding with Contrast Enhancement based on Multi-histogram Modification," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 32, No. 8, pp. 5041-5054, 2022-08. (SCIE)
  61. Qiu, Y., Tian, H.*, Tang, L., Mazurczyk, W. and Chang, C. C., "Steganalysis of Adaptive Multi-rate Speech Streams with Distributed Representations of Codewords," Journal of Information Security and Applications, Vol. 68, pp. 103250, 2022-08. (SCIE)
  62. Wang, X., Chang, C. C., Lin, C. C. and Chang, C. C., "On the Multi-Level Embedding of Crypto-Image Reversible Data Hiding," Journal of Visual Communication and Image Representation, Vol. 87, pp. 103556, 2022-08. (SCIE)
  63. Ji, Z., Song, X., Feng, B., Wang, H., Chen, C. H. and Chang, C. C., "RSG-Net: A Recurrent Similarity Network with Ghost Convolution for Wheelset Laser Stripe Image Inpainting," IEEE Transactions on Intelligent Transportation Systems, ., 2022-05. (SCIE)
  64. Qin, C., Jiang, C., Mo, Q., Yan, H.* and Chang, C. C., "Reversible Data Hiding in Encrypted Image via Secret Sharing Based on GF(p) and GF(2^8)," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 32, No. 4, pp. 1928-2941, 2022-04. (SCIE)
  65. Shen, X, Han, D., Chang, C. C. and ZHong, L., "Dual Self-guided Attention with Sparse Question Networks for Visual Question Answering," IEICE Transactions on Information and Systems, Vol. E105-D, No.4, pp.785-796, 2022-04. (SCIE)
  66. Li, M., Han, D., Li, D., Liu, H. and Chang, C. C., "MFVT: An Anomaly Traffic Detection Method Merging Feature Fusion Network and Vision Transformer Architecture," EURASIP Journal on Wireless Communications and Networking, Vol. 2022, No. 2022, pp. 39, 2022-04. (SCIE)
  67. Sun, Z., Han, D., Li, D.*, Wang, X., Chang, C. C. and Wu, Z., "A Blockchain-based Secure Storage Scheme for Medical Information," EURASIP Journal on Wireless Communications and Networking, Vol. 40, pp. 1-25, 2022-04. (SCIE)
  68. Chen, S. and Chang, C. C.*, "Privacy-Preserving Data Hiding with Robustness based on Selective Encryption and Matrix Embedding," Multimedia Tools and Applications, Vol. 81, No. 23, pp. 33397–33417, 2022-04. (SCIE)
  69. Lin, J., Chang, C. C. and Horng, J. H., "Asymmetric Orientation Combination for Reversible and Authenticable Data Hiding of Dual Stego-images," Symmetry, Vol. 14, No. 4, pp. 819, 2022-04. (SCIE)
  70. Gao, K, Horng, J. H.* and Chang, C. C., "High-capacity Reversible Data Hiding in Encrypted Images Based on Adaptive Block Encoding," Journal of Visual Communication and Image Representation, Vol. 84, pp. 103481, 2022-04. (SCIE)
  71. Ye, W., Zeng, Q., Peng, Y., Liu, Y.* and Chang, C. C., "A Two-stage Detection Method for Copy-move Forgery based on Parallel Feature Fusion," EURASIP Journal on Wireless Communications and Networking, Vol. 2022, No. 1, pp. 30, 2022-04. (SCIE)
  72. Lin, J. Y., Horng, J. H. and Chang, C. C.*, "A Reversible and Authenticable Secret Sharing Scheme Using Dual Images," Multimedia Tools and Applications, Vol. 81, No. 13, pp. 17527-17545, 2022-03. (SCIE)
  73. Nguyen, T. S.*, Chang, C. C. and Lin, C. C., "High Capacity Reversible Data Hiding Scheme based on AMBTC for Encrypted Images," Journal of Internet Technology, Vol. 23, No. 2, pp. 255-266, 2022-03. (SCIE,EI)
  74. Putri, W. R., Liu, S. H., Aslam, M. S., Li, Y. H., Chang, C. C.* and Wang, J., "Self-Supervised Learning Framework Toward State-of-the-Art Iris Image Segmentation," Sensors, Vol. 22, No. 6, pp. 2133, 2022-03. (SCIE)
  75. Zhao, L., Li, J., Li, J.*, Wu, Y. Cheng, S., Tang, Z., Hui, G. and Chang, C. C., "Learning Stereo Disparity with Feature Consistency and Confidence," International Journal of Ad Hoc and Ubiquitous Computing, Vol. 39, Nos. 1-2, pp. 83-92, 2022-02. (EI)
  76. Yang, Z., Chang, H., Chang, C. C., Huang, Y. and Chang, C. C., "Real-Time Steganalysis for Streaming Media Based on Multi-Channel Convolutional Sliding Windows," Knowledge-Based Systems, Vol. 237, pp. 107561, 2022-02. (SCIE)
  77. Li, X. W., Han, D. Z.* and Chang, C. C., "Pre-training Model Based on Parallel Cross-Modality Fusion Layer," Plos One, Vol. 17, No. 2, pp. e0260784, 2022-02. (SCIE)
  78. Horng, J. H., Chen, S.* and Chang, C. C.*, "A (k,n)-Threshold Secret Image Sharing Scheme Based on Non-Full Rank Linear Model," Mathematics, Vol. 10, No. 3,. pp. 524, 2022-02. (SCIE)
  79. Chang, C. C.*, Su, G. D., Lin, C. C.* and Li, Y. H., "Position-Aware Guided Hiding Data Scheme with Reversibility and Adaptivity for Dual Images," Symmetry, Vol. 14, No. 3, pp 509, 2022-02. (SCIE)
  80. Lee, W. K., Chen, L.*, Chang, C. C. and Yao, Z., "Post-quantum Blockchain for Secure Communication in IoT based Smart Home Services," International Journal of Embedded Systems, Vol. 14, No. 5, pp. 509-524, 2022-01. (EI)
  81. Ye, W., Zhu, X., Xu, Z., Liu, Y. and Chang, C. C., "A Comprehensive Framework of Multiple Semantics Preservation in Neural Style Transfer," Journal of Visual Communication and Image Representation, Vol. 82, pp. 103378, 2022-01. (SCIE)
  82. Lin, I. C., Chang, C. C.* and Chang, Y. S., "Data Security and Preservation Mechanisms for Industrial Control Network using IOTA," Symmetry, Vol. 14, No. 2, pp. 237, 2022-01. (SCIE)
  83. Wang, X., Chang, C. C., Lin, C. C.* and Chang, C. C., "Reversal of Pixel Rotation: A Reversible Data Hiding System towards Cybersecurity in Encrypted Images," Journal of Visual Communication and Image Representation, Vol. 82, pp. 103421, 2022-01. (SCIE)
  84. Lin, C. C.*, Chang, C. C.*, Kao, W. J. and Chang, J. F., "Efficient Electronic Patient Information Hiding Scheme with Tamper Detection Function for Medical Images," IEEE Access, Vol. 10, pp. 18470-18485, 2022-01. (SCIE)
  85. Cai, S., Han, D., Yin, X., Li, D. and Chang, C. C., "A Hybrid Parallel Deep Learning Model for Efficient Intrusion Detection Based On Metric Learning," Connection Science, Vol. 34, No. 1, pp. 551-577, 2022-01. (SCIE)
  86. Lin, W., Zhu, X., Ye, W.*, Chang, C. C.*, Liu, Y. and Liu, C., "An Improved Image Steganography Framework based on Y Channel Information for Neural Style Transfer," Security and Communication Networks, Vol. 2022, Article ID 2641615, 2022-01. (SCIE)
  87. Xie, X. Z. and Chang, C. C.*, "Hiding Data in Dual Images Based on Turtle Shell Matrix with High Embedding Capacity and Reversibility," Multimedia Tools and Applications, Vol. 80, No. 30, pp. 36567–36584, 2021-12. (SCIE)
  88. Zhang, S., Su, S., Li, L., Lu, J., Zhou, Q. and Chang, C. C., "CSST-Net: An Arbitrary Image Style Transfer Network of Coverless Steganography," The Visual Computer, ., 2021-12. (SCIE)
  89. Lin, J., Chang, C. C. and Horng, J. H., "Asymmetric Data Hiding for Compressed Images with High Payload and Reversibility," Symmetry, Vol. 13. No. 12, pp. 2355, 2021-12. (SCIE)
  90. Xie, X., Chang, C. C.* and Horng, J. H.*, "An EMD-based Data Hiding Scheme for JPEG Images," Connection Science, Vol. 33, No. 3, pp. 515-531, 2021-11. (SCIE)
  91. Lin, J. Y., Horng, J. H.* and Chang, C. C., "A Novel (2, 3)-Threshold Reversible Secret Image Sharing Scheme Based on Optimized Crystal-Lattice Matrix," Symmetry, Vol. 13, No. 11, pp. 2063, 2021-11. (SCIE)
  92. Lin, C. C.*, Nguyen, T. S. and Chang, C. C., "LRW-CRDB: Lossless Robust Watermarking Scheme for Categorical Relational Databases," Symmetry, Vol. 13, No. 11, pp. 2191, 2021-11. (SCIE)
  93. Lin, C. C.*, Nguyen, T. S., Chang, C. C. and Chang, W. C., "Efficient Reversible Data Hiding Scheme for AMBTC-Compressed Images," Applied Sciences, Vol. 11, No. 15, pp. 6741, 2021-11. (SCIE)
  94. Chi, H., Chang, C. C.* and Liu, Y., "An SMVQ Compressed Data Hiding Scheme Based on Multiple Linear Regression Prediction," Connection Science, Vol. 33, No. 3, pp. 495-514, 2021-10. (SCIE)
  95. Chang, C. C., Wang, X. and Lin, C. C., "An Efficient Dual Prediction-based Reversible Data Hiding and Reduced Code Method for AMBTC," Multimedia Tools and Applications, Vol. 80, No. 24, pp. 33157–33176, 2021-10. (SCIE)
  96. Chen, S., Chang, C. C.* and Lin, C. C., "Reversible Data Hiding in Encrypted Images Based on Homomorphism and Block-based Congruence Transformation," Multimedia Tools and Applications, Vol. 80, Nos. 21-23, pp. 33115–33138, 2021-10. (SCIE)
  97. Zhang, X., Han, D.* and Chang, C. C., "RDMMFET: Representation of Dense Multi-Modality Fusion Encoder Based on Transformer," Mobile Information Systems, Special Issue on Machine Learning, Vol. 2021, Article ID 2662064, 2021-10. (SCIE)
  98. Xia, T. T., Lin, J., Chang, C. C.* and Lu, T. C., "A Novel Adjustable Reversible Data Hiding Method for AMBTC-Compressed Codes using Hamming Distance," International Journal of Embedded Systems, Vol. 14, No. 4, pp. 313, 2021-09. (EI)
  99. Gao, K., Chang, C. C.* and Liu, Y., "Predicting Missing Data for Data Integrity Based on the Linear Regression Model," International Journal of Embedded Systems, Vol. 14, No. 4, pp. 355-362, 2021-09. (EI)
  100. Horng, J. H., Chang, C. C.* and Sun, K. S., "A Two-Layer Steganography for Mosaic Image," KSII Transactions on Internet and Information Systems, Vol. 15, No. 9, pp. 3298-3321, 2021-09. (SCIE)
  101. Wu, H., Horng, J. H. and Chang, C. C.*, "Adaptive Data Hiding Scheme based on Magic Matrix of Flexible Dimension," KSII Transactions on Internet and Information Systems, Vol. 15, No. 9, pp. 3348-3364, 2021-09. (SCIE)
  102. Li, L., Bai, R., Zhang, S., Chang, C. C.* and Shi, M., "Screen-Shooting Resilient Watermarking Scheme via Learned Invariant Keypoints and QT," Sensors, Vol. 21, No. 19, pp. 6554, 2021-09. (SCIE)
  103. Lee, C. F., Chang, C. C.*, Wang, Z. H. and Di, Y. F., "A High Robust and Blind Image Watermarking Using Arnold Transform Mapping in the DCT Domain of YCbCr Color Space," Journal of Network Intelligence, Vol. 6, No. 3, pp. 624-636, 2021-08. (EI)
  104. Wang, X., Chang, C. C.* and Lin, C. C., "High Capacity Reversible Data Hiding in Encrypted Images Based on Prediction Error and Block Classification," Multimedia Tools and Applications, Vol. 80, No. 19, pp. 29915–29937, 2021-08. (SCIE)
  105. Chang, C. C., Chang, J. F., Kao, W. J. and Horng, J. H., "Two-Layer Reversible Data Hiding for VQ-Compressed Images Based on De-Clustering and Indicator-Free Search-Order Coding," Future Internet, Vol. 13, No. 8, pp. 215, 2021-08. (SCIE)
  106. Tian, H., Li, X., Quan, H., Chang, C. C. and Thar, B., "A Lightweight Attribute -based Access Control Scheme for Intelligent Transportation System with Full Privacy Protection," IEEE Sensors Journal, Vol. 21, No. 14, pp. 15793-15806, 2021-07. (SCIE)
  107. Su, G. D., Chang, C. C. and Lin, C. C.*, "Privacy-Preserving Reversible Data Hiding for Medical Images Employing Local Rotation," Journal of Healthcare Engineering, Vol. 2021, Article ID 5709513, 2021-07. (SCIE)
  108. Chi, H., Horng, J W.* and Chang, C. C.*, "Reversible Data Hiding Based on Pixel-Value-Ordering and Prediction-Error Triplet Expansion," Mathematics, Vol. 9, No. 14, pp. 1703, 2021-07. (SCIE)
  109. Li, L., Chang, C. C.* and Lin, C. C.*, "Reversible Data Hiding in Encrypted Image Based on (7, 4) Hamming Code and UnitSmooth Detection," Entropy, Vol. 23, No. 7, pp. 790, 2021-06. (SCIE)
  110. Wang, X., Chang, C. C.*, Lin, C. C. and Chang, C. C., "Privacy-Preserving Reversible Data Hiding Based on Quad-Tree Block encoding and Integer Wavelet Transform," Journal of Visual Communication and Image Representation, Vol. 79, pp. 10320, 2021-06. (SCIE)
  111. Lin, C. C.*, He, S. and Chang, C. C., "Pixel-based Fragile Image Watermarking Based on Absolute Moment Block Truncation Coding," Multimedia Tools and Applications, Vol. 80, No. 19, pp. 29497-29518, 2021-06. (SCIE)
  112. Huang, P., Chang, C. C.*, Li, Y. H. and Liu, Y., "Enhanced (n,n)-threshold QR Code Secret Sharing Scheme Based on Error Correction Mechanism," Journal of Information Security and Applications, Vol. 58. pp. 102719, 2021-05. (SCIE)
  113. Chen, K. M. and Chang, C. C*, "High-Capacity Separable Reversible Data-Hiding Method in Encrypted Images Based on Block-Level Encryption and Huffman Compression Coding," Connection Science, Vol. 33, No. 4, pp. 975-994, 2021-05. (SCIE)
  114. Meng, K., Miao, F.*, Ning, Y., Huang, W., Xiong, Y. and Chang, C. C., "A Proactive Secret Sharing Scheme Based on Chinese Remainder Theorem," Frontiers of Computer Science, Vol. 15, No. 2, pp. 152801, 2021-04. (SCIE)
  115. Xu, S., Horng, J. H.* and Chang, C. C.*, "Reversible Data Hiding Scheme Based on VQ Prediction and Adaptive Parametric Binary Tree Labeling for Encrypted Images," IEEE Access, Vol. 9, No. 1, Apr. 2021, pp. 55191-55204, 2021-04. (SCIE)
  116. Xu, S., Chang, C. C.* and Liu, Y., "A High-Capacity Reversible Data Hiding Scheme for Encrypted Images Employing Vector Quantization Prediction," Multimedia Tools and Applications, Vol. 80, No. 13, pp. 20307–20325, 2021-03. (SCIE)
  117. Chang, C. C, Horng, J. H.*, Shi, C. S. and Wang, X., "VQ-Oriented Data Hiding based on Adjustable Error Compensation Strategy," Connection Science, Vol. 33, No. 4, pp. 835-853, 2021-03. (SCIE)
  118. Chang, C. C., Horng, J. H.* and Gao, W. J., "A Secure Extended LBP Data Hiding Scheme based on Octagon-shaped Shell," International Journal of Embedded Systems, Vol. 14, No. 5, pp. 497-508, 2021-03. (EI)
  119. Qiu, G. H., Lee, C. F. and Chang, C. C.*, "Turtle-shell Data Embedding Method with High Image Fidelity," International Journal of Embedded Systems, Vol. 14, No. 2, pp. 149-159, 2021-03. (EI)
  120. Lin, J. Y., Chen, Y., Chang, C. C.* and Hu, Y. C., "An Efficient Lossless Dual Images Secret Sharing Scheme Using Turtle Shell Reference Matrix," International Journal of Network Security, Vol. 23, No. 2, pp. 195-204, 2021-03. (EI)
  121. Lu, R., Xu, Y., Wu, Z., Zheng, Y., Ren, L., Ding, F., Li, J.* and Chang, C. C.*, "Correction of Slanted Text Pictures Based on Modified Opencv," Journal of Network Intelligence, Vol. 6, No. 2, pp. 238-246, 2021-03. (EI)
  122. Su, G. D., Chang, C. C.* and Chen, C. C., "A Hybrid-Sudoku based Fragile Watermarking Scheme for Image Tampering Detection," Multimedia Tools and Applications, Vol. 80, No. 8, pp. 12881–12903, 2021-03. (SCIE)
  123. Chen, Y., Xu, W., Hong, Z. H., Zhu, M. M., Li, B., Li, J.* and Chang, C. C.*, "Smart Meter Fault Prediction Based on One-dimensional Convolution Neural Network Integrated Model," Journal of Network Intelligence, Vol. 6, No. 2, pp. 178-188, 2021-03. (EI)
  124. Liu, Y., Feng, G., Qin, C., Lu, H. and Chang, C. C.*, "High-capacity Reversible Data Hiding in Encrypted Image Based on Hierarchical Quad-tree Coding and Multi-MSB Prediction," Electronics, Vol. 10, No. 6, pp. 664, 2021-03. (SCIE)
  125. Miao, F., Yu, Y., Meng, K.*, Xiong, Y. and Chang, C. C., "Grouped Secret Sharing Schemes Based on Lagrange Interpolation Polynomials and Chinese Remainder Theorem," Security and Communication Networks, Vol. 2021, Article ID 6678345, 2021-03. (SCIE)
  126. Meng, K., Miao, F.*, Xiong, Y. and Chang, C. C., "A Reversible Extended Secret Image Sharing Scheme Based on Chinese Remainder Theorem," Signal Processing: Image Communication, Vol. 95, pp. 116221, 2021-03. (SCIE)
  127. Gao, K., Horng, J. H.* and Chang, C. C.*, "An Authenticatable (2,3) Secret Sharing Scheme Using Meaningful Share Images Based on Hybrid Fractal Matrix," IEEE Access, Vol. 9, No. 1, pp. 50112-50125, 2021-03. (SCIE)
  128. Xu Wang , Li-Yao Li, Ching-Chun Chang , and Chih-Cheng Chen, "High-Capacity Reversible Data Hiding in Encrypted Images Based on Prediction Error Compression and Block Selection," Security and Communication Networks, Volume 2021, Article ID 9606116, 12 pages, 2021-03. (SCIE)
  129. Liu, L., Wang, L. and Chang, C. C.*, "Separable Reversible Data Hiding in Encrypted Images Based on Flexible Preservation of the Differences," Multimedia Tools and Applications, Vol. 80, No. 5, pp. 6639–6659, 2021-02. (SCIE)
  130. Lu, J.*, Ni, J., Li, L., Luo, T., and Chang, C. C., "A Coverless Information Hiding Method Based on Constructing a Complete Grouped Basis with Unsupervised Learning," Journal of Network Intelligence, Vol. 6, No. 1, pp. 29-39, 2021-02. (EI)
  131. Chen, C. C., Chang, C. C. and Chen, K.*, "High-capacity Reversible Data Hiding in Encrypted Image Based on Huffman Coding and Differences of High Nibbles of Pixels," Journal of Visual Communication and Image Representation, Vol. 76, pp. 103060, 2021-02. (SCIE)
  132. Chen, S. and Chang, C. C, "Reversible Data Hiding Based on Three Shadow Images Using Rhombus Magic Matrix," Journal of Visual Communication and Image Representation, Vol. 76, pp. 103064, 2021-02. (SCIE)
  133. Lin, C. C.*, He, S. L. and Chang, C. C., "Pixel P Air-wise Fragile Image Watermarking based on HC-based Absolute Moment Block Truncation Coding," Electronics, Vol. 10, No. 6, pp. 690, 2021-02. (SCIE)
  134. Wang, X., Chang, C. C. and Lin, C. C.*, "Reversible Data Hiding in Encrypted Images with Block-based Adaptive MSB Encoding," Information Sciences, Vol. 567, pp. 375-394, 2021-02. (SCIE)
  135. Yan, C., Zhang, G.*, Wang, A., Liu, L. and Chang, C. C., "Visible 3D-model Watermarking Algorithm for 3D-Printing Based on Bitmap Fonts," International Journal of Network Security, Vol. 23, No. 1, pp. 172-179, 2021-01. (EI)
  136. Xu, S., Chang, C. C.* and Liu, Y., "A Novel Image Compression Technology Based on Vector Quantization and Linear Regression Prediction," Connection Science, Vol. 33, No. 2, pp. 219-236, 2021-01. (SCIE)
  137. Lin, J., Horng, J. H., Liu, Y. and Chang, C. C.*, "An Anisotropic Reference Matrix for Image Steganography," Journal of Visual Communication and Image Representation, Vol. 74, pp. 102969, 2021-01. (SCIE)
  138. Chen, Y. H., Chang, C. C., Lin, C. C.* and Wang, Z. M., "An Adaptive Reversible Data Hiding Scheme using AMBTC and Quantization Level Difference," Applied Sciences, Vol. 11, No. 2, pp. 635, 2021-01. (SCIE)
  139. Chang, Y. C. and Chang, C. C.*, "Using an Optimization Algorithm to Detect Hidden Waveforms of Signals," Sensors, Vol. 21, No. 2, pp. 588, 2021-01. (SCIE)
  140. Lin, C. C.*, Lin, J. and Chang, C. C., "Reversible Data Hiding for AMBTC Compressed Images Based on Matrix and Hamming Coding," Electronics, Vol. 10, No. 3, pp. 281, 2021-01. (SCIE)
  141. Cui, M., Han, D.*, Wang, J., Li, K. C. and Chang, C. C., "ARFV: An Efficient Shared Data Auditing Scheme Supporting Revocation for Fog-Assisted Vehicular Ad-Hoc Networks," IEEE Transactions on Vehicular Technology, Vol. 69, No. 12, pp. 15815-15827, 2020-12. (SCIE)
  142. Wu, X., Guo, S., Xing, G.*, Liao, M., Chang, C. C. and Chuen, Y., "Information Hiding in Motion Data of Virtual Characters," Expert Systems and Applications, Vol. 159, pp. 113516, 2020-11. (SCIE)
  143. Su, G. D., Chang, C. C., Lin, C. C.* and Yao, Z., "Secure High Capacity Tetris-Based Scheme for Data Hiding," IET Image Processing, Vol. 14, No. 17, pp. 4633-464, 2020-11. (SCIE)
  144. Lin, C. C., Chang, C. C. and Zheng, Y. Z., "A Ring Signature Based Anonymity Authentication Scheme for Group Medical Consultation," Symmetry, Vol. 12, No. 12, pp. 2009, 2020-11. (SCIE)
  145. Horng, J. H., Lin, J., Liu, Y. and Chang, C. C.*, "3D Multilayered Turtle Shell Models for Image Steganography," Computer Modeling in Engineering and Sciences, Vol. 125, No. 2, pp. 879-906, 2020-10. (SCIE)
  146. Qiu, G. H., Lee, C. F. and Chang, C. C.*, "Greedy Algorithm for Image Quality Optimization Based on Turtle-Shell Steganography," International Journal of Computational Science and Engineering, Vol. 23, No. 1, pp. 50-62, 2020-10. (EI)
  147. Chen, Y. Q., Sun, W. J., Li, L. Y., Chang, C. C. and Wang, X., "An Efficient General Data Hiding Scheme Based on Image Interpolation," Journal of Information Security and Applications, Vol. 54, pp. 102584, 2020-10. (SCIE)
  148. Chen, S. and Chang, C. C.*, "Reversible Data Hiding in Encrypted Images Based on Reversible Integer Transformation and Quadtree-based Partition," IEEE Access, Vol. 8, No. 1, pp. 184199-184209, 2020-10. (SCIE)
  149. Lin, C. C.*, Chang, Y. F., Chang, C. C. and Zheng, Y. Z., "A Fair and Secure Reverse Auction for Government Procurement," Sustainability, Vol 12, No. 20, pp. 8567, 2020-10. (SCIE)
  150. Su, G. D., Chang, C. C. and Lin, C. C.*, "Effective Self-recovery and Tampering Localization Fragile Watermarking for Medical Images," IEEE Access, Vol. 8, No. 1, pp. 160840-160857, 2020-09. (SCIE)
  151. Gao, K., Horng, J. H.* and Chang, C. C.*, "A Novel (2, 3) Reversible Secret Image Sharing Based on Fractal Matrix," IEEE Access, Vol. 8, No. 1, pp. 174325-174341, 2020-09. (SCIE)
  152. Wu, H. L., Chang, C. C.*, Zheng, Y. Z., Chen, L. S.* and Chen, C. C., "A Secure IoT-based Authentication Scheme in Cloud Computing Environment," Sensors, Vol. 20, No. 19, pp. 5604, 2020-09. (SCIE)
  153. Wu, H. L., Chang, C. C.* and Chen, L. S., "Secure and Anonymous Authentication Scheme for the Internet of Things with Pairing," Pervasive and Mobile Computing, Vol. 67, pp. 101177, 2020-09. (SCIE)
  154. Liu, Y., Chang, C. C. and Huang, P. C.*, "One-Code-Pass User Authentication Based on QR Code and Secret Sharing," International Journal of Network Security, Vol. 22, No. 5, pp. 752-762, 2020-09. (EI)
  155. Chang, C. C. Su, G. D.*, and Lin, C. C., "An Improved Sudoku-based Data Hiding Scheme Using Greedy Method," International Journal of Computational Science and Engineering, Vol. 23, No. 1, pp. 10-21, 2020-09. (EI)
  156. Xie, X. Z., Chang, C. C.* and Hu, Y. C., "An Adaptive Reversible Data Hiding Scheme Based on Prediction Error Histogram Shifting by Exploiting Signed-Digit Representation," Multimedia Tools and Applications, Vol. 79, No. 33-34, pp. 24329-24346, 2020-08. (SCIE)
  157. Chang, C. C., Lin, C. C.* and Su, G. D., "An Effective Image Self-Recovery based Fragile Watermarking using Self-Adaptive Weight-based Compressed AMBTC," Multimedia Tools and Apllications, Vol. 79, No. 33-34, pp. 24795-24824, 2020-08. (SCIE)
  158. Chen, L., Zhang, N., Sun, H. M., Chang, C. C., Yu, S. and Choo, K. K. R., "Secure Search for Encrypted Personal Health Records from Big Data NoSQL Databases in Cloud," Computing, Vol. 102, No. 6, pp. 1521–1545, 2020-08. (SCIE)
  159. Xia, Z., Liu, Y., Hsu, C. F. and Chang, C. C., "Cryptanalysis and Improvement of A Group Authentication Scheme with Multiple Trials and Multiple Authentications," Security and Communication Networks, Vol. 2020, Article ID 618386, 2020-07. (SCIE)
  160. Li, X., Chen, H., Liu, Y. and Chang, C. C.*, "Unordered Multi-secret Sharing Based on Generalized Chinese Remainder Theorem," Security and Communication Networks, Vol. 2020, No. 0, pp. Article ID 6073721, 2020-07. (SCIE)
  161. Tu, S., Waqas, M., Meng, Y.*, Rehman, S., Ahmed I., Koubaa, A., Halim, Z., Hanif, M., Chang, C. C. and Shi, C., "Mobile Fog Computing Security: A User-Oriented Smart Attack Defense Strategy Based on DQL," Computer Communications, Vol. 160, pp. 790-798, 2020-07. (SCIE)
  162. Chang, C. C., Horng, J. H.*, Shih, C. S. and Chang, C. C., "A Maze Matrix-Based Secret Image Sharing Scheme with Cheater Detection," Sensors, Vol. 20, No. 13, pp. 3802, 2020-07. (SCIE)
  163. Horng, J. H., Chang, C. C. and Li, G. L., "Steganography using Quotient Value Differencing and LSB Substitution for AMBTC Compressed Images," IEEE Access, Vol. 8, No. 1, pp. 129347-129358, 2020-07. (SCIE)
  164. Chang, C. C., Chen, J. Y., Chen, Y. H. and Liu, Y.*, "A Reversible Data Hiding Method for SMVQ Indices Based on Improved Locally Adaptive Coding," International Journal of Network Security, vol. 22, no. 4, pp. 575-583, 2020-07. (EI)
  165. Chen, Y., Lin, J. Y., Chang, C. C.* and Hu, Y. C., "Sharing a Secret Image in the Cloud Using Two Shadows," International Journal of Network Security, Vol. 22, No. 4, pp. 551-560, 2020-07. (EI)
  166. Gao, K., Horng, J. H.*, Liu, Y. and Chang, C. C.*, "A Reversible Secret Image Sharing Scheme Based on Stick Insect Matrix," IEEE Access, Vol. 8, No. 1, pp .130405-130416, 2020-07. (SCIE)
  167. Horng, J. H., Xie, X. Z.* and Chang, C. C., "The Analysis of Stego Image Visual Quality for a Data Hiding Scheme Based on Two-Layer Turtle Shell Matrix," International Journal of Computational Science and Engineering, vol. 23, no. 4, pp. 336-340, 2020-07. (EI)
  168. Lv, M., Zhou, S.*, Chen, G., Chen, L., Liu, J. and Chang, C. C., "On Reliability of Multiprocessor System Based on Star Graph," IEEE Transactions on Reliability, Vol. 69, No. 2, pp. 715-724, 2020-06. (SCIE)
  169. Lin, J. Y., Chen, Y., Chang, C. C.* and Hu, Y. C., "A Novel High Capacity Turtle Shell-based Data Hiding with Location Table Free," International Journal of Computational Science and Engineering, Vol. 22. No. 1, pp. 135-145, 2020-05. (EI)
  170. Horng, J. H., Xu, S.*, Chang, C. C. and Chang, C. C, "An Efficient Data Hiding Scheme Based on Multi-Dimensional Mini-Sudoku," Sensors, Vol. 20, pp. 2739, 2020-05. (SCIE)
  171. Mou, Z.*, Ye, W., Chang, C. C. and Mao, Y., "The Application Analysis of Neural Network Techniques on Lexical Tone Rehabilitation of Mandarin-speaking Patients with Post-stroke Dysarthria," IEEE Access, Vol. 8, No. 1, pp. 90709-90717, 2020-05. (SCIE)
  172. Gao, D. W., Chen, H.* and Chang, C. C., "Plaintext Aware Encryption in the Standard Model under the Linear Diffie-Hellman Knowledge Assumption," International Journal of Computational Science and Engineering, Vol. 22, Nos. 2-3, pp. 270-279, 2020-05. (EI)
  173. Tian, H.*, Wang, J., Chang, C. C. and Quan, H., "Public Auditing of Log Integrity for Shared Cloud Storage Systems via Blockchain," Accepted byWireless Networks, ., 2020-05. (Academic Search Index)
  174. Chen, Y., Lin, J. Y., Chang, C. C.* and Hu, Y. C., "Reversibly Hiding Data Using Dual Images Scheme Based on EMD Data Hiding Method," International Journal of Computational Science and Engineering, Vol. 21, No. 4, pp. 583-592, 2020-04. (EI)
  175. Chen, W., Chang, C. C.*, Weng, S.* and Ou, B, "Multi-layer Mini-Sudoku Based High-Capacity Data Hiding Method," IEEE Access, Vol. 8, No. 1, pp. 69256-69267, 2020-04. (SCIE)
  176. Lee, C. F., Chang, C. C.* and Li, G. L., "A Data Hiding Scheme Based on Turtle-shell for AMBTC Compressed Images," KSII Transactions on Internet and Information Systems, Vol. 14, No. 6, pp. 2554-2575, 2020-04. (SCIE)
  177. Huang, P., Chang, C. C.*, Li, Y. H. and Liu, Y., "Efficient QR Code Secret Embedding Mechanism Based on Hamming Code," IEEE Access, Vol. 8, No. 1, pp. 86706-86714, 2020-04. (SCIE)
  178. Wang, R., Zhu, Y.*, Chang, C. C. and Peng, Q., "Privacy-preserving High-dimensional Data Publishing for Classification," Computers & Security, Vol. 93, pp. 101785, 2020-03. (SCIE)
  179. Tu, S.*, Waqas, M*., Lin, Q.*, Rehman, S. U.*, Hanif, M., Xiao, C., Butt, M. M.* and Chang, C. C., "Tracking Area List Allocation Scheme Based on Overlapping Community Algorithm," Computer Networks, Vol. 173, pp. 107182, 2020-03. (SCIE)
  180. Xie, X. Z., Chang, C. C.* and Chen, K. M., "A High Embedding Efficiency RDH in Encrypted Image Combining MSB Prediction and Matrix Encoding for Non-volatile Memory-Based Cloud Service," IEEE Access, Vol .8, No. 1, pp. 52028-52040, 2020-03. (SCIE)
  181. Xia, T. T., Lin, J., Chang, C. C.* and Lu, T. C., "Reversible Data Hiding Scheme Based on the AMBTC Compression Technique and Huffman Coding," International Journal of Computational Science and Engineering, Vol. 22, No. 4, pp. 383–393, 2020-03. (EI)
  182. Sun, C., Tian, H.*, Chang, C. C., Chen, Y., Cai, Y., Du, Y., Chen, Y. H. and Chen, C. C.*, "Steganalysis of Adaptive Multi-rate Speech Based on Extreme Gradient Boosting," Electronics, Vol. 9, No. 3, pp. 522, 2020-03. (SCIE)
  183. Wang, X., Chang, C. C. and Lin, C. C*, "Adaptive Reversible Data Hiding Scheme for AMBTC Compressed Images," Multimedia Tools and Applications, Vol. 79, No. 9, pp. 6547–656, 2020-03. (SCIE)
  184. Chen, Y., Lin, J. Y., Chang, C. C.* and Hu, Y. C., "Low-computation-cost Data Hiding Scheme Based on Turtle Shell," International Journal of Network Security, Vol. 22, No. 2, pp. 296-305, 2020-03. (EI)
  185. Liu, M., Tu, S.*, Xiao, C., Waqas, M., Rehman, S. U., Aamir, M. and Chang, C. C., "The Allocation and Reuse Scheme of Physical Cell Identifications Based on Maximum Degree First Coloring Algorithm," IEEE Systems Journal, Vol 14, No. 1, pp. 582-591, 2020-03. (SCIE)
  186. Chen, H., Chang, C. C.* and Chen, K. M., "Reversible Data Hiding Schemes in Encrypted Images Based on the Paillier Cryptosystem," International Journal of Network Security, Vol. 22, No. 3, pp. 521-531, 2020-02. (EI)
  187. Su, G. D., Chang, C. C. and Lin, C. C.*, "A High Capacity Reversible Data Hiding in Encrypted AMBTC-compressed Images," IEEE Access, Vol. 8, No. 1, pp. 26984-27000, 2020-02. (SCIE)
  188. Yu, Z., Chang, C. C. and Lin, C. C.*, "ABMC-DH: An Adaptive Bit-plane Data Hiding Method Based on Matrix Coding," IEEE Access, Vol. 8, No. 1, pp. 27634-27648, 2020-02. (SCIE)
  189. Lin, J., Weng, S.*, Zhang, T., Ou, B. and Chang, C. C., "Two-layer Reversible Data Hiding based on AMBTC Image with (7, 4) Hamming Code," IEEE Access, Vol. 8, No. 1, pp. 21534-21548, 2020-02. (SCIE)
  190. Chen, S., Chang, C. C.* and Liao, Q. Y., "Fidelity Preserved Data Hiding in Encrypted Images Based on Homomorphism and Matrix Embedding," IEEE Access, Vol. 8, No. 1, pp. 22345-22356, 2020-02. (SCIE)
  191. Li, Y., Chang, C. C.* and He, M., "High Capacity Reversible Data Hiding for VQ-compressed Images Based on Difference Transformation and Mapping Technique," IEEE Access, Vol. 8, No. 1, pp. 32226-32245, 2020-02. (SCIE)
  192. Liu, L.*, Wang, A. and Chang, C. C., "Separable Reversible Data Hiding in Encrypted Images With High Capacity Based on Median-Edge Detector Prediction," IEEE Access, Vol. 8, No. 1, pp. 29639-29647, 2020-02. (SCIE)
  193. Zheng, W., Chang, C. C.*, and Weng, S. W.*, "A Novel Adjustable RDH Method for AMBTC-Compressed Codes Using One-to-many Map," IEEE Access, Vol. 8, No. 1, pp. 13105-13118, 2020-01. (SCIE)
  194. Tian, H.*, Liu, J., Chang, C. C., Huang, Y, and Cai, Y., "Detecting Steganography in Inactive Voice-over-IP Frames Based on Statistic Characteristics of Fundamental Frequency," IEEE Access, Vol. 8, No. 1, pp. 6117 - 6129, 2020-01. (SCIE)
  195. Xie, X. Z., Chang, C. C.* and Lin, C. C., "A Hybrid Reversible Data Hiding for Multiple Images with High Embedding Capacity," IEEE Access, Vol. 8, No. 1, pp. 37 - 52, 2020-01. (SCIE)
  196. Tseng, K. K., He, X., An, X., Chang, C. C.*, Wang, C. and Guo, X., "Packet Watermarking With ECG Biological Feature," International Journal of Network Security, Vol. 22, No. 1, pp. 1-11, 2020-01. (EI)
  197. Tian, H.*, Zhu, Z., Chang, C. C., Huang, Y., Wang, T., Chen, Y. and Cai, Y., "StegoNote: Steganography in Guitar Music Using Note Modulation," International Journal of Network Security, Vol. 22, No. 1, pp. 68-79, 2020-01. (EI)
  198. Li, X. S., Chang, C. C.*, He, M. X. and Lin, C. C., "A Lightweight Authenticable Visual Secret Sharing Scheme based on Turtle Shell Structure Matrix," Multimedia Tools and Applications, Vol. 79, No. 1, pp 453-476, 2020-01. (SCIE)
  199. Li, L., Chang, C. C.* and Chen, H., "An Improved Bidirectional Shift-Based Reversible Data Hiding Scheme Using Double-Way Prediction Strategy," Security and Communication Networks, Vol. 2019, Dec. 2019, pp. 3031506:1-17, 2019-12. (SCIE)
  200. Chen, K. M. and Chang, C. C.*, "Error-free Separable Reversible Data Hiding in Encrypted Images Using Linear Regression and Prediction Error Map," Multimedia Tools and Applications, Vol. 78, No. 22, pp. 31441–31465, 2019-11. (SCIE)
  201. Chen, L., Chen, Z., Choo, K. K. R.*, Chang, C. C. and Sun, H. M,, "Memory Leakage-resilient Dynamic and Verifiable Multi-keyword Ranked Search on Encrypted Smart Body Sensor Network Data," IEEE Sensors Journal, vol. 19, no. 19, pp. 8468-8478, 2019-10. (SCIE)
  202. Li, X. S., Chang, C. C., He, M. X. and Lin, C. C.*, "Secure High Capacity Data Hiding Scheme based on Reference Matrix," International Journal of Network Security, vol. 21, no. 6, pp. 918-929, 2019-10. (EI)
  203. Chen, H., Wu, H. L., Chang, C. C.* and Chen, L. S., "Light Repository Blockchain System with Multisecret Sharing for Industrial Big Data," Security and Communication Networks, vol. 2019, pp. 1-7, 2019-10. (SCIE)
  204. Su, G. D., Liu, Y.* and Chang, C. C., "A Square Lattice Oriented Reversible Information Hiding Scheme with Reversibility and Adaptivity for Dual Images," Journal of Visual Communication and Image Representation, Vol. 64, pp. 102618, 2019-10. (SCIE)
  205. Chen, C. C., Chang, C. C.*, Lin, C. C.* and Su, G. D., "TSIA: A Novel Image Authentication Scheme for AMBTC-Based Compressed Images Using Turtle Shell Based Reference Matrix," IEEE Access, vol. 7, no. 1, pp. 149515-149526, 2019-10. (SCIE)
  206. Li, J. J., Lee, C. F., Chang, C. C.*, Lin, J. Y. and Wu, Y. H., "Reversible Data Hiding Scheme based on Quad-tree and Pixel Value Ordering," IEEE Access, vol. 7, no. 1, pp. 142947-142962, 2019-10. (SCIE)
  207. Yu, Z., Lin, C. C.*, Chang, C. C. and Su, G. D., "HBF-DH: An Enhanced Payload Hybrid Data Hiding Method Based on A Hybrid Strategy and Block Features," IEEE Access, vol. 7, no. 1, pp. 148439-148452, 2019-10. (SCIE)
  208. Lin, J., Lin, C. C.* and Chang, C. C.*, "Reversible Steganographic Scheme for AMBTC-Compressed Image Based on (7, 4) Hamming Code," Symmetry, vol. 11, pp. 1236, 2019-10. (SCIE)
  209. Chang, C. C., Wang, X.*, and Horng, J. H., "A Hybrid Data Hiding Method for Strict AMBTC Format Images with High-Fidelity," Symmetry, Vol. 11, No. 10, pp. 1314, 2019-10. (SCIE)
  210. Huang, P. C., Li, Y. H., Chang, C. C.* and Liu, Y., "Efficient QR Code Authentication Mechanism Based on Sudoku," Multimedia Tools and Applications, Vol. 78, No. 18, pp. 26023–26045, 2019-09. (SCIE)
  211. Lin, J. Y., Chen, Y., Chang, C. C. and Hu, Y. C.*, "Dual-Image-Based Reversible Data Hiding Scheme with Integrity Verification Using Exploiting Modification Direction," Multimedia Tools and Applications, Vol. 78, No. 18, pp. 25855-25872., 2019-09. (SCIE)
  212. Zhang, S., Su, S., Li, L.*, Zhou, Q., Lu, J. and Chang, C. C., "An Image Style Transfer Network using Multilevel Noise Encoding and Its Application in Coverless Steganography," Symmetry, Vol. 11, No. 9, pp. 1152, 2019-09. (SCIE)
  213. Tian, H.*, Liu, J., Chang, C. C., Chen, C. C. and Huang, Y., "Steganalysis of AMR Speech Based on Multiple Classifiers Combination," IEEE Access, vol. 7, pp. 140957-140968, 2019-09. (SCIE)
  214. He, M. Z., Liu, Y.*, Chang, C. C. and He, M., "A Mini-Sudoku Matrix-Based Data Embedding Scheme with High Payload," IEEE Access, vol. 7, pp. 141414-141425, 2019-09. (SCIE)
  215. Tian, H.*, Huang, M., Chang, C. C., Huang, Y., Lu, J. and Du, Y., "Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pitch Delay," Journal of Universal Computer Science, vol. 25, no. 9, pp. 1131-1150., 2019-09. (SCIE)
  216. Li, L., He, M., Zhang, S.*, Luo, T. and Chang, C. C., "AMBTC based High Payload Data Hiding with Modulo-2 Operation and Hamming Code," Mathematical Biosciences and Engineering, vol. 16, no. 6, pp. 7934-7949, 2019-08. (SCIE)
  217. Lin, Q., Tu, S.*, Waqas, M., Rehman, S. and Chang, C. C., "Tracking Areas Planning Based on Spectral Clustering in Small Cell Networks," IET Communications, Vol. 13, No. 13, pp. 1921-1927, 2019-08. (SCIE)
  218. Huang, P. C., Chang, C. C.*, Li, Y. H. and Liu, Y., "High-payload Secret Hiding Mechanism for QR Codes," Multimedia Tools and Applications, Vol. 78, No. 16, pp. 22331-22350, 2019-08. (SCIE)
  219. Ye, W., Chen, H., Zhang, Z., Liu, Y.*, Weng, S. and Chang, C. C., "Hybrid Scheme of Image’s Regional Colorization Using Mask R-CNN and Poisson Editing," IEEE Access, Vol. 7, No. 1, pp. 115901-115913, 2019-08. (SCIE)
  220. Li, X., Liu, Y.*, Chen, H. and Chang, C. C., "A Secret Image Restoring Scheme Using Threshold Pairs of Unordered Image Shares," IEEE Access, Vol. 7, pp. 118249-118258, 2019-08. (SCIE)
  221. Nguyen, N. T. and Chang, C. C.*, "A Biometric-based Authenticated Key Agreement Protocol for User-to-user Communications in Mobile Satellite Networks," Wireless Personal Communications, Vol. 107, No. 4, pp. 1727-1758, 2019-08. (SCIE)
  222. Su, G. D., Chang, C. C. and Lin, C. C.*, "High-precision Authentication Scheme Based on Matrix Encoding for AMBTC-compressed Images," Symmetry, Vol. 11, No. 8, pp. 996, 2019-08. (SCIE)
  223. Xie, X. Z., Chang, C. C., Lin, C. C.* and Lin, J. L., "A Turtle Shell based RDH Scheme with Two-Dimensional Histogram Shifting," Multimedia Tools and Applications, Vol. 78, No. 14, pp. 19413-19436, 2019-07. (SCIE)
  224. Xie, X. Z., Liu, Y.* and Chang, C. C., "Extended Squared Magic Matrix for Embedding Secret Information with Large Payload," Multimedia Tools and Applications, Vol. 78, No. 14, pp. 19045-19059, 2019-07. (SCIE)
  225. Li, L.*, He, M., Yu, J., Lu, J., Zhou, Q., Feng, X. and Chang, C. C., "Aesthetic QR Code Authentication Based on Directed Periodic Texture Pattern," Accepted byJournal of Computers, Vol. 30, No. 6, pp. 263-275, 2019-07. (EI)
  226. Li, X., Liu, Y.*, Chen, H. and Chang, C. C., "A Novel Secret Sharing Scheme Using Multiple Share Images," Mathematical Biosciences and Engineering, Vol. 16, No. 6, pp. 6350-6366, 2019-07. (SCIE)
  227. Xie, X. Z., Chang, C. C.* and Lin, C. C., "Reversibility-oriented Secret Image Sharing Mechanism with Steganography and Authentication Based on Code Division Multiplexing," IET Image Processing, vol. 13, no. 9, pp. 1411-1420, 2019-07. (SCIE)
  228. Tian, H., Chen, Z., Chang, C. C., Huang Y., Wang, T.*, Huang, Z., Cai, Y. and Chen, Y., "Public Audit for Operation Behavior Logs with Error Locating in Cloud Storage," Soft Computing, Vol. 23, No. 11, pp. 3779-3792, 2019-06. (SCIE)
  229. Lin, J. Y., Liu, Y.* and Chang, C. C., "A Real-Time Dual-Image-Based Reversible Data Hiding Scheme Using Turtle Shells," Journal of Real-Time Image Processing, Special Issue on Real-Time Image Watermarking and Forensics in Cloud Computing, Vol. 16, No. 3, Jun. 2019, pp. 673-684, 2019-06. (SCIE)
  230. Chang, C. C.*, Lee, W. K., Liu, Y., Goi, B. M. and Phan, R. C. W., "Signature Gateway: Offloading Signature Generation to IoT Gateway Accelerated by GPU," IEEE Internet of Things Journal, Special Issue on Emerging Computing Offloading for IoTs: Architectures, Technologies, a, Vol. 6, No. 3, pp. 4448 - 4461, 2019-06. (SCIE)
  231. Chen, L., Lee, W. K., Chang, C. C., Choo, K. K. R.* and Zhang, N., "Blockchain based Searchable Encryption for Electronic Health Record Sharing," Future Generation Computer Systems, Vol. 95, pp. 420-429, 2019-06. (SCIE)
  232. Xie, X. Z., Lin, C. C.* and Chang, C. C., "A Reversible Data Hiding Scheme for JPEG Images by Doubling Small Quantized AC Coefficients," Multimedia Tools and Applications, Vol. 78, No. 9, pp. 11443-11462, 2019-05. (SCIE)
  233. Shiu, P. F., Tai, W. L.*, Jan, J. K., Chang, C. C. and Lin, C. C.*, "An Interpolative AMBTC-based High-Payload RDH Scheme for Encrypted Images," Signal Processing: Image Communication, Vol. 74, pp. 64-77, 2019-05. (SCIE)
  234. Chen, K. and Chang, C. C.*, "High-capacity Reversible Data Hiding in Encrypted Images Based on Two-phase Histogram Shifting," Mathematical Biosciences and Engineering, Special Issue on Security and Privacy Protection for Multimedia Information Pr, Vol. 16, No. 5, pp. 3947-3964, 2019-05. (SCIE)
  235. Zhang, S., Guo, X., Xu, X., Li, L.* and Chang, C. C., "A Video Watermark Algorithm Based on Tensor Decomposition," Mathematical Biosciences and Engineering, Vol. 16, No. 5, pp. 3435-3449, 2019-04. (SCIE)
  236. Liu, L.*, Wang, L.* and Chang, C. C.*, "Data Embedding Scheme Based on Multi-Matrix Structure of Turtle Shell to Avoid Human Eye Perception," Multimedia Tools and Applications, Vol. 78, No. 8, pp. 10473-10490, 2019-04. (SCIE)
  237. Liu, Y., Xu, Z., Ye, W.*, Zhang, Z., Weng, S., Chang, C. C. and Tang, H., "Image Neural Style Transfer with Preserving the Salient Regions," IEEE Access, Vol. 7, pp. 40027-40037, 2019-04. (SCIE)
  238. Huang, P. C., Chang, C. C., Li, Y. H.* and Liu, Y., "Efficient Secret Sharing Scheme with Cheater Identification Based on QR Code," KSII Transactions on Internet and Information Systems, vol. 13, no. 10, pp. 5144-5160, 2019-04. (SCIE)
  239. Hu, H., Lin, C.*, Chang, C. C. and Chen, L., "Enhanced Secure Data Backup Scheme Using Multi-factor Authentication," IET Information Security, vol. 13, no. 6, pp. 649-658, 2019-04. (SCIE)
  240. Li, L., Wang, B., Lu, J.*, Zhang, S. and Chang, C. C., "A New Aesthetic QR Code Algorithm based on Salient Region Detection and SPBVM," Journal of Internet Technology, Vol. 20, No. 3, pp. 935-946, 2019-03. (SCIE)
  241. Lin, J. Y., Chen, Y., Chang, C. C.* and Hu, Y. C., "Reversible Data Hiding in Encrypted Images Based on Bit-plane Block Embedding," J. of Information Hiding and Multimedia Signal Processing, Vol. 10, No. 2, pp. 408-421, 2019-03. (.)
  242. Liu, Y. and Chang, C. C.*, "A Cloud-assisted Passenger Authentication Scheme for Japan Rail Pass Based on Image Morphing," International Journal of Network Security, Vol. 21, No. 2, pp. 211-220, 2019-03. (EI)
  243. Tang, X.*, Huang, Y., Chang, C. C. and Zhou, L., "Efficient Real-time Integrity Auditing with Privacy-preserving Arbitration for Images in Cloud Storage System," IEEE Access, Vol. 7, pp. 33009-33023, 2019-03. (SCIE)
  244. Guo, C., Zhuang, R., Chang, C. C.* and Yuan, Q., "Dynamic Multi-Keyword Ranked Search Based on Bloom Filter over Encrypted Cloud Data," IEEE Access, Vol. 7, pp. 35826-35837, 2019-03. (SCIE)
  245. Liu, Y., Chang, C. C.* and Huang, P. C., "Security Protection Using Two Different Image Shadows with Authentication," Mathematical Biosciences and Engineering, Vol. 16, No. 4, pp. 1914-1932, 2019-03. (SCIE)
  246. Weng, S.*, Chen, Y., Ou, B., Chang, C. C. and Zhang, C., "Improved K-pass Pixel Value Ordering Based Data Hiding," IEEE Access, Vol. 7, pp. 34570-34582, 2019-03. (SCIE)
  247. Chen, H. and Chang, C. C.*, "A Novel (t,n) Secret Sharing Scheme Based Upon Euler's Theorem," Security and Communication Networks, Vol. 2019, pp. 1-7, 2019-03. (SCIE)
  248. Tian, H.*, Nan, F., Chang, C. C., Huang, Y., Lu, J. and Du, Y., "Privacy-preserving Public Auditing for Secure Data Storage in Fog-to-Cloud Computing," Journal of Network and Computer Applications, Vol. 127, No. 3, pp. 59-69, 2019-02. (SCIE)
  249. Tian, H.*, Nan, F., Jiang, H., Chang, C. C., Ning, J. and Huang, Y., "Public Auditing for Shared Cloud Data with Efficient and Secure Group Management," Information Sciences, Vol. 472, pp. 107-125, 2019-01. (SCIE)
  250. Guo, C., Tian, P. and Chang, C. C.*, "Privacy Preserving Weighted Similarity Search Scheme for Encrypted Data," IET Image Processing, Vol. 13, No. 1, pp. 61-69, 2019-01. (SCIE)
  251. Chen, K. M. and Chang, C. C.*, "High-capacity Reversible Data Hiding in Encrypted Images Based on Extended Run-Length Coding and Block-based MSB Plane Rearrangement," Journal of Visual Communication and Image Representation, Vol. 58, pp. 334-344, 2019-01. (SCIE)
  252. Chen, Y. H., Chang, C. C., Lin, C. C.* and Hsu, C. Y., "Content-based Color Image Retrieval Using Block Truncation Coding Based on Binary Ant Colony Optimization," Symmetry, Vol. 11, No. 1, pp. 21, 2019-01. (SCIE)
  253. Chen, K. and Chang, C. C.*, "Real-Time Error-Free Reversible Data Hiding in Encrypted Images Using (7, 4) Hamming Code and Most Significant Bit Prediction," Symmetry, Special Issue on Emerging Data Hiding Systems in Image Communication, Vol. 11, No. 1, pp. article number: 51., 2019-01. (SCIE)
  254. Xia, Z., Liu, Y.*, Hsu, C. F. and Chang, C. C., "An Information Theoretically Secure E-lottery Scheme Based on Symmetric Bivariate Polynomials," Symmetry, Vol. 11, No. 1, pp. 1-12, 2019-01. (SCIE)
  255. Liu, L.*, Wang, L., Shi, Y. Q. and Chang, C. C., "Separable Data-Hiding Scheme for Encrypted Image to Protect Privacy of User in Cloud," Symmetry, Vol. 11, No. 1, pp. 85, 2019-01. (SCIE)
  256. Li, L., Lin, C. C.* and Chang, C. C.*, "Using Two Meaningful Shadows to Share Secret Messages with Reversibility," Symmetry, Vol. 11, No. 1, pp. 79, 2019-01. (SCIE)
  257. Weng, S.*, Chen, Y., Hong, W., Pan, J. S., Chang, C. C. and Liu, Y., "An Improved Integer Transform Combining with an Irregular Block Partition," Symmetry, vol. 11, no.1, pp. 49, 2019-01. (SCIE)
  258. Liu, J., Tian, H.*, Chang, C. C., Wang, T., Chen, Y. and Cai, Y., "Steganalysis of Inactive Voice-over-IP Frames Based on Poker Test," Symmetry, Vol. 10, No. 8, pp. article number: 336., 2018-12. (SCIE)
  259. Qin, C., Zhang, W., Cao, F., Zhang, X. and Chang, C. C.*, "Separable Reversible Data Hiding in Encrypted Images via Adaptive Embedding Strategy with Block Selection," Signal Processing, Vol. 153, pp. 109-122, 2018-12. (SCIE,EI)
  260. Lin, C.*, Hu, H., Chang, C. C. and Tang, S., "A Publicly Verifiable Multi-secret Sharing Scheme with Outsourcing Secret Reconstruction," IEEE Access, Vol. 6, No. 1, pp. 70666-70673., 2018-12. (SCIE)
  261. Tu, S., Waqas, M.*, Rehman, S. R., Aamir, M., Rehman, O. U., Zhang, J. and Chang, C. C., "Security in Fog Computing: A Novel Technique to Tackle an Impersonation Attack," IEEE Access, vol 6, no. 0, pp. 74993-75001, 2018-11. (SCIE)
  262. Wang, R., Zhu, Y.*, Chen, T. S. and Chang, C. C., "Privacy-Preserving Algorithms for Multiple Sensitive Attributes Satisfying t-Closeness," Journal of Computer Science and Technology, Vol. 33, No. 6, pp. 1231-1242, 2018-10. (SCIE)
  263. Lu, J., Cheng, W., Zhang, S., Li, L.*, Yang, Z. and Chang, C. C., "A Novel Aesthetic QR Code Algorithm Based on Hybrid Basis Vector Matrices," Symmetry, Vol. 10, No. 11, article number: 543, 2018-10. (SCIE)
  264. Liu, Y. and Chang, C. C.*, "A Turtle Shell-based Visual Secret Sharing Scheme with Reversibility and Authentication," Multimedia Tools and Applications, Vol. 77, No. 19, pp. 25295-25310, 2018-10. (SCIE,EI)
  265. Huang, P. C., Chang, C. C.* and Li, Y. H., "Sudoku-based Secret Sharing Approach With Cheater Prevention Using QR Code," Multimedia Tools and Applications, Vol. 77, No. 19, pp. 25275-25294, 2018-10. (SCIE,EI)
  266. Nguyen, T. S.*, Chang, C. C. and Shih, T.H., "Effective Reversible Image Steganography Based on Rhombus Prediction and Local Complexity," Multimedia Tools and Applications, Vol. 77, No. 20, pp. 26449-26467, 2018-10. (SCIE)
  267. Chen, W., Tian, H.*, Chang, C. C., Nan, F. and Lu, J., "Adjacency-Hash-Table based Public Auditing for Data Integrity in Mobile Cloud Computing," Wireless Communications and Mobile Computing, Vol. 2018, pp. article id 3471312, 2018-09. (SCIE)
  268. Nguyen, N. T. and Chang, C. C.*, "A Biometric-based Authenticated Key Agreement Scheme for Session Initiation Protocol in IP-based Multimedia Networks," Multimedia Tools and Applications, Vol. 77, No. 18, pp. 23909-23947., 2018-09. (SCIE,EI)
  269. Xia, B., Wang, A., Chang, C. C.* and Liu, L., "Reversible Data Hiding for VQ Indices using Hierarchical State Codebook Mapping," Multimedia Tools and Applications, Vol. 77, No. 16, pp. 20519-20533., 2018-08. (SCIE,EI)
  270. Wang, R., Zhu, Y.*, Chen, T. S. and Chang, C. C., "An Authentication Method Based on the Turtle Shell Algorithm for Privacy-Preserving Data Mining," The Computer Journal, Vol. 61, No. 8, pp. 1123-1132, 2018-08. (SCIE,EI)
  271. Nguyen, D. C., Nguyen T. S.*, Chang, C. C., Hsueh, H. S., and Hsu, F. R., "High Embedding Capacity Data Hiding Algorithm for H.264/AVC Video Sequences without Intraframe Distortion Drift," Security and Communication Networks, Vol. 2018, pp. article id 2029869, 2018-08. (SCIE)
  272. Chang, C. C., Chiu, Y. P., Lin, C. C*. and Chen, Y. H., "Distortion Free Progressive BTC based Secret Image Sharing," Journal of Network Intelligence, Vol. 3, No. 3, pp. 195-213, 2018-08, 2018-08. (.)
  273. Xia, Z.*, Tong, Z., Xiao, M. and Chang, C. C., "Framework for Practical and Receipt-free Remote Voting," IET Information Security, Vol. 12, No. 2, pp. 326-331, 2018-07. (SCIE,EI)
  274. Zhu, Z., Tian, H.*, Chang, C. C., Chen, Y., Wang, T. and Cai, Y., "StegTab: Steganography in Guitar Tablatures," J. of Information Hiding and Multimedia Signal Processing, Vol. 9, No. 4, pp. 904-917., 2018-07. (EI)
  275. Qin, C., Ji, P., Chang, C. C., Dong, J. and Sun, X., "Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image Tampering Recovery," IEEE Multimedia, Special Issue on Cyber Security for Cyber-Enabled Multimedia Applications, Vol. 25, No. 3, pp. 36-48, 2018-07. (SCIE)
  276. Li, L.*, Li, H., Yuan, W., Feng, X., Lu, J. and Chang, C. C., "A Watermarking Mechanism With High Capacity for Three-Dimensional Mesh Objects Using Integer Planning," IEEE Multimedia, Special Issue on Cyber Security for Cyber-Enabled Multimedia Applications, Vol. 25, No. 3, pp. 49-64, 2018-07. (SCIE)
  277. Tan, J., Zhu, Y.*, Chen, T. S. and Chang, C. C., "Imbalanced Image Classification Approach Based on Convolution Neural Network and Cost-sensitivity," Journal of Computer Applications, Vol. 38, No. 7, pp. 1862-1865,1871, 2018-07. (.)
  278. Lee, C. F., Chang, C. C.*, Xie, X. Z., Mao, K. and Shi, R. H., "An Adaptive High-Fidelity Steganographic Scheme Using Edge Detection and Hybrid Hamming Codes," Displays, Vol. 53, pp. 30-39, 2018-07. (SCIE,EI)
  279. Li, J., Yu, J., Xu, L., Xue, X., Chang, C. C.*, Mao, X. and Hu, J., "A Cascaded Algorithm for Image Quality Assessment and Image Denoising Based on CNN for Image Security and Authorization," Security and Communication Networks, Special Issue on Security and Privacy for Smart, Connected, and Mobile IoT Devices, Vol. 2018, pp. article id 8176984, 2018-07. (SCIE,EI)
  280. Yang, Z. L., Peng, X. S., Huang, Y. F. and Chang, C. C.*, "A Novel Method of Speech Information Hiding Based on 3D-Magic Matrix," Accepted byJournal of Internet Technology, 2018-07. (SCIE,EI)
  281. Tian, H.*, Sun, J., Chang, C. C., Huang, Y. and Chen, Y., "Detecting Bitrate Modulation-Based Covert Voice-Over-IP Communication," IEEE Communications Letters, Vol. 22, No. 6, pp. 1196-1199, 2018-06. (SCIE)
  282. Lu, J., Xu, X., Li, X., Li, L.*, Chang, C. C., Feng, X. and Zhang, S., "Detection of Bird‘s Nest in High Power Lines in the Vicinity of Remote Campus Based on Combination Features and Cascade Classifier," IEEE Access, Vol. 6, pp. 39063 - 39071, 2018-06. (SCIE)
  283. Li, J.*, Peng, K. and Chang, C. C.*, "An Efficient Object Detection Algorithm Based on Compressed Networks," Symmetry, Vol. 10, No. 7, pp. article number: 235, 2018-06. (SCIE)
  284. Li, J., Wang, C., Chen, X., Tang, Z., Hui, G. and Chang, C. C.*, "A Selective Encryption Scheme of CABAC based on Video Context in High Efficiency Video Coding," Multimedia Tools and Applications, Vol. 77, No. 10, pp. 12837-12851, 2018-05. (SCIE,EI)
  285. Huang, P. C., Li, Y. H., Chang, C. C.* and Liu, Y., "Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction," KSII Transactions on Internet and Information Systems, Vol. 12, No. 5, pp. 2348-2365., 2018-05. (SCIE,EI)
  286. Yao, Y., Yu, C. X.*, Yang, L., Chang, C. C., "Computer-Aided Annotation for Video Tampering Dataset of Foyensic Research," J. of Information Hiding and Multimedia Signal Processing, Vol. 9, No. 3, pp. 768-774, 2018-05. (EI)
  287. Nguyen, N. T. and Chang, C. C.*, "Untraceable Biometric-Based Three-Party Authenticated Key Exchange for Dynamic Systems," Peer-to-Peer Networking and Applications, Vol. 11, No. 3, pp. 644-663, 2018-05. (SCIE)
  288. Chang, C. C., Huynh, N. T., Wang, Y. K. and Liu, Y.*, "An Improved Data Hiding Method Based on Lempel-Ziv-Welch Compression Codes," International Journal of Network Security, Vol.20, No.3, pp..478-488, 2018-05. (EI)
  289. Rehman, S., Tu, S.*, Rehman, O., Huang, Y., Magurawalage, C. and Chang, C. C., "Optimization of CNN through Novel Training Strategy for Visual Classification Problems," Entropy, Vol. 20, No. 4, pp. article number: 290, 2018-04. (SCIE)
  290. Li, J., Wang, N., Wang, Z. H.*, Li, H., Chang, C. C. and Wang, H., "New Secret Sharing Scheme Based on Faster R-CNNs Image Retrieval," IEEE Access, Vol. 6, pp. 49348-49357, 2018-04. (SCIE)
  291. Chang, C. C., Chen, T. S., Wang, Y. K. and Liu, Y.*, "A Reversible Data Hiding Scheme Based on Absolute Moment Block Truncation Coding Compression Using Exclusive OR Operator," Multimedia Tools and Applications, Vol. 77, No. 7, pp. 9039-9053, 2018-04. (SCIE,EI)
  292. Huynh, N. T., Bharanitharan, K., Chang, C. C. and Liu, Y.*, "Minima-Maxima Preserving Data Hiding Algorithm for Absolute Moment Block Truncation Coding Compressed Images," Multimedia Tools and Applications, Vol. 77, No. 5, pp. 5767-5783, 2018-03. (SCIE,EI)
  293. Li, F., Mao, Q. and Chang, C. C.*, "Reversible Data Hiding Scheme Based on the Haar Discrete Wavelet Transform and Interleaving Prediction Method," Multimedia Tools and Applications, Vol. 77, No. 5, pp. 5149-5168, 2018-03. (SCIE,EI)
  294. Guo, C., Chang, C. C.* and Chang, S. C., "A Secure and Efficient Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communication," International Journal of Network Security, Vol. 20, No. 2, pp. 323-331, 2018-03. (EI)
  295. Huang, P. C., Chang, C. C.*, Li, Y. H. and Liu, Y.,, "Efficient Access Control System Based on Aesthetic QR Code," Personal and Ubiquitous Computing , Special Issue on Advanced Technology for Smart Home Automation and Entertainment, Vol. 22, No. 1, pp. 81-91, 2018-02. (SCIE)
  296. Xie, X. Z., Lin, C. C.* and Chang, C. C., "Data Hiding Based on A Two-layer Turtle Shell Matrix," Symmetry, Special Issue on Emerging Data Hiding Systems in Image Communications, Vol. 10, No. 2, pp. article number: 47., 2018-02. (SCIE)
  297. Zhang, S., Wu, T.*, Xu, X., Cheng, Z., Pu. S. and Chang, C. C, "No-Reference Image Blur Assessment Based on SIFT and DCT," J. of Information Hiding and Multimedia Signal Processing, Vol. 9, No. 1, pp. 219-231, 2018-01. (EI)
  298. Chang, C. C., Lu, T. C.*, Zhu, Z. H and Tian, H., "An Effective Authentication Scheme Using DCT for Mobile Devices," Symmetry, Special Issue on Emerging Data Hiding Systems in Image Communications, Vol. 10, No. 1, article number: 13, 2018-01. (SCIE)
  299. Liu, Y., Chang, C. C.*, Huang, P. C. and Hsu, C. Y., "Efficient Information Hiding Based on Theory of Numbers," Symmetry, Special Issue on Emerging Data Hiding Systems in Image Communications, Vol. 10, No. 1, article number: 19, 2018-01. (SCIE)
  300. Qin, C., Sun, M. and Chang, C. C*, "Perceptual Hashing for Color Images Based on Hybrid Extraction of Structural Features," Signal Processing, Vol. 142, pp. 194-205., 2018-01. (SCIE,EI)
  301. Wang, J. Q., Zhu, Y.*, Chen, T. S. and Chang, C. C., "Optimum Feature Selection Based on Genetic Algorithm Under Web Spam Detection," Journal of Computer Applications, Vol. 38, No. 1, pp. 295-299., 2018-01. (.)
  302. Chang, C. C., Tang, R., Lin, C. C. and Lyu, W. L., "High-Capacity Reversible Data Hiding Method for JPEG Images," Journal of Software, Vol. 13, No. 1, pp. 1-17, 2018-01. (.)
  303. Liu, Y.* and Chang, C. C., "Reversible Data Hiding for JPEG Images Employing All Quantized Non-Zero AC Coefficients," Displays, Vol. 51, pp. 51-56, 2018-01. (SCIE,EI)
  304. Wu, H. L. and Chang, C. C.*, "Attacks on "A Provably Secure and Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems"," Multimedia Tools and Applications, Vol. 77, No. 2, pp. 1525-1535., 2018-01. (SCIE,EI)
  305. Zhuang, X., Zhu, Y.*, Chang, C. C.* and Peng, Q., "Security Issues in Ultralightweight RFID Authentication Protocols," Wireless Personal Communications, Vol. 98, No. 1, pp. 779-814, 2018-01. (SCIE)
  306. Li, J. J., Wu, Y. H., Lee, C. F. and Chang, C. C.*, "Generalized PVO-K Embedding Technique for Reversible Data Hiding," International Journal of Network Security, Vol. 20, No. 1, pp. 65-77., 2018-01. (EI)
  307. Li, J., Xu, L., Wang, Z. and Chang, C. C.*, "No-reference Image Quality Assessment for Multiple Distortions Using Saliency Map Based on A Dual-convolutional Neural Networks," Journal of Internet Technology, Vol. 18, No. 7, pp. 1701-1710, 2017-12. (SCIE,EI)
  308. Zhuang, X.*, Zhu, Y., Chang, C. C., Peng, Q. and Faisal, M., "A Unified Score Propagation Model for Web Spam Demotion Algorithm," Information Retrieval Journal, Vol. 20, No. 6, pp. 547-574, 2017-12. (SCIE,EI)
  309. Tang, R., Chang, C. C. and Lin, C. C.*, "A High-capacity Data Hiding Method Based on Sudoku Games," Accepted byJournal of Software, 2017-11. (EI)
  310. Bai, J., Chang, C. C. and Zhu, C.*, "A Lossless Data Hiding Scheme Based on VQ Index Frequency," Journal of Internet Technology, Vol. 18, No. 6, pp. 1297-1310., 2017-11. (SCIE,EI)
  311. Liu, Y. and Chang, C. C.*, "A One-Card-Pass User Authentication Scheme Using Image Morphing," Multimedia Tools and Applications, Vol. 76, No. 20, pp 21247-21264, 2017-10. (SCIE,EI)
  312. Liu, L., Wang, L. F. and Chang, C. C.*, "A Semantic Compression Scheme for Digital Images Based on Vector Quantization and Data Hiding," Multimedia Tools and Applications, Vol. 76, 、No. 20, pp 20833-20846, 2017-10. (SCIE)
  313. Chang, C. C., Lee, J. S. and Wu, J. S., "An Energy Conservation Authentication Scheme in Wireless Body Area Network,," Communications of the CCISA, Special Issue on The New Research Trend on the Multimedia and Network Securit, Vol. 23, No. 4, pp. 37-54, 2017-10. (.)
  314. Lin, Z.*, Zhu, Y., Chen, T. S. and Chang, C. C., "Pouncing on Web Spam Using a Random Forest-Based Tree Structure Ensemble Learning Method," Accepted byApplication Research of Computers, 2017-10.
  315. Huang, Y*, Tao, H., Xiao, B. and Chang, C. C., "Steganography in Low Bit-rate Speech Streams of VoIP Based on Quantization Index Modulation Controlled by Keys," Science China Technological Sciences, Vol. 60, No. 10, pp. 1585-1596, 2017-10. (SCIE)
  316. Jin, Q., Xiang, Y., Sun, G.,Liu, Y. and Chang, C. C., "Cybersecurity for Cyber-Enabled Multimedia Applications," IEEE MultiMedia, Vol. 24, No. 4, pp. 10-13., 2017-10. (SCIE)
  317. Jiang, Z., Zhang, Z., Wang, L.*, Chang, C. C. and Liu, L., "Load Balance Strategy of Data Routing Algorithm Using Semantics for Deduplication Clusters," Journal of Electronic Science and Technology, Vol. 15, No. 3, pp. 277-282, 2017-09. (SCOPUS)
  318. Tian, H.*, Chen, Y., Chang, C. C., Jiang, H., Huang, Y., Chen, Y. H. and Liu, J., "Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage," IEEE Transactions on Services Computing, Vol. 10, No. 5, pp. 701-714, 2017-09. (SCIE,EI)
  319. Mao, K., Lee, C. F.*, Chang, C. C. and Shi, R. H., "Study of Difference-Expansion Embedding Schemes," Journal of Electronic Science and Technology, Special Issue on Information Security and Applications, Vol. 15, No. 3, pp. 211-216, 2017-09. (EI)
  320. Chang, C. C.*, Nguyen, T. S. and Chien, T. Y., "An Efficient Steganography Scheme Based on Edge Detection for High Payload," J. of Information Hiding and Multimedia Signal Processing, Vol. 8, No. 5, pp. 967-979, 2017-09. (EI)
  321. Cheng, T. F., Chang, C. C.* and Lo, Y. Y., "Smart Card-Based Password Authenticated Key Agreement Protocol Using Chaotic Maps," International Journal of Communication Systems, Vol. 30, No. 12, pp. 1-15., 2017-08. (SCIE,EI)
  322. Wang, F., Chang, C. C.* and Wu, H. L., "Secure CAS-based Authentication Scheme for Mobile Pay-TV Systems," International Journal of Communication Systems, Vol. 30, No. 10, pp. 1-12., 2017-07. (SCIE,EI)
  323. Chang, C. C.*, Pai, P. Y., Tsai, M. H. and Chan, Y. K., "Vessel Detection in Chicken Chorioallantoic Membrane Image," J. of Information Hiding and Multimedia Signal Processing, Vol. 8, No. 4, pp. 784-797., 2017-07. (EI)
  324. Wang, L. M., Xie, Q. Q., Jiang, T. and Chang, C. C.*, "ShortHC: Self-Regenerated Short Hash Chain for Resource-Constrained System," J. of Information Hiding and Multimedia Signal Processing, Vol. 8, No. 4, pp. 847-860, 2017-07. (EI)
  325. Chang, C. C.*, Wu, H. L. and Sun, C. Y., "Notes on "Secure Authentication Scheme for IoT and Cloud Servers"," Pervasive and Mobile Computing, Vol. 38, pp. 275-278., 2017-07. (SCIE)
  326. Wu, H. L., Chang, C. C. and Nguyen, T. S., "Reversible Data Hiding Using Pixel Order Exchange," International Journal of Future Computer and Communication, Vol. 6, No. 2, pp. 72-75, 2017-06. (EI)
  327. Liu, L., Wang, A. Chang, C. C.* and Li, Z., "A Secret Image Sharing with Deep-steganography and Two-stage Authentication Based on Matrix Encoding," International Journal of Network Security, Vol.19, No.3, pp. 327-334, 2017-05. (EI)
  328. Tian, H.*, Qin, J., Chang, C. C., Huang, Y. and Chen, Y. H., "Improved Wet Paper Code Using Simplified Hamming Parity-Check Matrix and Its Application in Voice-over-IP Steganography," Journal of Internet Technology, Vol. 18, No. 3, pp. 551-559, 2017-05. (SCIE,EI)
  329. Tian, H.*, Wu, Y., Chang, C. C., Huang, Y., Chen, Y., Wang, T., Cai, Y. and Liu, J., "Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pulse Pairs," Signal Processing, Vol. 134, pp. 9-22, 2017-05. (SCIE,EI)
  330. Chu, W.*, Wang, L., Jiang, Z. and Chang, C. C., "Protecting User Privacy in a Multi-path Information-Centric-Network Using Multiple Random-Caches," Journal of Computer Science and Technology, Vol. 32, No. 3, pp. 585-598, 2017-05. (SCIE)
  331. Chang, C. C.*, Huang, Y. H. and Lu, T. C., "A Difference Expansion Based Reversible Information Hiding Scheme with High Stego Image Visual Quality," Multimedia Tools and Applications, Vol. 76, No. 10, pp. 12659-12681, 2017-05. (SCIE)
  332. Liu, L., Chang, C. C.* and Wang, A., "Data Hiding Based on Extended Turtle Shell Matrix Construction Method," Multimedia Tools and Applications, Vol. 76, No. 10, pp. 12233-12250, 2017-05. (SCIE,EI)
  333. Tian, H.*, Chen, Z., Chang, C. C., Kuribayashi, M., Huang, Y., Cai, Y., Chen, Y. and Wang, T., "Enabling Public Auditability for Operation Behaviors in Cloud Storage," Soft Computing, Vol. 21, No. 8, pp. 2175-218, 2017-04. (SCIE)
  334. Tian, H.*, Sun, J., Chang, C. C., Qin, J. and Chen, Y., "Hiding Information into Voice-over-IP Streams Using Adaptive Bitrate Modulation," IEEE Communications Letters, Vol. 21, No. 4, pp. 1-4, 2017-04. (SCIE)
  335. Liu, Y.*, Zhong, Q., Shen, J. and Chang, C. C., "A Novel Image Protection Scheme using Bit-plane compression and Secret Sharing," Journal of the Chinese Institute of Engineers, Vol. 40, No. 2, pp. 161-169, 2017-03. (SCIE)
  336. Liu, Y. N., Liu, G. and Chang, C. C.*, "Lottery Protocol Using Oblivious Transfer Based on ECC," Journal of Internet Technology, Vol. 18, No. 2, pp.279-285, 2017-03. (SCIE,EI)
  337. Lu, J., Yang, Z., Li, L., Yuan, W., Li, L. and Chang, C. C.*, "Multiple Schemes for Mobile Payment Authentication Using QR Code and Visual Cryptography," Mobile Information Systems, Vol. 2017, Article ID 4356038, 12 pages, 2017-03. (SCIE,EI)
  338. Zhuang, X.*, Zhu, Y., Chang, C. C. and Peng, Q., "Feature Bundling in Decision Tree Algorithm," Intelligent Data Analysis, Vol. 21, No. 2, pp. 371-383, 2017-03. (SCIE)
  339. Mao, Q. and Chang, C. C.*, "Turbo Unequal Error Protection Codes with Multiple Protection Levels," International Journal of Network Security, Vol. 19, No. 2, pp. 205-216, 2017-03. (EI)
  340. Zhong, H., Liu, H., Chang, C. C. and Lin, C. C.*, "A Novel Lossless Secret Image Sharing Scheme with Authentication," Accepted byMathematical Problems in Engineering, 2017-03. (SCIE)
  341. Li, J.*, Fan, S., Wang, Z., Li, H. and Chang, C. C., "An Optimized CLBP Descriptor Based on a Scalable Block Size for Texture Classification," KSII Transactions on Internet and Information Systems, Vol. 11, No. 1, pp. 288-301, 2017-01. (SCIE,EI)
  342. Yu, F.*, Chang, C. C., Shu, J., Ahmad, I., Zhang, J. and Fuentes, J. M., "Recent Advances in Security and Privacy for Wireless Sensor Networks 2016," Journal of Sensors, Vol. 2017, Article ID 3057534, 2017-01. (SCIE)
  343. Bai, J., Chang, C. C., Nguyen, T. S., Zhu, C. and Liu, Y.*, "A High Payload Steganographic Algorithm Based on Edge Detection," Displays, Vol. 46, pp. 42-51, 2017-01. (SCIE,EI)
  344. Jin, Q., Li, Z., Chang, C. C.*, Wang, A. and Liu, L., "Minimizing Turtle-Shell Matrix Based Stego Image Distortion Using Particle Swarm Optimization," International Journal of Network Security, Vol. 19, No. 1, pp. 154-162, 2017-01. (EI)
  345. Qin, C., Ji, P., Wang, J. and Chang, C. C.*, "Fragile Image Watermarking Scheme Based on VQ Index Sharing and Self-embedding," Multimedia Tools and Applications, Vol. 76, No. 2, pp. 2267-2287, 2017-01. (SCIE,EI)
  346. Liu, Y., Chang, C. C.* and Chang, S. C., "An Efficient and Secure Smart Card Based Password Authentication Scheme," International Journal of Network Security, Vol. 19, No. 1, pp. 1-10, 2017-01. (EI)
  347. Kuo, W. C.*, Chang, S. Y., Wang, C. C. and Chang, C. C., "Secure Multi-group Data Hiding Based on GEMD Map," Multimedia Tools and Applications, Vol. 76, No. 2, pp. 1901-1919, 2017-01. (SCIE,EI)
  348. Zhao, Q. Y., Liu, Y. N., Liu, G. and Chang, C. C.*, "A Novel Micropayment Scheme with Variable Denomination," International Journal of Network Security, Vol. 19, No. 1, pp. 85-90, 2017-01. (EI)
  349. Li, F., Bharanitharan, K., Chang, C. C.* and Mao, Q., "Bi-Stretch Reversible Data Hiding Algorithm for Absolute Moment Block Truncation Coding Compressed Images," Multimedia Tools and Applications, Vol. 75, No. 23, pp. 16153-16171, 2016-12. (SCIE,EI)
  350. Di, Y. F., Lee, C. F., Wang, Z. H.*, Chang, C. C. and Li, J. J., "A Robust and Removable Watermarking Scheme Using Singular Value Decomposition," KSII Transactions on Internet and Information Systems, Vol. 10, No. 12, pp. 5268-5285, 2016-12. (SCIE,EI)
  351. Liu, X. L., Chang, C. C., Lin, C. C.* and Yuan, S. M., "A High-Payload, Reversible Data Hiding Scheme Based on Histogram Modification in JPEG Bitstream," Imaging Science Journal, Vol. 64, No. 7, pp. 364-373, 2016-12. (SCIE)
  352. Hsieh, S. H.*, Li, Y. H., Tien, C. H. and Chang, C. C., "Extending the Capture Volume of an Iris Recognition System Using Wavefront Coding and Super-Resolution," IEEE Transactions on Cybernetics, Vol. 46, No. 12, pp. 3342-3350, 2016-12. (SCIE,EI)
  353. Chang, C. C.*, Hsueh, W. Y. and Cheng, T. F., "An Advanced Anonymous and Biometrics-based Multi-server Authentication Scheme Using Smart Cards," International Journal of Network Security, Vol. 18, No. 6, pp. 1010-1021., 2016-11. (EI)
  354. Mao, Q., Bharanitharan, K. and Chang, C. C.*, "Novel Lossless Morphing Algorithm for Secret Sharing via Meaningful Images," J. of Information Hiding and Multimedia Signal Processing, Vol. 7, No. 6, pp. 1168-1184, 2016-11. (EI)
  355. Liu, X. L., Lin, C. C.*, Chang, C. C. and Yuan, S. M., "A Survey of Fragile Watermarking-based Image Authentication Techniques," J. of Information Hiding and Multimedia Signal Processing, Vol. 7, No. 6, pp. 1282-1292, 2016-11. (EI)
  356. Bai, J. and Chang, C. C.*, "A High Payload Steganographic Scheme for Compressed Images with Hamming Code," International Journal of Network Security, Vol. 18, No. 6, pp. 1122-1129., 2016-11. (EI)
  357. Chang, C. C.*, Tseng, W. T. and Tsai, H. C., "A Universal Authentication Scheme with Anonymity for Heterogeneous Wireless Networks," J. of Information Hiding and Multimedia Signal Processing, Vol. 7, No. 6, pp. 1384-1394, 2016-11. (EI)
  358. Wang, Z. H., Di, Y. F., Li, J. J.*, Chang, C. C. and Liu, H., "Progressive Secret Image Sharing Scheme Using Meaningful Shadows," Security and Communication Networks, Vol. 9, No. 17, pp. 4075-4088., 2016-11. (SCIE,EI)
  359. Chang, C. C.* and Nguyen, N. T., "An Untraceable Biometric-based Multi-server Authenticated Key Agreement Protocol with Revocation," Wireless Personal Communications, Vol. 90, No. 4, pp. 1695-1715, 2016-10. (SCIE)
  360. Tian, H.*, Wu, Y., Chang, C. C., Huang, Y., Liu, J., Wang, T., Chen, Y. and Cai, Y., "Steganalysis of Analysis-by-synthesis Speech Exploiting Pulse-position Distribution Characteristics," Security and Communication Networks, Vol. 9, No. 15, pp. 2934-2944, 2016-10. (SCIE,EI)
  361. Chang, C. C.*, Chang, S. C. and Wu, Y. C., "Novel Electronic Check Mechanism Using Elliptic Curve Cryptosystem," Journal of Computers, Vol. 27, No. 3, oct. 2016, pp. 111-122, 2016-10. (EI)
  362. Lu, J., Xu, X., Li, L., Chang, C. C.* and Wang, Q., "A Robust Image Copy Detection Method Based on Feature Extraction Algorithm," J. of Information Hiding and Multimedia Signal Processing, Vol. 7, No. 5, pp. 1136-1146, 2016-09. (EI)
  363. Xie, Q. Q., Jiang, S. R, Wang, L. M and Chang, C. C.*, "Composable Secure Roaming Authentication Protocol for Cloud-assisted Body Sensor Networks," International Journal of Network Security, Vol. 18, No. 5, pp. 816-831, 2016-09. (EI)
  364. Liu, Y., Chang, C. C.* and Sun, C. Y., "Notes on "An anonymous multi-server authenticated key agreement scheme based on trust computing using smart card and biometrics"," International Journal of Network Security, Vol. 18, No. 5, pp. 997-1000, 2016-09. (EI)
  365. Liu, L., Chang, C. C.* and Wang, A., "Reversible Data Hiding Scheme Based on Histogram Shifting of n-bit Planes," Multimedia Tools and Applications, Vol. 75, No. 18, pp. 11311-11326, 2016-09. (SCIE,EI)
  366. Li, Z, Jin, Q., Chang, C. C.*, Wang, A. and Liu, L., "A Novel Pixel Grouping Scheme for AMBTC Based on Particle Swarm Optimization," J. of Information Hiding and Multimedia Signal Processing, Vol. 7, No. 5, pp. 970-982, September 2016., 2016-09. (EI)
  367. Luo, Y. B.*, Huang, Y. F., Li, F. F. and Chang, C. C., "Text Steganography Based on Ci-poetry Generation Using Markov Chain Model," KSII Transactions on Internet and Information Systems, Vol. 10, No. 9, pp. 4568-4584., 2016-09. (SCIE,EI)
  368. Wang, F., Chang, C. C.* and Chang, S. C., "Robust Off-line E-cash Scheme with Recoverability and Anonymity Revocation," Security and Communication Networks, Vol 9, No. 14, pp. 2412–2421, 2016-09. (SCIE,EI)
  369. Chang, C. C.*, Chen, W. Y. and Chang, S. C., "A Highly Efficient and Secure Electronic Cash System Based on Secure Sharing in Cloud Environment," Security and Communication Networks, Vol. 9, No. 14, pp. 2476-2483, 2016-09. (SCIE,EI)
  370. Nguyen, T. S., Chang, C. C.* and Yang, X. Q., "A Reversible Image Authentication Scheme Based on Fragile Watermarking in Discrete Wavelet Transform Domain," International Journal of Electronics and Communications, Vol. 70, No. 8, pp. 1055-1061, 2016-08. (SCIE,EI)
  371. Wu, H. L., Chang, C. C.* and Sun, C. Y., "A Secure Authentication Scheme with Provable Correctness for Pay-TV Systems," Security and Communication Networks, Vol. 9, No. 11, pp. 1577-1588, 2016-07. (SCIE,EI)
  372. Bharanitharan, K., Chang, C. C.*, Yang, H. R. and Wang, Z. H., "Efficient Pixel Prediction Algorithm for Reversible Data Hiding," International Journal of Network Security, Vol. 18, No. 4, pp. 750-757., 2016-07. (EI)
  373. Li, L., Zheng, D., Lu, J.*, Mao, X. and Chang, C. C., "An Effective Mobile Visual Searching Algorithm Based on the Bag-of-Words Method for Furniture Images," J. of Information Hiding and Multimedia Signal Processing, Vol. 7, No. 4, pp. 754-770, 2016-07. (EI)
  374. Chang, C. C.*, Hsueh, W. Y. and Cheng, T. F., "A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks," Wireless Personal Communication, Vol. 89, No. 2, pp. 447-465, 2016-07. (SCIE)
  375. Liu, Y., Chang, C. C.* and Sun, C. Y., "A Novel Three-party Authenticated Key Exchange Protocol Based on Secret Sharing," J. of Information Hiding and Multimedia Signal Processing, Vol. 7, No. 4, pp. 741-753, 2016-07. (EI)
  376. Xia, B., Wang, A., Chang, C. C.* and Liu, L., "An Image Steganography Scheme Using 3D-Sudoku," J. of Information Hiding and Multimedia Signal Processing, Vol. 7, No. 4, pp. 836-845, 2016-07. (EI)
  377. Liu, Y. and Chang, C. C.*, "An Integratable Verifiable Secret Sharing Mechanism," International Journal of Network Security, Vol. 18, No. 4, pp. 617-624., 2016-07. (EI)
  378. Nguyen, T. S., Chang, C. C.* and Hsueh, H. S., "High Capacity Data Hiding For Binary Image Based on Block Classification," Multimedia Tools and Applications, Vol. 75, No. 14, pp. 8513-8526, 2016-07. (SCIE,EI)
  379. Liu, Y., Chang, C. C. and Sun, C. Y., "Notes on An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics," International Journal of Network Security, Vol. 18, No. 5, Sep. 2016, pp. 997-1000, 2016-06.
  380. Li, L., Qiu, J., Lu, J. and Chang, C. C.*, "An Aesthetic QR Code Solution Based on Error Correction Mechanism," Journal of Systems and Software, Special Issue on JSS 35th Anniversary, Vol. 116, pp. 85-94, 2016-06. (SCIE)
  381. Xia, B., Wang, A., Chang, C. C.* and Liu, L., "A Fast Image Coding Algorithm Using Indirect-index Codebook Based on SMVQ," Journal of Electronic Science and Technology, Vol. 14, No. 2, pp. 183-190, 2016-06. (EI)
  382. Li, F., Mao, Q. and Chang, C. C.*, "A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method," International Journal of Network Security, Vol. 18, No. 3, pp. 410-419, 2016-05. (EI)
  383. Zhong, H., Li, S., Cheng, T. F. and Chang, C. C.*, "An Efficient Electronic English Auction System with a Secure On-shelf Mechanism and Privacy Preserving," Journal of Electrical and Computer Engineering, Special Issue on Innovations in Communications Security, Vol. 2016, Article ID 6567146, May 2016, pp. 14 pages., 2016-05.
  384. Wang, F., Chang, C. C.* and Lin, C. L., "Security Analysis on "Secure Untraceable Off-line Electronic Cash System"," International Journal of Network Security, Vol. 18, No. 3, pp. 454-458, 2016-05. (EI)
  385. Li, Z., Jin, Q., Chang, C. C.*, Wang, A. and Liu, L., "A Common Bitmap Block Truncation Coding for Color Images Based on Binary Ant Colony Optimization," KSII Transactions on Internet and Information Systems, Vol. 10, No.5, pp. 2326-2345, 2016-05. (SCIE)
  386. Lyu, W. L., Chang, C. C.* and Wang, F., "Image Authentication and Self-Recovery Scheme Based on the Rehashing Model," J. of Information Hiding and Multimedia Signal Processing, Vol. 7, No. 3, pp. 460-474., 2016-05. (EI)
  387. Xu, W. L., Chang, C. C.*, Chen, T. S. and Wang, L. M., "An Improved Least-Significant-Bit Substitution Method Using the Modulo Three Strategy," Displays, Vol. 42, pp. 36-42, 2016-04. (SCIE)
  388. Chang, C. C., Nguyen, T. S., Lin, M. C. and Lin, C. C.*, "A Novel Data-Hiding and Compression Scheme Based on Block Classification of SMVQ indices," Digital Signal Processing, Vol. 51, pp. 142-155., 2016-04. (SCIE,EI)
  389. Chang, C. C.*, Sun, C. Y. and Chang, S. C., "A Strong RSA-based and Certificateless-based Signature Scheme," International Journal of Network Security, Vol. 18, No. 2, pp. 201-208, 2016-03. (EI)
  390. Chang, C. C.*, Lu, T. C., Horng, G. and Huang, Y. H., "Very Efficient Variable-length Codes for the Lossless Compression of VQ Indices," Multimedia Tools and Applications, Vol. 75, No. 6, pp. 3537-3552, 2016-03. (SCIE,EI)
  391. Qin, C.*, Ren, H., Chang, C. C. and Chen, Q., "Novel Occlusion Object Removal with Inter-frame Editing and Texture Synthesis," J. of Information Hiding and Multimedia Signal Processing, Vol. 7, No. 2, pp. 386-398, 2016-03. (EI)
  392. Nguyen, N. T., Le, H. D. and Chang, C. C.*, "Provably Secure and Efficient Three-Factor Authenticated Key Agreement Scheme with Untraceability," International Journal of Network Security, Vol. 18, No. 2, pp. 335-344, 2016-03. (EI)
  393. Zhong, H., Liu, H. Q., Chang, C. C. and Lin, C. C.*, "A Novel Fragile Watermark-based Image Authentication Scheme for AMBTC-compressed Images," J. of Information Hiding and Multimedia Signal Processing, Vol. 7, No. 2, pp. 362-375, 2016-03. (EI)
  394. Wu, Q., Zhu, C., Li, J. J.*, Chang, C. C. and Wang, Z. H., "A Magic Cube Based Information Hiding Scheme of Large Payload," Journal of Information Security and Applications, Vol. 26, pp. 1-7., 2016-02. (EI)
  395. Wang, F., Chang, C. C.*, Lin, C. L. and Chang, S. C., "Secure and Efficient Identity-Based Proxy Multi-Signature Using Cubic Residues," International Journal of Network Security, Vol. 18, No. 1, pp. 90-98, 2016-01. (EI)
  396. Chang, C. C.* and Le, H. D., "A Provably Secure, Efficient and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks," IEEE Transactions on Wireless Communications, Vol. 15, No. 1, pp. 357-366., 2016-01. (SCIE,EI)
  397. Le, H. D., Xu, X., Wang, Q., Li, L. and Chang, C. C.*, "Zero-watermarking for Face Image Protection in Database," Journal of Internet Technology, Vol. 17, No. 1, pp. 129-135, 2016-01. (SCIE,EI)
  398. Lyu, W. L. and Chang, C. C.*, "An Image Compression Method Based on Block Truncation Coding and Linear Regression," J. of Information Hiding and Multimedia Signal Processing, Vol. 7, No. 1, pp. 198-215., 2016-01. (EI)
  399. Nguyen, T. S., Chang, C. C.* and Shih, T. H., "A High-Quality Reversible Image Authentication Scheme Based on Adaptive PEE for Digital Images," KSII Transactions on Internet and Information Systems, Vol. 10, No. 1, pp. 395-413, 2016-01. (SCIE)
  400. Nguyen, T. S., Chang, C. C.* and Chang, W. C., "High Capacity Reversible Data Hiding Scheme for Encrypted Images," Signal Processing: Image Communication, Vol. 44, pp. 84-91, 2016-01. (SCIE,EI)
  401. Liu, Y. N., Cheng, C., Jiang, T. and Chang, C. C.*, "A Practical Lottery Using Oblivious Transfer," International Journal of Communication Systems, Vol. 29, No. 2, pp. 277-282, 2016-01. (SCIE,EI)
  402. Chang, C. C., Nguyen, T. S. and Lin, C. C.*, "A New Distortion-Free Data Embedding Scheme for High-Dynamic Range Images," Multimedia Tools and Applications, Vol. 75, No. 1, pp. 145-163, 2016-01. (SCIE,EI)
  403. Chang, C. C.*, Cheng, T. F. and Hsueh, W. Y., "A Robust and Efficient Dynamic Identity Based Multi-Server Authentication Scheme Using Smart Cards," International Journal of Communication Systems, Vol. 29, No. 2, pp. 290-306, 2016-01. (SCIE,EI)
  404. Wang, Z. H., Zhuang, X., Chang, C. C.*, Qin, C. and Yan, Z., "Reversible Data Hiding Based on Geometric Structure of Pixel Groups," International Journal of Network Security, Vol. 18, No. 1, pp. 52-59, 2016-01. (EI)
  405. Wang, Z. H., Chen, K. N., Chang, C. C.* and Qin, C., "Sharing a Large Secret Image Using Meaningful Shadows Based on VQ and Inpainting," KSII Transactions on Internet and Information Systems, Vol. 9, No. 12, pp. 5170-5188., 2015-12. (SCIE)
  406. Chang, C. C.*, Wu, H. L. and Sun, C. Y., "Notes on “Secure Authentication Scheme for IoT and Cloud Servers”," Accepted byPervasive and Mobile Computing, 2015-12. (SCIE,EI)
  407. Wang, F., Chang, C. C.* and Lyu, W. L., "The Credit Card Visual Authentication Scheme Based on GF(2^8) Field," Multimedia Tools and Applications, Vol. 74, No. 24, pp. 11451-11465., 2015-12. (SCIE,EI)
  408. Mao, Q., Bharanitharan, K. and Chang, C. C.*, "Multi-Round Dynamic Swap Optimization for Table Based Steganograph," IET Image Processing, Vol. 9, No. 12, pp. 1073-1082, 2015-12. (SCIE,EI)
  409. Chang, C. C., Yang, J. H.* and Wu, Y. C., "An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks," International Journal of Network Security, Vol. 17, No. 6, pp. 702-707, 2015-11. (EI)
  410. Nguyen, T. S., Chang, C. C.* and Huynh, N. T., "A Novel Reversible Data Hiding Scheme Based on Difference-Histogram Modification and Optimal EMD Algorithm," Journal of Visual Communication and Image Representation, Vol. 33, pp. 389-397, 2015-11. (SCIE,EI)
  411. Chang, C. C., Wu, C. C. and Lin, I. C.*, "A Multi-Purpose Key Agreement Scheme in Ubiquitous Computing Environments," Mobile Information Systems, Vol. 2015, Article ID: 934716, 7 pages. doi: 10.1155/2015/934716, 2015-11. (SCIE)
  412. Hou, Q., Dai, J., Li, L., Lu, J. and Chang, C. C.*, "Scanned Binary Image Watermarking Based On Additive Model and Sampling," Multimedia Tools and Applications, Vol. 74, No. 21, pp. 9407-9426, 2015-11. (SCIE,EI)
  413. Mao, Q., Li, F. and Chang, C. C.*, "Reversible Data Hiding with Oriented and Minimized Distortions Using Cascading Trellis Coding," Information Sciences, Vol. 317, pp. 170-180, 2015-10. (SCIE,EI)
  414. Nguyen, T. S. and Chang, C. C.*, "A Reversible Data Hiding Scheme Based on the Sudoku Technique," Displays, Vol. 39, pp. 109-116, 2015-10. (SCIE)
  415. Zhai, S., Li, F., Chang, C. C.* and Mao, Q., "A Meaningful Scheme for Sharing Secret Images Using Mosaic Images," International Journal of Network Security, Vol. 17, No. 5, pp. 643-649, 2015-09. (EI)
  416. Chang, C. C.*, Lin, M. C. and Cheng, T. F., "Dynamic Selective Information Hiding Based on Search Order Coding with Low Bit Rate," The Imaging Science Journal, Vol. 63, No. 7, pp. 378-388, 2015-09. (SCIE)
  417. Liu, W., Wang, A., Chang, C. C.*, Li, Z. and Liu, L., "A Grouped-scalable Secret Image Sharing Scheme," Multimedia Tools and Applications, Vol. 74, No. 17, pp. 7095-7109, 2015-09. (SCIE,EI)
  418. Lee, C. F., Pai, P. Y., Chang, C. C*. and Liu, C. M., "Adjustment Hiding Method Based on Exploiting Modification Direction," International Journal of Network Security, Vol. 17, No. 5, pp. 607-618, 2015-09. (EI)
  419. Chang, C. C.*, Lu, T. C., Horng, G., Huang, Y. H. and Hsu, T. J., "Dual-Histograms Reversible Data Hiding Capable of Avoiding Underflow/Overflow Problems," J. of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 5, pp. 956-967, 2015-09. (EI)
  420. Qin, C., Chang, C. C.* and Hsu, T. J., "Reversible Data Hiding Scheme Based on Exploiting Modification Direction with Two Steganographic Images," Multimedia Tools and Applications, Vol. 74, No. 15, pp. 5861-5872, 2015-07. (SCIE,EI)
  421. Tang, J., Jiang, B., Luo, B. and Chang, C. C.*, "An Outlier Detection Method for Feature Point Matching Problem," J. of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 4, pp. 728-739, 2015-07. (EI)
  422. Wang, Z. H., Huang, Y. H., Chang, C. C.*, Yang, H. R., "Reversible Data Hiding for High Quality Using Secret Data Transformation Strategy," J. of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 4, pp. 629-638, 2015-07. (EI)
  423. Wang, Z. H., Wu, Q., Luo, Z. C. and Chang, C. C.*, "A Novel Information Hiding Scheme Based on Line Segments," J. of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 4, pp. 674-685, 2015-07. (EI)
  424. Huang, Y. H., Chang, C. C.*, Lin, M. C. and Horng, G., "Very Effective Multi-Layer Reversible Embedding Method Using Low Distortion Modification," J. of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 4, pp. 760-770, 2015-07. (EI)
  425. Lyu, W. L., Chang, C. C.*, Chou, Y. C. and Lin, C. C., "Hybrid Color Image Steganography Method Used for Copyright Protection and Content Authentication," J. of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 4, pp. 686-696, 2015-07. (EI)
  426. Kuo, W. C., Kao, M. C. and Chang, C. C.*, "A Generalization of Fully Exploiting Modification Directions Data Hiding Scheme," J. of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 4 , pp. 718-727, 2015-07. (EI)
  427. Liu, C., Chang, C. C.*, Wu, Z. P. and Ye, S. L., "A Study of Relationship between RSA Public Key Cryptosystem and Goldbach’s Conjecture Properties," International Journal of Network Security, Vol. 17, No. 4, pp. 445-453, 2015-07. (EI)
  428. Le, H. D., Chang, C. C.* and Chou, Y. C., "A Novel Untraceable Authentication Scheme for Mobile Roaming in GLOMONET," International Journal of Network Security, Vol. 17, No. 4, pp. 395-404., 2015-07. (EI)
  429. Wang, Z. H., Chang, C. C.*, Huang, Y. H., Yang, H. R. and Horng, G., "Embedding Information in Chinese Calligraphy Images," Journal of Computers-Special Issue on Mobile Computing in Digital Forensics, Security and Privacy, Vol. 26, No. 2, pp. 11-18, 2015-07. (EI)
  430. Qin, C., Chang, C. C., Horng, G., Huang, Y. H. and Chen, Y. C., "Reversible Data Embedding for VQ-Compressed Images Using Search-Order Coding and Index Parity Matching," Security and Communication Networks, Vol. 8, No. 6, pp. 899-906, 2015-04, 2015-06.
  431. Chang, C. C., Chou, Y. C. and Sun, C. Y., "A Novel and Practical Scheme based on Secret-sharing for Laptop Data Protection," IET Information Security, Vol. 9, No. 2, pp. 100-107, 2015-03, 2015-06.
  432. Mao, Q., Bharanitharan, K. and Chang, C. C*., "Multi-round Dynamic Swap Optimisation for Table-based Steganography," IET Image Processing, vol. 9, no. 12, pp. 1073-1082, 2015-06. (SCIE,EI)
  433. Mao, Q., Chang, C. C.*, Harn, L. and Chang, S. C., "An Image-Based Key Agreement Protocol Using the Morphing Technique," Multimedia Tools and Applications, Vol. 74, No. 9, pp. 3207-3229, 2015-05. (SCIE,EI)
  434. Liu, Y., Harn, L. and Chang, C. C.*, "A Novel Verifiable Secret Sharing Mechanism Using Theory of Numbers and a Method for Sharing Secrets," International Journal of Communication Systems, Vol. 28, No. 7, pp. 1282-1292, 2015-05. (SCIE,EI)
  435. Liu, L., Wang, A. H.*, Chang, C. C.*, Jin, Q. and Xia, B. B., "Tree-Structured Vector Quantization with Flexible Multipath Searching Method Based on Side Match Prediction," J. of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 3, pp. 568-576., 2015-05. (EI)
  436. Chang, C. C.* and Le, H. D., "A Provably Secure Smart-card-based Authenticated Group Key Exchange Protocol," Security and Communication Networks, Vol. 8, No. 8, pp. 1602-1607, 2015-05. (SCIE,EI)
  437. Lyu, W. L., Chang, C. C.* and Wang, F., "Color PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method," J. of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 3, pp. 523-533, 2015-05. (EI)
  438. Lu, J., Wang, M., Dai, J., Huang, Q., Li, L. and Chang, C. C.*, "Multiple Watermark Scheme based on DWT-DCT Quantization for Medical Images," J. of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 3, pp. 458-47, 2015-05. (EI)
  439. Liu, Y., Chang, C. C.* and Sun, C. Y., "A Secure and Efficient Scheme for Digital Gift Certificates," J. of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 3, pp 416-429, 2015-05. (EI)
  440. Lee, J. S.*, Chang, C. C., Huynh, N. T. and Tsai, H. Y., "Preserving User-Friendly Shadow and High-Contrast Quality for Multiple Visual Secret Sharing Technique," Digital Signal Processing, Vol. 40, pp. 131-139, 2015-05. (SCIE)
  441. Wang, X. T.*, Li, M. C., Wang, S. T. and Chang, C. C., "Reversible Data Hiding Exploiting High-Correlation Regulation for High-Quality Images," Security and Communication Networks, Vol. 8, No. 7, pp. 1408-1421, 2015-05. (SCIE,EI)
  442. Wang, D., Chang, C. C.*, Liu, Y. and Song, G., "Digital Image Scrambling Algorithm Based on Chaotic Sequence and Decomposition and Recombination of Pixel Values," International Journal of Network Security, Vol.17, No.3, pp. 322-327., 2015-05. (EI)
  443. Qin, C., Chang, C. C.*, Horng, G., Huang, Y. H. and Chen, Y. C., "Reversible Data Embedding for Vector Quantization Compressed Images Using Search-Order Coding and Index Parity Matching," Security and Communication Networks, Vol. 8, No. 6, pp. 899-906, 2015-04. (SCIE,EI)
  444. Chang, C. C., Nguyen, T. S. and Lin, C. C.*, "A Reversible Compression Code Hiding Using SOC and SMVQ Indices," Information Sciences, Vol. 300, pp. 85-99, 2015-04. (SCIE,EI)
  445. Yin, Z. X., Chang, C. C.*, Xu, Q. and Luo, B., "Second-Order Steganographic Method Based on Adaptive Reference Matrix," IET Image Processing, Vol. 9, No. 4, pp. 300-305, 2015-04. (SCIE,EI)
  446. Huynh, N. T., Bharanitharan, K. and Chang, C. C.*, "Quadri-Directional Searching Algorithm for Secret Image Sharing Using Meaningful Shadows," Journal of Visual Communication and Image Representation, Vol. 28, pp. 105-112., 2015-04. (SCIE,EI)
  447. Qin, C., Chang, C. C.*, and Lin C. C., "An Adaptive Reversible Steganographic Scheme Based on the Just Noticeable Distortion," Multimedia Tools and Applications, Vol. 74, No. 6, pp. 1983-1995, 2015-03. (SCIE,EI)
  448. Chang, C. C.*, Sun, C. Y. and Cheng, T. F., "A Dependable Storage Service System in Cloud Environment," Security and Communication Networks, Vol. 8, No. 4, pp. 574-588, 2015-03. (SCIE,EI)
  449. Chang, C. C.*, Chou, Y. C. and Sun, C. Y., "Novel and Practical Scheme based on Secret Sharing for Laptop Data Protection," IET Information Security, Vol. 9, No. 2, pp. 100-107, 2015-03. (SCIE,EI)
  450. Jia, X. D., Chang, Y. F., Chang, C. C.* and Wang, L. M., "A Critique of a Lightweight Identity Authentication Protocol for Vehicular Networks," J. of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 2, pp. 183-188., 2015-03. (EI)
  451. Liu, L., Wang, A. H., Chang, C. C.*, li, Z. H. and Liu, J. B., "A Lossy Secret Color Image Sharing Scheme with Small Shadows and Error-resilient Capability," J. of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 2, pp. 246-253., 2015-03. (EI)
  452. Guo, C. and Chang, C. C.*, "A Novel Threshold Conference-Key Agreement Protocol Based on Generalized Chinese Remainder Theorem," International Journal of Network Security, Vol. 17, No. 2, pp. 165-173, 2015-03. (EI)
  453. Wu, H. L. and Chang, C. C.*, "A Robust Image Encryption Scheme Based on RSA and Secret Sharing for Cloud Storage Systems," J. of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 2, pp. 288-296., 2015-03. (EI)
  454. Wang, F., Chang, C. C.* and Chou, Y. C., "Group Authentication and Group Key Distribution for Ad Hoc Networks," International Journal of Network Security, Vol.17, No.2, pp. 199-207, 2015-03. (EI)
  455. Li, Z. Q., Huang, R., Peng, B. L., Chang, C. C.* and Wang, Q. Z., "A Divide-conquer Heuristic Search Algorithm for Cutting Surplus Steel Plates of Steel & Iron Companies," Inter. Journal of Innovative Computing, Info. and Control, Vol. 11, No. 1, pp. 1-14., 2015-02. (EI)
  456. Lee, C. F., Chang, C. C.*, Pai, P. Y. and Liu, C. M., "An Adjustable and Reversible Data Hiding Method Based on Multiple-base Notational System without Location Map," J. of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 1, pp. 1-28, 2015-01. (EI)
  457. Lin, C. L., Li, Y., Lv, K. and Chang, C. C.*, "Ciphertext-Auditable Identity-Based Encryption," International Journal of Network Security, Vol. 17, No.1, pp. 23-28., 2015-01. (EI)
  458. Liu, Y., Chang, C. C.* and Chang, S. C., "A Group Key Distribution System Based on the Generalized Aryabhata Remainder Theorem for Enterprise Digital Rights Management," J. of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 1, pp. 140-153., 2015-01. (EI)
  459. Li, Li, Dong, Z., Lu, J., Dai, J., Huang, Q., Chang, C. C.* and Wu, T., "An H.264/AVC HDTV Watermarking Algorithm Robust to Camcorder Recording," Journal of Visual Communication and Image Representation, Vol. 26, pp. 1-8, 2015-01. (SCIE,EI)
  460. Chang, C. C., Lin, C. C.* and Lin, C. Y., "Compressing Vector Quantization Index Table Using Side Match State Codebook," J. of Information Hiding and Multimedia Signal Processing, Vol. 6, No. 1, pp. 47-58, 2015-01. (EI)
  461. Zhuang, X., Zhu, Y.* and Chang, C. C., "A New Ultralightweight RFID Protocol for Low-Cost Tags: R2AP," Wireless Personal Communications, Vol. 79, No. 3, pp. 1787-1802, 2014-12. (SCIE)
  462. Chang, C. C.* and Nguyen, T. S., "A Reversible Data Hiding Scheme for SMVQ Indices," Informatica, Vol. 25, No. 4, pp. 523-540, 2014-12. (SCIE,EI)
  463. Chen, X., Liu, Y., Chang, C. C.* and Lin, C. L., "The Design of Dynamic Access Control for Hierarchical Sensor Networks with Key-lock-pair Mechanism," International Journal of Ad Hoc and Ubiquitous Computing, Vol. 17, No. 2/3, pp. 162-173, 2014-11. (SCIE,EI)
  464. Wang, Z. H., Jin, H., Wang, X. and Chang, C. C.*, "An Adaptable (n, n) Secret Image Sharing Mechanism Based on Boolean Operation," International Journal of Network Security, Vol. 16, No. 6 , pp. 483-489, 2014-11. (EI)
  465. Wang, F., Chang, C. C.* and Harn, L., "Simulatable and Secure Certificate-based Threshold Signature without Pairings," Security and Communication Networks, Vol. 7, No. 11, pp. 2094-2103, 2014-11. (SCIE,EI)
  466. Liu, Y., Harn, L. and Chang, C. C.*, "An Authenticated Group Key Distribution Mechanism Using Theory of Numbers," International Journal of Communication Systems, Vol. 27, No. 11, pp. 3502-3512., 2014-11. (SCIE,EI)
  467. Li, L., Hou, Q., Lu, J., Xu, Q., Dai, J., Mao, X. and Chang, C. C.*, "A New Pixels Flipping Method for Huge Watermarking Capacity of the Invoice Font Image," The Scientific World Journal, Special Issue on Recent Advances in Machine Learning Theory and Applications, Vol. 2014, 2014-11. (SCIE,EI)
  468. Chang, C. C.*, Cheng, T. F. and Wu, H. L., "An Authentication and Key Agreement Protocol for Satellite Communications," International Journal of Communication Systems, Vol. 27, No. 10, pp. 1994-2006, 2014-10. (SCIE,EI)
  469. Chang, C. C.* and Cheng, T. F., "A Provably Secure t-out-of-n Oblivious Transfer Mechanism Based on Blind Signature," J. of Information Hiding and Multimedia Signal Processing, Vol. 5, No. 1, pp. 1-12, 2014-10. (EI)
  470. Chang, C. C.*, Pai, P. Y., Tsai, M. H. and Liu, C. M., "A Novel Chicken Chorioallantoic Membrane Image Vessel Detection Detector Based on Statistic Color Distribution," J. of Information Hiding and Multimedia Signal Processing, Vol. 5, No. 4, pp. 789-805, 2014-10. (EI)
  471. Guo, C., Chang, C. C.* and Qin, C., "A Novel (n, t, n) Secret Image Sharing Scheme without a Trusted Third Party," Multimedia Tools and Applications, Vol. 72, No. 3, pp. 2195-2209., 2014-10. (SCIE,EI)
  472. Chang, C. C.* and Cheng, T. F., "A Secure Diverse Ticket-sale System in a Distributed Cloud Environment," The Computer Journal, Vol. 57, No. 10, pp. 1441-1459, 2014-10. (SCIE,EI)
  473. Dai, J., Liu, Y., Lu, J., Xu, J., Chang, C. C. and Li, L.*, "Watermarking Marbled Image Based on Linear Enhancement Hologram," J. of Information Hiding and Multimedia Signal Processing, Vol. 5, No. 4, pp. 757-768., 2014-10. (EI)
  474. Lyu, W. L., Chang, C. C.*, Nguyen, T. S. and Lin, C. C., "Image Watermarking Scheme Based on Scale-Invariant Feature Transform," KSII Transactions on Internet and Information Systems, Vol. 8, No. 10, pp. 3591-3606, 2014-10. (SCIE)
  475. Chang, C. C.*, Huynh, N. T. and Chung, T. F., "Efficient Searching Strategy for Secret Image Sharing with Meaningful Shadows," International Journal of Machine Learning and Computing, Vol. 4, No. 5, pp. 423-427., 2014-10. (EI)
  476. Liu, Y. and Chang, C. C.*, "A Database Encryption Scheme Based on the Generalized Aryabhata Remainder Theorem," J. of Information Hiding and Multimedia Signal Processing, Vol. 5, No. 4, pp. 603-613, 2014-10. (EI)
  477. Chang, C. C.*, Sun, C. Y. and Chang, S. C., "Practical Secure and High Efficient Authentication Scheme in Global Mobility Networks," Journal of Internet Technology, Vol. 15, No. 7, pp. 1091-1100, 2014-10. (SCIE,EI)
  478. Chang, C. C., Nguyen, T. S. and Lin, C. C*., "Reversible data embedding for indices based on histogram analysis," Journal of Visual Communication and Image Representation, Vol. 25, No. 7, pp. 1704-1716, 2014-10. (SCIE,EI)
  479. Liu, Y. and Chang, C. C.*, "A Secure Broadcasting Method Based on the Generalized Aryabhata Remainder Theorem," J. of Information Hiding and Multimedia Signal Processing, Vol. 5, No. 4, pp. 709-718, 2014-10. (EI)
  480. Chang, C. C., Nguyen, T. S. and Lin, C. C., "A Novel Compression Scheme based on SMVQ and Huffman Coding," International Journal of Innovative Computing Information and Control, Vol. 10, No. 3, pp. 1041-1050, 2014-10. (SCIE)
  481. Mao, Q., Bharanitharan, K. and Chang, C. C.*, "A Proxy User Authentication Protocol Using Source-Based Image Morphing," The Computer Journal, pp. 1-12, 2014-09. (SCIE,EI)
  482. Lu, T. C., Chang, C. C.* and Huang, Y. H., "High Capacity Reversible Hiding Scheme Based on Interpolation, Difference Expansion, and Histogram Shifting," Multimedia Tools and Applications, Vol. 72, No. 1, pp. 417-435, 2014-09. (SCIE,EI)
  483. Liu, Y., Wu, H. L. and Chang, C. C.*, "A Fast and Secure Scheme for Data Outsourcing in the Cloud," KSII Transactions on Internet and Information Systems, Vol. 8, No. 8, pp. 2708-2721, 2014-08. (SCIE)
  484. Wang, Z. H., Yang, H. R., Chang, C. C.*, Horng, G. and Huang, Y. H., "Lossless VQ Indices Compression Based on the High Correlation of Adjacent Image Blocks," KSII Transactions on Internet and Information Systems, Vol. 8, No. 8, pp. 2913-2929, 2014-08. (SCIE)
  485. Wang, Z. H.*, Mao, Q., Chang, C. C., Wu, Q. and Li, J., "A Data Lossless Message Hiding Scheme without Extra Information," Journal of Internet Technology, Vol. 15, No. 4, pp. 657-669, 2014-07. (SCIE,EI)
  486. Lin, C. H., Tharan, K.B. and Chang, C. C.*, "Comments and Proofs to Published Paper - A Novel Reversible Robust Watermarking Algorithm based on a Chaotic System," International Journal of Network Security, Vol. 16, No. 4, pp. 273-276, 2014-07. (EI)
  487. Chang, C. C.*, Harn, L. and Cheng, T. F., "Notes on "Polynomial-based Key Management for Secure Intra-group and Inter-group Communication"," International Journal of Network Security, Vol. 16, No. 4, pp. 405-410, 2014-07. (EI)
  488. Mao, Q., Chang, C. C.* and Chung, T. F., "A Reversible Steganography Suitable for Embedding Small Amounts of Data," International Journal of Network Security, Vol. 16, No. 4, pp. 304-312, 2014-07. (EI)
  489. Qin, C., Chang, C. C.* and Wang, S. T., "A Novel Lossless Steganographic Scheme for Data Hiding in Traditional Chinese Text Files," J. of Information Hiding and Multimedia Signal Processing, Vol. 5, No. 2, pp. 534-540, 2014-07. (EI)
  490. Chang, C. C., Nguyen, T. S., Lin, C. C.*, "Reversible Data Hiding Scheme for VQ Indices Based on Absolute Difference Trees," KSII Transactions on Internet and Information Systems, Vol. 8, No. 7, pp. 2572-2589, 2014-07. (SCIE)
  491. Chang, C. C., Chen, Y. H.* and Chuang, L. Y., "Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques," J. of Information Hiding and Multimedia Signal Processing, Vol. 5, No. 3, pp. 342-352, 2014-07. (EI)
  492. Nguyen, T. S., Chang, C. C.* and Chung, T. F., "A Tamper-Detection Scheme for BTC-Compressed Images with High-Quality Images," KSII Transactions on Internet and Information Systems, Vol. 8, No. 6, pp. 2005-2021, 2014-06. (SCIE)
  493. Huang, Y. H., Chang, C. C. and Wu, C. Y., "A DNA-based Data Hiding Technique with Low Modification Rates," Multimedia Tools and Applications, Vol. 70, No. 3, pp. 1439-1451., 2014-06. (SCIE,EI)
  494. Chang, C. C.*, Huynh, N. T. and Le, H. D., "Lossless and Unlimited Multi-image Sharing Based on Chinese Remainder Theorem and Lagrange Interpolation," Signal Processing, Vol. 99, pp. 159-170, 2014-06. (SCIE,EI)
  495. Harn, L, Miao, F. and Chang, C. C.*, "Verifiable Secret Sharing Based on the Chinese Remainder Theorem," Security and Communication Networks, Vol. 7, No. 6, pp. 950-957, 2014-06. (SCIE,EI)
  496. Nguyen, T. S., Chang, C. C.*, Lin, M. C., "Adaptive Lossless Data Hiding Scheme for SMVQ-Compressed Images using SOC Coding," Smart Computing Review, Vol. 4, No. 3, pp. 230-245, 2014-06. (EBSCO)
  497. Chen, X., Liu, Y., Chang, C. C.* and Guo, C., "Generalized Secret Sharing with Linear Hierarchical Secrets," International Journal of Network Security, No. 3, pp. 220-228, 2014-05. (EI)
  498. Chang, C. C., Nguyen, T. S., Lin, C. C.*, "Reversible Image Hiding for High Image Quality Based on Histogram Shifting and Local Complexity," International Journal of Network Security, Vol. 16, No. 3, pp. 201-213, 2014-05. (EI)
  499. Zhuang, X., Chang, C. C., Wang, Z. H. * and Zhu, Y., "A Simple Password Authentication Scheme Based on Geometric Hashing Function," International Journal of Network Security, Vol. 16, No. 3, pp. 237-243, 2014-05. (EI)
  500. Lee, J. S.*, Tsai, H. Y. and Chang, C. C., "A User-Friendly and Authenticatable Secret Image Sharing Scheme," Journal of Internet Technology, Vol. 15, No. 3, pp. 433-440, 2014-05. (SCIE,EI)
  501. Wang, Z. H., Wu, Q., Chang, C. C.*, Chan, C. S. and Yu, X., "Optimizing Modification Direction Data Hiding Methods Using Dynamic Programming Strategy," Accepted byJournal of Networks, 2014-04. (EI)
  502. Lin, C. C., Chang, C. C.* and Chen, Y. H., "A Novel SVD-based watermarking Scheme for Protecting Rightful Ownership of Digital Images," J. of Information Hiding and Multimedia Signal Processing, Vol. 5, No. 2, pp. 124-143, 2014-04. (EI)
  503. Horng, G., Huang, Y. H., Chang, C. C.* and Liu, Y., "(k, n)-Image Reversible Data Hiding," J. of Information Hiding and Multimedia Signal Processing, Vol. 5, No. 2, Apr. 2014, pp. 152-164., 2014-04. (EI)
  504. Liu, Y., Chang, C. C*. and Chang, S. C., "A Secure and Efficient t-out-of-n Oblivious Transfer Based on the Generalized Aryabhata Remainder Theorem," J. of Information Hiding and Multimedia Signal Processing, Vol. 5, No. 2, pp. 223-233, 2014-04. (EI)
  505. Wang, Z. H., Wang, D., Yang, H. R. and Chang, C. C.*, "A Novel Mutually-Authenticable Information-Hiding Scheme for a CAPTCHA Binary Image," Accepted byKSII Transactions on Internet and Information Systems, 2014-03. (SCIE)
  506. Qin, C., Chang, C. C.* and Chiu, Y. P., "A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting," IEEE Transactions on Image Processing, Vol. 23, No. 3, pp. 969-978, 2014-03. (SCIE,EI)
  507. Chang C. C.* and Cheng, T. F., "A Reliable Real-time Multicast Authentication Protocol with Provable Accuracy," Fundamenta Informaticae, Vol. 131, No. 2, pp. 167-186, 2014-03. (SCIE,EI)
  508. Wang, C. C., Chang, Y. F., Chang, C. C., Jan, J. K. and Lin, C. C.*, "A High Capacity Data Hiding Scheme for Binary Images Based on Block Patterns," Journal of Systems and Software, Vol. 93 , pp. 152-162., 2014-02. (SCIE,EI)
  509. Guo, C. and Chang, C. C.*, "An Authenticated Group Key Distribution Protocol Based on the Generalized Chinese Remainder Theorem," International Journal of Communication Systems, Vol. 27, No.1, pp. 126-134, 2014-01. (SCIE,EI)
  510. Wang, Z. H., Segalla Pizzolatti, M. and Chang, C. C*., "Efficient and Meaningful Multi-secret Image Sharing Based on Block Imitation," J. of Information Hiding and Multimedia Signal Processing, Vol. 5, No. 1, pp. 47-60, 2014-01. (EI)
  511. Liu, Y., Chang, C. C.* and Chang, S. C., "An Access Control Mechanism Based on the Generalized Aryabhata Remainder Theorem," International Journal of Network Security, Vol. 16, No. 1, pp. 58-64, 2014-01. (EI)
  512. Chang, C. C.*, Huang, Y. C. and Tsai, H. C., "Design and Analysis of Chameleon Hashing Based Handover Authentication Scheme for Wireless Networks," J. of Information Hiding and Multimedia Signal Processing, Vol. 5, No. 1, pp. 107-116, 2014-01. (EI)
  513. Liu, L., Wang, A.*, Chang, C. C. and Li, Z., "A Novel Real-time and Progressive Secret Image Sharing with Flexible Shadows Based on Compressive Sensing," Signal Processing: Image Communication, Vol. 29, No. 1, pp. 128-134, 2014-01. (EI)
  514. Chang, C. C., Wu, H. L., Wang, Z. H.* and Mao, Q., "An Efficient Smart Card Based Authentication Scheme Using Image Encryption," Journal of Information Science and Engineering, Vol. 29, No. 6, pp. 1135-1150, 2013-11. (SCIE,EI)
  515. Qin, C., Chang, C. C.* and Hsu, T. J., "Effective Fragile Watermarking for Image Authentication with High-quality Recovery Capability," KSII Transactions on Internet and Information Systems, Vol. 7, No. 11, pp. 2941-2956, 2013-11. (SCIE)
  516. Wang, Z. H., Yang, H. R., Cheng, T. F. and Chang, C. C.*, "A High-performance Reversible Data-hiding Scheme for LZW Codes," Journal of Systems and Software, Vol. 86, No. 11, pp. 2771-2778, 2013-11. (SCIE,EI)
  517. Chang, C. C. and Yang, J. H.*, "A Group-oriented Digital Right Management Scheme with Reliable and Flexible Access Policies," International Journal of Network Security, Vol. 15, No. 6 , pp. 471-477., 2013-11. (EI)
  518. Chang, C. C.*, Chou, Y. C. and Lin, C. Y., "An Indicator Elimination Method for Side-match Vector Quantization," J. of Information Hiding and Multimedia Signal Processing, Vol. 30, No. 4, pp. 233-249., 2013-10. (EI)
  519. Qin, C., Chang, C. C.* and Chen, Y. C., "Efficient Reversible Data Hiding for VQ-Compressed Images Based on Index Mapping Mechanism," Signal Processing, Vol. 93, No. 9, pp. 2687-2695, 2013-09. (SCIE,EI)
  520. Lee, J. S.*, Chang, C. C. and Wei, K. J., "Provably Secure Conference Key Distribution Mechanism Preserving the Forward and Backward Secrecy," International Journal of Network Security, Vol. 16, No. 2 , pp. 405-410., 2013-09. (EI)
  521. Chang, C. C.*, Chang, S. C. and Yang, J. H., "A Practical Secure and Efficient Enterprise Digital Rights Management Mechanism Suitable for Mobile Environment," Security and Communications Networks, Vol. 6, No. 8, pp. 972-984, 2013-08. (SCIE,EI)
  522. Guo, C. and Chang, C. C.*, "ElGamal-Based Weighted Threshold Signature Scheme," Information-An International Interdisciplinary Journal, Vol. 16, No. 8(B), pp. 6339-6348., 2013-08. (SCIE)
  523. Bharanitharan, K., Chen, B. W. and Chang, C. C.*, "Two Step Regionally Focused Algorithm for H.264/AVC Encoder," IETE Technical Review, Vol. 30, No. 4, pp. 280-285., 2013-08. (SCIE,EI)
  524. Qin, C., Chang, C. C.* and Chen, Y. C., "A Novel Reversible Data Hiding Scheme for VQ-Compressed Images Using Index Set Construction Strategy," KSII Transactions on Internet and Information Systems, Vol. 7, No. 8, pp. 2027-2041, 2013-08. (SCIE)
  525. Chang, C. C., Nguyen, T. S. and Lin, C. C.*, "A Blind Reversible Robust Watermarking Scheme for Relational Databases," The Scientific World Journal, Vol. 2013, 2013, pp. 1-12., 2013-08. (SCIE,EI)
  526. Qin, C., Chang, C. C., Lee, W. B. and Zhang, X., "A Secure Image Delivery Scheme with Regional Protection Capability Using Image Inpainting and Editing," The Imaging Science Journal, Vol. 61, No. 6, pp. 509-517, 2013-07. (SCIE,EI)
  527. Chang, C. C.*, Chang, S. C. and Yang, J. H., "A Digital Rights Management Mechanism for Mobile Social Platforms," ICIC Express Letters, Vol. 7, No. 7, pp. 1985-1990, 2013-07. (EI)
  528. Qin, C., Chang, C. C.*, Huang, Y. H. and Liao, L. T., "An Inpainting-Assisted Reversible Steganographic Scheme Using Histogram Shifting Mechanism," IEEE Trans. on Circuits and Systems for Video Technology, Vol. 23, No. 7, pp. 1109-1118, 2013-07. (SCIE,EI)
  529. Chang, C. C.*, Le, H. D. and Chang, C. H., "Novel Untraceable Authenticated Key Agreement Protocol Suitable for Mobile Communication," Wireless Personal Communications, Vol. 71, No. 1, pp. 425-437, 2013-07. (SCIE,EI)
  530. Cheng, Z. Y., Liu, Y. Chang, C. C. and Liu, C. X., "A Novel Biometric-based Remote User Authentication Scheme Using Quadratic Residues," Inte. J. of Information and Electronics Engineering, Vol. 3, No. 4, pp. 419-422, 2013-07. (EI)
  531. Tsai, H. C. and Chang, C. C.*, "Provably Secure Three Party Encrypted Key Exchange Scheme with Explicit Authentication," Information Sciences, Vol. 238, No. 20, pp. 242-249, 2013-07. (SCIE,EI)
  532. Zhuang, X., Wang, Z. H., Chang, C. C. and Zhu, Y., "Security Analysis of a new Ultra-lightweight RFID Protocol and Its Improvement," J. of Information Hiding and Multimedia Signal Processing, Vol. 4, No. 3, pp. 166-177, 2013-07. (EI)
  533. Chang, C. C.*, Lin, C. C. and Liao, L. T., "A DCT-based Dual Watermark Scheme for Image Authentication and Recovery," Advance in Information Science and Service Science, Vol. 5, No. 12, pp. 56-69., 2013-07.
  534. Harn, L., Chang, C. C. and Wu, H. L., "An Anonymous Multi-Receiver Encryption Based on RSA," International Journal of Network Security, Vol. 15, No. 4, pp. 307-312., 2013-07. (EI)
  535. Guo, C. and Chang, C. C., "Chaotic Maps-Based Password-Authenticated Key Agreement Using Smart Cards," Communications in Nonlinear Science and Numerical Simulation, Vol. 18, No. 6, June 2013, pp. 1433-1440, 2013-06. (SCIE,EI)
  536. Mao, Q., Chang, C. C.* and Wu, H. L., "An Image Encryption Scheme Based on Concatenated Torus Automorphisms," KSII Transactions on Internet and Information Systems, Vol. 7, No. 6, pp. 1492-1511, 2013-06. (SCIE)
  537. Li, L.*, Ma, Y. Y., Chang, C. C. and Lu, J. F., "Analyzing and Removing SureSign Watermark," Signal Processing, Vol. 93, No. 5, pp. 1374-1378, 2013-05. (SCIE,EI)
  538. Liu, Y., Chang, C. C.* and Chang, S. C., "A Residual Number System Oriented Group Key Distribution Mechanism," Inter. J. of Information Processing and Management, Vol. 4, No. 3, pp. 146-155, 2013-05. (EI)
  539. Liu, Y., Chang, C. C.* and Chang, S. C., "An Efficient Oblivious Transfer Protocol Using Residue Number System," International Journal of Network Security, Vol. 15, No. 3, pp. 212-218, 2013-05. (EI)
  540. Qin, C., Chang, C. C.* and Chen, K. N., "Adaptive Self-recovery for Tampered Images Based on VQ Indexing and Inpainting," Signal Processing, Vol. 93, No. 4, pp. 933-946, 2013-04. (SCIE,EI)
  541. Wang, Z. H., Pizzolatti, M. S. and Chang, C. C.*, "Reversible Visual Secret Sharing Based on Random Grids for Two-Image Encryption," Inter. Journal of Innovative Computing, Info. and Control, Vol. 9, No. 4, pp. 1691-1701, 2013-04. (EI)
  542. Guo, C., Chang, C. C.* and Sun, C. Y., "Chaotic Maps-Based Mutual Authentication and Key Agreement using Smart Cards for Wireless Communications," J. of Information Hiding and Multimedia Signal Processing, Vol. 4, No. 2, pp. 99-109, 2013-04. (EI)
  543. Lin, P. Y., Chen, Y. H., Chang, C. C.* and Lee, J. S., "Contrast-Adaptive Removable Visible Watermarking (CARVW) Mechanism," Image and Vision Computing, Vol. 31, No. 4, pp. 311-321, 2013-04. (SCIE,EI)
  544. Chang, C. C.*, Cheng, T. F. and Chen, W. Y., "A Novel Electronic English Auction System with a Secure On-shelf Mechanism," IEEE Transactions on Information Forensics and Security, Vol. 8, No. 4, pp. 657-668, 2013-04. (SCIE,EI)
  545. Wang, Z. H., Chen, K. N., Chang, C. C.*, Chen, P. Y. and Lee, C. F., "A Lossless Information Hiding Scheme with Large Payload Using Prediction Error Composition," Accepted byKSII Transactions on Internet and Information Systems, 2013-04. (SCIE)
  546. Chang, C. C.*, Chen, K. N., Wang, Z. H. and Li, M. C., "Lossless Information Hiding in the VQ Index Table," Journal of Software, Vol. 8, No. 3, pp. 547-553, 2013-03. (EI)
  547. Chang, C. C. Wu, C. C. and Lin, I. C.*, "A Verifiable Key Management Scheme in Hierarchical Ad Hoc Networks," Information-An International Interdisciplinary Journal, Vol. 16, No. 3(A), pp. 1929-1944, 2013-03. (SCIE)
  548. Wang, X. T., Chang, C. C., Nguyen, T. S. and Li, M. C., "Reversible Data Hiding For High Quality Image Exploiting Interpolation and Direction Order Mechanism," Digital Signal Processing, Vol. 23, No. 2, pp. 569-577, 2013-03. (SCIE,EI)
  549. Qin, C., Chang, C. C.* and Tsou, P. L., "Robust Image Hashing Using Non-Uniform Sampling in Discrete Fourier Domain," Digital Signal Processing, Vol. 23, No.2, pp. 578-585, 2013-03. (SCIE,EI)
  550. Wang, Z. H., Chang, C. C.* and Lin, T. Y., "An Efficient Information Hiding Scheme Based on Closest Paired Tree Structure Vector Quantization," Journal of Electronic Science and Technology, Vol. 11, No. 1, pp. 15-19, 2013-03. (EI)
  551. Wang, Z. H., Guo, C. and Chang, C. C.*, "A Novel (n, n) Secret Image Sharing Scheme Based on Sudoku," Journal of Electronic Science and Technology, Vol. 11, NO. 1, pp. 44-50, 2013-03. (EI)
  552. Chang, C. C., Nguyen, T. S. and Lin, C. C., "Distortion-Free Data Embedding Scheme for High Dynamic Range Images," Journal of Electronic Science and Technology, Vol. 11, No. 1, pp. 20-26, 2013-03. (EI)
  553. Chang, C. C.* and Lee, C. Y., "A Smart Card-based Authentication Scheme Using User Identify Cryptography," International Journal of Network Security, Vol. 15, No. 2, pp. 139-147, 2013-03. (EI)
  554. Qin, C., Chang, C. C.* and Tsou, P. L., "Dictionary-Based Data Hiding Using Image Hashing Strategy," Inter. Journal of Innovative Computing, Info. and Control, Vol. 9, No. 2, pp. 599-610, 2013-02. (EI)
  555. Mao, Q., Tharan, K.B. and Chang, C. C.*, "Edge Directed Automatic Control Point Selection Algorithm for Image Morphing," IETE Technical Review, 2013-02. (SCIE,EI)
  556. Chang, C. C.* and Yang, J. H., "A Division Algorithm Using Bisection Method in Residue Number System," International journal of Computer, Consumer and Control, Vol. 2, No. 1, pp. 59-66, 2013-02.
  557. Cheng, Z. Y., Liu, Y., Chang, C. C. and Chang, S. C., "A Practical Secure Chaos-Based Group Key Agreement Protocol Suitable for Distributed Network Environment," Inter. Journal of Innovative Computing, Info. and Control, Vol. 9, No. 3, pp. 1-10, 2013-01. (EI)
  558. Cheng, Z. Y., Liu, Y., Chang, C. C.* and Chang, S. C., "Authenticated RFID Security Mechanism Based on Chaotic Maps," Security and Communication Networks, Vol. 6, No. 2, pp. 247-256, 2013-01. (SCIE,EI)
  559. Guo, C. and Chang, C. C.*, "A Construction for Secret Sharing Scheme with General Access Structure," J. of Information Hiding and Multimedia Signal Processing, Vol. 4, No. 1, pp. 1-8, 2013-01. (EI)
  560. Cheng, Z. Y., Liu, Y., Chang, C. C.* and Guo, C., "A Fault-tolerant Group Key Agreement Protocol Exploiting Dynamic Setting," International Journal of Communication Systems, Vol. 26, No. 2, pp. 259-275, 2013-01. (SCIE,EI)
  561. Cheng, Z. Y., Liu, Y., Chang, C. C.* and Chang, S. C., "Advanced Constantly Updated RFID Access Control Protocol Using Challenge-Response and Indefinite-Index," Inter. Journal of Innovative Computing, Info. and Control, Vol. 8, No. 12, pp. 8341-8354, 2012-12. (EI)
  562. Qin, C., Chang C. C.* and Liao, L. T., "An Adaptive Prediction-Error Expansion Oriented Reversible Information Hiding Scheme," Pattern Recognition Letters, Vol. 33, No. 16, pp. 2166-2172, 2012-12. (SCIE,EI)
  563. Chang, C. C., Lin, C. Y. and Hsieh, Y. P., "Data Hiding for Vector Quantization Images Using Mixed-Base Notation and Dissimilar Patterns without Loss of Fidelity," Information Sciences, Vol. 201, pp. 70-79, 2012-10. (SCIE,EI)
  564. Chang, C. C.*, Chang, S. C. and Chen, Y. W., "Novel Efficient User Authentication Protocol for Wireless Sensor Networks Using One-Way Hash Function," ICIC Express Letters, Vol. 6, No. 10, pp. 2535-2540, 2012-10. (EI)
  565. Chan, C. S., Chang, C. C. and Hung, P. V., "A User-Friendly Image Sharing Scheme Using JPEG-LS Median Edge Predictor," J. of Information Hiding and Multimedia Signal Processing, Vol. 3, No. 4, pp. 340-351, 2012-10. (EI)
  566. Chang, C. C., Huang, Y. H., Tsai, H. Y. and Qin, C., "Prediction-Based Reversible Data Hiding with High Image Quality Using the Difference of Neighboring Pixels," International Journal of Electronics and Communications, Vol. 66, No.9, pp. 758-766, 2012-09. (SCIE,EI)
  567. Qin, C., Chang, C. C.* and Tsou, P. L., "Perceptual Image Hashing Based on the Error Diffusion Halftone Mechanism," Inter. Journal of Innovative Computing, Info. and Control, Vol. 8, No. 9, pp. 6161-6172, 2012-09. (EI)
  568. Chen, K. N., Chen, C. H. and Chang, C. C., "Efficient Illumination Compensation Techniques for Text Images," Digital Signal Processing, Vol. 22, No. 5, pp. 726-733, 2012-09. (SCIE,EI)
  569. Guo, C., Chang, C. C. and Qin, C., "A Multi-threshold Secret Image Sharing Scheme Based on MSP," Pattern Recognition Letters, Vol. 33, No. 12, pp. 1594-1600, 2012-09. (SCIE,EI)
  570. Tang, J., Jiang, B., Chang C. C. and Bin, L., "Graph Structure Analysis Based on a Complex Network," Digital Signal Processing, Vol. 22, No. 5, pp. 713-725, 2012-09. (SCIE,EI)
  571. Chang, C. C., Nguyen, T. S. and Lin, C. C., "A Novel VQ-based Reversible Data Hiding Scheme by Using Hybrid Encoding Strategies," Journal of Systems and Software, Vol. 86, No. 2, pp. 389-402, 2012-09. (SCIE,EI)
  572. Lin, C. C., Chang, C. C. and Chen, Y. H., "Reversible Data Embedding Scheme Using Relationships between Pixel-Values and Their Neighbors," Journal of Electronic Science and Technology, Vol. 10, No. 3, pp. 238-249, 2012-09. (EI)
  573. Guo, C. and Chang, C. C.*, "Proactive Weighted Threshold Signature Based on Generalized Chinese Remainder Theorem," Journal of Electronic Science and Technology, Vol. 10, No. 3, pp. 250-255, 2012-09. (EI)
  574. Cheng, Z. Y., Liu, Y., Chang, C. C.* and Chang, S. C., "A Smart Card Based Authentication Scheme for Remote User Login and Verification," Inter. Journal of Innovative Computing, Info. and Control, Vol. 8, No. 8, pp. 5499-5511, 2012-08. (EI)
  575. Qin, C., Wang, Z. H., Chang, C. C. and Chen, K. N., "Reversible Data Hiding Scheme Based on Image Inpainting," Fundamenta Informaticae, Vol. 120, pp. 59-70, 2012-08. (SCIE,EI)
  576. Qin, C, Chang, C. C. and Guo, C., "Perceptual Robust Image Hashing Scheme Based on Secret Sharing," Journal of Computer Research and Development, Vol. 49, No. 8, pp. 1690-1698, 2012-08. (EI)
  577. Pai, P. Y., Chang, C. C., Chan, Y. K., Tsai, M. H. and Guo, S. W., "An Image Segmentation-Based Thresholding Method," Journal of Imaging Science and Technology, Vol. 56, No. 3, pp. 1-22., 2012-08. (SCIE)
  578. Pai, P. Y., Chang, C. C., Chan, Y. K. and Liu, C. M., "An ROI-Based Medical Image Hiding Method," Inter. Journal of Innovative Computing, Info. and Control, Vol. 8, No. 7, pp. 1-13, 2012-07. (EI)
  579. Wang, Z. H., Chang, C. C.* and Pizzolatti, M. S, "A Novel Vector Quantization Technique Using Block Mining in Image Compression," Advances in Information Sciences and Service Sciences, Vol. 4, No. 12,pp. 89-97., 2012-07. (EI)
  580. Wang, Z. H., Chang, C. C. and Li, M. C., "Optimizing Least-significant-bit Substitution Using Cat Swarm Optimization Strategy," Information Sciences, Vol. 192, No. 1, pp. 98-108, 2012-06. (SCIE,EI)
  581. Wang, X. T., Chang, C. C., Lin, C. C. and Li, M. C., "A Novel Multi-group Exploiting Modification Direction Method Based on Switch Map," Signal Processing, Vol. 92, No. 6, pp. 1525-1535, 2012-06. (SCIE)
  582. Guo, C., Chang, C. C., Qin, C. and Li, M. C., "Encryption Scheme for Weighted Threshold Authentication," Journal of Applied Sciences - Elec. and Inf. Engineering, Vol. 30, No. 3, pp. 251-255, 2012-05. (EI)
  583. Liu, Y.*, Cheng, Z. Y., Chang, C. C. and Zhang, Z. J, "A Secure Dynamic Identity Based Remote User Authentication Scheme Using Secret Sharing," Journal of Internet Technology, Vol. 13, No. 3, pp. 463-470, 2012-05. (SCIE,EI)
  584. Qin, C., Chang, C. C. and Chen, P. Y., "Self-Embedding Fragile Watermarking with Restoration Capability Based on Adaptive Bit Allocation Mechanism," Signal Processing, Vol. 92, No. 4, pp. 1137-1150, 2012-04. (SCIE)
  585. Yang, J. H. and Chang, C. C., "A Low Computational-cost Electronic Payment Scheme for Mobile Commerce with Large-scale Mobile Users," Wireless Personal Communications, Vol. 63, No. 1, pp. 83-99, 2012-03. (SCIE,EI)
  586. Guo, C., Chang, C. C. and Qin, C., "Multi-Threshold Visual Secret Sharing," Advance in Information Science and Service Science, Vol. 4, No. 4 pp. 195-201, 2012-03. (EI)
  587. Kieu, T. D. and Chang, C. C., "Reversible Watermarking Schemes Based on Expansion Embedding Using Pixel Partition Strategies," Imaging Science Journal, Vol. 60, pp. 112-124, 2012-02. (SCIE,EI)
  588. Chen, Y. H. and Chang, C. C., "Image Tamper Detection and Recovery Based on Dual Watermarks Sharing Strategy," Journal of Digital Information Management, Vol. 10, No. 1, pp. 39-49, 2012-02. (EI)
  589. Chang, C. C. and Lee, C. Y., "A Secure Single Sign-on Mechanism for Distributed Computer Networks," IEEE Transactions on Industrial Electronics, Vol. 59, No. 1, PP. 629~637, 2012-01. (SCIE,EI)
  590. Guo, C., Chang, C. C. and Wang, Z. H., "A New Data Hiding Scheme Based on DNA Sequence," Inter. Journal of Innovative Computing, Info. and Control, Vol. 8, No. 1(A), pp. 139-149, 2012-01. (EI)
  591. Chang, C. C. and Hsieh, Y. P., "A Fast VQ Codebook Search with Initialization and Search Order," Information Sciences, Vol. 183, No. 1, pp. 132-139, 2012-01. (SCIE,EI)
  592. Cheng, Z. Y., Liu, Y., Chang, C. C. and Chang, S. C., "An Improved Protocol for Password Authentication Using Smart Cards," Journal of Computers, Vol. 22, No. 4, pp. 28-37, 2012-01. (EI)
  593. Cui, S. Y., Wang, Z. H., Chang, C. C. and Li, M. C., "A Data Hiding Scheme Based on Voronoi Diagram," Journal of Computers, Vol. 22, No. 4, pp. 47-58, 2012-01. (EI)
  594. Guo, C., Chang, C. C. and Qin, C., "A Hierarchical Threshold Secret Image Sharing," Pattern Recognition Letters, Vol. 33, No. 1, pp. 83-91, 2012-01. (SCIE,EI)
  595. Pai, P. Y., Chang, C. C. and Chan, Y. K., "Nucleus and Cytoplast Contour Detector from a Cervical Smear Image," Expert Systems with Applications, Vol. 39, No. 1, pp. 154-161, 2012-01. (SCIE)
  596. Chang, C. C., Hsieh, Y. P. and Liao, C. C., "A Visual Secret Sharing Scheme for Progressively Restoring Secrets," Journal of Electronic Science and Technology, Vol. 9, No. 4, pp. 325-331, 2011-12. (EI)
  597. Kieu, T. D. and Chang, C. C., "A Reversible Watermarking Scheme with High Payload and Good Visual Quality for Watermarked Images," Inter. Journal of Innovative Computing, Info. and Control, Vol. 7, No. 11, pp. 6203-6218, 2011-11. (SCIE)
  598. Lee, C. Y., Wang, Z. H., Harn, L. and Chang, C. C., "Secure Key Transfer Protocol Based on Secret Sharing for Group Communications," IEICE Transactions on Information and Systems, Vol. E94-D, No. 11, pp. 2069-2076, 2011-11. (SCIE,EI)
  599. Chen, C. C. and Chang, C. C., "Hiding Secret Information in Lossless Compression Codes," Inter. Journal of Innovative Computing, Info. and Control, Vol. 7, No. 10, pp. 5881-5892, 2011-10. (SCIE)
  600. Chang, C. C., Tsai, H. C. and Huang, Y. C., "Provably Secure High Entropy Three-party Authenticated Key Exchange Scheme for Network Environments," Inter. Journal of Innovative Computing, Info. and Control, Vol. 7, No. 10, pp. 5619-5630, 2011-10. (SCIE)
  601. Chang, C. C., Nguyen, T. S. and Lin, C. C., "A Reversible Data Hiding Scheme for VQ Indices Using Locally Adaptive Coding," Journal of Visual Communication and Image Representation, Vol. 22, No. 7, pp. 664-672, 2011-10. (SCIE,EI)
  602. Lee, C. F., Chang, C. C. and Wu, C. Y., "A High Payload Multiple Embedding Scheme Based Reversible Data Hiding," Journal of Computers, Vol. 22, No. 3, pp. 78-94, 2011-10. (EI)
  603. Lee, C. F., Huang, Y. H., Chang, C. C. and Liu, T. C., "A Prediction-Based Adaptive Reversible Data Embedding Scheme," Journal of Software, Vol. 6, No. 9, pp. 1813-1820, 2011-09. (EI)
  604. Chang, C. C. and Lee, C. Y., "A Secure E-mail Protocol for Mobile Devices," Inter. Journal of Innovative Computing, Info. and Control, Vol. 7, No. 9, pp. 5353-5362, 2011-09. (SCIE)
  605. Chang, C. C., Chen, K. N., Lee, C. F. and Liu, L. J., "A Secure Fragile Watermarking Scheme Based on Chaos-and-Hamming Code," Journal of Systems and Software, Vol. 84, No. 9, pp. 1462-1470, 2011-09. (SCIE,EI)
  606. Chang, C. C. and Cheng, T. F., "A Robust and Efficient Smart Card Based Remote Login Mechanism for Multi-Server Architecture," Inter. Journal of Innovative Computing, Info. and Control, Vol. 7, No. 8, pp. 4589-4602, 2011-08. (SCIE)
  607. Guo, C., Wang, Z. H., Chang, C. C. and Qin, C., "A Secret Image Sharing Scheme with High Quality Shadows Based on Exploiting Modification Direction," Journal of Multimedia, Vol. 6, No. 4, pp. 341-348, 2011-08. (EI)
  608. Harn, L., Lee, C. Y., Lin, C. and Chang, C. C., "Fully Deniable Message Authentication Protocols Preserving Confidentiality," The Computer Journal, Vol. 54, No. 10, pp. 1688-1699, 2011-08. (SCIE,EI)
  609. Lin, P. Y., Lee, J. S. and Chang, C. C., "Protecting the Content Integrity of Digital Imagery with Fidelity Preservation," ACM Trans. on Multimedia Computing Comm. and Applications, Vol. 7, No. 3, Article15:1-Article15:20, 2011-08. (SCIE)
  610. Li, L., Xu, H. and Chang, C. C., "Rotation Invariant Image Copy Detection Using DCT Domain," Inter. Journal of Innovative Computing, Info. and Control, Vol. 7, No. 7(A), pp. 3633-3644, 2011-07. (SCIE)
  611. Chang, C. C., Chen, K. N. and Lin, H. C., "Novel Magic Matrices Generation Method for Secret Messages Embedding," Int. Journal of Computer Sciences and Engineering Systems, Vol. 5, No. 3, pp. 235-241, 2011-07.
  612. Le, T. H. N., Lin, C. C., Chang, C. C.and Le, H. B., "A High Quality and Small Shadow Size Visual Secret Sharing Scheme Based on Hybrid Strategy for Grayscale Images," Digital Signal Processing, Vol. 21, No. 6, pp. 734-745, 2011-07. (SCIE,EI)
  613. Chang, C. C., Lin, C. C. and Tu, H. N., "Safeguarding Visual Information Using (t,n) Verifiable Secret Shares," Journal of Computers, Vol. 22, No. 2, pp. 72-88, 2011-07. (EI)
  614. Lee, C. F., Chen, K. N., Chang, C. C. and Tsai, M. C., "A Hierarchical Fragile Watermarking with VQ Index Recovery," Journal of Multimedia, Vol. 6, No. 3, pp. 277-284, 2011-06. (EI)
  615. Chang, C. C., Chen, K. N. and Tu, H. N., "Lossless Secret Sharing Scheme with High Quality Shares Based on VQ-Compressed Images," Inter. J. of Pattern Recognition and Artificial Intelligence, Vol. 25, No. 4, pp. 529-546, 2011-06. (SCIE,EI)
  616. Chang, C. C. and Lai, Y. P., "An Adaptive Liner Regression Approach to Still Image Compression," Inter. Journal of Innovative Computing, Info. and Control, Vol. 7, No. 6, pp. 3047-3057, 2011-06. (SCIE)
  617. Li, L., Yang, F. and Chang, C. C., "A Reversible Watermarking Algorithm Based on Four-Neighbors Context Prediction for Tongue Images," International Journal of Intelligent Information Processing, Vol. 2, No. 2, pp. 22-28, 2011-06.
  618. Li, L., Wang, R. L. and Chang, C. C., "A Digital Watermark Algorithm for QR Code," International Journal of Intelligent Information Processing, Vol. 2, No. 2, pp. 29-36, 2011-06.
  619. Lin, P. Y. and Chang, C. C., "Cheating Resistance and Reversibility Oriented Secret Sharing Mechanism," IET Information Security, Vol. 5, No. 2, pp. 81-92, 2011-06. (SCIE,EI)
  620. Cui, J., Huang, L., Zhong, H., Chang, C. C. and Yang, W., "An Improved AES S-box And Its Performance Analysis," Inter. Journal of Innovative Computing, Info. and Control, Vol. 7, No. 5(A), pp. 2291-2302, 2011-05. (SCIE,EI)
  621. Pai, P. Y., Chang, C. C., Chan, Y. K. and Tsai, M. H., "An Adaptable Threshold Detector," Information Sciences, Vol. 181, No. 8, pp. 1463-1483, 2011-04. (SCIE,EI)
  622. Kieu, T. D. and Chang, C. C., "A Steganographic Scheme by Fully Exploiting Modification Directions," Expert Systems with Applications, Vol. 38, No. 8, pp. 10648-10657, 2011-04. (SCIE)
  623. Chang, C. C., Chen, K. N. and Tsai, M. H., "Reversible Watermarking Using Two-passed Threshold Decision," Accepted byJournal of Multimedia, 2011-04. (EI)
  624. Wang, Z. H., Chang, C. C., Li, M. C. and Lu, T. C., "A Simple Image Encoding Method with Data Lossless Information Hiding," Journal of Networks, Vol. 6, No. 3, pp. 400-407, 2011-03. (EI)
  625. Chang, C. C., Lin, C. Y. and Fan, Y. H., "Reversible Steganography for BTC-compressed Images," Fundamenta Informaticae, Vol. 109, No. 2, pp. 121-134, 2011-03. (SCIE,EI)
  626. Pai, P. Y., Chang, C. C., Chan, Y. K. and Liao, C. C., "Meaningful Shadow Based Multiple Gray Level Visual Cryptography without Size Expansion," Inter. Journal of Innovative Computing, Info. and Control, Vol. 7, No. 3, pp. 1457-1465, 2011-03. (SCIE)
  627. Wang, Z. H., Chang, C. C., Tu, H. N. and Li, M. C., "Reversible Data Hiding for VQ Indices Using Prediction Errors," Inter. J. of Innovative Computing, Information and Control, Vol. 7, No. 3, PP. 1375~1385, 2011-03. (SCIE)
  628. Chang, C. C., Chen, Y. H. and Wang, H. C., "Meaningful Secret Sharing Technique with Authentication and Remedy Abilities," Information Sciences, Vol. 181, No. 14, pp. 3073-3084, 2011-03. (SCIE,EI)
  629. Wang, Z. H., Chang, C. C., Tu, H. N. and Li, M. C., "Sharing a Secret Image in Binary Images with Verification," J. of Information Hiding and Multimedia Signal Processing, Vol. 2, No. 1, PP. 78~90, 2011-01. (EI)
  630. Li, L., Xu, H. H., Chang, C. C. and Ma, Y. Y., "A Novel Image Watermarking in Redistributed Invariant Wavelet Domain," Journal of Systems and Software, Vol. 84, No. 6, pp. 923-929, 2011-01. (SCIE,EI)
  631. Wang, Z. H., Chang, C. C. and Tsai, P. Y., "Hiding Secret Data in an Image Using Codeword Imitation," Journal of Information Processing Systems, Vol. 6, No. 4, PP. 1~9, 2010-12.
  632. Chang, C. C. and Tsai, H. C., "An Anonymous and Self-verified Mobile Authentication with Authenticated Key Agreement for Large-scale Wireless Networks," IEEE Transactions on Wireless Communications, Vol. 9, No. 11, PP. 3346~3353, 2010-11. (SCIE)
  633. Wang, Z. H., Chang, C. C., Chen, K. N. and Li, M. C., "An Encoding Method for Both Image Compression and Data Lossless Information Hiding," Journal of Systems and Software, Vol. 83, No. 11, PP. 2073~2082, 2010-11. (SCIE,EI)
  634. Wang, C. C., Hwang, Y. T., Chang, C. C., and Jan, J. K., "Hiding Information in Binary Images with Complete Reversibility and High Embedding Capacity," Inter. Journal of Innovative Computing, Info. and Control, Vol. 6, No. 11, PP. 5143~5161, 2010-11. (SCIE)
  635. Chan, Y. K., Pai, P. Y., Chen, R. C. and Chang, C. C., "A VQ Compression Method Based on the Variations of the Image Block Groups," Inter. J. of Innovative Computing, Information and Control, Vol. 6, No. 10, PP. 4527~4537, 2010-10. (SCIE,EI)
  636. Lee, J. S., Lin, P. Y. and Chang, C. C., "Lightweight Secure Roaming Mechanism between GPRS/UMTS and Wireless LANs," Wireless Personal Communications, Vol. 52, No. 4, PP. 569~580, 2010-10. (SCIE,EI)
  637. Wu, C. C., Lin, C. C. and Chang, C. C., "Digital Rights Management for Multimedia Content over 3G Mobile Networks," Expert Systems with Applications, Vol. 37, No. 10, PP. 6787~6797, 2010-10. (SCIE)
  638. Chang, C. C., Lin, C. C. and Li, K. M., "A Removable Visible Watermark for Digital Images," Journal of Computers, Vol. 21, No. 3, PP. 37~49, 2010-10. (EI)
  639. Chang, C. C., Chen, K. N. and Wang, Z. H., "Hiding Secret Information in Modified Locally Adaptive Data Compression Code," ICIC Express Letters, Vol. 4, No. 5(B), PP. 1887~1892, 2010-10. (EI)
  640. Chang, C. C., Chang, S. C. and Lai, Y. W., "An Improved Biometrics-based User Authentication Scheme without Concurrency System," International Journal of Intelligent Information Processing, Vol. 1, No. 1, pp. 41-49, 2010-09.
  641. Lee, J. S., Lin, P. Y. and Chang, C. C., "Analysis of an Image Secret Sharing Scheme to Identify Cheaters," International Journal of Image Processing, Vol. 4, No. 4, pp. 287-292, 2010-09.
  642. Chang, C. C., Yang, J. H. Wang, D. W., "An Efficient and Reliable E-DRM Scheme for Mobile Environments," Expert Systems with Applications, Vol. 37, No. 9, PP. 6176~6181, 2010-09. (SCIE)
  643. Chang, C. C. and Kieu, T. D., "A Reversible Data Hiding Scheme Using Complementary Embedding Strategy," Information Sciences, Vol. 180, No. 16, PP. 3045~3058, 2010-08. (SCIE,EI)
  644. Chang, C. C., Li, B. and Lee, J. S., "Secret Sharing Using Visual Cryptography," Journal of Electronic Science and Technology, Vol. 8, No. 4, PP. 289~299, 2010-08. (EI)
  645. Chang, C. C., Huang, Y. H. and Li, T. C., "Reversible Secret Sharing with Distortion Control Mechanism," ICIC Express Letters, Part B, Vol. 1, No. 2, PP. 163~167, 2010-07. (EI)
  646. Chang, C. C., Lee, J. S. and Le, T. H. N., "Hybrid Wet Paper Coding Mechanism for Steganography Employing n-Indicator and Fuzzy Edge Detector," Digital Signal Processing, Vol.20, No. 4, PP. 1286~1307, 2010-07. (SCIE,EI)
  647. Chang, C. C. and Chang, S. C.,, "An Efficient Internet On-line Transaction Mechanism," Inter. Journal of Innovative Computing, Info. and Control, Vol. 6, No. 7, PP. 3239~3245, 2010-07. (SCIE)
  648. Yin, Z. X., Chang, C. C. and Zhang, Y. P., "An Information Hiding Scheme Based on (7,4) Hamming Code Oriented Wet Paper Codes," Inter. Journal of Innovative Computing, Info. and Control, Vol. 6, No. 7, PP. 3121~3130, 2010-07. (SCIE)
  649. Li, Y. C., Chang, C. C. and Yeh, C. M., "Data Hiding Based on the Similarity between Neighboring Pixels with Reversibility," Digital Signal Processing, Vol. 20, No. 4, PP. 1116~1128, 2010-07. (SCIE)
  650. Xiong, N., Vasilakos, A. V., Yang, L. T., Wang, C. X., Kannan, R., Chang, C. C., Pan, Y., "A Novel Self-tuning Feedback Controller for Active Queue Management Supporting TCP Flows," Information Sciences, Vol. 180, No. 11, PP. 2249~2263, 2010-06. (SCIE,EI)
  651. Chang, C. C., Pai, P. Y., Yeh, C. M. and Chan, Y. K., "A High Payload Frequency Based Reversible Image Hiding Method," Information Sciences, Vol. 180, No. 11, PP. 2286~2298, 2010-06. (SCIE,EI)
  652. Chang, C. C., Lee, C. Y., Chen, C. C. and Wang, Z. H., "A Data-hiding Scheme Based on One-way Hash Function," Inter. Journal of Multimedia Intelligence and Security, Vol. 1, No. 3, PP. 285~297, 2010-06.
  653. Lin, C. N., Buehrer, D. J., Chang, C. C. and Lu, T. C., "Using Quad Smoothness to Efficiently Control Capacity–distortion of Reversible Data Hiding," Journal of Systems and Software, Vol. 83, PP. 1805~1812, 2010-06. (SCIE,EI)
  654. Chang, C. C., Yeh, J. S. and Yang, J. H., "Generalized Aryabhata Remainder Theorem," Inter. Journal of Innovative Computing, Info. and Control, Vol. 6, No. 4, PP. 1865~1871, 2010-04. (SCIE)
  655. Yang, J. H. and Chang, C. C., "An Efficient Payment Scheme by Using Electronic Bill of Lading," Inter. Journal of Innovative Computing, Info. and Control, Vol. 6, No. 4, PP. 1773~1779, 2010-04. (SCIE)
  656. Lee, C. F., Chang, C. C., Pai, P. Y. and Huang, W. H., "An Effective Demosaicing Algorithm for CFA Image," Inter. Journal of Innovative Computing, Info. and Control, Vol. 6, No. 4, PP. 5485~5499, 2010-04. (SCIE)
  657. Chen, C. C. and Chang, C. C., "A Digital Image and Secret Messages Sharing Scheme Using Two Stego Images," Inter. Journal of Innovative Computing, Info. and Control, Vol. 6, No. 4, PP. 5797~5807, 2010-04. (SCIE)
  658. Chen, W. J., Chang, C. C. and Le, T. H. N., "High Payload Steganography Mechanism Using Hybrid Edge Detector," Expert Systems with Applications (ESWA 2010), Vol. 37, No. 4, PP. 3292~3301, 2010-04. (SCIE)
  659. Chang, C. C., Tsai, H. C. and Hsieh, Y. P., "An Efficient and Fair Buyer-Seller Fingerprinting Scheme for Large Scale Networks," Computers & Security, Vol. 29, No. 2, PP. 269~277, 2010-03. (SCIE)
  660. Chang, C. C., Lee, C. Y. and Chiu, Y. C., "An Efficient E-mail Protocol Providing Perfect Forward Secrecy for Mobile Devices," International Journal of Communication Systems, Vol. 23, PP. 1463~1473, 2010-03. (SCIE,EI)
  661. Chang, C. C. and Chang, S. C., "The Design of E-Traveler's Check with Efficiency and Mutual Authentication," Journal of Networks, Vol. 5, No. 3, PP. 275~282, 2010-03. (EI)
  662. Chang, C. C., Lin, C. C.* and Huynh, N. T., "A Visual Secret Sharing Scheme with Verification Mechanism," Inte. J. of Computer Science and Engineering Systems, Vol. 4, No. 1, 2010-03.
  663. Chang, C. C., Lin, P. Y. and Chuang, J. C., "A Grayscale Image Steganography Based upon Discrete Cosine Transformation," Journal of Digital Information Management (JDIM), Vol. 8, No. 2, PP. 88~94, 2010-02.
  664. Wu, C. C., Chang, C. C. and Lin, I. C., "3GPP SIM-based Authentication Schemes for Wireless Local Area Networks," Inter. Journal of Innovative Computing, Info. and Control, Vol. 6, No. 2, PP. 461~474, 2010-02. (SCIE)
  665. Cheng, T. F., Chang, C. C. and Wang, Z. H., "A Secure Protocol for Three-Party Authenticated Key Exchange with Provable Belief," Inter. Journal of Info. Sciences and Computer Engineering, Vol.1, No.1, PP. 77~87, 2010-02.
  666. Lin, I. C., Chang, P. Y. and Chang, C. C., "A Key Management Scheme for Sensor Networks Using Bilinear Pairings and Gap Diffie-Hellman Group," Inter. Journal of Innovative Computing, Info. and Control, Vol. 6, No. 2, PP. 809~816, 2010-02. (SCIE)
  667. Chang, C. C., Chen, Y. H. and Kieu, T. D., "A Watermarking Technique Using Synonym Substitution for Integrity Protection of XML Documents," ICIC Express Letters, Vol. 4, No.1, PP. 89~94, 2010-02. (EI)
  668. Chang, C. C., Lai, Y. W. and Yang, J. H., "An Efficient Authenticated Encryption Scheme Based on Elliptic Curve Cryptosystem for Broadcast Environments," ICIC Express Letters, Vol. 4, No.1, PP. 95~99, 2010-02. (EI)
  669. Chang, C. C. and Hsieh, Y. P., "A Chaotic Map Based Adaptive Variable-Size LSB Method with Pixel-Value Differencing and Modulus Function," Imaging Science Journal, Vol. 58, No. 1, PP. 49~62, 2010-02. (SCIE,EI)
  670. Lee, C. F., Chen, K. N., Chang, C. C. and Tsai, M. C., "A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation," the special issue of J. of Info. Assurance and Security, Vol. 5, No. 1, PP. 187~195, 2010-02. (EI)
  671. Wang, Z. H., Kieu, T. D., Chang, C. C. and Li, M. C., "A Novel Information Concealing Method Based on Exploiting Modification Direction," J. of Information Hiding and Multimedia Signal Processing, Vol. 1, No. 1, PP. 1~9, 2010-01.
  672. Chang, C. C., Lin, P. Y., Wang, Z. H. and Li, M. C., "A Sudoku-based Secret Image Sharing Scheme with Reversibility," Journal of Communications, Vol. 5, No. 1, PP. 5~12, 2010-01. (EI)
  673. Wang, Z. H., Chang, C. C., Chen, K. N. and Li, M. C., "A Modification of VQ Index Table for Data Embedding and Lossless Indices Recovery," Journal of Computers, Vol. 20, No. 4, PP. 42~52, 2010-01. (EI)
  674. Chen, C. C. and Chang, C. C., "High Capacity SMVQ-based Hiding Scheme Using Adaptive Index," Signal Processing, Vol. 90, No. 7, PP. 2141~2149, 2010-01. (SCIE)
  675. Chang, C. C. and Yang J. H., "A Parallel Computation Algorithm for Generalized Aryabhata Remainder Theorem," Inter. Journal of Computer Sciences and Engineering Systems, Vol. 4, No. 1, PP. 61~67, 2010-01.
  676. Chang, C. C., Cheng, Y. F. and Lin, I. C., "A Noble Key Management Scheme for Scalable Multicast Communications," International Journal of Communications systems, Vol. 22, pp. 53-66, 2009-12. (SCIE,EI)
  677. Chang, C. C., Lin, C. C., Le, T. H. N. and Le, H. B., "Self-Verifying Visual Secret Sharing Using Error Diffusion and Interpolation Techniques," IEEE Transations on Information Forensics and Security, Vol. 4, No. 4, PP. 790~801, 2009-12. (SCIE,EI)
  678. Wang, Z. H., Chang, C. C., Lin, C. C. and Li, M. C., "A Reversible Information Hiding Scheme Using Left-Right and Up-Down Chinese Character Representation," Journal of Systems and Software, Vol. 82, No. 8, PP. 1362~1369, 2009-12. (SCIE,EI)
  679. Yang, J. H. and Chang, C. C., "An Efficient Fair Electronic Payment System Based upon Non-Signature Authenticated Encryption Scheme," Inter. Journal of Innovative Computing, Info. and Control, Vol. 5, No. 11(A), PP. 3861~3873, 2009-11. (SCIE)
  680. Lin, C. C., Chen, Y. H. and Chang, C. C., "LSB-based High-Capacity Data Embedding Scheme for Digital Images," Inter. Journal of Innovative Computing, Info. and Control, Vol. 5, No. 11(B), PP. 4283~4289, 2009-11. (SCIE)
  681. Chang, C. C., Lin, C. C., Le, T. H. N. and Le, H. B., "Sharing a Verifiable Secret Image Using Two Shadows," Pattern Recognition, Vol. 42, No. 11, PP. 3097~3114, 2009-11. (SCIE,EI)
  682. Lee, J. S., Chan, C. S., and Chang, C. C., "Non-Iterative Privacy Preservation for Online Lotteries," IET Information Security, Vol. 3, No. 4, PP. 139~147, 2009-11. (SCIE,EI)
  683. Chang, C. C. and Lai, Y. P., "Modular Square-and-Multiply Operation for Quadratic Residue Bases," Inter. Journal of Innovative Computing, Info. and Control, Vol. 5, No. 10(A), PP. 3059~3069, 2009-10. (SCIE)
  684. Lee, C. F., Chen, K. N. and Chang, C. C., "A New Data Hiding Strategy with Restricted Region Protection," Imaging Science Journal, Vol. 57, No. 5, PP. 235~249, 2009-10. (SCIE,EI)
  685. Kieu, T. D. and Chang, C. C., "A High Stego-image Quality Steganographic Scheme with Reversibility and High Payload Using Multiple Embedding Strategy," Journal of Systems and Software, Vol. 82, No. 10, PP. 1743~1752, 2009-10. (SCIE,EI)
  686. Lin, C. N., Chang, C. C. and Tsai, M. T., "An Image Copyright Protection Scheme Using DCT and a Table Look-up Technique," Journal of Digital Information Management (JDIM), PP. 358~364, 2009-10.
  687. Wu, C. C., Chang, C. C. and Lin, I. C., "An Authenticated PayWord Scheme without Public Key Cryptosystems," Inter. Journal of Innovative Computing, Info. and Control, Vol. 5, No. 9, PP. 1~11, 2009-09. (SCIE)
  688. Chang, C. C., Chang, S. C. and Lee, J. S., "An On-line Electronic Check System with Mutual Authentication," Computers & Electrical Engineering, Vol. 35, No. 5, PP. 757~763, 2009-09. (SCIE,EI)
  689. Yang, J. H. and Chang, C. C., "An Efficient Three-party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography for Mobile-commerce Environments," Journal of Systems and Software, Vol. 82, PP. 1497~1502, 2009-09. (SCIE,EI)
  690. Ge, M., Lam, K. Y., Gollmann, D., Chung, S. L. and Chang, C. C., "A Robust Certification Service for Highly Dynamic MANET in Emergency Tasks," International Journal of Communication Systems, Vol. 29, No. 9, PP. 1177~1197, 2009-09. (SCIE,EI)
  691. Lin,P. Y., Lee, J. S. and Chang, C. C., "Dual Digital Watermarking for Internet Media Based on Hybrid Strategies," IEEE Trans. on Circuits and Systems for Video Technology, Vol. 19, No. 8, PP. 1169~1171, 2009-08. (SCIE,EI)
  692. Kieu, T. D. and Chang, C. C., "An Image Authentication Based on Discrete Fourier Transform," Fundamenta Informaticae, Vol. 97, No. 4, PP. 369~379, 2009-08. (SCIE,EI)
  693. Chang, C. C., Kieu, T. D. and Wu, W. C., "A Lossless Data Embedding Technique by Joint Neighboring Coding," Pattern Recognition, Vol, 42, PP. 1597~1603, 2009-07. (SCIE,EI)
  694. Chang, C. C. and Yang, J. H., "A Parallel Conversion Algorithm Based upon Aryabhata Remainder Theorem for Residue Number System," Inter. Journal of Innovative Computing, Info. and Control, Vol. 5, No. 7, PP. 2053~2060, 2009-07. (SCIE)
  695. Tai, W. L. and Chang, C. C., "Data Hiding Based on VQ Compressed Images Using Hamming Codes and Declustering," Inter. Journal of Innovative Computing, Info. and Control, Vol. 5, No. 7, PP. 8~18, 2009-07. (SCIE)
  696. Lu, T. C. and Chang, C. C., "An Improved Full-Search Scheme for the Vector Quantization Algorithm Based on Triangle Inequality," Inter. Journal of Innovative Computing, Info. and Control, Vol. 5, No. 6, PP. 1625~1632, 2009-07. (SCIE)
  697. Lee, J. S. and Chang, C. C., "A Secure Multicast Framework in Large and High-Mobility Network Groups," IEICE Transactions on Communications, Vol. E92-B, No. 7, PP. 2365~2373, 2009-07. (SCIE)
  698. Lee, J. S., Chen, C. H. and Chang, C. C., "A Novel Illumination-Balance Technique for Improving the Quality of Degraded Text-Photo Images," IEEE Trans. on Circuits and Systems for Video Technology, Vol. 19, No. 6, PP. 900~905, 2009-06. (SCIE,EI)
  699. Chang, C. C. and Cheng, T. F., "An Efficient Proxy Raffle Protocol with Anonymity-Preserving," Computer Standards & Interfaces, Vol. 31, No. 4, PP. 772~778, 2009-06. (SCIE,EI)
  700. Tai, W. L., Yeh, C. M. and Chang, C. C., "Reversible Data Hiding Based on Histogram Modification of Pixel Differences," IEEE Trans. on Circuits and Systems for Video Technology, Vol. 19, No. 6, PP. 906~910, 2009-06. (SCIE,EI)
  701. Chiou, C. W., Chang, C. C., Lee, C. Y., Hou, T. W. and Lin, J. M., "Concurrent Error Detection and Correction in Gaussian Normal Basis Multiplier over GF(2m)," IEEE Transactions on Computers, Vol. 58, No. 6, PP. 851~857, 2009-06. (SCIE,EI)
  702. Chang, C. C., Lin, P. Y. and Wang, H. C., "Distortion-Free Steganography Mechanism with Compression to VQ Indices," Inter. J. of Sig. Proc., Image Proc. and Pattern Recognition, Vol. 2, No. 2, PP. 39~52, 2009-06.
  703. Chen, R. C., Pai, P. Y., Chan, Y. K. and Chang, C. C., "Lossless Image Compression Based on Multiple-Tables Arithmetic Coding," Mathematical Problems in Engineering, Vol. 2009, PP. 1~13, 2009-06. (SCIE)
  704. Chang, C. C., Chen, G. M. and Lin, C. C., "Lossless Compression Schemes of Vector Quantization Indices Using State Codebook," Journal of Computers, Vol. 4, No. 4, PP. 274~282, 2009-06.
  705. Yang, J. H. and Chang, C. C., "An ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on Elliptic Curve Cryptosystem," Computers and Security, Vol. 28, No.3-4, PP. 138~143, 2009-05. (SCIE,EI)
  706. Chang, C. C., Kuo, C. L. and Chen, C. C., "Three Improved Codebook Searching Algorithms for Image Compression Using Vector Quantizer," International Journal of Computers and Applications, Vol. 31, No. 1, PP. 16~22, 2009-04. (EI)
  707. Kieu, T. D., Wang, Z. H., Chang, C. C. and Li, M. C., "A Sudoku Based Wet Paper Hiding Scheme," International Journal of Smart Home, Vol. 3, No. 2, PP. 1~12, 2009-04.
  708. Chang, C. C., Lin, P. Y. and Yeh, J. S., "Preserving Robustness and Removability for Digital Watermarks Using Subsampling and Difference Correlation," Information Sciences, Vol. 179, No. 13, PP. 2283~2293, 2009-04. (SCIE,EI)
  709. Chang, C. C., Lee, C. Y. and Chiu, Y. C., "Enhanced Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks," Computer Communications, Vol. 32, No. 4, PP. 611~618, 2009-03. (SCIE,EI)
  710. Chang, C. C., Chen, T. H. and Liu, L. J., "Preventing Cheating in Computational Visual Cryptography," Fundamenta Informaticae, Vol. 92, PP. 1~16, 2009-03. (SCIE,EI)
  711. Chang, C. C., Wang, Y. Z. and Chan, C. S., "An Efficient Probability-based t out of n Secret Image Sharing Scheme," Inter. J. of Sig. Proc., Image Proc. and Pattern Recognition, Vol. 2, No. 1, PP. 71~78, 2009-03. (EI)
  712. Chang, C. C. and Chou, H., "A New Public-key Oblivious Fragile Watermarking for Image Authentication Using Discrete Cosine Transform," Inter. J. of Sig. Proc., Image Proc. and Pattern Recognition, Vol. 2, No. 1, PP. 133~140, 2009-03.
  713. Chang, C. C., Lu, T. C., "Lossless Information Hiding Scheme Based on Neighboring Correlation," Inter. J. of Sig. Proc., Image Proc. and Pattern Recognition, Vol. 2, No.1, PP. 49~56, 2009-03.
  714. Chang, C. C., Chen, Y. H. and Lin, C. C., "A Data Embedding Scheme for Color Images Based on Genetic Algorithm and Absolute Moment Block Truncation Coding," Soft Computing, Vol. 13, No. 4, PP. 321~331, 2009-02. (SCIE)
  715. Lee, J. S. and Chang, C. C., "Design of Electronic t-out-of-n Lotteries on the Internet," Computer Standards and Interfaces, Vol. 31, No. 2, PP. 395~400, 2009-02. (SCIE,EI)
  716. Tsai, H. C., Chang, C. C. and Chang, K. J., "Roaming Across Wireless Local Area Networks Using SIM-Based Authentication Protocol," Computer Standards & Interfaces, Vol. 31, No. 2, PP. 381~389, 2009-02. (SCIE,EI)
  717. Chang, C. C., Lin, C. C. and Chen, Y. H., "Hiding Data in Color Palette Images with Hybrid Strategies," Imaging Science Journal, Vol. 57, No. 1, PP. 19~29, 2009-02. (SCIE,EI)
  718. Wang, C. C., Chang, C. C. and Jan, J. K., "Novel Watermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel Patterns," Fundamenta Informaticae, Vol. 90, No. 1-2, PP. 125~155, 2009-02. (SCIE,EI)
  719. Chang, C. C. and Chou, Y. C., "A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes," Fundamenta Informaticae, Vol. 90, No. 1-2, PP. 17~26, 2009-02. (SCIE,EI)
  720. Lu, T. C., Chang, C. C., and Liu, Y. L., "An Information-Hiding Scheme Based on Quantization-Based Embedding Technique," Fundamenta Informaticae, Vol. 91, PP. 1~14, 2009-02. (SCIE,EI)
  721. Chang, C. C., Chou, Y. C. and Hsieh, Y. P., "Search-Order Coding Method with Indicator-elimination Property," Journal of Systems and Software, Vol. 82, PP. 516~525, 2009-02. (SCIE,EI)
  722. Chang, C. C., Tsai, H. C. and Chiu, Y. C., "A Simple and Robust Authenticated Multiple Key Agreement Scheme," International Journal of Security & Its Applications (IJSIA), Vol. 3, No. 2, 2009-02. (EI)
  723. Chen, T. H., Chang, C. C., Wu, C. S. and Lou, D. C., "On the Security of A Copyright Protection Scheme Based on Visual Cryptography," Computer Standards & Interfaces, Vol. 31, No. 1, PP. 1~5, 2009-01. (SCIE,EI)
  724. Chang, C. C. and Lee, J. S., "Robust t-out-of-n Oblivious Transfer Mechanism Based on CRT," Journal of Network and Computer Applications, Vol. 32, No. 1, PP. 226~235, 2009-01. (SCIE,EI)
  725. Chang, C. C., Kieu, T. D. and Chou, Y. C., "Reversible Information Hiding for VQ Indices Based on Locally Adaptive Coding," Journal of Visual Communication and Image Representation, Vol. 20, No. 1, PP. 57~64, 2009-01. (SCIE,EI)
  726. Chang, C. C., Lee, C. F. and Chuang, L. Y., "Embedding Secret Binary Message Using Locally Adaptive Data Compression Coding," Int. Journal of Computer Sciences and Engineering Systems, Vol. 3, No. 1, PP. 55~61, 2009-01.
  727. Lin, P. Y., Lee, J. S. and Chang, C. C., "Distortion-Free Secret Image Sharing Mechanism Using Modulus Operator," Pattern Recognition, Vol. 42, No. 5, PP. 886~895, 2009-01. (SCIE,EI)
  728. Chang, C. C., Lin, P. Y. and Chuang, J. C., "Progressive Image Transmission Scheme for Lossless Images Using Prior Bitmap," Journal of Applied Sciences - Elec. and Inf. Engineering, PP. 44~50, 2009-01. (Vol. 27, No. 1)
  729. Lin, I. C. and Chang, C. C., "A Countable and Time-Bound Password-Based User Authentication Scheme for the Applications of Electronic Commerce," Information Sciences, Vol. 179, No. 9, PP. 1269~1277, 2009-01. (SCIE,EI)
  730. Chiou, C. W., Lee, C. Y., Lin, J. M., Hou, T. W. and Chang, C. C., "Concurrent Error Detection and Correction in Dual Basis Multiplier over GF(2m)," IET Circuits, Devices and Systems, 3/1, PP. 22~40, 2009-01. (SCIE,EI)
  731. Chang, C. C. and Cheng, T. F., "An IC-Card-Based and Flexible t-out-of-n Electronic Voting Mechanism," Journal of Computers, Vol. 19, No. 4, PP. 41~50, 2009-01.
  732. Chang, C. C., Chen, C. H. and Lee, J. S., "A Hybrid Strategy for Improving Illumination-Balance of Degraded Text-Photo Images," Journal of Science and Technology, Vol. 46, No. 5A, PP. 26~34, 2008-12.
  733. Lin, C. N., Chang, C. C. and Chan, Y. K., "Data Hiding on Two Stage VQ Compression Codes," Imaging Science Journal, Vol. 56, No. 6, PP. 342~350, 2008-11. (SCIE,EI)
  734. Chang, C. C., Lee, J. S. and Kuo, J. Y., "Time-bound Based Authentication Scheme for Multi-server Architecture," Inter. Journal of Innovative Computing, Info. and Control, Vol. 4, No. 11, PP. 2987~2996, 2008-11. (SCIE)
  735. Lin, C. C., Tai, W. L. and Chang, C. C., "Multilevel Reversible Data Hiding Based on Histogram Modification of Difference Images," Pattern Recognition, Vol. 41, No. 12, PP. 3582~3591, 2008-11. (SCIE,EI)
  736. Lee, C. F., Chang, C. C. and Wang, K. H., "An Improvement of EMD Embedding Method for Large Payloads by Pixel Segmentation Strategy," Image and Vision Computing, Vol. 26, No. 12, PP. 1670~1676, 2008-11. (SCIE,EI)
  737. Hsieh, Y. P., Chang, C. C. and Liu, L. J., "A Two-Codebook Combination and Three-Phase Block Matching Based Image Hiding Scheme with High Embedding-Capacity," Pattern Recognition, Vol. 41, No. 10, PP. 3104~3113, 2008-10. (SCIE,EI)
  738. Chang, C. C., Hsieh, Y. P. and Lin, C. H., "Sharing Secrets in Stego Images with Authentication," Pattern Recognition, Vol. 41, No. 10, PP. 3130~3137, 2008-10. (SCIE,EI)
  739. Wu, M. N., Lin, C. C. and Chang, C. C., "An Embedding Technique Based upon Block Prediction," Journal of Systems and Software, Vol. 81, No. 9, PP. 1505~1516, 2008-09. (SCIE,EI)
  740. Chang, C. C., Wu, W. C. and Chen, Y. H., "Joint Coding and Embedding Techniques for Multimedia Images," Information Sciences, Vol. 178, No. 18, PP. 3543~3556, 2008-09. (SCIE,EI)
  741. Chang, C. C., Chen, C. H. and Lin, P. Y., "Improving Line-Based Light Balancing for Text Images," Journal of Applied Sciences - Elec. and Inf. Engineering, Vol. 26, No. 5, PP. 499~505, 2008-09.
  742. Lee, J.S., Chang, Y.F. and Chang, C.C., "Secure Authentication Protocols for Mobile Commerce Transactions," Int. Journal of Innovative Computing,Information and Control, vo. 4, no. 9, PP. 2305~2314, 2008-09. (SCIE,EI)
  743. Tsou, C. C. Hu, Y. C., and Chang, C. C., "Efficient Optimal Pixel Grouping Schemes for AMBTC," Imaging Science Journal, Vol. 56, No. 4, PP. 217~231, 2008-08. (SCIE,EI)
  744. Lin, C. Y. and Chang, C. C., "Placing Chinese Phonetic Symbols on Mobile Phones Using Linear Programming," Inter. Journal of Innovative Computing, Info. and Control, Vol. 4, No. 8, PP. 2113~2126, 2008-08. (SCIE)
  745. Chou, Y. C., Chang, C. C. and Li, K. M., "A Large Payload Data Embedding Technique for Color Images," Fundamenta Informaticae, Vol. 88, No. 1-2, PP. 47~61, 2008-08. (SCIE,EI)
  746. Chang, C. C., Lin, C. C., Le, T. H. N. and Le, H. B., "A Probabilistic Visual Secret Sharing Scheme for Grayscale Images with Voting Strategy," International Journal of Intelligent Inf. Tech. Application, Vo. 1, No. 1, PP. 1~9, 2008-08.
  747. Chang, C. C. and Lin, P. Y., "Adaptive Watermark Mechanism for Rightful Ownership Protection," Journal of Systems and Software, Vol. 81, No. 7, PP. 1118~1129, 2008-07. (SCIE,EI)
  748. Chang, C. C., Chou, Y. C. and Kieu, T. D., "High Capacity Data Hiding for Grayscale Images," Fundamenta Informaticae, Vol. 86, No. 4, PP. 435~446, 2008-07. (SCIE,EI)
  749. Chang, C. C., Lin, C. Y. and Fan, Y. H., "Lossless Data Hiding for Color Images Based on Block Truncation Coding," Pattern Recognition, Vol. 41, No. 7, PP. 2347~2357, 2008-07. (SCIE,EI)
  750. Chang, C. C., Lin, C. C., Lin, C. H., and Chen, Y. H., "A Novel Secret Image Sharing Scheme in Color Images Using Small Shadow Images," Information Sciences, Vol. 178, No. 11, PP. 2433~2447, 2008-06. (SCIE,EI)
  751. Chu, C. H., Lin, H. F., Chang, C. C.and Chen, C. Y., "A Multi-policy Threshold Signature Scheme with Traceable Participant Cosigners," Inter. Journal of Innovative Computing, Info. and Control, Vol.4, No.6, PP. 1347~1356, 2008-06. (SCIE)
  752. Lee, J. S., Chang, Y. F. and Chang, C. C., "A Novel Authentication Protocol for Multi-server Architecture without Smart Cards," Inter. Journal of Innovative Computing, Info. and Control, Vol. 4, No. 6, PP. 1357~1364, 2008-06. (SCIE)
  753. Lee, J. S. and Chang, C. C., "Preserving Data Integrity in Mobile ad hoc Networks with Variant Diffie–Hellman Protocol," Security and Communication Networks, Vol. 1, No. 4, PP. 277~286, 2008-06.
  754. Huang, H. F. and Chang, C. C., "Low-Computation Oblivious Transfer Scheme for Private Information Retrieval," Inter. Journal of Innovative Computing, Info. and Control, Vol. 4, No. 6, PP. 1365~1370, 2008-06. (SCIE)
  755. Chang, C. C., Lin, C. C. and Chen, Y. H., "Adaptive Data Embedding Scheme Based on Similar and Dissimilar Clustering Strategies," Fundamenta Informaticae, Vol. 88, No. 1-2, PP. 23~45, 2008-06. (SCIE,EI)
  756. Chang, C. C., Cheng, Y. F. and Lin, I. C., "A Novel Key Management Scheme for Dynamic Multicast Communications," International Journal of Communication Systems, Vol. 22, No. 1, PP. 53~66, 2008-06. (SCIE,EI)
  757. Chang, C. C., Lin, C. C. and Chen, Y. H., "Reversible Data-Embedding Scheme Using Differences Between Original and Predicted Pixel Values," IET Information Security, Vol. 2, No. 2, PP. 35~46, 2008-06. (SCIE,EI)
  758. Chen, C. Y., Lin, H. F., and Chang, C. C., "An Efficient Generalized Group-Oriented Signature Scheme," Inter. Journal of Innovative Computing, Info. and Control, Vol.4, No.6, PP. 1335~1345, 2008-06. (SCIE)
  759. Lin, C. N., Chang, C. C. and Chan, Y. K., "Data Hiding on Two-stage VQ Compression Codes," Imaging Science Journal (ISJ), Vol. 56, No. 6, Dec. 2008, pp. 342-350, 2008-06.
  760. Lin, C. C., Wu, C. C. and Chang, C. C., "Digital Right Schemes for Limited Issue and Flexible Division," International Journal of Computer Science and Network Security, Vol. 8, No. 2, Feb. 2008, pp. 33-42, 2008-06.
  761. Lee, J. S. and Chang, C. C., "Preserving data integrity in mobile ad hoc networks with variant Diffie‐Hellman protocol," Security and Communication Networks, Vol. 1, No. 4, Jun. 2008, pp. 277-286, 2008-06.
  762. Hsieh, Y. P., Chang, C. C. and Liu, L. J., "A Two-Codebook Combination and Three-Phase Block Matching Based Image-Hiding Scheme with High Embedding Capacity," Pattern Recognition, Vol. 41, No. 10, Oct. 2008, pp. 3104-3113, 2008-06.
  763. Lu, T. C. and Chang, C. C., "Lossless Nibbled Data Embedding Scheme Based on Difference Expansion," Image and Vision Computing, Vol. 26, No. 5, PP. 632~638, 2008-05. (SCIE,EI)
  764. Wu, C. C., Chang, C. C. and Lin, I. C., "New Sealed-bid Electronic Auction with Fairness, Security and Efficiency," Journal of computer science and technology, Vol. 23, No. 2, PP. 253~264, 2008-05. (SCIE)
  765. Chang, C. C., Kieu, T. D. and Chou, Y. C., "Reversible Data Embedding for Color Images," Journal of Digital Information Management, Vol. 6, No. 2, PP. 143~150, 2008-04.
  766. Chen, C. C. and Chang, C. C., "LSB-Based Steganography Using Reflected Gray Code," IEICE Transactions on Information and Systems, E91-D, No. 4, PP. 1110~1116, 2008-04. (SCIE,EI)
  767. Wu, M. N. and Chang, C. C., "A Novel High Capacity Reversible Information Hiding Scheme Based on Side-Match Prediction and Shortest Spanning Path," Circuits, Systems and Signal Processing, Vol. 27, No. 2, PP. 137~153, 2008-04. (EI)
  768. Lin, C. Y., Chang, C. C. and Wang, Y. C., "Reversible Steganographic Method with High Payload for JPEG Images," IEICE Transactions on Information and Systems, Vol. E91-D, No. 3, PP. 836~845, 2008-03. (SCIE,EI)
  769. Chang, C. C., Li, Y. C. and Lin, C. H., "A Novel Method for Progressive Image Transmission Using Blocked Wavelets," International Journal of Electronics and Communications, Vol. 62, No. 2, PP. 159~162, 2008-03. (SCIE,EI)
  770. Chang, C. C. and Tseng, S. W., "Error Resilient Lempel-Ziv Data Compression Scheme with Perfect Hashing," Inter. Journal of Innovative Computing, Info. and Control, Vol. 4, No. 3, PP. 761~770, 2008-03. (SCIE)
  771. Chang, C. C., Fan, Y. H. and Tai, W. L., "Four-scanning Attack on Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery," Pattern Recognition, Vol. 41, No. 2, PP. 654~661, 2008-02. (SCIE,EI)
  772. Chen, C. Y., Hu, J. F. and Chang, C. C., "Using Dominance Searching to Speed up Temporal Join Operation," Inter. Journal of Innovative Computing, Info. and Control, Vol. 4, No. 2, PP. 335~350, 2008-02. (SCIE)
  773. Chang, C. C., Lin, C. Y. and Hsieh, Y. P., "Three-Phase Lossless Data Hiding Method for the VQ Index Table," Fundamenta Informaticae, Vol. 8, No. 1-2, PP. 1~13, 2008-02. (SCIE,EI)
  774. Chang, Y. F. and Chang, C. C., "Robust t-out-of-n Proxy Signature Based on RSA Cryptosystems," Inter. Journal of Innovative Computing, Info. and Control, Vol. 4, No. 2, PP. 425~431, 2008-02. (SCIE)
  775. Lin, C. C., Wu, C. C. and Chang, C. C., "Digital Right Schemes for Limited Issues and Flexible Division," Int. Journal of Computer Science and Network Security, Vol. 8, No. 2, PP. 33~42, 2008-02.
  776. Chuang, J. C., Chang, C. C. and Hu, Y. C., "Novel Colour Image-hiding Scheme Using Error Diffusion Technique," The Imaging Science Journal, Vol. 56, No. 1, PP. 11~22, 2008-02. (SCIE)
  777. Chuang, J. C., Chang, C. C. and Hu, Y. C.*, "A Novel Color Image Hiding Scheme Using Error Diffusion Technique," Imaging Science Journal, Vol. 56, No. 1, pp. 11-22, 2008-02. (SCIE,EI)
  778. Chang, C. C., Su, Y. W. and Lee, C. Y., "Constructing a Conversation Key in Three-Party Communications Environment," Inter. Journal of Multimedia and Ubiquitous Engineering, Vol. 3, No. 1, PP. 45~52, 2008-01.
  779. Chang, C. C. and Lee, C. Y., "A Friendly Password Mutual Authentication Scheme for Remote-Login Network Systems," Inter. Journal of Multimedia and Ubiquitous Engineering, Vol. 3, No. 1, PP. 59~64, 2008-01.
  780. Tseng, H. W. and Chang, C. C., "An Extended Difference Expansion Algorithm for Reversible Watermarking," Image and Vision Computing, Vol. 26, No. 8, PP. 1148~1153, 2008-01. (SCIE,EI)
  781. Chang, C. C. and Lin, P. Y., "A Color Image Authentication Method Using Partitioned Palette and Morphological Operations," IEICE Transactions on Information and Systems, Vol. E91-D, No. 1, PP. 54~61, 2008-01. (SCIE,EI)
  782. Chen, H. B., Chen, T. H., Lee, W. B. and Chang, C. C., "Security Enhancement for a Three-Party Encrypted Key Exchange Protocol against Undetectable On-Line Password Guessing Attacks," Computer standards & Interfaces, Vol. 30, No. 1-2, PP. 95~99, 2008-01. (SCIE,EI)
  783. Huang, H. F. and Chang, C. C., "A Novel Cryptographic Key Assignment Scheme with ID-Based Access Control in a Hierarchy," Fundamenta Informaticae, Vol. 84, No. 3-4, PP. 353~361, 2008-01. (SCIE,EI)
  784. Li, Y. C., Yeh, J. S., and Chang, C. C., "Isolated items discarding strategy for discovering high utility itemsets," Data & Knowledge Engineering, Vol. 64, No. 1, PP. 198~217, 2008-01. (SCIE,EI)
  785. Yang, J. H. and Chang, C. C., "Efficient Residue Number System Iterative Modular Multiplication Algorithm for Fast Modular Exponentiation," IET Computers & Digital Techniques, Vol. 2, No. 1, PP. 1~5, 2008-01. (SCIE)
  786. Chang, C. C., Lin, I. C. and Lin, M. H., "A Novel Location Tracking Scheme for Reducing Location Updating Traffic in a Personal Communication System," Wireless Personal Communications, Vol. 44, No. 2, PP. 139~152, 2008-01. (SCIE,EI)
  787. Lee, C. Y., Chiou, C. W., Lin, J. M. and Chang, C. C., "Scalable and Systolic Montgomery Multiplier over GF(2^m) Generated by Trinomials," IET Circuits, Devices & Systems, Vol. 1, No. 6, PP. 477~484, 2007-12. (EI)
  788. Lu, T. C. and Chang, C. C., "A Progressive Image Transmission Technique Using Haar Wavelet Transformation," Inter. Journal of Innovative Computing, Info. and Control, Vol. 3, No. 6(A), PP. 1449~1461, 2007-12. (SCIE)
  789. Chen, Y. H., Chang, C. C. and Lin, C. C., "Adaptive Data Embedding Using VQ and Clustering," Inter. Journal of Innovative Computing, Info. and Control, Vol. 3, No. 6(A), PP. 1471~1485, 2007-11. (SCIE)
  790. Chang, C. C. and Lin, I. C., "Security Enhancement for Digital Signature Schemes with Fault Tolerance in RSA," Information Sciences, Vol. 177, No. 19, PP. 4031~4039, 2007-10. (SCIE,EI)
  791. Chang, C. C., Lu, T. C. Chang, Y. F. and Lee, R. C. T., "Reversible Data Hiding Schemes for Deoxyribonucleic ACID (DNA) Medium," Inter. Journal of Innovative Computing, Info. and Control, Vol. 3, No. 5, PP. 1145~1160, 2007-10. (SCIE)
  792. Chang, C. C., Lee, C. Y. and Su, Y. W., "A Mutual Authenticated Key Agreement Scheme over Insecure Networks," Journal of Discrete Mathematical Sciences & Cryptography, Vol. 10, No. 5, PP. 603~612, 2007-10.
  793. Chang, C. C., Tsai, H. C. and Chen, Y. H., "An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards," International Journal of Security & Its Applications (IJSIA), Vol. 1, No. 2, PP. 33~40, 2007-10.
  794. Chang, C. C., Lin, C. H. and Chen, C. Y., "A Conference Key Distribution Scheme Using Interpolating Polynomials," International Journal of Security & Its Applications (IJSIA), Vol. 1, No. 2, PP. 9~20, 2007-10.
  795. Chang, C. C., Wu, W. C. and Tsou, C. C., "Hiding Secret Information Using Adaptive Side-Match VQ," IEICE Transactions on Information and Systems, Vol. E90-D, No. 10, PP. 1678~1686, 2007-10. (SCIE,EI)
  796. hang, Y. F., Chang, C. C. and Lin, P. Y., "A Concealed t-out-of-n Signer Ambiguous Signature Scheme with a Variety of Keys," Informatica, Vol. 18, No. 4, PP. 535~546, 2007-10. (SCIE,EI)
  797. Lee, J. S. and Chang, C. C., "Security Enhancement of Key Authentication Schemes Based on Discrete Logarithms," Journal of Discrete Mathematical Sciences & Cryptography, Vol. 10, No. 3, PP. 351~358, 2007-09.
  798. Chang, C. C., Hsieh, Y. P. and Lin, C. Y., "Lossless Data Embedding with High Embedding Capacity Based on Declustering for VQ-Compressed Images," IEEE Transactions on Information Forensics and Security, Vol. 2, No. 3, PP. 341~349, 2007-09. (EI)
  799. Chang, C. C., Li, Y. C. and Huang, W. H.,, "TFRP: An Efficient Microaggregation Algorithm for Statistical Disclosure Control," Journal of Systems and Software, Vol. 80, PP. 1866~1878, 2007-09. (SCIE,EI)
  800. Chang, C. C., Chou, Y. C. and Lin, C. Y., "Reversible Data Hiding in the VQ-Compressed Domain," IEICE Transactions on Information and Systems, Vol. E90-D No.9, PP. 1422~1426, 2007-09. (SCIE,EI)
  801. Chang, C. C., Lin, P. Y. and Chuang, J. C., "Fragile Watermarking Scheme for Digital Image Authentication Using Pixel Difference," The Imaging Science Journal, Vol. 55, No. 3, PP. 140~147, 2007-09. (SCIE)
  802. Yu, Y. H., Chang, C. C. and Lin, I. C., "A New Steganographic Method for Color and Grayscale Image Hiding," Computer Vision and Image Understanding, Vol. 107, No. 3, PP. 183~194, 2007-09. (SCIE,EI)
  803. Lee, J. S. and Chang, C. C., "Secure Communications for Cluster-based Ad Hoc Networks Using Node Identities," Journal of Network and Computer Applications, Vol. 30, PP. 1377~1396, 2007-08. (SCIE,EI)
  804. Chang, C. C., Tai, W. L. and Lin, C. C., "A Novel Image Hiding Scheme Based on VQ and Hamming Distance," Fundamenta Informaticae, Vol. 77, No. 3, PP. 217~228, 2007-07. (SCIE,EI)
  805. Wu, M. N., Lin, C. C. and Chang, C. C., "Novel Image Copy Detection with Rotating Tolerance," Journal of Systems and Software, Vol. 80, No. 7, PP. 1057~1069, 2007-07. (SCIE,EI)
  806. Li,Y. C., Yeh,J. S. and Chang, C. C., "MICF: An Effective Sanitization Algorithm for Hiding Sensitive Patterns on Data Mining," Advanced Engineering Informatics, Vol.21, PP. 269~280, 2007-07. (SCIE,EI)
  807. Lin, I. C. and Chang, C. C., "A Practical Electronic Payment System for Message Delivery Service in the Mobile Environment," Wireless Personal Communications, Vol. 42, No. 2, PP. 247~261, 2007-07. (SCIE)
  808. Chan, C. S. and Chang, C. C., "A Survey of Information Hiding Schemes for Digital Images," Int. Journal of Computer Sciences and Engineering Systems, Vol. 1, No. 3, PP. 187~200, 2007-07.
  809. Huang, H. F. and Chang, C. C., "A Novel Identity-Based Society Oriented Signature Scheme with Anonymous Signers," Applied Mathematics Sciences, Vol. 1, No. 32, PP. 1551~1562, 2007-07.
  810. Lee J.S., Chang, C. C. and Chang, P. Y., "Anonymous Authentication Scheme for Wireless Communications," International Journal of Mobile Communications, Vol. 5, No. 5, PP. 590~601, 2007-06. (EI)
  811. Cheng, T. F., Lee, J. S. and Chang, C. C., "Security Enhancement of an IC-Card-Based Remote Login Mechanism," Computer Networks, Vol. 51, No. 9, PP. 2280~2287, 2007-06. (SCIE,EI)
  812. Chang, C. C., Lin, C. C. and Hu, Y. S., "An SVD Oriented Watermark Embedding Scheme with High Qualities for the Restored Images," Inter. Journal of Innovative Computing, Info. and Control, Vol. 3, No. 3, PP. 1~12, 2007-06. (SCIE)
  813. Chang, C. C. and Wu, W. C., "Fast Planar-Oriented Ripple Search Algorithm for Hyperspace VQ Codebook," IEEE Transactions on Image Processing, Vol. 16, No. 6,, PP. 1538~1547, 2007-06. (SCIE,EI)
  814. Chang, C. C., Wu, W. C. and Hu, Y. C., "Lossless Recovery of a VQ Index Table with Embedded Secret Data," Journal of Visual Communication and Image Representation, Vol. 18, No. 3, PP. 207~216, 2007-06. (SCIE,EI)
  815. Tseng, H. W. and Chang, C. C., "Anti-Pseudo-Gray Coding for VQ Encoded Images over Noisy Channels," IEEE Communications Letters, Vol. 11, No. 5., PP. 443~445, 2007-05. (SCIE,EI)
  816. Chang, C. C., Lin, C. Y. and Lin, K. C., "Simple Efficient Mutual Anonymity Protocols for Peer-to-Peer Network Based on Primitive Roots," Journal of Network and Computer Applications, Vol. 30/2, PP. 662~676, 2007-04. (SCIE)
  817. Wu, H. C. and Chang, C. C., "An Image Retrieval Method Based on Color-Complexity and Spatial-Histogram Features," Fundamenta Informaticae, Vol.76, No.4, PP. 481~493, 2007-04. (SCIE)
  818. Shen, J. J., Chang, C. C. and Li, Y. C., "Combined Association Rules for Dealing with Missing Values," Journal of Information Science, Vol. 33, No. 4, PP. 468~480, 2007-04. (SSCI,SCIE,EI)
  819. Chang, C. C. and Lin, C. Y., "Reversible Steganographic Method Using SMVQ Approach Based on Declustering," Information Sciences, Vol. 177, No. 8, PP. 1796~1805, 2007-04. (SCIE,EI)
  820. Wu, C. C. and Chang, C. C., "Attacks on Provably Secure Proxy-protected Signature Schemes based on Factoring," Journal of Discrete Mathematical Sciences & Cryptography, Vol. 10, No. 2, PP. 193~204, 2007-04.
  821. Chang, C. C., Lin, C. Y. and Tseng, C. S., "Secret Image Hiding and Sharing Based on the (t, n)-Threshold," Fundamenta Informaticae, Vol. 76, No. 4, PP. 399~411, 2007-04. (SCIE,EI)
  822. Yu, Y. H., Chang, C. C. and Hu, Y. C., "Novel Scheme for Hiding Data Using Multiple Codebooks," The Imaging Science Journal, Vol. 55, No. 1, PP. 40~51, 2007-03. (SCIE)
  823. Chan, C. S. and Chang, C. C., "Scheme for hiding images by finding optimal one-to-two substitution table using dynamic programming strategy," Imaging Science Journal, Vol. 55, No. 1,, PP. 13~22, 2007-03. (SCIE)
  824. Huang, H. F. and Chang, C. C., "A New t-out-n Oblivious Transfer with Low Bandwidth," Applied Mathematics Sciences, Vol. 1, No. 7, PP. 311~320, 2007-03.
  825. Yu, Y. H., Chang, C. C. and Hu, Y. C.*, "Novel Scheme for Data Hiding Using Multiple Codebooks," Imaging Science Journal, Vol. 51, No. 1, pp. 40-51, 2007-03. (SCIE,EI)
  826. Chang, C. C., Lin, C. C., Tseng, C. S. and Tai, W. L., "Reversible Hiding in DCT-Based Compressed Images," Information Sciences, Vol. 177, PP. 2768~2786, 2007-02. (SCIE,EI)
  827. Chang, Y. F., Chang, C. C. and Cheng, Y.F., "Robust Non-interactive t-out-of-n Oblivious Transfer Based on the RSA Cryptosystem," Journal of Discrete Mathematical Sciences and Cryptography, Vol. 10, No. 1, PP. 93~109, 2007-02.
  828. Chang, C. C. and Chen, C. C., "Full-Searching-Equivalent Vector Quantization Method Using Two-Bounds Triangle Inequality," Fundamenta Informaticae, Vol. 76, No. 1-2, PP. 25~37, 2007-01. (SCIE,EI)
  829. Chang, Y. F. and Chang, C. C., "An RSA-based (t, n) Threshold Proxy Signature Scheme with Freewill Identities," International Journal of Information and Computer Security, Vol. 1, No. 1/2, PP. 201~209, 2007-01.
  830. Huang, H. F. and Chang, C. C., "A New Forward-Secure Blind Signature Scheme," Journal of Engineering and Applied Sciences, Vol. 2, No. 1, PP. 230~235, 2007-01.
  831. Chang, C. C., Lu, T. C. and Ya, J. B., "VQ Codebook Searching Algorithm Based on Correlation Property," Fundamenta Informaticae, Vol. 76, No. 1-2, PP. 39~57, 2007-01. (SCIE)
  832. Chang, Y. F. and Chang, C. C., "Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy," Fundamenta Informaticae, Vol. 76, No. 1-2, PP. 13~23, 2007-01. (SCIE)
  833. 呂慈純、張真誠, "適用於壓縮機制之資訊隱藏技術," 資訊安全通訊 (CCISA), 第十三卷、第一期, PP. 56~73, 2007-01.
  834. Chang, C. C. and Lin, C. Y., "Reversible Steganography for VQ-compressed Images Using Side Matching and Relocation," IEEE Transactions on Information Forensics and Security, Vol. 1, No. 4, PP. 493~501, 2006-12. (EI)
  835. Chang, C. C. and Wu, C. C., "An Improvement of the Design of Integrating Subliminal Channel with Access Control," IAENG International Journal of Computer Science, Vol. 32, No. 4, PP. 436~439, 2006-12.
  836. Chang, C. C. and Lin, C. Y., "Reversible Data Embedding Based on Prediction Approach for VQ and SMVQ Compressed Images," Fundamenta Informaticae, Vol. 74, No. 2/3, PP. 189~207, 2006-12. (SCIE,EI)
  837. Chang, C. C. and Lee, J. S., "Security Enhancement of Yang-Li Hierarchical Access Control Mechanism," Journal of Discrete Mathematical Sciences & Cryptography, Vol. 9, No. 3, PP. 573~582, 2006-12.
  838. Lin, J. L., Lin, H. F., Chen, C. Y. and Chang, C. C., "A Multiauthority Electronic Voting Protocol Based upon a Blind Multisignature Scheme," Int.Journal of Computer Science and Network Security, Vol. 6, No. 12, PP. 266~274, 2006-12.
  839. Chang, C. C. and Yang, J. H., "An Efficient ID-Based User Identification Scheme for Mutual Authentication in Mobile Environments," Journal of Discrete Mathematical Sciences & Cryptography, Vol. 9, No. 3, PP. 537~548, 2006-12.
  840. Chang, Y. C., Chang, C. C. and Kao, C. L., "Comments on WLT Attack on An Enhanced Timestamp-based Password Authentication Scheme," Journal of Discrete Mathematical Sciences & Cryptography, Vol. 9, No. 3, PP. 549~555, 2006-12.
  841. Chang, Y. F., Chang, C.C. and Tai, W. L., "Comments on E-mail Protocols Providing Forward Secrecy," Journal of Discrete Mathematical Sciences and Cryptography, Vol. 9, No. 3, PP. 591~597, 2006-12.
  842. Chang, C. C. and Lu, T. C., "A Difference Expansion Oriented Data Hiding Scheme for Restoring the Original Host Images," The Journal of Systems and Software, 79, PP. 1754~1766, 2006-11. (SCIE,EI)
  843. Lin, C. C. and Chang, C. C., "An Improved Deniable Authentication Protocol," International Journal of Computer Science & Network Security, Vol. 6, No. 11, PP. 240~243, 2006-11.
  844. Chang, C. C., Yeh, J. S. and Li, Y. C., "Privacy-preserving mining of association rules on distributed databases," International Journal of Computer Science & Network Security, Vol. 6, No. 11, PP. 259~266, 2006-11.
  845. Chang, C. C., Tai, W. L. and Lin, C. C., "A Reversible Data Hiding Scheme Based on Side Match Vector Quantization," IEEE Trans. on Circuits and Systems for Video Technology, Vol. 16, No. 10, PP. 1301~1308, 2006-10. (SCIE,EI)
  846. Chang, C. C. and Liao, C. T., "An Image Coding Scheme Using SMVQ and Support Vector Machines," Neurocomputing, Vol. 69, No. 16-18, PP. 2327~2335, 2006-10. (SCIE,EI)
  847. Chuang, J. C. and Chang, C. C., "Using a Simple and Fast Image Compression Algorithm to Hide Secret Information," International Journal of Computers and Applications, Vol. 28, No. 4, PP. 329~333, 2006-10. (EI)
  848. Chang, C. C., Chou, H. and Lin, C. C., "Colour image-hiding scheme using human visual system," The Imaging Science Journal, Vol. 54, No. 3, PP. 152~163, 2006-09. (SCIE)
  849. Chang, C. C., Chan, C. S. and Tseng, C. S., "Removing Blocking Effects Using An Artificial Neural Network," Signal Processing, Vol. 86, PP. 2381~2387, 2006-07. (SCIE)
  850. Chang, C. C. and Lu, T. C., "Reversible Index-domain Information Hiding Scheme Based on Side-Match Vector Quantization," Journal of Systems and Software, Vol. 79, No. 8, PP. 1120~1129, 2006-07. (SCIE,EI)
  851. Chang, C. C., Li, Y. C. and Yeh, J. B., "Fast Codebook Search Algorithms Based on Tree-Structured Vector Quantization," Pattern Recognition Letters, Vol. 27, No. 10, PP. 1077~1086, 2006-07. (SCIE,EI)
  852. Tseng, S. W. and Chang, C. C., "Error Resilient Locally Adaptive Data Compression," Journal of Systems and Software, Vol. 79, No. 8, PP. 1156~1160, 2006-07. (SCIE,EI)
  853. Chang, C. C., Lin, C. Y. and Wang, Y. Z., "New Image Steganographic Methods Using Run-Length Approach," Information Sciences, Vol. 176, PP. 3393~3408, 2006-07. (SCIE,EI)
  854. Lee, J. S. and Chang, C. C., "Choosing t-out-of-n Secrets by Oblivious Transfer," Information & Security, Vol. 18, PP. 67~84, 2006-07.
  855. Chang, C. C. and Lee, J. S., "An Efficient and Secure Remote Authentication Scheme Using Smart Cards," Information & Security, Vol. 18, PP. 122~133, 2006-07.
  856. Lu, T. C., Chang, C.C. and Liu, Y. L., "A Content-based Image Authentication Scheme Based on Singular Value Decomposition," Pattern Recognition and Image Analysis: Advances in Mathemat, 16/3, PP. 506~522, 2006-07.
  857. Yu, Y. H. and Chang, C. C., "A New Edge Detection Approach Based on Image Context Analysis," Image and Vision Computing, Vol. 24, PP. 1090~1102, 2006-07. (SCIE,EI)
  858. Lin, C. Y. and Chang, C. C., "Hiding Data in VQ-compressed Images Using Dissimilar Pairs," Journal of Computers, Vol. 17, No. 2, pp. 3-10, 2006-07. (EI)
  859. Wu, M. N., Lin, C. C. and Chang, C. C., "A Robust Content-Based Copy Detection Scheme," Fundamenta Informaticae, Vol. 71, No. 2/3, PP. 351~366, 2006-06. (SCIE,EI)
  860. Chang, C. C., Chen, G. M., and Hu, Y. C., "A Novel Index Coding Scheme for Vector Quantization," Fundamenta Informaticae, Vol. 71, No. 2/3, PP. 215~227, 2006-06. (SCIE,EI)
  861. Chang, C. C., Chan, C. S. and Fang, Y. H., "Image Hiding Scheme with Modulus Function and Dynamic Programming Strategy on Partitioned Pixels," Pattern Recognition, Vol. 39, No. 6, PP. 1155~1167, 2006-06. (SCIE,EI)
  862. Wu, M. N., Lin, C. C. and Chang, C. C., "A Color Re-Indexing Scheme Using Genetic Algorithm," WSEAS Transactions on Systems, 5/6, PP. 1309~1314, 2006-06. (EI)
  863. Chang, Y. F., Lee, J. S. and Chang, C. C., "Comments on the Electronic Voting Protocol for General Elections," GESTS Int. Trans. on Computer Science and Engineering, Vol. 31, No. 1, PP. 174~182, 2006-06.
  864. Lin, C. C., Hu, Y. C. and Chang, C. C., "A Novel Watermarking Scheme Based on Rehashing and Vector Quantization," Fundamenta Informaticae, Vol. 71, No. 4, PP. 443~451, 2006-06. (SCIE,EI)
  865. Chan, C. S., Chang, C. C. and Hu, Y. C., "Image Hiding Scheme Using Modulus Function and Optimal Substitution Table," Pattern Recognition and Image Analysis, Vol. 16, No. 2, PP. 208~217, 2006-05.
  866. Lu, T. C. and Chang, C. C., "Color Image Retrieval Technique Based on Color Features and Image Bitmap," Information Processing and Management, Vol.43, No. 2, PP. 461~472, 2006-05. (SCIE,EI)
  867. Chan, C. S. and Chang, C. C., "An Efficient Image Authentication Method Based on Hamming Code," Pattern Recognition, Vol.40, No. 2, PP. 681~690, 2006-05. (SCIE,EI)
  868. Chang, C. C., and Lee, J. S., "An Anonymous and Flexible t-out-of-n Electronic Voting Scheme," Journal of Discrete Mathematical Sciences & Cryptography, Vol. 9, No. 1, PP. 133~151, 2006-04.
  869. Chang, C. C., Hu, Y. S. and Lu, T. C., "A Watermarking-Based Image Ownership and Tampering Authentication Scheme," Pattern Recognition Letters, Vol. 27, No. 5, PP. 439~446, 2006-04. (SCIE,EI)
  870. Huang, H. F. and Chang, C. C., "An Efficient and Flexible Forward-Secure Signature Scheme," International Journal of Computer Science and Network, Vol. 6, No. 3B, PP. 211~219, 2006-03.
  871. Huang, H. F. and Chang, C. C., "A Novel Efficient (t,n) Threshold Proxy Signature Scheme," Information Sciences, Vol. 176, No. 10, PP. 1338~1349, 2006-03. (SCIE,EI)
  872. Chang, C. C., Lin, I. C., and Liao, C. T., "An Access Control System with Time-constraint Using Support Vector Machines," International Journal of Network Security, Vol. 2, No. 2, PP. 150~159, 2006-03.
  873. Chang, C. C., Chan, C. S., and Tai, W. L., "Hiding a Halftone Secret Image in Two Camouflaged Halftone Images," Pattern Recognition and Image Analysis, Vol. 16, No. 3, PP. 486~496, 2006-03.
  874. Chang, Y. F., Lee, J. S., and Chang, C. C., "A Secure and Efficient Authentication Scheme for Mobile Users," International Journal of Mobile Communications, Vol. 4, No. 5, PP. 581~594, 2006-03. (EI)
  875. Chang, C. C. and Wu, W. C., "Hiding Secret Data Adaptively in VQ Index Tables," IEE Proceedings on Vision, Image and Signal Processing, Vol.153, No. 5, PP. 589~597, 2006-03. (SCIE,EI)
  876. Chuang J. C. and Chang, C. C., "An Information Hiding Scheme Based Upon Block Truncation Coding," Accepted byInternational Journal of Computers and Applications, 2006-02. (EI)
  877. Lin, C. C. , Hu, Y. C. and Chang, C. C., "A Novel Image Ownership Protection Scheme Based on Rehashing Concept and Vector Quantization," Fundamenta Informaticae, Vol. 71, No. 4, PP. 443~451, 2006-02. (SCIE,EI)
  878. Chang, C. C., Chuang, J. C. and Hu, Y. C., "Spatial Domain Image Hiding Scheme Using Pixel-Values Differencing," Fundamenta Informaticae, Vol. 70, No. 3, PP. 171~184, 2006-02. (SCIE)
  879. Hu, Y. C.and Chang, C. C., "An Improved Tree-Structured Codebook Search Algorithm for Grayscale Image Compression," Funamenta Informaticae, Vol. 70, No. 3, PP. 251~260, 2006-02. (SCIE)
  880. Chang, C. C., Lin, C. Y., Chou, H. C., "Perfect Hashing Schemes for Mining Traversal Patterns," Fundamenta Informaticae, Vol. 70, No. 3, PP. 185~202, 2006-02. (SCIE)
  881. Chang, Y. F. and Chang, C. C., "Efficient Multi-proxy Multi-signature Schemes Based on DLP," International Journal of Computer Science and Network Securi, Vol. 26, No. 2B, PP. 152~159, 2006-02.
  882. Chang, C. C. and Lai, Y. P., "A Parallel Residue-to-Binary Conversion Algorithm Without Trial Division," Computers & Electrical Engineering, Vol.32, No. 6, PP. 454~467, 2006-02. (SCIE,EI)
  883. Chang, C. C. and Lee, J. S., "An Anonymous Voting Mechanism Based on the Key Exchange Protocol," Computers and Security, 25, PP. 307~314, 2006-02. (SCIE,EI)
  884. Chang, C. C. and Lai, Y. P., "A Division Algorithm for Residue Numbers," Applied Mathematics and Computation, Vol. 172, No. 1, PP. 368~378, 2006-01. (SCIE)
  885. Chang, C. C., Wu, C. C. and Lin, I. C., "A Secure E-coupon System for Mobile Users," International Journal of Computer Science and Network Securi, Vol. 6, No. 1, PP. 273~278, 2006-01.
  886. Chang, C. C. and Lin, I. C., "A New Solution for Assigning Cryptographic Keys to Control Access in Mobile Agent Environments," Wireless Communications and Mobile Computing, Vol. 6, No. 1, PP. 137~146, 2006-01.
  887. Lin, K. C. and Chang, C. C., "Securing Mobile Ad Hoc Networks - Intrusion Prevention and Detection Systems," Communications of the Chinese Cryptology and Information Security Association, Vol. 12, No. 1, 2006, pp. 58-75, 2006-01. (EI)
  888. Chen, C. Y., Chang, C. C. and Hsueh, C. C., "A Fast Modular Multiplication Algorithm Based on the Window Metho," Journal of I-Shou University, Vol. 12, pp. 35-52, 2006-01. (.)
  889. Yang, J. H., Chang, C. C., and Wang, C. H., "An Iterative Modular Multiplication Algorithm in RNS," Applied Mathematics and Computation, Vol. 171, No. 1, PP. 637~645, 2005-12. (SCIE)
  890. Chang, C. C. and Chang Y. F., "Schemes for Digital Gift Certificates with Low Computation Complexity," Informatica, Vol. 16, No. 4, PP. 503~518, 2005-12. (SCIE,EI)
  891. Chang, C. C., Tai, W. L., and Lin, C. C., "Hiding a Secret Color Image in Two Color Images," Imaging Science Journal, Vol. 53, No. 4, PP. 229~240, 2005-12. (SCIE)
  892. Tsai, P. Y., Hu, Y. C. and Chang, C. C., "A Secure and Authentic Electronic Patient Records Transmission Scheme Based on Two-Based Number Conversion," Imaging Science Journal, Vol. 53, No. 4, PP. 199~208, 2005-12. (SCIE)
  893. Chang, C. C., Chou, Y. C., Yu, Y. H. and Shih, K. J., "An Image Zooming Technique Based on Vector Quantization Approximation," Image and Vision Computing, Vol. 23, No. 13, PP. 1214~1225, 2005-11. (SCIE,EI)
  894. Chang, C. C. and Lee, J. S., "On the Design Weakness of Chen-Huang Dynamic Access Control Mechanism," Int. Journal of Computer Science and Network Security, Vol. 5, No. 10, PP. 79~83, 2005-11.
  895. Chang, C. C. and Lin, I. C., "A Fast Search Algorithm for Vector Quantization without Extra Look-up Table Using Declustered Sub-codebooks," IEE Proceedings-Vision, Image and Signal Processing, Vol. 152, No. 5, PP. 513~519, 2005-10. (EI)
  896. Hwang, M. S., Hwang, K. F. and Chang, C. C., "A Time-Stamping Protocol for Digital Watermarking," Applied Mathematics and Computation, Vol. 169, No. 2, PP. 1276~1284, 2005-10. (SCIE)
  897. Tseng, H. W. and Chang, C. C., "Hiding Data in Halftone Images," Informatica, Vol. 16, No. 3, PP. 419~430, 2005-09. (SCIE,EI)
  898. Tseng, H. W. and Chang, C. C., "A Very Low Bit Rate Image Compressor Using Transformed Classified Vector Quantization," Informatica, Vol. 29, No. 3, PP. 335~341, 2005-09. (SCIE,EI)
  899. Chang, C. C. and Wu, W. C., "A Steganographic Method for Hiding Secret Data Using Side Match Vector Quantization," IEICE Transactions on Information and Systems, Vol. E88-D, No. 9, PP. 2159~2167, 2005-09. (SCIE,EI)
  900. Tsai, P. Y., Hu, Y. C., and Chang, C. C., "Novel Image Authentication Scheme Based on Quadtree Segmentation," Imaging Science Journal,, Vol. 53, No. 3, PP. 149~162, 2005-09. (SCIE)
  901. Wu, H. C. and Chang, C. C., "A Novel Digital Image Watermarking Scheme Based on the Vector Quantization Technique," Computers & Security, Vol. 24, No. 6, PP. 460~471, 2005-09. (SCIE,EI)
  902. Chang, C. C., Chang, Y. F. and Lee, J. S., "Mobile Payment for Off-line Vender Machines," Int. Journal of Computer Science and Network Security, Vol. 5, No. 9, PP. 119~126, 2005-09.
  903. Lin, I. C. and Chang, C. C., "A (t,n) Threshold Secret Sharing System with Efficient Identification of Cheaters," Computing and Informatics, Vol. 24, No. 5, 2005-09. (SCIE)
  904. Chan, C. S., Chang, C. C., and Hu, Y. C.*, "A Novel Image Authentication Scheme Based on Quadtree Segmentation," Imaging Science Journal, Vol. 53, No. 3, pp. 149-162, 2005-09. (SCIE)
  905. Chang, Y. F. and Chang, C. C., "Authentication Schemes with No Verification Table," Applied Mathematics and Computations, Vol. 167, No. 2, PP. 820~832, 2005-08. (SCIE)
  906. Lin, C. Y., Chang, C. C. and Lin, C. C., "A New Density-Based Scheme for Clustering Based on Genetic Algorithm," Fundamenta Informaticae, Vol. 68, No. 4, PP. 315~331, 2005-08. (SCIE)
  907. Chan, C. S. and Chang, C. C., "An Image Hiding Scheme Based on Multi-bit-reference Substitution Table Using Dynamic Programming Strategy," Fundamenta Informaticae, Vol. 65, No. 4, PP. 291~305, 2005-08. (SCIE)
  908. Lu, T. C. and Chang, C. C., "Data Compressor for VQ Index Tables," Fundamenta Informaticae, Vol. 65, No. 4, PP. 353~371, 2005-08. (SCIE)
  909. Chang, C. C. and Chan, C. S., "An Inverse Halftoning Technique Using Modified Look-Up Tables," Fundamenta Informaticae, Vol. 68, No. 3, PP. 207~302, 2005-08. (SCIE)
  910. Lin, I. C., Hwang, M. S., and Chang, C. C., "The General Pay-Word: A Micro-payment Scheme Based on n-dimension One-way Hash Chain," International Journal of Designs, Codes, and Cryptography, Vol. 36, No. 1, PP. 53~67, 2005-07. (EI)
  911. Chan, C. W. and Chang, C. C., "A Scheme for Threshold Multi-Secret Sharing," Applied Mathematics and Computation, Vol. 166, No. 1, PP. 1~14, 2005-07. (SCIE)
  912. Chang, C. C., Tsai, P. Y., and Lin, M. H., "SVD-Based Digital Image Watermarking Scheme," Pattern Recognition Letters, Vol. 26, No. 10, PP. 1577~1586, 2005-07. (SCIE,EI)
  913. Wu, H. C. and Chang, C. C., "Sharing Visual Multi-secrets Using Circle Shares," Computer Standards & Interfaces, Vol. 28, No. 1, PP. 123~135, 2005-07. (SCIE,EI)
  914. Yu, Y. H., Chang, C. C., and Hu, Y. C., "A Genetic-Based Adaptive Threshold Selection Method for Dynamic Path Tree Structured Vector Quantization," Image and Vision Computing, Vol. 23, No. 6, PP. 597~609, 2005-06. (SCIE,EI)
  915. Huang, H. F. and Chang, C. C., "Multisignatures with Distinguished Signing Authorities for Sequential and Broadcasting Architectures," Computer Standards and Interfaces, Vol. 27, No. 2, Jan. 2005, pp 169-176, 2005-06.
  916. Chang, C. C., Lin, I. C. and Tsai, H. M., "A Dynamic Mechanism for Determining Relationships in a Partially Ordered User Hierarchy," International Journal of High Performance Computing and Networking, Vol. 3, No. 5/6, 2005, pp. 378-384, 2005-06.
  917. Yu, Y. H., Chang, C. C., and Hu, Y. C., "Hiding Secret Data in Images via Predictive Coding," Pattern Recognition, Vol. 38, No. 5, PP. 691~705, 2005-05. (SCIE,EI)
  918. Chang, C. C., Lee, J. S., and Chang, Y. F., "Efficient Authentication Protocols of GSM," Computer Communications, Vol. 28, No. 8, PP. 921~928, 2005-05. (SCIE,EI)
  919. Wu, M. N., Lin, C. C., Tai, W. L. and Chang, C. C., "A Novel Steganography Mechanism Using Evolutionary Approach for Color Images," GESTS International Transaction on Computer Science and Engi, Vol. 7, No. 1, PP. 63~74, 2005-05.
  920. Chang, C. C., Lin, I. C., and Lam, K. Y., "An ID-Based Multisignature Scheme without Reblocking and Predetermined signing Order," Computer Standards and Interfaces, Vol. 27, No. 4, PP. 407~413, 2005-04. (SCIE,EI)
  921. Chang, C. C. and Lin, I. C., "Cryptanalysis of the Modified Remote Login Authentication Scheme Based on a Geometric Approach," Informatica, Vol. 16, No. 1, PP. 37~44, 2005-03. (SCIE,EI)
  922. Chang, C. C. and Lin, C. Y., "Perfect Hashing Schemes for Mining Association Rules," The Computer Journal, Vol. 48, No. 2, PP. 168~179, 2005-03. (SCIE,EI)
  923. Chang, Y. F., Chang, C. C.*, and Yang, J. H., "An Efficient Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks," Computer Standards and Interfaces, Vol. 27, No. 3, Mar. 2005, pp. 313-322, 2005-03.
  924. Hung, K. L, Chang, C. C. and Chen, T. S., "A Side Match Reconstruction Method Using Tree-Structured VQ for Transmitting Images Progressively," IEICE Transactions on Fundamentals of Electronics, Communica, , PP. 213~228, 2005-02. (SCIE,EI)
  925. Chang, C. C. and Lai, Y. P., "A Fast Modular Square Computing Method Based on The Generalized Chinese Remainder Theorem for Prime Module," Applied Mathematics and Computation, Vol. 161, No. 1, PP. 181~194, 2005-02. (SCIE)
  926. Chang, Y. F., Chang, C. C. and Huang, H. F., "Digital Signature with Message Recovery Using Self-certified Public Keys without Trustworthy System Authority," Applied Mathematics and Computation, Vol. 161, No.1, PP. 211~227, 2005-02. (SCIE)
  927. Chang, Y. F. and Chang, C. C., "An Efficient Authentication Protocol for Mobile Satellite Communication Systems," ACM Operating Systems Review, Vol. 39, No. 1, PP. 70~84, 2005-02. (EI)
  928. Chang, C. C. and Chan, C. S., "Sharing a Secret Halftone Image in a Sequence of Cover Halftone Images," Communications of the Chinese Cryptology and Information Security Association, Vol. 11, No. 2, pp. 2-15, 2005-01. (EI)
  929. Chan, C. S., Chang, C. C., and Hu, Y. C.*, "A Color Image Hiding Scheme Using Image Differencing," Optical Engineering, Vol. 44, No. 1, pp. 1-9., 2005-01. (SCIE)
  930. Chang, C. C. and Chuang, J. C., "A Novel Data Hiding Scheme for Halftone Images," Pattern Recognition and Image Analysis, Vol. 14, No. 3, Sept. 2004, pp.380-393, 2004-06.
  931. Chang, C. C., Chen, G. M. and Lin, M. H., "Information Hiding Based on Search-Order Coding for VQ Indices," Pattern Recognition Letters, Vol. 25, No.11, Aug. 2004, pp. 1253-1261, 2004-06.
  932. Chang, Y. F., Chang, C. C. and Liu, Y. L., "Password Authentication without the Server Public Key," IEICE Transactions on Communications, Vol. E87-B, No. 10, Oct. 2004, pp. 3088-3091, 2004-06.
  933. Yu, Y. H. and Chang, C. C., "Scenery Image Segmentation Using Support Vector Machines," Fundamenta Informaticae, Vol. 61, No. 3-4, Oct. 2004, pp. 379-388, 2004-06.
  934. Chang, C. C. and Tseng, H. W., "A Steganographic Method for Digital Images Using Side Match," Pattern Recognition Letters, Vol. 25, No. 12, Sept. 2004, pp. 1431-1437, 2004-06.
  935. Chang, C. C. and Lee, J. S., "Improvement of Password Authentication Schemes without Adopting the Public-key Cryptosystem," International Journal of Computational and Numerical Analysis and Applications, Vol. 5, No. 1, Jun. 2004, pp. 67-80, 2004-06.
  936. Chang, Y. F., Chang, C. C. and Kao, C. L., "An Improvement on a Deniable Authentication Protocol," ACM SIGOPS Operating Systems Review, Vol. 38, No. 3, Jul. 2004, pp. 64-74, 2004-06.
  937. Chang, Y. F. and Chang, C. C., "A Secure and Efficient Strong-password Authentication Protocol," ACM SIGOPS Operating Systems Review, Vol. 38, No. 3, Jul. 2004, pp. 79-90, 2004-06.
  938. Chang, Y. F., Chang, C. C. and Kuo, J. Y., "A Secure One-time Password Authentication Scheme Using Smart Cards without Limiting Login Times," ACM SIGOPS Operating Systems Review, Vol. 38, No. 4, Oct. 2004, pp. 80-90, 2004-06.
  939. Tseng, H. W. and Chang, C. C., "A Branch-and-Bound Algorithm for the Construction of Reversible Variable Length Codes," The Computer Journal, Vol. 47, No. 6, Jan. 2004, pp. 701-707, 2004-06.
  940. Hung, K. L., Chang, C. C. and Lin, I. C., "Lossless Compression-based Progressive Image Transmission Scheme," Imaging Science Journal, Vol. 52, No. 4, 2004, pp. 212-224, 2004-06.
  941. Tsai, C. S. and Chang, C. C., "A New Repeating Color Watermarking Scheme Based on Human Visual Model," EURASIP Journal on Applied Signal Processing, Vol. 13, Dec. 2004, pp. 1965-1972, 2004-06.
  942. Chang, C. C., and Hwang, R. J., "A New Scheme to Protect Confidential Image," Journal of Interconnection Networks, Vol. 5, No. 3, Sept. 2004, pp. 221-232, 2004-06.
  943. Chang, C. C. and Lin, I. C., "An Improvement of Delegated Multi signature Scheme with Document Decomposition," ACM SIGOPS Operating Systems Review, Vol. 38, No. 4, Oct. 2004, pp. 52-57, 2004-06.
  944. Chang, C. C. and Lai, Y. P., "A Convertible Group Signature Scheme," ACM SIGOPS Operating Systems Review, Vol. 38, No. 4, Oct. 2004, pp. 58-65, 2004-06.
  945. Chang, C. C., and Lin, I. C., "Remarks on Fingerprint-based Remote User Authentication Scheme Using Smart Cards," ACM SIGOPS Operating Systems Review, Vol. 38, No. 4, Oct. 2004, pp. 91-96, 2004-06.
  946. Changchien, S. W., Lu, T. C. and Chang, C. C., "An Efficient Data Structure for Automatic Knowledge Discovery from Database," International Journal of Computational and Numerical Analysis and Applications, Vol. 5, No. 2, Sept. 2004, pp. 143-171, 2004-06.
  947. Chang, Y. F. and Chang, C. C., "An Efficient and Practical Remote User Authentication Scheme," Information & Security, Vol. 15, No.1, 2004, pp. 75-88, 2004-06.
  948. Chan, C. W. and Chang, C. C., "A Novel Lower Cost Crypto-scheme Based on the Theory of Sharing Secrets," Information & Security, Vol. 15, No. 1, Jul. 2004, pp. 89-109, 2004-06.
  949. Chan, C. W. and Chang, C. C., "A New Scheme for Server-Aided Secret Exponentiation Computation Based on Interpolating Polynomials," International Journal of Computational and Numerical Analysis and Applications, Vol. 5, No. 2, Jul. 2004, pp. 131-142, 2004-06.
  950. Chang, C. C., Tsai, P. Y. and Lin, M. H., "An Adaptive Steganographic Scheme for Color Image," Fundamenta Informaticae, Vol. 62, No. 3-4, Oct. 2004, pp. 275-289, 2004-06.
  951. Wu, H. C. and Chang, C. C., "Embedding Invisible Watermarks into Digital Images Based on Side-Match Vector Quantization," Fundamenta Informaticae, Vol. 63, No. 1, Nov. 2004, pp. 89-106, 2004-06.
  952. Hwang, H. F. and Chang, C. C., "A New Cryptographic Key Assignment Scheme with Time-Constraint Access Control in a Hierarchy," Computer Standards and Interfaces, Vol. 26, No. 3, 2004, pp. 159-166, 2004-06.
  953. Chang, C. C. and Yu, Y. H., "An Efficient Approach for Face Detection and Facial Feature Location Using Prune-and-Search Technique," International Journal of Pattern Recognition and Artificial Intelligence, Vol. 18, No. 6, 2004, pp. 987-1005, 2004-06.
  954. Chang, C. C., Chuang, J. C. and Lai, Y. P., "Hiding Data in Multitone Images for Data Communications," IEE Proceedings-Vision, Images, and Signal Processing, Vol. 151, No. 2, 2004, pp. 137-145, 2004-06.
  955. Hwang, H. F. and Chang, C. C., "A New Design of Efficient Partially Blind Signature Scheme," Journal of Systems and Software, Vol. 73, No. 3, Nov.-Dec. 2004, pp. 397-403, 2004-06.
  956. Tsai, P. Y., Hu, Y. C. and Chang, C. C., "A Color Image Watermarking Scheme Based on Color Quantization," Signal Processing, Vol. 84, No. 4, Jan. 2004, pp. 95-106, 2004-06.
  957. Chang, C. C., Chuang, J. C. and Chung, C. Y., "Quadtree-Segmented Image Compression Method Using Vector Quantization and Cubic B-Spline Interpolation," The Imaging Science Journal, Vol. 52, No. 2, 2004, pp. 106-116, 2004-06.
  958. Tsai, P. Y., Hu, Y. C. and Chang, C. C., "A Progressive Secret Reveal System Based on SPIHT Image Transmission," Signal Processing: Image Communication, Vol. 19, 2004, pp. 285-297, 2004-06.
  959. Chang, C. C. and Tseng, H. W., "VQ-Based Image Watermarking Using Anti-Gray Coding," Informatica, Vol. 15, No. 2, 2004, pp. 147-160, 2004-06.
  960. Tseng, H. W. and Chang, C. C., "High Capacity Data Hiding in JPEG-Compressed Images," Informatica, Vol. 15, No. 1, 2004, pp. 127-142, 2004-06.
  961. Chan, Y. K. and Chang, C. C., "Block Image Retrieval Based on a Compressed Linear Quadtree," Image and Vision Computing Journal, Vol. 22, No. 5, 2004, pp. 391-397, 2004-06.
  962. Chang, C. C., Chuang, J. C., and Hu, Y. S., "Retrieving Digital Images from a JPEG Compressed Image Database," Image and Vision Computing, Vol. 22, No. 6, 2004, pp 471-484, 2004-06.
  963. Chang, C. C. and Chang, Y. F., "A Novel Three-party Encrypted Key Exchange Protocol," Computer Standards and Interfaces, Vol. 26, No. 5, 2004, pp 471-476, 2004-06.
  964. Chang, C. C. and Chen, G. I., "Fast Edge-Based Method for Image Magnification," Imaging Science Journal, Vol. 52, No. 2, Jun. 2004, pp. 85-98, 2004-06.
  965. Chang, C. C. and Chang, Y. F., "Signing a Digital Signature without Using One-way Hash Functions and Message Redundancy Schemes," IEEE Communications Letters, Vol. 8, No. 8, Aug. 2004, pp. 485-487, 2004-06.
  966. Chang, C. C., Chen, K. L., and Hwang, M. S., "End-to-End Security Protocols for Mobile Communications with End-User Identification/Authentication," Wireless Personal Communications, Vol. 28, No. 2, 2004, pp. 95-106, 2004-06.
  967. Lin, M. H, Chang, C. C., and Chen, Y. R., "A Fair and Secure Mobile Agent Environment Based on Blind Signature and Proxy Host," Computers & Security, Vol. 23, No. 3, 2004, pp. 199-212, 2004-06.
  968. Tsai P. Y., Lin, M. H. and Chang, C. C., "Side-match Prediction Encoding Scheme for Predefined Vector Quantization Approximation Rates," The Imaging Science Journal, Vol. 52, No. 2, 2004, pp 99-105, 2004-06.
  969. Tsai, C. S. and Chang, C. C., "A Pattern Mapping Based Digital Image Watermarking," Informatica, Vol. 28, No. 2, Jul. 2004, pp. 181-188, 2004-06.
  970. Chang, C. C., Wu, W. C. and Hu, Y. C., "Public-Key Inter-Block Dependence Fragile Watermarking for Image Authentication Using Continued Fraction," Informatica, Vol. 28, No. 2, Jul. 2004, pp. 147-152, 2004-06.
  971. Wang, C. T., Chang, C. C., and Lin, C. H., "Fast Cascade Exponentiation Schemes Based on String Compression Algorithm," Asian Journal of Information Technology, Vol. 3, No. 9, 2004, pp. 731-738, 2004-06.
  972. Lin, M. H. and Chang, C. C., "A Secure One-time Password Authentication Scheme with Low Computation for Mobile Communications," ACM SIGOPS Operating Systems Review, Vol. 38, No. 2, Apr. 2004, pp. 76-84, 2004-06.
  973. Chang, C. C. and Lin, I. C., "Novel Full-Search Schemes for Speeding up Image Coding Using Vector Quantization," Real-Time Imaging, Vol. 10, No. 2, Apr. 2004, pp. 95-102, 2004-06.
  974. Chang, C. C., Chuang, J. C. and Hu, Y. S., "Similar Image Retrieval Based on Wavelet Transformation," International Journal of Wavelets, Multiresolution and Information Processing (IJWMIP), Vol. 2, No. 2, Jun. 2004, pp. 111-120, 2004-06.
  975. Yang, J. H., Chang, C. C. and Chen, C. Y., "A High-Speed Division Algorithm in Residue Number System Using Parity-Checking Technique," International Journal of Computer Mathematics (IJCM), Vol. 81, No. 6, 2004, pp. 775-780, 2004-06.
  976. Chang, C. C., Lin, C. Y. and Lin, P. Y., "An Efficient Graph-Based Method for Parallel Mining Problems," Journal of Information & Knowledge Management (JIKM), Vol. 3, No. 2, Jun. 2004, pp. 143-154, 2004-06.
  977. Chang, Y. F. and Chang, C. C., "E-traveler’s Checks with Reciprocal Authentication," Journal of Electronic Commerce Research, Vol. 5, No. 2, 2004, pp. 128-135, 2004-06.
  978. Chen, T. S. and Chang, C. C., "Image Encryption and Camouflage Based upon Vector Quantization," The Journal of Computers, Vol. 16, No. 3, pp. 39-56, 2004-01. (EI)
  979. Tseng, H. W. and Chang, C. C., "Construction of Symmetrical Reversible Variable Length Codes Using Backtracking," The Computer Journal, Vol. 46, No. 1, pp. 100-105, 2003-06.
  980. Chang, C. C. and Chung, C. Y., "An Efficient Protocol for Anonymous Multicast and Reception," Information Processing Letters, Vol. 85, pp. 99-103, 2003-06.
  981. Hung, K. L. and Chang, C. C., "Error Prevention and Resilience of VQ Encoded Images," Signal Processing, Vol. 83, No. 2, pp. 431-437, 2003-06.
  982. Chang, C. C., Hwang, K. F. and Lin, I. C., "Security Enhancement for a Modified Authenticated Key Agreement Protocol," International Journal of Computational and Numerical Analysis and Applications, Vol. 3, No. 1, pp. 1-7, 2003-06.
  983. Lin, I. C., Hwang, M. S. and Chang, C. C., "Security Enhancement for the Anonymous Secure E-Voting over a Network," Computer Standards and Interfaces, Vol. 25, No. 2, pp. 131-139, 2003-06.
  984. Lin, I. C., Hwang, M. S. and Chang, C. C., "A New Key Assignment Scheme for Enforcing Complicated Access Control Policies in Hierarchy," Future Generation Computer Systems, Vol. 19, No. 4, pp. 457-462, 2003-06.
  985. Chang, C. C. and Lai, Y. P., "A Flexible Date Attachment Scheme on E-Cash," Computers and Security, Vol. 22, No. 2, pp. 160-166, 2003-06.
  986. Hwang, K. F. and Chang, C. C., "A Self-Encryption Mechanism for Authentication of Roaming and Teleconference Services," IEEE Transactions on Wireless Communications, Vol. 2, No. 2, pp. 400-407, 2003-06.
  987. Tseng, H. W. and Chang, C. C., "A Fast and Simple Algorithm for the Construction of Asymmetrical Reversible Variable Length Codes," Journal of Real Time Imaging, Vol. 9, pp. 3-10, 2003-06.
  988. Chang, C. C. and Chen, G. I., "Enhancement Algorithm for Nonlinear Context-Based Predictors," IEE Proceedings-Vision Image and Signal Processing, Vol. 150, No. 1, pp. 15-19, 2003-06.
  989. Hung, K. L. and Chang, C. C., "New Irregular Sampling Coding Method for Transmitting Images Progressively," IEE Proceedings-Vision Image and Signal Processing, Vol. 150, No. 1, pp. 44-50, 2003-06.
  990. Chang, C. C., Hsiao, J. Y. and Chan, C. S, "Finding Optimal Least-Significant-Bit Substitution in Image Hiding by Dynamic Programming Strategy," Pattern Recognition, Vol. 36, pp. 1583-1595, 2003-06.
  991. Chang, C. C. and Lin, I. C., "The Strategy of Reducing the Location Update Traffic Using Forwarding Pointers in Virtual Layer Architecture," Computer Standards and Interfaces, Vol. 25, No. 5, pp. 501-513, 2003-06.
  992. Chang, C. C., Shih, T. K. and Lin, I. C., "Guessing by Neighbors: An Efficient Reconstruction Method for Transmitting Image Progressively," Visual Computer, Vol. 19, No. 5, pp. 342-353, 2003-06.
  993. Hu, Y. C. and Chang, C. C., "Edge Detection Using Block Truncation Coding," International Journal of Pattern Recognition and Artificial Intelligence, Vol. 17, No. 6, pp. 951-966., 2003-06.
  994. Chang, C. C. and Lee, W. B., "Taiwan: Focus on the Information Security Market," IT Professional Magazine, Vol. 5, No. 5, pp. 26-29, 2003-06.
  995. Chang, C. C. and Hwang, K. F., "Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards," Informatica, Vol. 14, No. 3, 2003, pp. 289-294, 2003-06.
  996. Huang, H. F. and Chang, C. C., "An Efficient and Practical (t, n) Threshold Proxy Signature Scheme with Known Signers," Fundamenta Informaticae, Vol. 56, No. 3, 2003, pp. 243-253, 2003-06.
  997. Chang, C. C. and Chang, Y. F., "Efficient Anonymous Auction Protocols with Freewheeling Bids," Computers & Security, Vol. 22, No. 8, 2003, pp. 728-734, 2003-06.
  998. Lai, Y. P. and Chang, C. C., "Parallel Computational Algorithms for Generalized Chinese Remainder Theorem," Computers and Electrical Engineering, Vol. 29, No. 8, 2003, pp. 801-811, 2003-06.
  999. Chang, C. C. and Chan, C. S., "A Watermarking Scheme Based on Principal Component Analysis Technique," Informatica, Vol. 14, No. 4, 2003, pp. 431-444, 2003-06.
  1000. Hu, Y. C. and Chang, C. C., "An Effective Codebook Search Algorithm for Vector Quantization," Image Science Journal, Vol. 51, No. 4, 2003, pp. 221-233, 2003-06.
  1001. Lai, Y. P. and Chang, C. C., "An Efficient Multi-Exponentiation Scheme Based on Modified Booth’s Method," International Journal of Electronics, Vol. 90, No. 3, 2003, pp. 221-233, 2003-06.
  1002. Tsai, C. S. and Chang, C. C., "A DWT-based Deblocking Technique Based on Edge Detection and Zero Masking for Blocking Effect," Fundamenta Informaticae, Vol. 58, No. 2, 2003, pp. 179-188, 2003-06.
  1003. Wu, H. C. and Chang, C. C., "Hiding Digital Watermarks Using Fractal Compression Technique," Fundamenta Informaticae, Vol. 58, No. 2, 2003, pp. 189-202, 2003-06.
  1004. Chang, C. C., Wu, W. C., Hu, Y. C. and Li, Y. C., "Hiding Digital Data in Music Scores Using Musical Features," Journal of Applied Systems Studies, Vol. 4, No. 3, 2003, 2003-06.
  1005. Chan, C. W. and Chang, C. C., "A New Channel for Image Hiding Based on Interpolating polynomials," Fundamenta Informaticae, Vol. 58, No. 2, 2003, pp. 93-104, 2003-06.
  1006. Tsai, C. S. and Chang, C. C., "An Improvement to Image Segment Based on Human Visual System for Object-based Coding," Fundamenta Informaticae, Vol. 58, No. 2, Dec. 2003, pp. 167-178, 2003-06.
  1007. Tsai, P. Y., Chang, C. C., Lin, M. H., and Hu, Y. C.*, "An Adaptive Bit Rate Encoding Mechanism Based on Irregular Sampling and Side-Match Vector Quantization," Image Science Journal, Vol. 52, No. 2, pp. 73-84., 2003-05. (SCIE)
  1008. Tsai, P. Y., Hu, Y. C.*, and Chang, C. C., "Using Set Partitioning in Hierarchical Trees to Authenticate Digital images," Signal Processing: Image Communication, Vol. 18, No. 9, pp. 813-822., 2002-10. (SCIE,EI)
  1009. Lin, M. H., Hu, Y. C.*, and Chang, C. C., "Both Color and Gray Scale Secret Image Hiding in a Color Image," International Journal of Pattern Recognition and Artificial Intelligence, Vol. 16, No. 6, pp. 697-713, 2002-09. (SCIE,EI)
  1010. Tsai, P. Y., Chang, C. C., and Hu, Y. C.*, "A Novel Two-stage Edge Detection Scheme for Digital Color Images," Signal Processing: Image Communication, Vol. 8, pp. 329-343., 2002-08. (SCIE,EI)
  1011. Hung, K. L. and Chang, C. C., "An Improvement of a Technique for Color Quantization Using Reduction of Color Space Dimentionality," Informatica, Vol. 26, No. 1, pp. 11-16, 2002-06.
  1012. Tsai, P. Y., Chang, C. C. and Hu, Y. C., "An Adaptive Two-Stage Edge Detection Scheme for Digital Color Images," Journal of Real Time Imaging, Vol. 8, pp. 329-343, 2002-06.
  1013. Hung, K. L. and Chang, C. C., "Error Prevention and Concealment for Chinese Calligraphy Based on Block Truncation Coding," Journal of Computer Processing of Oriental Languages, Vol. 15, No. 1, pp. 101-113, 2002-06.
  1014. Chang, C. C., Chuang, L. Z. and Chen, T. S., "Recognition of Image Authenticity Using Significant DCT Coefficients Quantization," Informatica, Vol. 26, pp. 359-366, 2002-06.
  1015. Lin, M. H., Hu, Y. C. and Chang, C. C., "Both Color and Gray Scale Secret Images Hiding in a Color Image," International Journal on Pattern Recognition and Artificial Intelligence, Vol. 16, No. 6, pp. 697-713, 2002-06.
  1016. Chang, C. C., Hwang, K. F. and Hwang, M. S., "Robust Authentication scheme for Protecting Copyrights of Images and Graphics," IEE Proceedings-Vision Image and Signal Processing, Vol. 149, No. 1, pp. 43-50, 2002-06.
  1017. Hwang, K. F. and Chang, C. C., "A Fast Pixel Mapping Algorithm Using Principal Component Analysis," Pattern Recognition Letters, Vol. 23, No. 14, 2002, pp. 1747 - 1753, 2002-06.
  1018. Hwang, M. S., Chang, C. C. and Hwang, K. F., "An Improved Authentication Protocol without Trusted Third Party," International Journal of Computational and Numerical Analysis and Applications, Vol. 1, No. 4, pp. 407-412, 2002-05. (SCIE)
  1019. Chang, C. C., Hsiao, J. Y. and Yeh, J. C., "A Color Image Copyright Protection Scheme Based on Visual Cryptography and Discrete Cosine Transform," Image Science Journal, Vol. 50, pp. 133-140, 2002-05. (SCIE)
  1020. Chang, C. C., Hwang, K. F. and Hwang, M. S., "A Feature-Oriented Copyright Owner Proving Technique for Still Image," International Journal of Software Engineering and Knowledge Engineering, Vol. 12, No. 3, pp. 317-330., 2002-05. (SCIE)
  1021. Chang, C. C. and Chuang, J. C., "An Image Intellectual Property Protection Scheme for Gray-Level Images Using Visual Secret Sharing Strategy," Pattern Recognition Letters, Vol. 23, No. 8, pp. 931-941, 2002-05. (SCIE)
  1022. Chang, C. C., Lin, M. H. and Hu, Y. C., "A Fast and Secure Image Hiding Scheme Based on LSB Substitution," International Journal of Pattern Recognition and Artificial Intelligence, Vol. 16, No. 4, pp. 399-416., 2002-05. (SCIE)
  1023. Tsai, C. S., Chang, C. C. and Chen, T. S., "Sharing Multiple Secrets in Digital Images," Journal of Systems and Software, Vol. 64, No. 2, pp. 163-170, 2002-05. (SCIE)
  1024. Wu, H. C. and Chang, C. C., "Detection and Restoration of Tampered JPEG Compressed Images," Journal of Systems and Software, Vol. 64, No. 2, pp. 151-161, 2002-05. (SCIE)
  1025. Hwang, M. S., Chang, C. C. and Hwang, K. F., "An ELGamal-like Cryptosystem for Enciphering Large Messages," IEEE Transactions on Knowledge and Data Engineering, Vol. 14, No. 2, pp. 445-446., 2002-05. (SCIE)
  1026. Chang, C. C. and Yu, T. X., "Cryptanalysis of an Encryption Scheme for Binary Images," Pattern Recognition Letters, Vol. 23, No. 14, pp.1847-1852, 2002-05. (SCIE)
  1027. Chang, C. C., Chen, T. S. and Chung, L. Z., "A Steganographic Method Based upon JPEG and Quantization Table Modification," Information Science: an International Journal, Vol. 141, No. 1, pp. 123-138, 2002-05. (SCIE)
  1028. Chan, Y. K and Chang, C. C., "A Color Image Retrieval Method Based on Color Moment and Color Variance of Adjacent Pixels," International Journal on Pattern Recognition and Artificial Intelligence, Vol. 16, No. 1, pp. 113-125, 2002-05. (SCIE)
  1029. Wang, C. T, Chang, C. C. and Lin, C. H., "A New Micro-Payment System Using General Payword Chain," Electronic Commerce Research Journal, Vol. 2, pp. 159-168., 2002-05. (SCIE)
  1030. Chang, C. C. and Pan, Y. P., "An IC Card Based Remote Password Authentication Mechanism," Communications of IICM, Vol. 5, No. 1, March 2002, pp.1-8, 2002-03. (.)
  1031. Wu, T. C., Lin, T. Y. and Chang, C. C., "Modifications of Elgamal’s Cryptoscheme with/without One-Way Hash Function," Journal of the Chinese Institute of Electronical Engineering, Vol. 9, No. 1, pp. 55-58, 2002-01. (SCIE,EI)
  1032. Chang, C. C. and Hwang, K. F., "An Information Hiding Technique for Halftone Images Based on Human Visual Effects," Journal of China Institute of Communications, Vol. 23, No. 5, pp.9-17, 2002-01. (SCIE)
  1033. Chang, C. C., Chan, C. S. and Hsiao, J. Y., "Sharing a Secret Image in a Sequence of Linear Ordered Images," Chinese Cryptology and Information Security Association, Vol. 8, No. 1, Dec. 2001, pp. 93-103, 2001-12. (.)
  1034. Chang, C. C., Chen, L. L. and Chen, T. S., "A New Fast Search Algorithm of Block Motion Estimation Using Clustering Technique," Journal of Applied Systems Studies, Vol. 2, No. 2, 2001, 2001-06.
  1035. Chen, T. S. and Chang, C.C., "New Method of Secret Image Sharing Based on Vector Quantization," Journal of Electronic Imaging, Vol. 10, No. 4, 2001, pp. 988-997, 2001-06.
  1036. Chang, C. C. and Wu, H. C., "IA Copyright Protection Scheme of Images Based on Visual Cryptography," Imaging Science Journal, Vol. 14, pp. 141-150., 2001-05. (SCIE)
  1037. Chang, C. C. and Chen, G. I., "Bi-level Lossless Calligraphy Compression Using Location Propagation and Width Inheritance," Journal of Computer Processing of Oriental Languages, Vol. 14, No. 4, pp. 309-339, 2001-05. (SCIE)
  1038. Hung, K. L. and Chang, C. C., "A Novel Progressive Image Transmission Technique for Chinese Calligraphy," Journal of Computer Processing of Oriental Languages, Vol. 14, No. 4, pp. 293-307, 2001-05. (SCIE)
  1039. Hwang, K. F. and Chang, C. C., "Improved Nearest Codeword Search Scheme Using a Tighter Kick-out Condition," Optical Engineering, Vol. 40, No. 9, pp. 1749-1751, 2001-05. (SCIE)
  1040. Hung, K. L., Chang, C. C. and Chen, T. S., "Secure Discrete Cosine Transform based Technique for Recoverable Tamper Proofing," Optical Engineering, Vol. 40, No. 9, pp. 1950-1958, 2001-05. (SCIE)
  1041. Tsai, C. S., Chang, C. C. and Chen, T. S., "Image Steganography Using Vector Quantization and Discrete Cosine Transformation," Imaging Science Journal, Vol. 48, pp. 205-215, 2001-05. (SCIE)
  1042. Chang, C. C. and Kuo, Y. T., "Employ a Data Compression Scheme to Speed up the Computations on Elliptic Curves," International Journal of Applied Mathematics, Vol. 7, No. 1, pp. 1-16, 2001-05. (SCIE)
  1043. Hwang, R. J. and Chang, C. C., "Hiding a Picture in two Pictures," Optical Engineering, Vol. 40, No. 3, pp. 342-351, 2001-05. (SCIE)
  1044. Chang, C. C. and Wu, H. C., "A Secure and Robust Digital Image Copyright Protection Scheme," Journal of Applied Systems Studies, Vol. 2, No. 3, 2001-05. (SCIE)
  1045. Chang, C. C., Chen, L. L. and Chen T. S., "A New Two-way Search Algorithm for Block Motion Estimation Estimation of Video Data," Journal of Information Science and Engineering, Vol. 17, No. 3, pp. 405-415, 2001-05. (SCIE)
  1046. Hu, Y. C. and Chang, C. C., "Image Coding Schemes Based on Subsampling Vector Quantization," Optical Engineering, Vol. 40, No. 1, pp. 108-114, 2001-05. (SCIE)
  1047. Chan, Y. K. and Chang, C. C., "Image Matching Using Run-Length Feature," Pattern Recognition, Vol. 22, pp. 447-455, 2001-05. (SCIE)
  1048. Hwang, M. S., Chang, C. C. and Hwang, K. F., "An Efficient Threshold Decryption Scheme without Session Keys," Computer & Electrical Engineering, Vol. 27, pp. 29-35, 2001-05. (SCIE)
  1049. Chan, Y. K. and Chang, C. C., "Spatial Similarity Retrieval in Video Database," Journal of Visual Communication and Image Representation, Vol. 12, pp. 107-122, 2001-05. (SCIE)
  1050. Wu, T. C. and Chang, C. C., "Cryptographic Key Assignment Scheme for Hierarchical Access Control," International Journal of Computer Systems Science and Engineering, Vol. 16, No. 1, pp. 25-28, 2001-05. (SCIE)
  1051. Chang, C. C., Hwang, M. S. and Chen, T. S., "New Encryption Algorithm for Image Cryptosystems," Journal of Systems and Software, Vol. 58, pp. 83-91, 2001-05. (SCIE)
  1052. Lee, C. F. and Chang, C. C., "A Breadth First Oriented Symbolic Picture Representation for Spatial Match Retrieval," Journal of Systems and Software, Vol. 52, No. 1, pp. 11-23, 2000-05. (SCIE)
  1053. Chan, Y. K. and Chang, C. C., "A Fast Filter of Spatial Video Retrieval," International Journal of Applied Mathematics, Vol. 4, No. 2, pp. 157-171, 2000-05. (SCIE)
  1054. Chang, C. C. and Chan, C. W., "Computing Lucas Functions Using Addition Chains," International Journal of Applied Mathematics, Vol. 4, No. 2, pp. 173-188, 2000-05. (SCIE)
  1055. Hwang, M. S., Chang, C. C. and Hwang, K. F., "Digital Watermarking of Images Using Neural Networks," Journal of Electronic Imaging, Vol. 9, No. 4, Oct. 2000, pp. 548-555, 2000-05.
  1056. Chang, C. C. and Kuo, Y. T., "Fast Modular Reduction and Multi-multiplication Method," International Journal of Applied Mathematics, Vol. 3, No. 1, pp. 35-46, 2000-05.
  1057. Chang, C. C., Chen, T. S. and Chung, L. Z., "A Colour Image Compression Scheme Based on Two-Layer Absolute Moment Block Truncation Coding," Imaging Science Journal, Vol. 48, pp. 53-62, 2000-05.
  1058. Hu, Y. C. and Chang, C. C., "Quadtree-Segmented Image Coding Schemes Using Vector Quantization and Block Truncation Coding," Optical Engineering, Vol. 39, No. 2, pp. 464-471, 2000-05.
  1059. Chang, C. C. and Lou, D. C., "An Efficient Divide-and-Conquer Technique for Parallel Computation of Modular Multi-Exponentiation," Computer Systems Science and Engineering, Vol. 15, No. 2, pp. 111-117, 2000-05.
  1060. Lee, W. B. and Chang, C. C., "User Identification and Key Distribution Maintaining Anonymity for Distributed Computer Networks," Computer Systems Science and Engineering, Vol. 15, No. 4, pp. 211-214, 2000-05.
  1061. Chang, C. C., Chou, J. S. and Chen, T. S., "An Efficient Computation of Euclidean Distance Using Approximated Look-Up Table," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 10, No. 4, pp. 594-599, 2000-05.
  1062. Chang, C. C., Shine, F. C. and Chen, T. S., "Pattern-based Side Match Vector Quantization for Image Compression," Imaging Science Journal, Vol. 48, pp. 63-76, 2000-05.
  1063. Hwang, S. J. and Chang, C. C., "A New Efficient Server-Aided RSA Secret Computation Protocol Against Active Attacks," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E83-A, No. 3, pp. 567-570, 2000-05.
  1064. Chang, C. C., Hwang, K. F. and Hwang, M.S., "A Digital Watermarking Scheme Using Human Visual Effects," Informatica, Vol. 24, No. 4, pp. 505-511, 2000-05.
  1065. Chang, C. C. and Tsai, C. S., "A Technique for Computing Watermarks from Digital Images," Informatica, Vol. 24, No. 3, pp. 391-396, 2000-05.
  1066. Chang, C. C., Chen, T. S. and Chung, P. F., "A Technique of Watermarking for Digital Images Using (t, n)-Threshold Scheme," Informatica, Vol. 24, No. 1, pp. 51-55, 2000-05.
  1067. Wang, C. T, Chang, C. C. and Lin, C. H., "Generalization of Threshold Signature and Authenticated Encryption for Group Communications," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E83-A, No. 6, pp. 1228-1237, 2000-05.
  1068. Hu, Y. C. and Chang, C. C., "A Predictive Subcodebook Search Algorithm for Vector Quantization," Optical Engineering, Vol. 39, No. 6, pp. 1489-1496, 2000-05.
  1069. Hu, Y. C. and Chang, C. C., "A New Lossless Compression Scheme Based on Huffman Coding for Image Compression," Signal Processing:Image Communication, Vol. 16, pp. 367-372, 2000-05.
  1070. Chang, C. C., Wang, C. T. and Lin, C. H., "Conference Key Distributions Using Self-Certified Public Keys," International Journal of Applied Mathematics, Vol. 2, No. 3, pp. 327-337, 2000-05.
  1071. Chang, C. C. and Shen J. J., "A Multi-Channel Storage Arrangement Scheme of Pictorial Databases for Concurrent Spatial Match Retrieval," Computer and Mathematics with Applications, Vol. 39, No. 5-6, pp. 239-248, 2000-05.
  1072. Chang, C. C., "Digital Watermarking of Images Using Neural Networks," Journal of Electronic Imaging, ., 2000-02. (.)
  1073. Chang, C. C. and Tsu, S. M., "An Improvement on Shimada’s Public-key Cryptosystem," Tamkang Journal of Science and Engineering, Vol. 3, No. 2, pp. 75-80, 2000-01. (EI)
  1074. Buehrer, D. J., Lu, C. S. and Chang, C. C., "A Shape Recognition Scheme Based on Real-valued Boundary Points," Tamkang Journal of Science and Engineering, Vol. 3, No. 1, pp. 55-74, 2000-01. (EI)
  1075. Jan, J. K., Lee, J. C., Lin, C. H. and Chang, C. C., "Reducing Space for Storing Keys in a Single Key Access Control System," Tamkang Journal of Science and Engineering, Vol. 3, No. 4, pp. 229-242, 2000-01. (EI)
  1076. Chen, C. Y. and Chang, C. C., "A Fast Modular Multiplication Algorithm for Calculating the Product AB Modulo N," Information Processing Letters, Vol. 72, pp. 77-81, 1999-05.
  1077. Hung, K. L., Chang, C. C. and Chen T. S., "Reconstruction of Lost Blocks Using Codeword Estimation," IEEE Transactions on Consumer Electronics, Vol. 45, No. 4, pp. 1190-1199, 1999-05.
  1078. Hwang, M. S., Chang, C. C. and Hwang, K. F., "A Watermarking Technique Based on One-way Hash Functions," IEEE Transactions on Consumer Electronics, Vol. 45, No. 2, pp. 286-294, 1999-05.
  1079. Wang, C. T., Chang, C. C. and Lin, C. H., "A Method for Computing Lucas Sequence," Computer and Mathematics with Applications, Vol. 38, pp.187-196, 1999-05.
  1080. Chang, C. C. and Hwang, P. C. and Lee, W. B., "Conference Key Distribution Scheme for Portable Communication System," Computer Communications, Vol. 22, No. 12, pp. 1160-1164, 1999-05.
  1081. Jiang, J. H., Chang, C. C. and Chen, T. S., "A Compact Sparse Matrix Representation Using Random Hash Functions," Data & Knowledge Engineering, Vol. 32, pp. 29-49, 1999-05.
  1082. Hu, Y. C. and Chang, C. C., "Variable Rate Vector Quantization Scheme Based on Quadtree Segmentation," IEEE Transactions on Consumer Electronics, Vol. 45, No. 2, pp. 310-317, 1999-05.
  1083. Hu, Y. C and Chang, C. C., "Low Complexity Index-Compressed Vector Quantization for Image Compression," IEEE Transactions on Consumer Electronics, Vol. 45, No. 1, pp. 1225-1233, 1999-05.
  1084. Jiang, J. H., Chang, C. C. and Chen, T. S., "Calligraphy Compression Using Quadtree Decomposition and Pattern Matching," Computer Processing of Oriental Languages, Vol. 12, No. 3, pp. 341-358, 1999-05.
  1085. Chang, C. C. and Hu, Y. C., "Hybrid Image Compression Methods Based on Vector Quantization and Block Truncation Coding," Optical Engineering, Vol. 38, No. 4, pp. 591-598, 1999-05.
  1086. Hwang, R. J., Lee, W. B. and Chang, C. C., "A Concept of Designing Cheater Identification Methods for Secret Sharing," Journal of Systems and Software, Vol. 46, pp. 7-11, 1999-05.
  1087. Chang, C. C., Lee, T. F. and Leu, J. J., "Partition Search Filter and Its Performance Analysis," Journal of Systems and Software, Vol. 47, pp. 35-43, 1999-05.
  1088. Hwang, R. J. and Chang, C. C., "An Improved Threshold Scheme Based on Modular Arithmetic," Journal of Information Science and Engineering, Vol. 15, No. 5, pp. 691-699, 1999-05.
  1089. Lee, W. B. and Chang, C. C., "(t, n) Threshold Digital Signature with Traceability Property," Journal of Information Science and Engineering, Vol. 15, No. 5, pp. 669-678, 1999-05.
  1090. Chang, C. C.* and Hu, Y. C., "A Fast Codebook Training Algorithm for Vector Quantization," IEEE Transactions on Consumer Electronics, Vol. 44, No. 4, pp. 1201-1208, 1998-11. (SCIE)
  1091. Chang, C. C., Jau, J. J. and Chen, T. S., "A Fast Reconstruction Method for Transmitting Images Progressively," IEEE Transactions on Consumer Electronics, Vol. 44, No. 4, pp. 1225-1233, 1998-05.
  1092. Chang, C. C. and Lee, C. F., "A Spatial Match Retrieval Mechanism for Symbolic Pictures," Journal of Systems and Software, Vol. 44, pp. 73-83, 1998-05.
  1093. Chang, C. C. and Hu, Y. C., "A Fast LBG Codebook Training Algorithm for Vector Quantization," IEEE Transactions on Consumer Electronics, Vol. 44, No. 4, pp. 1201-1208, 1998-05.
  1094. Chang, C. C., Chen, L. L. and Chen, T. S., "An Improvement of Bottom-Up Variable-Sized Block Matching Technique for Video Compression," IEEE Transactions on Consumer Electronics, Vol. 44, No. 4, pp. 1234-1242, 1998-05.
  1095. Lee, W. B. and Chang, C. C., "Authenticity of Public Keys in Asymmetric Cryptosystems," Computer Communications, Vol. 21, No. 2, pp. 195-198, 1998-05.
  1096. Wang, C. T., Chang, C. C. and Lin, C. H., "Conference Key Supervision in a Level-Based Hierarchy," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E81-A, No. 10, pp. 2219-2227, 1998-05.
  1097. Lee, W. B. and Chang, C. C., "Using RSA with Low Exponent in a Public Network," Computer Communications, Vol. 21, pp. 284-286, 1998-05.
  1098. Chang, C. C. and Hwang, R. J., "A Simple Picture Hiding Scheme," Computer Processing of Oriental Languages, Vol. 12, No. 2, pp. 237-248, 1998-05.
  1099. Wang, C. T., Lin, C. H. and Chang, C. C., "Threshold Signature Schemes with Traceable Signers in Group Communications," Computer Communications, Vol. 21, pp. 771-776, 1998-05.
  1100. Chang, C. C. and Hwang, R. J., "Sharing Secret Images Using Shadow Codebooks," Information Sciences, Vol. 111, No. 1-4, pp. 335-345, 1998-05.
  1101. Lee, W. B. and Chang, C. C., "A Dynamic Secret Sharing Scheme Based on the Factoring and Diffie-Hellman Problems," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E81-A, pp. 1733-1738, 1998-05.
  1102. Chang, C. C. and Lee, C. F., "A Bin-Tree Oriented Iconic Indexing Scheme for Retrieving Symbolic Pictures," Data and Knowledge Engineering, Vol. 26, No. 2, pp. 121-133, 1998-05.
  1103. Chang, C. C., Lee, W. T. and Chen, T. S., "Two Improved Codebook Search Methods of Vector Quantization Based on Orthogonal Checking and Fixed Range Search," Journal of Electronic Imaging, Vol. 7, No. 2, pp. 357-366, 1998-05.
  1104. Chang, C. C., Chou, J. S. and Chen, T. S., "A Predictive Image Coding Scheme Using a Smaller Codebook," Image Communication, Vol. 12, pp. 23-32, 1998-05.
  1105. Chang, C. C., Wu, T. C. and Yeh, Y. S., "Broadcasting Secrets in Communication Networks," Computer Systems Science and Engineering, Vol. 13, No. 2, pp. 121-124, 1998-05.
  1106. Hwang, S. J., Chen, C. Y. and Chang, C. C., "An Encryption/Multisignature Scheme with Specified Receiving Groups," Computer Systems Science and Engineering, Vol. 2, pp. 109-112, 1998-05.
  1107. Lou, D. C. and Chang, C. C., "A Fast Modular Multiplication Method," Computer Systems Science and Engineering, Vol. 13, No. 6, pp. 353-358, 1998-05.
  1108. Lee, W. B. and Chang, C. C., "Efficient Group Signature Scheme Based on Discrete Logarithm," IEE Proceedings - Computers and Digital Techniques, Vol. 145, No. 1, pp. 15-18, 1998-05.
  1109. Lou, D. C. and Chang, C. C., "An Adaptive Exponentiation Method," Journal of Systems and Software, Vol. 42, pp. 59-69, 1998-05.
  1110. Hwang, R. J. and Chang, C. C., "An On-line Secret Sharing Scheme for Multi-secrets," Computer Communications, Vol. 21, No. 13, pp. 1170-1176, 1998-05.
  1111. Chang, C. C. and Lee, C. F., "A Two-level Signature File Based on a Block-oriented Data Model for Spatial Match Retrieval," Journal of the Chinese Institute of Engineers, Vol. 21, No. 4, pp. 467-478, 1998-01. (SCIE)
  1112. Chang, C. C. and Tsai, H. M., "A Generalized Secret Sharing Scheme," Journal of Systems and Software, Vol. 36, No. 3, 1997, pp. 267-272, 1997-06.
  1113. Chang, C. C. and Jiang, J. H., "Multiple Disk Allocation Based on Round-Robin Hilbert Curve for Spatial Data," International Journal of Information and Management Sciences, Vol. 9, No. 1, pp. 11-23, 1997-05.
  1114. Chang, C. C., Sung, C. H. and Chen, T. S., "A New Data Compression Scheme for Chinese Text Using Chinese Words and Multilist Structure," Computer Processing of Chinese and Oriental Languages, Vol. 11, No. 2, pp. 145-158, 1997-05.
  1115. Lee, W. B. and Chang, C. C., "Three ID-Based Information Security Functions," Computer Communications, Vol. 20, pp. 1301-1307, 1997-05.
  1116. Chang, C. C. and Lee, C. F., "Spatial Match Retrieval Based on Direction Signatures Using Multiple Key Hashing Scheme," International Journal of Intelligent Systems, Vol. 12, No. 10, pp. 777-788, 1997-05.
  1117. Kuo, W. C., Laih, C. S., Gau, M. J. and Chang, C. C., "On the Number of Messages Cannot be Concealed in LUC," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E80-A, No. 11, pp. 2218-2224, 1997-05.
  1118. Lee, W. B. and Chang, C. C., "Authenticated Encryption Schemes with Linkage between Message Blocks," Information Processing Letters, Vol. 63, pp. 247-250, 1997-05.
  1119. Lou, D. C. and Chang, C. C., "A Cost Optimal Search Technique for the Knapsack Problem," International Journal of High Speed Computing, Vol. 9, No. 1, pp. 1-12, 1997-05.
  1120. Chen, C. Y., Lin, H. F., Chang, C. C. and Lee, R. C. T., "Multidisk Smaller Sized MKH File Allocation for Partial Match Retrieval," Journal of Information Science and Engineering, Vol. 13, pp. 125-141, 1997-05.
  1121. Chang, C. C. and Hwang, S. J., "A Simple Approach for Generating RSA Keys," Information Processing Letters, Vol. 63, pp. 19-21, 1997-05.
  1122. Chen, T. S., Chang, C. C. and Hwang, M. S., "A Virtual Image Cryptosystem Based on Vector Quantization," IEEE Transactions on Image Processing, Vol. 7, No. 10, pp. 1485-1488, 1997-05.
  1123. Chang, C. C., Jiang, J. H. and Buehrer, D. J., "A New Method for Temporal Join Using a Priority Search Tree," International Journal of Information and Management Sciences, Vol. 8, No. 3, pp. 1-13, 1997-05.
  1124. Chang, C. C. and Lou, D. C., "Parallel Computation of the Multi-Exponentiation for Cryptosystems," International Journal of Computer Mathematics, Vol. 63, No. 1-2, pp. 9-26, 1997-05.
  1125. Chen, T. S. and Chang, C. C., "Diagonal Axes Method (DAM): A Fast Search Algorithm for Vector Quantization," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 7, No. 3, pp. 555-559, 1997-05.
  1126. Chang, C. C. and Wu, T. C., "A Smart Card Oriented Password Authentication Scheme Based on Rabin’s Public Key Cryptosystem," International Journal on Information and Management Sciences, Vol. 8, No. 3, pp. 63-73, 1997-05.
  1127. Chang, C. C. and Hwang, R. J., "Efficient Cheater Identification Method for Threshold Schemes," IEE Proceedings - Computers and Digital Techniques, Vol. 144, No. 1, pp. 23-27, 1997-05.
  1128. Chang, C. C., Lou, D. C. and Wu, T. C., "A Binary Access Control Method Using Prime Factorization," Information Sciences, Vol. 96, No. 1-2, pp. 15-26, 1997-05.
  1129. Chen, T. S. and Chang, C. C., "A New Image Coding Algorithm Using Variable-Rate Side-Match Finite-State Vector Quantization," IEEE Transactions on Image Processing, Vol. 6, No. 8, pp.1185-1187, 1997-05.
  1130. Chang, C. C., Lin, D. C. and Chen, T. S., "An Improved VQ Codebook Search Algorithm Using Principal Component Analysis," Journal of Visual Communication and Image Representation, Vol. 8, No. 1, pp. 27-37, 1997-05.
  1131. Chang, C. C. and Wu, W. B., "A Secure Voting System on a Public Network," Networks, Vol. 29, 1997, pp. 81-87, 1997-05.
  1132. Chang, C. C. and Chen, T. S., "New Tree-Structured Vector Quantization with Closest-Coupled Multipath Searching Method," Optical Engineering, Vol. 36, No. 6, pp.1713-1720, 1997-05.
  1133. Chen, C. Y., Lin, H. F., Chang, C. C. and Lee, R. C. T., "Optimal Bucket Allocation Design of K-ary MKH Files for Concurrent Partial Match Retrieval," IEEE Transactions on Knowledge and Data Engineering, Vol. 9, No. 1, pp. 148-160, 1997-05.
  1134. Chang, C. C. and Wang, C. H., "A Locally Adaptive Data Compression Strategy for Chinese-English Characters," Journal of Systems and Software, Vol. 36, No. 2, pp. 167-179, 1997-05.
  1135. Chang, C. C., Jan, J. K. and Kowng, H. C., "A Digital Signature Scheme Based upon Theory of Quadratic Residues," Cryptologia, Vol. XXI, No. 1, pp. 55-70, 1997-05.
  1136. Chang, C. C. and Lin, C. H., "A Generalized Secure Broadcasting Cryptosystem," Journal of Computers, Vol. 8, No. 4, pp. 13-18, 1996-12. (EI)
  1137. Chang, C. C. and Leu, J. J., "The Performance Analysis of Bloom and Random Filters," Journal of the Chinese Institute of Engineers, Vol. 19, No. 4, pp. 451-458, 1996-07. (SCIE)
  1138. Chen, C. Y., Chang, C. C. and Yang, W. P., "Hybrid Method for Modular Exponentiation with Precomputation," IEE Electronics Letters, Vol. 32, No. 6, pp. 540-541, 1996-05.
  1139. Hwang, S. J., Chang, C. C. and Yang, W. P., "Authenticated Encryption Schemes with Message Linkage," Information Processing Letters, Vol. 58, pp. 189-194, 1996-05.
  1140. Lee, W. B. and Chang, C. C., "On Key Changeable ID-Based Digital Signature Scheme," Journal of Information Science and Engineering, Vol. 12, No. 3, pp. 381-386, 1996-05.
  1141. Hwang, S. J., Chang, C. C. and Yang, W. P., "Two Efficient Server-Aided RSA Secret Computation Protocols against Active Attacks," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E79-A, No. 9, pp. 1504-1511, 1996-05.
  1142. Lou, D. C. and Chang, C. C., "Fast Exponentiation Method Obtained by Folding the Exponent in Half," IEE Electronics Letters, Vol. 32, No. 11, pp. 984-985, 1996-05.
  1143. Hwang, S. J., Chang, C. C. and Yang, W. P., "An Efficient Dynamic Threshold Scheme," IEICE Transactions on Information and Systems, Vol. E79-D, No. 7, pp. 936-942, 1996-05.
  1144. Chang, C. C. and Leu, J. J., "Two 2D Search Filters and Their Performance Analyses," International Journal of Computer Mathematics, Vol. 60, No. 3-4, pp. 183-203, 1996-05.
  1145. Lou, D. C. and Chang, C. C., "A Parallel Two-list Algorithm for the Knapsack Problem," Parallel Computing, Vol. 22, pp. 1985-1996, 1996-05.
  1146. Chou, A. Y. H., Chang, C. C. and Yang, W. P., "Some Properties of Optimal Cartesian Product Files for Orthogonal Range Queries," Information Sciences, Vol. 90, No. 1-4, pp. 91-107, 1996-05.
  1147. Chang, C. C., Chang, R. F., Lee, W. T. and Kuo, C. L., "Fast Algorithms for Vector Quantization," Journal of Information Science and Engineering, Vol. 12, No. 4, pp. 593-602, 1996-05.
  1148. Wu, T. C. and Chang, C. C., "Retrieving Chinese Characters with Similar Appearance from a Reorganized Chinese Dictionary," International Journal of Information and Management Sciences, Vol. 7, No. 2, pp. 31-43, 1996-05.
  1149. Chang, C. C. and Lin, D. C., "A Spatial Data Representation: An Adaptive 2D-H String," Pattern Recognition Letters, Vol. 17, No. 2, pp. 175-185, 1996-05.
  1150. Chang, C. C. and Hwang, M. S., "Parallel Computation of the Generating Keys for RSA Cryptosystems," IEE Electronics Letters, Vol. 32, No. 15, pp. 1365-1366, 1996-05.
  1151. Chen, C. Y., Lin, H. F., Chang, C. C. and Lee, R. C. T., "Redundant MKH Files Design among Multiple Disks for Concurrent Partial Match Retrieval," Journal of Systems and Software, Vol. 35, No. 3, pp. 199-207, 1996-05.
  1152. Chen, C. Y., Chang, C. C. and Yang, W. P., "Cryptanalysis of the Secret Exponent of RSA," Journal of Information Science and Engineering, Vol. 12, pp. 277-290, 1996-05.
  1153. Lee, W. B. and Chang, C. C., "Integrating Authentication in Public Key Distribution System," Information Processing Letters, Vol. 57, pp. 49-52, 1996-05.
  1154. Chang, C. C., Kowng, H. C. and Buehrer, D. J., "An Improvement to Ziegler's Sparse Matrix Compression Algorithm," Journal of Systems and Software, Vol. 35, No. 1, pp. 67-71, 1996-05.
  1155. Lee, W. B. and Chang, C. C., "Cryptanalysis of an Improved Remote Password Authentication with Smart Card," International Journal of Information Management and Engineering, Vol. 2, No. 1, pp. 1-5, 1996-05.
  1156. Chang, C. C. and Jiang, J. H., "A Spatial Filter for Similarity Retrieval," International Journal on Pattern Recognition and Artificial Intelligence, Vol. 10, No. 6, pp. 711-730, 1996-05.
  1157. Hwang, T., Lee, N. Y., Li, C. M. and Chang, C. C., "On the Security of Chang and Wu's Broadcasting Cryptosystem for Computer Network," Computer Systems Science and Engineering, Vol. 11, No. 5, pp. 311-314, 1996-05.
  1158. Chang, C. C. and Lee, C. F., "A Greedy Relaxed Generalized Disc Modulo Allocation Method for Multiple Key Hashing Files on Multi-Disc Systems," Journal of the Chinese Institute of Engineers, Vol. 19, No. 2, pp. 155-169, 1996-03. (SCIE)
  1159. Chang, C. C. and Chou, J. S., "A Fast Codeword Searching Mechanism for Quantization Strategy," Journal of Computers, Vol. 7, No. 3&4, pp. 10-16, 1995-12. (EI)
  1160. Chen, C. Y., Chang, C. C. and Yang, W. P., "A New Subliminal Channel in RSA-Like Variant of the Fiat-Shamir Signature Scheme," Journal of the Chinese Institute of Engineers, Vol. 18, No. 6, pp. 867-872, 1995-11. (SCIE)
  1161. Hwang, S. J., Chang, C. C. and Yang, W. P., "An Encryption/Signature Scheme with Low Message Expansion," Journal of the Chinese Institute of Engineers, Vol. 18, No. 4, pp. 591-595, 1995-07. (SCIE)
  1162. Chang, C. C., Wu, W. B. and Wu, T. C, "Cryptanalysis and Improvement on a Conference Key Distribution System," Journal of the Chinese Institute of Engineers, Vol. 18, No. 3, pp. 391-396, 1995-05. (SCIE)
  1163. Chang, C. C., Wu, T. C. and Laih, C. S., "Cryptanalysis of a Password Authentication Scheme Using Quadratic Residues," Computer Communications, Vol. 18, No. 1, pp. 45-47, 1995-05.
  1164. Chang, C. C. and Liang, J., "Dynamic Pictorial Databases Design for Similarity Retrieval," Information Sciences, Vol. 87, No. 1-3, pp. 29-46, 1995-05.
  1165. Lee, W. B. and Chang, C. C., "Comment on Digital Signature with (t, n) Shared Verification Based on Discrete Logarithms," IEE Electronics Letters, Vol. 31, No. 3, pp. 176-177, 1995-05.
  1166. Chang, C. C., Tsu, S. M. and Chen, C. Y., "Remote Scheme for Password Authentication Based on Theory of Quadratic Residues," Computer Communications, Vol. 18, No. 12, pp. 936-942, 1995-05.
  1167. Chang, C. C. and Tsu, S. M., "Arithmetic Operations on Encrypted Data," International Journal of Computer Mathematics, Vol. 56, No. 1-2, pp. 1-10, 1995-05.
  1168. Chen, Y. J., Chang, C. C. and Yang, W. P., "Parallel Computation of the Modular Cascade Exponentiation," Journal of Parallel Algorithms and Applications, Vol. 7, pp. 29-42, 1995-05.
  1169. Tsai, H. M. and Chang, C. C., "A Cryptographic Implementation for Dynamic Access Control in a User Hierarchy," Computers and Security, Vol. 14, No. 2, pp. 159-166, 1995-05.
  1170. Lee, W. B. and Chang, C. C., "Authenticated Encryption Scheme without Using a One Way Function," IEE Electronics Letters, Vol. 31, No. 19, pp. 1656-1657, 1995-05.
  1171. Lee, W. B., Chang, C. C. and Jan, J. K., "Cryptanalysis of a Cryptosystem Based upon Continuned Fraction," International Journal of Information and Management Sciences, Vol. 6, No. 3, pp. 1-11, 1995-05.
  1172. Chen, Y. J., Chang, C. C. and Yang, W. P., "The Shortest Weighted Length Addition Chains," Journal of Information Science and Engineering, Vol. 11, No. 2, pp. 295-305, 1995-05.
  1173. Chen, C. Y., Chang, C. C. and Lee, R. C. T., "A Near Pattern-matching Scheme Based upon Principal Component Analysis," Pattern Recognition Letters, Vol. 16, No. 4, pp. 339-345, 1995-05.
  1174. Chang, C. C. and Wu, T. C., "An Exact Match Retrieval Scheme Based upon Principal Component Analysis," Pattern Recognition Letters, Vol. 16, No. 5, pp. 465-470, 1995-05.
  1175. Chang, C. C. and Lee, C. F., "Relative Coordinates Oriented Symbolic String for Spatial Relationship Retrieval," Pattern Recognition, Vol. 28, No. 4, pp. 563-570, 1995-05.
  1176. Chou, A. Y. H., Yang, W. P. and Chang, C. C., "Optimal Two-Dimensional Cartesian Product Files for Orthogonal Range Queries," Journal of Information Science and Engineering, Vol. 11, No. 4, pp. 625-647, 1995-05.
  1177. Chang, C. C., Horng, W. J. and Buehrer, D. J., "A Cascade Exponentiation Evaluation Scheme Based on the Lempel-Ziv-Welch Compression Algorithm," Journal of Information Science and Engineering, Vol. 11, No. 3, pp. 417-431, 1995-05.
  1178. Lin, C. H., Chang, C. C. and Lee, R. C. T., "A New Public-key Cipher System Based upon the Diophantine Equations," IEEE Transactions on Computers, Vol. 44, No. 1, pp. 13-19, 1995-05.
  1179. Chang, C. C., Fan, S. W., Liaw, H. T. and Chiou, M. Y., "Cryptanalysis on an Access Control in a Hierarchy," Computers and Mathematics with Applications, Vol. 29, No. 4, pp. 69-72, 1995-05.
  1180. Chang, C. C. and Liou, F. Y., "A Digital Multisignature Scheme Based upon the Digital Signature Scheme of a Modified ElGamal's Public Key Cryptosystem," Journal of Information Science and Engineering, Vol. 10, No. 3, pp. 423-432, 1994-05.
  1181. Wu, T. C., Chang, C. C. and Yeh, Y. S., "An Authentication-Combined Access Control Scheme Using a One-Way Function," Computers and Mathematics with Applications, Vol. 27, No. 5, pp. 63-70, 1994-05.
  1182. Chang, C. C., Chen, Y. W. and Buehrer, D. J., "A Two-Dimensional Shape Recognition Scheme Based on Principal Component Analysis," International Journal of Pattern Recognition and Artificial Intelligence, Vol. 8, No. 4, pp. 859-875, 1994-05.
  1183. Laih, C. S., Chiou, W. H. and Chang, C. C., "Authentication and Protection of Public Keys," Computers and Security, Vol. 13, No. 7, pp. 581-585, 1994-05.
  1184. Chang, C. C. and Lin, D. C., "Utilizing the Concept of Longest Common Subsequence to Retrieve Similar Chinese Characters," Chinese and Oriental Languages Computing, Vol. 8, No. 2, pp. 177-192, 1994-05.
  1185. Chang, C. C., Shen, J. J. and Wu, T. C., "Access Control with Binary Keys," Computers and Security, Vol. 13, No. 8, pp. 681-686, 1994-05.
  1186. Liang, J., Chang, C. C., McFadyen, R. G. and Lee, R. C. T., "Optimal Multiple Key Hashing Files for Orthogonal Range Queries," Information Sciences, Vol. 79, No. 1-2, pp. 145-158, 1994-05.
  1187. Wu, T. C. and Chang, C. C., "Controlling Access in Tree Hierarchies," Information Sciences, Vol. 78, pp. 69-76, 1994-05.
  1188. Lin, C. H. and Chang, C. C., "Method for Constructing a Group-Oriented Cipher System," Computer Communications, Vol. 17, No. 11, pp. 805-808, 1994-05.
  1189. Chang, C. C. and Liaw, H. T., "Assigning Digital Key Pairs to Determine Relationships in a User Hierarchy Structure," Transactions of Information Processing Society of Japan, Vol. 35, No. 10, pp. 2189-2196, 1994-05.
  1190. Chang, C. C., Hwang, S. J. and Buehrer, D. J., "New Concepts for Multiple Stack Systems: Born and Reborn," Journal of Systems and Software, Vol. 27, No. 1, pp. 45-54, 1994-05.
  1191. Ko, M. Y., Hwang, T. and Chang, C. C., "Attacks on ID-based Signature Scheme Based upon Rabin's Public Key Cryptosystem," Computer Communications, Vol. 17, No. 9, pp. 674-676, 1994-05.
  1192. Laih, C. S., Chang, C. C. and Yeh, S. M., "Parallel Computation of the Cascade Exponentiation," International Journal of Information Management and Engineering, Vol. 1, No. 3, pp. 9-13, 1994-05.
  1193. Lin, C. H. and Chang, C. C., "A Server-Aided Computation Protocol for RSA Enciphering Algorithm," International Journal of Computer Mathematics, Vol. 53, pp. 149-155, 1994-05.
  1194. Wu, T. C. and Chang, C. C., "Application of Geometric Hashing to Iconic Database Retrieval," Pattern Recognition Letters, Vol. 15, No. 9, pp. 871-876, 1994-05.
  1195. Chang, C. C. and Liao, W. Y., "A Remote Password Authentication Scheme Based upon ElGamal's Signature Scheme," Computers and Security, Vol. 13, No. 2, pp. 137-144, 1994-05.
  1196. Chang, C. C., Jan, J. K. and Buehrer, D. J., "A Scheme to Determine the Relationship between Two Users in a Hierarchy," Computers and Security, Vol. 13, No. 3, pp. 255-261, 1994-05.
  1197. Chen, Y. J., Chang, C. C. and Yang, W. P., "Some Properties of Vectorial Addition Chains," International Journal of Computer Mathematics, Vol. 54, pp. 185-196, 1994-05.
  1198. Tseng, J. C. R., Yang, W. P. and Chang, C. C., "A New Access Control Scheme with High Data Security," International Journal of Management and Information Sciences, Vol. 5, No. 3, pp. 35-48, 1994-05.
  1199. Chang, C. C. and Tsai, W. H., "Two Locally Adaptive Data Compression Schemes for Chinese Phonetic Syllables,” ,," Journal of Computers, Vol. 6, No. 1, pp. 48-57, 1994-01. (EI)
  1200. Chang, C. C., Liou, F. Y. and Buehrer, D. J., "A Practical Database Encryption System,” ,," Journal of Computers, Vol. 6, No. 3, pp. 20-25, 1994-01. (EI)
  1201. Chang, C. C., Kowng, H. C. and Wu, T. C., "A Refinement of a Compression-Oriented Addressing Scheme for Letter-Oriented Keywords," BIT, Vol. 33, pp. 530-535, 1993-05.
  1202. Chang, C. C. and Hwang, S. J., "Using Smart Cards to Authenticate Remote Passwords," Computers and Mathematics with Applications, Vol. 26, No. 7, pp. 19-27, 1993-05.
  1203. Chang, C. C. and Buehrer, D. J., "Access Control in a Hierarchy Using a One-Way Trap Door Function," Computers and Mathematics with Applications, Vol. 26, No. 5, pp. 71-76, 1993-05.
  1204. Chang, C. C. and Wu, T. C., "Controlling the Access Requests in Information Protection Systems," Information Processing and Management, Vol. 29, No. 1, pp. 61-68, 1993-05.
  1205. Jan, J. K. and Chang, C. C., "A Key-Lock-Pair Oriented Access Control Scheme for the Growth of Users and Files," BIT, Vol. 33, pp. 382-389, 1993-05.
  1206. Chang, C. C. and Wu, T. C., "A Hashing-Oriented Nearest Neighbor Searching Scheme," Pattern Recognition Letters, Vol. 14, No. 8, pp. 625-630, 1993-05.
  1207. Chang, C. C., Lu, C. S. and Buehrer, D. J., "A Chinese Seal Imprints Recognition Scheme," Computer Processing of Chinese and Oriental Languages, Vol. 7, No. 1, pp. 111-124, 1993-05.
  1208. Chang, C. C. and Lee, H. C., "A New Generalized Group-Oriented Cryptoscheme without Trusted Centers," IEEE Journal on Selected Areas in Communications, Vol. 11, No. 5, pp. 725-729, 1993-05.
  1209. Chen, C. Y. and Chang, C. C., "An Object-Oriented Similarity Retrieval Algorithm for Iconic Image Database," Pattern Recognition Letters, Vol. 14, No. 6, pp. 465-470, 1993-05.
  1210. Chang, C. C. and Hwang, R. J., "Master Keys for an M3 Cryptoscheme," Cryptologia, Vol. XVII, No. 2, pp. 175-186, 1993-05.
  1211. Chen, C. Y., Chang, C. C. and Lee, R. C. T., "Optimal MMI File Systems for Orthogonal Range Retrieval," Information Systems, Vol. 18, No. 1, pp. 37-54, 1993-05.
  1212. Hwang, M. S., Chang, C. C. and Yang, W. P., "Modified Chang-Hwang-Wu Access Control Scheme," IEE Electronics Letters, Vol. 29, No. 24, pp. 2095-2096, 1993-05.
  1213. Wu, T. C., Yeh, Y. S. and Chang, C. C., "Algebraic Operations on Encrypted Relational Databases," Information Systems, Vol. 18, No. 1, pp. 55-62, 1993-05.
  1214. Chang, C. C. and Wang, C. H., "A Modified Lempel-Ziv-Welch Encoding Scheme," Journal of Computers, Vol. 5, No. 1, pp. 1-17, 1993-04. (EI)
  1215. Chang, C. C. and Chen, C. Y., "A Fast Accessing Scheme to Retrieve Multi-Character Words," Journal of Computers, Vol.5, No. 1, pp. 1-17, 1993-01. (EI)
  1216. Chang, C. C., Lee, W. B., Liao, W. Y. and Jiang, C. H., "An Identity-Based Cryptosystem Suitable for Smart Cards," Journal of Computers, Vol. 5, No. 2, pp. 7-21, 1993-01. (EI)
  1217. Chang, C. C. and Laih, C. S., "Remote Password Authentication with Smart Cards," IEE Proceedings - Part E, Vol. 139, No. 4, pp. 372-372, 1992-05.
  1218. Chang, C. C. and Lee, H. C., "A Solution to Generalized Group Cryptography," IT SECURITY: The Need for International Security, pp. 265-275, 1992-05.
  1219. Chang, C. C., Hwang, R. J. and Wu, T. C., "Cryptographic Key Assignment Scheme for Access Control in a Hierarchy," Information Systems, Vol. 17, No. 3, pp. 243-247, 1992-05.
  1220. Chang, C. C. and Wu, T. C., "Retrieving the Most Similar Symbolic Pictures from Pictorial Databases," Information Processing and Management, Vol. 28, No. 5, pp. 581-588, 1992-05.
  1221. Lin, C. H., Chang, C. C. and Lee, R. C. T., "A Conference Key Broadcasting System Using Sealed Locks," Information Systems, Vol. 17, No. 4, pp. 323-328, 1992-05.
  1222. Chang, C. C., "A Fast Algorithm to Retrieve Symbolic Pictures," International Journal of Computer Mathematics, Vol. 43, No. 3-4, pp. 133-138, 1992-05.
  1223. Chang, C. C. and Hwang, S. J., "A Secure Broadcasting Scheme Based on Discrete Logarithms," International Journal of Control and Computers, Vol. 20, No. 2, pp. 49-53, 1992-05.
  1224. Chang, C. C., Lin, H. F. and Chen, C. Y., "Optimality Properties of DM Allocation Method for K-ary Multiple Key Hashing Files," The Computer Journal, Vol. 35, No. 4, pp. 390-394, 1992-05.
  1225. Chou, Y. H., Yang, W. P. and Chang, C. C., "Greedy File - A New Data Organization Concept for Partial Match Retrieval," The Computer Journal, Vol. 35, pp. A403-A408, 1992-05.
  1226. Chang, C. C., Chen, H. Y. and Chen, C. Y., "Symbolic Gray Code as a Data Allocation Scheme for Two-Disk Systems," The Computer Journal, Vol. 35, No. 3, pp. 299-305, 1992-05.
  1227. Lin, C. H., Chang, C. C. and Lee, R. C. T., "A Record-Oriented Cryptosystem for Database Sharing," The Computer Journal, Vol. 35, No. 6, pp. 658-660, 1992-05.
  1228. Liu, C. C., Chang, C. C. and Buehrer, D. J., "Encoding Chinese Words Using Mandarin Phonetic Symbols," Computer Processing of Chinese and Oriental Languages, Vol. 6, No. 2, pp. 195-204, 1992-05.
  1229. Chen, C. Y. and Chang, C. C., "On GDM Allocation Method for Partial Range Queries," Information Systems, Vol. 17, No. 5, pp. 381-394, 1992-05.
  1230. Lin, C. H., Chang, C. C. and Lee, R. C. T., "Hierarchy Representations Based on Arithmetic Coding for Dynamic Information Protection Systems," Information Sciences, Vol. 64, No. 1-2, pp. 35-48, 1992-05.
  1231. Chen, J. N. and Chang, C. C., "A Chinese Character Retrieval Scheme Using Shuang Pinyin," Journal of Information Science and Engineering, Vol. 8, No. 3, pp. 487-507, 1992-05.
  1232. Chang, C. C. and Chen, C. Y., "A Look-Ahead Digital Signature Scheme Based upon Linked Lists," Journal of Electrical Engineering, Vol. 35, No. 2, pp. 115-122, 1992-04. (.)
  1233. Chang, C. C. and Chen, Y. W., "Looking up Words in a Compressed Chinese - English Dictionary," Journal of Electrical Engineering, Vol. 35, No. 2, pp. 145-154, 1992-04. (.)
  1234. Chang, C. C., Buehrer, D. J., Hwang, S. J. and Diay, J. Y., "Sharing a Circular Storage for Multiple Stacks Operations," Journal of the Chinese Institute of Engineers, Vol. 15, No. 2, pp. 115-121, 1992-03. (SCIE)
  1235. Chang, C. C. and Chen, C. Y., "A Dynamic Access Control Scheme Based upon Ziegler's Row Displacement Method," Journal of Electrical Engineering, Vol. 35, No. 1, pp. 59-68, 1992-02. (。)
  1236. Chang, C. C. and Tsai, W. H., "A Compression Scheme Based upon Lempel-Ziv Method for Chinese Texts," Journal of Computers, Vol. 3, No. 2, pp. 13-19, 1991-06. (EI)
  1237. Wu, T. C. and Chang, C. C., "A Password Authentication Scheme Based on Discrete Logarithms," International Journal of Computer Mathematics, Vol. 41, No. 3-4, pp. 31-38, 1991-06.
  1238. Chang, C. C. and Lee, S. Y., "Retrieval of Similar Pictures on Pictorial Databases," Pattern Recognition, Vol. 24, No. 7, pp. 675-680, 1991-06.
  1239. Jan, J. K., Chang, C. C. and Wang, S. J., "A Dynamic Key-Lock-Pair Access Control Scheme," Computers and Security, Vol. 10, pp. 129-139, 1991-06.
  1240. Chang, C. C., Hwang, S. M. and Buehrer, D. J., "A Shape Recognition Scheme Based on Relative Distances of Feature Points from the Centroid," Pattern Recognition, Vol. 24, No. 11, pp. 1053-1063, 1991-06.
  1241. Lin, C. H., Chang, C. C., Wu, T. C. and Lee, R. C. T., "Password Authentication Using Newton's Interpolation Polynomials," Information Systems, Vol. 16, No. 1, pp. 97-102, 1991-06.
  1242. Chang, C. C., "A Composite Perfect Hashing Scheme for Large Letter-oriented Key Sets," Journal of Information Science and Engineering, Vol. 7, pp. 173-186, 1991-06.
  1243. Chang, C. C. and Wu, T. C., "A Broadcasting Cryptosystem in Computer Networks Using Interpolating Polynomials," Computer Systems Science and Engineering, Vol. 6, No. 3, pp. 185-188, 1991-06.
  1244. Chang, C. C., "Spatial Match Retrieval of Symbolic Pictures," Journal of Information Science and Engineering, Vol. 7, pp. 405-422, 1991-06.
  1245. Chen, C. Y., Chang, C. C. and Lee, R. C. T., "On the Design of MKH Files for Concurrent Orthogonal Range Retrieval among Two Disks," Information Systems, Vol. 16, No. 6, pp. 613-625, 1991-06.
  1246. Chang, C. C. and Chen, C. Y., "A Note on Allocating K-ary Multiple Key Hashing Files Among Multiple Disks," Information Sciences, Vol. 55, No. 1-3, pp. 69-76, 1991-06.
  1247. Chang, C. C., Chen, C. Y. and Jan, J. K., "On the Design of a Machine-Independent Perfect Hashing Scheme," The Computer Journal, Vol. 34, No. 5, pp. 469-474, 1991-06.
  1248. Jan, J. K., Chang, C. C., Wang, F. S. and Chen, C. P., "A Study of Input Rates for a Chinese Characters Input System," Communications of Chinese and Oriental Languages Information Processing Society, Vol. 1, No. 1, pp. 1-11, 1991-06.
  1249. Chang, C. C. and Wu, T. C., "Remote Password Authentication with Smart Cards," IEE Proceedings - Part E, Vol. 138, No. 3, pp. 165-168, 1991-06.
  1250. Chang, C. C. and Tsai, W. H., "A Data Compression Scheme for Chinese and English Characters," Computer Processing of Chinese and Oriental Languages, Vol. 5, No. 2, pp. 354-362, 1991-06.
  1251. Chang, C. C. and Wu, T. C., "A Letter-Oriented Perfect Hashing Scheme Based upon Sparse Table Compression," Software-Practice and Experience, Vol. 21, No. 1, pp. 35-49, 1991-06.
  1252. Lin, C. H., Chang, C. C. and Lee, R. C. T., "An Efficient Access Control Scheme for Files Protection," Journal of the Chinese Institute of Engineers, Vol. 14, No. 3, pp. 319-324, 1991-05. (SCIE)
  1253. Chang, C. C. and Wu, H. C., "A Module-Oriented Signature Extraction Method to Retrieve Symbolic Pictures," Journal of Computers, Vol. 2, No. 4, pp. 1-10, 1990-12. (EI)
  1254. Chang, C. C. and Lin, J. F, "A New Approach of Automatic Identification to Chinese Seal Imprints with Square Shape," Journal of Electrical Engineering, Vol. 33, No. 5, pp. 285-292, 1990-10. (.)
  1255. hang, C. C., Jan, J. K. and Lin, J. F, "A Chinese Syllables Compression Scheme Based upon Perfect Hashing," Journal of Computers, Vol. 2, No. 3, pp. 1-17, 1990-09. (EI)
  1256. Chang, C. C. and Lin, J. C., "A Fast Spatial Match Accessing Scheme for Symbolic Pictures," Journal of Electrical Engineering, Vol. 33, No. 3, pp. 129-137, 1990-06. (.)
  1257. Chang, C. C., "A Survey of Key-to-Key User Hierarchic Representation Mechanism," Journal of Information Processing, Japan, invited paper, Vol. 13, No. 4, pp. 438-441, 1990-06.
  1258. Chang, C. C. and Wu, L. H., "A New Password Authentication Scheme," Journal of Information Science and Engineering, Vol. 6, pp. 139-147, 1990-06.
  1259. Lin, C. H., Chang, C. C. and Lee, R. C. T., "A Dynamic Access Control Mechanism in Information Protection Systems," Journal of Information Science and Engineering, Vol. 6, pp. 25-35, 1990-06.
  1260. Jan, J. K., Chang, C. C. and Wu, L. H., "An Arithmetic Coding Oriented Single Key Access Control Scheme," International Journal of Information and Management Science, Vol. 1, No. 1, pp. 63-75, 1990-06.
  1261. Chang, C. C. and Lin, C. H., "A Reciprocal Confluence Tree Unit and Its Applications," BIT, Vol. 30, pp. 27-33, 1990-06.
  1262. Chang, C. C., Jan, J. K. and Chen, C. P., "The Design of Two Compression Mechanisms for Chinese Textual Files," Computer Processing of Chinese and Oriental Languages, Vol. 5, No. 1, pp.75-96, 1990-06.
  1263. Chang, C. C. and Wu, H. C., "A New Chinese Characters Retrieval Scheme Based upon Chinese Radical Spatial Relationships," Journal of Electrical Engineering, Vol. 34, No. 2, pp. 93-98, 1990-04. (.)
  1264. Chang, C. C. and Liaw, H. T, "Sharing a Polynomial for Password Authentication," Journal of Computers, Vol. 1, No. 4, pp. 11-17, 1989-09. (.)
  1265. Chang, C. C., Lin, J. F. and Jan, J. K., "A Chinese Data Compression Scheme," Journal of Computers, Vol. 2, No. 2, pp. 1-9, 1989-08. (EI)
  1266. Chang, C. C. and Liaw, H. T., "A New Approach to Assign Cryptographic Keys in a Tree Structure for Access Control," Journal of Electrical Engineering, Vol. 32, No. 3, pp. 185-191, 1989-06. (.)
  1267. Chang, C. C. and Wu, T. C., "Broadcasting Cryptosystem Based upon Euclidean Geometry," International Journal on Policy and Information, Vol. 13, No. 2, pp. 179 -186, 1989-06.
  1268. Chang, C. C., Chen, C. Y. and Chang, S. S., "Optimality Properties of Binary Cartesian Product File Systems," International Journal on Policy and Information, Vol. 13, No. 1, pp. 115-125, 1989-06.
  1269. Chang, C. C. and Chen, C. H., "Organizing Distributed Data Base for Parallel Searching," Journal of the Chinese Institute of Engineers, Vol. 12, No. 2, pp. 215-221, 1989-05. (SCIE)
  1270. Mong, I. H., Chang, C. C. and Chin, Y. H., "Lempel-Ziv-Q Scheme : A New Data Compression Method," Journal of Electrical Engineering, Vol. 32, No. 1, pp. 37-44, 1989-02. (.)
  1271. Chang, C. C. and Liaw, H. T, "A Parallel Approach for Stable Marriage Problem," Journal of Management Science, Vol. 5, No. 2, pp. 167-177, 1988-12. (.)
  1272. Chang, C. C. and Wu, C. S., "The Study of a Secure Broadcasting Network System," Journal of Electrical Engineering,, Vol. 31, No. 6, pp. 398-403, 1988-12. (.)
  1273. Chang, C. C. and Lin, C. H., "A Cryptosystem for Secure Broadcasting," Proceedings of National Science Council, Vol. 12, No. 4, pp. 233-239, 1988-07. (.)
  1274. Chang, C. C., "Toward a Message-Guided Data Base Language," Tunghai Journal, Vol. 29, pp. 713-734, 1988-06. (.)
  1275. Chang, C. C. and Wu, H. C., "A Fast Chinese Characters Accessing Technique Using Mandarin Phonetic Transcriptions," The International Journal of Pattern Recognition and Artificial Intelligence, Vol. 2, No. 1, pp. 105-137, 1988-06.
  1276. Chang, C. C. and Chen, C. Y., "A Recursive Performance Formula of the DM Allocation Method for BCPFs," The Computer Journal, Vol. 31, No. 6, pp. 565-566, 1988-06.
  1277. Chang, C. C., "Application of Principal Component Analysis to Multi-Disk Concurrent Accessing," BIT, Vol. 28, No. 2, pp. 205-214, 1988-06.
  1278. Chang, C. C. and Jan, J. K., "An Access Control Scheme for New Users and Files," International Journal on Policy and Information, Vol. 12, No. 2, pp. 89-98, 1988-06.
  1279. Chang, C. C. and Chang, C. H., "An Ordered Minimal Perfect Hashing Scheme with Single Parameter," Information Processing Letters, Vol. 27, No. 2, pp. 79-83, 1988-06.
  1280. Chang, C. C. and Chang, S. S., "Correction to Optimal Cartesian Product Files for Orthogonal Range Queries," Journal of the Chinese Institute of Engineers, Vol. 11, No. 3, pp. 317-318, 1988-05. (SCIE)
  1281. Jan, J. K. and Chang, C. C., "Addressing for Letter-Oriented Keys," Journal of the Chinese Institute of Engineers, Vol. 11, No. 3, pp. 279-284, 1988-05. (SCIE)
  1282. Jan, J. K., Chang, C. C. and Chen, C. Y., "A High-Speed Chinese Character Retrieving Algorithm Utilizing Phonetic Syllables," Journal of Electrical Engineering, Vol. 31, No. 2, pp. 138-148, 1988-04. (.)
  1283. Chang, C. C. and Chang, S. S., "Optimal Cartesian Product Files for Orthogonal Range Queries," Journal of the Chinese Institute of Engineers, Vol. 10, No. 6, pp. 727-731, 1987-11. (SCIE)
  1284. Chang, C. C. and Chen, C. Y., "Performance of Two-disk Partition Data Allocations," BIT, Vol. 27, No. 3, pp. 306-314, 1987-06.
  1285. Chang, C. C. and Chen, C. Y., "Performance Analysis of the Generalized Disk Modulo Allocation Method for Multiple Key Hashing Files on Multi-Disk Systems," The Computer Journal, Vol. 30, No. 6, pp. 535-540, 1987-06.
  1286. Chang, C. C., "An Information Protection Scheme Based upon Number Theory," The Computer Journal, Vol. 30, No. 3, pp. 249-253, 1987-06.
  1287. Chang, C. C. and Chen, C. Y., "Some Properties of Cartesian Product Files for Disk Modulo Allocation Method in a Two-disk System," Journal of Information Science and Engineering, Vol. 3, No. 2, pp. 151-176, 1987-06.
  1288. Chang, C. C. and Chen, C. Y., "Gray Code as a De-clustering Scheme for Concurrent Disk Retrieval," Journal of Information Science and Engineering, Vol. 3, No. 2, pp. 177-188, 1987-06.
  1289. Chang, C. C. and Su, D. H, "Performance Analysis of Multi-Attribute Files Based upon Multiple Key Hashing Functions and Haphazard Files," Journal of the Chinese Institute of Engineers, Vol. 10, No. 1, pp. 99-105, 1987-01. (SCIE)
  1290. Chang, C. C. and Hung, M. F., "A User Hierarchy Mechanism for Computer System Resources," Journal of Science and Engineering, NCHU, Vol. 22, pp. 183-194, 1986-11. (.)
  1291. Chang, C. C., "Letter Oriented Reciprocal Hashing Scheme," Information Sciences, Vol. 38, pp. 243-255, 1986-06.
  1292. Chang, C. C., "A Scheme for Constructing Ordered Minimal Perfect Hashing Functions," Information Sciences, Vol. 39, pp. 187-195, 1986-06.
  1293. Chang, C. C., "On the Design of a Key-Lock-Pair Mechanism in Information Protection Systems," BIT, Vol. 26, pp. 410-417, 1986-06.
  1294. Chang, C. C. and Lee, R. C. T., "A Letter Oriented Minimal Perfect Hashing Scheme," The Computer Journal, Vol. 29, No. 3, pp. 277-281, 1986-06.
  1295. Chang, C. C. and Chen, C. P., "A Key-Lock-Pair Mechanism Based on Generalized Chinese Remainder Theorem," Journal of the Chinese Institute of Engineers, Vol. 9, No. 4, pp. 383-390, 1986-04. (SCIE)
  1296. Chang, C. C. and Yuan, S. T., "Parallel Algorithms for the Matrix Multiplication Problem and the Transitive Closure Problem," Journal of Science and Engineering, NCHU, Nov. 22, pp. 195-210, 1985-11. (.)
  1297. Chang, C. C. and Liang, J., "Performance Analysis of a K-Nearest Neighbor Searching Technique," Journal of the Chinese Institute of Engineers, Vol. 8, No. 2, pp. 157-169, 1985-08. (SCIE)
  1298. Chang, C. C. and Shen, J. J., "Performance Analysis of the Disk Modulo Allocation Method for Concurrent Accessing on Multiple Disk Systems," Journal of the Chinese Institute of Engineers, Vol. 8, No. 3, pp. 271-283, 1985-08. (SCIE)
  1299. Chang, C. C. and Shieh, J. C., "On the Design of Letter Oriented Minimal Perfect Hashing Functions," Journal of the Chinese Institute of Engineers, Vol. 8, No. 3, pp. 285-297, 1985-01. (SCIE)
  1300. Chang, C. C. and Tsai, W. H, "Performance Analysis of Purely Random Allocation Scheme and Evenly Random Allocation Scheme," Journal of Electrical Engineering, Vol. 28, No. 2, pp. 1-11, 1985-01. (.)
  1301. Chang, C. C. and Lian L. S., "Toward the Strict Optimality Study of Generalized Disk Modulo Allocation Method," Journal of Science and Engineering, NCHU, vol. 21, pp. 157-172, 1984-11. (.)
  1302. Chang, C. C., "Optimal Information Retrieval when Queries Are Not Random," Information Sciences, Vol. 34, No. 3, pp. 199-223, 1984-06.
  1303. Chang, C. C., "An Ordered Minimal Perfect Hashing Scheme Based upon Euler's Theorem," Information Sciences, Vol. 32, No. 3, pp. 165-172, 1984-06.
  1304. Chang, C. C., "The Study of an Ordered Minimal Perfect Hashing Scheme," Communications of the Association for Computing Machinery, Vol. 27, No. 4, pp. 384-387, 1984-06.
  1305. Chang, C. C., Du, M. W. and Lee, R. C. T., "Performance Analyses of Cartesian Product Files and Random Files," IEEE Transactions on Software Engineering, Vol. SE-10, No. 1, pp. 88-99, 1984-06.
  1306. Chang, C. C., Du, M. W. and Lee, R. C. T., "The Hierarchical Ordering in Multi-attribute Files," Information Sciences, Vol. 31, No. 1, pp. 41-75, 1983-06.
  1307. Chang, C. C., "On Cartesian Product Files," Journal of Electrical Engineering, vol. 26, no. 2, pp. 5-23, 1983-04. (SSCI,.)
  1308. Chang, C. C., Lee, R. C. T. and Du, M. W., "Symbolic Gray Code as a Perfect Multi-attribute Hashing Scheme for Partial Match Queries," IEEE Transactions on Software Engineering, Vol. SE-8, No. 3, pp. 235-249, 1982-06.
  1. Liu J. C.and Chang C. C.,"Hiding Information in a Reordered Codebook using Pairwise Adjustments in Codewords ," 2024 5th International Conference on Computer Vision and Computational Intelligence, ., 2024-01. Bankok, Thailand .
  2. Liu, J. C., Chang, C. C. and Lin, C. C.,"Hiding Information in a Well-Trained Vector Quantization Codebook ," SPML 2023: 2023 6th International Conference on Signal Processing and Machine Learnin, ., 2023-07. Tianjin, China .
  3. Zhao, G., Qin, C., Luo, X., Zhang, X. and Chang, C. C.,"Perceptual Robust Hashing for Video Copy Detection with Unsupervised Learning ," ACM Workshop on Information Hiding and Multimedia Security, ., 2023-06. Chicago, USA .
  4. Kerdvibulvech, C. and Chang, C. C.,"A New Study of Integration Between Social Robotic Systems and the Metaverse for Dealing with Healthcare in the Post-COVID-19 Situations ," ICSR 2022: 14th International Conference on Social Robotics, ., 2022-12. Florence, Italy .
  5. Lee, C. H.*, Sun, K. S., Wang, Y. Q., Horng, J. H. and Chang, C. C.,"Secret Message CDMA Multiplexing via QR Codes ," 2022 3rd Asia Service Sciences and Software Engineering Conference, 。, 2022-02. Macau, China .
  6. Sun, K. S., Horng, J. H. and Chang, C. C.,"Reversible Data Hiding for SMVQ Compressed Images Based on De-Clustering Rules ," 22nd IEEE/ACIS International Fall Virtual Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD2021-Fall), ., 2021-11. Taichuang .
  7. Xie, X., Lin, C. C. and Chang, C. C.,"Reversible Data Hiding Based on Bidirectional Generalized Integer Transform ," SITAIBA2021 (2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications, ., 2021-11. Taichung .
  8. Chang, C. C., Horng, J. H. and Chang, J. F.,"High-Payload Data Hiding Scheme Based on Shifting of AC Coefficients for JPEG Images ," 2021 International Conference on Fuzzy Theory and Its Applications, ., 2021-10. Taitung .
  9. Yang, G. M., Horng, J. H. and Chang, C. C.,"A 3D Polyhedron Model for Image Steganography ," 30th Cryptology and Information Security Conference (CISC) 2020, ., 2020-05. Taiwan .
  10. Lin, C. C., Tang, R., Chang, C. C. and Lyu, W. L.,"A High-Capacity Data Hiding Method Based on Sudoku Games ," International Conference on Innovation and Management (IAM2020W), ., 2020-02. Sapporo .
  11. Huang, K., Li, J., Cheng, S., Tian, W., Zhao, L., Hu, J. and Chang, C. C.,"An Efficient Algorithm of Facial Expression Recognition by TSG-RNN Network ," 26th International Conference on MultiMedia Modeling (MMM 2020), 161-174, 2020-01. Daejeon, Korea .
  12. Lee, C. F., Chang, C. C., Shih, C. S. and Agrawal, S.*,"A Survey of Data Hiding based on Vector Quantization ," The 15th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2019), pp. 1-4, 2019-07. Jilin .
  13. Wu, H. L., Chang, C. C.* and Chen, L. S.,"Secure Authentication Scheme with Conditional Privacy Preservation in a Global Mobility Network ," International Electronics Communication Conference (IECC 2019), pp. 16-20, 2019-07. Okinawa, Japan .
  14. Sun, M., Li, L.*, Zhang, S., Lu, J., Feng, X. and Chang, C. C.,"A Copy Detection Algorithm for Game Character Concept Design Based on Pose Features ," The 1st ACM TURC Conference on Artificial Intelligence and Security (TURC-AIS 2019), pp. 1-8, 2019-05. China .
  15. Lee, C. F.*, Chang, C. C., Li, G. L. and Agrawal, S.,"A Survey of Data Hiding Schemes Based on AMBTC ," The 11th International Conference on Digital Image Processing (ICDIP 2019), 1-4, 2019-05. China .
  16. Wu, H. L., Chang, C. C.* and Chen, L. S.,"On the Security of a Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography ," The 6th International Conference on Information Technology (ICIT 2018), 2018-12. Hong Kong, China .
  17. He, M., Li, L., Yu, J., Lu, J., Zhou, Q., Chang, C. C. and Feng, X.,"Aesthetic QR Code Authentication Based on Directed Periodic Texture Pattern ," 2nd International Conference on Security with Intelligent Computing and Big-data Services (SICBS 2018), ., 2018-12. Guilin, China .
  18. Tang, X.*, Zhou, L., Huang, Y. and Chang, C. C.,"Efficient Cross-User Deduplication of Encrypted Data through Re-Encryption ," The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom 2018), 2018-07. New York, USA .
  19. Zhou, Q., Yu, J, Wang, B., Li, L.*, Zhang, S., Lu. J. and Chang, C. C.,"Multiple Schemes for Bike-share Service Authentication using QR Code and Visual Cryptography ," The 4th International Conference on Cloud Computing and Security (ICCCS 2018), 2018-06. Haikou, China .
  20. Li, L., Li, X., Qiao, T.*, Zhang, S., Yuan, W and Chang, C. C.,"A Novel Framework of Robust Video Watermarking Based on Statistical Model ," The 4th International Conference on Cloud Computing and Security (ICCCS 2018), 2018-06. Haikou, China .
  21. Li, J.*, Xu, L., Li, H. and Chang, C. C.,"Parameter Selection for Denoising Algorithms Using NR-IQA with CNN ," The 24th International Conference on Multimedia Modeling (MMM 2018), pp. 381-392, 2018-02. Bangkok, Thailand .
  22. Liu, Y., Chang, C. C.* and Huang, P. C.,"Extended Exploiting-Modification- Direction Data Hiding with High Capacity ," 2017 International Conference on Video and Image Processing (ICVIP 2017), pp. 151-155, 2017-12. Singapore .
  23. Li, J.*, Wang, J., Chang, C. C., Kong, D., Tang, Z. and Luo, Z.,"Face Detection in a Complex Background Using Cascaded Conventional Networks ," 2017 International Conference on Security with Intelligent Computing and Big-data Services (SICBS 2017), pp. 86-97, 2017-12. Hualien, Taiwan .
  24. Li, L., Li, Y., Lu, J.*, Zhang, S., Yuan, W., Yang, Z. and Chang, C. C.,"A New Aesthetic QR Code Algorithm Based on Salient Region Detection and SPBV ," 2017 International Conference on Security with Intelligent Computing and Big-data Services (SICBS 2017), 2017-12. Hualien, Taiwan .
  25. Lee, C. F.*, Chang, C. C., Zeng, Q. F.,"VQ Compression Enhancer with Huffman Coding ," The 11th International Conference on Genetic and Evolutionary Computing (ICGEC 2017), 2017-11. Kaohsiung, Taiwan .
  26. Li, L., Li, L.*, Zhang, S., Yang, Z., Lu, J. and Chang, C. C.,"Novel Schemes for Bike-share Service Authentication Using Aesthetic QR Code and Color Visual Cryptography ," The 3rd International Conference on Cloud Computing and Security (ICCCS2017), 2017-06. Nanjing, China .
  27. Chang, C. C., Nguyen, T. S. and Liu, Y.*,"A Reversible Data Hiding Scheme for Image Interpolation Based on Reference Matrix ," International Workshop on Biometrics and Forensics (IWBF 2017), 2017-04. The University of Warwick, UK .
  28. Chang, C. C., Yang, J. H. and Lai, Y. W. and Liu, Y.*,"An Offline User-Verifiable Electronic Traveler's Check System ," International Workshop on Biometrics and Forensics (IWBF 2017), 2017-04. The University of Warwick, UK .
  29. Xie, X. Z.* and Chang, C. C.,"Reversible Data Hiding in Encrypted Images Using Reformed JPEG Compression ," International Workshop on Biometrics and Forensics (IWBF 2017), 2017-04. The University of Warwick, UK .
  30. Chang, C. C., Lin, I. C., Su, Y. W, and Liu, Y.*,"A Digital Gift Certificate Scheme with Conditional Anonymity ," The International Conference on Management Engineering, Software Engineering and Service Sciences (ICMSS 2017), pp. 139-144, 2017-01. Wuhan, China .
  31. Di, Y. F., Wang, Z. H., Lee, C. F.* and Chang, C. C.,"The Reduction of VQ Index Table Size by Matching Side Pixels ," The Twelfth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 203-210, 2016-11. Kaohsiung, Taiwan .
  32. Chang, C. C., Lee, J. S., Lo, Y. Y. and Liu, Y.*,"A Secure Authentication Scheme for Telecare Medical Information Systems ," The Twelfth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 303-312, 2016-11. Kaohsiung, Taiwan .
  33. Liu, Y.*, Chang, C. C. and Chien, T. Y.,"A Revisit to LSB Substitution Based Data Hiding for Embedding More Information ," The Twelfth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 11-19, 2016-11. Kaohsiung, Taiwan .
  34. Chang, C. C., Chang, J. C., Chou, Y. H. and Wu, H. L.*,"A High Embedding Capacity Data Hiding Scheme Based upon Permutation Vectors ," The 15th International Workshop on Digital-forensics and Watermarking (IWDW 2016), 2016-09. Beijing, China .
  35. Peng, X., Lu, J., Li, L.*, Chang, C. C. and Zhou, Q.,"A New Card Authentication Scheme Based Image Watermarking and Encryption ," The 15th International Workshop on Digital-forensics and Watermarking (IWDW 2016), 2016-09. Beijing, China .
  36. Li, L., Chang, C. C., Bharanitharan, K. and Liu, Y.*,"A Novel Reversible Ternary Embedding Algorithm Based on Modified Full Context Prediction Errors ," 2016 IEEE International Conference on Signal and Image Processing (ICSIP 2016), pp. 529-533, 2016-08. Beijing, China .
  37. Lee, C. F., Chang, C. C., Lee, J. J. and Wu, Y. H.,"A Survey of Reversible Data Hiding Schemes Based on Pixel Value Ordering ," 2016 Nicograph International (NicoInt), 68-74, 2016-07. Hangzhou .
  38. Mao, K., Lee, C. F.*, Chang, C. C. and Shi, R. H.,"The Study of Reversible Data Hiding Schemes Based on Difference Expansions ," The 26th Cryptology and Information Security Conference (CISC 2016), 2016-05. Taichung, Taiwan .
  39. Li, J., Wu, N. Wang, Z.*, Du, J., Fu, X. and Chang, C. C.,"Enhancement of the Quality of Images Based on Multiple Threshold Segmentation and Adaptive Gamma Correction ," The Eleventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2015), pp. 93-96, 2015-09. Adelaide, Australia .
  40. Li, J., Meng, L. Wang, Z.*, Du, J., Fu, X. and Chang, C. C.,"A Modified IMM-CSRF Algorithm for Passive Tracking of Maneuvering Targets ," The Eleventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2015), pp. 89-92, 2015-09. Adelaide, Australia .
  41. Bai, J., Chang, C. C. and Zhu, C.*,"A Reversible Data Hiding Scheme Using Ordered Cluster-based VQ Index Tables for Complex Images ," 2015 8th International Conference on Image and Graphics (ICIG 2015), pp. 415-422, 2015-08. Tianjin, China .
  42. Chang, C. C.*, Huang, Y. H., and Chang, W. C.,"Reversible Data Hiding for VQ Indices Using XOR Operation and SOC codes ," International Conference on Machine Learning and Cybernetics (ICMLC 2015), pp. 340-345, 2015-07. Guangzhou, China .
  43. Chang, C. C., Lin, I. C.*, and Chi, Y. L.,"Secure Electronic Coupons ," The 10th Asia Joint Conference on Information Security (AsiaJCIS 2015), pp. 104-109, 2015-05. Kaohsiung, Taiwan .
  44. Chang, C. C., Nguyen, T. S. and Lin, C. C.*,"Constructing a Virtual Primary Key for Watermarking Textual Relational Databases ," 2014 International Computer Symposium, 2014-12. Taichung, Taiwan .
  45. Lu, J., Huang, Q., Wang, M., Li, L.*, Dai, J and Chang, C. C.,"Zero-watermarking Based on Improved ORB Features Against Print-cam Attack ," The 13th International Workshop on Digital-Forensics and Watermarking (IWDW 2014), pp. 187-198, 2014-10. Taipei, Taiwan .
  46. Chang, C. C.*, Nguyen, T. S. and Lin, C. C.,"A Blind Robust Reversible Watermark Scheme for Textual Relational Databases with Virtual Primary Key ," The 13th International Workshop on Digital-Forensics and Watermarking (IWDW 2014), pp. 75-89, 2014-10. Taipei, Taiwan .
  47. Chang, C. C.* and Wu, H. L.,"A Large Payload Information Hiding Scheme Using Two-Level Exploiting Modification Direction ," The 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2014), pp. 512-515, 2014-08. Kitakyushu, Japan .
  48. Chang, C. C.*, Chen, W. Y. and Cheng, T. F.,"A Secure RFID Mutual Authentication Protocol Conforming to EPC Class 1 Generation 2 Standard ," The 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2014), pp. 642-645, 2014-08. Kitakyushu, Japan .
  49. Chang, C. C.*, Wu, H. L. and Chung, T. F.,"Applying Histogram Modification to Embed Secret Message in AMBTC ," The 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2014), pp. 489-492, 2014-08. Kitakyushu, Japan .
  50. Chang, C. C.* and Sun, C. Y.,"Polynomial-based Secret Sharing Scheme Based on the Absolute Moment Block Truncation Coding Technique ," The 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2014), pp. 485-488, 2014-08. Kitakyushu, Japan .
  51. Chang, C. C.*, Lyu, W. L. and Lin, C. C.,"A High-Capacity Reversible Secret Sharing Scheme Using Two Steganographic Images ," The 2013 National Computer Symposium, pp. DAPP213-DAPP218, 2013-12. Taichung .
  52. Chang, C. C.*, Lu, T. C., Horng, G., Huang, Y. H. and Hsu, Y. M.,"A High Payload Data Embedding Scheme Using Dual Stego-images with Reversibility ," The 9th International Conference on Information, Communications and Signal Processing (ICICS), pp. 1-5, 2013-12. Tainan, Taiwan .
  53. Lee, C. F.*, Chang, C. C. and Gao, C. Y.,"A Two-staged Multi-level Reversible Data Hiding Exploiting Lagrange Interpolation ," 2013 the 9th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2013), pp.485-488, 2013-10. Beijing, China .
  54. Fan, L.*, Gao, T. and Chang, C. C.,"Mathematical Analysis of Extended Matrix Coding for Steganography ," 2013 International Conference on Sensor Network Security Technology and Privacy Communcation System (SNS&PCS 2013), pp. 157-160, 2013-05. Harbin, China .
  55. Lin, C. C., Wu, C. C. and Chang, C. C.,"A Fair Hash Chain-based On-line Application Services Granting Scheme for Cloud Computing Environment ," The 3rd International Conference on Intelligent Systems Design and Engineering Applications(ISDEA 2013), pp. 54-57, 2013-01. HongKong, China .
  56. Chang, C. C., Wu, C. C. and Lin, I. C.,"A UMTS Enhanced Cocktail Protocol ," IASTED International Conference on Engineering and Applied Science, pp. 1-8, 2012-12. Sri Lanka .
  57. Wang, Z. H., Lin, T. Y., Chang, C. C.* and Lin, C. C.,"A Novel Distortion-free Data Hiding Scheme for High Dynamic Range Images ," The 4th IEEE International Conference on Digital Home (ICDH2012), pp. 33-38, 2012-11. Guangzhou, China .
  58. Chang, C. C., Tu, H. N., and Lin, C. C.,"Strong Tamper-Localization, Visual Secret Sharing Scheme Based on Exploiting Modification Direction ," Proceedings of The 7th Asia Joint Conference on Information Security (AsiaJCIS 2012), pp. 10-16, 2012-08. Tokyo, Japan .
  59. Chang, C. C., Le, H. D., and Chang, C. H.,"Mobile Friendly and Highly Efficient Authenticated Key Agreement Protocol Featuring Untraceability ," Proceedings of The 7th Asia Joint Conference on Information Security (AsiaJCIS 2012), pp. 38-43, 2012-08. Tokyo, Japan .
  60. Chang, C. C., Wang, S. T. and Chen, K. N.,"A Progressive Digital Image Recovery Scheme Based on EMD Data Embedding Method ," Proceedings of 2011 Workshop on Consumer Electronics, pp. 864-868, 2011-11. Taichung, Taiwan .
  61. Chang, C. C., Chen, K. N. and Huang, Y. H.,"Low Computational Color Secret Sharing Schemes with High Shares Quality Color Secret Sharing ," Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2011), pp. 157-160, 2011-10. Dalian, China .
  62. Chang, C. C., Le, H. D., Lee, C. Y. and Chang, C. H.,"A Robust and Efficient Smart Card Oriented Remote User Authentication Protocol ," Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2011), pp. 252-255, 2011-10. Dalian, China .
  63. Guo, C. and Chang, C. C.,"General Threshold Signature based on the Chinese Remainder Theorem ," Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2011), pp. 244-247, 2011-10. Dalian, China .
  64. Chang, C. C., Yang, J. H. and Lin, S. Y.,"An Efficient Mutual Authentication with Key Agreement Protocol for Mobile Devices ," Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2011), pp. 145-148, 2011-10. Dalian, China .
  65. Wang, Z. H., Chang, C. C. and Pizzolatti, M. S.,"A New Reversible Secret Image Sharing Scheme Based on Multi-Level Encoding ," Proceedings of International Conference on Internet Computing and Information Services (ICICIS 2011), pp. 607-612, 2011-09. Hong Kong, China .
  66. Yue, S., Wang, Z. H., Chang. C. Y., Chang, C. C. and Li, M. C.,"Image Data Hiding Schemes Based on Graph Coloring ," Proceedings of the 8th International Conference on Ubiquitous Intelligence and Computing (UIC 2011), Vol. 6905, pp. 476-489, 2011-09. Banff, Canada .
  67. Yang, J. H., Chang, C. C. and Wang, C. H.,"An Efficient V-Fairness (t, n) Threshold Secret Sharing Scheme ," Proceedings of The Fifth International Conference on Genetic and Evolutionary Computing (ICGEC 2011), pp. 180-183, 2011-08. Kinmen, Taiwan .
  68. Lee, C. F., Liu, C. M., Wang, X. T. and Chang, C. C.,"Adaptive Data Hiding Based on Exploiting Modification Direction with High Embedding Capacity ," Proceedings of the 22th International Conference on Information Management (ICIM 2011), pp. 38, 2011-05. Taichung, Taiwan .
  69. Lee, C. F., Chang, C. C. and Tsou, P. L.,"Data Hiding Scheme with High Embedding Capacity and Good Visual Image Quality Based on Edge Detection ," Proceedings of the Fourth International Conference on Genetic and Evolutionary Computing (ICGEC 2010), pp. 654-657, 2010-12. Shenzhen, China .
  70. Li, B., Chang, C. C. and Lee, J. S.,"Providing Anonymous Channels and Mutual Authentication for Mobile Communications ," Proceedings of the Fourth International Conference on Genetic and Evolutionary Computing (ICGEC 2010), pp. 618-621, 2010-12. Shenzhen, China .
  71. Chang, C. C., Chen, K. N. and Hsieh, M. H.,"A Robust Public Watermarking Scheme Based on DWT ," The Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2010), pp. 21-26, 2010-10. Darmstadt, Germany .
  72. Chen, K. N., Chang, C. C. and Lin, H. C.,"A Large Payload EMD Embedding Scheme with High Stego-image Quality ," 2010 the International Conference on Computational Aspects of Social Networks (CASoN 2010), pp. 126-130, 2010-09. Taiyuan, China .
  73. Chang, C. C., Chen, K. N. and Wang, Z. H.,"Hiding Secret Information in Modified Locally Adaptive Data Compression Code ," Proceedings of the Third International Symposium on Intelligent Informatics (ISII 2010), ., 2010-09. dalian .
  74. Chang, C. C., Chou, Y. C. and Kieu, T. D.,,"Embedding Data and Sharing Original Image in Two Stego Images Using Sudoku ," 2010 the IET International Conference on Frontier Computing, pp. 163-168, 2010-08. Taichung, Taiwan .
  75. Chen, C. C. and Chang, C. C.,"High-capacity Reversible Data-hiding for LZW Codes ," the 2nd International Conference on Computer modeling and simulation (ICCMS 2010), Vol. 1, pp. 3-8, 2010-01. Sanya, China .
  76. Chang, C. C., Chen, K. N., Wang, Z. H. and Li, M. C.,"A Technique of Embedding Digital Data in an Image Compression Code Reversibly ," the 4th International Conference on Ubiquitous Information Management and Communication (ICUIMC 2010), 79-84, 2010-01. SKKU, Suwon, Korea .
  77. Lee, C. F., Chang, C. C. and Wu, C. Y.,"A Reversible and Multiple-layer Embedding Strategy with High Capacity ," the 4th International Conference on Ubiquitous Information Management and Communication (ICUIMC 2010), 354-358, 2010-01. SKKU, Suwon, Korea .
  78. Chang, C.C., Wang, Z. H. and Yin, Z. X.,"An Ingenious Data Hiding Scheme for Color Retinal Images ," the 2nd International Symposium Computer Science and Computational Technology (ISCSCT 2009), pp. 1-6, 2009-12. Huangshan, China .
  79. Chang, C. C., Lee, C. F., Chen, K. N. and Liu, T. C.,"A High Quality Steganographic Scheme for ROI Images ," the 2009 International Conference on Information and Multimedia Technology (ICIMT 2009), pp. 3-9, 2009-12. Jeju Island, South Korea .
  80. Chang, C. C., Wu, C. C. and Lin, I. C.,"A Data Hiding Method for Text Documents Using Multiple-Base Encoding ," 2009 International Conference on Theoretical and Mathematical Foundations of Computer Science (ICTMF 2009), pp. 101-109, 2009-12. Sanya, China .
  81. Wang, Z. H., Chang, C. C., Chen, Y. H. and Li, M. C.,"High Payload Reversible Data Embedding Scheme Suitable for VQ Compressed Smooth Images Using Index Lookup ," The Second International Workshop on Multimedia, Information Privacy and Intelligent Computing Systems (MPIS 2009), pp. 430-433, 2009-12. Jeju island, Korea .
  82. Chang, C. C.*, Lin, C. C. and Wang, H. C.,"A Novel Watermarking Scheme for Halftone Images ," The 2nd International Conference on Computer Science and its Applications (CSA 2009), pp. 10-12, 2009-12. .
  83. Wang, Z. H., Kieu, T. D., Chang, C. C. and Li, M. C.,"Emoticon-based Text Steganography in Chat ," the Asia-Pacific Conference on Computational Intelligence and Industrial Applications (PACIIA 2009), Vol. 2, pp. 457-460, 2009-11. Wuhan, China .
  84. Chang, C. C., Wang, Z. H. and Yin, Z. X.,"A Simple and Efficient Edge Detection Method ," 2009 Third Symposium on Intelligent Information Technology Application (IITA 2009), Vol. III, pp. 545-548, 2009-11. Nanchang, China .
  85. Chang, C. C., Wang, Z. H., Chen, Y. H. and Li, M. C.,"A Wet Image Data Hiding Scheme Based on Coordinate Modifications ," 2009 Third Symposium on Intelligent Information Technology Application (IITA 2009), Vol. III, pp. 541-544, 2009-11. Nanchang, China .
  86. Li, L., Xu, H.. H. and Chang, C. C.,"A Watermark Extraction Model to Enhance the Correlation of Digimarc Plug-ins in Photoshop ," the 2009 International Conference on Multimedia Information Networking and Security (MINES 2009), Vol. 2, pp. 154-158, 2009-11. Wuhan, China .
  87. Wang, Z. H., Li, M. C. and Chang, C. C.,"An Improvement of Proxy Certificate Chain Authentication Scheme Based on Proxy Certificate Trust List ," Workshop of Consumer Electronics (WCE 2009), pp. 191-197, 2009-11. Taichung, Taiwan .
  88. Chang, C. C., Chen, K. N., Wang, Z. H. and Li, M. C.,"Hiding Information in VQ Index Tables with Reversibility ," Proceedings of the International Symposium on Intelligent Information Systems and Applications, pp. 1-6, 2009-10. Qingdao, China .
  89. Chang, C. C., Lin, S. Y. and Yang, J. H.,"Efficient User Authentication and Key Establishment Protocols with Perfect Forward Secrecy for Mobile Devices ," The IEEE 9th International Conference on Computer and Information Technology (CIT 2009), pp. 131-135, 2009-10. Xiamen, China .
  90. Chang, C. C., Chou, Y. C. and Hsieh, M. H.,"A Simple and Efficient Data Hiding Scheme Suitable for Low Power Computation Environments ," The Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2009), pp. 624-627, 2009-09. Kyoto, Japan .
  91. Chang, C. C., Chan, C. S., Wang, Z. H. and Li, M. C.,"Reversible Steganography for VQ Indices Using the Modified State Codebook ," The Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2009), pp. 320-323, 2009-09. Kyoto, Japan .
  92. Lai, Y. W., Chang, C. C. and Chang, S. C.,"Novel Efficient Electronic Voting Mechanism Based upon Elliptic Curve ," The Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2009), pp. 898-901, 2009-09. Kyoto, Japan .
  93. Kieu, T. D., Wang, Z. H., Chang, C. C. and Li, M. C.,"Sharing Secrets and Reversibly Reconstructing the Cover Image Using Two Meaningful Shadows ," The Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2009), pp. 324-327, 2009-09. Kyoto, Japan .
  94. Chen, K. N., Lee, C. F., Chang, C. C. and Lin, H. C.,"Embedding Secret Messages Using Modified Huffman Coding ," The Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2009), pp. 278-281, 2009-09. Kyoto, Japan .
  95. Lin, C. N., Chang, C. C., Lee, W. B. and Lin, J.,"A Novel Secure Data Hiding Scheme Using a Secret Reference Matrix ," The Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2009), pp. 369-373, 2009-09. Kyoto, Japan .
  96. Chang, C. C., Lin, C. C., Pai, P. Y. and Chen, Y. C.,"A Novel Retinal Blood Vessel Segmentation Method Based on Line Operator and Edge Detector ," The Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2009), pp. 299-302, 2009-09. Kyoto, Japan .
  97. Chang, C. C., Lee, C. Y., and Lee, W. B.,"Cryptanalysis and Improvement of a Secure Authentication Scheme with Anonymity for Wireless Communications ," The Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2009), 2009-09. Kyoto, Japan .
  98. Yin, Z. X., Chang, C. C., and Zhang, Y. P.,"A High Embedding Efficiency Steganography Scheme for Wet Paper Codes ," The Fifth International Conference on Information Assurance and Security (IAS 2009), Vol. 2, pp. 611-614, 2009-08. Xi'an, China .
  99. Chang, C. C., Chen, Y. C. and Lin, C. C.,"A Resistant Secret Sharing Scheme ," The Fifth International Conference on Information Assurance and Security (IAS 2009), Vol. 1, pp. 61-64, 2009-08. Xi'an, China .
  100. Lee, C. F., Chen, K. N., Chang, C. C. and Tsai, M. C.,"A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation ," Proceedings of The Fifth International Conference on Information Assurance and Security (IAS 2009), vol. 2, pp. 615-618, 2009-08. xi'an .
  101. Chang, C. C., Lin, P. Y. and Lee, J. S.,"A Self-Reference Watermarking Scheme Based on Wet Paper Coding ," the Ninth International Conference on Hybrid Intelligent System (HIS 2009), Vol.1, pp. 228-233, 2009-08. Shenyang, China .
  102. Chang, C. C. and Lai, Y. P.,"An Enhancement of JPEG Still Image Compression with Adaptive Linear Regression and Golomb-Rice Coding ," the Ninth International Conference on Hybrid Intelligent System (HIS 2009), Vol.1, pp. 35-40, 2009-08. Shenyang, China .
  103. Lee, C. F., Chang, C. C. and Liu, T. C.,"A VSS Scheme of Image Size Invariant for Vertical Edge Enhancement ," the Ninth International Conference on Hybrid Intelligent System (HIS 2009), Vol.1, pp. 13-16, 2009-08. Shenyang, China .
  104. Wang, Z. H., Li, M. C., Chen, M. H. and Chang, C. C.,"A New Intelligent Authorization Agent Model in Grid ," the Ninth International Conference on Hybrid Intelligent System (HIS 2009), Vol.1, pp. 394-398, 2009-08. Shenyang, China .
  105. Chang, C. C., Chen, K. N., Wang, Z. H. and Li, M. C.,"A Quadratic-residue-based Fragile Watermarking Scheme ," 2009 Second ISECS International Colloquium on Computing, Communication, Control, and Management(CCCM 2009), Vol. I, pp. 512-515, 2009-08. Sanya, China .
  106. Chang, C. C., Kieu, T. D., Wang, Z. H. and Li, M. C.,"An Image Authentication Scheme Using Magic Square ," the 2nd IEEE International Conference on Computer Science and Information Technology 2009 (ICCSIT 2009), Vol. II, pp. 1-4, 2009-08. Beijing, China .
  107. Lu, T. C., Liao, S. R., Chen, P. L., Chang, C. C. and Wang, Z. H.,"Information Hiding Technology Based on Block-Sigmentation Strategy ," 2009 Second ISECS International Colloquium on Computing, Communication, Control, and Management(CCCM 2009), Vol. I, pp. 500-506, 2009-08. Sanya, China .
  108. Chang, C. C., Chen, Y. H., Wang, Z. H. and Li, M. C.,"A Reversible Data Embedding Scheme Based on Chinese Remainder Theorem for VQ Index Tables ," 2009 Second ISECS International Colloquium on Computing, Communication, Control, and Management(CCCM 2009), Vol. I, pp. 516-518, 2009-08. Sanya, China .
  109. Chang, C. C., Kieu, T. D., Wang, Z. H. and Li, M. C.,"A Steganographic Scheme for Reversible Information Hiding with Good Visual Quality Suitable for Small Embedded Data ," 2009 Second ISECS International Colloquium on Computing, Communication, Control, and Management(CCCM 2009), Vol. I, pp. 507-511, 2009-08. Sanya, China .
  110. Chang, C. C., Chen, Y. C. and Lin, C. C.,"A New Classification Mechanism for Retinal Images ," the International Conference on Information Technology and Computer Science (ITCS 2009), Vol. II, pp. 586-592, 2009-07. Kiev, Ukraine .
  111. Chang, C. C., Chen, Y. H., Wang, Z. H. and Li, M. C.,"A Data Embedding Scheme Based on a Magic Matrix and Wet Paper Codes ," 2009 International Conference on Computational Intelligence and Natural Computing (CINC 2009), Vol. II, pp. 303-306, 2009-06. Wuhan, China .
  112. Chang, C. C., Lin, P. Y. and Chan, C. S.,"Secret Image Sharing with Reversible Steganography ," 2009 International Conference on Computational Intelligence and Natural Computing (CINC 2009), Vol. II, pp. 253-256, 2009-06. Wuhan, China .
  113. Chang, C. C., Kieu, T. D. and Chou, Y. C.,"Information Hiding in Dual Images with Reversibility ," the 3rd International Conference on Multimedia and Ubiquitous Engineering (MUE 2009), pp. 145-152, 2009-06. Qingdao, China .
  114. Chang, C. C. and Tseng, H. W.,"Data Hiding in Images by Hybrid LSB Substitution ," the 3rd International Conference on Multimedia and Ubiquitous Engineering (MUE 2009), pp. 360-363, 2009-06. Qingdao, China .
  115. Chang, C. C., Chou, Y. C., and Lin, C. C.,"A Steganographic Scheme Based on Wet Paper Codes Suitable for Uniformly Distributed Wet Pixels ," The IEEE International Symposium on Circuits and Systems (ISCAS2009), pp. 501-504, 2009-05. Taipei, Taiwan .
  116. Chang, C. C., Chen, K. N., Lee, C. F. and Wang, Z. H.,"Hiding Information in Region-based Wet Images ," International Symposium on Electronic Commerce and Security (ISECS 2009), Vol. 1, pp. 189-194, 2009-05. Nanchang, China .
  117. Chang, C. C., Wang, Z. H., Chen, Y. H. and Li, M. C.,"A Novel Reversible Data Embedding Scheme Using Dissimilar Pairing for Palette-based Images ," Intelligent Ubiquitous Computing and Education (IUCE 2009), pp. 569-572, 2009-05. Chengdu, China .
  118. Chan, C. W., Chang, C. C.and Wang, Z. H.,"Cheating Resistance for Secret Sharing ," the International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009), Vol. 2, pp. 840-846, 2009-04. Wuhan, China .
  119. Xiong, N., Jia, X., Yang, Y. R., Vasilakos, A. V., Pan, Y., Chang, C. C., Li, Y.,"Design of a Distributed Flow Control Scheme based on Wireless Multi-rate Multicast Networks ," the 28th Conference on Computer Communications (INFOCOM 2009), pp. 1-6, 2009-04. Rio de Janeiro, Brazil .
  120. Chen, K. N., Lee, C. F. and Chang, C. C.,"Embedding Secret Messages Based on Chaotic Map and Huffman Coding ," the 3rd International Conference on Ubiquitous Information Management and Communication (ICUIMC 2009), 336-341, 2009-01. SKKU, Suwon, Korea .
  121. Lee, C. F., Wang, K. H., Chang, C. C. and Huang, Y. L.,"A Reversible Data Hiding Scheme Based on Dual Steganographic Images ," the 3rd International Conference on Ubiquitous Information Management and Communication (ICUIMC 2009), 228-237, 2009-01. SKKU, Suwon, Korea .
  122. Chen, C. C. and Chang, C. C.,"Full-Searching-Equivalent Vector Quantization Method Using Orthogonal Projection ," the 2008 IEEE International Symposium on Intelligent Information Technology Application (IITA 2008), pp. 65-69, 2008-12. Shanghai, China .
  123. Chang, C. C., Hsiao, J. Y. and Yeh, J. C.,"A Novel Lossy Image Compression Scheme Based on Hilbert Curve and VQ Suitable for Fast Window Query ," the 2008 IEEE International Symposium on Intelligent Information Technology Application (IITA 2008), pp. 341-345, 2008-12. Shanghai, China .
  124. Chang, C. C., Chuang, J. C. and Wang, Y. Z.,"VQ-Based Oriented Image Tamper Proofing Schemes for Digital Grayscale Images ," the 2008 IEEE International Symposium on Intelligent Information Technology Application (IITA 2008), pp. 1000-1004, 2008-12. Shanghai, China .
  125. Chang, C. C., Hsieh, C. P. and Hsiao, J. Y.,"An Adaptive Median Filter for Image Denoising ," the 2008 IEEE International Symposium on Intelligent Information Technology Application (IITA 2008), pp. 346-350, 2008-12. Shanghai, China .
  126. Chang, C. C., Li, C. F. and Hu, Y. C.,"Code Transformation Algorithms for Two Breadth-First Linear Quadtrees ," International Workshop on Education Technology and Training (ETT) and Geoscience and Remote Sensing (GRS), Vol. 1, pp. 799-802, 2008-12. Shanghai, China .
  127. Yu, Y. H. and Chang, C. C.,"A High Capacity Reversible Data Hiding Scheme for Annotation ," the 2008 IEEE International Symposium on Intelligent Information Technology Application (IITA 2008), pp. 940-944, 2008-12. Shanghai, China .
  128. Chang, C. C., Tai, W. L. and Chen, K. N.,"Lossless Data Hiding Based on Histogram Modification for Image Authentication ," the IEEE/IFIP International Conference on Embedded and Ubiquitous Computing(EUC 2008), pp. 506-511, 2008-12. Shanghai, China .
  129. Chang, C. C., Lee, C. F. and Wang, Y. R.,"An Improved EMD Embedding Scheme Based on Secret Image Difference ," the IEEE/IFIP International Conference on Embedded and Ubiquitous Computing(EUC 2008), pp. 139-135, 2008-12. Shanghai, China .
  130. Chang, C. C. and Chou, H.,"A New Public-key Oblivious Fragile Watermarking for Image Authentication Using Discrete Cosine Transform ," the 2008 International Symposium on Signal Processing, Image Processing and Pattern Recognition (SIP 2008), pp. 11-14, 2008-12. Hainan Island, China .
  131. Chang, C. C., Wang, Y. Z. and Chan, C. S.,"An Efficient Probability-based t out of n Secret Image Sharing Scheme ," the 2008 International Symposium on Signal Processing, Image Processing and Pattern Recognition (SIP 2008), pp. 121-124, 2008-12. Hainan Island, China .
  132. Chang, C. C. and Lai, Y. P.,"Efficient t-out-of-n Oblivious Transfer Schemes ," the 2008 International Conference on Security Technology (SecTech 2008), pp. 3-6, 2008-12. Hainan Island, China .
  133. Chang, C. C., Yu, Y. H. and Hu, Y. C.,"Hiding Secret Data into an AMBTC-Compressed Image Using Genetic Algorithm ," Second International Conference on Future Generation Communication and Network Symposia (FGCNS 2008), Vol. 3, pp. 154-157, 2008-12. Hainan Island, China .
  134. Chang, C. C., Wu, W. C. and Hu, Y. C.,"Content-Based Color Image Retrieval System Using Color Difference Features ," Second International Conference on Future Generation Communication and Network Symposia (FGCNS 2008), Vol 3, pp. 181-184., 2008-12. Hainan Island, China, .
  135. Chan, C. W. and Chang, C. C.,"Schemes for Digital Signing Key Sharing ," the 2008 International Conference on Security Technology (SecTech 2008), pp. 17-22, 2008-12. Hainan Island, China .
  136. Chang, C. C., Wu, Y. C. and Chang, S. C.,"A Novel E-mail Protocol Using Three-Party Password-Authenticated Key Exchange ," 2008 International Conference on Security Technology, pp. 150-154, 2008-12. Hainan Island, China .
  137. Lee, C. F., Chuang, L. Y. and Chang, C. C.,"Hiding Information Employing Reduplicating Embedding ," the 2008 IEEE Asia-Pacific Services Computing Conference (IEEE APSCC 2008), pp. 825-828, 2008-12. Yilan, Taiwan .
  138. Chen, C. C. and Chang, C. C.,"Reversibly Sharing and Hiding Secret Using Expansion Strategy ," the IEEE Asia-Pacific Conference on Circuits and Systems 2008, pp. 1588-1591, 2008-12. Macao, China .
  139. Chang, C. C. and Lee, J. S.,"Security Enhancement of Ku-Wang Authenticated Key Agreement Protocol ," the Eighth International Conference on Intelligent Systems Design and Applications (ISDA 2008), pp. 467-471, 2008-11. Kaohsiung City, Taiwan .
  140. Yang, J. H. and Chang, C. C.,"Cryptanalysis of ID-Based Digital Signature Scheme on Elliptic Curve Cryptosystem ," the Eighth International Conference on Intelligent Systems Design and Applications (ISDA 2008), pp. 3-5, 2008-11. Kaohsiung City, Taiwan .
  141. Chang, C. C., Chen, K. N. and Lee, C. F.,"A Restricted Region-based Data-hiding Scheme ," the 11th International Conference on Communication Technologies 2008, 2008-11. Hangzhou, China .
  142. Chang, C. C. and Wu, C. C.,"A Novel Oblivious Transfer Protocol Using an Asymmetric Cryptosystem ," the 1st International Workshop Information Technology and Security (WITS 2008), pp. 75-78, 2008-10. Shanghai, China .
  143. Chang, C. C., Tsai, H. C. and Lin, S. Y.,"A Token Free Password Authentication Scheme with Multiple Key Agreements ," the Third International Conference on Communications and Networking (ChinaCom 2008), pp. 1143-1150, 2008-08. Hangzhou, China .
  144. Yeh, J. S., Yang, S. R., Chang, C. C. and Chen, T. H.,"Assigning Keys in a Hierarchy ," the Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2008), pp. 1363-1366, 2008-08. Harbin, China .
  145. Lin, I. C., Chang, C. C. and Yang, J. H.,"An Efficient Proxy Signature for Realizing Generalized Proxy Signature Policy ," the Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2008), pp. 1537-1540, 2008-08. Harbin, China .
  146. Li, J., Lee, J. S. and Chang, C. C.,"Preserving PHI in Compliance with HIPAA Privacy/Security Regulations Using Cryptographic Techniques ," the Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing(IIHMSP 2008), pp. 1545-1548, 2008-08. Harbin, China .
  147. Lee, C. F., Chang, C. C., and Wang, K. H.,"Hiding Data in VQ-compressed Images Using Pairwise Nearest Codewords based on Minimum Spanning Tree ," the Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing(IIHMSP 2008), pp. 1293-1296, 2008-08. Harbin, China .
  148. Pai, P. Y., Lee, C. F., Huang, W. H., and Chang, C. C.,"An Effective Demosaicking and Zooming Algorithm for CFA Images ," the Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing(IIHMSP 2008), pp. 1150-1153, 2008-08. Harbin, China .
  149. Chang, C. C., Lin, C. C., Le, T. H. N., and Le, H. B.,"A New Probabilistic Visual Secret Sharing Scheme for Color Images ," the Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing(IIHMSP 2008), pp. 1305-1308, 2008-08. Harbin, China .
  150. Chuang, J. C. and Chang, C. C.,"An Image Authentication Scheme for Halftone Images Based upon Error Diffusion ," the Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing(IIHMSP 2008), pp. 1297-1300, 2008-08. Harbin, China .
  151. Yang, J. H. and Chang, C. C.,"Aryabhata Remainder Theorem for Moduli with Common Factors and Its Application in Information Protection Systems ," the Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2008), pp. 1379-1382, 2008-08. Harbin, China .
  152. Chang, C. C. and Chang, S. C.,"An Improved Authentication Key Agreement Protocol Based on Elliptic Curve for Wireless Mobile Networks ," the Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing(IIHMSP 2008), pp. 1375-1378, 2008-08. Harbin, China .
  153. Lin, I. C. and Chang, C. C.,"A Novel Digital Signature Scheme for Application of Document Review in a Linearly Hierarchical Organization ," the Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing(IIHMSP 2008), pp. 1367-1370, 2008-08. Harbin, China .
  154. Chang, C. C., Kieu, T. D. and Chou, Y. C.,"A High Payload Steganographic Scheme Based on (7, 4) Hamming Code for Digital Images ," International Symposium on Electronic Commerce and Security (ISECS 2008), pp. 16-21, 2008-08. Guangzhou, China .
  155. Chang, C. C., Zhang, X. and Wang, S.,"Generalized Running Coding for Efficient Data Hiding ," International Conference on Audio, Language and Image Processing (ICALIP 2008), pp. 490-494, 2008-07. Shanghai, China .
  156. Chang, C. C., Chou, Y. C., and Kieu, T. D.,"An Information Hiding Scheme Using Sudoku ," the Third International Conference on Innovative Computing, Information and Control (ICICIC2008), 17-1--17-5, 2008-06. Dalian, China .
  157. Chang , C. C., Kieu, T. D., and Chou, Y. C.,"Using Nearest Covering Codes to Embed Secret Information in Grayscale Images ," the Second International Conference on Ubiquitous Information Management and Communication (ICUIMC 2008), pp. 315-320, 2008-01. Suwon, Korea .
  158. Chang, C. C., Lee, J. S. and Cheng, T. F.,"Security Design for Three-Party Encrypted Key Exchange Protocol Using Smart Cards ," the Second International Conference on Ubiquitous Information Management and Communication (ICUIMC 2008), pp. 329-333, 2008-01. Suwon, Korea .
  159. Lee, C. F., Wang, Y. R., and Chang , C. C.,"An Adaptive EMD Embedding Method by Condensing Secret Messages ," the Second International Conference on Ubiquitous Information Management and Communication (ICUIMC 2008), pp. 390-395, 2008-01. Suwon, Korea .
  160. Yu, Y. H., Chang, C. C., and Hu, Y. C.,"Improved JPEG Scheme Based on Adaptive Block Encoding ," the Third International Conference on Signal-Image Technology & Internet-Based System (SITIS' 2007), pp. 645-651, 2007-12. Shanghai Jiaotong University, China .
  161. Chang, C. C., Yu, T. X. and Yen, H. Y.,"Paper Currency Verification with Support Vector Machines ," the Third International Conference on Signal-Image Technology & Internet-Based System (SITIS' 2007), pp. 860-865, 2007-12. Shanghai Jiaotong University, China .
  162. Chang, C. C., Chou, Y. C. and Lin, C. C.,"A New Image Compression Scheme Based on Locally Adaptive Coding ," the Ninth IEEE International Symposium on Multimedia 2007, pp. 14-21, 2007-12. Taichung, Taiwan .
  163. Wang, C. C., Chang, C. C., Jan, J. K. and Lin, I. C.,"A Flexible Fragile Watermarking Scheme for Binary Images with Reversibility ," the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing(IIHMSP07), Vol. 1, pp. 501-504, 2007-11. Kaohsiung, Taiwan .
  164. Lee, C. F., Wang, Y. R. and Chang, C. C.,"A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction ," the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing(IIHMSP07), Vol. 1, pp. 497-500, 2007-11. Kaohsiung, Taiwan .
  165. Chang, C. C. and Chen, C. C.,"Secret Image Sharing Using Quadratic Residues ," the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing(IIHMSP07), Vol. 1, pp. 515-518, 2007-11. Kaohsiung, Taiwan .
  166. Lin, C. N. and Chang, C. C.,"A Best-pair-first Capacity-distortion Control for Data Hiding on VQ Compression Domain ," the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing(IIHMSP07), Vol. 1, pp. 509-514, 2007-11. Kaohsiung, Taiwan .
  167. Chang, C. C. and Chou, Y. C.,"High Payload Data Embedding with Hybrid Strategy ," the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing(IIHMSP07), Vol. 1, pp. 505-508, 2007-11. Kaohsiung, Taiwan .
  168. Chang, C. C., Lee, C. F. and Chuang, L. Y.,"Using Dynamic Programming Strategy to Find an Optimal Solution to Exploiting Modification Direction Embedding Method ," the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing(IIHMSP07), Vol. 1, pp. 489-492, 2007-11. Kaohsiung, Taiwan .
  169. Chang, C. C. and Kieu, T. D.,"Reversible Data Embedding for Vector Quantization Indices ," the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing(IIHMSP07), Vol. 1, pp. 481-484, 2007-11. Kaohsiung, Taiwan .
  170. Chang, C. C., Tai, W. L., and Chen, K. N.,"Improvements of EMD Embedding for Large Payloads ," the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing(IIHMSP07), Vol. 1, pp. 473-476, 2007-11. Kaohsiung, Taiwan .
  171. Chang, C. C. and Kieu, T. D.,"Secret Sharing and Information Hiding by Shadow Images ," the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing(IIHMSP07), Vol. 2, pp. 457-460, 2007-11. Kaohsiung, Taiwan .
  172. Wu, M. N., Lin, C. C. and Chang, C. C.,"Brain Tumor Detection Using Color-Based K-Means Clustering Segmentation ," the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing(IIHMSP07), Vol. 2, pp. 245-248, 2007-11. Kaohsiung, Taiwan .
  173. Chang, C. C., Tsai, H. C. and Chang, P. Y.,"A Collaborative Conference Key Agreement Scheme Using an Intermediary Node ," International Conference on Convergence Information Technology (ICCIT'07), pp. 54-59, 2007-11. Gyeongju, Korea .
  174. Chang, C. C., Kieu, T. D. and Chou, Y. C.,"Reversible Data Hiding Scheme Using Two Steganographic Images ," the IEEE TENCON 2007, pp. 1-4, 2007-10. Taipei, Taiwan .
  175. Chang, C. C. and Lin, S. Y,"An Improvement on Authenticated Key Agreement Scheme ," the 2007 International Conference on Intelligent Pervasive Computing (IPC-07), pp. 3-6, 2007-10. Jeju Island, Korea .
  176. Chang, C. C. and Lin, P. Y.,"Significance-Preserving Codebook Using Generic Algorithm ," the 4th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD'07), (J. Lei, J. Yu and S. Zhou Eds.), IEEE Press, Vol. 3, pp. 660-664, 2007-08. Hainan, China .
  177. Hung, K. L.and Chang, C. C.,"Recoverable Tamper Proofing Technique for Image Authentication Using Irregular Sampling Coding ," The 4th International Conference on Autonomic and Trusted Computing (ATC-07), pp. 333-343, 2007-07. Hong Kong .
  178. Chang, C. C., Su, Y. W. and Lin, I. C.,"A Broadcast-Encryption-Based Key Management Scheme for Dynamic Multicast Communications ," The Second International Conference on Scalable Information Systems(INFOSCALE 2007), pp. 496-497, 2007-06. Suzhou, China .
  179. Chang, K. J. and Chang, C. C.,"An E-Mail Signature Protocol for Anti-Spam ," The Second International Conference on Scalable Information Systems, pp. 498-499, 2007-06. Suzhou, China .
  180. Huang, H. F. and Chang, C. C.,"An Efficient Key-Lock-Pair Mechanism Based on Division Algorithm ," the 1st International Conference on Multimedia and Ubiquitous Engineering (MUE), pp. 982-986, 2007-04. Seoul, Korea .
  181. Chang, C. C., Chen, Y. H. and Lin, C. C.,"Hiding Secret Information in a Color Palette Image with Hybrid Strategies ," the First International Conference on Ubiquitous Information Management and Communication, pp. 129-138, 2007-02. Seoul, Korea .
  182. Lin, C. C. and Chang, C. C.,"An Image Hiding Scheme Based on Du's Disk Allocation Method ," the 2006 IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2006), pp. 617-620, 2006-12. Pasadena, California, USA .
  183. Wang, C. C., Jan, J. K. and Chang, C. C.,"A Novel Steganography with Row-Major Mapping Relation ," the 2006 IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2006), pp. 392-395, 2006-12. Pasadena, California, USA .
  184. Chang, C. C. and Chou, Y. C.,"Quantization Index Modulation Using Vector Quantization with DWT Based State-Codebook Search ," the 2006 IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2006), pp. 549-552, 2006-12. Pasadena, California, USA .
  185. Chang, C. C., Chou, Y. C. and Shen, J. J.,"A Novel Image Compression Algorithm Based on Sixteen Most Lately Used Encoded Codewords ," the 2006 IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2006), pp. 545-548, 2006-12. Pasadena, California, USA .
  186. Chang, C. C. and Chuang, J. C.,"Progressive Image Transmission Using Significant Features and Linear Regression Prediction ," the 2006 IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2006), pp. 681-684, 2006-12. Pasadena, California, USA .
  187. Chang, C. C., Chou, Y. C. and Shen, J. J.,"A Heuristic Method for Extracting Enhanced Watermarks from Digital Images ," the 2006 IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2006), pp. 453-456, 2006-12. Pasadena, California, USA .
  188. Chang, C. C., Chen, Y. H. and Li, K. M.,"Improved SMVQ scheme with edge-directed prediction ," the 2006 IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2006), pp. 541-544, 2006-12. Pasadena, California, USA .
  189. Chang, C. C., Chang, S. C. and Lee, J. S.,"Improvement on Yang et al.'s Authentication Scheme without Exponential Operations ," International Workshop on Security Engineering and Information Technology on High Performance Network 2006(SIT06), pp. SIT8:1-8, 2006-11. Cheju Island, Korea .
  190. Chang, C. C., Chang, K. J. and Yang, J. H.,"An Efficient Identity Management Protocol for 3G Mobile Networks ," International Workshop on Security Engineering and Information Technology on High Performance Network 2006(SIT06), pp. SIT15:1-8, 2006-11. Cheju Island, Korea .
  191. Yang, J. H. Chang, C. C. and Wang, C. H.,"An Efficient Key Establishment Scheme Using One-Way Function Tree for Sensor Networks ," Proceedings of the Fifth International Workshop for Applied PKC (IWAP'06), pp. 31-46, 2006-11. China .
  192. Hwang, H. F. and Chang, C. C.,"An Untraceable Electronic Cash System Using Fair Blind Signatures ," the 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), pp. 39-46, 2006-10. Shanghai, China .
  193. Chan, C. W. and Chang, C. C.,"A New Scheme for the Electronic Coins ," the 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), pp. 339-342, 2006-10. Shanghai, China .
  194. Chang, C. C. and Lu, T. C.,"A Bandwidth Efficiency of the Locally Adaptive Compression Method for Hiding Secret Messages ," The 9th International Conference on Computer Science and Informatics (JCCSI), 1065-1068, 2006-10. Kaohsiung, Taiwan .
  195. Chang, Y. F. and Chang, C. C.,"Comments on Abe et al.'s Signer-ambiguous Signature Scheme from Variety of Keys ," The 9th International Conference on Computer Science and Informatics (JCCSI),, pp. 678-681, 2006-10. Kaohsiung, Taiwan .
  196. Wu, H. C., Lin, H. C. and Chang, C. C.,"Reversible Palette Image Steganography Based on De-clustering and Predictive Coding ," The 9th International Conference on Computer Science and Informatics (JCCSI), pp. 705-708, 2006-10. Kaohsiung, Taiwan .
  197. Wu, H. C., Chang, C. C. and Yu, T. W.,"A DCT-based Recoverable Image Authentication Technique ," The 9th International Conference on Computer Science and Informatics (JCCSI), pp. 701-704, 2006-10. Kaohsiung, Taiwan .
  198. Chang, C. C. and Lu, T. C.,"A Wavelet-based Progressive Digital Image Transmission Scheme ," the 2006 International Conference on Innovative Computing, Information and Control (ICICIC2006), Vol. 2, pp. 681-684, 2006-08. Beijing, China .
  199. Chang, C. C., Tai, W. L. and Lin, C. C.,"A Multipurpose Wavelet-based Image Watermarking ," the 2006 International Conference on Innovative Computing, Information and Control (ICICIC2006), Vol. 3, pp. 70-73, 2006-08. Beijing, China .
  200. Wu, M. N., Lin C. C. and Chang, C. C.,"A Fast Wavelet-Based Image Progressive Transmission Method based on Vector Quantization ," the 2006 International Conference on Innovative Computing, Information and Control (ICICIC2006), Vol. 2, pp. 677-680, 2006-08. Beijing, China .
  201. Chang, C. C., Chou, Y. C. and Shen, J. J.,"A Discrete Wavelet Transform Based State-codebook Search Algorithm for Vector Quantization ," the 2006 International Conference on Innovative Computing, Information and Control (ICICIC2006), Vol. 1, pp. 197-200, 2006-08. Beijing, China .
  202. Chang, C. C., Chen, T. S. and Hsia, H. C.,"An Image Watermarking Scheme Using Pattern Coding Technique ," the 2006 International Conference on Innovative Computing, Information and Control (ICICIC2006), Vol. 3, pp. 467-470, 2006-08. Beijing, China .
  203. Chang, C. C. and Hung, K. L.,"An Efficient Euclidean Distance Estimation Scheme for Accelerating VQ Encoding ," the 2006 International Conference on Innovative Computing, Information and Control (ICICIC2006), Vol. 1, pp. 194-196, 2006-08. Beijing, China .
  204. C. Y. Chen and C. C. Chang,"Performances of Some File Systems among Multiple Disks for Orthogonal Range Retrieval ," The Fifth International Conference on Information and Management Sciences (IMS 2006, pp.319-332, 2006-07. Chengdu, China .
  205. Chang, C. C., Lee, J. S. and Chan, C. S.,"An Efficient Key Distribution Scheme for Rating-Oriented Pay-TV Systems ," The Fifth International Conference on Information and Management Sciences Conference (IMS 2006), pp. 194-199, 2006-07. Chengdu, China .
  206. Jochen, P. and Chang, C. C.,"A Correlation-Based Watermarking System for Proof of Ownership ," The Fifth International Conference on Information and Management Sciences Conference (IMS 2006), pp. 200-211, 2006-07. Chengdu, China .
  207. Chang, C. C. and Wu, C. C.,"A Dynamic Broadcast Encryption Scheme without Keys of Recipients ," The Fifth International Conference on Information and Management Sciences Conference (IMS 2006), pp. 158-161, 2006-07. Chengdu, China .
  208. Chang, C. C. and Kuo, Y. T.,"A Modification of DES ," The Fifth International Conference on Information and Management Sciences Conference (IMS 2006), pp. 311-318, 2006-07. Chengdu, China .
  209. Chang, C. C. and Yang, J. H.,"An Efficient Generalized Secret Sharing Scheme Based on Chinese Remainder Theorem ," The Fifth International Conference on Information and Management Sciences Conference (IMS 2006), pp. 333-336, 2006-07. Chengdu, China .
  210. Chang, C. C. and Chan, C. W.,"A Database Record Encryption Scheme Using Rabin's Public Key Cryptosystem and Its Master Keys ," the Fifth International Conference on Information and Management Sciences Conference (IMS 2006), pp. 337-342, 2006-07. Chengdu, China .
  211. Chang, C. C., Chen, T. S. and Chung, P. F.,"A Simple and Effective Copyright Protection Technique for Gray-level Images ," the Fifth International Conference on Information and Management Sciences Conference (IMS 2006), pp. 165-168, 2006-07. Chengdu, China .
  212. Chen, C. Y. and Chang, C. C.,"Performances of Some File Systems among Multiple Disks for Orthogonal Range Retrieval ," the Fifth International Conference on Information and Management Sciences Conference (IMS 2006), pp. 319-332, 2006-07. Chengdu, China .
  213. Chang, C. C., Chen, T. S. and Chung, P. F.,"A Simple and Effective Copyright Protection Technique for Gray-level Images ," Proceedings of the Fifth International Conference on Information and Management Sciences Conference (IMS 2006), pp. 165-168, 2006-07. . .
  214. Chang, C. C. and Huang, H. F.,"An Untraceable Forward-Secure Blind Signature Scheme ," The 2006 IAENG International Workshop on Internet Computing and Web Services (IWICWS'06), pp. 441-446, 2006-06. Hong Kong, China .
  215. Chang, Y. F., Chang, C. C. and Tai, W. L.,"Comments on Distributed Sign-and-encryption Schemes ," the 2006 IAENG International Workshop on Computer Science (IWCS’06), pp. 178-180, 2006-06. Hong Kong, China .
  216. Chang, C. C., Wu, W. B. and Yeh, J. S.,"A Cryptanalysis on a Generalized Threshold Cryptosystem ," Proceedings of the 2006 IAENG International Workshop on Internet Computing and Web Services (IMECS 2006), pp. 452-455, 2006-06. Hong Kong, China .
  217. Chan, C. W. and Chang, C. C.,"A Scheme for (t, n)-Threshold Secret Image Sharing ," The 2006 IAENG International Workshop on Imaging Engineering (IWIE'06), pp. 619-624, 2006-06. Hong Kong, China .
  218. Chang, C. C. and Lin, K. C.,"Yet Another Attack on Mutual Authentication and Key Exchange Protocols for Low Power Wireless Communications ," The 2006 IAENG International Workshop on Wireless Networks (IWWN'06), pp. 959-962, 2006-06. Hong Kong, China .
  219. Chang, C. C., Chan, C. S. and Shih, K. J.,"Placing Chinese Phonetic Symbols on Mobile Phones Keyboard Using Branch-and-bound Strategy ," 2006 IEEE International Conference on Computing & Informatics (ICOCI 2006), pp.1-7, 2006-06. Malaysia .
  220. Chang, C. C., Kuo, Y. T., and Lai, Y. P.,"Parallel Computation of Residue Number System ," 2006 IEEE International Conference on Computing & Informatics (ICOCI 2006), pp. 1-6, 2006-06. Malaysia .
  221. Yang, J. H. and Chang, C. C.,"An Efficient Authentication with Key Agreement Protocol for Sensor Networks ," 4th International Conference on Applied Cryptography and Network Security (ACNS'06), pp. 71-77, 2006-06. Singapore .
  222. Chang, Y. F., Chang, C. C. and Su, Y. W.,"A Secure Improvement on the User-friendly Remote Authentication Scheme with No Time Concurrency Mechanism ," the 20th International Conference on Advanced Information Networking and Applications (AINA'06), Vol. 2, pp. 741-745, 2006-04. Vienna, Austria .
  223. Chang, Y. F. and Chang, C. C.,"Enhanced Anonymous Auction Protocols with Freewheeling Bids ," The IEEE 20th International Conference on Advanced Information Networking and Applications, Vol. 1, pp. 353-358, 2006-04. Vienna, Austria .
  224. Chang, C. C. and Tsai, H. C.,"A Smart Card Based Authentication Protocol for Strong Passwords ," Proceedings of 5th WSEAS International Conference on APPLIED COMPUTER SCIENCE (ACOS '06), pp. 385-391, 2006-04. Hangzhou, China .
  225. Chang, C. C., Lin, C. H. and Lee, J. S.,"A File Protection System Based on a Trapdoor One-way Hash Function ," Proceedings of 5th WSEAS International Conference on APPLIED COMPUTER SCIENCE (ACOS '06), pp. 392-397, 2006-04. Hangzhou, China .
  226. Chang, C. C., Lee, J. S., Chang, Y. F. and Hsieh, Y. P.,"A Scalable Multicast Security Protocol in Hierarchy Structures ," Proceedings of 5th WSEAS International Conference on APPLIED COMPUTER SCIENCE (ACOS '06), pp. 398-405, 2006-04. Hangzhou, China .
  227. Chang, C. C., Kao, C. L. and Lin, C. C.,"Efficient and Scalable Hierarchical Key Assignment Scheme ," Proceedings of 5th WSEAS International Conference on APPLIED COMPUTER SCIENCE (ACOS '06), pp. 1065-1069, 2006-04. Hangzhou, China .
  228. Chang, C. C. and Wu, W. C.,"A Novel Data Hiding Scheme for Keeping High Stego-Image Quality ," The 12th International Conference on MultiMedia Modelling 2006, pp. 225-232, 2006-01. Bijing, China .
  229. Chang, C. C., and Lee, J. S.,"A Smart-Card-Based Remote Authentication Scheme ," The 2005 International Conference on Embedded Software and Systems, pp. 445-449, 2005-12. Xi'an, China .
  230. Chang, Y. F. and Chang, C. C.,"A Secure and User-friendly Remote Authentication Scheme Providing Computation Efficiency with No Time Concurrency Mechanism ," ISKLOIS Conference on Information Security and Cryptology, pp. 139-148, 2005-12. Beijing, China .
  231. Lin, C. N., Chang, C. C. and Chan, Y. K.,"Variable Rate Data Hiding by Simple LSB Substitution and Quadtree Segmentation ," MMU International Symposium on Information and Communications Technologies 2005, Vol. TS15, pp.17-20, 2005-11. Petaling Jaya, Malaysia .
  232. Chang, Y. F. and Chang, C. C.,"Password-authenticated 3PEKE with Round Efficiency without Server's Public Key ," 2005 International conference on Cyberworlds, pp. 340-344, 2005-11. Singapore .
  233. Huang, H. F. and Chang, C. C.,"An Efficient Deniable Authentication Protocol ," 2005 International Conference on Cyberworlds, pp. 307-310, 2005-11. Singapore .
  234. Chang, C. C., Kuo, J. Y. and Lee, J. S.,"Time-bounded Based Password Authentication Scheme ," 2005 International Conference on Cyberworlds, pp.117-122, 2005-11. Singapore .
  235. Chang, C. C., Chang, Y. F. and Wu, W. C.,"An Extendable-Message-Passing Protocol with Signature Based on Two Hard Problems and Its Applications ," 2005 International Conference on Cyberworlds, pp. 93-100, 2005-11. Singapore .
  236. Lee, C. Y., Chang, C. C. and Lin, C. H.,"User Authentication with Anonymity for Global Mobility Networks ," Second Asia Pacific Conference on Mobile Technology, Applications and Systems, pp. 3-1B-6: 1-5, 2005-11. Guangzhou, China .
  237. Chang, C. C., Lin, K. C., and Lee, J. S.,"DH-Based Communication Method for Cluster-Based Ad Hoc Networks ," Second Asia Pacific Conference on Mobile Technology, Applications and Systems, pp. 2-2A-1: 1-8, 2005-11. Guangzhou, China .
  238. Chang, C. C. and Wu, W. C.,"A Codebook Search Algorithm Based on Voronoi-Diagram Technique for Speeding Up VQ Encoding ," The 2nd International Symposium on Voronoi Diagrams in Science and Engineering, pp. 62-71, 2005-10. Seoul, Korea .
  239. Wu, M. N., Lin, C. C. and Chang, C. C.,"Hiding Secret Information in VQ Compressed Images Using Voronoi Diagram ," The 2nd International Symposium on Voronoi Diagrams in Science and Engineering, pp. 55-61, 2005-10. Seoul, Korea .
  240. Chang, C. C., Lee, J. S. and Chen, C. C.,"On the Forward and Backward Secrecy of HLL Group Key Exchange Mechanism ," The 5th International Conference on Computer and Information Technology, pp. 702-705, 2005-09. Shanghai, China .
  241. Chang, C. C., Lin, C. Y.and Wang, Y. Z.,"VQ image steganographic method with high embedding capacity using multi-way search approach ," 9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2005, Vol. 3, pp. 1058-1064, 2005-09. Melbourne, Australia .
  242. Chang, C. C.*, Wang, Y. Z. and Hu, Y. C.,"Adaptive Data Hiding Scheme for Palette Images ," Proceedings of 2005 International Workshop on Intelligent Information Hiding and Multimedia Signal Processing (KES-IIH), pp. 103-122, 2005-09. Melbourne, Australia .
  243. Hwang, K. F., Chang, C. C., and Chan, C. W.,"A Search Scheme Resulting in Mixing Compressed Text Files ," The 11th International Conference on Parallel and Distributed Systems, Vol. 1, pp. 762-768, 2005-07. Fukuoka, Japan .
  244. Chang, C. C., Chuang, J. C. and Lin, P. Y.,"Sharing a Secret Two-Tone Image in Two Gray-Level Images ," The First International Workshop on Security in Networks and Distributed Systems, pp. 300-304, 2005-07. Fukuoka, Japan .
  245. Chang, C. C., Hsiao, J. Y., and Lu, P. W.,"An Image Refining Method Using Digital Watermark via Vector Quantization ," The First International Workshop on Distributed, Parallel and Network Applications, pp. 585-589, 2005-07. Fukuoka, Japan .
  246. Chou, A. Y. H., Chang, C. C., and Yang, W. P.,"Constructing Nearly Optimal Cartesian Product Files for Orthogonal Range Queries ," Fourth International Conference on Information and Management Sciences, pp. 541-549, 2005-07. Kunming & Dali & Shangrila, China .
  247. Chang, C. C., Lee, T. F., and Leu, J. J.,"An Efficient Search Mechanism Based on the Concepts of Bloom and Random Filters ," Fourth International Conference on Information and Management Sciences, pp. 386-393, 2005-07. Kunming & Dali & Shangrila, China .
  248. Tseng, S. W. and Chang, C. C.,"VQ-Based Image Watermarking Using Codebook Partitioning ," Fourth International Conference on Information and Management Sciences, pp. 350-353, 2005-07. Kunming & Dali & Shangrila, China .
  249. Chang, C. C. and Lai, Y. P.,"A Data Hiding Scheme Based on Anti-gray Coding ," Fourth International Conference on Information and Management Sciences, pp. 395-407, 2005-07. Kunming & Dali & Shangrila, China .
  250. Chang, C. C. and Lu, T. C.,"A Content-based Color Image Retrieval System Using Gradient Information ," Fourth International Conference on Information and Management Sciences, pp. 379-384, 2005-07. Kunming & Dali & Shangrila, China .
  251. Chan, C. W. and Chang, C. C.,"Efficient t out-of n Oblivious Transfer Schemes Based on Interpolating Polynomials ," Fourth International Conference on Information and Management Sciences, pp. 571-580, 2005-07. Kunming & Dali & Shangrila, China .
  252. Chang, C. C. and Lai, Y. P.,"Efficient Group Key Agreement with Weil Pairing ," Fourth International Conference on Information and Management Sciences, pp. 344-349, 2005-07. Kunming & Dali & Shangrila, China .
  253. Huang, H. F., Chang, C. C., and Yeh, J. S.,"Enhancement of Non-Interactive Oblivious Transfer Scheme ," Fourth International Conference on Information and Management Sciences, pp. 196-199, 2005-07. Kunming & Dali & Shangrila, China .
  254. Chang, C. C. and Wu. C. C.,"An Efficient and Secure Multi-server Authenticated Key Agreement Protocol Using Smart Cards ," The 2005 International Conference on Computational Science and its Applications, Part V., pp.99, 2005-05. Singapore .
  255. Chang, C. C. and Wu, C. C.,"An Efficient Oblivious Transfer Scheme based on RSA ," The 2005 International Conference on Computational Science and its Applications, Part V., pp. 89, 2005-05. Singapore .
  256. Chang, C. C., Li, Y. C., and Lee, J. S.,"An Efficient Algorithm for Incremental Mining of Association Rules ," The 15th International Workshop on Research Issues in Data Engineering, pp. 3-10, 2005-04. Tokyo, Japan .
  257. Chang, C. C., Tai, W. L. and Lin, M. H.,"A Reversible Data Hiding Scheme with Modified Side Match Vector Quantization ," The IEEE 19th International Conference on Advanced Information Networking and Applications, Vol. 1, pp. 947-952, 2005-03. Taipei, Taiwan .
  258. Lai, Y. P. and Chang, C. C.,"A Simple Forward Secure Blind Signature Scheme Based on Master Keys and Blind Signatures ," The First International Workshop on Information Networking and Applications, Vol. 2, pp. 139-144, 2005-03. Taipei, Taiwan .
  259. Huang, H. F. and Chang, C. C.,"A New Design for Efficient t-out-n Oblivious Transfer Scheme ," The First International Workshop on Information Networking and Applications, Vol. 2, pp. 499-502, 2005-03. Taipei, Taiwan .
  260. Chan, C. S. and Chang, C. C.,"A Lossless Medical Image Compression Scheme Using Modified S-tree Structure ," The First International Workshop on Information Networking and Applications, Vol. 2, pp. 75-78, 2005-03. Taipei, Taiwan .
  261. Chang, C. C. and Kuo, J. Y.,"An Efficient Multi-Server Password Authenticated Key Agreement Scheme Using Smart Cards with Access Control ," The First International Workshop on Information Networking and Applications, Vol. 2, pp. 257-260, 2005-03. Taipei, Taiwan .
  262. Lee, C. Y., Lin, C. H. and Chang, C. C.,"An Improved Low Computation Cost User Authentication Scheme for Mobile Communication ," The First International Workshop on Information Networking and Applications, Vol. 2, pp. 249-252, 2005-03. Taipei, Taiwan .
  263. Huang, C. H., Lee, C. Y., Lin, C. H., Chang, C. C. and Chen, K. L.,"Authenticated Encryption Schemes with Message Linkage for Threshold Signatures ," The First International Workshop on Information Networking and Applications, Vol. 2, pp. 261-264, 2005-03. Taipei, Taiwan .
  264. Chang, C. C., Chiang, C. L, and Hsiao, J. Y.,"A DCT-domain System for Hiding Fractal Compressed Images ," The First International Workshop on Information Networking and Applications, Vol. 2, pp. 83-86, 2005-03. Taipei, Taiwan .
  265. Chang, C. C.*, Wu, W. C. and Hu, Y. C.,"Color Image Retrieval Based on Regional Features ," International Progress 2005 on Wavelet Analysis and Active Media Technology (IPWAAMT05), pp. 23-33, 2005-01. Chongqing, China .
  266. Chang, C. C. and Lee, J. S.,"An Efficient and Secure Multi-Server Password Authentication Scheme Using Smart Cards ," Proceedings of 2004 International Conference on Cyber Worlds, pp. 417-422, 2004-11. . .
  267. Chang, C. C. and Lin, P. Y.,"A Compression-Based Data Hiding Scheme Using Vector Quantization and Principle Component Analysis ," Proceedings of 2004 International Conference on Cyber Worlds, pp. 369-375, 2004-11. . .
  268. Chang, C. C. and Liu, Y. L.,"A Block-based Robust Image Authentication Scheme Using Vector Quantization Encoding ," Proceedings of Pacific Rim Workshop on Digital Steganography 2004 (STEG’04), p. 144-158, 2004-11. . .
  269. Chang, C. C., Tai, W. L. and Lin, M. H.,"A Novel Image Hiding Scheme Based on Clustering and VQ ," Proceedings of Pacific Rim Workshop on Digital Steganography 2004 (STEG’04), pp. 28-36, 2004-11. . .
  270. Chang, C. C. and Chen, K. L.,"A Signature Scheme with (t,n) Shared Verification and Message Recovery ," Proceedings of the Sixth International Conference on Information Integration and Web-based Applications & Services (iiwas 2004), pp. 507-516, 2004-09. . .
  271. Tseng, H. W. and Chang, C. C.,"Steganography Using JPEG-Compressed Images ," Proceedings of 2004 International Conference on Computer and Information Technology, pp. 12-17, 2004-09. . .
  272. Lin, M. H. and Chang, C. C.,"A Novel Information Hiding Scheme Based on BTC ," Proceedings of 2004 International Conference on Computer and Information Technology, pp. 66-71, 2004-09. . .
  273. Yu, Y. H., Chang, C. C. and Hu, Y. C.,"A Steganographic Method for Hiding Data in VQ Encoded Images ," Proceedings of 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing, pp. 358-361, 2004-08. . .
  274. Chang, C. C., and Hwang, P. C.,"A Login Procedure Based on the Concept of Longest Common Subsequence ," Proceedings of Third International Conference on Information and Management Sciences (IMS2004), pp. 337-341, 2004-06. . .
  275. Chang, C. C., Wu, W. C., and Hu, Y. C.,"Content-Based Image Retrieval Using Vector Quantization ," Proceedings of Third International Conference on Information and Management Sciences (IMS2004), pp. 355-361, 2004-06. . .
  276. Chang, C. C., and Hwang, P. C.,"An Efficient Electronic Election Scheme Based on Division Property ," Proceedings of Third International Conference on Information and Management Sciences (IMS2004), pp. 135-142, 2004-06. . .
  277. Chang, C. C., Chen, K. L.,"A Secret Sharing Scheme Based on Solving a System of Linear Equations ," Proceedings of Third International Conference on Information and Management Sciences (IMS2004, pp. 362-366, 2004-06. . .
  278. Chang, C. C. and Tseng, H. W.,"A Novel Adaptive VQ-Based Image Data Hiding Method ," Proceedings of Second International Conference on Applied Cryptography and Network Security (ACNS2004), pp. 161-170, 2004-06. . .
  279. Chan, Y. K. and Chang, C. C.,"Spatial Video Retrieval Based on the Piecewise Method ," Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA2004), pp. 171-176, 2004-03. . .
  280. Chang, C. C., Lin, C. H., and Hwang, P. C.,"Secret Sharing with Access Structure in a Hierarchy ," Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA2004), pp. 31-34, 2004-03. . .
  281. Wang, C. T., Chang, C. C., and Lin, C. H.,"Using IC Cards to Remotely Login Passwords without Verification Tables ," Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA2004), pp. 321-326, 2004-03. . .
  282. Wang, C. T., Lin, C. H., and Chang, C. C.,"Supervising Secret-key Agreements in a Level-Based Hierarchy ," Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA2004), pp. 309-314, 2004-03. . .
  283. Hwang, R. J. and Chang, C. C.,"Enhancing the Efficiency of (v, r, n)- Fairness Secret Sharing Scheme ," Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA2004), pp. 208-212, 2004-03. . .
  284. Chang, C. C., Lin, I. C., Tsai, H. M., and Wang, H. H.,"A Key Assignment Scheme for Controlling Access in Partially Ordered User Hierarchies ," Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA2004), pp. 376-379, 2004-03. . .
  285. Chang, C. C. and Chang Y. F.,"Yet Another Attack on a QR-based Password Authentication System ," Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA2004), pp. 170-173, 2004-03. . .
  286. Chang, C. C., Lu, T. C. and Liu, Y. L.,"Bandwidth Efficiency of the Image Compression Method for Information Hiding ," Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA2004), pp. 426-432, 2004-03. . .
  287. Chang, C. C., Hsiao, J. Y. and Lu, P. W.,"An Image Refining Method Using Digital Watermark via Vector Quantization ," Proceedings of First International Workshop on Distributed, Parallel and Network Applications, pp. 585-589, 2004-03. . .
  288. Chang, C. C. and Chang, Y. F.,"The Security Flaw of an Untraceable Blind Signature Scheme ," Proceedings of The Fourth International Conference on Electronic Business (ICEB2004), pp. 1379-1381, 2004-01. . .
  289. Chang, C. C., Lu, T. C., and Chen G. M.,"An Efficient Promoter Prediction Scheme Based on Principal Component Analysis ," Proceedings of the 2003 International Conference on Informatics, Cybernetics and Systems (ICICS 2003), pp. 1498-1504, 2003-12. . .
  290. Chang, C. C., Chen, T. S., and Xiao, G. X.,"An Efficient and Effective Method for VQ Codebook Design ," Proceedings of Fourth International Conference on Information, Communications & Signal Processing - Fourth IEEE Pacific-Rim Conference on Multimedia (ICICS-PCM’03), pp. 782-786, 2003-12. . .
  291. Chang, C. C., Lee, C. T., Xiao, G. X., and Chen, T. S.,"A New Speech Hiding Scheme Based upon Subband Coding ," Proceedings of Fourth International Conference on Information, Communications & Signal Processing - Fourth IEEE Pacific-Rim Conference on Multimedia (ICICS-PCM’03), pp. 980-984, 2003-12. . .
  292. Chang, C. C., Hsieh, C. P., and Hsiao, J. Y.,"A Fast Noise Reduction Method Based on Human Visual System ," Proceedings of Fourth International Conference on Information, Communications & Signal Processing - Fourth IEEE Pacific-Rim Conference on Multimedia (ICICS-PCM’03), pp. 1879-1883, 2003-12. . .
  293. Tsai P. Y., Lin, M. H. and Chang, C. C.,"A Character-Based Authentication Scheme for Chinese Calligraphy Images ," Proceedings of Fourth International Conference on Information, Communications & Signal Processing - Fourth IEEE Pacific-Rim Conference on Multimedia (ICICS-PCM’03), pp. 960-964, 2003-12. . .
  294. Chang, C. C., Li, C. F., and Hu, Y. C.,"Code Transformation of DF-expression Between Bintree and Quadtree ," Proceedings of Fourth International Conference on Information, Communications & Signal Processing - Fourth IEEE Pacific-Rim Conference on Multimedia (ICICS-PCM’03), pp. 559-563, 2003-12. . .
  295. Chan, Y. K and Chang, C. C.,"Block Image Retrieval Based on a Compressed Linear Quadtree ," Proceedings of Fourth International Conference on Information, Communications & Signal Processing - Fourth IEEE Pacific-Rim Conference on Multimedia (ICICS-PCM’03), pp. 31-35, 2003-12. . .
  296. Chang, C. C., Chen, T. S., and Hsia, H. C.,"An Effective Image Steganographic Scheme Based on Wavelet Transformation and Pattern-Based Modification ," Proceedings of International Conference on Computer Networks and Mobile Computing, pp. 450-453, 2003-10. . .
  297. Chang, C. C. and Chan, C. W.,"A Database Record Encryption Scheme Using the RSA Public Key Cryptosystem and its Master Keys ," Proceedings of International Conference on Computer Networks and Mobile Computing, pp. 345-348, 2003-10. . .
  298. Chang, C. C. and Chan, C. W.,"A Hypersphere Oriented Key Exchange Scheme for Multiparty ," A Hypersphere Oriented Key Exchange Scheme for Multiparty, pp. 27-30, 2003-10. . .
  299. Chang, C. C., Shih, K. J., and Lin, I. C.,"An Intellectual Placement of Chinese Phonetic Symbols on the Keypads of Mobile Phones ," Proceedings of 2003 IEEE International Conference on Natural Language Processing and Knowledge Engineering, NLP-KE’03, pp. 506-511, 2003-10. . .
  300. Chang, C. C., Chang, Y. F.,"Security of Digital Signature Scheme Based on Factoring and Discrete Logarithms ," Proceedings of the Second International Conference on Information and Management Sciences (IMS2003), pp. 331-332, 2003-08. . .
  301. Lu, T. C., Changchien, S. W. and Chang, C. C.,"A Characteristic Rules Mining Scheme Based on Weighted Incidence Matrices ," Proceedings of the Second International Conference on Information and Management Sciences (IMS2003), pp. 316-322, 2003-08. . .
  302. Chang, C. C. and Pan, Y. P.,"A Hierarchy Weighted Threshold Multi-secret Sharing Scheme ," Proceedings of the Second International Conference on Information and Management Sciences (IMS2003), pp. 333-340, 2003-08. . .
  303. Chang, C. C. and Liao, C. T.,"A Prediction of VQ Indices by Utilizing DWT and Support Vector Machines ," Proceedings of the Second International Conference on Information and Management Sciences (IMS2003), pp. 273-279, 2003-08. . .
  304. Chang, C. C. and Liao, C. T.,"An Intellectual Property Right Protection Scheme for Digital Images Using Support Vector Machines ," Proceedings of the Second International Conference on Information and Management Sciences (IMS2003), pp. 288-295, 2003-08. . .
  305. Jiang, J. H., Chang, C. C., and Chen, T. S.,"Rehash Method: A Compression Technique of Sparse Binary-Matrices ," Proceedings of the Second International Conference on Information and Management Sciences (IMS2003), pp. 252-256, 2003-08. . .
  306. Hwang, H. F. and Chang, C. C.,"Designing a Broadcasting Cryptosystem for Low Computation Capabilities ," Proceedings of the Second International Conference on Information and Management Sciences (IMS2003), pp. 296-299, 2003-08. . .
  307. Jiang, J. H., Chang, C. C., and Chen, T. S.,"A New Improvement of Lempel-Ziv-Welch Method ," Proceedings of the Second International Conference on Information and Management Sciences (IMS2003), pp. 311-315, 2003-08. . .
  308. Chan, Y. K. and Chang, C. C.,"A Color Image Retrieval Method Based on Regional Color Moment and Wavelet-Based Features ," Proceedings of the Second International Conference on Information and Management Sciences (IMS2003), pp. 398-404, 2003-08. . .
  309. Chang, C. C. and Yu, T. X.,"A High Capacity Image Hiding Scheme for Binary images ," Proceedings of the Second International Conference on Information and Management Sciences (IMS2003), pp. 362-370, 2003-08. . .
  310. Tsai P.Y., Hu, Y. C. and Chang, C. C.,"An Adaptive Two-Stage Codebook Search Algorithm Using Principal Component Analysis and Dynamic Subspace Rechecking ," Proceedings of the Second International Conference on Information and Management Sciences (IMS2003), pp. 349-355, 2003-08. . .
  311. Chang, C. C., Li, Y. C., and Liao, C. T.,"A Fast Method for Linear Space Pairwise Sequence Alignment ," Proceedings of the Second International Conference on Information and Management Sciences (IMS2003), pp. 257-264, 2003-08. . .
  312. Chang, C. C., Hwang, S. J., and Wu, W. B.,"Improvements on Generalized Threshold Cryptosystems ," Proceedings of the Second International Conference on Information and Management Sciences (IMS2003), pp. 265-268, 2003-08. . .
  313. Chang, C. C., and Lou, D. C.,"Fast Parallel Computation of Multi-Exponentiation for Public Key Cryptosystems ," Proceedings of International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), pp. 955-958, 2003-08. . .
  314. Chang, C. C. and Chuang, J. C.,"Image Authentication for Chinese Calligraphy Images Using S-Tree Approach ," Proceedings of 20th International Conference on Computer Processing of Oriental Languages (ICCPOL 2003), pp. 548-554, 2003-08. . .
  315. Lu, T. C. and Chang, C. C.,"A Calligraphic Images Retrieval Scheme (CIRS) Based on Color and Ink Density ," Proceedings of 20th International Conference on Computer Processing of Oriental Languages (ICCPOL 2003), pp. 385-391, 2003-08. . .
  316. Chang, C. C. and Chan, C. S.,"A Watermarking Scheme for Chinese Calligraphic Images ," Proceedings of 20th International Conference on Computer Processing of Oriental Languages (ICCPOL 2003), pp. 541-547, 2003-08. . .
  317. Chang, C. C. and Hwang, K. F.,"Remarks on Digital Signature Schemes Using Self-Certified Public Keys ," Proceedings of the Fourth International Workshop on Information Security Application (WISA2003), pp. 559-563, 2003-08. . .
  318. Chang, C. C. and Wu, M. N.,"A Color Image Progressive Transmission Method by Common Bit Map Block Truncation Coding Approach, ," Proceedings of the International Conference on Communication Technology (ICCT 2003), pp. 1774-1778, 2003-04. . .
  319. Lin, M. H., Hu, Y. C. and Chang, C. C.,"An Image Self-Verification Scheme Based on the Rehash Technique ," Proceedings of the International Conference on Communication Technology (ICCT 2003), Vol. 2, pp. 1883-1886, 2003-04. . .
  320. Chang, C. C., Hsiao, J. Y. and Hsieh, C. P.,"A New Approach to Lossless Image Compression ," Proceedings of the International Conference on Communication Technology (ICCT 2003), Vol. 2, pp. 1734-1738, 2003-04. . .
  321. Chang, C. C. and Chung, C. Y.,"An Enhanced Buyer Seller Watermarking Protocol ," Proceedings of the International Conference on Communication Technology (ICCT 2003),, Vol. 2, pp. 1779-1783, 2003-04. . .
  322. Chang, C. C. and Chung, C. Y.,"An Efficient Session Key Generation Protocol ," Proceedings of the International Conference on Communication Technology (ICCT 2003), Vol. 2, pp. 203-207, 2003-04. . .
  323. Chang, C. C. and Lin, I. C.,"A New (t, n) Threshold Image Hiding Scheme for Sharing a Secret Color Image ," Proceedings of the International Conference on Communication Technology (ICCT 2003), Vol. 2, pp. 196-202, 2003-04. . .
  324. Wang, C. T., Chang, C. C. and Lin, C. H.,"Signature Schemes Based on Two Hard Problems Simultaneously, ," Proceedings of International Conference on Advanced Information Networking and Applications (AINA), pp. 557-560, 2003-03. . .
  325. Chan, C. W. and Chang, C. C.,"Huffman Tree Decomposition and Its Coding Applications ," Proceedings of International Conference on Advanced Information Networking and Applications (AINA), pp. 683-688, 2003-03. . .
  326. Chang, C. C., Chan, C. S. and Hsiao, J. Y.,"Lossless Image Compression Based on Two-way Smaller Difference ," Proceedings of International Conference on Advanced Information Networking and Applications (AINA), pp. 821-824, 2003-03. . .
  327. Chang, C. C., Kuo, Y. T. and Lin, C. H.,"Fast Algorithms for Common-Multiplicand Multiplication and Exponentiation by Performing Complements ," Proceedings of International Conference on Advanced Information Networking and Applications (AINA), pp. 807-811, 2003-03. . .
  328. Hung, K. L. and Chang, C. C.,"An Efficient Block-Based Scheme for Progressively Transmitting Lossless Images ," Proceedings of International Conference on Multimedia Modeling, pp. 313-328, 2003-01. . .
  329. Chang, C. C., Chuang, J. C. and Chen, T. S.,"Image Tamper Proofing Technique Based upon Public-Key Cryptosystem with Hierarchical Approach ," Proceedings of the 5th International Conference Advanced Communication Technology (ICACT 2003), pp. 809-812, 2003-01. . .
  330. Chang, C. C. and Lu, T. C.,"An Image Database Retrieval Scheme Based Upon Multivariate Analysis and Data Mining ," Proceedings of the International Computer Symposium: Database and Software Engineering Workshop (ICS 2002), Session 4, pp. E4., 2002-12. . .
  331. Hwang, H. F. and Chang, C. C.,"Cryptanalysis of the WD Public-key Cryptosystem ," Proceedings of International Symposium on Cyber Worlds: Theories and Practice, pp. 249-254, 2002-11. . .
  332. Chang, C. C. and Yu. T. X.,"Sharing a Secret Gray Image in Multiple Images ," Proceedings of International Symposium on Cyber Worlds: Theories and Practice, pp. 230-237, 2002-11. . .
  333. Chang, C. C., Lu, P. W. and Hsiao, J. Y.,"Hybrid Method for Estimating the Euclidean Distance between Two Vectors ," Proceedings of International Symposium on Cyber Worlds: Theories and Practice, pp. 183-190, 2002-11. . .
  334. Chang, C. C., Hsiao, J. Y. and Chiang, C. L.,"An Image Copyright Protection Scheme Based on Torus Automorphism ," Proceedings of International Symposium on Cyber Worlds: Theories and Practice, p. 217-224, 2002-11. . .
  335. Chan, C. W. and Chang, C. C.,"Key Exchange Protocols for Multiparty Communication Services ," Proceedings of International Symposium on Cyber Worlds: Theories and Practice, pp. 241-248, 2002-11. . .
  336. Chan, C. W. and Chang, C. C.,"A Scheme for Digital Gift Certificates ," Proceedings of the Second International Workshop for Asian Public Key Infrastructures (IWAP 2002), pp. 136-141, 2002-10. . .
  337. Hwang, H. F. and Chang, C. C.,"Enhancement of the Authenticated Encryption Scheme with Message Linkages ," Proceedings of the Second International Workshop for Asian Public Key Infrastructures (IWAP 2002), pp. 59-62, 2002-10. . .
  338. Lu, T. C., Chang, C. C. and Changchien, S. W.,"An Association Rule Mining Method for Spatial Databases ," Proceedings of IASTED International Conference on Information Systems and Databases, pp. 281-286, 2002-09. . .
  339. Chan, Y. K., Chang, C. C. and Shen, J. J.,"A Compact Patricia Trie for a Large Set of Keys ," Proceedings of IASTED International Conference on Information Systems and Databases, pp. 31-36, 2002-09. . .
  340. Chang, C. C., Chan, C. S. and Pan, Y. P.,"An Inverse Halftones Technique Using Genetic Algorithm ," Proceedings of IASTED International Conference on Information Systems and Databases, pp. 184-189, 2002-09. . .
  341. Hung, J. C., Chang, C. C. and Shih, T. K,"Copyright Protection with Program Gene ," Proceedings of Pacific Rim Workshop on Digital Steganography 2002 (STEG 2002), pp. 158-161, 2002-07. Kyushu, Japan .
  342. Chang, C. C., Wu, M. N. and Hwang, K. F.,"High Perceptual Quality Data Hiding Technique for Two-Color Images ," Proceedings of Pacific Rim Workshop on Digital Steganography 2002, pp. 65-70, 2002-07. . .
  343. Tsai, P. Y., Hu, Y. C. and Chang, C. C.,"An Image Hiding Technique Using the Block Truncation Coding ," Proceedings of Pacific Rim Workshop on Digital Steganography 2002, pp. 54-64, 2002-07. . .
  344. Hwang, K. F. and Chang, C. C.,"A Run-Length Mechanism for Hiding Data into Binary Images ," Proceedings of Pacific Rim Workshop on Digital Steganography 2002, pp. 71-74, 2002-07. . .
  345. Chang, C. C. and Pan, Y. P.,"Some Flaws in a Cryptographic Key Assignment Scheme for Dynamic Access Control in a User Hierarchy ," Proceedings of the Second International Conference on Information Security (InfoSecu’02), pp. 5-9, 2002-07. . .
  346. Chang, C. C. and Chan, C. W.,"Two Types of RSA-like Master-Keys and Their Applications to Secure Group Communications ," Proceedings of the Second International Conference on Information Security (InfoSecu’02), pp. 70-76, 2002-07. . .
  347. Hwang, K. F., Lin, I. C. and Chang, C. C.,"A Credit Card-based Mobile Payment System,” Proceedings of the Second International Conference on Information Security (InfoSecu’02) ," Proceedings of the Second International Conference on Information Security (InfoSecu’02), pp. 82-88, 2002-07. . .
  348. Chang, C. C., Chan, C. S. and Hsiao, J. Y.,"A Color Image Hiding Scheme Based on the Predetermined Ordering of Color Images, ," Proceedings of the First International Conference on Information and Management Science, pp. 169-174, 2002-05. . .
  349. Chang, C. C. and Pan. Y. P.,"An Efficient Publicly Verifiable Multisecret Sharing Mechanism ," Proceedings of the First International Conference on Information Management Science, pp. 150-155, 2002-05. . .
  350. Chang, C. C., Hsiao, J. Y. and Lu, P. W.,"A Color Image Recovery and Tamper Proofing Method Based on the Color Palette ," Proceedings of the First International Conference on Information and Management Science, pp. 156-161, 2002-05. . .
  351. Chang, C. C., Chiang, C. L. and Hsiao, J. Y.,"Image Denoising by Median Filter with Edge Detection ," Proceedings of the First International Conference on Information and Management Science, pp. 51-56, 2002-05. . .
  352. Lu, T. C., Chang, C. C. and Changchien, S. W.,"A Mining Frequent Itemsets Procedure Using a Classification Network ," Proceedings of the First International Conference on Information and Management Science, pp. 76-82, 2002-05. . .
  353. Chan, Y. K. and Chang, C. C.,"A Similar Color Image Retrieval System Based on Quadtree Representation ," Proceedings of the First International Conference on Information and Management Science, pp. 162-168, 2002-05. . .
  354. hang, C. C. and Chung, C. Y.,"An Anonymous Electronic Voting Scheme Based on the Latest Decision on Voters’ Intentions ," Proceedings of the International Conference on E-business, pp. 197-200, 2002-05. . .
  355. Chan, Y. K. and Chang, C. C.,"Similar Video Retrieval System Based on Color and Spatial Attributes ," Proceedings of the Third International Conference on Virtual Reality and Its Application in Industry, pp. 567-570, 2002-04. . .
  356. Chang, C. C. and Su, Y. Y.,"A New Approach of Color Image Quantization Based on Multi-Dimensional Directory ," Proceedings of the Third International Conference on Virtual Reality and Its Application in Industry, pp. 508-514, 2002-04. . .
  357. Chang, C. C., Shih, T. K. and Lin, I. C.,"An Efficient Edge Detection Technique for Chinese Calligraphy ," Proceedings of Second International Workshop on Intelligent Multimedia Computing and Networking (IMMCN2002), pp. 960-963, 2002-03. . .
  358. Chang, C. C. and Wu, M. N.,"An Algorithm for Color Image Compression Based on Common Bit Map Block Truncation Coding, ," Proceedings of Second International Workshop on Intelligent Multimedia Computing and Networking (IMMCN2002), pp. 964-967, 2002-03. . .
  359. Chang, C. C., Shih, T. K. and Lin, I. C.,"GBN: An Efficient Progressive Image Transmission Method Based on Guessing by Neighbors ," Multimedia Modeling – Modeling Meltimedia Information and System (L. Rutledge and D. C. A. Bulterman Eds.), pp. 109-126, 2001-11. . .
  360. Chang, C. C. and Wu, M. N.,"A Data Hiding Scheme for Chinese Calligraphy ," Proceedings of the International Conference on Chinese Computing (ICCC 2001), pp. 234-241, 2001-11. . .
  361. Chang, C. C. and Lin, I. C.,"A Progressive Chinese Calligraphy Transmission Technique ," Proceedings of the International Conference on Chinese Computing (ICCC 2001), pp. 223-233, 2001-11. . .
  362. Chang, C. C., Lu, P. W. and Hsiao, J. Y.,"Two Stages Content-Based Retrieval for Music Collections ," Proceedings of the Seventh International Conference on Distributed Multimedia Systems, pp. 423-426, 2001-09. . .
  363. Chang, C. C., Chen, T. S. and Lin, Y.,"A New Image Compression Method Based on Block Truncation Coding and Edge Detection ," Proceedings of the Seventh International Conference on Distributed Multimedia Systems, pp. 448-451, 2001-09. . .
  364. Hung, K. L. and Chang, C. C.,"A Novel VQ-Based Compression Method without Having the Phenomenon of Ragged Edges ," Proceedings of the Seventh International Conference on Distributed Multimedia Systems, pp. 461-465, 2001-09. . .
  365. Chang, C. C. and Chang, Y. F.,"An Image Steganographic Scheme Based on Modified Rabin’s Public Key Cryptosystem ," Proceedings of the Seventh International Conference on Distributed Multimedia Systems, pp. 108-114, 2001-09. . .
  366. Chang, C. C. and Wu, H. C.,"A (t, n)-threshold Secret Sharing Scheme for Hidden Images Based on a Watermarking Technique ," Proceedings of the Seventh International Conference on Distributed Multimedia Systems, pp. 281-288, 2001-09. . .
  367. Chang, C. C. and Chang, Y. F.,"Cryptanalysis of Some Diffie-Hellman Typed Authenticated Key Agreement Protocols ," Proceedings of the 2001 International Workshop on Cryptography and Network Security, pp. 142-145, 2001-09. . .
  368. Chang, C. C. and Lai, Y. P.,"A Fast Exponentiation Using a Data Compression Method for Large Exponents ," Proceedings of the 2001 International Workshop on Cryptography and Network Security, pp. 212-218, 2001-09. . .
  369. Wang, C. T., Chang, C. C. and Lin, C. H.,"Group-Oriented Authenticated Encryption Based on Self-Certified Public Keys ," Proceedings of the Second Workshop on Information Security Applications (WISA’2001), pp. 385-395, 2001-09. . .
  370. Chang, C. C., Hwang, R. J. and Chen, T. S.,"Using a Mouse as a Login Device for Visual Cryptosystem Oriented Password Authentication Scheme ," Proceedings of the Seventh International Conference on Distributed Multimedia Systems, pp. 11-23, 2001-09. . .
  371. Chan, Y. K. and Chang, C. C,"Concealing a Secret Image Using the Breadth first Traversal Linear Quadtree Structure ," Proceedings of the Third International Symposium on Cooperative Database Systems for Advanced Applications CODAS’01, pp. 194-199, 2001-04. . .
  372. Chen, C. Y., Chang, C. C. and Hsueh, C. C.,"A Fast Modular Multiplication Algorithm with the Fixed Window Size ," Proceedings of the Tenth Conference National Defence Technology, Vol. 11, pp. 94-97, 2001-01. . .
  373. Chang, C. C., Chen, T. S. and Xiao, G. X.,"An Improved Prediction Method for Quadtree Image Coding ," Proceedings of International Symposium on Multimedia Software Engineering, pp. 269-275, 2000-12. . .
  374. Chang, C. C. and Lou, D. C.,"An Integration of User Authentication and Dynamic Access Control ," Proceedings of International Symposium on Consumer Electronics, pp. 123-127, 2000-12. . .
  375. Chang, C. C., Hsia, H. C. and Chen, T. S.,"Reliable Information Hiding for Printed Color Images ," Proceedings of International Symposium on Information Theory and Its Applications (ISITA 2000), pp. 97-100, 2000-11. . .
  376. Chang, C. C., Buehrer, D. J. and Lee, W. B.,"Method for Constructing a Generalized Group-Oriented Cryptosystem ," Proceedings of the First Workshop on Information Security Applications (WISA’2000), pp. 119-124, 2000-11. . .
  377. Chang, C. C., Yeh, J. C. and Hsiao, J. Y.,"A Method for Protecting Digital Images from Being Copied Illegally ," Proceedings of 2000 Kyoto International Conference on Digital Libraries: Research and Practice, pp. 348-355, 2000-11. . .
  378. Chang, C. C.,"A Perspective on the Development of Digital Libraries in Taiwan ," Proceedings of 2000 Kyoto International Conference on Digital Libraries: Research and Practice, pp. 44-46, 2000-11. . .
  379. Chang, C. C., Chen, T. S. and Lin. Y.,"An Efficient Accessing Technique of Chinese Characters Using Boshiamy Chinese Input System ," Proceedings of the International Workshop on Information Retrieval for Asian Languages (IRAL’2000), pp. 61-67, 2000-09. . .
  380. Chang, C. C. and Chan, Y. K.,"A Fast Filter of Image Retrieval Based on Color-Spatial Features ," Proceedings of the Second International Workshop on Software Engineering and Multimedia Applications, pp. 47-51, 2000-08. . .
  381. Chan, Y. K. and Chang, C. C.,"A Fast Filter of Spatial Video Retrieval ," Proceedings of the Second International Workshop on Software Engineering and Multimedia Applications, pp. 42-46, 2000-08. . .
  382. Chang, C. C. and Tsai, C. S.,"A Robust Intellectual Property Rights Protection Scheme for Digital Images ," Proceedings of the Second International Workshop on Software Engineering and Multimedia Applications, pp. 85-89, 2000-08. . .
  383. Chang, C. C. and Wu, H. C.,"Computing Watermarks from Images Using Quadtrees ," Proceedings of the Second International Workshop on Multimedia Network Systems, pp. 123-128, 2000-07. . .
  384. hang, C. C., Chen, T. S. and Tsai, C.S.,"A New Scheme for Sharing Secret Color Images in Computer Network ," Proceedings of International Conference on Parallel and Distributed Systems, pp. 21-27, 2000-07. . .
  385. Chang, C. C. and Wu, H. C.,"An Image Protection Scheme Based on Discrete Cosine Transformation ," Proceedings of the Second International Workshop on Software Engineering and Multimedia Applications, pp. 90-94, 2000-07. . .
  386. Lee, W. B. and Chang, C. C.,"On the Security of the Digital Signature Based on Factoring and Discrete Logarithm ," Proceedings of The Tenth National Conference on Information Security, pp. 8-12, 2000-05. . .
  387. Chang, C. C., Chen, T. S. and Lin, Y.,"An Efficient Edge Detection Scheme of Color Images ," Proceedings of the Fifth Joint Conference on Information Sciences, Vol. II, (invited plenary paper), pp. 448-455, 2000-02. . .
  388. Chang, C. C., Hwang, K. F. and Lin, Y.,"A Proof of Copyright Ownership Using Moment-preserving ," Proceedings of COMPSAC’2000, pp. 198-203, 2000-01. . .
  389. Chang, C. C. and Chan, C. W.,"Detecting Dealer Cheating in Secret Sharing Systems ," Proceedings of COMPSAC’2000, pp. 449-453, 2000-01. . .
  390. Hwang, M. S., Chang, C. C. and Lin, I. C.,"Security Enhancement for the Simple Authentication Key Agreement Algorithm ," Proceedings of COMPSAC’2000, pp. 113-115, 2000-01. . .
  391. Chan, Y. K and Chang, C. C.,"Image Retrieval Based on Tolerable Difference of Direction ," Proceedings of ICOIN-15, pp. 387-392, 2000-01. . .
  392. Hung, K. L., Chang, C. C. and Chen, T. S.,"A Side Match Reconstruction Method Using Tree-Structured VQ for Transmition Images Progressively ," Proceedings of the National Computer Symposium, pp. C-5--C-12, 1999-12. . .
  393. Hu, Y. C. and Chang, C. C.,"A Novel Two-Stage Lossless Image Compression Scheme ," Proceedings of Fifth Asia-Pacific Conference on Communications and Fourth Optoelectronics and Communications Conference (APCC/OECC '99), Vol. 2, pp. 944-947, 1999-10. China .
  394. Jiang, J. H., Chang, C. C. and Chen, T. S.,"A Efficient Huffman Decoding Method Based on Pattern Partition and Look-up Table ," Proceedings of the Fifth Asia-Pacific Conference on Communications and Fourth Opto-electronics and Communications Conference (APCC/OECC’99), pp. 904-907, 1999-10. . .
  395. Wu, Y. J. and Chang, C. C.,"National Founding Mechanism of Science and Technology Efucation Project in Taiwan ," Proceedings of 1999 International Conference on Engineering Education, pp. 2410, 1999-08. . .
  396. Lee, C. F. and Chang, C. C.,"A New Iconic Indexing Scheme for Similarity Retrieval of Complex Spatial Objects ," Proceedings of Joint Conference of the Third World Multiconference on Systemics, Cybernetics and Informatics (SCI’99) and the Fifth International Conference on Information Systems Analysis and Synthesis (ISAS’99), Vol. 6, pp. 109-114, 1999-07. . .
  397. Chang, C. C., Jau, C. C. and Chen, T. S.,"K-ary TSVQ: A New Improvement of Tree Structured Vector Quantization ," Proceedings of IASTED International Conference Modeling and Simulation (MS’99), pp. 235-239, 1999-05. . .
  398. Hwang, R. J. and Chang, C. C.,"Image Watermarking Using Visual Cryptograph ," Proceedings of the 9th Information Security Conference, ., 1999-05. . .
  399. Chang, C. C., Wang, C. H., Liou, F. Y., and Sun, H. M.,"Remarks on a Digital Signature Scheme Based on Error-Correcting Codes ," Proceedings of the 9th Information Security Conference, pp. 157-164, 1999-05. . .
  400. Chen, C. Y., Chang, C. C., and Yang, W. P.,"A New Subliminal Channel without Sharing a Secret Key ," Proceedings of the 9th Information Security Conference, pp. 237-240, 1999-05. . .
  401. Chen, C. Y. and Chang, C. C.,"A Fast Modular Multiplication Algorithm for Computing the Product AB Modulo N ," Proceedings of the 9th Information Security Conference, pp. 41-45, 1999-05. . .
  402. Chen, C. Y., Hwang, S. J., and Chang, C. C.,"New Multisignature Scheme Based on One-Way Functions ," Proceedings of the 4th Multimedia Technology and Applications Symposium, pp.332-240, 1999-04. . .
  403. Chang, C. C., Shiue, F. J. and Chen, T. S.,"Tree Structured Vector Quantization with Dynamic Path Search ," Proceedings of International Workshop on Multimedia Network Systems (MMNS), pp. 536-541, 1999-01. . .
  404. Chang, C. C., Shine, F. C. and Chen, T. S.,"A New Scheme of Progressive Image Transmission Based on Bit-Plane Method ," Proceedings of the Fifth Asia-Pacific Conference on Communications and Fourth Optoelectronics and Communications Conference (APCC/OECC 99’), Vol. 2, pp. 892895, 1999-01. . .
  405. Chang, C. C., Hwang, K. F. and Hwang, M. S.,"A Block Based Digital Watermarks for Copy Protection of Images ," Proceedings of the Fifth Asia-Pacific Conference on Communications and Fourth Optoelectronics and Communications Conference (APCC/OECC 99’), Vol. 2, pp. 977-980, 1999-01. . .
  406. Hu, Y. C. and Chang, C. C.,"A Novel Method of Designing Better TSVQ Codebooks ," Proceedings of the Fifth Asia-Pacific Conference on Communications and Fourth Optoelectronics and Communications Conference (APCC/OECC 99’), Vol. 1, pp. 747-750, 1999-01. . .
  407. Hu, Y. C. and Chang, C. C.,"A Progressive Codebook Training Algorithm for Image Vector Quantization ," Proceedings of the Fifth Asia-Pacific Conference on Communications and Fourth Optoelectronics and Communications Conference (APCC/OECC 99’), Vol. 2, pp. 936-939, 1999-01. . .
  408. Chen, C. Y., Lee, W. B. and Chang, C. C.,"A Software Key Escrow System Suitable for Broadcasting ," Proceedings of the 1998 ICS Workshop on Cryptology and Information Security, pp. 155-158, 1998-12. . .
  409. Chen, C. Y., Chang, C. C. and Yang, W. P.,"A New Multilevel Database Field Encryption and Authentication Cryptosystem ," Proceedings of the 1998 ICS Workshop on Cryptology and Information Security, pp. 29-35, 1998-12. . .
  410. Chang, C. C. and Hong, K. L.,"Signature- Based Chinese Character Retrieval Schemes Using DAYI Input Method ," Proceedings of the 1998 ICS Workshop on Software Engineering and Database System, pp. 109-114, 1998-12. . .
  411. Chan, Y. K. and Chang, C. C.,"An Efficient Data Structure for Storing Similar Binary Images ," Proceedings of 5th International Conference on Fundations of Data Organization, pp. 268-275, 1998-11. . .
  412. Shen, J. J. and Chang, C. C.,"A False-Drop-Free Spelling Check Technique of Mandarin Phonetic Transcriptions for Chinese Characters ," Proceedings of 1998 International Conference on Chinese Information Processing, pp. 398-405, 1998-11. . .
  413. Chang, C. C., Jau, C. C. and Chen, T. S.,"Chinese Calligraphy Compression Using New S-tree Structure ," Proceedings of 1998 International Conference on Chinese Information Processing, pp. 38-47, 1998-11. . .
  414. Chen, C. Y., Chang, C. C., and Yang, W. P.,"Cryptanalysis of the LUC Public Key Cryptosystem ," Proceedings of 8th Information Security Conference, pp. 49-58, 1998-05. . .
  415. Chen, C. Y., Chang, C. C., and Yang, W. P.,"Cryptoanalyzing the RSA-like Schemes by Using the Continue Fraction Method ," Proceedings of 8th Information Security Conference, pp. 81-90, 1998-05. . .
  416. Chen, T. S. and Chang, C. C.,,"A Simple and Efficient Method for LBG Codebook Initialization ," Proceedings of 1998 Conference on Computer Vision, Graphics, and Image Processing, pp. 44-47, 1998-01. . .
  417. hang, C. C. and Tsu, S. M.,"A Seal-Based Key Distribution Scheme ," Proceedings of National Computer Symposium 1997, pp.c120-c125, 1997-12. . .
  418. Chang, C. C. and Tsu, S. M.,"An Improvement on a Probabilistic Encryption Scheme ," Proceedings of National Computer Symposium 1997, pp.c132-c135, 1997-12. . .
  419. Wang, C. T., Lin, C. H., and Chang, C. C.,"Group-Oriented Threshold Signature Schemes with Traceable Signers ," Proceedings of National Computer Symposium 1997, pp.c114-c119, 1997-12. . .
  420. Chang, C. C., Sung, C. H. and Chen, T. S.,"A Locally Adaptive Scheme for Image Index Compression ," Proceedings of the 1997 Conference on Computer Vision, Grahpics, and Image Processing, pp. 93-99, 1997-08. . .
  421. Lee, W. B. and Chang, C. C.,"Using RSA with Low Exponent in a Public Network ," Proceedings of 7th Information Security Conference, pp.67-70, 1997-05. . .
  422. Lou, D. C. and Chang, C. C.,"Efficient Normal Basis Inversion in ," Proceedings of 7th Information Security Conference,, pp.55-58, 1997-05. . .
  423. Hwang, S. J., Chang, C. C., and Yang, W. P,"A Time-Stamped Password Authentication System ," Proceedings of 7th Information Security Conference, pp.165-169, 1997-05. . .
  424. Hwang, S. J., Chang, C. C., and Yang, W. P.,,"Improved Authentication Encryption Schemes ," Proceedings of 7th Information Security Conference,, pp. 209-212, 1997-05. . .
  425. Hwang, R. J. and Chang, C. C.,"The Security Analysis of Low-Computation Blind Signature Schemes Based on Quadratic Residues, ," Proceedings of the 1997 International Conference on Computer Systems Technology for Industrial Applications,, pp. 221-225, 1997-04. . .
  426. Chang, C. C. and Lee, C. F.,"Retrieving Chinese Characters Using DAYI Chinese Input Method ," Proceedings of 17th International Conference on Computer Processing of Oriental Languages, pp. 387-391, 1997-04. . .
  427. Chang, C. C., Lin, T. H. and Hwang, R. J.,"A Secure Group-oriented Secret Sharing Scheme ," Proceedings of the 1997 International Conference on Computer Systems Technology for Industrial Applications, pp. 214-220, 1997-04. . .
  428. Chang, C. C., Sung, C. H. and Chen T. S.,"A Locally Adaptive Scheme for Image Index Compression ," Proceedings of 1997 Conference on Computer Vision, Graphics, and Image Processing (CVGIP’97), pp. 92-99, 1997-01. Taiwan .
  429. Chen, C. Y., Chang, C. C. and Lee, R. C. T.,"A Temporal Join Algorithm Based on Rank Key-to-Address Transformation ," Proceedings of the International Conference on Distributed System, Software Engineering and Database Systems, pp. 169-176, 1996-12. . .
  430. Chen, C. Y., Chang, C. C. and Yang, W. P.,"Fast RSA-type Cryptoschemes Based on Pell Equations over Z*N ," Proceedings of the International Conference on Cryptology and Information Security, pp. 1-5, 1996-12. . .
  431. Hwang, S. J., Chang, C. C. and Yang, W. P.,"A Key Distribution Protocol for Mobile Communication Systems with Untrusted Centers ," Proceedings of the International Conference on Cryptology and Information Security, pp. 67-74, 1996-12. . .
  432. Chang, C. C. and Lee, T. F.,"A Generalized Non-redundant 2D String Representation for Symbolic Pictures ," Proceedings of the International Conference on Distributed System, Software Engineering and Database Systems, pp. 41-45, 1996-12. . .
  433. Chen, C. Y., Chang, C. C. and Yang, W. P.,"Cryptanalysis of Short Secret Exponent and Large Public Exponent of RSA ," Proceedings of the International Conference on Cryptology and Information Security, pp. 14-18, 1996-12. . .
  434. Hwang, T., Lee, N. Y. and Chang, C. C.,"On the Security of Chang et al.’s Cryptographic Key Assignment Scheme for Access Control in a Hierarchy ," Proceedings of the International Conference on Cryptology and Information Security, pp. 75-81, 1996-12. . .
  435. Chang, C. C. and Lin, C. H.,"How to Converse Securely in a Conference ," Proceedings of 30th Annual IEEE International Carnahan Conference on Security Technology, pp. 42-45, 1996-10. . .
  436. Lee, W. B. and Chang, C. C.,"On Two Identity-Based Schemes in Computer Networks ," roceedings of the Second Symposium on Computer and Communication Technology, pp. 57-61, 1996-10. . .
  437. Chang, C. C. and Leu, J. J.,"A New Digital Multisignature with Message Recovery Scheme ," Proceedings of the Second Symposium on Computer and Communication Technology, pp. 231-237, 1996-10. . .
  438. Chang, C. C., Sung, C. H., and Chen, T. S.,"An Improved Scheme for Locally Adaptive Data Compression Using Multilist Structure ," Proceedings of the Second Symposium on Computer and Communication Technology, pp. 26-33, 1996-10. . .
  439. Chen, C. Y., Chang, C. C., Lee, R. C. T. and Lin, D. C.,"Optimal Linear Hashing Files for Orthogonal Range Retrieval ," Proceedings of 20th International Conference on Computer Software and Applications, pp. 406-413, 1996-08. . .
  440. Chang, C. C., Kuo, C. L., and Chen, T. S.,"A Closest-Paired Tree-Structured Codeword Search Metho ," Proceedings of the 1996 Conference on Computer Vision, Graphics, and Image Processing, pp. 70-76, 1996-08. . .
  441. Chang, C. C., Chou, J. S., and Chen, T. S.,"A Fast Method for Estimating the Euclidean Distance between an Image Block and a Codeword ," Proceedings of the 1996 Conference on Computer Vision, Graphics, and Image Processing, pp. 321-327, 1996-08. . .
  442. Chen, T. S. and Chang, C. C.,"A Fast Nearest Search Algorithm for Vector Quantization Based on Principlal Component Directions ," Proceedings of 13th Workshop on Combinatorial Mathematics and Computation Theory, pp. 59-66, 1996-07. . .
  443. han, Y. K. and Chang, C. C.,"Image Retrieval by String-Mapping ," Proceedings of the International Symposium on Combinatorics and Applications, pp. 65-76, 1996-06. . .
  444. Lee, W.B. and Chang, C. C.,"A New Cryptographic Solution for Dynamic Access Control in a Hierarchy ," Proceedings of 6th Conference on Information Security, pp. 124-127, 1996-05. . .
  445. Chang, C. C., Hwang, S. J., and Hwang, R. J.,"A Digitized Signature Linkage Scheme ," Proceedings of 6th Conference on Information Security, pp. 48-54, 1996-05. . .
  446. A Virtual Image Cryptosystem Using Vector Quantization,"Chen, T. S., Chang, C. C., and Hwang, M. S. ," Proceedings of 6th Conference on Information Security, pp. 10-16, 1996-05. . .
  447. Chen, C. Y., Chang, C. C., and Yang, W. P.,"Cryptanalysis of a Key Sharing System for Global Telecommunications ," Proceedings of 6th Conference on Information Security, pp. 224-227, 1996-05. . .
  448. Chang, C. C. and Lin, D. C.,"A Fast and Flexible Algorithm to Retrieve Similar Chinese Characters ," Proceedings of the International Conference on Computer Processing of Oriental Languages, pp. 279-285, 1995-11. . .
  449. Lee, W. B. and Chang, C. C.,"Authenticate Yourself by Login a Remote Password ," Proceedings of the Cryptography-Policy and Algorithms Conference, pp. 149-162, 1995-07. . .
  450. Chen, C. Y., Chang, C. C. and Yang, W. P.,"A λ(p-1) Method of Factoring RSA’s Modulous ," Proceedings of the Cryptography-Policy and Algorithms Conference, pp. 225-231, 1995-07. . .
  451. Chang, C. C., Buehrer, D. J., and Hwang, S. J.,"A Simple Secret Key Distribution System ," Proceedings of 5th Conference on Information Security, pp. 125-128, 1995-05. . .
  452. Chang, C. C. and Wu, T. C.,"A Group-Oriented Secure Broadcasting Protocol in Computer Networks ," Proceedings of 5th Conference on Information Security, pp. 144-146, 1995-05. . .
  453. Chen, C. Y., Chang, C. C., and Yang, W. P.,"An Improved Multistage Sharing Scheme ," Proceedings of 5th Conference on Information Security, pp. 142-143, 1995-05. . .
  454. Chang, C. C., Horng, W. J., and Hwang, S. J.,"A New Evaluating Scheme for Cascade Exponentiation ," Proceedings of 5th Conference on Information Security, pp. 165-175, 1995-05. . .
  455. Chou, A. Y. H., Chang, C. C., and Yang, W. P.,"A Very Fast Algorithm for Designing Nearly Optimal Cartesian Product Files ," Proceedings of 12th Workshop on Combinatorial Mathematics and Computation Theory, pp. 52-59, 1995-01. . .
  456. Chen, C. Y., Chang, C. C. and Yang, W. P.,"New Signature with Message Recovery Against Forgery ," roceedings of International Computer Symposium 1994, pp. 293-296, 1994-12. . .
  457. Hwang, S. J., Chang, C. C. and Yang, W. P.,"A New Verification Mechanism on the Server-Aided Secret Computation Protocols for the Modular Exponentiation ," Proceedings of International Computer Symposium 1994, pp. 445-450, 1994-12. . .
  458. Chang, C. C. and Jiang, J. H.,"A Fast Spatial Match Retrieval Using a Superimposed Coding Technique ," Proceedings of the International Symposium on Advanced Database Technologies and Their Integration, p. 71-78, 1994-10. . .
  459. Chen, C. Y., Chang, C. C. and Lee, R. C. T.,"A Line Segment Intersection Based Temporal Join ," Proceedings of the International Symposium on Advanced Database Technologies and Their Integration, pp. 183-187, 1994-10. . .
  460. Chang, C. C.,"A Fast Retrieving Algorithm for Similar Chinese Characters, ," Proceedings of 1994 International Conference on Computer Processing of Oriental Languages, pp. 407-411, 1994-05. . .
  461. Chang, C. C., Hwang, R. J., and Jan, J. K.,"An Improvement to Single-Key Access Control Scheme ," Proceedings of 4th Conference on Information Security, pp. 81-87, 1994-05. . .
  462. Chang, C. C. and Lee, W. B.,"A Conference Key Distribution System Based on Triangles ," Proceedings of 4th Conference on Information Security, pp. 121-128, 1994-05. . .
  463. Chang, C. C. and Wu, T. C.,"Interactive Remote Login Authentication Scheme with Smart Cards ," Proceedings of 4th Conference on Information Security, pp. 151-156, 1994-05. . .
  464. Lin, C. H. and Chang, C. C.,"A Server-Aided Computation Protocol for RSA Enciphering Algorithm ," Proceedings of NCS 1993, pp. 547-552, 1993-12. . .
  465. Tsai, H. M., Kuo, S. Y., Lei, C. L., and Chang, C. C.,"A Dynamic Cryptographic Key Assignment Scheme in a Tree Hierarchy for Access Contro ," Proceedings of NCS 1993, pp.553-559, 1993-12. . .
  466. Chang, C. C., Hwang, R. J. and Buehrer, D. J.,"Using Smart Card to Authenticate Passwords ," Proceedings of 27th Annual IEEE International Carnahan Conference on Security Technology, pp. 19-21, 1993-10. . .
  467. Chang, C. C. and Wu, T. C.,"Authenticating Passwords with Smart Cards ," Proceedings of Information Science’93, pp. 559-564, 1993-10. 。 .
  468. Chang, C. C., Jiang, J. H. and Shen, J. J.,"Organization of Pictorial Databases for Spatial Match Retrieval ," Proceedings of International Symposium on Next Generation Database Systems and Their Applications, pp. 205-210, 1993-09. . .
  469. Chou, A. Y. H., Chang, C. C., and Yang, W. P.,"Symbolic Indexing by N-strings ," Proceedings of the 1993 Conference on Computer Vision, Graphics and Image Processing, ., 1993-08. . .
  470. Chang, C. C. and Lee, W. B.,"Cryptanalysis of a Password Authentication Scheme Based on Triangles ," Proceedings of the Third Conference on Information Security, pp. C.2-4.1~C.2-4.5, 1993-05. . .
  471. Wu, T. C., Chang, C. C., and Yeh, Y. S.,"A Scheme for Holding Secure Electronic Conferences in Computer Networks ," Proceedings of the Third Conference on Information Security, pp. A.1-4.1~A.1-4.9, 1993-05. . .
  472. Chang, C. C. and Buehrer, D. J.,"Transmitting Multiple Secrets Securely in Broadcasting Networks ," Proceedings of 27th Annual IEEE International Carnahan Conference on Security Technology, pp. 19-21, 1993-01. . .
  473. Chang, C. C., Hwang, R. J. and Wu, T. C.,"A Cryptographic Key Management Scheme for Access Control in a Tree Structure ," Proceedings of ICS 1992, pp. 174-178, 1992-12. . .
  474. Wu, H. C. and Chang, C. C.,"A Fast Chinese Words Accessing Scheme ," Proceedings of 3rd International Conference in Chinese Information Processing, pp. 13-19, 1992-10. . .
  475. Chang, C. C., Hsieh, C. C. and Lu, Y. L.,"A Doubly Modular Hashing Scheme for Letter-oriented Keywords ," Proceedings of SEARCC’92, pp. 51.01-51.15, 1992-08. . .
  476. Chang, C. C. and Buehrer, D. J.,"A Database Sharing Scheme Based upon Galois Field Algebra ," Proceedings of SEARCC’92, pp. 52.08-52.14, 1992-08. . .
  477. Chang, C. C., Wu, T. C. and Yeh, Y. S.,"On the Design of Image Databases for Concurrent Spatial Match Retrieval ," Proceedings of International Conference on Microwaves and Communications, pp. 216-221, 1992-07. . .
  478. Chang, C. C. and Hwang, S. M.,"A Password Authentication Scheme Based upon Diffie and Hellman's Public Key System ," Proceedings of the Second Conference on Information Security, pp. 85-104, 1992-05. . .
  479. Lin, C. H., Chang, C. C., and Lee, R. C. T.,"An Interactive Message Authentication Scheme ," Proceedings of the Secon Conference on Information Security, pp. 105-120, 1992-05. . .
  480. Jan, J. K., and Chang, C. C.,"On the Unification to Minimal Perfect Hashing, Access Control and User Hierarchy ," Proceedings of the Second Conference on Information Security, pp. 57-84, 1992-05. . .
  481. Chang, C. C. and Hwang, S. J.,"Sharing a Dynamic Secret ," Proceedings of the International Phoenix Conference on Computers and Communications, pp. 267-271, 1992-01. . .
  482. Chang, C. C., Hwang, R. J. and Hwang, S. J.,"The Study of a Data Compression Scheme for English - Chinese Dictionaries, ," Proceedings of 3rd International Conference on Chinese Information Processing, pp. 142-151, 1992-01. . .
  483. Chang, C. C. and Lee, H. C.,"A Generalized Group Oriented Cryptosystem ," Proceedings of NCS 1991, pp. 367-371, 1991-12. . .
  484. Yeh, Y. S., Wu, T. C. and Chang, C. C.,"A New Cryptosystem Using Matrix Transformation ," Proceedings of IEEE International Canahan Conference on Security Technolog, pp. 131-138, 1991-10. . .
  485. Yeh, Y. S., Wu, T. C. and Chang, C. C.,"A Private Key Cryptosystem Based upon Enforced Random Substitution ," Proceedings of IEEE International Canahan Conference on Security Technology, pp. 319-324, 1991-10. . .
  486. Chang, C. C. and Hwang, S. J.,"Cryptographic Authentication of Passwords ," Proceedings of IEEE International Canahan Conference on Security Technology, pp. 126-130, 1991-10. , .
  487. Chang, C. C. and Lin, C. H.,"An ID-Based Signature Scheme Based upon Rabin’s Public Key Cryptosystem ," Proceedings of IEEE International Canahan Conference on Security Technology, pp. 139-141, 1991-10. . .
  488. Chang, C. C. and Hwang, R. J.,"A Strategy to Transform Public Key Cryptosystems to ID-Based Public Key Cryptosystems ," Proceedings of IEEE International Canahan Conference on Security Technology, pp. 68-72, 1991-10. . .
  489. Chang, C. C.,"Current Status and Needs of Computer Systems Security ," Proceedings of 1991 Academic Researches in SEED Project, pp. 15-1~15-13, 1991-10. . .
  490. Chang, C. C.,"Recent Developments of Access Control Techniques ," Proceedings of the Second International Conference on Computing in Southern Africa, pp. 129-136, 1991-04. . .
  491. Chang, C. C., Jan, J. K. and Chen, D. C.,"A Coding Scheme Based upon Modified Arithmetic Codes Suitable for Binary Search ," Proceedings of the Second International Conference on Computing in Southern Africa, pp. 59-68, 1991-04. . .
  492. Buehrer, D. J. and Chang, C. C.,"A Cryptographic Mechanism for Sharing Databases ," Proceedings of International Conference on Information & Systems, pp. 1039-1045, 1991-01. . .
  493. Buehrer, D. J. and Chang, C. C.,"An O(N*M*T) Spatial Match Retrieval Algorithm ," Proceedings of the ICS 1990, pp. 152-158, 1990-12. . .
  494. Chang, C. C. and Wu, T. C.,"A Binary Implementation of Single-Key-Lock Scheme for Dynamic Access Control ," Proceedings of the ICS 1990, pp. 321-327, 1990-12. . .
  495. Chang, C. C.,"Recent Developments of Password Authentication Techniques ," Proceedings of the First Conference on Information Security, pp. 1-24, 1990-12. . .
  496. Chang, C. C. and Wu, L. H.,"A Password Authentication Scheme Based upon Rabin’s Public-key Cryptosystem ," Proceedings of International Conference on Systems Management’90, pp. 425-429, 1990-06. . .
  497. Liang, J., Chang, C. C., Lee, R. C. T. and Wang, J. H.,"Solving the File Design Problem with Neural Networks ," Proceedings of IEEE 10th International Phoenix Conference on Computers and Communications, pp. 52-59, 1990-03. . .
  498. Chang, C. C. and Wu, T. C.,"A Password Authentication Scheme without Verification Tables ," Proceedings of International Symposium on Applied Informatics, pp. 202-204, 1990-02. . .
  499. Chang, C. C. and Wu, T. C.,"The Study of an Irregular Triangular Mesh Generator ," Proceedings of International Symposium on Applied Informatics, pp. 228-233, 1990-02. . .
  500. Chen, C. Y., Chang, C. C. and Lee, R. C. T.,"Some File Organizations by the MMI Method for Orthogonal Range Retrieval ," Proceedings of International Symposium on Applied Informatics, pp. 337-341, 1990-02. . .
  501. Chang, C. C. and Shieh, J. C.,"Pairwise Relatively Prime Generating Polynomials and Their Applications ," Proceedings of International Workshop on Discrete Algorithms and Complexity, pp. 137-140, 1989-11. . .
  502. Chang, C. C. and Chang, C. H.,"A Single Key User Hierarchic Representation Mechanism ," Proceedings of International Workshop on Discrete Algorithms and Complexity, pp. 145-148, 1989-11. . .
  503. Chang, C. C. and Leu, D. F.,"Multi-key Sorting as a File Organization Scheme when Queries Are Not Equally Likely, ," Proceedings of International Symposium on Database Systems for Advanced Application, pp. 263-270, 1989-09. 。 .
  504. Jan, J. K. and Chang, C. C.,"Toward the Compression of Chinese Phonetic Textual Files ," Proceedings of 1989 International Conference on Computer Processing of Chinese and Oriental Languages, pp. 393-397, 1989-01. . .
  505. Chang, C. C., Chow, L. C. and Shen, S. D.,"VICE-FORTRAN: A Visual Chinese Form Translator ," Proceedings of 1989 International Conference on Computer Processing of Chinese and Oriental Languages, pp. 405-411, 1989-01. . .
  506. Chang, C. C. and Chang, C. H.,"An Access Control Mechanism with Single Key ," Proceedings of International Symposium on Mini and Microcomputers, pp. 181-183, 1988-12. . .
  507. Chang, C. C. and Lin, C. H.,"An Information Secure Broadcasting Scheme Based upon Galois Field Algebra ," Proceedings of International Symposium on Mini and Microcomputers, pp. 184-186, 1988-12. . .
  508. Liang, J., Chang, C. C. and Lee, R. C. T.,"On the Design of Multiple Key Hashing Files for Orthogonal Range Retrieval, ," Proceedings of International Computer Science Conference 1988, pp. 434-438, 1988-12. . .
  509. Chang, C. C., Jan, J. K. and Hsiao, J. Y.,"A Pattern Matching Mechanism Based upon Predictive Functions ," Proceedings of International Computer Science Conference 1988, pp. 522-526, 1988-12. . .
  510. Wu, T. C. and Chang, C. C.,"An Authentication Scheme in Computer Networks Based upon Euclidean Geometry ," Proceedings of the ICS 1988, pp. 1498-1502, 1988-12. . .
  511. Lin, H. F., Hu, C. Y., Chang, C. C. and Chen, C. Y.,"Sharing a Secret Using RSA Cryptosystem ," Proceedings of the ICS 1988, pp. 1490-1493, 1988-12. . .
  512. Chen, C. Y. and Chang, C. C.,"On the Design of Bucket Address Hashing Files for Concurrent Information Retrieval Among Two Disks ," Proceedings of the ICS 1988, pp. 89-93, 1988-12. . .
  513. Chang, C. C., Chen, C. Y. and Chan, C. W.,"On the Attribute Based Domains Design Problem for Orthogonal Range Retrieval ," Proceedings of the ICS 1988, pp. 1233-1238, 1988-12. . .
  514. Chang, C. C. and Shen, S. D.,"FORMOSA: A Chinese Visual Programming Language ," Proceedings of 1988 International Conference on Computer Processing of Chinese and Oriental Languages, pp. 275-279, 1988-08. . .
  515. Shen, S. D., Wang, C. T. and Chang, C. C.,"On the Design of a Structure Assembly Language Tutor in Chinese ," Proceedings of 1988 International Conference on Computer Processing of Chinese and Oriental Languages, pp. 600-607, 1988-08. . .
  516. Chang, C. C., Jan, J. K. and Hsiao, J. Y.,"Near-Matching-Patterns in Chinese Textual Files ," Proceedings of 1988 International Conference on Computer Proceedings of Chinese and Oriental Languages, pp. 382-386, 1988-08. . .
  517. Chang, C. C. and Chen, C. H.,"The Study of Missing Data Problem and Data Integrity Problem ," Proceedings of NCS 1987, pp. 254-262, 1987-12. . .
  518. Chang, C. C. and Chang, C. H.,"A Dynamic Access Control Scheme Based upon Chinese Remainder Theorem ," Proceedings of NCS 1987, pp. 304-311, 1987-12. . .
  519. Chang, C. C. and Chen, C. Y.,"A Performance Note on Multi-disk Binary Cartesian Product File Allocation Methods ," Proceedings of the NCS 1987, pp. 247-253, 1987-12. . .
  520. Chang, C. C. and Cheng, W, Y.,"The Study of User-Hierarchy Mechanism for Computer System Resources ," Proceedings of NCS 1987, pp. 312-318, 1987-12. . .
  521. Chang, C. C., Hsiao, J. Y., and Chen, C. Y.,"Strings Near-matching Techniques for Large Textual Files ," Proceedings of NCS 1987, pp. 825-830, 1987-12. . .
  522. Chang, C. C.,"On the Implementation of User Hierarchy Structure in Information Systems ," Proceedings of International Conference on Computer Software and Applications, IEEE, pp. 412-415, 1987-10. . .
  523. Symbolic Solutions for Linear Difference Equations,"Chang, C. C. and Hung, M. F. ," Proceedings of 6th Workshop on Computer System Technology, pp. 1033-1060, 1987-08. . .
  524. Chang, C. C. and Hung, M. F.,"An Access Control Mechanism for Information Protection System ," Proceedings of the ICS 1986, pp. 754-757, 1986-12. . .
  525. Chang, C. C.,"Optimal Cartesian Product File Systems when the Bucket Size is a Power of Prime ," Proceedings of the ICS 1986, pp. 763-769, 1986-12. . .
  526. Chang, C. C. and Chang, C. H.,"Single-Parametered Reciprocal Hashing Scheme ," Proceedings of the ICS 1986, ., 1986-12. . .
  527. Chang, C. C. and Chen, C. Y.,"Lower Bounds of Using Disk Modulo Allocation Method to Allocate Cartesian Product Files in a Two-Disk System ," Proceedings of the ICS 1986, pp. 770-774, 1986-12. . .
  528. Chang, C. C., Hsiao, M. D. and Lin, C. H.,"Algorithms to Allocate a File for Concurrent Disk Accessing ," Proceedings of 6th Advanced Database System Symposium, pp. 201-205, 1986-08. . .
  529. Chang, C. C. and Tsai, W. H.,"An Algorithm to Allocate a File on Multiple Disk System for Concurrent Retrieval ," Proceedings of 6th Workshop on Computer System Technology, pp. 603-625, 1986-08. . .
  530. Fang, M. T., Lee, R. C. T. and Chang, C. C.,"The Idea of De-Clustering and Its Applications ," Proceedings of 12th International Conference on Very Large Data Bases, pp. 181-188, 1986-08. . .
  531. Chang, C. C. and Lin, C. H.,"On the Difficulty of Construction Perfect Hashing Functions ," Proceedings of 1986 IEEE International Symposium on Information Theory, ., 1986-06. . .
  532. Chang, C. C. and Shieh, J. C,"On the Design of Ordered Minimal Perfect Hashing Functions ," Proceedings of 2nd International Conference on Data Engineering, IEEE, pp. 112-115, 1986-02. . .
  533. Chang, C. C. and Liang, J.,"Partially Specified K-Nearest Neighbor Search Using Multiple Key Hashing Functions ," Proceedings of NCS 1985, pp. 448-454, 1985-12. . .
  534. Chang, C. C. and Yuan, S. T.,"A Parallel Scheme of the Closest Pair Problem and All Closest Points Problem for VLSI Systems ," Proceedings of NCS 1985, pp. 255-268, 1985-12. . .
  535. Chang, C. C. and Lee, Y. P.,"A Letter Oriented Minimal Perfect Rehashing Scheme Based upon Reciprocal Hashing ," Proceedings of NCS 1985, pp. 472-482, 1985-12. . .
  536. Chang, C. C. and Yuan, S. T.,"A Parallel Algorithm to Solve All Shortest Pairs Problem ," Proceedings of NCS 1985, pp. 455-467, 1985-12. . .
  537. Chang, C. C. and Lu, Y. L.,"The Complexity of Multi-disk Data Allocation Problem ," Proceedings of NCS 1985, pp. 468-471, 1985-12. . .
  538. Chang, C. C. and Chen, H. Y.,"Toward the Estimation of Response Times for Random Files: A Closed Noniterative Performance Formula ," Proceedings of NCS 1985, pp. 835-842, 1985-12. . .
  539. Chang, C. C. and Hsiao, M. D.,"Short Spanning Path as a File Allocation Scheme for Concurrent Disk Accessing ," Proceedings of NCS 1985, pp. 269-283, 1985-12. . .
  540. Chang, C. C. and Lin, C. H.,"A Fast Algorithm for Nearest Neighbor Search ," Proceedings of NCS 1985, pp. 625-643, 1985-12. . .
  541. Chang, C. C. and Shieh, J. C.,"A Fast Algorithm for Constructing Reciprocal Hashing Functions ," Proceedings of International Symposium on New Directions in Computing, IEEE, pp. 232-236, 1985-08. Norway .
  542. Chang, C. C. and Chen, C. P.,"The User-Hierarchy Structure in Information Protection System ," IMC's 1985 Asia-pacific Regional Information & Micrographic Management Congress, pp. 441-449, 1985-07. . .
  543. Chang, C. C.,"Data Base Research and Development in Taiwan ," Proceedings of the International Conference on Foundations of Data Organization,, pp. 413-414, 1985-05. Japan .
  544. Chang, C. C.,"Optimal Partial Match Retrieval when the Number of Buckets is a Power of Prime ," Proceedings of the ICS 1984, pp. 807-813, 1984-12. Taiwan .
  545. hang, C. C. and Su, D. H.,"Optimal Attribute Length Assignment when Attributes are Independently Specified ," Proceedings of the ICS 1984, pp. 814-820, 1984-12. Taiwan .
  546. Chang, C. C. and Su, D. H.,"Application of a Heuristic Algorithm to Design Multiple Key Hashing Functions ," Proceedings of NCS 1983, pp. 205-209, 1983-12. . .
  547. Chang, C. C.,"Minimal Perfect Hashing Scheme Based upon Chinese Remainder Theorem ," Proceedings of NCS 1983, pp. 225-231, 1983-12. . .
  548. Chang, C. C. and Su, D. H.,"Some Properties of Multi-Attribute File Systems Based upon Multiple Key Hashing Functions ," Proceedings of 21th Allerton Conference on Communication, Control and Computing, pp. 675-682, 1983-10. U.S.A. .
  549. Chang, C. C.,"A Survey of Multi-key File Design ," Proceedings of the First Conference on Computer Algorithms, pp. 3-1-3-62, 1982-07. . .
  550. Chang, C. C., Lee, R. C. T. and Du, H. C.,"Some Properties of Cartesian Product Files ," Proceedings of the ACM SIGMOD 1980 Conference, 157-168, 1980-05. Calif. .
  551. Chang, C. C. and Lee, R. C. T.,"Optimal Cartesian Product Files for Partial Match Queries and Partial Match Patterns ," Proceedings of NCS 1979, pp. 5-27-5-37, 1979-12. . .
  1. Wang, K., Li, L., Luo, T. and Chang, C. C./Deep Neural Network Watermarking Based on Texture Analysis/Artificial Intelligence and Security/ Springer Nature Singapore Pte Ltd./2020-08-01/./None
  2. Li, L., Li, Y., Wang, B., Lu, J.*, Zhang, S., Yuan, W., Wang, S. and Chang, C. C./A New Aesthetic QR Code Algorithm Based on Salient Region Detection and SPBVM/Security with Intelligent Computing and Big-data Services/ Springer/2018-08-01/pp. 20-32/
  3. Liu, L.*, Wang, A. H., Chang, C. C. and Li, Z. H./A Novel Secret Image Sharing with Deep-steganography and Two-stage Authentication/Progress on Cryptography: 20 Year of Cryptography in Taiwan (C. H. Lin, W. B. Lee and I. C. Lin Eds.)/ McGraw-Hill, New York/2014-11-01/pp. 259-271/
  4. Zhuang, X.*, Zhu, Y., Chang, C. C. and Peng, Q./Cryptanalysis of T-function Based Ultralightweight RFID Authentication Protocols/Progress on Cryptography: 20 Year of Cryptography in Taiwan (C. H. Lin, W. B. Lee and I. C. Lin Eds.)/ McGraw-Hill, New York/2014-11-01/pp. 397-412/
  5. Li, J. J., Di, Y. F., Wang, Z. H.* and Chang, C. C/Progressive Secret Image Sharing with Meaningful Shadows/Progress on Cryptography: 20 Year of Cryptography in Taiwan (C. H. Lin, W. B. Lee and I. C. Lin Eds.)/ McGraw-Hill, New York/2014-11-01/pp. 327-344/
  6. Chang, C. C.*, Yang, B. C. and Cheng, T. F./Perfectly Reversible Information Hiding in Data Compression Codes Using Locally Adaptive Coding/Progress on Cryptography: 20 Year of Cryptography in Taiwan (C. H. Lin, W. B. Lee and I. C. Lin Eds.)/ McGraw-Hill, New York/2014-11-01/pp. 141-154/
  7. Wang, M., Lu, J., Qiu, J., Li, L. and Chang, C. C.*/A Zero-Watermarking Scheme Based on Invariant Moments for Medical Image/Progress on Cryptography: 20 Year of Cryptography in Taiwan (C. H. Lin, W. B. Lee and I. C. Lin Eds.)/ McGraw-Hill, New York/2014-11-01/pp. 227-235/
  8. Wang, X. T., Wang, Z. H., Chang, C. C. and Li, M. C./Lossless Data Hiding Based on VQ/Steganography and Watermarking, (Yang, C. N., Lin, C. C. and Chang, C. C. Eds.)/ Nova Science Publishers, Inc. New York, U. S. A./2013-05-01/Chapter 4, pp. 77-95/
  9. Qin, C., Chang, C. C. and Lin, T. Y./Steganography in Script Files/Steganography and Watermarking, (Yang, C. N., Lin, C. C. and Chang, C. C. Eds.)/ Nova Science Publishers, Inc. New York, U. S. A./2013-05-01/Chapter 7, pp. 163-177/
  10. Yue, S., Wang, Z. H. and Chang, C. C.*/An Image Data Hiding Scheme Base on Vector Quantization and Graph Coloring/Recent Advances in Information Hiding and Applications, (Pan, J. S., Huang, H. C., Jain, L. C. and Zhao, Y. Eds.)/ Springer Verlag, Germany/2013-01-01/pp. 1-17/
  11. Cui, S. Y., Wang, Z. H., Tsai, P. W., Chang, C. C.* and Yue, S./Single Bitmap Block Truncation Coding of Color Images Using Cat Swarm Optimization/Recent Advances in Information Hiding and Applications, (Pan, J. S., Huang, H. C., Jain, L. C. and Zhao, Y. Eds.)/ Springer Verlag, Germany/2013-01-01/pp. 119-138/
  12. Wang, Z. H., Sun, M. T. and Chang, C. C/Reversible Data Hiding Techniques for Digital Images/Multimedia Security and Steganography/ CRC Press, USA/2012-09-01/Chapter 7, pp. 115-139/None
  13. Chang, C. C., Mao, Q. and Wu, H. L./A Novel Authentication Scheme Based on Torus Automorphism for Smart Card/Advances in Intelligent Systems and Applications, Vol. 2--Proc. 2012 International Computer Symposium (ICS 2012) (J. S. Pan, C. Y. Yang and C. C. Lin Eds.)/ Springer/2012-09-01/pp. 53-60/
  14. Yin, Z. X., Lin, C. C. and Chang, C. C./Image Sharing with Steganography and Authentication/Visual Cryptography and Secret Image Sharing (S. Climato and C. N. Yang Eds.)/ CRC Press, USA/2012-03-01/ Chapter 16, pp. 425-461/
  15. Yu, F., Chang, C. C., Chen, W., Zhang, J. and Yue, G./Journal of Networks, Special Issue on Recent Adv. in Info. Processing & Intelligent Info. Sys. App./Journal of Networks (Yu, F., Chang, C. C., Chen, W., Zhang, J. and Yue, G.)/ IEEE CS/2010-06-01/Vol. 5, No. 6/(ISSN : 1796-2056)
  16. Yu, F., Chang, C. C. Shu, J. Liao, g. and Yue, G./Journal of Software, Special Issue on Recent Adv. in Info. Processing & Intelligent Info. Sys. App./Journal of Software, Special Issue on Recent Adv. in Info. Processing & Intelligent Info. Sys. App. (Yu, F., Chang, C. C. Shu, J. Liao, g. and Yue, G.)/ IEEE CS/2010-05-01/Vol. 5, No. 5/(ISSN: 1796-217X)
  17. Yu, F., Chang, C. C., Yue, G., Zeng, J. and Chen, W./Journal of Computers, Special Issue on Recent Adv. in Info. Processing & Intelligent Info. Sys. App./Journal of Computers (Yu, F., Chang, C. C., Yue, G., Zeng, J. and Chen, W.)/ IEEE CS/2010-04-01/Vol. 5, NO. 4/(ISSN : 1796-203X)
  18. Chang, C. C., Tai, W. L. and Lin, C. C./Minimizing the Stego-Image Quality Impact of Message Embedding Using DM Allocation Method/Ubiquitous Multimedia Computing (Li, Q. and Shih, T.)/ Chapman and Hall/2010-01-01/pp. 215-230/None
  19. Chang, C. C., Lin, C. C. and Chen, Y. H./A Secure Data Embedding Scheme Using Gray-code Computation and SMVQ Encoding/Information Hiding and Application, (Pan, J. S., Huang, H. C. and Jain, L. C. Eds.)/ Springer Verlag/2009-09-01/pp. 63-74/None
  20. Chou, Y. C. and Chang, C. C./Restoring Objects for Digital Inpainting/Information Hiding and Applications, (Pan, J. S., Huang, H. C. and Jain, L. C. Eds.)/ Springer Verlag/2009-09-01/pp. 47-61/None
  21. Yu, F., Chang, C.C., Zhang, D.Y., Zeng, J., Zhang, J./Journal of Multimedia/Journal of Multimedia (Yu, F., Chang, C. C., Zhang, D. Y., Zeng, J., Zhang, J.)/ IEEE CS/2009-06-01/Vol. 4, No. 3/(ISSN: 1796-2048)
  22. Shu, J., Yu, F., Chang, C. C., Sun, L., Yue, G./Journal of Networks/Journal of Networks (Shu, J., Yu, F., Chang, C. C., Sun, L., Yue, G.)/ IEEE CS/2009-06-01/Vol. 4, No. 4/(ISSN: 1796-2056)
  23. Ming, L., Wang, M., Zhang, D.Y., Chang, C.C., Yu, F./Journal of Computers/Journal of Computers (Ming, L., Wang, M., Zhang, D. Y., Chang, C. C., Yu, F.)/ IEEE CS/2009-06-01/Vol. 4, No. 6/(ISSN: 1796-203X)
  24. Yu, F., Chang, C. C., Chen, B. M., Zhang, J., Yue, G./Journal of Software/Journal of Software (Yu, F., Chang, C. C., Chen, B. M., Zhang, J. and Yue, G.)/ IEEE CS/2009-02-01/Vol. 4, No. 1/(ISSN: 1796-217X)
  25. Lee, J.S. and Chang, C.C./Recent Developments on Multimedia Security Technologies/資通安全專論彙編之一,國家實驗研究院科技政策研究與資訊中心/ National Applied Research Laboratories, NARLabs/2009-01-01/pp. 1-38/None
  26. Yu, F., Chang, C. C., Chen, B. M., Shu, J., Yue, G./Journal of Computers, Special Issue on Recent Advances in Information Technology and security/Journal of Computers, Special Issue on Recent Advances in Information Technology and security (Yu, F., Chang, C. C., Chen, B. M., Shu, J. and Yue, G.)/ IEEE CS/2009-01-01/Vol. 4, No. 1/(ISSN : 1796-203X)
  27. Pan, J. S., Abraham, A. and Chang, C. C./Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications/Proceedings of ISDA 2008 (Pan, J. S., Abraham, A. and Chang, C. C.)/ IEEE CS/2008-11-01/Vol. I ~ Vol. III/(ISBN: 978-0-7695-3382-7)
  28. Yu, F., Chang, C. C., Chen, B. M., Chen, W., Chen, Y./Journal of Communications/(Yu, F., Chang, C. C., Chen, B. M., Chen, W. and Chen, Y.)/ IEEE CS/2008-11-01/Vol. 3, No. 6/(ISSN: 1796-2021)
  29. Chen, W., Yu, F., Chang, C. C., Zeng, J. and Yue, G./Journal of Communications/Journal of Communications (Chen, W., Yu, F., Chang, C. C., Zeng, J. and Yue, G.)/ IEEE CS/2008-11-01/Vol. 3., No. 7/(ISSN: 1796-2021)
  30. Yu, F., Chang, C. C., Chen, B. M., Chen, Z., Ni, J./Journal of Computers/Journal of Computers (Yu, F., Chang, C. C., Chen, B. M., Chen, Z. and Ni, J.)/ IEEE CS/2008-11-01/Vol. 3, No. 12/(ISSN: 1796-203X)
  31. Yu, F., Chang, C. C., Chen, B. M., Chen, Y., Chen, Z./Journal of Software/Journal of Software (Yu, F., Chang, C. C., Chen, B. M., Chen, Y. and Chen, Z.)/ IEEE CS/2008-11-01/Vol. 3, No. 9/(ISSN: 1796-217X)
  32. Lee, J.S. and Chang, C.C./Recent Developments on Multimedia Security Technologies/資通安全專論彙編之一,國家實驗研究院科技政策研究與資訊中心/ National Applied Research Laboratories, NARLabs/2008-10-01/./None
  33. Chang, C. C., Cheng, Y. F. and Lin, I. C./Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control/Information Security and Cryptology, (Goos, G., Hartmanis, J. and Leeuwen, J. V.)/ Springer Verlag/2008-08-01/Vol. 4990, pp. 457-462/None
  34. Tsai, P., Lin, C. C. and Chang, C. C./A Low Bit Rate VQ Encoding Scheme Using Neighboring Similarity and Dynamic Subspace Rechecking/Harmonious Human Computer Environment 2007, (Li, X., Shi, Y., Meng, X., Xu, G., Liu, Z. Eds.)/ Tsinghus University/2008-05-01/pp. 3-11/None
  35. Chang, C. C., Chang, P. Y. and Lin, I. C./A Novel Group Signature Scheme Based on Bilinear Pairings and Gap Diffie-Hellman Group/Studies in Computational Intelligence--2nd International Workshop on Rational, Robust, and Secure Negotiations in Multi-Agent Systems (RRS), (Ito, T., Hattori, H., Zhang, M. and Matsuo, T. Eds.)/ Springer-Verlag/2008-02-01/Vol. 89, pp. 117-125/-
  36. Chang, C. C., Tsou, C. C. and Chou, Y. C./A Remediable Image Authentication Scheme Based on Feature Extraction and Clustered VQ/Advances in Multimedia Information Processing-PMC2007 -- Proceedings of 8th Pacific-Rim Conference on Multimedia, (Ip, H. S., Au, O. C., Leung, H., Sun, M. T., Ma, W. Y. and Hu, M. Eds.)/ Springer Verlag/2007-12-01/pp. 446-449/-
  37. Chang, C. C., Lin, C. Y. and Wang, Y. Z./A High Payload VQ Steganographic Method for Binary Images/Pre-Proceedings of the 6th International Workshop on Digital Watermarking (IWDW2007), (Shi, Y. Q., Kim, H. J., Katzenbeisser, S. Eds.)/ Springer Verlag/2007-12-01/pp. 484-498/-
  38. Chang, C. C. and Wu, W. C./Reversible Quantization-Index Modulation Using Neighboring Correlation/Pre-Proceedings of the 6th International Workshop on Digital Watermarking (IWDW2007), (Shi, Y. Q., Kim, H. J., Katzenbeisser, S. Eds.)/ Springer Verlag/2007-12-01/pp. 225-234/-
  39. Chang, C. C., Chou, Y. C. and Lu, T. C./A Semi-blind Watermarking Based on Discrete Wavelet Transform/Information and Communications Security--Proceedings of the 9th International Conference on Information and Communications Security (ICICS 2007),(Qing, S. Imai, H., and Wang, G. Eds.)/ Springer Verlag/2007-12-01/pp. 164-176./-
  40. Chang, C. C., Cheng, Y. F. and Lin, I. C./Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access/Pre-proceedings of the 3rd International SKLOIS Conference on Information Security and Cryptology/ Springer Verlag/2007-09-01/pp.467-472/None
  41. Wang, C. C., Chang, C. C., Zhang, X. and Jan, J. K./Senary Huffman Compression - A Reversible Data Hiding Scheme for Binary Images/Multimedia Content Analysis and Mining (MCAM'07)/ Springer Verlag/2007-06-01/pp. 351-360/None
  42. Wu, C. C., Chang, C. C. and Yang, S. R./An Efficient Fragile Watermarking for Web Pages Tamper-proof/Advances in Web and Network Technologies, and Information Management/ Springer-Verlag/2007-06-01/pp. 654-663/None
  43. Chang, C. C., Chen, Y. H. and Chou, Y. C./Reversible Data Embedding Technique for Palette Images Using De-clustering/Multimedia Content Analysis and Mining (MCAM'07)/ Springer Verlag/2007-06-01/pp. 130-139./None
  44. Yeh, J. S., Li, Y. C. and Chang, C. C./Two-Phase Algorithms for a Novel Utility-Frequent Mining Model/Proceedings of 2007 International Workshop on High Performance Data Mining and Applications (HPDMA 2007, in conjunction with PAKDD 2007)/ Springer-Verlag/2007-05-01/pp. 433–444/None
  45. Chan, C. W. and Chang, C. C./A New (t, n)-Threshold Scheme Based on Difference Equations/Combinatorics, Algorithms, Probabilistic and Experimental Methodologies--First International Symposium (ESCAPE 2007), (Chen, B. Paterson, M., and Zhang, G. Eds.)/ Springer-Verlag/2007-04-01/pp. 94-106/None
  46. Chang, C. C., Hu, Y. S. and Lin, C. C./A Digital Watermarking Scheme Based on Singular Value Decomposition/Combinatorics, Algorithms, Probabilistic and Experimental Methodologies--First International Symposium (ESCAPE 2007),(Chen, B. Paterson, M., and Zhang, G. Eds.)/ Springer-Verlag/2007-04-01/pp. 82-93/None
  47. Chang, C. C., Chan, C. S. and Fan, Y. H./Safeguarding Visual Secrets Using Meaningful Shadow Images/Embedded Computing: Design, Optimization and Applications, (Liu, Z., Shao, Z. Yang, L. T. Sha, E. Eds.)/ IDEA-group/2007-04-01/None/None
  48. Chang, C. C., Wang, Y. C. and Hu, Y. C./Adaptive Data Hiding Scheme for Palette Images/Intelligent Multimedia Data Hiding, (J. S. Pan, W. C. Fang, H. C. Huang, and L. C. Jain, eds)/ Springer-Verlag/2007-02-01/Chapter 5, pp. 103-122/None
  49. Chang, C. C. and Lin, C. Y./Density-Based Image Vector Quantization Using a Genetic Algorithm/The 13th International MultiMedia Modelling Conference (MMM2007), (Cham, T. J., Cai, J., Dorai, C., Rajan, D., Chua, T. S. and Chia, L. T. Eds.)/ Springer Verlag/2007-01-01/Part I, pp. 289-298/None
  50. Chan, C. S. and Chang, C. C./A Color Image Hiding Scheme Based on SMVQ and Modulo Operator/The 13th International MultiMedia Modelling Conference (MMM2007),(Cham, T. J., Cai, J., Dorai, C., Rajan, D., Chua, T. S. and Chia, L. T. Eds.)/ Springer-Verlag/2007-01-01/Part II, pp. 461-470./None
  51. 張真誠、李榮三、李維斌/電子商務的消費機制/資通安全專論彙編之一, 國家實驗研究院科技政策研究與資訊中心/ 國家實驗研究院/2006-12-01/pp. 111-143/None
  52. Huang, H. F. and Chang, C. C./Enhancement of an Auth. Mulitple-key Agreement Protocol without Using Conventional One-way Function/Computational Intelligence and Security-International Conference on Computational Intelligence and Security, (Hao, Y., Liu, J., Wang, Y., Cheung, Y.M., Yin, H., Jiao, L., Ma, J. and Jiao, Y.C. Eds.)/ Springer-Verlag/2006-12-01/Part I, pp. 554-559/-
  53. Chang, C.C., Lee, J.S. and Lee, W.B/Secure Mechanisms for Electronic Commerce/資通安全專論彙編之一,國家實驗研究院科技政策研究與資訊中心/ National Applied Research Laboratories, NARLabs/2006-12-01/./None
  54. Lee, W.B., Chen, B.H. and Chang, C.C./Security Threats of Electronic Commerce/資通安全分析專論/ National Applied Research Laboratories, NARLabs/2006-11-01/pp. 229-263/None
  55. Shen, J. J., Chang, C. C. and Chou, Y. C./Absorber Filter--A New Efficient and Cost Reduced Search Filter/Advances in Natural Computation and Data Mining - the 3rd International Conference on Fuzzy Systems and Knowledge Discovery (FSKD'06), (Jiao, L., Shi, G., Gao, X.,Wang, L., Wang, S. and Liu, J. Eds.)/ Xidan University Press/2006-09-01/pp. 346-357./None
  56. Chang, C. C., Chan, C. S. and Fan, Y. H./A Secret Image Sharing Scheme Based on Vector Quantization Mechanism/Embedded and Ubiquitous Computing - the 2006 IFIP International Conference on Embedded And Ubiquitous Computing (EUC'2006), (Sha, E. Han, S. K., Xu, C. Z., Kim, M. H., Yang, L. T. and Xiao, Bin. Eds.)/ Springer-Verlag/2006-08-01/pp. 469-478./-
  57. Chang, C. C. and Wu, C. C./A Novel Key Agreement Scheme in a Multiple Server Environment/Information Security Applications--Proceedings of the 7th International Workshop on Information Security Applications (WISA 06), (Lee, J. K., Yi, O. and Yuang, M. Eds.)/ Springer-Verlag/2006-08-01/pp. 187-197/
  58. Chang, C. C., Chen, K. L. and Lin, C. H./A Group-Oriented (t,n) Threshold Signature Scheme Against Replay Attacks/Ubiquitous Intelligence and Computing - the 3rd International Conference on Ubiquitous Intelligence and Computing (UIC-06), (Ma, J., Jin, H., Yang, L. T. and Tsai, J. P. Eds.)/ Springer-Verlag/2006-08-01/pp. 816-825/
  59. Yang, J. H., Chang, C. C. and Wang, C. H./A Practical Solution to the (t, n) Threshold Untraceable Signature with (k, l) Verification Scheme/Ubiquitous Intelligence and Computing - the 3rd International Conference on Ubiquitous Intelligence and Computing (UIC-06), (Ma, J., Jin, H., Yang, L. T. and Tsai, J. P. Eds.)/ Springer-Verlag/2006-08-01/pp. 998-1007./
  60. Lin, I. C. and Chang, C. C./An Efficient Fault-Tolerant Digital Signature Scheme Based on the Discrete Logarithm Problem/Autonomic and Trusted Computing - the 3rd IFIP International Conference on Autonomic and Trusted Computing (ATC-06), (Yang, L. T., Jin, H. Ma, J. and Ungerer, T. Eds.)/ Springer-Verlag/2006-08-01/pp. 601-610/-
  61. Lin, K. C. and Chang, C. C./Securing Mobile Ad Hoc Networks - Intrusion Prevention and Detection Systems/Communications of the Chinese Cryptology and Information Security Association/ None/2006-08-01/Vol.12, No.1.pp. 58-75/None
  62. Chen, C. Y., Chang, C. C. and Hsueh, C. C./A Fast Modular Multiplication Algorithm Based on the Window Method/Journal of I-Shou University/ I-Shou University/2006-08-01/None/None
  63. Chang, C. C., Hsieh, Y. P. and Wu, W. C./Wavelet-Based Initialization for VQ Codebook Generation/International Computer Conference 2006 on Wavelet Active Media Technology and Information Processing, (Li, J. P., Yang, S. X, Torresani, B., and Yen, J. Eds.)/ World Scientific/2006-08-01/Vol. 2, pp. 581-592/None
  64. Chang, C. C., Hsieh, Y. P. and Wu, W. C./An Adaptive Search Algorithm for VQ Using Wavelet Transform and Principle Component Analysis/International Computer Conference 2006 on Wavelet Active Media Technology and Information Processing, (Li, J. P., Yang, S. X, Torresani, B., and Yen, J. Eds.)/ World Scientific/2006-08-01/Vol. 2, pp. 581-592/None
  65. Lin, C. Y. and Chang, C. C./Hiding Data in VQ-compressed Images Using Dissimilar Pairs/Journal of Computers/ None/2006-07-01/Vol.17, No.2, pp. 3-10/None
  66. Chang, C. C., Lu, T. C. and Fan, Y. H./A Bit-Level Visual Secret Sharing Scheme for Multi-Secret Images Using Rotation and Reversion Operat/Intelligent Multimedia Data Hiding, (J. S. Pan, W. C. Fang, H. C. Huang, and L. C. Jain, eds)/ Springer-Verlag/2006-06-01/Chapter 4, pp. 83-101/None
  67. Chang, C. C., and Lee, J. S./Improvement on An Optimized Protocol for Mobile Network Authentication and Security/Computational Intelligence and Security-International Conference on Computational Intelligence and Security, (Hao, Y., Liu, J., Wang, Y., Cheung, Y.M., Yin, H., Jiao, L., Ma, J. and Jiao, Y.C. Eds.)/ Springer-Verlag/2005-12-01/Part I, pp.538-541/None
  68. Wu, M. N., Lin, C. C. and Chang, C. C./Image Copy Detection with Rotating Tolerance/Computational Intelligence and Security-International Conference on Computational Intelligence and Security, (Hao, Y., Liu, J., Wang, Y., Cheung, Y.M., Yin, H., Jiao, L., Ma, J. and Jiao, Y.C. Eds.)/ Springer-Verlag/2005-12-01/Part I, pp. 464-469/None
  69. Chang, C. C., Yeh, J. B. and Lin, C. C./Adaptive Hiding Scheme Based on VQ-indices Using Commutable Codewords/Computational Intelligence and Security: International Conference (CIS 2005), (Yue Hao, Jiming Liu, Yu-Ping Wang, Yiu-ming Cheung, Hujun Yin, Licheng Jiao, Jianfeng Ma, Yong-Chang Jiao)/ Springer Berlin/Heidelberg/2005-12-01/pp. 567 - 572/None
  70. Lee, J.S., Chang, Y.F. and Chang, C.C./Authentication Protocols for Wireless Communications/Communication of the Chinese Cryptology and Information Security Association/ ./2005-12-01/vol. 12, pp. 24-38/None
  71. Chang, C. C., Chou, Y. C. and Wu, W. C./Image Retrieval Using Spatial Color and Edge Detection/Advances in Mulitmedia Information Processing - PCM 2005: 6th Pacific Rim Conference on Multimedia, (Ho, Y. S., Kim, H. J. Eds.)/ Springer-Verlag/2005-11-01/2767 (1), pp. 981-992/None
  72. Hwang, R. J., Chang, C. C. and Shiau, S. H./A Design Concept of Generalized Group-Oriented Cryptosystem without Trusted Parties/New Horizons of Parallel and Distributed Computing, (Guo, M. and Yang, L. T. Eds.)/ Kluwer Academic Publishers/2005-11-01/pp. 81-96/None
  73. Chang, C. C. and Lu, T. C./A Color-based Image Retrieval Method Using Color Distribution and Common Bitmap/Information Retrieval Technology - Second Asia Information Retrieval Symposium, AIRS 2005, (Lee, G. G., Yamada, A., Meng, H. and Myaeng, S. H.)/ Springer-Verlag/2005-10-01/pp. 56-71/None
  74. Chang, C. C. and Lai, Y. P./A Parallel Modular Exponentiation Scheme for Transformed Exponents/Advanced Parallel Processing Technologies, 6th International Workshop, (Cao, J., Nejdl, W. and Xu, M. Eds.)/ Springer-Verlag/2005-10-01/pp. 443-452/None
  75. Chang, C. C. and Lu, T. C./Method for Searching Similar Images Using Quality Index Measurement/Knowledge-Based Intelligent Information and Engineering Systems (R. Khosla, R.J. Howlett and L.C. Jain)/ Springer-Verlag GmbH/2005-09-01/Vol.3682,pp. 1224-1230/None
  76. Chang, C. C. and Wu, W. C./A Reversible Information Hiding Scheme Based on Vector Quantization/Knowledge-Based Intelligent Information and Engineering Systems (R. Khosla, R.J. Howlett, and L.C. Jain Eds.)/ Springer-Verlag GmbH/2005-09-01/Vol.3683, pp.1101-1107/None
  77. Chang, C. C., Lu, T. C. and Yeh, J. B./A Bandwidth Efficiency of Lempel-Ziv Scheme for Data Authentication/Knowledge-Based Intelligent Information and Engineering Systems (R. Khosla, R.J. Howlett, and L.C. Jain Eds.)/ Springer-Verlag GmbH/2005-09-01/Vol.3684,pp.249-256/None
  78. Chang, C. C., Lin, C. Y. and Wang, Y. Z./VQ image Steganographic Method with High Embedding Capacity Using Multi-Way Search Approach/Knowledge-Based Intelligent Information and Engineering Systems(R. Khosla, R.J. Howlett, and L.C. Jain Eds.)/ Springer-Verlag GmbH/2005-09-01/Vol.3683,pp.1058-1064/None
  79. Chang, C. C., Chou, Y. C. and Shen, J. J./Improving Image Quality for JPEG Compression/Knowledge-Based Intelligent Information and Engineering Systems (R. Khosla, R.J. Howlett, and L.C. Jain Eds.)/ Springer-Verlag GmbH/2005-09-01/Vol.3683,pp.442-448/None
  80. Li, Y. C., Chang, C. C. and Yeh, J. S./An Algorithm for Mining Association Rules with Weighted Minimum Supports/Artificial Intelligence Applications and Innovations II (D. Li and B. Wang Eds.)/ Springer/2005-08-01/pp. 291-300/None
  81. Chang, Y. F. and Chang, C. C./An Improvement on Strong-password Authentication/Embedded Software and Systems (Yang, L. T., Zhou, X. S., Zhao, W., Wu, Z. H., Zhu, Y. and Lin, M. Eds.)/ Springer-Verlag/2005-08-01/pp. 629-637/None
  82. Li, Y. C., Yeh, J. S. and Chang, C. C./Direct Candidates Generation: A Novel Algorithm for Discovering Complete Share-Frequent Itemsets/2nd International Conference on Fuzzy Systems and Knowledge Discovery (FSKD2005), (Wang, L. and Jin, Y. Eds.)/ Springer Verlag/2005-08-01/pp. 551-560/None
  83. Huang, H. F. and Chang, C. C./A Novel Conference Key Distribution System with Re-keying Protocol/Web and Communication Technologies and Internet-Related Social Issues - HSI 2005: 3rd International Conference on Human.Society@Internet, (Shimojo, S., Ichii, S. and Ling, T. W. Eds.)/ Springer-Verlag/2005-07-01/pp. 282-290/None
  84. Li, Y. C., Yeh, J. S. and Chang, C. C./Efficient Algorithms for Mining Share-Frequent Itemsets/Fuzzy Logic, Soft Computing and Computational Intelligence --- 11th World Congress of International Fuzzy Systems Association (IFSA 2005), (Y. Liu, G. Chen, and M. Ying Eds.)/ Springer Tsinghua/2005-07-01/pp. 534-539/None
  85. Chang, C. C., Chou, H. and Lin, C. C./A Steganographic Technique for Color Images Using Index Replacement and Principal Component Analysis/6th International Progress on Wavelet Analysis and Active Media Technology, (Li, J. P., Jaffard, S., Suen, C. Y, Daugman, J., Wickerhauser, V., Torresani, B., Yen, J., Zhong, N. and Pal, S. K., Eds.)/ World Scientific/2005-05-01/pp. 15-22./None
  86. Chang, C. C., Wu, W. C. and Hu, Y. C./Color Image Retrieval Based on Regional Features/6th International Progress on Wavelet Analysis and Active Media Technology, (Li, J. P., Jaffard, S., Suen, C. Y, Daugman, J., Wickerhauser, V., Torresani, B., Yen, J., Zhong, N. and Pal, S. K., Eds.)/ World Scientific/2005-05-01/pp. 23-33/None
  87. Chang, C. C., Lu, T. C. and Liu, Y. L./A Secret Information Hiding Scheme Based on Switching Tree Coding/Computer Security in the Twenty-First Century, (Lee, D. T., Shieh, S. P., and Tygar, J. D. Eds.)/ Springer/2005-05-01/pp. 255-263./None
  88. Chang, C. C., Shen, J. J. and Chou, Y. C./FA-Tree--A Dynamic Indexing Structure for Spatial Data/Soft Computing as Transdisciplinary Science and Technology, (Abraham, A., Dote, Y., Furuhashi, T., Koppen, M., Ohuchi, A., and Ohsawa, Y. Eds.)/ Springer-Verlag/2005-05-01/pp. 1071-1080/None
  89. Chang, C. C., Tai, W. L. and Lin, C. C./Secret Hiding Using Side Match Vector Quantization/Soft Computing as Transdisciplinary Science and Technology, (Abraham, A., Dote, Y., Furuhashi, T., Koppen, M., Ohuchi, A., and Ohsawa, Y. Eds.)/ Springer-Verlag/2005-05-01/pp. 172-181/None
  90. Chang, C. C., Tseng, C. S. and Lin, C. C./Hiding Data in Binary Images/Lecture Notes in Computer Science 3439 - Information Security Practice and Experience: First International Conference ISPEC 2005, (Deng, H., Bao, F., Pang, H.H., et al. Eds.)/ Springer-Verlag GmbH/2005-04-01/pp. 338-349/None
  91. Li, Y. C., Chang, C. C. and Yeh, J. S./A Fast Algorithm for Mining Share-Frequent Itemsets/Proceedings of the Seventh Asia Pacific Web Conference (APWeb'05), (Zhang, Y., Tanaka, K., Yu, X. et al. Eds.)/ Springer-Verlag/2005-03-01/pp. 417-428/-
  92. Chan, Y. K. and Chang, C. C./Content-Based Retrieval Concept/Encyclopedia of Information Science and Technology, Vol. I-V, (Mehdi, K. P. Ed.)/ Idea Group/2005-02-01/Vol. I, pp. 564-568./None
  93. Chang, C. C. and Lin, I. C./A Perceptually Tuned Watermarking Scheme for Digital Images Using Support Vector Machnies/Intelligent Watermarking Techniques, (Pan, J. S., Huang, H. C. and Jain, L. C. Eds.)/ Series on Innovative Intelligence/2004-06-01/Vol. 7, 2004, pp. 429-458/
  94. Chang, C. C. and Lin, I. C./Robust Image Watermarking Systems Using Neural Networks/Intelligent Watermarking Techniques, (Pan, J. S., Huang, H. C. and Jain, L. C. Eds.)/ Series on Innovative Intelligence/2004-06-01/Vol. 7, 2004, pp. 395-428/
  95. Chang, C. C. and Lin, I. C./Robust Image Watermarking Systems Using Neural Networks/Intelligent Watermarking Techniques, (J. S. Pan, H. C. Huang and L. C. Jain Eds.)/ World Scientific Publishing Company, Singapore/2004-06-01/2004, Chapter 14, pp. 395-428/
  96. Chang, C. C. and Lin, I. C./A Perceptually Tuned Watermarking Scheme for Digital Images Using Support Vector Machines/Intelligent Watermarking Techniques, (J. S. Pan, H. C. Huang and L. C. Jain Eds.)/ World Scientific Publishing Company, Singapore/2004-06-01/2004, Chapter 15, pp. 429-458/
  97. Hwang, K. F. and Chang, C. C./Recent Development of Visual Cryptography/Intelligent Watermarking Techniques, (J. S. Pan, H. C. Huang and L. C. Jain Eds.)/ World Scientific Publishing Company, Singapore/2004-06-01/Chapter 16, 2004, pp. 459-480/
  98. Chang, C. C., Chuang, J. C. and Hu Y. S./Image Feature Based on Wavelet Transformation for Similar Image Retrieval/Proceedings of the Third International Conference on Wavelet Analysis and Its Applications, (J. P. Li, V. Wickerhauser, Y. Y. Tang, J. Daugman, L. Peng, and J. Zhao Eds.)/ World Scientific/2003-06-01/Vol. 1, 2003, pp. 294-302/
  99. Huang, H. F. and Chang, C. C./An Efficient Convertible Authenticated Encryption Scheme and Its Variant/Lecture Notes in Computer Science- Information and Communications Security (ICICS 2003), (S. Qing, D. Gollmann, J. Zhou Eds.)/ Springer Verlag, Germany/2003-06-01/2003, pp. 382-392/
  100. Hwang, R. J. and Chang, C. C./A Method for Sending Confidential Messages to a Group without Trusted Parties/ Lecture Notes in Computer Science- Parallel and Distributed Processing and Applications, (M. Guo and L. T. Yang Eds.)/ Springer Verlag, Germany/2003-06-01/Vol. 2745, 2003, pp. 375-381/
  101. Hung, K. L., Chang, C. C./A Robust and Recoverable Tamper Proofing Technique for Image Authentication/Lecture Notes in Computer Science- Web and Communication Technologies and Internet-Related Social Issues-HSI 2003, (C. W. Chung, C. K. Kim, W. Kim, T. W. Ling, and K. H. Song Eds.)/ Springer Verlag, Germany/2003-06-01/2003, pp. 44-53/
  102. Chang, C. C., Hsiao, J. Y. and Chiang, C. L./A Cross-Type Peak-and-Valley Filter for Error Prevention and Resilience in Image Communications/Lecture Notes in Computer Science-Advances in Multimedia Information Processing-PCM2002, (Y. C. Chen, L. W. Chang and C. T. Hsu Eds.)/ Springer Verlag, Germany/2002-06-01/2002, pp.393-400/
  103. Chang, C. C., Hsieh, C. P. and Hsiao, J. Y./A Fast and Efficient Noise Reduction Method Suitable for Low Noise Density/Lecture Notes in Computer Science-Advances in Multimedia Information Processing-PCM2002, (Y. C. Chen, L. W. Chang and C. T. Hsu Eds.)/ Springer Verlag, Germany/2002-06-01/2002, pp.386-392/
  104. Chang, C. C. and Su, Y. Y/A Dynamic Color Palette for Color Images Coding/Lecture Notes in Computer Science-Advances in Multimedia Information Processing-PCM2002, (Y. C. Chen, L. W. Chang and C. T. Hsu Eds.)/ Springer Verlag, Germany/2002-06-01/2002, pp.369-376/
  105. Chang, C. C., Chan, C. S, and Hsiao, J. Y./A Color Image Retrieve Method Based on Local Histogram/ Lecture Notes in Computer Science-Advances in Multimedia Information Processing-PCM2001, (H. Y. Shum, M. Liao, S. F. Chang Eds.)/ Springer Verlag, Germany/2001-06-01/2001, pp. 831-836/
  106. Tsai, C. S. and Chang, C. C./A Generalized Secret Image Sharing and Recovery Scheme/Lecture Notes in Computer Science-Advances in Multimedia Information Processing-PCM2001, (H. Y. Shum, M. Liao, S. F. Chang Eds.)/ Springer Verlag, Germany/2001-06-01/2001, pp. 963-968/
  107. Chang, C. C., Yeh, J. C. and Hsiao, J. Y./A Novel Scheme for Securing Image Steganography/Lecture Notes in Computer Science-Advances in Multimedia Information Processing-PCM2001, (H. Y. Shum, M. Liao, S. F. Chang Eds.)/ Springer-Verlag, Germany/2001-06-01/2001, pp. 804-811/
  108. Chang, C. C., Hsia, H. C. and Chen, T. S./A New Progressive Image Transmission Scheme Based on Block Truncation Coding/The Human. Society @ Internet, (W. Kim, T. W. Ling, Y. J. Lee and S. S. Park Ed.)/ Springer-Verlage, Germany/2001-06-01/2001, pp. 383-397/
  109. Chang, C. C. and Lin, I. C./Cryptanalysis of the Improved User Efficient Blind Signatures/Lecture Notes in Computer Science - Information and Communications Security, (S. Qing and T. Okamoto Eds.)/ Springer-Verlag/2001-06-01/ 2001, pp. 42-46/
  110. Chang, C. C. and Hwang, K. F./Towards the Forgery of a Group Signature without Knowing the Group Center's Secret/Lecture Notes in Computer Science - Information and Communications Security, (S. Qing and T. Okamoto Eds.)/ Springer-Verlag/2001-06-01/2001, pp. 47-51/
  111. Chang, C. C., Chen, T. S. and Xiao, G. X./A Simple Prediction Method for Progressive Image Transmission/Distributed Multimedia Databases: Techniques and Applications, (T. K. Shih Ed.)/ the Idea Group Publishing, USA/2001-06-01/Chapter 16/
  112. Chang, C. C. and Hwang, K. F./Hiding Images Using Dynamic Bit-replacement and Human Visual System/Distributed Multimedia Databases: Techniques and Applications, (T. K. Shih Ed.)/ the Idea Group Publishing, USA/2001-06-01/Chapter 12/
  113. Tsai, C. S., Chang, C. C., Chen, T. S. and Chen M. H./Embedding Robust Gray-level Watermarks in an Image Using Discrete Cosine Transformation/Distributed Multimedia Databases: Techniques and Applications, (T. K. Shih Ed.)/ the Idea Group Publishing, USA/2001-06-01/Chapter 13/
  114. Chang, C. C., Hung, Y. P., Shih, T. K. and Hwang, R. J./Future Multimedia Databases and Research Directions/Distributed Multimedia Databases: Techniques and Applications, (T. K. Shih Ed.)/ the Idea Group Publishing, USA/2001-06-01/Chapter 22/
  115. Chang, C. C., Chan, Y. K., Chou, A. Y. H. and Yang, W. P./Representing Symbolic Pictures Using Iconic Indexing/Design and Management of Multimedia Information Systems: Opportunities and Challenges, (M. R. Syed Editor)/ Idea Group Publishing Company, U. S. A/2001-06-01/pp. 64-79/
  116. Shen, J. J., Chang, C. C. and Lee, C. H./Normalization Cannot Make Profit for Query Processing in ROODB/ Database, Web and Cooperative Systems, Vol. I, (G. Lasker, and Y. Zhang Eds)/ The International Institute for Advanced Studies in Systems Research and Cybernetics, Canada/1999-06-01/pp. 137-144/
  117. Chang, C. C., Leu, J. J., Hwang, P. C. and Lee, W. B./A Scheme for Obtaining a Message from the Digital Multisignature/Lecture Notes in Computer Science: Public Key Cryptography, (H. Imai and Y. Zheng Eds.)/ Springer-Verlag, Germany/1998-06-01/pp.154-163/
  118. Chang, C. C./Computer Science Education at Universities in Taiwan/Information Systems and Technologies for Network Society, (Y. Kambayashi, Y. Masunaga, M. Takizawa, and Y. Anzai Eds.)/ World Scientific Publishing Company, Singapore/1997-06-01/pp. 5-10/
  119. Lee, C. F. and Chang, C. C./Optimal Bit Lengths of Direction Signatures for Spatial Match Accessing Using Basic Linear Hashing Scheme/Advanced Database Research and Development Series, Vol. 7, Cooperative Database and Applications, (Y. Kambayashi and K.Yokota Eds.)/ World Scientific Publishing Company, Singapore/1997-06-01/pp. 526-529/
  120. Chang, C. C. and Jiang, J. H./General Multilevel Signature Method for Data Filtering in Mobile Environments/ Information Systems and Technologies for Network Society, (Y. Kambayashi, Y. Masunaga, M. Takizawa, and Y. Anzai Eds.)/ World Scientific Publishing Company/1997-06-01/pp. 385-391/
  121. Chang, C. C. and Lee, C. F./An Efficient Data Filter for Orthogonal Range Searching on Multiattribute Files/Information Systems and Technologies for Network Society, (Y. Kambayashi, Y. Masunaga, M. Takizawa, and Y. Anzai Eds.)/ World Scientific Publishing Company/1997-06-01/pp. 261-264/
  122. Chen, T. S. and Chang, C. C./Progressive Image Transmission Using Side Match Method/Information Systems and Technologies for Network Society, (Y. Kambayashi, Y. Masunaga, M. Takizawa, and Y. Anzai Eds.)/ World Scientific Publishing Company/1997-06-01/pp. 191-198/
  123. Chang. C. C. and Lee, C. F./An Efficient Indexing Scheme for Temporal Join in Relational Environment/Digital Media Information Base, (M. Yoshikawa, S. Uemura, and Y. Kambayashi Eds.)/ World Scientific Publishing Company/1997-06-01/pp. 176-181/
  124. Jiang, J. H., Chang. C. C. and Chen, T. S./Selective Progressive Image Transmission Using Diagonal Sampling Technique/Digital Media Information Base, (M. Yoshikawa, S. Uemura, and Y. Kambayashi Eds.)/ World Scientific Publishing Company/1997-06-01/pp. 59-67/
  125. Chang, C. C., Lee, W. T. and Kuo, C. L./A Fast Image Encoding Scheme Using Vector Quantization/ Information Systems and Technologies for Network Society, (Y. Kambayashi, Y. Masunaga, M. Takizawa, and Y. Anzai Eds.)/ World Scientific Publishing Company/1997-06-01/pp. 143-150/
  126. Chen, C. Y., Chang, C. C., Lee, R. C. T. and Lin, D. C./A Temporal Join Mechanism Based on Trie-ranking Data Structure/Advanced Database Research and Development Series, Vol. 7, Cooperative Database and Applications, (Y. Kambayashi and K.Yokota Eds.)/ World Scientific publishing Company/1997-06-01/pp. 428-435/
  127. Hwang, S. J., Chang, C. C. and Yang, W. P./Some Active Attacks on Fast Server-Aided Secret Computation Protocols for Modular Exponentiation/Proceedings of Cryptography: Policy and Algorithms, Vol. 1029, (Dawson, E. and Golic, J. Eds.)/ Springer Berlin / Heidelberg, Germany/1996-06-01/pp. 215-227/
  128. Lin, C. H., Wang, C. T. and Chang, C. C./A Group-Oriented (t, n) Undeniable Signature Scheme without Trusted Center/ Information Security and Privacy, (G. Goos, J. Harfmanis, and J. Leeuwen Eds.)/ Springer-Verlag/1996-06-01/pp. 266-274/
  129. Buehrer, D. J., Chang, C. C. and Ling, S. M./Using 2D String Decision Trees for Symbolic Picture Retrieval/Chapter 10 in Intelligent Image Database Systems: Spatial Reasoning, Image Indexing and Retrieval Using Symbolic Projections, (S. K. Chang, E. Jungert, and G. Tortora Eds.)/ World Scientific Publishing Co./1996-06-01/pp. 219-228/
  130. Buehrer, D. J. and Chang, C. C./Application of a Reciprocal Confluence Tree Unit to Similar-Picture Retrieval/Advances in Spatial Databases, Lecture Notes in Computer Science, (D. Abel and B. C. Ooi Eds.)/ Springer-Verlag/1993-06-01/ pp. 437-442/
  131. Liang, J. and Chang, C. C./Similarity Retrieval on Pictorial Databases Based upon Module Operation/Advanced Database Research and Development Series-Vol.4, Database Systems for Advanced Applications'93, (S. C. Moon and H. Ikeda Eds.)/ World Scientific Publishing Company/1993-06-01/pp. 19-26/
  132. Chang, C. C., Wu, T. C. and Chen, C. P./The Design of a Conference Key Distribution Systems/Advances in Cryptology - Proceedings of AUSCRYPT '92, Lecture Notes in Computer Science Series, Vol. 718, (J. Seberry and Y. Zheng Eds.)/ Springer-Verlag/1993-06-01/pp. 459-466/
  133. Chang, C. C. and Buehrer, D. J./De-clustering Image Databases/Future Databases'92, Advanced Database Research and Development Series, Vol. 3, (W. Kim and Y. Kambayashi Eds.)/ World Scientific Publishing Company/1992-06-01/pp. 142-145/
  134. Chang, C. C. and Buehrer, D. J./A Survey of Some Spatial Match Query Algorithms/Advanced Database Research and Development Series, Vol. 1, Database Systems for Next-Generation Applications – Practice, (W. Kim and Y. Kambayashi Eds.)/ World Scientific Publishing Company/1992-06-01/pp. 218-223/
  135. Chang, C. C. and Chen, C. Y./Orthogonal Range Retrieval Using Bucket Address Hashing/Statistical and Scientific Database Management, Lecture Notes in Computer Science, Vol. 339, (G. Goos, J. Hartmanis, M. Rafanelli, J. C. Klensin, and P. Svensson Eds.)/ Springer-Verlag/1988-06-01/pp. 133-140/
  136. Chang, C. C./The Study of a Letter Oriented Minimal Perfect Hashing Scheme/ Foundations of Data Organization, (S. P. Ghosh, Y. Kambayashi, and K. Tanaka Eds.)/ Plenum Press, New York/1987-06-01/pp. 91-99/
  137. Chang, C. C. and Lian, L. S./On Strict Optimality Property of Allocating Binary Cartesian Product Files on Multiple Disk Systems/Foundations of Data Organization, (S. P. Ghosh, Y. Kambayashi, and K. Tanaka Eds.)/ Plenum Press, New York/1987-06-01/pp. 159-175./
  138. Chang, C. C. and Shen, J. J./Consecutive Retrieval Organization as a File Allocation Scheme on Multiple Disk Systems/Foundations of Data Organization, (S. P. Ghosh, Y. Kambayashi, and K. Tanaka Eds.)/ Plenum Press, New York/1987-06-01/pp. 113-124/
  139. Chang, C. C. and Shieh, J. C./On the Complexity of File Allocation Problem/Foundations of Data Organization, (S. P. Ghosh, Y. Kambayashi, and K. Tanaka Eds.)/ Plenum Press, New York/1987-06-01/pp. 177-181/
  1. The Practice of Deep Learning and TensorFlow, Posts & Telecom Press Co., LTD., China (with Jianjun Li and Ximing Wang and Mian Pan and ShuoGui Xu and Dexing Kong), December 2017
  2. Steganography and Watermarking, Nova Science Publishers Inc., USA(with Ching-Nung Yang and Chia-Chen Lin), April 2013
  3. A Challenge to Image Processing-Digital Watermarking Techniques), Mcgraw-Hill International Enterprises LCC Taiwan Branch, Taiwan (with Jeng-Shyang Pan and Yung-Chang Lin), July 2007
  4. Multimedia Security Techniques, Chuan Hwa Book Co., Taiwan (with Tzu-Chun Lu and Zheming Lu), July 2007
  5. Data Compressing Techniques and Applications, Chuan Hwa Book Co., Taiwan (with Wen-Hui Tsai and Chia-Chen Lin), June 2007
  6. Introduction to C Programming Language and Design Examples, Chuan Hwa Book Co., Taiwan (with Tzu-Chun Lu and Wen-Hui Tsai), May 2006
  7. A Challenge to Java Programming Language, Chuan Hwa Book Co., Taiwan(with Wen-Hui Tsai and Tzu-Chun Lu), December 2005
  8. Technologies and Applications for Information Security, Chuan Hwa Book Co., Taiwan (with Chu-Hsing Lin ), January 2006
  9. Fundamentals of Data Structures Using JAVA, Chuan Hwa Book Co., Taiwan (with Wen-Hui Tsai and Chia-Chen Lin), May 2005
  10. Introduction to Data Structures-Concepts and Applications Using C, Chuan Hwa Book Co., Taiwan (with Wen-Hui Tsai and Yu-Cheng Hu), December 2003
  11. Digital Image Processing, Flag Publishing CO., LTD. (with Tung-Shou Chen and Kuo-Feng Huang), May 2003
  12. Electronic Imaging Techniques, Flag Publishing CO., LTD., Taiwan (with Kuo-Feng Huang and Tung-Shou Chen), March 2003
  13. Security Technologies and Applications in Electronic Commerce, Flag Publishing CO., LTD., Taiwan (with Chu-Hsing Lin ), February 2003
  14. A Challenge to Database Management Systems, Flag Publishing CO., LTD., Taiwan (with Wen-Hui Tsai and Min-Hui Lin), February 2003
  15. Introduction to Information and Communication Security, Science and Technology Information Center, Taiwan (with Chin-Chen Chang), December 2002
  16. Discovering Information and Computers, Flag Publishing CO., LTD., Taiwan (with Tung-Shou Chen, Wen-Kuang Chou, Kerin Ho and Min-Hui Lin), September 2002
  17. A Challenge to C++ Programming Language, China Machine Press, China (with Wen-Hui Tsai and Kuo-Feng Huang), August 2002
  18. Fundamentals of Data Structures and Their Applications Using C++, Flag Publishing CO., LTD.(with Wen-Hui Tsai), July 2002
  19. Contemporary Concepts and Applications in Computer Sciences, Flag Publishing CO., LTD., Taiwan (with Wen-Hui Tsai and Chen-Cheng Liu), July 2002
  20. A Challenge to C++ Programming Language), Flag Publishing CO.,LTD., Taiwan (with Wen-Hui Tsai and Kuo-Feng Huang), January 2002
  21. Computer cryptography and its application, National Defense Industrial, China (with Chi-Sung Laih and Lein Harn), July 2001
  22. Discovering Information and Computers,Pine Digital Technology CO., Taiwan (with Tung-Shou Chen, Wen-Kuang Chou, Kuo-Feng Huang and Min-Hui Lin), June 2001
  23. Digital Image Processing Techniques, Unalis Co., Taiwan (with Tung-Shou Chen and Kuo-Feng Huang), January 2001
  24. Electronic Imaging Techniques, Unalis Co., Taiwan (with Kuo-Feng Huang and Tung-Shou Chen), December 2000
  25. Data Security for Electronic Commerce, Unalis Co., Taiwan (with Chu-Hsing Lin and Chi-Han Chiang), January 2000
  26. Contemporary Cryptography and Its Applications, Unalis Co., Taiwan (with Chi-Sung Laih and Lein Harn), September 1995
  27. Data Compressions-Theories and Practice, Unalis Co., Taiwan (with Wen-Hui Tsai), October 1994
  28. UNIX Operation Systems and Its Network Security, Unalis Co., Taiwan (with Horng-Chin Lee、Sheng-Hsiung Hsu), May 1994
  29. CLIPPER5. In depth study of X combinatorial language,Unalis Co., Taiwan (with Horng-Chin Lee), March 1994
  30. Cocoon-A Vaccine for Computer Viruses, Unalis Co., Taiwan (with Wei-Bin Lee and Chih-Hung Wang), October 1992
  31. Lotus of Heavenly Mountain-An Open De-Virus System, Unalis Co., Taiwan (with Horng-Chin Lee and Wei-Bin Lee), August 1992
  32. Introduction to Computer Science, Unalis Co., Taiwan (with Wen-Hui Tsai), March 1992
  33. Data Structures-Theories and Applications, Unalis Co., Taiwan (with Wen-Hui Tsai), March 1992
  34. Applications of Relational Database Systems, Unalis Co., Taiwan (with Sheng-Yu Tsai), April 1991
  35. Database Systems Design, Unalis Co., Taiwan (with Chin-Chen Chang), July 1990
  36. Computer Center Management-Practice and Experience,Unalis Co., Taiwan (with Shou-Du Shen), July 1990
  37. Data Engineering Techniques, Unalis Co., Taiwan (with Chin-Chen Chang), August 1998
  38. Computer Cryptography and Information Security, Unalis Co., Taiwan (with Chin-Chen Chang), August 1998
  1. Privacy Security Technologies for Digital Images Based on Deep Learning (1/3) / 2023.08.01-2024.07.31 / National Science Council / Principle Investigator / MOST 112-2221-E-035-054-MY3
  2. A Study of Facial Biometric Protection using Artificial Intelligence Techniques (1/3) / 2023.08.01-2024.07.31 / National Science Council / Principle Investigator / MOST 112-2221-E-035-048-MY3
  3. Research on Copyright Authentication, Tamper Detection, and Privacy Protection of Medical Images (3/3) / 2022.08.01-2023.07.31 / Ministry of Science and Technology / Principle Investigator / MOST 109-2221-E-035-060-MY3
  4. Research on Copyright Authentication, Tamper Detection, and Privacy Protection of Medical Images (2/3) / 2021.08.01-2022.07.31 / Ministry of Science and Technology / Principle Investigator / MOST 109-2221-E-035-060-MY3
  5. Secret Sharing Techniques on High-Payload QR Codes, Visually Cryptographic QR Codes, and Rich QR Codes (2/2) / 2021.08.01-2022.07.31 / Ministry of Science and Technology / Principle Investigator / MOST 109-2221-E-035-059-MY2
  6. Research on Copyright Authentication, Tamper Detection, and Privacy Protection of Medical Images (1/3) / 2020.08.01-2021.07.31 / Ministry of Science and Technology / Principle Investigator / MOST 109-2221-E-035-060-MY3
  7. Secret Sharing Techniques on High-Payload QR Codes, Visually Cryptographic QR Codes, and Rich QR Codes (1/2) / 2020.08.01-2021.07.31 / Ministry of Science and Technology / Principle Investigator / MOST 109-2221-E-035-059-MY2
  8. Research on Reversible Data Hiding in Encryption Domain (3/3) / 2019.08.01-2020.07.31 / Ministry of Science and Technology / Principle Investigator / MOST 106-2221-E-035 -018 -MY3
  9. Print-Cam Resilient Watermarking Algorithms with High Robustness and Beautification of Visible Watermarks in QR Codes (3/3) / 2019.08.01-2020.07.31 / Ministry of Science and Technology / Principle Investigator / MOST 106-2221-E-035 -013 -MY3
  10. Research on Reversible Data Hiding in Encryption Domain (2/3) / 2018.08.01-2019.07.31 / Ministry of Science and Technology / Principle Investigator / MOST 106-2221-E-035 -018 -MY3
  11. Print-Cam Resilient Watermarking Algorithms with High Robustness and Beautification of Visible Watermarks in QR Codes (2/3) / 2018.08.01-2019.07.31 / Ministry of Science and Technology / Principle Investigator / MOST 106-2221-E-035 -013 -MY3
  12. Research on Reversible Data Hiding in Encryption Domain (1/3) / 2017.08.01-2018.07.31 / Ministry of Science and Technology / Principle Investigator / MOST 106-2221-E-035 -018 -MY3
  13. Print-Cam Resilient Watermarking Algorithms with High Robustness and Beautification of Visible Watermarks in QR Codes (1/3) / 2017.08.01-2018.07.31 / Ministry of Science and Technology / Principle Investigator / MOST 106-2221-E-035 -013 -MY3
  14. Reversible Information Hiding Techniques Based on Coding Strategy / 2016.08.01-2017.07.31 / Ministry of Science and Technology / Principle Investigator / MOST 105-2221-E-035-051-
  15. Secure and Efficient Authentication Mechanisms and Their Applications in Electronic Commerce (3/3) / 2015.08.01-2016.07.31 / Ministry of Science and Technology / Principle Investigator / MOST 103-2221-E-035 -102 -MY3
  16. The Study of Sharing Digital Secret Images and Its Applications in Mobile Communication Environments (2/2) / 2015.08.01-2016.07.31 / Ministry of Science and Technology / Principle Investigator / MOST 103-2221-E-035 -102 -MY2
  17. Secure and Efficient Authentication Mechanisms and Their Applications in Electronic Commerce (2/3) / 2015.08.01-2016.07.31 / Ministry of Science and Technology / Principle Investigator / MOST 103-2221-E-035 -046 -MY3
  18. The Study of Sharing Digital Secret Images and Its Applications in Mobile Communication Environments (1/2) / 2014.08.01-2015.07.31 / Ministry of Science and Technology / Principle Investigator / MOST 103-2221-E-035 -102 -MY2
  19. Secure and Efficient Authentication Mechanisms and Their Applications in Electronic Commerce (1/3) / 2014.08.01-2015.07.31 / Ministry of Science and Technology / Principle Investigator / MOST 103-2221-E-035 -046 -MY3
  20. The Study of Digital Image Editing Techniques and Their Applications to Multimedia Security (3/3) / 2013.08.01-2014.07.31 / National Science Council / Principle Investigator / NSC 100-2221-E-035-093-MY3
  21. The Research and Applications on High Secure and Efficient Threshold Cryptography Techniques (3/3) / 2013.08.01-2014.07.31 / National Science Council / Principle Investigator / NSC 100-2221-E-035-049-MY3
  22. The Study of Digital Image Editing Techniques and Their Applications to Multimedia Security (2/3) / 2012.08.01-2013.07.31 / National Science Council / Principle Investigator / NSC 100-2221-E-035-093-MY3
  23. The Research and Applications on High Secure and Efficient Threshold Cryptography Techniques (2/3) / 2012.08.01-2013.07.31 / National Science Council / Principle Investigator / NSC 100-2221-E-035-049-MY3
  24. The Study of Digital Image Editing Techniques and Their Applications to Multimedia Security (1/3) / 2011.08.01-2012.07.31 / National Science Council / Principle Investigator / NSC 100-2221-E-035-093-MY3
  25. The Research and Applications on High Secure and Efficient Threshold Cryptography Techniques (1/3) / 2011.08.01-2012.07.31 / National Science Council / Principle Investigator / NSC 100-2221-E-035-049-MY3
  26. Reversible and Removable Data Embedding Techniques for Digital Images (3/3) / 2010.08.01-2011.07.31 / National Science Council / Principle Investigator / NSC 97-2221-E-035-084-MY3
  27. The Study of Secure Electronic Transaction Mechanisms in Internet (3/3) / 2010.08.01-2011.07.31 / National Science Council / Principle Investigator / NSC 97-2221-E-035-039-MY3
  28. Reversible and Removable Data Embedding Techniques for Digital Images (2/3) / 2009.08.01-2010.07.31 / National Science Council / Principle Investigator / NSC 97-2221-E-035-084-MY3
  29. The Study of Secure Electronic Transaction Mechanisms in Internet (2/3) / 2009.08.01-2010.07.31 / National Science Council / Principle Investigator / NSC 97-2221-E-035-039-MY3
  30. Reversible and Removable Data Embedding Techniques for Digital Images (1/3) / 2008.08.01-2009.07.31 / National Science Council / Principle Investigator / NSC 97-2221-E-035-084-MY3
  31. The Study of Secure Electronic Transaction Mechanisms in Internet (1/3) / 2008.08.01-2009.07.31 / National Science Council / Principle Investigator / NSC 97-2221-E-035-039-MY3
  32. The Design of High-Speed Computation Mechanisms in Residual Number Systems for Cryptoschemes (3/3) / 2007.08.01-2008.07.31 / National Science Council / Principle Investigator / NSC 96-2221-E-035-010
  33. Information Hiding Techniques for Various Data Compression mechanisms (3/3) / 2007.08.01-2008.07.31 / National Science Council / Principle Investigator / NSC 96-2221-E-035-009
  34. The Design of High-Speed Computation Mechanisms in Residual Number Systems for Cryptoschemes (2/3) / 2006.08.01-2007.07.31 / National Science Council / Principle Investigator / NSC95-2221-E-035-141
  35. Information Hiding Techniques for Various Data Compression mechanisms (2/3) / 2006.08.01-2007.07.31 / National Science Council / Principle Investigator / NSC95-2221-E-035-140
  36. The Design of High-Speed Computation Mechanisms in Residual Number Systems for Cryptoschemes (1/3) / 2005.08.01-2006.07.31 / National Science Council / Principle Investigator / NSC94-2213-E-194-039
  37. Information Hiding Techniques for Various Data Compression mechanisms (1/3) / 2005.08.01-2006.07.31 / National Science Council / Principle Investigator / NSC94-2213-E-194-038
  38. A Study on Progressive Image Transmission Techniques for Various Types of Digital Images (3/3) / 2004.08.01-2005.07.31 / National Science Council / Principle Investigator / NSC93-2213-E-194-003
  39. A Study on Information Hiding Techniques for Various Types of Digital Images (3/3) / 2004.08.01-2005.07.31 / National Science Council / Principle Investigator / NSC93-2213-E-194-004
  40. A Study on Progressive Image Transmission Techniques for Various Types of Digital Images (2/3) / 2003.08.01-2004.07.31 / National Science Council / Principle Investigator / NSC92-2213-E-194-004
  41. A Study on Information Hiding Techniques for Various Types of Digital Images (2/3) / 2003.08.01-2004.07.31 / National Science Council / Principle Investigator / NSC92-2213-E-194-005
  42. A Study on Progressive Image Transmission Techniques for Various Types of Digital Images (1/3) / 2002.08.01-2003.07.31 / National Science Council / Principle Investigator / NSC91-2213-E-194-017
  43. A Study on Information Hiding Techniques for Various Types of Digital Images (1/3) / 2002.08.01-2003.07.31 / National Science Council / Principle Investigator / NSC91-2213-E-194-016
  44. The Study of Some Image Compression Mechanisms (3/3) / 2001.08.01-2002.07.31 / National Science Council / Principle Investigator / NSC90-2213-E-194-013
  45. A Study of Image Compression Schemes with Error Correction Capability / 2001.08.01-2002.07.31 / National Science Council / Principle Investigator / NSC90-2213-E-194-041
  46. A study of Similar Color Image Retrieval Using RCM-Wavelet-Based Features / 2001.08.01-2002.07.31 / National Science Council / Principle Investigator / NSC90-2213-E-194-026
  47. A Video Retrieval Technique Based on Piecewise Matching Method / 2000.08.01-2001.07.31 / National Science Council / Principle Investigator / NSC89-2218-E-194-008
  48. The Study of Some Image Compression Mechanisms (3/2) / 2000.08.01-2001.07.31 / National Science Council / Principle Investigator / NSC89-2218-E-194-012
  49. A Study on Color Image Cryptosystems / 2000.08.01-2001.07.31 / National Science Council / Principle Investigator / NSC89-2218-E-194-007
  50. Speeding up the Computations of Lucas Function and Elliptic Curve Cryptosystems / 1999.08.01-2000.07.31 / National Science Council / Principle Investigator / NSC89-2213-E-194-002
  51. Spatial Similarity Retrieval in Video Database / 1999.08.01-2000.07.31 / National Science Council / Principle Investigator / NSC89-2213-E-194-003
  52. The Study of Some Image Compression Mechanisms (3/1) / 1999.08.01-2002.07.31 / National Science Council / Principle Investigator / NSC89-2213-E-194-020
  53. The Study of Secret Sharing Schemes for Secret Image and Cheater Identification Scheme / 1998.08.01-1999.07.31 / National Science Council / Principle Investigator / NSC88-2213-E-194-003
  54. Towards Indexing and Normalizing of Iconics for Image Similarity Retrieval / 1998.08.01-1999.07.31 / National Science Council / Principle Investigator / NSC88-2213-E-194-005
  55. The Design of Compression Method for Large Sparse Matrices / 1997.08.01-1998.07.31 / National Science Council / Principle Investigator / NSC87-2213-E-194-001
  56. The Design of Large Pictorial Database System / 1997.08.01-1998.07.31 / National Science Council / Principle Investigator / NSC87-2213-E-194-003
  57. A Study on Encryption and Decryption Technologies in Satellite Communications / 1996.08.01-1997.07.31 / National Space Program Office/ Principle Investigator / NSC86-NSPO(A)-PC-FA06-02
  58. Toward the Research and Development of Key Technology for RSA-type Public Key Cryptoschemes / 1996.08.01-1999.07.31 / National Science Council / Principle Investigator / NSC86-2213-E-194-001
  59. A Design of Spatial Data Structure and Spatial Data Filters / 1996.08.01-1997.07.31 / National Science Council / Principle Investigator / NSC86-2213-E-194-003
  60. The Computation of the Modular Multi-Exponentiation / 1995.08.01-1996.07.31 / National Science Council / Principle Investigator / NSC85-2213-E-194-010
  61. The Study of a Fast Cascade Exponentiation Evaluating Scheme / 1994.08.01-1995.07.31 / National Science Council / Principle Investigator / NSC84-2213-E-194-001
  62. The Study of a Secret Voting System on Computer Networks / 1994.02.01-1995.07.31 / National Science Council / Principle Investigator / NSC83-0408-E-194-013 / NSC84-0408-E-194-006
  63. The Resource Allocations in Multi-processor Systems / 1994.02.01-1995.07.31 / National Science Council / Co-Investigator
  64. The Study of Compressing in Chinese Computing Environment / 1993.08.01-1994.07.31 / National Science Council / Principle Investigator / NSC82-0408-E-194-002
  65. The Study of Generalized Group-Oriented Secret Sharing / 1993.02.01-1994.01.31 / National Science Council / Principle Investigator / NSC82-0408-E-194-027
  66. Digital Signature Based on the Error-Correcting Codes / 1992.08.01-1993.07.31 / National Science Council / Co-Investigator / NSC82-0408-E-194-003
  67. The Study of a Storage and Retrieval Scheme for Chinese Multi-Character Words / 1992.08.01-1993.07.31 / National Science Council / Principle Investigator / NSC82-0408-E-194-009
  68. Identity-Based Cryptosystem Design and Implementation / 1992.08.01-1993.07.31 / National Science Council / Co-Investigator
  69. New Concepts for Multiple Stack System: Born and Reborn / 1992.02.01-1993.01.31 / National Science Council / Principle Investigator / NSC81-0K08-E-194-507
  70. On Research and Development of a Content-Independent Data Compression Scheme / 1991.08.01-1992.07.31 / National Science Council / Principle Investigator / NSC81-0408-E-194-03
  71. Parallel Computation-Theories , Systems and Applications / 1991.08.01-1994.07.31 / National Science Council / Co-Investigator
  72. On Research and Development of Dictionary Compressing and Searching Technologies / 1991.02.01-1992.01.31 / National Science Council / Principle Investigator / NSC80-0408-E194-12
  73. Planning the Computer Cryptological Research / 1990.08.01-1990.12.31 / National Science Council / Principle Investigator / NSC80-0408-E194-06
  74. The Study of Dynamic Key-Lock-Pair Access Control Schemes / 1990.08.01-1991.07.31 / National Science Council / Co-Investigato
  75. Design and Performance Comparison of Some Signature Extraction Schemes for Symbolic Pictures / 1990.08.01--1991.07.31 / National Science Council / Principle Investigator / NSC80-0408-E194-02
  76. On the Design of Password Authentication Systems / 1990.02.01-1991.01.31 / National Science Council / Principle Investigator / NSC79-0408-E194-03
  77. The Studies of Designing Optimal Multi-attribute File Systems by the MMI Method for Orthogonal Range Retrieval / 1990.02.01-1991.01.31 / National Science Council / Co-Investigator
  78. A Compression Method for Chinese and English Data / 1989.08.01-1990.07.31 / National Science Council / Principle Investigator / NSC79-0408-E194-01
  79. Some Cryptosystems Based upon Euclidean Geometry / 1988.12.01-1990.01.31 / National Science Council / Principle Investigator / NSC78-0408-E005-02
  80. The Study of Data Compression in Chinese Textual Files / 1989.02.01-1990.01.31 / National Science Council / Co-Investigator / NSC78-0408-E005-03
  81. The Study of Information Security Schemes / 1988.08.01-1989.07.31 / National Science Council / Principle Investigator / NSC78-0408-E005-01
  82. The Studies of Pattern Near-Matching Both in Chinese and in English / 1988.04.01-1989.03.31 / National Science Council / Co-Investigator / NSC77-0408-E005-04
  83. Visual Form Conversion Expert System-Design and Development / 1988.01.01-1989.03.31 / National Science Council / Co-Investigator / NSC77-0408-E005-03
  84. Applying Multi-variant Analysis Techniques to Information Storage and Retrieval / 1987.12.01-1988.11.30 / National Science Council / Principle Investigator / NSC77-0408-E005-02
  85. Some Properties of Multi-attribute File Systems for Orthogonal Range Retrieval / 1987.12.01-1988.11.30 / National Science Council / Co-Investigator / NSC77-0408-E035-02
  86. The Study of a Dynamic Access Control Scheme / 1987.08.01-1988.07.31 / National Science Council / Principle Investigator / NSC77-0408-E005-01
  87. The Study of Retrieving Techniques of Phonetic Syllables / 1987.04.01-1988.03.31 / National Science Council / Co-Investigator / NSC76-0408-E005-04
  88. On the Design and Analysis of Multi-disk File Allocation Method for Concurrent Retrieval / 1987.01.01-1988.03.31 / National Science Council / Co-Investigator / NSC76-0408-E035-03
  89. The Study of Inductive Question Answering and Data Integrity / 1986.12.01-1987.11.30 / National Science Council / Co-Investigator / NSC76-0408-E005-03
  90. The Study and Development of Approximate Patten Matching in Large Textual Files / 1986.12.01-1987.11.30 / National Science Council / Co-Investigator / NSC76-0408-E035-01
  91. The Difficulty of Construction Perfect Hashing Functions / 1986.12.01-1987.11.30 / National Science Council / Principle Investigator / NSC76-0408-E005-02
  92. The Development and Evaluation of a Secure Broadcasting System / 1986.08.01-1987.07.31 / National Science Council / Principle Investigator / NSC76-0408-E005-01
  93. The Study of Allocating Multiple Key Hashing File System Among Multiple Disks / 1986.04.01-1987.03.31 / National Science Council / Principle Investigator / NSC75-0408-E005-04
  94. Optimal Cartesian Product Files for Concurrent Disk Accessing / 1986.04.01-1987.03.31 / National Science Council / Co-Investigator / NSC75-0408-E035-02
  95. The Development of a CAI System for Structured Assembly Language Programming / 1985.12.01-1986.11.30 / National Science Council / Co-Investigator / NSC75-0408-E005-03
  96. Symbolic Solver for Recurrence Relations / 1985.08.31-1986.07.31 / National Science Council / Principle Investigator / NSC75-0408-E005-02
  97. An Information Protection Scheme Based upon Number Theory / 1985.08.01-1986.07.31 / National Science Council / Principle Investigator / NSC75-0408-E005-01
  98. The Study of an Letter-oriented Minimal Perfect Hashing Scheme / 1984.11.01-1985.10.31 / National Science Council / Principle Investigator / NSC74-0408-E005-02
  99. Some Design and Allocation Problems for Concurrent Disk Accessing / 1984.08.01-1985.07.31 / National Science Council / Principle Investigator / NSC74-0408-E005-01
  100. Optimal Multi-attribute Hashing Scheme when Quires are not Ran / 1983.08.01-1984.05.31 / National Science Council / Principle Investigator / NSC73-0208-M005-01
  101. Minimal Perfect Hashing Scheme Based Upon Number Theory / 1982.12.20-1983.11.19 / National Science Council / Principle Investigator / NSC72-0404-E009-013
  1. The Intellectual Property Rights University Campus Visit Project / 2007.04.01-2007.09.30 / Ministry of Education / Co-Investigator
  2. Multi-function digital watermarking system / 2003.09.01-2004.08.31 / CHENG LIN INFORMATION CO., LTD. / Principle Investigator
  3. A Mechanism of Treating Emergent Events of Information Security for E-Government / 1998.09.01-1999.02.28 / Research, Development and Evaluation Commission, Executive Yuan / Co-Investigator
  4. On the Study and Development of Technical Rule, Management Mechanism and Validation for Cryptographic Modules in Communication Security / 1998.08.01-1999.05.31 / Directorate General of Telecommunications, Ministry of Transportation and Communications / Associate Program Director
  5. Planning the Draft Proposal of Information Security Standards / 1998.08.01-1999.05.31 / National Bureau of Standards, Ministry of Economic Affairs / Researcher
  6. The Proposal of Information Security Standards / 1997.09.01-1998.05.31 / National Bureau of Standards, Ministry of Economic Affairs / Principle Investigator
  7. The Proposal of Information Security Management for Government Organization / 1997.03.01-1997.06.30 / Research, Development, and Evaluation Commission, Taiwan Provincial Government / Principle Investigator
  8. The Editing of Outlines of Localized Teaching Materials for Contemporary Computer Cryptography / 1994.12.01-1995.05.31 / Advisory Office, Ministry of Education / Principle Investigator / Taiwan (84) 005535
  9. Setting High Speed Network and the Application Platform for National Chung Cheng University / 1994.12.01-1995.06.30 / Ministry of Education / Co-Investigator
  10. The Development of a New Digital Multisignature System / 1994.07.01-1995.06.30 / Chung-Shan Institute of Science and Technology / Principle Investigator / CS84-0210-D-194-001
  11. An Information Management System for Middle and Long-term Projects of Province Affairs / 1994.08.01-1995.05.31 / Research, Development, and Evaluation Commission, Taiwan Provincial Government / Principle Investigator
  12. The Study of an Open De-Virus System / 1991.09.01-1992.06.30 / Ministry of Education / Principle Investigator / MOECC81-A003
  13. The Design of a Database for Service Control Points / 1991.07.01-1992.06.30 / Chunghwa Telecom Laboratories, Ministry of Transportation and Communications / Principle Investigator / TL-81-1101
  14. The Status and Requirements of Computer System Security / 1991.03.01-1991.06.30 / Institute for Information Industry / Principle Investigator
  15. A Secure Broadcasted System for Military Secret Data / 1991.02.01-1992.01.31 / Chung-Shan Institute of Science and Technology / Principle Investigator / CS80-0210-D194-01
  16. A Design of Security Architecture on Message Handing System and Directory System / 1990.08.01-1991.07.31 / Directorate General of Telecommunications, Ministry of Transportation and Communications / Principle Investigator / TL-81-3201
  17. A Study of Advanced Communication Protocol for Its Security and Verification / 1990.08.01-1991.07.31 / Directorate General of Telecommunications, Ministry of Transportation and Communications / Principle Investigator / TL-81-3105
  18. The Research and Development of a Palm Carried Electronic Memory Card / 1989.12.01-1990.05.31 / Pusan Technology Cooperation / Principle Investigator
  19. Planning the County Government Information System for Taitung County Government / 1990.11.01-1991.06.30 / Taitung Country Government / Principle Investigator
  20. The Study of Chinese Computing Technology and the Development of Chinese Information System / 1988.07.01-1989.04.30 / Chung-Shan Institute of Science and Technology / Principle Investigator
  21. Planning the City Government Information System for Taichung City Government / 1988.07.01-1989.06.30 / Taichung City Government / Principle Investigator
  22. The Application of Computers to Courses Agriculture / 1988.01.01-1988.07.20 / Department Taiwan Provincial Government of Education / Principle Investigator
  23. The Application of Computers to Courses for Home Economics / 1988.01.01-1988.07.20 / Department Taiwan Provincial Government of Education / Principle Investigator
  24. The Design of an Automatic Terrain Map Generator / 1987.10.01-1988.09.30 / Control Data Cooperation, Taiwan / Principle Investigator
  25. The Design and Development of a Chinese Visual Form Oriented Programming System / 1985.08.01-1986.07.31 / Control Data Cooperation, Taiwan / Principle Investigator
  26. The Design and Implementation of a Database Management System / 1983.06.01-1984.05.31 / Control Data Cooperation, Taiwan / Principle Investigator
  1. (2023) Awarded the HONORARY PH-D DEGREE IN ENGINEERING, National Chung Cheng University, Taiwan.
  2. (2021) Stanford University released the list of the top 2% of the world's top scientists in 2021. Professor Chang's career influence ranks 189th in the world among more than 255,000 scientists in the field of Artificial Intelligence and Image Processing.
  3. (2021) Awarded the title of AAIA Fellow by the Asia-Pacific Artificial Intelligence Association in 2021. /*The Asia-Pacific Artificial Intelligence Association was founded in 2021. A total of 400 top scientists were elected as fellows in the first year, and only five scientists from Taiwan were awarded this honor. */
  4. (2020) Awarded the honorary title of CS Fellow by the Computer Society of the Republic of China in 2020. /*The Computer Society of the Republic of China was founded in June 1966. Since 2013, the title of CS Fellow, when awarded, is awarded annually to the person from academia or industry who has made the most significant contribution to Taiwan's IT. Previously, three academicians of the Academia Sinica of Taiwan, two Chief Executive of the Executive Yuan, two university presidents, and the chairman of Acer Computer, of Heshuo United Technology, and of ASUS Computer have received this honor. */
  5. (2020) The Best Paper Award of International Conference on Innovation and Management, Feb. 2020.
  6. (2019) Four publications were recognized as "Highly Cited Paper" by Essential Science Indicators (i.e., citation rate is ranked as 1% in the world): [1] Chang, Chin-Chen, and Hai-Duong Le. "A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks." IEEE Transactions on Wireless Communications 15.1 (2015): 357-366. [2] Qin, Chuan, Chin-Chen Chang, and Tai-Jung Hsu. "Reversible data hiding scheme based on exploiting modification direction with two steganographic images." Multimedia Tools and Applications 74.15 (2015): 5861-5872. [3] Qin, Chuan, Chin-Chen Chang, and Yi-Ping Chiu. "A novel joint data-hiding and compression scheme based on SMVQ and image inpainting." IEEE Transactions on Image Processing 23.3 (2013): 969-978. [4] Qin, C, Chang, C. C, Huang, Y. H, and Liao, L. T. (2012). "An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism." IEEE Transactions on Circuits and Systems for Video Technology, 23. 7 (2012): 1109-1118.
  7. (2019, 05) The Best Paper Award of 4th Cryptology and Information Security Conference, May. 2019.
  8. (2018, 06) The honorable mention award of the 4th International Conference on Cloud Computing and Securityce, Jun. 2018.
  9. (2017, 08) Ranked the top computer scientist in Taiwan by Guide2Research which released the world-class 1,000 top scientists in the computer field in August 2017.
  10. (2017, 06) The excellent paper award of International management engineering, software engineering and service science conference, Jan. 2017.
  11. (2015, 10) Supervised Dissertation Awarded for Outstanding Ph.D. Dissertation of Taiwanese Association for Consumer Electronics, Oct. 2015.
  12. (2014, 06) Received the IEEE Reliability Society 2014 Leadership Award.
  13. (2014, 06) The Best Paper Award of 2014 International Conference on Knowledge Engineering and Applications (ICKEA 2014), Jun. 2014.
  14. (2013, 12) The Best Paper Award of 2013 National Computer Symposium (NSC 2013), Dec. 2013.
  15. (2013, 09) Received the first Distinguished Research Award by the IET Society Taipei Branch.
  16. (2013, 05) Supervised Honorable Mention for MATLAB/Simulink of TeraSoft, May 2013.
  17. (2013, 01) Awarded the Distinguished Lecturer Medal by the IET Society Taipei Branch.
  18. (2012, 08) Received the 2012 AsiaJCIS Lifetime Achievement Award. /*This award is given annually to at most one outstanding cryptographic scientist in Asia who is over the age of 60, and Professor Chang is the only recipient of the award who has ever been recommended for this award while under the age of 60.*/
  19. (2012, 08) The Best Paper Award of the 2012 Seventh Asia Joint Conference on Information Security, Tokyo, Japan, Aug. 2012.
  20. (2012, 05) Supervised Honorable Mention for MATLAB Programing of TeraSoft, May 2012.
  21. (2011) Supervised Dissertation Awarded for Outstanding M.S. Dissertation of Taiwanese Association for Consumer Electronics, 2011.
  22. (2011, 05) The Best Paper Award of 2011 International Conference on Information Management (ICIM 2011), May 2011.
  23. (2011, 03) Received the Top Cited Paper Award by the 2005-2010 Pattern Recognition Letters Journal.
  24. (2011, 03) The Top Cited Paper Award of Pattern Recognition Letters, Mar. 2011.
  25. (2011, 03) Received the "Information Honor Medal of 2010”, the highest honor of the Information Society of the Republic of China. /*Awarded annually in Taiwan to the person who has made the most contribution to Taiwan IT.*/
  26. (2010, 08) Achieved runner-up status in the Most Prolific DBLP Authors in the world.
  27. (2009, 06) Selected by the Journal of Systems and Software as the world's top fifteen scholars in the field of systems and software engineering during the years of 2002 and 2006 (published in JSS, Vol. 82, 2009, pp. 1370–1373).
  28. (2009, 06) Winner of Top 15 Scholars in the World in the Field of Systems and Software Engineering During 2002 and 2006 [Ref: J. Systems and Software, Vol. 82, pp. 1370–1373, 2009], Jun 2009.
  29. (2009, 02) Chair Professor in Information Security of the National Chung Hsing University, Feb. 1, 2009.
  30. (2008, 08) The Best Paper Award of the IEEE International Symposium on Electronic Commerce and Security, Aug. 2008.
  31. (2006, 09) The Best Paper Award of GESTS International Transactions on Computer Science and Engineering by Global Engineering, Science, and Technology Society (GESTS), Sept. 2006.
  32. (2006, 08) The Best Paper Award of the 2006 International Conference on Innovative Computing, Information and Control, Beijing, China, Aug. 2006.
  33. (2006, 07) Certificate of Merit for the 2006 IAENG International Workshop on Computer Science (IWCS’06) by International Association of Engineers (IAENG), Hong Kong, Jul. 2006.
  34. (2006) Year 2006 Top 500 World’s Most Influential Scientist Award by the International Academy of Biographies, 2006.
  35. (2005, 08) The First Class National Science Council Project Grant within Three Years, Aug. 2005-Jul. 2008.
  36. (2005, 06) The Outstanding Contribution Award of Chinese Cryptology and Information Security Association, Jun. 2005.
  37. (2005, 01) Honorary Professor of the National Chung Cheng University, Jan. 2005.
  38. (2004, 03) The Excellent Paper Award of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), Fukuoka, Kyusyu, Japan, Mar. 2004.
  39. (2003, 07) Champion of the 2003 Campus Website Competition in the Teachers Group, National Chung Cheng University, Jul. 2003.
  40. (2003, 06) Awarded the 2003 Pan Wen-yuan Cultural and Educational Foundation Research Excellence Award. /*This award is given to the most outstanding Chinese computer scientists in the world, with a maximum of 5 people per year; one of the co-winners is Academician Yao Qi-zhi, Turing Award 2000 winner*/
  41. (2003, 05) Winner of Top 15 Scholars in the World in the Field of Systems and Software Engineering During 1998 and 2002 [Ref: J. Systems and Software, Vol. 68, pp. 77-84, 2003], May 2003.
  42. (2003, 03) Outstanding Alumni Award of the National Chiao Tung University, Mar. 2003.
  43. (2003, 01) Merit NSC Research Fellow Award of the National Science Council (NSC) of the Executive Yuan, Jan. 2003.
  44. (2003) The International Association for Cryptologic Research Gratefully Acknowledges Chin-Chen Chang for His Contribution to the Worldwide Cryptologic Community Through His Role General Chair of AsiaCrypt 2003, Taiwan, 2003.
  45. (2002, 11) Received the 2002 TECO Technology Award. /*The award is given to at most one person every year who has made outstanding contributions to the development of Electronic Engineering/Computer Engineering/Commutation Engineering in Taiwan. */
  46. (2002, 05) Selected by the Journal of Systems and Software as the world's top fifteen top scholars in the field of systems and software engineering during the years of 1997 and 2001 (published in JSS, Vol.64, 2002, pp.79-86).
  47. (2002, 04) Outstanding Alumni Award of the College of Electrical Engineering and Computer Science (EECS), National Tsing Hua University, Apr. 2002.
  48. (2002, 01) Chair Professor of the National Chung Cheng University, Jan. 18, 2002.
  49. (2002) TECO Technology Award of the TECO Technology Foundation, 2002.
  50. (2001) Top Fifteen Scholars in Systems and Software Engineering of the Journal of Systems and Software, 2001.
  51. (2001) Outstanding Electrical Engineering Professor Award of Chinese Institute of Electrical Engineering, 2001.
  52. (2001, 09) Best Paper Award at the 2001 International Workshop on Cryptography and Network Security, Sept. 2001.
  53. (2000, 09) Elected as an IET FELLOW of the British Institution of Electrical Engineers.
  54. (1999, 11) Awarded "Distinguished Talents Lecturer" by the Li Yuan-zhe, Nobel Prize winner, Outstanding Talents Development Foundation (for five consecutive years since November 1999)
  55. (1999) Outstanding Engineering Professor Award of Chinese Institute of Engineers of the R.O.C., 1999.
  56. (1999) Outstanding Scholar Award of Foundation for the Advancement of Outstanding Scholarship, 1999-2003.
  57. (1999) Outstanding Staff to Promote Information Education of Ministry of Education, 1999.
  58. (1998, 11) Elected as an IEEE FELLOW.
  59. (1996) Research Fellow, National Science Council of the R.O.C., 1996-Present.
  60. (1996) AceR Dragon Award for the Most Ten Outstanding Talents, 1996.\
  61. (1995) Distinguished Paper Award of the Information and Education Bimonthly, 1995.
  62. (1994) Outstanding Academic Research Award of the National Chung Cheng University, 1994.
  63. (1993) Research Achievement Award of the Ministry of Transportation and Communication of the R.O.C., 1993.
  64. (1992) Outstanding Teaching Materials Award of the Ministry of Education of the R.O.C., 1992.
  65. (1992) Supervised Dissertation Awarded for Outstanding Ph.D. Dissertation of the Xerox Company, 1992.
  66. (1991) Best Paper Award at the Second International Conference on CISNA Sponsored by British Council, 1991.
  67. (1990) AceR Dragon Dissertation Award for Outstanding Ph.D. Dissertation Study Supervision, 1990, 1997, 1998.
  68. (1990) AceR Dragon Thesis Award for Outstanding M.S. Thesis Supervision, 1990, 1991, 1992, 1997.
  69. (1986 - 1988, 1988 - 1990, 1990 - 1992, 1992 - 1994 and 1994 - 1996) Received five consecutive Outstanding Research Awards (Information Engineering) by the National Science Council of the Executive Yuan. /*Professor Chang is the scholar who has received this award the most times in Taiwan*/
  70. (1987) Chung-Shan Academic Publication Award of the Chung-Shan Academic Foundation of the R.O.C., 1987, 1997.
  71. (1984) Awarded the "First National Top Ten Outstanding Information Science Talents" by the Taiwan Ministry of Economic Affairs in 1984.
  72. (1982) Best Paper Award of the Society of Electrical Engineering of the R.O.C., 1982.
  73. (1980) Honorary member of the Phi Tau Phi Scholastic Honor Society of the Republic of China, 1980.
  1. Full of positive energy, unlimited possibilities for achievement/The College of Management, Chaoyang University of Technology/2024.03.12
  2. How to do scientific research and write high-quality academic papers/The College of Science and Engineering, National Dong Hwa University/2024.03.08
  3. Applying De-clustering Concept to Information Hiding/Keynote Speech at 2024 5th International Conference On Computer Vision and Computation Intelligence (CVCI 2024), Bangkok, Thailand/2024.01.29-2024.01.31
  4. Applying De-clustering Concept to Information Hiding/Keynote Speech at 2024 6th Asia Pacific Information Technology Conference (APIT 2024), Bangkok, Thailand/2024.01.29-2024.01.31
  5. Sharing Secrets Using Dual Images with Cheating Detection/Keynote Speech at 2023 Asia Symposium on Image and Graphics (ASIG 2023), Shanghai, China/2023.12.22-2023.12.24
  6. Innovative Information Hiding for Digital Media/Peking University Shenzhen Graduate School/2023.11.29
  7. Innovative Information Hiding for Digital Media/Jinan University/2023.11.28
  8. Information Steganography Using Magic Matrix/Guangzhou University Artificial Intelligence and Blockchain Research Institute/2023.11.26
  9. Information Steganography Using Magic Matrix/Keynote Speech at 2023 6th EAI International Conference on Security and Privacy in New Computing Environments (EAI SPNCE 2023), Guangzhou, China/2023.11.24-2023.11.26
  10. Information Steganography Using Magic Matrix/Keynote Speech at 2023 4th Asia Service Sciences and Software Engineering Conference(ASS 2023), Aizu-Wakamatsu, Japan/2023.10.27-2023.10.29
  11. Tips to Success/National Institute of Informatics/2023.10.26
  12. Full of Positive Energy to Achieve All Possibilities/Department of Electrical Engineering, Department of Information Engineering and Department of Industrial Management, National Quemoy University/2023.10.03
  13. Chang Quotes-accompanying You on The Road to Success/Department of Electrical Engineering, Department of Information Engineering and Department of Industrial Management, National Quemoy University/2023.10.03
  14. How to Plan And Complete High-quality College Studies/Department of Electrical Engineering, National Quemoy University/2023.10.02
  15. How To Be A Successful Graduate Student/Department of Information Management, National Chung Hsing University/2023.09.28
  16. Sharing Secret Message Using Meaningful Digital Images/Keynote Speech at 2023 Asia Conference on Algorithms, Computing and Image Processing (AACIP 2023), Qingdao, China/2023.09.23
  17. Applying De-clustering Concept to Information Hiding/Keynote Speech at 2023 2nd International Conference on Algorithms, Data Mining, and Information Technology (ADMIT 2023), Chengdu, China/2023.09.15-2023.09.17
  18. Secret Sharing Using Two Images with Authentication/Keynote Speech at 2023 6th International Conference on Data Science and Information Technology (DSIT 2023), Shanghai, China/2023.07.29
  19. Secret Sharing Using Two Images with Authentication/Keynote Speech at 2023 5th International Electronic Communication Conference (IECC 2023)/2023.07.22
  20. Sharing Secret Message Using Meaningful Digital Images/Keynote Speech at 2023 6th International Conference on Signal Processing and Machine Learning (SPML 2023)/2023.07.15
  21. Sharing Successful Experience with University Faculty/Tianjin University of Science and Technology/2023.07.14
  22. Sharing Secret Message Using Meaningful Digital Images with Cheater Detection/Keynote Speech at 2023 International Conference on Algorithms, Computing and Data Processing (ACDP 2023), Qingdao, China/2023.06.23
  23. Sharing Secret Message Using Meaningful Digital Images with Cheater Detection/Keynote Speech at 2023 the 13th International Workshop on Computer Science and Engineering (WCSE 2023), Singapore/2023.06.16
  24. Sharing Secret Message Using Meaningful Digital Images with Cheater Detection/Wenzhou Institute of Technology/2023.06.03
  25. Sharing Secret Message Using Meaningful Digital Images with Cheater Detection and Its Future Research Directions/National Chung Cheng University/2023.06.01
  26. Data Compression Based on Indirect Addressing Strategy/NDHU College of Science and Engineering/2023.05.04
  27. Data Compression Based on Indirect Addressing Strategy/National QueMoy University/2023.04.24
  28. How to Do Scientific Research/Ningbo University/2023.04.14
  29. Positive energy creates endless possibilities/National Chung Cheng University/2023.03.14
  30. Appilcations of CRT in Information Science/Department of Computer Science and Information Engineering, National Chung Cheng University/2023.03.13
  31. Lossless Compression Schemes of Vector Quantization Indices Using State Codebook/國立雲林科技大學資訊工程系/2023.03.08
  32. The Design of Computer Password/School of Medical Informatics, Chung Shan Medical University/2023.02.24
  33. Visual Cryptography/Department of Management Information Systems, National Chung Hsing University/2023.02.23
  34. Appilcations of CRT in Information Science/College of Informatics, Chaoyang University of Technology/2023.02.21
  35. A virtual image cryptosystem based upon vector quantization/Keynote Speech at 2023 5th Asia Pacific Information Technology Conference (APIT 2023), Ho Chi Minh City, Vietnam/2023.02.10
  36. Some Interesting Methods of Cryptography and Steganography/National Chung Hsing University/2022.12.12
  37. Information Hiding Schemes Based on Magic Matrices/National Central University/2022.12.09
  38. Sharing Secret Message Using Meaningful Digital Images with Cheater Detection/Wuhan University of Technology/2022.12.08
  39. How to Do Scientific Research/National Changhua University of Education/2022.12.02
  40. Applying De-clustering Concept to Information Hiding/Keynote Speech at 2022 International Workshop on Bigdata Intelligence and Security, Wuhan, China/2022.12.01
  41. Recent Developments of Information Hiding/National Development Management Institute, Bangkok, Thailand/2022.11.18
  42. Borrowing from nature to conceal information/Keynote Speech at 2022 5th International Conference on Digital Medicine and Image Processing (DMIP 2022), Kyoto, Japan/2022.11.11
  43. Information Hiding Schemes Based on Magic Matrices/China University of Mining and Technology/2022.10.19
  44. The Core Technology of Accelerating Encryption and Decryption Operation of Cryptographer/National Quemoy University/2022.09.26
  45. Information Hiding Schemes Based on Magic Matrices/Keynote Speech at 2022 International Conference on Algorithms, Data Mining, and Information Technology (ADMIT 2022), Xi'an, China/2022.09.23
  46. Nature-Inspired Information Hiding Techniques/Keynote Speech at 2022 5th International Conference on Signal Processing and Machine Learning (SPML 2022), Dalian, China/2022.08.05
  47. Sharing Secret Message Using Meaningful Digital Images with Cheater Detection/Keynote Speech at 2022 4th International Electronics Communication Conference (IECC 2022) Tokyo, Japan/2022.07.08-2022.07.10
  48. Travel in mainland China to witness the academic development/National QueMoy University/2022.05.02
  49. Borrowing from Nature to Conceal Information/Keynote Speech at 2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML 2022), Hangzhou, China/2022.03.25
  50. Embedding Secrets Using Magic Matrices/Chung Shan Medical University/2022.03.18
  51. Information Steganography Using Magic Matrix/Department of Computer Science and Information Engineering, National Chung Cheng University/2022.03.07
  52. Travel in mainland China to witness the academic development/Chaoyang University of Technology/2022.03.01
  53. Authenticatable Visual Secret Sharing/Keynote Speech at 3rd Asia Service Sciences and Software Engineering Conference (ASSE 2022), Macau, China/2022.02.25
  54. The Design of Computer Password/School of Medical Informatics, Chung Shan Medical University/2022.02.24
  55. Applying De-Clustering Concept to Information Hiding/Keynote Speech at 2022 The Third International Symposium on Future ICT (Future ICT 2022), Taichung, Taiwan/2022.01.17
  56. The way to success/Fu Jen Catholic University/2021.12.08
  57. The way to success/Chaoyang University of Technology/2021.12.07
  58. Borrowing from Nature to Conceal Information/Keynote Speech at 2021 3rd International Conference Big-data Service and Intelligent ComputationㄗBDSIC 2021ㄘ, Xiamen, China/2021.11.19-2021.11.21
  59. How to do scientific research and write paper/Shanghai Maritime University, Shanghai, China/2021.11.10
  60. Sharing Secret Message Using Meaningful Digital Images with Cheating Detection/Shanghai Maritime University, Shanghai, China/2021.11.10
  61. Visual Cryptography/National Quemoy University/2021.11.01
  62. Applying De-Clustering Concept to Information Hiding/Keynote Speech at 2021 The 17th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2021), Kaohsiung, Taiwan/2021.10.29
  63. Sharing Secret Message Using Meaningful Digital Images with Cheating Detection/National Chung Hsing University/2021.09.23
  64. Sharing Secret Message Using Meaningful Digital Images with Cheater Detection/Keynote Speech at the 2021 4th International Conference on Signal Processing and Machine Learning (SPML 2021), Beijing, China/2021.08.18-2021.08.20
  65. Information Steganography Using Magic Matrix/Yuan Ze University/2021.06.11
  66. Steganography of image compression code/Keynote Speech at the 2021 itaoi, QueMoy, Taiwan/2021.05.28
  67. Nature-Inspired Information Hiding Techniques/National Chin-Yi University of Technology/2021.05.11
  68. Borrowing from Nature to Conceal Information/National Taipei University of Education/2021.05.04
  69. Steganography of image compression code/National Pingtung University/2021.04.28
  70. Information Steganography Using Magic Matrix/National Pingtung University/2021.04.27
  71. Steganography of image compression code/Putian University, Putian, China/2021.04.07
  72. Applying De-Clustering Concept to Information Hiding/National QueMoy University/2021.03.15
  73. International travel and my experience/Chaoyang University of Technology/2021.03.09
  74. De-clustering concept to information hiding/Keynote Speech at the 2021 2nd Asia Service Sciences and Software Engineering Conference (ASSE 2021), Macau, China/2021.02.25
  75. Sharing Secret Message Using Meaningful Digital Images with Cheating Detection/Harbin Institute of Technology, Harbin, China/2020.12.20
  76. Applying De-Clustering Concept to Information Hiding/Keynote Speech at 2020 2nd International Conference on Big-data Service and Intelligent Computation (BDSIC 2020), Xiamen, China/2020.12.03-2020.12.05
  77. How to Do Scientific Research/Fuzhou University, Fuzhou, China/2020.12.02
  78. The Way to Success/Feng Chia University/2020.11.03
  79. Knowledge of International Tourism/National Chung Hsing University/2020.10.15
  80. Embedding Secrets Using Magic Matrices/Tunghai University/2020.10.12
  81. Embedding Secrets Using Magic Matrices/National Taichung University of Education/2020.10.12
  82. Sharing Secret Message Using Meaningful Digital Images with Cheating Detection/Asia University/2020.09.30
  83. Borrowing from Nature to Conceal Informatio/National Central University/2020.09.23
  84. The Road to Success/National QueMoy University/2020.09.22
  85. Sharing Secret Message Using Meaningful Digital Images with Cheating Detection/National QueMoy University/2020.09.21
  86. Witness the academic development of Taiwan/CSROC/2020.08.28
  87. Applying De-clustering Concept to Information Hiding/Keynote Speech atInternational Electronics Communication Conference (IECC), Singapore/2020.07.09
  88. Nature-Inspired Information Hiding Techniques/Keynote Speech at 2020 Asia Service Sciences and Software Engineering Conference (ASSE 2020), Nagoya, Japan/2020.05.13-2020.05.15
  89. Information Hiding Schemes Based on Magic Matrices/Keynote Speech at 2021 2nd International Symposium on Future Information and Communication Technology (Future ICT 2021), Taichung, Taiwan/2020.02.02
  90. Information Hiding Techniques Inspired by Nature/Keynote Speech at 2020 The 2nd Asia Pacific Information Technology Conference (APIT 2020), Bali, Indonesia/2020.01.17-2020.01.19
  91. Borrowing from Nature to Conceal Information/Jiangsu University, Wuxi, China/2019.12.26
  92. Borrowing from Nature to Conceal Information/Wuhan University, Wuhan, Hubei, China/2019.12.24
  93. How to do scientific research/Wuhan University, Wuhan, Hubei, China/2019.12.24
  94. Borrowing from Nature to Conceal Information/Keynote Speech at 2019 IEEE 4th International Conference on Communication and Information Systems (ICCIS 2019&ICSCC), Wuhan, China/2019.12.21-2019.12.23
  95. Borrowing from Nature to Conceal Information/Wenzhou University, Wenzhou, China/2019.12.20
  96. How to Do Scientific Research/Wenzhou University, Wenzhou, China/2019.12.20
  97. Borrowing from Nature to Conceal Information/Jinan University, Guangzhou, China/2019.12.18
  98. Borrowing from Nature to Conceal Information/Keynote Speech at 2019 2nd International Conference on Signal Processing and Machine Learning (SPML 2019), Hangzhou, China/2019.11.27-2019.11.29
  99. Embedding Secret Information in Digital Images/Keynote Speech at 2019 the 9th International Conference on Communication and Network Security (ICCNS 2019),Chongqing, China/2019.11.15-2019.11.17
  100. Sharing Experience in Paper Writing and Paper Submission/School of computer science, Jimei University, Xiamen, China/2019.11.15
  101. Borrowing from Nature to Conceal Information/National QueMoy University/2019.11.14
  102. Borrowing from Nature to Conceal Information/School of computer science, Huaqiao University, Xiamen, China/2019.11.14
  103. Applying De-clustering Concept to Information Hiding/Zhongfu Research Institute, Hangzhou University of Electronic Science and Technology, Hangzhou, China/2019.11.04
  104. Applying De-Clustering Concept to Information Hiding/Image Research Institute, Hangzhou University of Electronic Science and technology, Hangzhou, China/2019.11.04
  105. Information Hiding Techniques Based on ( 7,4) Hamming Code/Zhejiang University of Finance and Economics, Hangzhou, China/2019.11.01
  106. Sharing Experience in Writing and Publishing a Research Paper/School of information management, Central China Normal University, Wuhan, China/2019.10.30
  107. A Self-Reference Watermarking Scheme Based on Wet Paper Coding/Keynote Speech at 2019 International Conference on Video, Signal and Image Processing (VSIP 2019),Wuhan, China/2019.10.29-2019.10.31
  108. Information Hiding Techniques Using Magic Matrix/School of information engineering, Ningbo University, Ningbo, China/2019.10.29
  109. The Development and Application of Information Security Technique/School of science and technology, Ningbo University, Ningbo, China/2019.10.28
  110. Information Hiding Techniques Using Magic Matrix/Keynote Speech at 2019 Twelfth International Symposium on Information Processing (ISIP 2019), Shanghai, China/2019.10.26-2019.10.27
  111. A Steganographic Algorithm Based on (7, 4) Hamming Code/Keynote Speech at 2019 International Conference on Big-data Service and Intelligent Computation (BDSIC 2019), Wuhan, China/2019.10.18-2019.10.20
  112. Information Hiding Techniques Using Magic Matrix/Wuhan Institute Of Technology, Wuhan, China/2019.10.18
  113. Information Hiding Techniques Using Magic Matrix/Huazhong University Of Science And Technology, Wuhan, China/2019.10.18
  114. Information Hiding Techniques Based on ( 7,4) Hamming Code/Department of Information Management, Chaoyang University of Technology/2019.10.08
  115. Cryptography and Its Applications/National QueMoy University/2019.10.04
  116. How to Be an Outstanding Young Scholar/Putian University, Putian, China/2019.09.28
  117. The Recent Development of Information Security/Fujian Polytechnic Normal University, Fuqing, China/2019.09.27
  118. Information Hiding Techniques Based on ( 7,4) Hamming Code/College of Computer and Information Sciences, Fujian Agriculture and Forestry University, Fuzhou, China/2019.09.26
  119. The Recent Development of Information Security/Fujian Police College, Fuzhou, China/2019.09.26
  120. A Self-Reference Watermarking Scheme Based on Wet Paper Coding/Fujian University of Technology, Fuzhou, China/2019.09.25
  121. Information Hiding Techniques Based on ( 7,4) Hamming Code/Fuzhou University, Fuzhou, China/2019.09.24
  122. Information Hiding Techniques Based on ( 7,4) Hamming Code/Department of Computer Science Information Engineering, National Yunlin University of Science and Technology/2019.09.18
  123. Appilcations of Chinese Remainder Theorem/Putian University, Putian, China/2019.08.21
  124. Cryptography and Its Application/Putian University, Putian, China/2019.08.20
  125. A Color Image Hiding Scheme Based on SMVQ and Modulo Operator/Shangyu Research Institute, Hangzhou University of Electronic Science and Technology/2019.08.19
  126. How to Do Scientific Research and Write a High-quality Paper/Zhongfu Research Institute, Hangzhou University of Electronic Science and Technology/2019.08.15
  127. Current Research on Information Hiding/Keynote Speech at International Electronics Communication Conference, Okinawa, Japan/2019.07.08
  128. Embedding Secret Information in Digital Images Using Magic Turtle Shells/Keynote Speech at 2019 4th International Conference on Image, Vision and Computing, Xiamen, China/2019.07.06
  129. How to Do Scientific Research and Write a High-quality Paper/Xiamen University, Xiamen, China/2019.07.05
  130. Experiences in Application for a Project and Writing a Paper/Jimei University, Xiamen, China/2019.07.04
  131. Information Hiding Technology Based on Declustering Strategy/Sichuan Normal University, Chengdu, China/2019.06.12
  132. A steganographic method for hiding secret data using side match vector quantization/College of Information and Communication Engineering, University of Electronic Science and Technology/2019.06.11
  133. Information Hiding Technology Based on Declustering Strategy/Xihua University, Chengdu, China/2019.06.11
  134. Digital Image Recognition Technology/Central Police University/2019.05.21
  135. A Self-Reference Watermarking Scheme Based on Wet Paper Coding/Beijing University of Technology, Beijing, China/2019.05.15
  136. Authenticatable Visual Secret Sharing/Taiyuan University of Science and Technology, Taiyuan, China/2019.05.13
  137. A Color Image Hiding Scheme Based on SMVQ and Modulo Operator/Taiyuan University of Science and Technology, Taiyuan, China/2019.05.13
  138. A Self-Reference Watermarking Scheme Based on Wet Paper Coding/Guangdong University of Technology, Guangzhou, China/2019.05.11
  139. The Application of Chinese Remainder Theorem in Information Science/Jimei university, Xiamen, China/2019.04.24
  140. A Self-Reference Watermarking Scheme based on Wet Paper Coding/Department of Computer Science, Huaqiao University, Xiamen, China/2019.04.24
  141. The Application of Chinese Remainder Theorem in Information Science/National Quemoy university/2019.04.22
  142. How to transmit information safely and effectively/Department of Computer Science & Communication Engineering, Providence university/2019.04.12
  143. Sharing Secret Message Using Meaningful Digital Images with Cheating Detection/Department of computer science, Tunghai university/2019.03.27
  144. The Application of Chinese Remainder Theorem in Information Science/Putian University, Putian, China/2019.03.22
  145. Information Hiding Technology Based on Declustering Strategy/Fujian Polytechnic Normal University, Fuqing, China/2019.03.21
  146. Information Hiding Techniques Based on ( 7,4) Hamming Code/Fujian University of Technology, Fuzhou, China/2019.03.20
  147. Steganography based on magic matrix/Minjiang University/2019.03.20
  148. A Self-Reference Watermarking Scheme Based on Wet Paper Coding/Fuzhou University, Fuzhou, China/2019.03.19
  149. Authenticatable Visual Secret Sharing/Fujian normal university, Fuzhou, China/2019.03.19
  150. How to Conduct Scientific Research and Write a High-quality Paper/Fujian Police College, Fuzhou, China/2019.03.18
  151. Turtle Shell Based Information Hiding Mechanism/Macau University of Science and Technology, Macau, China/2019.03.14
  152. A Steganographic Algorithm Based on ( 7,4) Hamming Code/Keynote Speech at 2019 Asia Pacific Information Technology Conference (APIT 2019) Jeju Island, Korea/2019.01.25- 2019.01.27
  153. Sharing Secrets Using Authenticatable Digital Images/Keynote Speech at 2019 the 4th International Conference on Multimedia and Image Processing (ICMIP 2019), Kuala Lumpur, Malaysia/2019.01.20
  154. How to Conduct Scientific Research and Write a High-quality Paper/School of Computer Science and Engineering, Wuhan University of Engineering/2019.01.14
  155. Sharing Secret Message Using Meaningful Digital Images with Cheating Detection/Keynote Speech at 2019 the 3rd International Conference on Management Engineering, Software Engineering and Service Sciences (ICMSS 2019)/2019.01.13
  156. Information Hiding Techniques Based on ( 7,4) Hamming Code/School of Computer Science, Hubei University of Technology, Wuhan, China/2019.01.12
  157. Turtle Shell Based Information Hiding Mechanism/National Engineering Research Center for E-Learnning, Central China Normal University, Wuhan, China/2019.01.11
  158. Essentials of Research, Contribution and Publication for Papers/National Engineering Research Center for E-Learnning, Central China Normal University, Wuhan, China/2019.01.11
  159. How to Conduct Scientific Research and Write a High-quality Paper/College of Science, Hubei University of Technology, Wuhan, China/2019.01.11
  160. How to be an Outstanding Young Scholar/School of Information Management, Central China Normal University, Wuhan, China/2019.01.10
  161. How to Conduct Scientific Research and Write a High-quality Paper/Wuhan University of Technology, Wuhan, China/2019.01.10
  162. How to be an Outstanding Young Scholar/College of Information and Electrical Engineering, Feng Chia University/2019.01.08
  163. Sharing Secrets Using Authenticatable Digital Images/Keynote Speech at the 2nd International Conference on Video and Image Processing(ICVIP 2018), Hongkong, China/2018.12.29- 2018.12.31
  164. Turtle Shell Based Information Hiding Mechanism/Putian University, Putian, China/2018.12.21
  165. How to Do Scientific Research and Write a High-quality Paper/Fujian Agriculture and Forestry University, Fuzhou, China/2018.12.20
  166. How to Conduct Scientific Research and Write a High-quality Paper/Fujian University of Technology, Fuzhou, China/2018.12.19
  167. How to Conduct Scientific Research and Write a High-quality Paper/Fujian Polytechnic Normal University, Fuqing, China/2018.12.18
  168. How to be an Outstanding Young Scholar/Fujian Polytechnic Normal University, Fuqing, China/2018.12.18
  169. Information Hiding Techniques Based on ( 7,4) Hamming Code/Fujian Normal University, Fuzhou, China/2018.12.17
  170. Turtle Shell Based Information Hiding Mechanism/East China Normal University, Shanghai, China/2018.11.30
  171. How to Conduct Scientific Research and Write a High-quality Paper/University of Shanghai for Science and Technology, Shanghai, China/2018.11.30
  172. Information Hiding Technologyㄩ Current Research and Future Trend/Keynote Speech at the International Conference on Signal Processing and Machine Learning, Shanghai, China/2018.11.28- 2018.11.30
  173. Information Hiding Techniques Based on ( 7,4) Hamming Code/Beijing University of Technology, Beijing, China/2018.11.27
  174. How to Conduct Scientific Research and Write a High-quality Paper/Minzu University of China, Beijing, China/2018.11.26
  175. Steganography based on magic matrix/Minzu University of China, Beijing, China/2018.11.26
  176. Information Hiding Techniques Based on ( 7,4) Hamming Code/National QueMoy University/2018.11.19
  177. How to Conduct Scientific Research/Guangdong University of Technology, Guangzhou, China/2018.10.26
  178. Turtle Shell Based Information Hiding Mechanism/Shenzhen University, School of Information Engineering, Shenzhen, China/2018.10.25
  179. Sharing Secret Message Using Meaningful Digital Images with Cheater Detection/Harbin Institute of Technology, Shenzhen, China/2018.10.25
  180. Steganography Based on Magic Matrix/Neusoft Institute Guangdong, Foshan, China/2018.10.24
  181. Current Research on Information Hiding/National Taitung University, Department of Information Engineering and Computer Science/2018.10.19
  182. Sharing Secret Message Using Meaningful Digital Images with Cheater Detection/Providence University, Department of Computer Science and Information Management/2018.10.17
  183. Authenticatable Visual Secret Sharing/Computer Engineering College, Jimei University, Xiamen, China/2018.10.12
  184. Current Research on Information Hiding/Software School of Xiamen University, Xiamen, China/2018.10.11
  185. How to Do Scientific Research and Write a High-quality Paper/Xiamen University of Technology, Xiamen, China/2018.10.10
  186. Sharing Secret Message Using Meaningful Digital Images with Cheater Detection/Department of Information Management, Chaoyang University of Technology/2018.10.09
  187. Current Research on Information Hiding/Department of Information Engineering and Computer Science, Feng Chia University/2018.10.04
  188. Current Research on Information Hiding/Keynote Speech at the 2018 IEEE Conference on Information,Communication and Engineering (ICICE 2018), Xiamen, China/2018.09.29
  189. Sharing Secret Message Using Meaningful Digital Images with Cheater Detection/Keynote Speech at the International Symposium on Image Processing (ISIP 2018),Shanghai/2018.09.22
  190. Turtle Shell Based Information Hiding Mechanism/University of Science & Technology Beijing/2018.07.30
  191. Applying De-clustering Concept to Information Hiding/Keynote Speech at the 2nd International Conference on Algorithms, Computing and Systems (ICACS 2018), Beijing, China/2018.07.27-2018.07.29
  192. A Self-Reference Watermarking Scheme Based on Wet Paper Coding/Keynote Speech at the 3rd IEEE International Conference on Image, Vision and Computing (ICIVC 2018),Chongqing, China/2018.06.28
  193. Steganography Based on Turtle Shell/Chongqing University of Posts and Telecommunications, School of Cyberspace Security and Information Law/2018.06.28
  194. A Self-Reference Watermarking Scheme Based on Wet Paper Coding/Xihua University, Chengdu, China/2018.06.26
  195. Using Meaningful Digital Shadow Images to Recover a Secret Message/University of Electronic Science and Technology of China/2018.06.26
  196. Sharing Secret Message Using Meaningful Digital Images with Cheating Detection/Sichuan Normal University, Chengdu, China/2018.06.25
  197. Using Meaningful Digital Shadow Images to Recover a Secret Message/Fujian Normal University, Fuzhou, China/2018.05.24
  198. A Self-Reference Watermarking Scheme Based on Wet Paper Coding/Fujian Agriculture and Forestry University, Fuzhou, China/2018.05.24
  199. Sharing Secret Message Using Meaningful Digital Images with Cheating Detection/FuJian University of Technology, Fuzhou, China/2018.05.23
  200. Steganography Based on Magic Matrix/Fujian Polytechnic Normal University, Fuqing, China/2018.05.23
  201. Using Meaningful Digital Shadow Images to Recover a Secret Message/Taiyuan University of Science and Technology, Taiyuan, China/2018.05.16
  202. A Self-Reference Watermarking Scheme Based on Wet Paper Coding/Taiyuan University of Science and Technology, School of Electronic Information Engineering, Taiyuan, China/2018.05.15
  203. A Digital Watermarking Scheme Based on VQ/Taiyuan University of Science and Technology, School of Electronic Information Engineering, Taiyuan, China/2018.05.15
  204. Sharing Secret Message Using Meaningful Digital Images with Cheating Detection/University of Shanghai for Science and Technology, Shanghai, China/2018.05.14
  205. Sharing Secret Message Using Meaningful Digital Images with Cheating Detection/Keynote Speech at the 10th International Conference on Digital Image Processing (ICDIP 2018), Shanghai, China/2018.05.12
  206. Steganography Based on Turtle Shell/National QUEMOY University, Department of Information Engineering/2018.05.07
  207. Applying De-clustering Concept to Information Hiding/Keynote Speech at the 3rd International Conference on Multimedia Systems and Signal Processing (ICMSSP 2018), Shenzhen, China/2018.04.28-2018.04.30
  208. Steganography Based on Magic Matrix/Guangdong University of Technology, Guangzhou, China/2018.04.22
  209. Steganography Based on Magic Matrix/Hangzhou Dianzi University, School of Computer Science and Technology, Hangzhou, China/2018.04.18
  210. Sharing Secret Message Using Meaningful Digital Images with Cheating Detection/Zhejiang University of Finance & Economics, School of information management and Engineering, Hangzhou, China/2018.04.18
  211. Sharing Secret Message Using Meaningful Digital Images with Cheating Detection/Hangzhou Dianzi University, Institute of image technology, Hangzhou, China/2018.04.17
  212. An Information Hiding Scheme Using Turtle Shells/Hangzhou Dianzi University, School of Computer Science and Technology, Hangzhou, China/2018.04.17
  213. News of International Tourism/Hangzhou Dianzi University, School of Computer Science and Technology, Hangzhou, China/2018.04.17
  214. Information Hiding Technology Based on De-clustering Strategy/Huaqiao University, Xiamen, China/2018.03.29
  215. Using Meaningful Digital Shadow Images to Recover a Secret Message/Xiamen University of Technology, School of computer and Information Engineering, Xiamen, China/2018.03.29
  216. Steganography Based on Turtle Shell/Jimei University, Xiamen, China/2018.03.28
  217. Current Research on Information Hiding/Keynote Speech at the 3rd International Conference on Multimedia and Image Processing (ICMIP 2018), Guiyang, China/2018.03.17
  218. Turtle Shell Based Information Hiding Mechanism/Feng Chia University, Department of Information Engineering and Computer Science/2018.02.08
  219. Extended Exploiting-Modification-Direction Data Hiding with High Embedding Capacity/Keynote Speech at the International Conference on Management Engineering, Software Engineering and Service Sciences (ICMSS 2018), Wuhan, China/2018.01.13-2018.01.15
  220. A Data Hiding Scheme Based on a Reference Matrix and a Location Table/Keynote Speech at the 2017 International Conference on Video and Image Processing (ICVIP 2017), Singapore/2017.12.28
  221. The Way to Success/China Medical University/2017.12.26
  222. Turtle Shell Based Information Hiding Mechanism/Keynote Speech at the 12th KIPS International Conference on Ubiquitous Information Technologies and Applications (CUTE 2017), Providence University/2017.12.18
  223. Sharing Secret Message Using Meaningful Digital Images with Cheating Detection/Keynote Speech at the 6st International Conference on Network, Communication and Computing (ICNCC 2017), Kunming, China/2017.12.08-2017.12.10
  224. Embedding Secrets Using Magic Matrices/Department of Computer Science and Information Engineering, National Yunlin University of Science and Technology/2017.11.22
  225. Turtle Shell Based Information Hiding Mechanism/"Master party" salon, College Of Computer Science, South-Central University for Nationalities/2017.11.08
  226. Information Hiding Technology : Current Research and Future Trend/Keynote Speech at the 2nd International Conference on Communication and Information Systems (ICCIS 2017), Wuhan, China/2017.11.07-2017.11.09
  227. Rambling on about Research Methods/Department of Information Management, Chaoyang University of Technology/2017.10.31
  228. Rambling on about Research Methods/College of Computer Science and Technology, Huaqiao University, Xiamen, China/2017.10.24
  229. Information Security Professional Outlet/Undergraduate professional of Information Security, Huaqiao University, Xiamen, China/2017.10.24
  230. Rambling on about Research Methods/Computer Engineering College, Jimei University, Xiamen, China/2017.10.24
  231. Turtle Shell Based Information Hiding Mechanism/Huaqiao University, Xiamen, China/2017.10.23
  232. Turtle Shell Based Information Hiding Mechanism/College of Computer and Information Sciences, Fujian Agriculture and Forestry University, Fuzhou, China/2017.10.20
  233. Rambling on about Research Methods/College of Mathematics and Informatics, Fujian Normal University, Fuzhou, China/2017.10.20
  234. Authenticatable Visual Secret Sharing/Fujian University of Technology, Fuzhou, China/2017.10.18
  235. Authenticatable Visual Secret Sharing/School of Information, Zhejiang University of Finance & Economics, Hangzhou, China/2017.10.17
  236. Authenticatable Visual Secret Sharing/School of Computer Science, Hangzhou Dianzi University, Hangzhou, China/2017.10.15
  237. Information Hiding Technology : Current Research and Future Trend/School of Information & Electronic Engineering, Zhejiang Gongshang University, Hangzhou, China/2017.10.14
  238. Turtle Shell Based Information Hiding Mechanism/Hangzhou Dianzi University, Hangzhou, China/2017.10.14
  239. Visual Cryptography & Digital Signature Technology/Forensic industry information application theme salon, Ningpo, China/2017.10.13
  240. News of International Tourism/Department of Civil Engineering and Engineering Management, National Quemoy University/2017.09.22
  241. Using Meaningful Digital Shadow Images to Recover a Secret Message/Keynote Speech at the 2nd International Conference on Multimedia Systems and Signal Processing (ICMSSP 2017), Taichung/2017.08.14
  242. Turtle Shell Based Information Hiding Mechanism/Keynote Speech at the 10th International Conference on Advanced Computer Theory and Engineering (ICACTE 2017), Jeju Island, South Korea/2017.08.11
  243. Sharing Secret Message Using Meaningful Digital Images with Cheating Detection/School of Computer and Software Engineering, Chengdu, China/2017.06.04
  244. Information Hiding Techniques Based on ( 7,4) Hamming Code/School of Mathematical Sciences, Sichuan Normal University, Chengdu, China/2017.06.03
  245. Embedding Important Information in Digital Images Using Magic Turtle Shells/Keynote Speech at the International Conference on Image, Vision and Computing (ICIVC 2017), Chengdu, China/2017.06.02-2017.06.04
  246. Sharing Secret Message Using Meaningful Digital Images with Cheating Detection/School of Electronic Engineering, University of Electronic Science and Technology of China, Chengdu, China/2017.06.01
  247. Applying De-Clustering Concept to Information Hiding/Keynote Speech at Cryptology and Information Security Conference 2017 (CISC 2017), I-Shou University/2017.05.25
  248. A Self-Reference Watermarking Scheme Based on Wet Paper Coding/eynote Speech at the International Conference on Digital Image Processing (ICDIP 2017), Hong Kong/2017.05.19-2017.05.22
  249. Using Genetic Algorithm to Embed Important Information in an Image Compression File/Keynote Speech at the 34th Workshop on Combinatorial Mathematics and Computation Theory, Department of Information Engineering and Computer Science, Feng Chia University/2017.05.19
  250. How to Be a Successful Graduate Student/Department of Computer Science and Information Engineering, National Chung Cheng University/2017.04.24
  251. Turtle Shell Based Information Hiding Mechanism/Beijing University of Technology, Beijing, China/2017.04.20
  252. A Self-Reference Watermarking Scheme Based on Wet Paper Coding/Beijing Tsinghua University, Beijing, China/2017.04.19
  253. Information Hiding Techniques Based on ( 7,4) Hamming Code/College of Computer Science and Technology, Huaqiao University, Xiamen, China/2017.04.17
  254. Turtle Shell Based Information Hiding Mechanism/Department of Computer Science and Information Engineering, Tamkang University/2017.03.30
  255. News of International Tourism/Department of Information Management, National Taichung University of Science and Technology/2017.03.23
  256. Turtle Shell Based Information Hiding Mechanism/College of Computer Science, Sichuan University, Chengdu, China/2017.03.21
  257. A Self-Reference Watermarking Scheme Based on Wet Paper Coding/University of Electronic Science and Technology/2017.03.20
  258. Information Hiding Mechanisms Based on Magic Matrices/Keynote Speaker at the International Conference on Multimedia and Image Processing (ICMIP 2017)/2017.03.18
  259. Turtle Shell Based Information Hiding Mechanism/College of Computing and Informatics, Hubei University of Technology, Wuhan, China/2017.03.17
  260. Turtle Shell Based Information Hiding Mechanism/College of Computing and Informatics, Providence University/2017.03.09
  261. Turtle Shell Based Information Hiding Mechanism/Department of Information Management, Chaoyang University of Technology/2017.03.07
  262. A Self-Reference Watermarking Scheme Based on Wet Paper Coding/Department of Medical Informatics, Tzu Chi University/2017.03.03
  263. A Self-Reference Watermarking Scheme Based on Wet Paper Coding/Department of Information Engineering, National Dong Hwa University/2017.03.03
  264. Information Steganography Using Magic Matrix/China University of Geosciences, Wuhan, China/2017.01.16
  265. A Novel Data Hiding Method to Conceal Secret Data/International Conference on Management Engineering, Software Engineering and Service Sciences (ICMSS 2017) Keynote Speaker/2017.01.15
  266. Turtle Shell Based Information Hiding Mechanism/The 4th International Conference on Information and Network Security Keynote Speaker/2016.12.29
  267. Guide for Writing a Project Proposal and Key to Success in Academic Research/Tunku Abdul Rahman University, Malaysia/2016.12.28
  268. Information Hiding Technology Current Research and Future Trend/Tunku Abdul Rahman University, Malaysia/2016.12.28
  269. My Research Projects/Tunku Abdul Rahman University, Malaysia/2016.12.28
  270. Turtle Shell Based Information Hiding Mechanism/Chiayi, Taiwan, International Computer Symposium (ICS 2016), Keynote speaker/2016.12.16
  271. Some Steganographic Methods for Delivering Secret Messages Using Cover Media/National Taichung University of Science and Technology/2016.12.09
  272. How to Publish IEEE Journal Papers/Chaoyang University of Technology/2016.11.29
  273. How to Write a Plan of Ministry of Science and Technology/Central Taiwan University of Science and Technology/2016.11.25
  274. Some Steganographic Methods for Delivering Secret Messages Using Cover Media/Kaohsiung, Taiwan, The 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2016), Keynote speaker/2016.11.21
  275. Applying De-clustering Concept to Information Hiding/Fujian University of Technology, Fuzhou, China/2016.11.16
  276. Applying De-clustering Concept to Information Hiding/Fujian Normal University, Fuzhou, China/2016.11.15
  277. Steganographic Technique Based on Magic Matrix/Fuzhou University, Fuzhou, China/2016.11.15
  278. The Application of Chinese Remainder Theorem in Information Science/Fujian University of Technology, Fuzhou, China/2016.11.14
  279. The Application of Chinese Remainder Theorem in Information Science/Chung Shan Medical University/2016.09.23
  280. The Application of Chinese Remainder Theorem in Information Science/Beijing Information Science & Technology University, Beijing, China/2016.09.19
  281. Embedding Secret Messages in Digital Images/New Taipei City, Taiwan, The 2016 International Conference on Multimedia Systems and Signal Processing (ICMSSP 2016), Keynote speaker/2016.09.04
  282. Information Hiding Techniques Using Magic Matrix/Beijing, China, The 2016 IEEE International Conference on Signal and Image Processing (ICSIP 2016), Keynote speaker/2016.08.14
  283. De-clustering and Its Application to Steganography/Taiyuan University of Science and Technology, Taiyuan, China/2016.08.12
  284. Turtle Shell Based Information Hiding Mechanism/Beijing, China, The 10th Cross Strait Conference on Information Science and Technology(CSCIST 2016), Keynote speaker/2016.07.29
  285. Using Coding Techniques to Hide Secret Information/Department of Computer Science and Information Technology, Beijing Jiaotong University, Beijing, China/2016.07.28
  286. Information Steganography Using Magic Matrix/College of Information Engineering, Zhejiang Agriculture and Forestry University, Hangzhou, China/2016.07.07
  287. How to Be a Successful Graduate Student/School of Computer Science, Hangzhou Dianzi University, Hangzhou, China/2016.07.06
  288. A Novel Data Hiding Method to Conceal Secret Data/Hangzhou International Forum of Big Data and E-commerce Keynote Speaker, China/2016.07.06
  289. Rambling on about Research Methods/Computer and Information Science, Southwest University, Chongqing, China/2016.06.06
  290. Information Steganography Using Magic Matrix/Long in the pulpit, Hubei University of Arts and Science, Xiangyang, China/2016.06.03
  291. Information Steganography Using Magic Matrix/Computer and Information Science, China Three Gorges University, Yichang, China/2016.06.02
  292. Turtle Shell Based Information Hiding Mechanism/College of Computer Science, Jingzhou Yangtze University, Jingzhou, China/2016.06.01
  293. How to Create High Quality Research Papers/College of Computer Science, Jingzhou Yangtze University, Jingzhou, China/2016.05.31
  294. Exentials of Scientific Paper/College of Computer Science, Jingzhou Yangtze University, Jingzhou, China/2016.05.31
  295. Information Steganography Using Magic Matrix/Computer Science and Technology, Wuhan University of Technology, Wuhan, China/2016.05.30
  296. How to Create High Quality Research Papers/School of Information Management, Huazhong Normal University, China/2016.05.30
  297. Exentials of Scientific Paper/School of Information Management, Huazhong Normal University, China/2016.05.30
  298. Using Coding Techniques to Hide Secret Information/College of Information Science and Technology, Southwest Jiaotong University, Chengdu, China/2016.05.24
  299. Information Hiding Technology and Optimal Problem/Chengdu University of Information Technology, Chendu, China/2016.05.23
  300. Applying De-Clustering Concept to Information Hiding/Chengdu Electronic Engineering, University of Electronic Science and Technology, China/2016.05.23
  301. Exentials of Scientific Paper/Chengdu Electronic Engineering, University of Electronic Science and Technology, China/2016.05.23
  302. Information Hiding Techniques Based on ( 7,4) Hamming Code/Chengdu, China, The 8th International Conference on Digital Image Processing (ICDIP 2016), Keynote speaker/2016.05.21
  303. Rambling on about Research Methods/Computer Science, Northwestern Polytechnical University, Xi’an, China/2016.05.18
  304. Applying De-Clustering Concept to Information Hiding/Computer Science, Northwestern Polytechnical University, Xi’an, China/2016.05.18
  305. Authenticatable Visual Secret Sharing/Computer Science, Northwestern Polytechnical University, Xi’an, China/2016.05.18
  306. Information Hiding Technology and Optimal Problem/Communication and Information Engineering, Xi'an University of Posts and Telecommunications, Xi’an, China/2016.05.16
  307. How to Create High Quality Research Papers/Chaoyang University of Technology Department of Information Management/2016.05.06
  308. Exentials of Scientific Paper/Chaoyang University of Technology Department of Information Management/2016.05.06
  309. Information Hiding Techniques Based on ( 7,4) Hamming Code/National Dong Hwa University Information Engineering/2016.04.29
  310. Information Hiding Techniques Based on ( 7,4) Hamming Code/Information Engineering, National Sun Yat-sen University/2016.04.22
  311. Using Coding Techniques to Hide Secret Information/Electronic Engineering, Tsinghua University, Beijing, China/2016.04.20
  312. How to Create High Quality Research Papers/Optical-Electrical and Computer Engineering, Shanghai Polytechnic University/2016.04.15
  313. Exentials of Scientific Paper/Optical-Electrical and Computer Engineering, Shanghai Polytechnic University/2016.04.15
  314. Turtle Shell Based Information Hiding Mechanism/Department of Information Science, National Chengchi University/2016.03.10
  315. A Steganographic Algorithm Based on ( 7,4) Hamming Code/Taichung, Feng Chia University (Keynote Speech at The First Workshop on Cryptography and Steganography)/2016.02.25
  316. The experience sharing of paper writting and proposal editing/Mingdao University/2015.11.24
  317. Information Hiding Techniques Based on ( 7,4) Hamming Code/Information Department of Medicine, Chung Shan Medical University/2015.11.13
  318. Authenticatable Visual Secret Sharing/Hangzhou, China (Keynote Speech at The 9th International Conference on Management of e-Commerce and e-Government (ICMeCG2015)/2015.10.31
  319. Information Hiding Techniques Based on ( 7,4) Hamming Code/School of Computer Science, Northwestern Polytechnical University, , Xi’an, China/2015.10.28
  320. An Information Hiding Scheme Using Sudoku/School of Electronic and Information Engineering, Xi'an Jiaotong University, China/2015.10.27
  321. How to Publish IEEE Papers/Software Northwestern Polytechnical University, China/2015.10.27
  322. Information Hiding Techniques Based on ( 7,4) Hamming Code/Information Engineering, Chang'an University, Xi’an, China/2015.10.26
  323. How to Publish IEEE Papers/Information Engineering, Chang'an University, Xi’an, China/2015.10.26
  324. Information Hiding Techniques Based on ( 7,4) Hamming Code/Department of Electronic Engineering, University of Electronic Science and Technology, China/2015.10.23
  325. How to Publish IEEE Papers/Southwest Jiaotong University, Chengdu, China/2015.10.22
  326. Information Hiding Techniques Based on ( 7,4) Hamming Code/China Hangzhou The 16th IEEE International Conference on Communication Technology (ICCT2015) special lecture/2015.10.20
  327. How to Publish IEEE Papers/Hangzhou University of Electronic Science and Technology China/2015.10.20
  328. The Road to Success/School of Management, University of Science and GTM/2015.10.15
  329. Information Hiding Techniques Based on ( 7,4) Hamming Code/Providence University Department of Information Management/2015.10.02
  330. How to Publish IEEE Papers/Feng Chia University Library/2015.09.23
  331. Information Steganography Using Magic Matrix/Shenzhen Institutes of Advanced Technology, Chineses Academy of Sciences, Guangzhou, China/2015.07.16
  332. Rambling on about Research Methods/Guilin University of Electronic Technology, Guilin, China/2015.07.13
  333. Information Steganography Using Magic Matrix/Fujian University of Technology, Fuzhou, China/2015.07.07
  334. Information Steganography Using Magic Matrix/Department of Management Information Systems, National Chung Hsing University/2015.06.04
  335. Information Steganography Using Magic Matrix/College of Computer and Information Engineering, Xiamen University of Technology, Xiamen, China/2015.05.05
  336. Rambling on about Research Methods/Oriental Institute of Technology/2015.04.22
  337. An Information Hiding Scheme Using SUDOKU/School of Information, Zhejiang University of Finance & Economics, Hangzhou, China/2015.04.16
  338. An Information Hiding Scheme Using SUDOKU/School of Electrical and Information Engineering, Tongji University, Shanghai, China/2015.04.13
  339. An Information Hiding Scheme Using SUDOKU/School of Electrical Information and Engineering, Shanghai Jiao Tong University, Shanghai, China/2015.04.10
  340. Appilcations of CRT in Information Science/School of Telecommunication and Information Engineering, Shanghai University, Shanghai, China/2015.04.09
  341. Appilcations of CRT in Information Science/School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai, China/2015.04.08
  342. Information Steganography Using Magic Matrix/Shenzhen Graduate School, Harbin Institute of Technology, Shenzhen, China/2015.03.17
  343. Rambling on about Research Methods/Peking University, Beijing, China/2015.03.16
  344. Using Genetic Algorithm to Embed Important Information in an Image Compression File/Hong Kong, China (Keynote Speech at The 2015 2nd International Conference on Electrical Engineering and Information Technology)/2015.03.13
  345. Turtle Shell Based Information Hiding Mechanism/Department of Computer Science and Information Engineering, National Taipei University/2015.03.04
  346. Research Methodology for Science and Technology/2014 International Computer Symposium/2014.12.13
  347. Turtle Shell Based Information Hiding Mechanism/Shenzhen Graduate School, Harbin Institute of Technology, Shenzhen, China/2014.12.09
  348. The Design of Computer Password/Huizhou University, Huizhou, China/2014.12.05
  349. Information Steganography Using Magic Matrix/Department of Management Information Systems, National Pingtung University of Science and Technology/2014.12.03
  350. Using Genetic Algorithm to Embed Important Information in an Image Compression File/Hangzhou Dianzi University, Hangzhou, China/2014.11.17
  351. The Design of Computer Password/Zhejiang Gongshang University, Hangzhou, China/2014.11.17
  352. Visual Cryptography/Jiangsu University, Wuxi, China/2014.11.14
  353. Turtle Shell Based Information Hiding Mechanism/Anhui University, Hefei, China/2014.11.12
  354. Hiding Information in a Digital Image/Shenzhen, China (Keynote Speech at The 2014 International Conference on Computer Engineering)/2014.11.10
  355. Information Hiding Techniques Using Magic Matrix/Taiyuan, Vietnam (Keynote Speech at 2014 International Symposium on GIS and Advanced Technologies)/2014.11.03
  356. Turtle Shell Based Information Hiding Mechanism/Xi'an, China (Keynote Speech at 2014 7th International Conference on Information Management, Innovation Management and Industrial Engineering)/2014.10.25
  357. Using Genetic Algorithm to Embed Important Information in an Image Compression File/Chang'an University, Xi’an, China/2014.10.24
  358. Using Genetic Algorithm to Embed Important Information in an Image Compression File/Northwestern Polytechnical University, Xi’an, China/2014.10.24
  359. Information Steganography Using Magic Matrix/Xi'an University of Architecture and Technology, Xi’an, China/2014.10.23
  360. Information Steganography Using Magic Matrix/Northwestern Polytechnical University, Xi’an, China/2014.10.22
  361. Using Genetic Algorithm to Embed Important Information in an Image Compression File/Nanchang, China (Keynote Speech at The 8th International Conference on Genetic and Evolutionary Computing)/2014.10.18
  362. A Watermarking Scheme for Categorical Relational Databases/Taipei (Keynote Speech at 2014 The 13th International Workshop on Digital-forensics and Watermarking)/2014.10.02
  363. The Road to Success/National Chung Cheng University/2014.09.30
  364. Some Techniques for Sharing Digital Secret Images/Chengdu, China (Keynote Speech at The 2014 International Conference on Information and Computer Technology)/2014.09.07
  365. Information Steganography Using Magic Matrix/School of Electronic Engineering, University of Electronic Science and Technology of China, Chengdu, China/2014.09.05
  366. Recent Developments in Information Hiding/Lijiang, China (Keynote Speech at 2014 International Conference on Multimedia and Communication Technologies)/2014.08.15
  367. Hiding Information in a Digital Image/Hong Kong, China (Keynote Speech at International Conference on Industrial and Applied Electronics)/2014.07.29
  368. Information Hiding Techniques/Jeju Island, Korea (Keynote Speech at The 3rd International Conference on Knowledge and Education Technology)/2014.07.04
  369. Key to High Quality Research/College of Computer Science and Technology, Huaqiao University, Xiamen, China/2014.06.18
  370. Hiding Information in a Digital Image/College of Computer Science and Technology, Huaqiao University, Xiamen, China/2014.06.18
  371. Quotations from Professor Chang/College of Computer Science and Technology, Huaqiao University, Xiamen, China/2014.06.18
  372. Authenticatable Visual Secret Sharing/Hong Kong, China (Keynote Speech at The 2014 International Conference on Knowledge Engineering and Applications)/2014.06.15
  373. Authenticatable Visual Secret Sharing/Tiachung, Taiwan (Keynote Speech at The First International Conference on Trustworthy System)/2014.06.09
  374. Digital Watermarking and Its Applications/Communication University of Zhejiang, Hangzhou, China/2014.05.23
  375. How to Create High Quality Research Paper/Hangzhou Dianzi University, Hangzhou, China/2014.05.22
  376. Professor Chang’s Sayings/Hangzhou Dianzi University, Hangzhou, China/2014.05.22
  377. Information Steganography Using Magic Matrix/Beijing Tsinghua University, Beijing, China/2014.05.21
  378. Information Steganography Using Magic Matrix/State Key Laboratory Of Information Security, Chinese Academy of Sciences, Beijing, China/2014.05.20
  379. Decluster and Its Application to Steganography/Beijing Jiaotong University, Beijing, China/2014.05.19
  380. Information Steganography Using Magic Matrix/North China Institute of Aerospace Engineering, Langfang, China/2014.05.19
  381. Rambling on about Research Methods/Taiyuan University of Science and Technology, Taiyuan, China/2014.05.16
  382. Information Steganography Using Magic Matrix/HuangHuai University, Zhumadian, China/2014.05.14
  383. Information Steganography Using Magic Matrix/Jeju Island, Korea (Keynote Speech at The 2014 3rd International Conference on Network and Computing Technology)/2014.04.12
  384. The Recent Developments in Visual Secret Sharing/Manila, Philippines (Keynote Speech at The 2014 International Conference on Circuits and Systems)/2014.03.21
  385. Information Steganography Using Magic Matrix/Department of Computer Science and Information Engineering, National Chung Cheng University/2014.03.10
  386. A Virtual Image Cryptosystem Based upon Vector Quantization/National Chung Hsing University-Information Security Seminar/2014.01.02
  387. Authenticatable Visual Secret Sharing/Department of Management Information Systems, National Chung Hsing University/2014.01.02
  388. Appilcations of CRT in Information Science/Jishou University, Jishou, China/2013.12.11
  389. Appilcations of CRT in Information Science/Hunan University of Technology(Young Computer Scientists & Engineers Forum), Hunan, China/2013.12.09
  390. Information Steganography Using Magic Matrix/XiangTan University(The College of Information Engineering) , XiangTan, China/2013.12.07
  391. Appilcations of CRT in Information Science/University of Electronic Science and Technology of China, Chengdu, China/2013.12.05
  392. Authenticatable Visual Secret Sharing/University of Electronic Science and Technology of China, Chengdu, China/2013.12.03
  393. Hiding Information in a Digital Image/Xidian, China (Keynote Speech at The 2013 5th International Conference on Information Management and Engineering), Xian, China/2013.12.02
  394. Appilcations of CRT in Information Science/Northwestern Polytechnical University(School of Computer Science), Xi’an, China/2013.11.25
  395. Information Steganography Using Magic Matrix/College of Communications Engineering , Xidian University(School of Computer Science), Xian, China/2013.11.25
  396. Authenticatable Visual Secret Sharing/Xidian, China (Keynote Speech at The 2013 International Conference on Information Management, Innovation Management and Industrial Engineering)/2013.11.23
  397. Information Steganography Using Magic Matrix/Chang'an University(School of Information Engineering), Xi’an, China/2013.11.22
  398. Appilcations of CRT in Information Science/School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou, China/2013.11.20
  399. The Design of Computer Password/Providence University/2013.11.19
  400. Information Steganography Using Magic Matrix/Central Police University/2013.11.08
  401. Recent Developments in Information Hiding/National Chung Hsing University-Information Security Seminar/2013.11.01
  402. Hiding Information in a Digital Image/Guilin University of Electronic Technology(College of Mathematics & Computer Science) , Guilin, China/2013.10.28
  403. Visual Cryptography/Hong Kong, China (Keynote Speech at The 2013 5th International Conference on Graphic and Image Processing)/2013.10.27
  404. Rambling on about Research Methods/Shenzhen Graduate School, Harbin Institute of Technology, Shenzhen, China/2013.10.25
  405. Appilcations of CRT in Information Science/Taiyuan University of Science and Technology, Taiyuan, China/2013.10.21
  406. Appilcations of CRT in Information Science/Fujian Normal University(School of Mathematics and Computer Science) , Fuzhou, China/2013.10.10
  407. Rambling on about Research Methods/Department of Information Engineering and Computer Science, Feng Chia University/2013.09.19
  408. The Road to Success/Department of Information Engineering and Computer Science, Feng Chia University/2013.09.12
  409. Learning and Growing for a Graduate Student/Department of Information Engineering and Computer Science, Feng Chia University/2013.09.05
  410. Information Steganography Using Magic Matrix/Department of Information Engineering and Computer Science, Feng Chia University/2013.08.22
  411. Embedding Secrets in Digital Images/Seoul, Korea (Keynote Speech at The 2013 8th Asia Joint Conference on Information Security)/2013.07.25
  412. Emoticon-Based Text Steganography in Online Chat tools/Anhui University(School of Computer Scince and Technology), Hefei, China/2013.07.23
  413. Embedding Secrets Using Magic Matrices/University of Science and Technology of China(School of Computer Scince and Technology) , Suzhou, China/2013.07.23
  414. Embedding Secrets in Digital Images/Chengdu, China (Keynote Speech at The 2013 2nd International Conference on Information and Knowledge Management)/2013.07.21
  415. How to Create High Quality Research Papers/School of Information Science & Technology Southwest JiaoTong University, Chengdu, China/2013.07.19
  416. Visual Cryptography and Information Steganography/Hong Kong, China (Keynote Speech at The 2013 4th International Conference on Signal and Information Processing)/2013.07.07
  417. Embedding Secrets Using Magic Matrices/Internet of Things, Jiangsu University, Wuxi, China/2013.05.29
  418. Appilcations of Chinese Remainder Theorem/Internet of Things, Jiangsu University, Wuxi, China/2013.05.29
  419. Rambling on about Research Methods/Internet of Things, Jiangsu University, Wuxi, China/2013.05.28
  420. Professor Chang’s Sayings/Internet of Things, Jiangsu University, Wuxi, China/2013.05.28
  421. Professor Chang’s Sayings/Internet of Things, Jiangnan University, Wuxi, China/2013.05.26
  422. Professor Chang’s Sayings/School of Computer Science and Technology, Hangzhou Dianzi University/2013.05.24
  423. Digital Watermarking and Its Applications/School of Media and Design, Hangzhou Dianzi University/2013.05.24
  424. Hiding Information in a Digital Image/Beijing, China (Keynote Speech at The 2013 International Conference on Electrical Engineering and Computer Sciences)/2013.05.22
  425. Appilcations of CRT in Information Science/Department of Information Engineering and Computer Science, Feng Chia University/2013.05.16
  426. Sharing Academic Work and Proposal Writing/Feng Chia University Libraries/2013.04.30
  427. Recent Developments in Information Hiding/Beijing, China (Keynote Speech at The 2013 5th International Conference on Digital Image Processing)/2013.04.22
  428. Recent Development of Information Hiding Steganography/School of Computer Science and Engineering, University of Electronic Science and Technology/2013.04.18
  429. Information Steganography Using Magic Matrix/School of Information Science & Technology Southwest JiaoTong University, Chengdu, China/2013.04.17
  430. Appilcations of CRT in Information Science/Department of Management Information Systems, National Chung Hsing University/2013.03.18
  431. Digital Watermarking and Its Applications/Xiamen, China (Keynote Speech at The 2013 3rd International Conference on Advanced Measurement and Test)/2013.03.13
  432. Embedding Secrets Using Magic Matrices/Software School of Xiamen University, Xiamen, China/2013.03.13
  433. Recent Developments in Information Hiding/Singapore (Keynote Speech at The 2013 International Conference on Innovation and Information Management)/2013.01.20
  434. Hiding Information in a Digital Image/National Taichung University of Science and Technology, IET Distinguished Lecture Series/2013.01.03
  435. Sharing Academic Work and Proposal Writing/2012 International Computer Symposium/2012.12.13
  436. Hiding Information in a Digital Image/Department of Medical Informatics, TZU CHI University/2012.12.13
  437. Recent Developments in Information Hiding/Bangkok, Thailand (Keynote Speech at The 2012 International Conference on Networks and Information)/2012.11.25
  438. Sharing Academic Work and Proposal Writing/College of Computer Science, Asia University/2012.11.22
  439. Appilcations of CRT in Information Science/Providence University, IET Distinguished Lecture Series/2012.11.20
  440. Appilcations of CRT in Information Science/Shenzhen University, Shenzhen, China/2012.11.15
  441. Appilcations of CRT in Information Science/GuangZhou Institutes of Advanced Technology, Chinese Academy of Sciences, Beijing, China/2012.11.14
  442. Embedding Secrets in Digital Images/Guangzhou University, Guangzhou, China/2012.11.13
  443. Appilcations of CRT in Information Science/Shenzhen Graduate School, Harbin Institute of Technology, Shenzhen, China/2012.11.12
  444. Self-growth of Young Scholar/Department of Computer Science and Information Engineering, Hungkuang University/2012.11.07
  445. Professor Chang’s Sayings/Department of Computer Science and Information Engineering, Hungkuang University/2012.11.07
  446. Recent Developments in Information Steganography/School of Medical Informatics, Chung Shan Medical University/2012.11.02
  447. Professor Chang’s Sayings/School of Medical Informatics, Chung Shan Medical University/2012.11.02
  448. Using Table Look-up Methods to Hide Secret Information/Hong Kong, China (Keynote Speech at The 2012 2nd International Conference on Information Communication and Management)/2012.10.27
  449. Visual Cryptography and Information Steganography/Department of Computer Science Information Engineering, National Yunlin University of Science and Technology/2012.10.24
  450. Professor Chang’s Sayings/Department of Computer Science Information Engineering, National Yunlin University of Science and Technology/2012.10.24
  451. Recent Developments in Information Hiding/Sanya, China (Keynote Speech at The 2012 International Conference on Information Management, Innovation Management and Industrial Engineering)/2012.10.20
  452. Visual Cryptography/Taipei, Taiwan (Keynote Speech at The 2012 International Conference on Advanced Materials and Information Technology Processing)/2012.10.17
  453. Appilcations of CRT in Information Science/School of Information Science and Technology, University of Science and Technology of China, Suzhou, China/2012.10.11
  454. Appilcations of CRT in Information Science/Anhui University, Hefei, China/2012.10.10
  455. Embedding Secrets in Digital Images/Dalian, China (Keynote Speech at The 2012 International Conference on Applied Physics and Materials Science)/2012.10.05
  456. Embedding Messages in Digital Images/Beijing, China (Keynote Speech at The 2012 The 4th International Conference on Advanced Science and Technology)/2012.09.27
  457. Appilcations of CRT in Information Science/The College of Information Engineering on XiangTan University, XiangTan, China/2012.09.25
  458. Table Look-up Methods for Storing and Retrieving Secret Messages/Beijing, China (Keynote Speech at The 2012 International Conference on Information and Computer Technology)/2012.09.16
  459. Information Hiding Technology and Optimal Problem/Beijing University of Chemical Technology, School of Management, Beijing, China/2012.09.15
  460. Appilcations of CRT in Information Science/Beijing Jiaotong University, Beijing, China/2012.09.13
  461. Some Steganographic Methods for Delivering Secret Messages Using Cover Media/Qingdao, China (Keynote Speech at The 2012 3rd International Conference on Information Technology for Manufacturing Systems)/2012.09.08
  462. Hiding Information in a Digital Image/Phuket Island, Thailand (Keynote Speech at The 2012 International Conference on Computer Design and Engineering)/2012.09.02
  463. Steganographic Systems for Secret Messages/Shanghai, China (Keynote Speech at The 2012 International Conference on Image, Vision and Computing)/2012.08.26
  464. Embedding Secrets Using Magic Matrices/Weihai, China (Keynote Speech at The 2012 3rd International Conference on Electronics and Information Engineering)/2012.08.25
  465. Recent Developments in Hiding Information/Hangzhou, China (Keynote Speech at The 2012 International Conference on Networking and Technology)/2012.08.24
  466. Rambling on about Research Methods/College of Computer, Hangzhou Dianzi University, Hangzhou, China/2012.08.23
  467. Hiding Secrets in a Digital Image/Seoul, Korea (Keynote Speech at The 2012 4th International Conference on Awareness Science and Technology)/2012.08.21
  468. Visual Cryptography and Information Steganography/Hong Kong, China (Keynote Speech at The 2012 2nd International Conference on Signal, Image Processing and Applications)/2012.08.04
  469. The Design of Visual Cryptosystems/Taiyuan, China (Keynote Speech at The 2012 International Conference on Computing Measurement Control and Sensor Network)/2012.07.07
  470. Digital Watermarking and Its Applications/Zhengzhou, China (Keynote Speech at The 2012 International Conference on Computer and Communication Devices)/2012.06.03
  471. Emoticon-Based Text Steganography in Online Chat tools/Zhengzhou University of Light Industry, Zhengzhou, China/2012.06.03
  472. Digital Watermarking and Its Applications/Shanghai, China (Keynote Speech at The 2012 2nd International Conference on Future Computers in Education)/2012.06.01
  473. Embedding Secret Messages in Texts/Cebu, Philippines (Keynote Speech at The 2012 International Conference on Information Science and Industrial Applications)/2012.05.30
  474. Emoticon-Based Text Steganography in Online Chat tools/Department Computer Science and Information Engineering, National Taichung University of Scienceand Technology/2012.05.24
  475. Emoticon-Based Text Steganography in Online Chat tools/Department of Management Information Systems, National Chung Hsing University/2012.05.17
  476. Information Steganography Using Magic Matrix/Guilin University of Technology, College of Information Science and Engineering, Guilin, China/2012.05.14
  477. Embedding Secret Messages in Texts/Guilin University of Technology, College of Information Science and Engineering, Guilin, China/2012.05.14
  478. Visual Cryptography and Information Steganography/Guangzhou, China (Keynote Speech at The 2012 2nd International Conference on Business Management and Electronic Information)/2012.05.12
  479. Information Steganography Using Magic Matrix/Fujian Polytechnic Normal University (School of Mathematics and Computer Science), Fuqing, China/2012.05.10
  480. Information Steganography Using Magic Matrix/Fujian Normal University(School of Mathematics and Computer Science), Fuzhou, China/2012.05.09
  481. Recent Developments in Information Hiding/Nanchang, China (Keynote Speech at The 2012 2nd International Conference on Materials, Mechatronics and Automation)/2012.05.07
  482. Recent Developments in Hiding Information/Chengdu, China (Keynote Speech at The 2012 International Conference on Network and Computing Technology)/2012.05.06
  483. Secret Sharing Using Digital Image Shadows/Shanghai, China (Keynote Speech at The 2012 The 6th International Conference on Information Security and Assurance)/2012.04.28
  484. Rambling on about Research Methods/Shenzhen Graduate School, Harbin Institute of Technology, Shenzhen, China/2012.03.26
  485. Secret Image Sharing Systems/Shenzhen, China(Keynote Speech at The 2012 International Conference on Information and Industrial Electronics)/2012.03.25
  486. Information Steganography Using Magic Matrix/Department of Computer Science and Information Engineering, National Dong Hwa University/2012.03.16
  487. Recent Developments in Information Steganography/Asia University, Taiwan (Keynote Speech at The 2012 Information Security Workshop)/2012.03.15
  488. Rambling on about Research Methods/National Central University, Department of Computer Science and Information Engineering/2012.03.14
  489. Professor Chang’s Sayings/National Central University, Department of Computer Science and Information Engineering/2012.03.14
  490. Secret Sharing Using Digital Image Shadows/Hong Kong, China (Keynote Speech at The 2012 International Conference on Security Science and Technology)/2012.03.11
  491. Secret Sharing Using Digital Image Shadows/Macao, China (Keynote Speech at The 2012 International Conference on Innovative Computing, Information and Automation)/2012.03.02
  492. Authenticatable Visual Secret Sharing/Taipei, Taiwan (Keynote Speech at The 2012 International Conference on Affective Computing and Intelligent Interaction)/2012.02.27
  493. Steganographic Methods Using Table Lookup Techniques/Sanya, China (Keynote Speech at The 2012 International Conference on Future Electrical Power and Energy Systems)/2012.02.22
  494. Steganographic Methods Using Table Lookup Techniques/Hong Kong, China (Keynote Speech at The 2012 International Conference on Information and Computer Applications)/2012.02.18
  495. Information Steganography Using Magic Matrix/Chengdu, China (Keynote Speech at The 2012 International Conference on Innovation and Information Management)/2012.01.08
  496. Rambling on about Research Methods/School of Information Science & Technology Southwest JiaoTong University, Chengdu, China/2012.01.06
  497. Information Steganography Using Magic Matrix/Department of Information Management National Chin-Yi University of Technology/2012.01.04
  498. A Genetic Algorithm for Density-Based Vector Quantization/Bangkok, Thailand (Keynote Speech at The 2011 2nd International Conference on Advances in Energy Engineering)/2011.12.27
  499. Information Steganography Using Magic Matrix/Department of Computer Science and Engineering, National Sun Yat-Sen University/2011.12.09
  500. Some Steganographic Methods Using Table Lookup Techniques/Chengdu, China (Keynote Speech at The 2011 International Conference on Networks and Information)/2011.11.26
  501. Secret Sharing Using Digital Image Shadows/Taichung, Taiwan (Keynote Speech at The 2011 Workshop on Consumer Electronics)/2011.11.11
  502. An Information Hiding Scheme Using Sudoku/Management Information Systems, National Chung-Hsing University/2011.11.10
  503. Secret Sharing Using Digital Image Shadows/Beijing, China (Keynote Speech at The 2011 SSITE International Conference on Computers and Advanced Technology in Education)/2011.11.03
  504. Introduction to Visual Cryptography/Department of Information Management, National United University/2011.10.27
  505. Professor Chang’s Sayings/Department of Information Management, National United University/2011.10.27
  506. Authenticatable Visual Secret Sharing/Wuhan, China (Keynote Speech at The 2011 International Symposium on Intelligence Information Processing and Trusted Computing)/2011.10.22
  507. The Road to Success/Shandong Technology and Business University, Yantai, China/2011.10.18
  508. Recent Developments in Information Hiding/Shandong Technology and Business University, Yantai, China/2011.10.18
  509. Authenticatable Visual Secret Sharing/Dalian, China (Keynote Speech at The 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing)/2011.10.14
  510. Information Steganography Using Magic Matrix/Intelligent Network Forum, Providence University/2011.10.07
  511. Recent Developments in Secret Image Sharing/Hong Kong, China (Keynote Speech at The 2011 International Conference on Internet Computing and Information Services)/2011.09.17
  512. An Information Hiding Scheme Using Sudoku/Tianjin, China (Keynote Speech at The 2011 2nd International Conference on electronics and Information Engineering)/2011.09.10
  513. Professor Chang’s Sayings/Beijing Jiaotong University, Beijing, China/2011.09.08
  514. Authenticatable Visual Secret Sharing/Beijing Jiaotong University, Beijing, China/2011.09.08
  515. Applying De-Clustering Concept to Information Hiding/Dalian University of Technology, Dalian, China/2011.08.30
  516. Professor Chang’s Sayings/Dalian University of Technology, Dalian, China/2011.08.30
  517. Information Steganography Using Magic Matrix/Yantai, China (Keynote Speech at The 2011 3rd International Conference on Signal Processing Systems)/2011.08.28
  518. Rapid Development of University Academics in China/Department Computer Science and Information Engineering, National Taichung Institite of Technology/2011.08.13
  519. Professor Chang’s Sayings/Department Computer Science and Information Engineering, National Taichung Institite of Technology/2011.08.13
  520. How to Create High Qualituy Academic Papers/Lanzhou University, Lanzhou, China/2011.08.02
  521. Scientific and Technological Paper Writing, Contributing, Publishing Essentials/Lanzhou University, Lanzhou, China/2011.08.02
  522. Professor Chang’s Sayings/Lanzhou University, Lanzhou, China/2011.08.02
  523. Authenticatable Visual Secret Sharing/Huangshi, China (Keynote Speech at The 2011 The 3rd International Conference on Information Technology and Computer Science)/2011.07.23
  524. Professor Chang’s Sayings/College of Computer, Hangzhou Dianzi University, Hangzhou, China/2011.07.21
  525. Information Steganography Using Magic Matrix/Xiamen, China (Keynote Speech at The 2011 International Conference on Intelligent Information Processing)/2011.07.08
  526. Embedding Secret Messages in Digital Images/Zhengzhou, China (Keynote Speech at The 2011 International Conference on Computer and Network Engineering)/2011.06.18
  527. Authenticatable Visual Secret Sharing/Chengdu, China (Keynote Speech at The 2011 4th IEEE International Conference on Computer Science and Information Technology)/2011.06.10
  528. Walk the Two Sides to See the Academic Rise of the Mainland/Management Information Systems, National Chung-Hsing University/2011.05.19
  529. Professor Chang’s Sayings/Management Information Systems, National Chung-Hsing University/2011.05.19
  530. An Information Hiding Scheme Using Sudoku/Guangzhou, China (Keynote Speech at The 2011 The International Conference on Business Management and Electronic Information)/2011.05.14
  531. Secret Sharing Using Digital Image Shadows/Shanghai, China (Keynote Speech at The 2011 International Conference on Information Technology for Manufacturing Systems)/2011.05.07
  532. Embedding Secret Messages in Digital Images/Beijing, China (Keynote Speech at The 2011 The 1st International Conference on High Performance Structures and Materials Engineering)/2011.05.05
  533. Authenticatable Visual Secret Sharing/Northeastern University at Qinhuangdao(Institute of Internet of Things and Information Security), Panyang, China/2011.05.04
  534. Embedding Secret Messages in Texts/Chengdu, China (Keynote Speech at The 2011 International Conference on Advanced Materials and Computer Science)/2011.05.01
  535. Information Hiding Scheme Using Sudoku/Wuhan, China (Keynote Speech at The 2011 3rd International Conference on Networks Security, Wireless Communications and Trusted Computing)/2011.04.23
  536. Transmission of Secret Messages Using Chat Tools/West Anhui University, Lu’an, China/2011.04.21
  537. Authenticatable Visual Secret Sharing/School of Computer Science and Technology, Anhui University, Hefei, China/2011.04.21
  538. Applying De-Clustering Concept to Information Hiding/Computer Science and Technology, Nanjing University of Information Science and Technology, Nanjing, China/2011.04.19
  539. Information Steganography Using Magic Matrix/Xianning, China (Keynote Speech at The 2011 The International Conference on Consumer Electronics, Communications and Networks)/2011.04.17
  540. Introduction to Visual Cryptography/Department of Computer Science and Information Engineering, National Chung Cheng University/2011.04.11
  541. How to Create High Quality Research Papers/I-Shou University/2011.03.23
  542. Visual Cryptography/Shanghai, China (Keynote Speech at The 2011 3rd International Conference on Computer Research and Development)/2011.03.12
  543. Recent Developments in Visual Cryptography/Macao, China (Keynote Speech at The 2011 2nd International Conference on Innovative Computing and Communication and 2011 2nd Asia-Pacific Conference on Information Technology and Ocean Engineering)/2011.03.06
  544. Introduction to Visual Cryptography/Taichung, Taiwan (Keynote Speech at The 2011 Information Education and Technological Application Conference)/2011.03.04
  545. Information Steganography Using Reference Matrices/National Central University, Department of Computer Science & Information Engineering/2011.03.02
  546. Information Steganography Using Reference Matrices/Hong Kong, China (Keynote Speech at The 2011 International Conference on Fuzzy Systems and Neural Computing)/2011.02.21
  547. Introduction to Visual Cryptography/Department of Computer Science and Engineering, National Chung-Hsing University/2011.01.14
  548. Visual Cryptography/Shanghai, China (Keynote Speech at The 2010 Second IITA International Joint Conference on Artificial Intelligence)/2010.12.26
  549. Applying De-Clustering Concept to Information Hiding/Chengdu, China (Keynote Speech at The 2010 International Conference on Information Security and Artificial Intelligence)/2010.12.18
  550. Visual Secret Sharing/Southwest Jiaotong University, School of Information Science and Technology, Chengdu, China/2010.12.17
  551. Authenticatable Visual Secret Sharing/Chongqing, China (Keynote Speech at The 2010 International Conference on Parallel and Distributed Computing and Networks)/2010.12.13
  552. Visual Cryptography/Sanya, China (Keynote Speech at The 2010 International Conference on Future Information Technology and Computing)/2010.12.10
  553. An Information Hiding Scheme Using Sudoku/Nanning, China(Keynote Speech at The 2010 International Conference on Future Computer, Control and Communication)/2010.12.10
  554. Applying De-Clustering Concept to Information Hiding/The College of Information Engineering on XiangTan University, XiangTan, China/2010.12.09
  555. Visual Secret Sharing/The College of Information Engineering on XiangTan University, XiangTan, China/2010.12.09
  556. Authenticatable Visual Secret Sharing/Hangzhou, China (Keynote Speech at The 2010 2nd International Conference on Information Science and Engineering)/2010.12.05
  557. Information Steganography Using Magic Matrix/Wuhan, China (Keynote Speech at The 2010 3rd International Conference on Computational Intelligence and Industrial Application)/2010.12.04
  558. Authenticatable Visual Secret Sharing/Chiayi, Taiwan (Keynote Speech at The 2010 International Conference on Information Security Management)/2010.11.26
  559. How to Create High Quality Research Papers/Feng Chia University Libraries/2010.11.25
  560. Applying De-Clustering Concept to Information Hiding/Shenzhen, China (Keynote Speech at The 2010 International Conference on Circuit and Signal Processing)/2010.11.21
  561. Recent Developments in Visual Cryptography/Shenzhen Graduate School, Harbin Institute of Technology, Shenzhen, China/2010.11.20
  562. College Students’ Learning Experience and Career Planning/Guilin University of Technology, Guilin, China/2010.11.19
  563. Recent Developments in Visual Cryptography/Guilin, China (Keynote Speech at The 2010 Third Pacific-Asia Conference on Web Mining and Web-based Application)/2010.11.18
  564. How to Create High Quality Research Papers/Guilin University of Technology, College of Information Science and Engineering, Guilin, China/2010.11.18
  565. Visual Secret Sharing/Guilin University of Technology, College of Information Science and Engineering, Guilin, China/2010.11.18
  566. Emotion-based Text Steganography in Chat/Chengdu, China (Keynote Speech at The 2010 The 3rd International Conference on Computer and Electrical Engineering)/2010.11.17
  567. How to Create High Quality Research Papers/College of Computer Science Of Chongqing University, Chongqing, China/2010.11.15
  568. Visual Secret Sharing/College of Computer Science Of Chongqing University, Chongqing, China/2010.11.15
  569. Embedding Secret Information in Digital Images/Qingdao, China (Keynote Speech at The 2010 The Third International Symposium on Information Processing)/2010.11.13
  570. Embedding Secret Information in Digital Images/Qingdao University of Science and Technology, College of Information Science and Technology, Qingdao, China/2010.11.13
  571. Embedding Secret Information in Digital Images/Guangzhou, China (Keynote Speech at The 2010 International Symposium on Information and Automation)/2010.11.11
  572. Applying De-Clustering Concept to Information Hiding/Kaohsiung, Taiwan (Keynote Speech at The 2010 2nd International Conference on Computational Collective Intelligence)/2010.11.10
  573. Information Steganography Using Magic Matrix/Qinhuangdao, China (Keynote Speech at The 4th International Conference on Intelligent Information Technology Application)/2010.11.06
  574. Recent Developments in Information Hiding/Xiamen, China (Keynote Speech at The 2010 International Conference on Bio-inspired Systems and Signal Processing)/2010.10.26
  575. A Survey of Linguistic Steganography/Huanggang, China (Keynote Speech at The 2010 International Symposium on Intelligence Information Processing and Trusted Computing)/2010.10.24
  576. Authenticatable Visual Secret Sharing/Taiyuan, China (Keynote Speech at The 2010 International Conference on Computer Application and System Modeling)/2010.10.23
  577. Information Steganography Using Magic Matrix/Taiyuan University of Science and Technology, Taiyuan, China/2010.10.22
  578. Delivering Secret Message Using Chat Tools/Kunming, China (Keynote Speech at The 2010 International Conference on Management Science)/2010.10.19
  579. Delivering Secret Message Using Chat Tools/Kunming, China (Keynote Speech at The 2010 International Conference on Software and Computing Technology)/2010.10.18
  580. The New Developments in Message Embedding/Wuhan, China (Keynote Speech at 2010 International Conference on Information,Communication and Edcuation Application)/2010.10.17
  581. How to Create High Quality Research Papers/Department of Information Management, National Taichung Institite of Technology/2010.10.14
  582. Teaching Experience Sharing/Department of Information Management, National Taichung Institite of Technology/2010.10.14
  583. Recent Developments in Visual Cryptography/Taiyuan, China (Keynote Speech at 2010 International Conference on Computational Aspects of Social Networks)/2010.09.27
  584. Authenticatable Visual Secret Sharing/Chongqing, China (Keynote Speech at 2010 International Conference on Educational and Information Technology)/2010.09.18
  585. Authenticatable Visual Secret Sharing/Nanchang, China (Keynote Speech at The Second Asia-Pacific Conference on Information Processings)/2010.09.17
  586. How to Be a Successful Graduate Student/Department of Management Information Systems, National Chung Hsing University/2010.08.31
  587. Delivering Secret Messages Using Chat Tools/Changchun China (Keynote Speech at 2010 International Conference on Computer, Mechatronics, Control and Electronic Engineering)/2010.08.25
  588. Authenticatable Visual Secret Sharing/Yangzhou China (Keynote Speech at 2010 International Colloquium on Computing, Communication, Control, and Management)/2010.08.21
  589. Visual Cryptography/Jiaozuo, China (Keynote Speech at 2010 The Third International SymposiumComputer Science and Computational Technology)/2010.08.14
  590. How to Be a Successful Graduate Student/Department of Information Management, National Taichung Institute of Technology/2010.08.09
  591. Authenticatable Visual Secret Sharing/Taichung, Taiwan (Keynote Speech at 2010 The IET International Conference on Frontier Computing)/2010.08.04
  592. Visual Cryptography/Beijing, China (Keynote Speech at 2010 Second Pacific-Asia Conference on Circuits,Communications and System)/2010.08.02
  593. Visual Cryptography/Huangshan, China (Keynote Speech at 2010 The Third International Symposium on Electronic Commerce and Security)/2010.07.29
  594. An Information Hiding Scheme Using Sudoku/Qingdao, China (Keynote Speech at 2010 The IITA International Conference on Nanotechnology and Computer Engineering)/2010.07.21
  595. Sharing Secrets Using Visual Cryptography/Dalian, China (Keynote Speech at 2010 The International Joint Conference on Artificial Intelligence)/2010.07.11
  596. Authenticatable Visual Secret Sharing/Zhejiang, China (Keynote Speech at 2010 TThe 3rd IEEE International Conference on Ubi-media Computing)/2010.07.07
  597. Authenticatable Visual Secret Sharing/Hangzhou Dianzi University, Hangzhou, China/2010.07.05
  598. De-clustering and Its Application to Steganography/Hongkong, China (Keynote Speech at 2010 The Second International Conference on Communication Systems, Networks and Applications)/2010.06.30
  599. Recent Developments in Text Steganography/Qinhuangdao, China (Keynote Speech at 2010 The International Conference on Computer Design and Applications)/2010.06.26
  600. An Information Hiding Scheme Using Sudoku/Shanghai, China (Keynote Speech at 2010 The 2nd International Conference on Education Technology and Computer)/2010.06.23
  601. Rambling on about Research Methods/Shanghai Ocean University, Shanghai, China/2010.06.22
  602. Scientific and Technological Paper Writing, Contributing, Publishing Essentials/Optical-Electrical and Computer Engineering, Unversity of Shanghai for Science and Technology/2010.06.21
  603. Authenticatable Visual Secret Sharing/Chengdu, China (Keynote Speech at 2010 International Conference on Computer and Communication Technologies in Agriculture Engineering)/2010.06.13
  604. The Road to Success/Kainan University/2010.06.07
  605. Embedding Information in Cover Digital Images Using Magic Matrices/Wuhan, China (Keynote Speech at 2010 International Conference on the Development of Educational Science and Computer Technology)/2010.05.30
  606. Self-growth of Young Scholars/Asia University/2010.05.27
  607. Recent Developments in Text Steganography/National Kinmen Institute of Technology/2010.05.21
  608. Visual Cryptography/Sanya, China (Keynote Speech at 2010 The 2nd International Conference on Modeling, Simulation and Visualization Methods)/2010.05.15
  609. Recent Developments of Visual Cryptography/Guangdong University of Finance and Economics, Foshan, China/2010.05.11
  610. An Information Hiding Scheme Using Sudoku/Wuhan, China (Keynote Speech at 2010 The IIS 2nd International Conference on Signal Processing, Robotics and Automation)/2010.05.10
  611. Emoticon-Based Text Steganography in Online Chat tools/Taiwan (Keynote Speech at 2010 The Forum of Consumer Electronics)/2010.05.07
  612. Image Steganography Using Magic Matrix/Tainan, Taiwan (Keynote Speech at 2010 International Symposium on Computer, Communication, Control and Automation)/2010.05.06
  613. New Developments in Visual Crypography/School of Electronic and Information Engineering, Dalian University of Technology, Dalian, China/2010.04.27
  614. Rambling on about Research Methods/School of Electronic and Information Engineering, Dalian University of Technology, Dalian, China/2010.04.27
  615. De-clustering and Its Application to Information Hiding/Kaifeng, China (Keynote Speech at 2010 International Conference on Machine Vision and Human-Machine Interface)/2010.04.25
  616. Recent Developments in Visual Cryptography/Wuhan, China (Keynote Speech at 2010 International Conference on Biomedical Engineering and Computer Science)/2010.04.24
  617. Self-growth of Young Scholars/School of Computer, Wuhan University, Wuhan, Hubei, China/2010.04.23
  618. Self-growth of Young Scholars/The School Physics and Telecommunication Englineering, South China Normal University, Guangzhou, China/2010.04.22
  619. Information Steganography Using Magic Matrix/The School Physics and Telecommunication Englineering, South China Normal University, Guangzhou, China/2010.04.22
  620. The Road to Success/School of Computer Science, Guangdong Polytechnic Normal University, Guangzhou, China/2010.04.21
  621. Rambling on about Research Methods/Shunde Polytechnic, Foshan, China/2010.04.20
  622. Scientific and Technological Paper Writing, Contributing, Publishing Essentials/School of Electronics and Information Engineering, South China University of Technology, Guangzhou, China/2010.04.19
  623. Rambling on about Research Methods/School of Electronics and Information Engineering, South China University of Technology, Guangzhou, China/2010.04.19
  624. Recent Developments in Text Steganography/Shenzhen, China (Keynote Speech at 2010 Asia-Pacific Conference on Wearable Computing Systems)/2010.04.18
  625. Recent Developments in Information Hiding/Chengdu, China (Keynote Speech at 2010 The 2nd IEEE International Conference on Information Management and Engineering)/2010.04.17
  626. Recent Developments in Visual Cryptography/Jinggangshan, China (Keynote Speech at 2010 Third International Symposium on Intelligent Information Technology and Security Informatics)/2010.04.03
  627. The Road to Success/Jinggangshan University, Ji’an, China/2010.04.02
  628. A Technique of Embedding Digital Data in an Image Compression Code Reversibly/National Taichung Institute of Technology, Department of Information Management/2010.03.18
  629. A Virtual Image Cryptosystem Based upon Vector Quantization/Wuhan, China (Keynote Speech at 2010 International Conference on Challenges in Environmental Science and Computer Engineering)/2010.03.05
  630. De-clustering and Its Application to Steganography/Macao, China (Keynote Speech at 2010 International Conference on Information Technology for Manufacturing Systems)/2010.01.30
  631. A Technique of Embedding Digital Data in an Image Compression Code Reversibly/Sanya, China (Keynote Speech at the 2nd International Conference on Computer Modeling and Simulation)/2010.01.22
  632. A Technique of Embedding Digital Data in an Image Compression Code Reversibly/SKKU, Suwon, Korea (Keynote Speech at the 4th International Conference on Ubiquitous Information Management and Communication )/2010.01.14
  633. Recent Developments in Text Stegnography/Shanghai, China (Keynote Speech at the Second International Symposium on Information Science and Engineering)/2009.12.27
  634. Recent Developments in Information Hiding/Huangshan, China (Keynote Speech at the 2nd International Symposium Computer Science and Computational Technology)/2009.12.26
  635. A Data Hiding Method for Text Documents Using Multiple-Base Encoding/Sanya, China (Keynote Speech at 2009 International Conference on Theoretical and Mathematical Foundations of Computer Science)/2009.12.12
  636. Steganographic Scheme Using Heuristic Codeword Assignment and Cascade-Shifting on VQ Image/Taipei, Taiwan (Keynote Speech at 2009 The 2nd IEEE International Conference on Ubi-media Computing)/2009.12.04
  637. Emoticon-Based Text Steganography in Online Chat tools/Wuhan, China (Keynote Speech at 2009 Asia-Pacific Conference on Computational Intelligence and Industrial Applications)/2009.11.28
  638. Emoticon-Based Text Steganography in Online Chat tools/Huanggang Normal University, Huanggang, China/2009.11.28
  639. Recent Development of Information Hiding Steganography/College of Computer, Hangzhou Dianzi University, Hangzhou, China/2009.11.26
  640. Embedding Data in a Wet Digital Image/College of Computer, Hangzhou Dianzi University, Hangzhou, China/2009.11.26
  641. Emoticon-Based Text Steganography in Online Chat tools/College of Computer, Hangzhou Dianzi University, Hangzhou, China/2009.11.26
  642. Emoticon-Based Text Steganography in Online Chat tools/Guangdong University of Finance and Economics, Foshan, China/2009.11.24
  643. Recent Development of Information Hiding Steganography/Guangdong University of Finance and Economics, Foshan, China/2009.11.24
  644. Rambling on about Research Methods/Guangdong University of Finance and Economics, Foshan, China/2009.11.24
  645. Emoticon-Based Text Steganography in Online Chat tools/Shenzhen Graduate School, Harbin Institute of Technology, Shenzhen, China/2009.11.23
  646. A Wet Image Data Hiding Scheme Based on Coordinate Modifications/Nanchang, China (Keynote Speech at the 3rd International Conference on Intelligent Information Technology Application)/2009.11.21
  647. Rambling on about Research Methods/Nanchang Hangkong University, Nanchang, China/2009.11.21
  648. Recent Development of Information Hiding Steganography/College of Electrical Science and Technology, Anhui University, Hefei, China/2009.11.19
  649. Emoticon-Based Text Steganography in Online Chat tools/College of Software, Dalian University of Technology, Dalian, China/2009.11.17
  650. Learning and Growing for a Graduate Student/College of Software, Dalian University of Technology, Dalian, China/2009.11.17
  651. Hiding Data in a Color Palette Image with Hybrid Strategies/College of Software, Dalian University of Technology, Dalian, China/2009.11.17
  652. Embedding Data in a Wet Digital Image/Department of Computer Science and Engineering, National Chung Hsing University/2009.11.13
  653. Recent Development of Information Hiding Steganography/Taichung, Taiwan (Keynote Speech at 2009 Workshop on Consumer Electronics)/2009.11.06
  654. Hiding Information in VQ Index Tables with Reversibility/Qingdao, China (Keynote Speech at the Second International Workshop on Computer Science and Engineering)/2009.10.29
  655. Recent Development of Information Hiding Steganography/College of Computer Engineering Institute, Qingdao University of Technology, Qingdao, China/2009.10.28
  656. Recent Development of Information Hiding Steganographysibility/Department of Management Information Systems, National Chung Hsing University/2009.10.23
  657. An Ingenious Data Hiding Scheme for Color Retinal Images/Guilin, China (Keynote Speech at the 3rd International Conference on Genetic and Evolutionary Computing)/2009.10.14
  658. Recent Development of Information Hiding Steganographysibility/Guilin University of Electronic Technology, Guilin, China/2009.10.14
  659. A Self-Reference Watermarking Scheme Based on Wet Paper Coding/College of Software, Dalian University of Technology, Dalian, China/2009.10.12
  660. Scientific and Technological Paper Writing, Contributing, Publishing Essentials/College of Software, Dalian University of Technology, Dalian, China/2009.10.12
  661. An Ingenious Data Hiding Scheme for Color Retinal Images/College of Software, Dalian University of Technology, Dalian, China/2009.10.12
  662. Recent Development of Information Hiding Steganography/College of Computer Science, Asia University/2009.09.24
  663. A Self-Reference Watermarking Scheme Based on Wet Paper Coding/Department of Computer Science and Technology, Shanghai Jiao Tong University, Shanghai, China/2009.08.18
  664. Security Technologies on Communication Networks and Their Applications to Electronic Business/Forum on Future Computing, Nanjing/2009.08.15
  665. A Self-Reference Watermarking Scheme Based on Wet Paper Coding/Shenyang, China (Keynote Speech at the Ninth International Conference on Hybrid Intelligent System)/2009.08.12
  666. An Image Authentication Scheme Using Magic Square/Beijing, China (Keynote Speech at the 2nd IEEE International Conference on Computer Science and Information Technology)/2009.08.08
  667. A Steganographic Scheme for Reversible Information Hiding with Good Visual Quality Suitable for Small Embedded Data/Sanya, China (Keynote Speech at the 2009 ETP/IITA World Congress in Applied Computing,Computer Science, and Computer Engineering)/2009.08.07
  668. Embedding Data in a Wet Digital Image Using Fully Exploiting Modification Directions/Kaohsiung, Taiwan (Keynote Speech at the 4th Joint Workshop on Information Security)/2009.08.06
  669. A Reversible Data Embedding Scheme Based on Chinese Remainder Theorem for VQ Index Tables/Shenzhen, China (Keynote Speech at Asia-Pacific Conference on Information Processing)/2009.07.18
  670. A Quadratic-residue-based Fragile Watermarking Scheme/Zhangjiajie, China (Keynote Speech at 2009 IITA International Conference on Services Science, Management and Engineering)/2009.07.11
  671. A Novel Reversible Data Embedding Scheme Using Dissimilar Pairing for Palette-based Images/College of Software, Dalian University of Technology, Dalian, China/2009.06.09
  672. Rambling on About Research Methods/College of Software, Dalian University of Technology, Dalian, China/2009.06.09
  673. Recent Development of Information Hiding Steganography/College of Software, Dalian University of Technology, Dalian, China/2009.06.08
  674. A Data Embedding Scheme Based on a Magic Matrix and Wet Paper Codes/College of Software, Dalian University of Technology, Dalian, China/2009.06.08
  675. A Data Embedding Scheme Based on a Magic Matrix and Wet Paper Codes/Wuhan, China (Keynote Speech at International Conference on Computational Intelligence and Natural Computing)/2009.06.06
  676. A New Classification Mechanism for Retinal Images/Wuhan, China (Keynote Speech at the 2009 International Workshop on Intelligent Systems and Applications)/2009.05.24
  677. Hiding Information in Region-based Wet Images/Nanchang, China (Keynote Speech at International Symposium on Electronic Commerce and Security)/2009.05.22
  678. Self-growth of Young Scholars/School of Computer Science and Technology , Anhui University, Hefei, China/2009.05.21
  679. Recent Development of Information Hiding Steganography/Fuyang Normal College, Fuyang, China/2009.05.20
  680. A Data Embedding Scheme Based on a Magic Matrix and Wet Paper Codes/School of Computer and Information, Hefei University of Technology, Heifei, China/2009.05.19
  681. Learning and Growing Together for Young Scholars/School of Computer and Information, Hefei University of Technology, Heifei, China/2009.05.19
  682. A Novel Reversible Data Embedding Scheme Using Dissimilar Pairing for Palette-based Images/Chengdu, China (Keynote Speech at the 2009 International Symposium on Intelligent Ubiquitous Computing and Education)/2009.05.15
  683. Cheating Resistence for Secret Sharing/Wuhan, China (Keynote Speech at International Conference on Networdks Security, Wireless Communications and Trusted Computing)/2009.04.25
  684. Recent Development of Information Hiding Steganography/College of Computer Science, Yangtze University, Jingzhou, China/2009.04.23
  685. Cheating Resistence for Secret Sharing/College of Computer Science, Shanghai University, Shanghai, China/2009.04.21
  686. The New Developments in Information Hiding/Suzhou Institute for Advanced Study of University of Science and Technology of China, The 3rd Ph.D. Student Workshop ( invited speaker ), Suzhou, China/2009.04.16
  687. Hiding Data in a Color Palette Image with Hybrid Strategies/The Department of Electronic Engineering, National Kaohsiung University/2009.04.06
  688. Graduate Students’ Learning and Growth/The Department of Computer Science and Engineering, National Chung-Hsing University/2009.03.27
  689. Recent Development of Information Hiding Steganography/Computer Science and Information Engineering University/2009.03.20
  690. Recent Development of Information Hiding Steganography/Department of Information Management, Southern Taiwan University/2009.03.18
  691. Recent Development of Information Hiding Steganography/National Chung Cheng University/2009.03.11
  692. Graduate Students’ Learning and Growth/Department of Computer Science & Information Management, Providence University/2009.02.27
  693. Recent Development of Information Hiding Steganography/School of Information technology, Ming Chuan University/2009.02.20
  694. A Hybrid Strategy for Improving Illumination-Balance of Degraded Text-Photo Images/Nha Trang, Vietnam (Keynote Speech at the Second International Conference on Theories and Applications of Computer Science)/2009.02.06
  695. The Design of E-Traveler's Check with Efficiency and Mutual Authentication/Sung Kyun Kwan University (Keynote Speech at the First International Conference on Ubiquitous Information Management and Communication)/2009.01.15
  696. Recent Development of Information Hiding Steganography/Fudan University, Shanghai, China/2008.12.23
  697. Recent Development of Information Hiding Steganography/University of Shanghai for Science and Technology, Shanghai, China/2008.12.23
  698. Rambling on About Research Methods/University of Shanghai for Science and Technology, Shanghai, China/2008.12.23
  699. A High Capacity Reversible Data Hiding Scheme for Annotation/Shanghai, China (Keynote Speech at the 2008 IEEE International Symposium on Intelligent Information Technology Application)/2008.12.22
  700. Recent Development of Information Hiding Steganography/School of Communication and Information Engineering, Shanghai University, Shanghai, China/2008.12.22
  701. Lossless Compression Schemes of Vector Quantization Indices Using State Codebook/Shanghai, China (Keynote Speech at the 2008 International Symposium on Computer Science and Computational Technology)/2008.12.21
  702. Secret Image Sharing with Reversible Steganography/Wuhan, China (Keynote Speech at the 2008 Pacific-Asia Workshop on Computational Intelligence and Industrial Application)/2008.12.19
  703. Steganographic Mechanisms with Reversibility and Irreversibility/Department of Computer Science and Information Engineering, National Chung Cheng University/2008.11.17
  704. Self-growth of Young Scholars/Department of Computer Science and Information Engineering, National Chung Cheng University/2008.11.17
  705. A Restricted Region-based Data-hiding Scheme/Hangzhou, China (Keynote Speech at the 11th International Conference on Communication Technologies)/2008.11.10
  706. Key to Be a Successful Graduate Student/Anhui University, Hefei, China/2008.11.07
  707. Recent Development of Information Hiding Steganography/West Anhui University, Luan, China/2008.11.07
  708. Rambling on About Research Methods/Hefei University of Technology, Heifei, China/2008.11.06
  709. Recent Development of Information Hiding Steganography/Hefei University of Technology, Heifei, China/2008.11.06
  710. Science and Technology Research Methodology/Renmin University of China, Beijing, China/2008.11.05
  711. Recent Development of Information Hiding Steganography/Renmin University of China, Beijing, China/2008.11.05
  712. Hiding Data in a Color Palette Image with Hybrid Strategies/Department of Computer Science and Information Technology, Beijing Jiaotong University, Beijing, China/2008.11.04
  713. How to Be a Successful Graduate Student/School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing, China/2008.11.04
  714. Recent Development of Information Hiding Steganography/School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing, China/2008.11.04
  715. Recent Development of Information Hiding Steganography/Department of Computer Science and Information Technology, Beijing Jiaotong University, Beijing, China/2008.11.04
  716. Security and Privacy in Pervasive/Ubiquitous Computing Systems/Forum on Future Computing, Beijing, China/2008.11.01
  717. Recent Development of Information Hiding Steganography/Forum on Future Computing, Beijing, China/2008.11.01
  718. Recent Development of Information Hiding Steganography/College of Computing and Informatics, Providence University/2008.10.24
  719. Recent Development of Information Hiding Steganography/Department of Information Management, Chang Gung University/2008.10.18
  720. Clustering and Its Applications to Steganography/Department of Information Management, Chang Gung University/2008.10.18
  721. De-clustering and Its Applications to Steganography/Department of Information Management, Chang Gung University/2008.10.18
  722. Rambling on About Research Methods/Department of Information Management, Chang Gung University/2008.10.18
  723. Hiding Data in a Color Palette Image with Hybrid Strategies/Department of Computer Science and Engineering, National Chung Hsing University/2008.10.17
  724. Rambling on About Research Methods/Yuan Ze University/2008.10.15
  725. Recent Development of Information Hiding Steganography/Overseas Chinese Institute of Technology/2008.10.14
  726. An Innovative Steganographic Scheme Based on Vector Quantization/Yangtze University (Keynote Speech at the Second International Conference on Genetic and Evolutionary Computing), Jingzhou, China/2008.09.25
  727. Hiding Data in a Color Palette Image with Hybrid Strategies/Wuhan University, Wuhan, Hubei, China/2008.09.24
  728. Recent Developments on Image Steganography/Wuhan University, Wuhan, Hubei, China/2008.09.24
  729. Recent Development of Information Hiding Steganography/Jiaxing University, Jiaxing, China/2008.09.22
  730. The Road to Success/Department of Management Information Systems, National Chung Hsing University/2008.09.19
  731. Hiding Data in a Color Palette Image with Hybrid Strategies/Department of Information Management, Chang Gung University/2008.09.16
  732. Some Novel Steganographic Methods for Digital Images/Shenzhen Graduate School, Harbin Institute of Technology, Shenzhen, China/2008.08.07
  733. A High Payload Steganographic Scheme Based on (7, 4) Hamming Codes for Digital Images/Guangzhou, China (Keynote Speech at International Symposium on Electronic Commerce and Security)/2008.08.04
  734. Innovative Information Hiding for Digital Media/Lanzhou, China (Keynote Speech at the First International Conference on Ubi-media)/2008.07.16
  735. Rambling on About Research Methods/School of Information Science and Engineering, Lanzhou University, Lanzhou, China/2008.07.15
  736. Graduate Students’ Learning and Growth/School of Information Science and Engineering, Lanzhou University, Lanzhou, China/2008.07.15
  737. Image Hiding Technology/School of Electronic and Information Engineering, Dalian University of Technology, Dalian, China/2008.06.18.
  738. An Information Hiding Scheme Using Sudoku/Dalian, China (Plenary Speech at The Third International Conference on Innovative Computing, Information and Control (ICICIC 2008))/2008.06.18
  739. Rambling on About Research Methods/School of Computer Science and Technology, Anhui University, Hefei, China/2008.06.16
  740. Rambling on About Research Methods/Institute of Mechanical and Electro-Mechanical Engineering, National Formosa University/2008.06.11
  741. College Students’ Learning Experience and Career Planning/College of Engineering, Da-Yeh University/2008.05.21
  742. Sharing Experience about The Academic Achievements for Young Scholars/Department of Information Engineering and Computer Science, Feng Chia University/2008.04.22
  743. Improving Research Efficiency: the Strategy and Skills/Taiwan Assessment and Evaluation Association (National Taiwan University of Science and Technology)/2008.04.11
  744. Rambling on About Research Methods/Department of Computer Science and Information Engineering, Tamkang University/2008.04.09
  745. Rambling on About Research Methods/Department of Computer & Information Science, Aletheia University/2008.04.09
  746. How to Improve Research Efficiency and Skills/College of Informatics, Chaoyang University of Technology/2008.04.08
  747. How to Be Successful Information Technology People/Department of Information Management Science, Chung Shan Medical University/2008.03.17
  748. Using Nearest Cover Codes to Embed Secret Information in Gray-scale Images/Sungkyunkwan University, Seoul, Korea/2008.01.31
  749. An Image Compression Scheme Based on Locally Adaptive Coding/Asia University (Keynote Speech at IEEE International Symposium on Multimedia)/2007.12.10
  750. Rambling on About Research Methods/Department of Information Management, Dayeh University/2007.11.29
  751. Rambling on About Research Methods/Graduate Institute of Information and Computer Education, National Kaohsiung Normal University/2007.11.26
  752. How to Be Successful Information Technology People/Department of Computer Science and Information Engineering, National Chin-Yi University of Technology/2007.11.22
  753. Graduate Students’ Learning and Growth/College of Engineering, National Chin-Yi University of Technology/2007.11.21
  754. Reversible Data Hiding Scheme Using Two Steganography Images/Taipei International Convention Center (Invited Speech at IEEE TENCO 2007)/2007.10.31
  755. A Low Bit Rate Vector Quantization Encoding Scheme Using Neighboring Similarity and Dynamic Subspace Rechecking/School of Computer Science & Technology, Anhui University, Hefei, China/2007.10.17
  756. Information Hiding Techniques/School of Computer Science & Technology, Anhui University, Hefei, China/2007.10.17
  757. A Low Bit Rate Vector Quantization Encoding Scheme Using Neighboring Similarity and Dynamic Subspace Rechecking/Shandong University, China (Keynote Speech at the 3rd Joint Conference on Harmonious Human Machine Environment)/2007.10.15
  758. College Students’ Learning Experience and Career Planning/National Kaohsiung University/2007.10.09
  759. Hashing Technology: Past, Now and the Future/Department of Computer Science & Information Management, Providence University/2007.10.05
  760. Hashing Technology: Past, Now and the Future/College of Computer Science, Asia University/2007.10.04
  761. Introduction to Lossless Watermarking Technology/Department of Computer Science and Information Engineering, National Chung Cheng University/2007.10.01
  762. Image Hiding Technology/Department of Computer Science and Information Engineering, National Taichung  University/2007.09.28
  763. Image Hiding Technology/Department of Information Management Science, Chung Shan Medical University/2007.09.21
  764. The Development of File Structures/School of Computer Science and Engineering, International University in Ho Chi Minh City, Vietnam/2007.07.23
  765. A Data Hiding Scheme Based upon Block Truncation Coding/School of Information  Technology, University of Natural Sciences in Ho Chi Minh City, Vietnam/2007.07.23
  766. A Robust and Recoverable Tamper Proofing Technique for Image Authentication/School of Information  Technology, University of Natural Sciences in Ho Chi Minh City, Vietnam/2007.07.23
  767. Declustering and Its Application to Information Hiding/School of Computer Science and Engineering, International University in Ho Chi Minh City, Vietnam/2007.07.20
  768. Hiding Secret Information in Color Images/School of Computer Science and Engineering, International University in Ho Chi Minh City, Vietnam/2007.07.20
  769. Hashing Technology: Past, Now and Future/School of Computer Science and Engineering, International University in Ho Chi Minh City, Vietnam/2007.07.19
  770. Information Hiding Techniques/School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing, China/2007.06.28
  771. Rambling on About Research Methods/School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing, China/2007.06.28
  772. Information Hiding Techniques/School of Computer Science, Beihang University, Beijing, China/2007.06.26
  773. Rambling on About Research Methods/School of Computer Science, Beihang University, Beijing, China/2007.06.26
  774. Innovative Steganography for Digital Media/Forum on Future Computing, Beijing, China/2007.06.24
  775. Hiding Secret Information in Color Images/School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China/2007.06.22
  776. Innovative Steganography for Digital Media/School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China/2007.06.22
  777. Information Hiding Techniques/Department of Computer Science and Technology, Beijing Tsinghua University, Beijing, China/2007.06.22
  778. An Information Hiding Technique Based on De-clustering/International Web Intelligence Consortium (WIC) Institute, Beijing University of Technology, Beijing, China/2007.06.21
  779. The Outlet for Undergraduates Majoring in Information Security/Department of Computer Science, Sun Yat-Sen University, Guangzhou, China/2007.06.20
  780. Hiding Secret Information in Color Images/School of Information Science and Technology, Sun Yat-Sen University, Guangzhou, China/2007.06.19
  781. Innovative Steganography for Digital Media/School of Information Science and Technology, Sun Yat-Sen University, Guangzhou, China/2007.06.19
  782. Self-growth of Young Scholars/College of Informatics, Chaoyang University of Technology/2007.06.12
  783. College Students’ Learning Experience and Career Planning/Feng Chia University/2007.06.04
  784. The Recent Development of Information Security/Central Taiwan University of Science and Technology/2007.05.16
  785. Science and Technology Research Methodology/College of Engineering, National Chin-Yi University of Technology/2007.04.18
  786. Introduction to Color Image Hiding Technology/Department of Information Security, Jiangnan University, Wuxi, China/2007.04.12
  787. Introduction to Visual Cryptography/Department of Information Security, Jiangnan University, Wuxi, China/2007.04.12
  788. Introduction to Secret Image Sharing Technology/Department of Information Security, Jiangnan University, Wuxi, China/2007.04.12
  789. Digital Watermark Technology/Department of Information Security, Jiangnan University, Wuxi, China/2007.04.12
  790. Self-growth of Young Scholars/Department of Information Security, Jiangnan University, Wuxi, China/2007.04.12
  791. Introduction to Color Image Hiding Technology/School of Communication and Information Engineering, Shanghai University, Shanghai, China/2007.04.10
  792. Introduction to Color Image Hiding Technology/College of Computer, Hangzhou Dianzi University, Hangzhou, China/2007.04.09
  793. Introduction to Visual Cryptography/College of Computer, Hangzhou Dianzi University, Hangzhou, China/2007.04.09
  794. Introduction to Secret Image Sharing Technology/College of Computer, Hangzhou Dianzi University, Hangzhou, China/2007.04.09
  795. Digital Watermarking Technology/College of Computer, Hangzhou Dianzi University, Hangzhou, China/2007.04.09
  796. Introduction to Color Image Hiding Technology/College of Computer Science and Technology, Zhejiang University, Hangzhou, China/2007.04.06
  797. Introdiction to Lossless Watermarking Technology/Department of Computer Science and Information Engineering, Tamkang University/2007.03.15
  798. How to Balance Teaching and Research/National Kaohsiung Normal University/2007.03.09
  799. Introdiction to Lossless Watermarking Technology/Department of Electronics Engineering, National Kaohsiung University of Applied Sciences/2007.03.09
  800. Graduate Student Learning and Growth/Leader University/2007.03.07
  801. How to Be Successful Information Technology People/Kun Shan University/2007.03.07
  802. Hiding Secret Information in a Color Palette Image with Hybrid Strategies/Sung Kyun Kwan University(Keynote Speech at First International Conference on Ubiquitous Information Management and Communication ) /2007.02.08
  803. Information Hiding Techniques/National University of Singapore/2007.01.12
  804. Information Hiding Techniques/Nanyang Technological University, Singapore/2007.01.10
  805. How to Be a Successful Information Systems Manager/Department of Information Management, National Chin-Yi University of Technology/2006.12.28
  806. How to Be a Successful Graduate Student/Department of Computer Science and Information Engineering, National Chung Cheng University/2006.12.11
  807. Information Hiding Techniques/Nan Kai Institute of Technology (Keynote Speech at 2006 International Conference on Information Industry)/2006.11.21
  808. How to Write the Perfect Project /Department of Computer Science and Information Engineering, Da-yeh University/2006.11.09
  809. Key to Be a Successful Graduate Student/Computer Science and Information Engineering, Tunghai University/2006.11.08
  810. Information Hiding Technology Based on SMVQ/College of Communications Engineering , Xidian University, Xian, China/2006.10.26
  811. Graduate Student Learning and Growth/College of Communications Engineering , Xidian University, Xian, China/2006.10.26
  812. Clustering and Its Applications to Steganography/College of Communications Engineering , Xidian University, Xian, China/2006.10.24
  813. De-clustering and Its Applications to Information Hiding/College of Communications Engineering , Xidian University, Xian, China/2006.10.24
  814. Information Hiding Techniques/Department of Computing and Information Technology and Network and Information Engineering Center, Fudan University, Shanghai, China/2006.10.20
  815. Graduate Student Learning and Growth/Department of Computing and Information Technology and Network and Information Engineering Center, Fudan University, Shanghai, China/2006.10.20
  816. Information Hiding Tecnique Based on De-clustering/College of Computer Science and Technology, Huazhong University of Science and Technology/2006.10.19
  817. Graduate Student Learning and Growth/College of Computer Science and Technology, Huazhong University of Science and Technology/2006.10.19
  818. How to Be a Successful Graduate Student/College of Informatics, Chaoyang University of Technology/2006.10.17
  819. How to Be a Successful Graduate Student/Department of Computer Science and Information Management, Providence University/2006.10.13
  820. How to Be a Successful Graduate Student/Graduate Institute of Information and Computer Education, National Kaohsiung Normal University/2006.10.04
  821. How to Be a Successful Graduate Student/Department of Electronic Engineering, National Kaohsiung University of Applied Sciences/2006.10.04
  822. The Learning and Growth of Dectoral/College of Busuness, Feng Chia University/2006.09.21
  823. Clustering and Its Applications to Steganography/The State's Key Laboratory of Software Engineering, Wuhan University, Wuhan, Hubei, China/2006.09.02
  824. De-clustering and Its Applications to Information Hiding/The State's Key Laboratory of Software Engineering, Wuhan University, Wuhan, Hubei, China/2006.09.02
  825. Rambling on about Research Methods/The State's Key Laboratory of Software Engineering, Wuhan University, Wuhan, Hubei, China/2006.09.02
  826. Information Hiding Technology Based on SMVQ/Information Security Research Center, Beijing University of Posts and Telecommunication/2006.08.30
  827. Information Hiding and Its Applications/Beijing Jiaotong University(Tutorial Speech at 2006 International Conference on Innovative Computing, Information and Control), Beijing, China/2006.08.29
  828. Rambling on about Research Methods/Department of Computer Science and Information Technology, Beijing Jiaotong University, Beijing, China/2006.08.29
  829. Recent Researches and Developments on Computer Science and Technology in Taiwan/Department of Computer Science and Technology, Jilin University, Jilin, China/2006.08.12
  830. Information Hiding Tecnique Based on De-clustering/Harbin Institute of Technology(Keynote Speech at the 6th China  Information Hiding and Multimedia Security), Harbin, China/2006.08.07
  831. Rambling on about Research Methods/Information Security Technique Research Center and Superintendent of Information Countermeasure Technique Research Institute, Harbin Institute of Technology, Harbin, China/2006.08.05
  832. Clustering and Its Applications to Steganography/Shenzhen Graduate School, Harbin Institute of Technology, Shenzhen, China/2006.06.19
  833. De-clustering and Its Applications to Information Hiding/Shenzhen Graduate School, Harbin Institute of Technology, Shenzhen, China/2006.06.19
  834. Self-growth of Young Scholars/Department of Information Management, National Taichung Institite of Technology/2006.04.19
  835. Introduction to the Security of Electronic Business/Hotel National Taichung (Seminar Sponsored by ARES International Corporation)/2006.04.19
  836. De-clustering and Its Applications to Information Hiding/School of Communication and Information Engineering, Shanghai University, Shanghai, China/2006.04.05
  837. Information Hiding Technology Based on SMVQ/School of Communication and Information Engineering, Shanghai University, Shanghai, China/2006.04.05
  838. Introduction to Steganography/School of Communication and Information Engineering, Shanghai University, Shanghai, China/2006.04.05
  839. De-clustering and Its Applications to Information Hiding/Department of Computer Science and Information Management, Providence University/2006.03.24
  840. Rambling on about Research Methods/Department of Computer Science and Information Engineering, ChungChou Institute of Technology/2006.03.15
  841. De-clustering and Its Applications to Information Hiding/Department of Computer Science, National Chung Hsing University/2006.03.10
  842. Introduction to Image Hiding Technique/Department of Computer Science and Information Engineering, Asia University/2006.03.01
  843. The Road to Success/Feng Chia University/2005.12.6
  844. Self-growth of Young Scholars/Department of Computer Communication Engineering, Chienkuo Technology University/2005.12.22
  845. The Road to Success/Department of Computer Science and Information Management, Providence University/2005.12.20
  846. De-clustering and Its Applications to Steganography/Department of Information Engineering and Computer Science, Feng Chia University/2005.12.08
  847. Self-growth of Young Scholars/College of Information and Electrical Engineering, Feng Chia University/2005.12.08
  848. Introduction to De-clustering and Steganography/Department of Computer Science and Information Technology, National Taichung Institute of Technology/2005.11.16
  849. De-clustering and Its Applications to Steganography/Department of Electrical Engineering, National Kaohsiung University of Applied Sciences/2005.11.14
  850. Graduate Study and Growth/The Graduate School of Multimedia Design, National Taichung Institute of Technology/2005.11.08
  851. Key to Success in Academic Research/Department of Applied Mathematics, National Chung Hsing University/2005.11.03
  852. My Work Experience/Stella Matutina Girls’ High School/2005.10.13
  853. Introduction to Color Image Steganography/Department of Computer Science and Information Engineering, National Chiayi University/2005.09.29
  854. Key to Success in Academic Research/School of Communication and Information Engineering, Shanghai University, Shanghai, China/2005.09.22
  855. An Adaptive Data Hiding Scheme for Palette Images/The first International Workshop on Intelligent Information Hiding and Multimedia Signal Processing, Hilton on the Park-Melbourne of Australia/2005.09.15
  856. Introduction to Image Steganography/The Legislative Yuan of Republic of China/2005.09.06
  857. Introduction to Color Image Steganography/Department of Information Engineering and Computer Science, Feng Chia University /2005.09.05
  858. Key to Success in Academic Research/Department of Computer Science and Information Engineering, Chung Hua University/2005.05.30
  859. Start a Bright Life/Department of Computer science and Information Management, Providence University/2005.05.06
  860. Start a Bright Life/Department of Computer science and Information Management, Providence University/2005.04.26
  861. Key to Success in Academic Research/Feng Chia University/2005.03.08
  862. Key to Success in Academic Research/China Medical University/2005.01.19
  863. Digital Image Steganography/College of Informatics, Chaoyang University of Technology/2005.01.04
  864. My Work Experience/National United University/2004.12.29
  865. Digital Image Steganography/Department of Computer Science, National Chengchi University/2004.12.14
  866. Digital Image Steganography/Department of Computer Science, National Chiao Tung University/2004.12.09
  867. My Work Experience/Department of Computer Science and Information Management, Providence University/2004.12.07
  868. Digital Image Steganography/Information Management, National Kaohsiung University of Applied Science/2004.12.06
  869. Digital Image Steganography/Department of Information and Communication, Southern Taiwan University/2004.12.06
  870. Digital Signature and Its Applications to Electronic Business/Department of Computer Science and Information Engineering, National Taichung Institute of Technology/2004.11.25
  871. Introduction to Image Steganography/Computer science and Information Management, Providence University/2004.11.07
  872. Digital Image Steganography/Department of Electronic Engineering, National Taiwan University of Science and Technology/2004.10.04
  873. Introduction to Steganography for Multimedia/Department of Computer Science and Information Engineering, National Changhua University of Education /2004.09.24
  874. Rambling on the Academic Career/Department of Information Management, National Taichung Institute of Technology /2004.08.11
  875. Hiding a Secret Image  in a Cover Image/Ewha Womans University, South Korea/2004.07.12
  876. Information Hiding Techniques/National Security Bureau/2004.06.23
  877. Develop a Correct Academic Outlook/College of Science & Technology, National Chi Nan University, Guangzhou, China/2004.06.04
  878. Information Security Techniques- Steganography/Chang Gung University/2004.05.29
  879. Information Hiding Techniques- Steganography/Department of Computer Science & Information Management, Providence University/2004.05.28
  880. Information Hiding Techniques- Steganography/Department of Computer Science, National Tsing Hua University/2004.05.19
  881. Security Techniques and Applications for Electronic Commerce/Department of Information Management, Tatung Institute of Commerce and Technology/2004.05.06
  882. Information Hiding Techniques- Steganography/Graduate Institute of Computer Science, National Chung Hsing University/2004.04.02
  883. Develop a Correct Academic Outlook/Graduate Institute of Computer Science, National Chung Hsing University/2004.04.02
  884. The Road to Success/National Changhua University of Education/2004.03.26
  885. Key to Success in Academic Research/Chaoyang University of Technology/2003.12.23
  886. How to Fast Computation of Exponents/Tsinghua University, Beijing, China/2003.12.19
  887. Information Hiding Techniques- Steganography/Tsinghua University, Beijing, China/2003.12.18
  888. A Technique that Takes Care of Image Compression and Information Hiding/Tsinghua University, Beijing, China/2003.12.18
  889. Rambling on about Research Methods/School of Computer Science and Telecommunications Engineering, JiangSu University, Wuxi, China /2003.12.16
  890. Information Hiding - Steganography/School of Computer Science and Telecommunications Engineering, JiangSu University, Wuxi, China /2003.12.15
  891. A Technique that Takes Care of Image Compression and Information Hiding/School of Computer Science and Telecommunications Engineering, JiangSu University, Wuxi, China /2003.12.15
  892. A Secret Information Hiding Scheme Based on Switching Tree Coding/Institute of Information Science, Academia Sinica/2003.12.05
  893. The Road to Success/Chungtai Institute of Health Sciences and Technology/2003.11.26
  894. Look at the Future through College/Department of Information Management, National Huwei Institute of Technology/2003.11.12
  895. Develop a Correct Academic Outlook/Department of Information Science and Management, Providence University/2003.11.07
  896. Develop a Correct Academic Outlook/Department of Computer Science and Information Engineering, National Chung Cheng University/2003.09.04
  897. Digital Watermark Technology/Industrial Technology Research Institute of Taiwan, ROC/2003.08.21
  898. On research Methodology from Information Hiding/Department of Computer Science & Information Management, Providence University/2003.05.23
  899. Information Hiding Methodology/National Huwei Institute of Technology/2003.04.30
  900. On research Methodology from Information Hiding /Department of Computer Science and Information Engineering, National Dong Hwa University/2003.04.25
  901. The Recent Development of Information Security /Keynote of  General Education , National Chung Hsing University/2003.04.11
  902. From Image Compression to Digital Watermarking/Department of Information Management, National Taichung Institute of Technology/2003.03.21
  903. Image Compression/Department of Computer Science & Information Management, Providence University/2003.03.18
  904. The Road to Success/National Huwei Institute of Technology/2003.03.06
  905. Image Hiding Technology/Department of Information Engineering, National Chiao Tung University/2002.12.26
  906. The Road to Success/College of Management, Chaoyang University of Technology/2002.12.24
  907. An Image Database Retrieval Scheme Based upon Multivariate Analysis and Data Mining/2002 International Computer Symposium, National Dong Hwa University(Keynot Speech)/2002.12.20
  908. Embedded Watermarking/Tsinghua University, Beijing, China/2002.12.12
  909. Digital Image Authentication/Tsinghua University, Beijing, China/2002.12.12
  910. Non-embedded Watermarking/Tsinghua University, Beijing, China/2002.12.11
  911. Visual Cryptography/Tsinghua University, Beijing, China/2002.12.10
  912. Digital Image Hiding/Tsinghua University, Beijing, China/2002.12.10
  913. Mathematics and Informational Engineering /Department of Computer Science & Information Engineering, National Chung Cheng University/2002.12.03
  914. The Road to Success/Department of Computer Science & Information Management, Providence University/2002.11.26
  915. Image Hiding Techniques/Tokyo Denki University/2002.11.07
  916. The Road to Success/Department of Computer Science and Information Engineering, Tamkang University/2002.10.31
  917. Color Visual Cryptography/Department of Computer Science & Information Management, Providence University/2002.05.10
  918. Application of Mathematics in Computer Science/St. John's & St. Mary's Institute of Technology/2002.04.26
  919. Digital Image Authentication/Department of Computer Science and Information Engineering, Tamkang University/2002.04.25
  920. Digital Watermarking Techniques/Department of Computer Science and Information Engineering, Tamkang University/2002.04.24
  921. Information Hiding Techniques /Department of Computer Science and Information Engineering, Tamkang University/2002.04.23
  922. The Road to Success/National Chung Cheng University/2002.03.20
  923. Data Structure and Chinese Remainder Theorem/Department of Computer Science and Information Engineering, Da-Yeh University/2002.03.07
  924. Issues on Network Security and Crime7/Jean-Nan Primary School/2002.01.23
  925. Efficient Indexing of Chinese Words by Pinyin/Department of Computer Science & Information Management, Providence University/2002.01.08
  926. The Road to Success/Mingdao Management College/2001.12.26
  927. Introduction to Cryptanalysis/Department of Computer Science and Technology, Chung Cheng Institute of Technology, National Defense University/2001.11.30
  928. Data Structure and Chinese Remainder Theorem/Department of Computer Science & Information Management, Providence University/2001.11.09
  929. How to Get Ahead/Taichung Healthcare and Management University/2001.11.06
  930. Experiences in Designing a Simple Database Management System/The State's Key Laboratory of Software Engineering, Wuhan University, Wuhan, Hubei, China/2001.10.31
  931. Key to Success in Academic Research/College of Computer Engineering, Wuhan University, Wuhan, Hubei, China/2001.10.30
  932. Key to Success in Academic Research/Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology/2001.10.08
  933. The Road to College/Taichung Second Senior High School/2001.09.26
  934. Security Issues and Strategies for Electronic Commerce (EC)/Extension Education Center of Pacific Western University (at National Taiwan Normal University)/2001.06.24
  935. Authentication Mechanisms/Extension Education Center of Pacific Western University (at National Taiwan Normal University)/2001.06.24
  936. Popular Encryption Schemes/Extension Education Center of Pacific Western University (at National Taiwan Normal University)/2001.06.24
  937. Digital Signature Technology/Extension Education Center of Pacific Western University (at National Taiwan Normal University)/2001.06.24
  938. Image Hiding Technology/Extension Education Center of Pacific Western University (at National Taiwan Normal University)/2001.06.24
  939. Visual Cryptography/Extension Education Center of Pacific Western University (at National Taiwan Normal University)/2001.06.24
  940. Digital Watermark Technology/Extension Education Center of Pacific Western University (at National Taiwan Normal University)/2001.06.24
  941. Visual Cryptography/Beijing University of Posts and Telecommunications, Beijing, China/2001.04.26
  942. Color Image Hiding/Beijing University of Posts and Telecommunications, Beijing, China/2001.04.26
  943. Image Hiding Based on Color Difference/Beijing University of Posts and Telecommunications, Beijing, China/2001.04.26
  944. Hiding Images Using Dynamic Bit-Replacement and Human Visual System/Beijing University of Posts and Telecommunications, Beijing, China/2001.04.26
  945. Hiding Binary Images Using BFT Linear Quadtrees/Beijing University of Posts and Telecommunications, Beijing, China/2001.04.26
  946. Hiding Images Using Dynamic Bit-Replacement and Human Visual System/Department of Computer Science and Information Systems, the University of Hong Kong, Hong Kong, China/2001.04.03
  947. Hiding Images Using Dynamic Bit-Replacement and Human Visual System/National Chi Nan University (China-France Multimedia Conference Keynote Speech), Guangzhou, China/2001.03.20
  948. Key to Success in Academic Research/Graduate School of Mechanical Engineering, National Chung Hsing University/2001.03.07
  949. Digital Watermark Technology/National Taichung Institute of Technology/2001.01.05
  950. Digital Watermark Technology/Department of Computer Science & Information Management, Providence University/2001.01.02
  951. Some Watermarking Techniques on Internet/National Kaohsiung University of Applied Sciences/2000.12.26
  952. Digital Watermark Technology/Graduate School of Applied Mathematics, National Chung Hsing University/2000.12.22
  953. Some Watermarking Techniques on Internet/Department of Computer Science and Engineering, National Sun Yat-Sen University/2000.11.22
  954. A Method for Protection Digital Images from Being Copied Illegally/Chung-Chou Institute of Technology/2000.11.11
  955. Key to Success in Academic Research/Department of Computer Science and Information Engineering, National Chiayi University/2000.11.06
  956. Design of the Fast Chinese Indexing System with Boshiamy Input Method/Department of Information Engineering and Computer Science, Feng Chia University/2000.10.31
  957. The Development of Internet and Its Applications in Taiwan/Ewha Womans University, South Korea/2000.10.17
  958. Design of the Fast Chinese Indexing System with Boshiamy Input Method/Department of Computer Science and Information Management, Providence University/2000.10.13
  959. Some Techniques of Digital Watermarking on Internet/The Institution of Electrical Engineers, Hong Kong/2000.09.28
  960. An Image Protection Scheme Based on Discrete Cosine Transformation/Department of Electronic Engineering, City University of Hong Kong, Hong Kong, China/2000.09.28
  961. A New Scheme for Sharing Secret Color Images in Computer Network/2000 IEEE International Conference on Parallel and Distributed System(2000ICPADS) by Iwate Prefectureal University, Japan/2000.07.06
  962. Security Issues and Strategies for Electronic Commerce (EC)/National Taichung Institute of Technology/2000.06.23
  963. Image Hiding/Department of Computer Science and Information Engineering, National Chi Nan University, Guangzhou, China/2000.06.02
  964. Image Hiding and Visual Cryptography/Graduate Institute of Electrical Engineering, National Taiwan University/2000.05.22
  965. Security Issues and Strategies for Electronic Commerce (EC)/Rotary Club of Taichung Pei-Tuen District (at Hotel National Taichung)/2000.05.19
  966. Security Issues and Strategies for Electronic Commerce (EC)/Ta-Te Industrial and Home Ecnomical Senior Vocational School/2000.05.15
  967. Security Issues and Strategies for Electronic Commerce (EC)/United World Chinese Commercial Bank (at Hotel National Taichung)/2000.05.12
  968. Digital Watermark Technology/Department of Information and Computer, National Taiwan Normal University/2000.05.01
  969. Key to Success in Academic Research/Department of Computer Science and Information Engineering, Tamkang University/2000.04.18
  970. Key to Success in Academic Research/Department of Information Management, National Taichung Institute of Technology/2000.04.01
  971. Present Situation and Prospect of Information Education/Pei-Men Senior Vocational School of Agriculture and Industrial/2000.03.30
  972. Intellectual Property Protection Techniques for Images/Van-Nung Institute of Technology/2000.03.21
  973. How to Write a Research Report/Department of Information Management, National Taichung Institute of Technology/2000.01.15
  974. Digital Watermark Technology/Department of Business Education, National Changhua University of Education/1999.12.15
  975. Mysterious Red Envelope/BCC- The Words of Wisdom/1999.11.15
  976. Progressive Image Transimssion Based on Bit-Plane Method/Department of Computer Science & Information Management, Providence University/1999.11.02
  977. Progressive Image Transmission Technology/Department of Computer Science and Information Engineering, National Cheng Kung University/1999.10.29
  978. A New Scheme of Progressive Image Transimssion Based on Bit-Plane Method/Beijing University of Posts and Telecommunications, Beijing, China/1999.10.21
  979. A Block Based Digital Watermarks for Copy Protection of Images/Beijing University of Posts and Telecommunications, Beijing, China/1999.10.21
  980. A Technique for Image Hiding/Graduate School of Information System, Department of Computer Software, The University of Aizu, Japan/1999.09.21
  981. Progressive Image Transmission Technology/Department of Chemistry, National Taiwan Normal University/1999.07.19
  982. Progressive Image Transmission Technology/Department of Computer Science and Information Engineering, National Central University/1999.07.14
  983. Information and E-commerce/Extension Education Center of Chinese Culture University/1999.06.24
  984. A Progressive Codebook Training Algorithm for Image Vector Quantization/Central Police University (The Tenth International Conference on Information Management)/1999.06.04
  985. The Qualities of a Successful Technologist/College of Science and Engineering, I-Shou University/1999.06.02
  986. Security Issues and Strategies for Electronic Commerce (EC)/Chungtai Institute of Health Science and Technology/1999.05.29
  987. Image Hiding/Hua-Fan University/1999.05.19
  988. Watermarking Using Visual Cryptography/Chaoyang University of Technology (National Information Security Conference-Keynote Speech)  /1999.05.15
  989. Image Hiding/Department of Computer Science and Information Engineering, National Chiao Tung University/1999.05.13
  990. The Road to Success/Ming-Chuan University/1999.05.03
  991. Secret Sharing of Image Data and Its Applications/Department of Computer Science and Information Engineering, Tamkang University/1999.04.29
  992. Image Hiding/Tunghai University, Department of Computer Science Information Engineering/1999.04.14
  993. How to Get Ahead/College of Electrical and Information Engineering, I-Shou University/1999.04.14
  994. How to Get Ahead/Chin-Yi Institute of Technology and Commerce/1999.04.01
  995. The Development of Information Education/Department of Business Education, National Changhua University of Education/1999.03.17
  996. Image Hiding/Department of Information Management, Chaoyang University of Technology/1999.03.12
  997. Key to Success in Academic Research/Department of Industrial Education, National Taiwan Normal University/1999.03.10
  998. Image Hiding/Department of Computer Science and Information Management, Providence University/1999.03.02
  999. Image Hiding Technology/National Security Bureau, Republic of China/1999.02.25
  1000. Key to Success in Academic Research/Department of Computer Science and Technology, Chung Cheng Institute of Technology, National Defense University/1998.12.15
  1001. Chinese Calligraphy Compression Using New S-tree Sructure/Beijing University of Posts and Telecommunications, Beijing, China/1998.11.18
  1002. A Sheme for Obtaining a Message from the Digital Multi-Signature/Beijing University of Posts and Telecommunications, Beijing, China/1998.11.17
  1003. The Road to Success/Department of Electrical Data Processing, National Taichung Institude of Commerce/1998.11.07
  1004. Digital Watermarking/Chang Gung University/1998.10.18
  1005. Applications of Mathematics in Information Science/Ming-Dao High school/1998.10.09
  1006. Digital Watermarking/Kyoto University, Japan/1998.07.03
  1007. Key to Success in Academic Research/Department of Applied Mathematics, National Chung Hsing University/1998.05.21
  1008. Techniques of Designing Digital Watermarks/Workshop on Network Security Technology Sponsored by Industrial Technology Research Institute/1998.05.13
  1009. The Present and Prospect of Information Security Developments/Tung Fang Institute of Industry/1998.05.08
  1010. Progressive Image Transmission/Department of Information Management, National Taiwan University of Science and Technology/1998.04.23
  1011. A Binary Access Control Method Using Prime Factorization/University of Tokyo, Japan/1998.03.27
  1012. An Image Hiding Scheme Based on Vector Quantization/University of Tokyo, Japan/1998.03.27
  1013. Computer Crime and Prevention/National Taiwan Normal University/1998.03.17
  1014. Progressive Image Transmission/Department of Business Education, National Changhua University of Education/1998.03.13
  1015. Image Hiding Technology/Department of Information Science and Management, Providence University/1998.02.26
  1016. Progressive Image Compression/Department of Information Science and Management, Providence University/1998.02.26
  1017. Progressive Image Transmission Using Edge Matching/Department of Computer and Information Science, National Chiao Tung University/1998.02.24
  1018. Image Hiding Technology/Tunghai University(National Computer Symposium)/1997.12.28
  1019. Applications of Chinese Remainder Theorem/Beijing University of Posts and Telecommunications, Beijing, China/1997.11.07
  1020. The Qualities of a Successful Scientist/Beijing University of Posts and Telecommunications, Beijing, China/1997.11.07
  1021. Digital Signatures/Beijing University of Posts and Telecommunications, Beijing, China/1997.11.06
  1022. Image Hiding Technology/Beijing University of Posts and Telecommunications, Beijing, China/1997.11.06
  1023. Secret Sharing/Beijing University of Posts and Telecommunications, Beijing, China/1997.11.05
  1024. Fast Computation of Modulo Exponents/Beijing University of Posts and Telecommunications, Beijing, China/1997.11.05
  1025. The Present and Prospect of Information Education of Universities in Taiwan/Beijing University of Posts and Telecommunications, Beijing, China/1997.11.04
  1026. Hot Issues of International Information Security Research - Theory, Techniques, and Market Trend/Beijing University of Posts and Telecommunications, Beijing, China/1997.11.04
  1027. Evolution of Information Security Technology/National Defense Management College/1997.07.11
  1028. Information Security/Department of Mathematics, Chung Yuan Christian University/1997.06.05
  1029. Evolution of Information Security Technology/National Defense University, Chung Cheng Institute of Technology/1997.05.07
  1030. Efficient Join Operation of Time-domain Databases/Department of Computer Science, National Tsing Hua University/1997.04.16
  1031. The Road to Success/Department of Information Management, Chaoyang University of Technology/1997.03.26
  1032. Efficient Join Operation of Time-domain Databases/Department of Computer Science and Information Engineering, National Chiao Tung University/1996.12.19
  1033. How to Share a Common Secret Document/Department of Information Engineering, Feng Chia University/1996.12.03
  1034. Information Security/Department of Computer Science and Engineering, National Sun Yat-Sen University/1996.08.14
  1035. Information Security/National Changhua University of Education/1996.06.06
  1036. Contemporary Cryptography/Department of Computer Science and Information Engineering, National Cheng Kung University/1996.05.03
  1037. Information Security/Refining & Manufacturing Research Center of Chinese Petroleum Corp/1996.04.19
  1038. Developments of Computer Cryptography/Department of Computer and Information Science, National Chiao Tung University/1995.12.28
  1039. Developments of Computer Cryptography/Department of Computer Science and Information Engineering, National Dong Hwa University/1995.12.20
  1040. The Present and Prospect of Information Security/Department of Applied Mathematics, National Chung Hsing University/1995.11.09
  1041. Information Security/Provincial Training Center of Taiwan Provincial Government/1995.11.03
  1042. Information Security and Management/Taiwan Regional Development Institute/1995.08.06
  1043. Technology and Life/National Chiayi Senior Hight School/1995.07.27
  1044. Image Compression Technology/Department of Information Science and Management, Providence University/1995.04.27
  1045. Towards an Information Society – Let Us Use the Computer Together/National Chung Cheng University/1995.04.24
  1046. Developments of Contemporary Cryptography/Department of Computer Science and Engineering, National Sun Yat-Sen University/1995.03.03
  1047. Information Security/Computer and Information Network Center, National Chung Hsing University/1994.12.17
  1048. Information Security/Department of Information Management, Chaoyang Institute of Technology/1994.12.14
  1049. Introduction to Cryptanalysis/Department of Computer Science and Information Engineering, National Chiao Tung University/1994.11.03
  1050. Efficient Information Retrieval/Graduate Institute of Computer Science, National Chung Hsing University/1994.08.03
  1051. Chinese Database Management Systems/Training Center for High School Teachers/1994.05.25
  1052. Introduction to Cryptanalysis/Department of Industrial Education, National Taiwan Normal University/1994.05.20
  1053. Introduction to Cryptanalysis/Department of Applied Mathematics, Feng Chia University/1994.05.06
  1054. The Design of Computer Password/National Central University/1994.04.30
  1055. How to Get Ahead/Rotary Club of Taichung East District/1994.04.14
  1056. The Design of Computer Password/Wu Feng Institute of Technology/1994.04.13
  1057. Artificial Intelligence/Center of Automated Engineering, Da-Yeh University/1994.04.02
  1058. Artificial Intelligence/Tsau Ton Commercial and Technical Vocational School/1994.03.25
  1059. Group Secret Technology/Department of Computer Science. and Information Engineering, National Taiwan University/1994.03.18
  1060. Planning of Project Information Systems/Research, Development, and Evaluation Commission, Taiwan Province/1994.03.10
  1061. Evolution of Contemporary Cryptography/Chung-Shan Institute of Science and Technology/1994.02.22
  1062. Evaluation of Computer-Aided Instruction (CAI)/Fooyin College of Nursing/1994.01.17
  1063. Applications of Instruction Network and Information Security/Szu-Yu Junior High School/1994.01.07
  1064. Information Security/Provincial Training Center of Taiwan Provincial Government/1993.12.27
  1065. Developments of Computer Cryptography/National Defense University, Chung Cheng Institute of Technology/1993.12.08
  1066. Information Security/Provincial Training Center of Taiwan Provincial Government/1993.12.01
  1067. Career Planning/College of Engineering, National Chung Cheng University (for the students of Department of Business Education, National Changhua University of Education)/1993.11.25
  1068. Planning of Project Information Systems/Research, Development, and Evaluation Commission, Taiwan Provincial Government/1993.11.23
  1069. The Development of Computer Cryptography/Department of Computer Science and Information Engineering, National Chiao Tung University/1993.11.18
  1070. Information Searching Techniques/National Chung Cheng University/1993.10.29
  1071. Military Information Security/National Defense Management College/1993.09.07
  1072. Introduction to Computer Passwords/Taichung Home Economical and Commercial Senior Vocational School/1993.06.10
  1073. A Master Key for an M3 Cryptoscheme/Department of Electrical Engineering, National Defense University, Chung Cheng Institute of Technology/1993.06.08
  1074. Information Security/Department of Budget, Accounting and Statistics, Taiwan Provincial Government, R.O.C./1993.06.02
  1075. How to Get Ahead/Chia-Yi Home Vocational School/1993.05.24
  1076. Information Security/Department of Information Science and Management, Providence University/1993.05.04
  1077. An Image Similar Retrieval Method Based on Modulo Arithmetics/Workshop on Computer Applications Sponsored by National Chung Hsing University/1993.04.23
  1078. Chinese Retrieval and Searching/Provincial Chang-Hua Senior School of Commerence/1993.03.24
  1079. How to Get Ahead/Department of Information Management, National Taiwan Institute of Technology/1993.03.04
  1080. A Secured Computer Center Management/Taichung Home Economical and Commercial Senior Vocational School/1993.02.11
  1081. A Secured Computer Center Management/Taichung Home Economical and Commercial Senior Vocational School/1993.02.04
  1082. A Secured Computer Center Management/Taichung Home Economical and Commercial Senior Vocational School/1993.01.14
  1083. A Secured Computer Center Management/Taichung Home Economical and Commercial Senior Vocational School/1993.01.07
  1084. Career Planning of Computer People/Department of Computer Science and Information Engineering, National Chung Cheng University/1992.12.07
  1085. Developments of Contemporary Cryptology/Taichung Home Economical and Commercial Senior Vocational School/1992.12.01
  1086. Data Compression/Provincial Chang-Hua Senior School of Commerence/1992.11.24
  1087. On the Applications and Development/Department of Mathematics, National Tsing Hua University/1992.11.23
  1088. The Design of Computer Password/Department of Computer Science and Engineering, National Sun Yat-sen University/1992.11.18
  1089. Methodology/Department of Computer and Information Science, National Chiao Tung University/1992.10.28
  1090. Methodology/Department of Information Management, Ming Chuan College/1992.10.22
  1091. Generalized Group Secret Cryptography/National Security Bureau/1992.10.07
  1092. Secret Sharing/Department of Information and Computer Education, National Taiwan Normal University/1992.10.06
  1093. Group Secret Techniques/Department of Electrical Data Processing, National Taichung Institude of Commerce/1992.10.02
  1094. Group Secret Strategies/Computer Science and Engineering Research Center, National Sun Yat-sen University/1992.06.15
  1095. Information Security/Ta Tung Technological College of Commerce/1992.05.18
  1096. Methodology/Tunghai University, Department of Computer Science Information Engineering/1992.05.14
  1097. The Past, Present, and Future Trend of Science and Technology Education/National Chung Cheng University/1992.04.16
  1098. Information Security/Provincial Chang-Hua Senior School of Commerence/1992.04.14
  1099. How to Get Ahead/Taiwan Provincial Wen-Hua Senior High School/1992.03.11
  1100. Introduction to Computer Passwords/Sieh-Chih  Industrial and Commercial Senior Vocational School/1992.02.21
  1101. Dynamic Secret Sharing/Department of Applied Mathematics, National Sun Yat-sen University/1992.01.10
  1102. Design of Image Databases/Department of Electrical Data Processing, National Taichung Institude of Commerce/1991.12.04
  1103. The Road to Success/Tunghai University, Department of Computer Science Information Engineering/1991.11.27
  1104. The Application of Cryptography to Computer Security/Department of Computer Science and Information Engineering, National Cheng Kung University/1991.11.09
  1105. On File Systems/Department of Computer Science and Information Engineering, National Cheng Kung University/1991.09.21
  1106. Computers and Passwords/Department of Electronic Engineering, National Taipei Institute of Technology/1991.06.14
  1107. Computer Crime and Prevention/Exhibition Center of Computer Science, National Science Council/1991.04.20
  1108. Office Automation/Computer Center, National Chung Cheng University/1991.03.06
  1109. Design of a Minimal Perfect Hashing Function/Department of Computer Science and Engineering, The Chinese University of Hong Kong (Hong Kong, China)/1991.02.11
  1110. Information Security/YMCA, Chia-Yi/1991.01.22
  1111. Applications of Clustering Technology in Information Science/Department of Electrical Engineering, National Cheng Kung University/1990.12.20
  1112. The Design of Computer Password/Department of Electrical Engineering, National Yunlin Institute of Industry/1990.12.12
  1113. Data Engineering Technology/National Defense Management College/1990.11.28
  1114. Countermesures against Computer Crime and Computer Viruses/Taiwan Cooperative Bank/1990.11.27
  1115. Compression-Based Perfect Hashing Strategies/Department of Computer Science, National Tsing Hua University/1990.11.26
  1116. Computer Crime and Countermeasures/National Chung Cheng University/1990.10.30
  1117. Strategies for Chinese Compression/Department of Computer Science and Information Engineering, National Chiao Tung University/1990.10.18
  1118. Computer Crime and Countermeasures/Department of Computer Science and Information Engineering, National Chiao Tung University/1990.10.18
  1119. Information Access and Control/Department of Applied Mathematics, National Chung Hsing University/1990.09.27
  1120. Management Computerization/National Yunlin Institute of Industry/1990.07.11
  1121. Information Management and Applications/Chia-Yi City Government/1990.06.22
  1122. Information Management and Applications/Chia-Yi City Government/1990.06.04
  1123. Computer Crime and Computer Viruses/Taichung Museum of Art/1990.05.17
  1124. Computer Security/College of Medicine, National Cheng Kung University/1990.04.18
  1125. Data Compression/Taichung Home Economical and Commercial Senior Vocational School/1990.04.14
  1126. Data Encryption/Taichung Home Economical and Commercial Senior Vocational School/1990.04.12
  1127. Information Security/Taichung Home Economical and Commercial Senior Vocational School/1990.04.12
  1128. Design of a Chinese String Searching Machine/Department of Electrical Data Processing, National Taichung Institude of Commerce/1990.03.30
  1129. Data Encryption/Application Mathematics Department, Chinese Culture University/1990.03.28
  1130. Information Security/Department of Electronical Data Processing, Ming Chuan College/1990.03.09
  1131. Data Encryption/Department of Electrical Engineering, Tatung Institute of Technology/1990.03.08
  1132. Computer Cryptology/Department of Information Engineering, Feng Chia University/1990.03.02
  1133. Introduction to the Design of Computer Password/Department of Computer Science and Information Engineering, National Chiao Tung University/1990.03.01
  1134. Information and Computers/Taichung Agricultural Vocational Senior High School/1990.02.06
  1135. Information Security/Department of Mathematics and Science Education, National Chiayi Teachers College/1989.12.11
  1136. Clustering Analysis and Its Applications/Institute of Information Science, Academia Sinica/1989.12.08
  1137. Computer Crime and Countermeasures/Tunghai University, Department of Computer Science Information Engineering/1989.11.01
  1138. Computer Crime and Computer Viruses/Taiwan Provincial Taichung Library/1989.10.15
  1139. Data Compression/Department of Engineering Science, National Cheng Kung University/1989.10.05
  1140. Workshop on Data Engineering Technology/Center of Public and Business Administration Education, National Chengchi University/1989.08.28/08.30
  1141. Information Security/National Chung Hsing University/1989.06.14
  1142. On Developments of Theory and Techniques/Department of Computer Science and Information Engineering, National Chiao Tung University/1989.06.09
  1143. Information and Computers/National Chung Hsing University/1989.06.07
  1144. Data Analysis Technology and Its Applications/Department of Industrial Education, National Taiwan Normal University/1989.05.10
  1145. Data Analysis Technology and Its Applications/Department of Computer Science and Information Engineering, National Taiwan University/1989.04.28
  1146. An Experience in Designing a Database Management System/Computer Society of the Republic of China/1989.04.26
  1147. Public-Key Encryption/Aeronautics Developement Center/1989.04.24
  1148. Introduction to Computer Passwords/Department of Electrical Data Processing, National Taichung Institude of Commerce/1989.03.15
  1149. Information Era/Taichung Agricultural Vocational Senior High School/19888.08.18
  1150. Towards Information Society - Universal Information Education for A11/Taichung Girls' Senior High School/1988.12.10
  1151. Towards Information Society - Information Education for A11/Taichung First Senior High School/1988.12.08
  1152. Recent Developments of Information Security Technology/Department of Computer Science and Information Engineering, National Chiao Tung University/1988.12.01
  1153. Workshop on Information System Technology/World Technology Consultant Industry/1988.11.24/11.26
  1154. A User Identification Scheme on Computer Networks/Academia Sinica/1988.11.10
  1155. Approximate String Searching/Department of Computer Science and Information Engineering, National Chiao Tung University/1988.11.01
  1156. Chinese String Searching/Department of Computer Science and Information Engineering/Electrical Engineering, National Central University/1988.10.12
  1157. Database Management Systems/Aeronautic Development Center/1988.10.05
  1158. Information Era/Taichung Home Economical and Commercial Senior Vocational School/1988.08.15
  1159. Database Management System and Office Automation/Taichung Home Economical and Commercial Senior Vocational School/1988.04.20
  1160. Database Management Systems and Office Automation/Yung-Jing Industrial Vocational Senior School/1988.04.18
  1161. Electronic Data Compression/Department of Electrical Data Processing, National Taichung Institude of Commerce/1988.04.14
  1162. Visual Programming/Aeronautic Development Center/1988.04.13
  1163. On Developments of Theory and Techniques/Tunghai University, Department of Computer Science Information Engineering/1988.04.11
  1164. Visual Programming/Department of Industrial Engineering and Enterprise Information, Tunghai University/1988.03.28
  1165. Decentraliged Database Design/Department of Computer Science and Engineering, Tatung Institute of Technology/1988.03.14
  1166. Data Compression/Computer and Information Network Center, National Chung Hsing University/1987.12.16
  1167. A Step to Information Society - Using Computers/Chang-Ann Junior High School, Chang-Hua/1987.12.15
  1168. A Step to Information Society - Using Computers/Feng-Yuan Junior High School, Feng Yuan/1987.12.12
  1169. Clustering Analysis and Its Applications/Department of Computer Science and Information Engineering, National Cheng Kung University/1987.12.08
  1170. Workshop on Compilers/World Technology Consultant Industry/1987.11.30/12.02
  1171. Clustering Analysis and Its Applications/Department of Computer Engineering, National Chiao Tung University/1987.11.26
  1172. System Simulation/Institute of Harbor and Marine Technology/1987.11.10
  1173. Design Principles of an Information Query System/Tunghai University, Department of Computer Science Information Engineering/1987.11.04
  1174. Designing an Information Query System/Institute of Computer and Decision Sciences, National Tsing Hua University/1987.11.02
  1175. Information Access Control Techniques/National Tsing Hua University, Department of Industrial Engineering /1987.10.28
  1176. Workshop on Information Engineering Technology/Chin-Peng Management Consulting Company/1987.09.21/09.23
  1177. Workshop on Information Systems and Information Auditing/Harvard Management Services/1987.08.27/08.28
  1178. Workshop on Data Structures and Data Analyses/World Technology Consultant Industry/1987.08.24/08.26
  1179. Information Security/Aeronautics Developement Center/1987.07.23
  1180. A Database Management System - System-Bee/World Technology Consultant Industry/1987.07.10
  1181. Visual Programming - FORMOSA/World Technology Consultant Industry/1987.07.09
  1182. Information Era/Ming Dao High School/1987.06.23/07.07
  1183. Advanced GPSS/S/Workshop on Software Packages and Application Systems, sponsored by Ministry of Education/1987.05.26/05.27
  1184. Key to the Treasury of Life/Taichung Second Senior High School/1987.05.11
  1185. Information Science - from the Perspective of Dicrete Mathematics/Tunghai University, Department of Computer Science Information Engineering/1987.04.28
  1186. Information Science - from the Perspective of Data Analysis/Aeronautics Developement Center/1987.04.23
  1187. Information Science - from the Perspective of Data Analysis/National Chung Hsing University, Computer and Information Network Center/1987.04.21
  1188. Data Retrieval and Information Security/National Chung Hsing University, Computer and Information Network Center/1987.04.20
  1189. Database Design - from the Perspective of Data Analysis/Computer Society of the Republic of China/1987.04.14
  1190. A Design of Secure Computer Passwords/National Cheng Kung University, Department of Engineering Science/1987.03.26
  1191. The Developments of Information Retrieval Techniques/Tatung Institute of Technology, Department of Computer Science and Engineering/1987.03.24
  1192. Computers and Information/Tunghai University, International Bussiness Administration/1987.03.22
  1193. Computers and Information/Chia-Yi YMCA/1987.03.21
  1194. Advanced GPSS/S/Workshop on Software Packages and Application Systems, sponsored by Ministry of Education/1987.03.17/03.18
  1195. Sun-Tzu as a Computer Scientist/Taiwan Provincial Taichung Libarary/1987.03.15
  1196. Recent Developments of Data Structures and Searching Techniques/National/ Panasonic Taiwan/1987.02.24
  1197. Information Era/Victory High School/1987.01.15
  1198. Making Skill of Course Question Bank for Information Course/Taichung Home Economical and Commercial Senior Vocational School/1986.12.23
  1199. The Past, Present, and Future Trend of Information Technology/National Chin-Yi Institute of Technology/1986.12.22
  1200. Computers and Communications/Taichung County, Ching-Shui Junior High School/1986.12.13
  1201. Computers and Communications/National Taiwan Normal University, Department of Industrial Education/1986.12.12
  1202. Information Access Control Techniques/National Tsing Hua University, Department of Industrial Engineering/1986.12.03
  1203. Recent Developments of Data Structures and Searching Techniques/National Central University, Department of Computer Science and Information Engineering/1986.11.19
  1204. Secure Secret Broadcasting/World Technology Consultant Industry/1986.11.15
  1205. Data Encryption Techniques/World Technology Consultant Industry/1986.11.14
  1206. Information Access Control Techniques/World Technology Consultant Industry/1986.11.14
  1207. Information Security/National Chung Hsing University, Computer and Information Network Center/1986.10.29
  1208. Visual Programming/Department of Electrical Data Processing, National Taichung Institude of Technology/1986.10.21
  1209. Office Automation/Tunghai University, International Bussiness Administration/1986.10.18
  1210. Visual Programming/National Chung Hsing University, Computer and Information Network Center/1986.10.06
  1211. Computers and Passwords/Taiwan Provincial Taichung Libarary/1986.10.05
  1212. Visual Programming/Institude for Information Industry/1986.09.20
  1213. Computers and Data Processing/Tunghai University, International Bussiness Administration/1986.09.13
  1214. Searching Techniques for Static Data/Aeronautics Developement Center/1986.08.20
  1215. Advanced GPSS/S/Workshop on Software Packages and Application Systems, sponsored by Ministry of Education/1986.06.16/06.17
  1216. Public-Key Cryptography/Taiwan Province Government, Electrical Data Processing Center/1986.06.12
  1217. Computers and Data Processing/Tunghai University, International Bussiness Administration/1986.05.04
  1218. Computer Communications Security System/National Chiao Tung University, Department of Computer Science and Information Engineering/1986.04.17
  1219. An Efficient Data Searching Technique/Chung Yuan Christian University, Department of Information and Computer Engineering/1986.03.31
  1220. How to Construct a Symbolic Database/Institute of Computer and Decision Sciences, National Tsing Hua University/1986.03.25
  1221. Recent Developments of Data Structure Techniques/National Taiwan Institute of Technology, Department of Electronic Technology/1986.03.24
  1222. A Chinese Form-oriented Visual Programming System/National Chung Hsing University/1986.03.18
  1223. Recent Developments of Searching Techniques/Providence College of Arts and Sciences for Women, Department of Information Science/1986.03.13
  1224. Recent Developments of Data Structures and Information Security/Chung-Shan Institute of Science and Technology/1986.03.06
  1225. Information Security Systems/Aeronautics Developement Center/1986.01.24
  1226. Information Protection Systems/Academia Sinica, Institute of Information Science/1986.01.23
  1227. Computer and Information Management/Tunghai University, International Bussiness Administration/1985.10.20/10.26
  1228. On Developments of Theory and Techniques/Feng Chia University, Department of Civil Engineering/1985.10.14
  1229. How to Manage Enterprise Databases/YMCA-IMC Workshop on Computer Research and Study/1985.09.10
  1230. How to Design a Symbolic Database/CDC Computer Company: Workshop on Maintenance and Application of the User System/1985.08.02
  1231. Computer Security Technology/Feng Chia University, Department of Information Engineering/1985.06.07
  1232. On Design of a Symbolic Database - from the Perspective of Theory of Numbers/National Chiao Tung University, Department of Computer Science and Information Engineering, and Department of Computer Information and Science/1985.05.02
  1233. Constructing a Symbolic Database and Information Security System/National Cheng Kung University, Department of Electrical Engineering/1985.04.20
  1234. Information Management Techniques/Taichung First Senior High School/1985.04.18
  1235. Methodology of Computer Software Engineering/Providence College of Arts and Sciences for Women, Department of Information Science/1985.03.27
  1236. Recent Developments of Key-Lock Pair Access Control Mechanism/National Taiwan University, Department of Computer Science and Information Engineering/1985.03.15
  1237. Experiences in Designing an Interactive Database Management System/Providence College of Arts and Sciences for Women, Department of Information Science/1984.12.21
  1238. Data Structure and Information Security - from the Perspective of Sun-Tzu Theorem/Department of Electrical Data Processing, National Taichung Institude of Commerce/1984.11.28
  1239. Recent Development of Text Retrieval/National Taiwan University, Department of Computer Science and Information Engineering/1984.10.19
  1240. Designing a Minimal Perfect Hash Function/Institute of Computer and Decision Sciences, National Tsing Hua University/1984.10.08
  1241. Experiences in Designing a Database Management System/Institude for Information Industry/1984.09.22
  1242. Constructing an Optimal Information Retrieval Method/Feng Chia University, Department of Information Engineering/1984.05.11
  1243. Recent Developments of Multi-key Hashing File Systems/National Taiwan University, Department of Electrical Engineering/1984.02.29
  1244. Application of Database Management Systems/Tax Administratration of Taichung Government/1983.11.26
  1245. Recent Developments of of Perfect Hash Functions/National Taiwan University, Department of Computer Science and Information Engineering/1983.04.29
  1246. A Design of a Multi-key File System/Feng Chia University, Department of Applied Math/1982.12.18
  1247. Data Recovery Automation/National Chung Hsing University, Department of Applied Math/1982.12.11
  1248. Design of an Optimal Multi-key File System/Institute for Information Industry/1982.06.19
  1249. Compiler Construction Techniques/National Chung Hsing University, Department of Applied Math/1982.03.11
  1250. A Design of an Efficient Hashing Function/Institute of Computer and Decision Sciences, National Tsing Hua University/1982.01.07
  1. Cryptosystem for Encrypting Digital Image or Voice File/6023511/ U.S.A./2000.02.08
  2. An Reversible Data Hiding for AMBTC Images Based on Codes Recompression/ZL 2020 1 0554770.6/ China/2023.02.17
  3. Reversible Data Hiding Scheme in Encrypted Image using Adaptive Coding/ZL 2021 1 0649073.3/ China/2023.07.14
  4. A High-Capacity Reversible Data Hiding in Encrypted Images using JPEG-like Compression and Huffman Coding/ZL 2021 1 0303262.5/ China/2023.07.14
  5. A Reversible Data Hiding Method in Encrypted Images with Flexible Selection and Run-Length Coding/ZL 2021 1 0647259.5/ China/2023.06.20
  6. A Reversible Information Hiding Method for Encrypted Image Based on Bit Plane Compression/ZL 2021 1 0649080.3/ China/2023.06.20
  7. 3D Reversible Data Hiding Based on PVO and PEE/ZL 2021 1 0378281.4/ China/2023.05.26
  8. Authenticable Visual Secret Sharing Based on Insect Matrix/ZL 2020 1 0517743.1/ 中国大陆/2023.05.02
  9. A steganography for encrypted images with adaptive parametric binary tree labeling/ZL 2021 1 0368362.6/ China/2023.03.07
  10. A Image Steganography Method Based on Reference Matrix and MSE Evaluation/ZL 2019 1 1393327.9/ China/2022.06.07
  11. Secret sharing and restoration Scheme for QR code based on (3,1) Hamming code/ZL 2021 1 0320436.9/ China/2022.05.13
  12. An Authenticatable (2,3) Secret Sharing Scheme Using Meaningful Share Images Based on Hybrid Fractal Matrix/ZL 2021 1 0320437.3/ China/2022.07.01
  13. A Hop Sequence-based Reversible Data Hiding Scheme for JPEG Images/ZL 2020 1 0554929.4/ China/2022.06.24
  14. SMVQ Compressed Data Hiding Based on Multiple Linear Regression Prediction/ZL 2020 1 0518402.6/ China/2022.02.11
  15. An Efficient Data Hiding Scheme Based on Multi-dimensional Mini-Sudoku/ZL 2020 1 0517768.1/ China/2022.02.22
  16. An Encryption Device for Digital Image and Voice Files/103202/ R.O.C./1999.05.11
  17. A Progressive Secret Image Encryption and Sharing Method Based on Sudoku/CN103544674A/ China/2016.04.06
  18. A Method for Sharing Color Confidential Images/129581/ R.O.C./2001.03.01
  19. A Secure Protocol for End-to-End Mobile Users with Double Authentication/140313/ R.O.C./2001.07.31
  20. Feature-Oriented Digital Watermark for Multimedia/140057/ R.O.C./2001.08.01
  21. A Robust Digital Watermark Method for Multimedia/140692/ R.O.C./2001.08.21
  22. A Speech Hiding Method Based upon Sub-band Coding/141279/ R.O.C./2001.09.01
  23. A Digital Watermark Method Based on Neural Networks/145485/ R.O.C./2001.10.21
  24. A Robust Method of Gray-Scale Watermark Embedding and Retrieval/178825/ R.O.C./2003.05.11
  25. A Progressive Image Transmission Method Based on Guessing Neighbors/199178/ R.O.C./2004.07.22
  26. An Irregular Sampling Coding Method Suitable for Image Authentication and Recoverable Tamper Proofing/I248037/ R.O.C./2006.01.21
  27. A Switching Machine for Digital Watermarks/M319592/ R.O.C./2007.09.21
  28. A Montgomery Multiplier in Finite Fields/I340915/ R.O.C./2011.04.21
  29. A (2,2) Circular Sharing Techniques for Two Color Secret Images/I410908/ R.O.C./2013.10.01
  30. A Meaningful Image Sharing Technique Based on Color Visual Secret Sharing/I434245/ R.O.C./2014.02.21
  31. An Efficient Medical Image Segmentation Algorithm Based on Game-Theoretic Framework/ZL 2013 1 0452311.7/ China/2015.12.23

General Chair

  1. 2021 the 7th International Conference on Artificial Intelligence and Security (ICAIS 2021), July, Dublin, Ireland.
  2. 2020 the 3th International Conference on Data Storage and Data Engineering (DSDE 2020), January 10-12, Barcelona, Spain.
  3. 2012 8th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2012), (*Honorary Chair), Athens, Greece.
  4. 2011 The 3rd International Workshop on IT Service & Cloud Computing (ISCC 2011), Grete, Greece.
  5. 2010 The Second International Conference on Advances in Future Internet (AFIN 2010), Venice, Italy.
  6. 2010 The Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2010), (*Honorary Chair), Darmstadt, Germany.
  7. 2009 The 8th International Workshop on Digital Watermarking (IWDW 2009) (*Region General Chair), University of Surrey, UK.
  8. 2007 The International Conference of Computational Intelligence and Intelligent Systems (*Co-Chair), London, U.K.

Member of a Delegation

  1. Deputy leader of a delegation visiting the Czech Republic to report on engineering education for the Ministry of Education of the R.O.C. (Aug. 1999)
  2. Member of a delegation (consisting of six university presidents from Taiwan) to join the Germany Rector Conference (HRK), and to visit the Hombo Foundation, DAAD (Deutscher Akademischer Austauschdienst), DFS (Deutsche Forschungsgemein Schaft), Technical University of Munich, University of Munich, to report on international university exchange and cooperation for the Ministry of Education of the R.O.C. (Nov. 1 to Nov. 10, 1996)

Recommender

  1. Recommended Dr. Ching-Yun Chang to work on her Ph.D course under the supervision of Professor Stephen Clark at the University of Cambridge. She is currently an outstanding AI Scientist at Amazon, UK.
  2. Recommended Dr. Xin Peng Zhang to be a visiting Humboldt Scholar at Konstanz University, Germany, from 2011 to 2012. Dr. Zhang is now an Information Hiding expert working in Fudan University, China.
  3. Recommended Dr. Zhe Ming Lu to be a visiting Humboldt Scholar at Albert Ludwig University of Frieburg, Germany, from Oct. 2004 to Jan. 2006. Dr. Lu is now a Digital Watermarking expert working in Zhejiang University, China.

International Advisory Committee Member

  1. 2017 The 6th International Conference on Intelligent Systems and Applications (INTELLI 2017), July 23-17, Nice, France
  2. The 4-year-long EU Horizon 2020 project – Computer Vision Enabled Multimedia Forensics and People Identification (IDENTITY) (4 industrial and 12 academic participating institutions from 12 countries)
  3. 2015 GS Multi-International Conference on Computer Science 2015 (GSMIC-CS'15), Ireland, UK
  4. 2013 The International Conference on International Scientific Academy of Engineering & Technology (ISAET 2013), (*International Scientific Committee Member)
  5. 2009 The 1st International Conference on Advances in Future Internet (AFIN 2009) (Advisory Chair), Athens, Greece

Advisory Board Member

  1. 2008 The 5th International Conference on Autonomic and Trusted Computing (ATC-08), Oslo, Norway
  2. 2006 International Journal of Internet Technology and Secured Transactions, UK
  3. 2006 The IEEE 20th International Conference on Advanced Information Networking and Applications (AINA2006), Vienna
  4. 2000 The Second International Workshop on Software Engineering and Multimedia Applications, Germany

Program Committee Member

  1. 2021 the International Workshop on Cyber Security (CSW 2021), August 13-15, Stockholm, Sweden
  2. 2021 2nd International Conference on Cloud Computing, Security and Blockchain (CLSB 2021), September 18-19, 2021, Copenhagen, Denmark
  3. 2020 The 3rd International Conference on Data Storage and Data Engineering (DSDE 2020), June 10-12, 2020, Barcelona, Spain
  4. 2020 The Twelfth International Conference on Emerging Networks and Systems Intelligence (EMERGING 2020), July 26-30, 2020, Nice, France
  5. 2020 The 6th International Conference on Signal and Image Processing (SIPRO 2020), July 25-26, 2020, London, UK
  6. 2020 The 6th International Conference on Image Processing and Pattern Recognition (IPPR 2020), June 13-14, 2020, Helsinki, Finland
  7. 2020 The 9th International Conference on Computational Aspects of Social Networks (CASON 2020), October 19-21, 2020, Thessaloniki, Greece
  8. 2020 The Ninth International Conference on Intelligent Systems and Applications (INTELLI 2020), June 28 - July 02, 2020, Athens, Greece
  9. 2020 the 7th International Conference on Signal and Image Processing (SIGL 2020), January 25-26, 2020, Zurich, Switzerland
  10. 2020 the 15th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISAPP) , February 27-29, 2020, Valletta, Malta
  11. 2019 The 3rd IEEE International Conference on Advanced Information and Communication Technologies (AICT 2019) , July 2-6, 2019, Lviv, Ukraine
  12. 2019 The Eleventh International Conference on Emerging Networks and Systems Intelligence (EMERGING 2019), September 22 - 26, 2019, Porto, Portugal
  13. 2019 The International Conference on Advances in Databases, Knowledge, and Data (DBKDA 2019), June 2-6, 2019, Athens, Greece
  14. 2019 The International Conference on Advances in Signal, Image and Video Processing. Advances in Databases, Knowledge, and Data (SIGNAL 2019), June 2-6, 2019, Athens, Greece
  15. 2019 The 1st International Conference on Advances in Signal Processing and Artificial Intelligence (ASPAI 2019), March 20-22, Barcelona, Spain
  16. 2019 The 14th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISAPP 2019), February 25-27, Prague, Czech Republic
  17. 2018 The 9th International Conference on Computer Technologies and Development (ICCTD 2018), March 24-26, Istanbul, Turkey
  18. 2018 The 1st International Conference on Optics, Photonics and Lasers (OPAL 2018), May 10-12, Barcelona, Spain
  19. 2017 The International Conference on Applied and Theoretical Computing, Control and Electronics (ATCE 2017), September 15-16, Turkey
  20. 2017 The 9th International Conference on Emerging Networks and Systems Intelligence (EMERGING 2017), November 12-16, Barcelona, Spain
  21. 2017 The IEEE Computer Society Signature Conference on Computers, Software and Applications (COMPSAC 2017), July 4-8, Turin, Italy
  22. 2017 The 6th International Conference on Intelligent Systems and Applications (INTELLI 2017), July 23-27, Nice, France
  23. 2017 The 12th International Conference on Computer Vision Theory and Applications (VISAPP 2017), February 27 - March 1, Porto, Portugal
  24. 2016 The 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2016), 2016, November 21-23, Larnaca, Cyprus
  25. 2016 The 5th International Conference on Intelligent Systems and Applications, INTELLI 2016, November 13 - 17, Barcelona, Spain
  26. 2016 The 1st International Conference on Advances in Signal, Image and Video Processing, June 26 - 30, Lisbon, Portugal
  27. 2016 The 8th International Conference on Emerging Networks and Systems Intelligence, (*Technical Committee Member), Venice, Italy
  28. 2016 The 8th International Conferences on Advanced Service Computing (SERVICE COMPUTATION 2016), Rome, Italy
  29. 2016 The 8th International Conference on Future Computational Technologies and Applications (FUTURE COMPUTING 2016), Rome, Italy
  30. 2016 The 11th International Conference on Computer Vision Theory and Applications (VISAPP 2016), Rome, Italy
  31. 2015 The 11th Advanced International Conference on Telecommunications (AICT 2015), Brussels, Belgium
  32. 2015 The International Conference on Advances in Information and Communication Technologies (ICT 2015), Lviv, Ukraine
  33. 2015 The Fourth Seventh Conference on Advances in Future Internet (AFIN 2015), Venice, Italy
  34. 2015 Wireless Sensor Networks: Architectures, Deployments and Trends (WSN-ADT'15), (*Technical Committee Member), Istanbul, Turkey
  35. 2015 The Seventh International Conference on Emerging Network Intelligence (EMERGING 2015), (*Technical Committee Member), Nice, France
  36. 2015 The Fourth International Conference on Intelligent Systems and Applications (INTELLI 2015), St. Julians, Malta
  37. 2015 The Seventh International Conferences on Advanced Service Computing (SERVICE COMPUTATION 2015), Nice, France
  38. 2015 Science and Information Conference (SAI 2015), (*Technical Committee Member), London, UK
  39. 2015 The Seventh International Conference on Advances in Databases, Knowledge, and Data Applications (DBKDA 2015), Rome, Italy
  40. 2014 The 7th FTRA International Conference on Human-centric Ubiquitous Computing and Applications (HumanCom-14), Ostrava, Czech Republic
  41. 2014 Science and Information Conference (SAI 2014), (*Technical Committee Member), London, UK
  42. 2014 The Sixth International Conference on Emerging Network Intelligence (EMERGING 2014), (*Technical Committee Member), Rome, Italy
  43. 2014 The Sixth International Conferences on Advanced Service Computing (SERVICE COMPUTATION 2014), (*Technical Committee Member), Venice, Italy 2014 The Sixth International Conference on Future Computational Technologies and Applications (FUTURE COMPUTING 2014), (*Technical Committee Member), Venice, Italy
  44. 2014 The Third International Conference on Intelligent Systems and Applications (INTELLI 2014), (*Technical Committee Member), Seville, Spain
  45. 2014 The Sixth International Conference on Advances in Databases, Knowledge, and Data Applications (DBKDA 2014), (*Technical Committee Member), Chamonix, France
  46. 2014 The 9th International Conference on Computer Vision Theory and Applications (VISAPP 2014), Lisbon, Portugal
  47. 2013 The Fifth International Conferences on Advanced Service Computing (SERVICE COMPUTATION 2013), Valencia, Spain
  48. 2013 The Science and Information Conference (SAI 2013), (*Technical Committee Member), London, UK
  49. 2013 The 10th International Conference on Signal Processing and Multimedia Applications (SIGMAP 2013), Reykjavik, Iceland
  50. 2013 The 8th International Conference on Computer Vision Theory and Applications (VISAPP 2013), Barcelona, Spain
  51. 2013 The Fifth International Conference on Advances in Databases, Knowledge, and Data Applications (DBKDA 2013), Seville, Spain
  52. 2013 International Conference on Computer Vision Theory and Applications (VISAPP 2013), Barcelona, Spain
  53. 2012 Wireless Sensor Networks: Architectures, Deployments and Trends (WSN-ADT 2012), Istanbul, Turkey
  54. 2012 The Fourth International Conference on Emerging Network Intelligence (EMERGING 2012), Barcelona, Spain
  55. 2012 The Fourth International Conference on Future Computational Technologies and Applications (FUTURE COMPUTING 2012), Nice, France
  56. 2012 The First International Conference on Intelligent Systems and Applications (INTELLI 2012), Chamonix/ Mont Blanc, France
  57. 2012 International Conference on Signal Processing and Multimedia Applications (SIGMAP 2012), Rome, Italy
  58. 2012 The Fourth International Conference on Advances in Future Internet (AFIN 2012), Rome, Italy
  59. 2012 International Conference on Computer Vision Theory and Applications (VISAPP 2012), Rome, Italy
  60. 2012 The 7th International Conference on Signal Image Technoloy & Internet Based Systems (SITIS 2012), Dijon, France
  61. 2011 The Third International Conference on Advances in Future Internet (AFIN 2011), French Riviera, Nice/Saint Laurent du Var, France
  62. 2011 The 3rd International Workshop on Wireless Sensor Networks - Theory and Practice (WSN 2011), Paris, France
  63. 2011 International Conference on Imaging Theory and Applications (IMAGAPP 2011), Algarve, Portugal2011 International Conference on Signal Processing and Multimedia Applications (SIGMAP 2011), Seville, Spain
  64. 2011 the 3rd Workshop on Reversible Computation (RC 2011), Gent, Belgium
  65. 2011 International Conference on Security and Cryptography (SECRYPT 2011), Seville, Spain
  66. 2011 The Third International Conference on Advances in Future Internet (AFIN 2011), French Riviera, France
  67. 2011 The Third International Conference on Advances in Databases, Knowledge, and Data Applications (DBKDA 2011), St. Maarten, The Netherlands Antilles
  68. 2010 The International Conference on Soft Computing and Pattern Recognition (SoCPaR 2010), Cergy Pontoise, France
  69. 2010 The International Conference on Signal Processing and Multimedia Applications (SIGMAP 2010), Athens, Greece
  70. 2010 The International Conference on Signal Processing and Multimedia Applications (SIGMAP 2010), Athens, Greece
  71. 2010 The 2nd International Conference on Imaging Theory and Applications (IMAGAPP 2010), Angers, France
  72. 2010 The 2nd International Conference on Advances in Future Internet (AFIN 2010), Venice, Italy
  73. 2010 The 20th International Conference on Database and Expert Systems Applications (DEXA 2010), Bilbao, Spain
  74. 2009 Design, Analysis and Tools for Integrated Circuits and Systems-the International Conference of Mathematical Sciences (DATICS-ICMS 2009), Istanbul, Turkey
  75. The Second International Conference on Advances in Databases, Knowledge, and Data Applications (DBKDA 2010), Menuires, The Three Valleys, French Alps, France
  76. The 2009 International Conference on Signal Processing and Multimedia Applications, Milan, Italy
  77. 2009 International Conference on Security and Cryptography (SECRYPT 2009), Milan, Italy
  78. 2009 The First International Conference on Advances in Future Internet (AFIN 2009), Athens, Greece
  79. 2009 The First International Conference on Advances in Databases (DB 2009), Gosier, Guadeloupe, France
  80. 2009 The 2nd International Symposium on Intelligent Interactive Multimedia Systems and Services (IIMSS 2009), University of Milan, Italy
  81. 2009 The 1st International Conference on Imaging Theory and Applications (IMAGAPP 2009), Lisbon, Portugal
  82. 2008 The 10th International Conference on Information and Communications Security (ICICS 2008), Birmingham, UK
  83. 2007 The International Conference of Computer Science and Engineering (ICCSE'07), London, U.K.
  84. 2007 The International Conference of Data Mining and Knowledge Engineering (ICDMKE'07), London, U.K.
  85. 2007 The International Conference of Information Security and Internet Engineering (ICISIE'07), London, U.K.
  86. 2007 The International Conference of Signal and Image Engineering (ICSIE'07), London, U.K.
  87. 2007 The Second International Conference on Availability, Reliability and Security (AReS 2007), Vienna, Austria
  88. 2006 The First International Conference on Availability, Reliability and Security (AReS 2006), Vienna, Austria
  89. 2006 IASTED International Conference on Database and Applications (DBA 2006), Innsbruck, Austria
  90. 2005 Databases and Applications (DBA 2005), Innsbruck, Austria
  91. 2005 International Program Committee (IPC) for the IASTED International Conference on Databases and Applications (DBA 2005), Innsbruck, Austria
  92. 2004 International Conference on Information and Communications Security (ICICS 2004), Malaga, Spain
  93. 2004 IASTED International Conference on Databases and Applications (DBA 2004), Innsbruck, Austria
  94. 2002 The 26th IEEE Computer Society International Computer Software and Applications Conference (COMPSAC 2002), UK

International Advisory Board Member of EU Horizon 2020 Project

  1. The 4-year-long EU Horizon 2020 project – Computer Vision Enabled Multimedia Forensics and People Identification (IDENTITY) scale of the consortium (4 industrial and 12 academic participating institutions from 12 countries)

Conference Presenter

  1. Chang, C. C., Nguyen, T. S. and Liu, Y., (2017): "A Reversible Data Hiding Scheme for Image Interpolation Based on Reference Matrix," International Workshop on Biometrics and Forensics (IWBF 2017), The University of Warwick, UK, Apr. 2017.
  2. Chang, C. C., Yang, J. H. and Lai, Y. W. and Liu, Y., (2017): "An Offline User-Verifiable Electronic Traveler's Check System," International Workshop on Biometrics and Forensics (IWBF 2017), The University of Warwick, UK, Apr. 2017.
  3. Xie, X. Z. and Chang, C. C., (2017): "Reversible Data Hiding in Encrypted Images Using Reformed JPEG Compression," International Workshop on Biometrics and Forensics (IWBF 2017), The University of Warwick, UK, Apr. 2017.
  4. Chen, C. C., Chen, K. N. and Hsieh, M. H., (2010): "A Robust Public Watermarking Scheme Based on DWT," Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2010), Darmstadt, Germany, Oct. 2010, pp. 21-26.
  5. Chang, Y. F. and Chang, C. C., (2006): "Enhanced Anonymous Auction Protocols with Freewheeling Bids," Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), Vol. 1, Vienna, Austria, Apr. 2006, pp. 353-358.
  6. The computational and applied mathematics congress, Leuven, Belgium, July, 1986.
  7. 4th International Working Conference on Statistical and Scientific Data Base Management, June, 21-23, 1988, Roma, Italy.
  8. Chang, C. C., Shih, T. K. and Lin, I. C., (2001): “GBN: An Efficient Progressive Image Transmission Method Based on Guessing by Neighbors,” Multimedia Modeling – Modeling Meltimedia Information and System (L. Rutledge and D. C. A. Bulterman Eds.), CWI, Amsterdam, Netherlands, Nov. 2001, pp. 109-126.
  9. Chang, C. C. and Tsai, C. S., (2000): “A Robust Intellectual Property Rights Protection Scheme for Digital Images,” Proceedings of the Second International Workshop on Software Engineering and Multimedia Applications, Vol. 2, Barden-Barden, Germany, Aug. 2000, pp. 85-89
  10. Chan, Y. K. and Chang, C. C., (2000): “A Fast Filter of Spatial Video Retrieval,” Proceedings of the Second International Workshop on Software Engineering and Multimedia Applications, Vol. 2, Barden-Barden, Germany, Aug. 2000, pp. 42-46.
  11. Chang, C. C. and Chan, Y. K., (2000): “A Fast Filter of Image Retrieval Based on Color-Spatial Features,” Proceedings of the Second International Workshop on Software Engineering and Multimedia Applications, Vol. 2, Barden-Barden, Germany, Aug. 2000, pp. 47-51.
  12. Chang, C. C. and Wu, H. C., (2000): “An Image Protection Scheme Based on Discrete Cosine Transformation,” Proceedings of the Second International Workshop on Software Engineering and Multimedia Applications, Barden-Barden, Germany, Aug. 2000, Vol. 2, pp. 90-94.
  13. Wu, Y. J. and Chang, C. C., (1999): “National Founding Mechanism of Science and Technology Efucation Project in Taiwan,” Proceedings of 1999 International Conference on Engineering Education, Ostrava, Czech, Aug. 1999, pp. 2410.
  14. Chen, C. Y., Chang, C. C. and Lee, R. C. T., (1990): “Some File Organizations by the MMI Method for Orthogonal Range Retrieval,” Proceedings of International Symposium on Applied Informatics, Innsbruck, Austria, Feb. 1990, pp. 337-341.
  15. Chang, C. C. and Wu, T. C. (1990): “The Study of an Irregular Triangular Mesh Generator,” Proceedings of International Symposium on Applied Informatics, Innsbruck, Austria, Feb. 1990, pp. 228-233.
  16. Chang, C. C. and Wu, T. C., (1990): “A Password Authentication Scheme without Verification Tables,” Proceedings of International Symposium on Applied Informatics, Innsbruck, Austria, Feb. 1990, pp. 202-204.
  17. Chang, C. C. and Shieh, J. C., (1985): “A Fast Algorithm for Constructing Reciprocal Hashing Functions,” Proceedings of International Symposium on New Directions in Computing, IEEE, Trondheim, Norway, Aug. 1985, pp. 232-236.
  1. 2021, 09 - Present, Guest editor of Transportation Research Interdisciplinary Perspectives.
  2. 2021, 09 - Present, Guest editor of Journal of Traffic and Transportation Engineering.
  3. 2021, 09 - Present, Guest editor of Journal of Advanced Transportation.
  4. 2021, 09 - Present, Guest editor of SAE International Journal of Sustainable Transportation, Energy, Environment, & Policy.
  5. 2021, 07 - Present, Associate Editor of Future Internet.
  6. 2021, 05 - Present, Guest Editor of Special Issue on "Artificial intelligence and information security" Chinese Journal of Electronics, China.
  7. 2017, 07 - Present, Editorial Board Member of Applied Computing and Informatics
  8. 2015, 06 - Present, Editorial Board Member of International Journal of Engineering & Applied Sciences
  9. 2015, 01 - Present, Editorial Board Member of BPIT International Journal of Technology and Management
  10. 2014, 01 - Present, Editorial Board Member of Smart Computing Review
  11. 2013, 10 - Present, Editorial Board Member of International Journal of Information Security Science (IJISS)
  12. 2013, 08 - Present, Editorial Board Member of International Journal of Cloud Computing and Super Computing (IJCS)
  13. 2013, 07 - Present, Guest Editor of Recent Advances in Information Technology for Scientific World Journal, U.S.A.
  14. 2013, 06 - Present, Editorial Board Member of Current Advances in Information Security (CAIS)
  15. 2013, 01 - Present, Co-Editor-in-Chief of International Journal of Network Security
  16. 2012, 12 - Present, Editorial Board Member of Multimedia Technology (MT)
  17. 2012, 12 - Present, Advisory Board of FTRA Journal of Convergence
  18. 2012, 12, Academic Editor of British Journal of Mathematics & Computer Science
  19. 2012, 05 - Present, Editorial Board Member of Recent Patents on Telecommunications
  20. 2012, 05 - Present, Editorial Board Member of International Journal of Digital Contents and Applications (IJDCA)
  21. 2012, 01 - Present, Editorial Board Member of Journal of Information Security and Applications (JISA)
  22. 2011, 11 - Present, Editorial Board Member of Journal of Information & Communication Technology
  23. 2011, 06 - Present, Editor of Information Security Letter (ISL)
  24. 2011, 05 - Present, Associate Editor of Communications in Information Science and Management Engineering (CISME)
  25. 2011, 03 - Present, Editorial Board Member of International Journal of Communication and Security
  26. 2011, 01 - Present, Editor of Tamsui Oxford Journal of Information and Mathematical Sciences (TOJIMS)
  27. 2011, 01 - Present, Editorial Board Member of the Journal of Electronic Science and Technology (JEST)
  28. 2010, 09 - Present, Editor of International Journal of Engineering and Industries (IJEI)
  29. 2010, 09 - Present, Associate Editor of International Journal of Advancements in Computing Technology (IJACT)
  30. 2010, 09 - Present, Associate Editor of the Advances in Information Sciences and Service Sciences (AISS)
  31. 2010, 07 - Present, Editor of International Journal of Intelligent Information Processing (IJIIP)
  32. 2010, 07 - 2017, 08, Present, Editorial Board Member of the KSII Transactions on Internet and Information Systems (TIIS)
  33. 2010, 05 - Present, Editorial Board Member of the Innovative Computing Information and Control - Express Letters, Part B: Applications (ICIC - ELB)
  34. 2010, 03 - Present, Editorial Board Member of the Journal of Computer Research and Development
  35. 2009, 12 - Present, Editorial Board Member of the Wireless Engineering and Technology (WET)
  36. 2009, 10 - Present, Editorial Board Member of the International Journal of Multimedia Intelligence and Security (IJMIS)
  37. 2009, 10 - Present, Editorial Advisory Board Member of the International Journal of Information Technology, Communications and Convergence (IJITCC)
  38. 2009, 09 - Present, Associate Editor of the International Journal of Information Sciences and Computer Engineering (IJISCE), Malaysia
  39. 2009, 08 - Present, Editorial Advisory Committee Member of Formal and Practical Aspects of Autonomic Computing and Networking: Specification, Development and Verification, America
  40. 2009, 06 - Present, Guest Editor for the Special Issue - Recent Advances in Networked Computing for Journal of Networks
  41. 2009, 01 - Present, Guest Editor of the Journal of Software
  42. 2009, 01 - Present, Guest Editor for the Special Issue of Journal of Internet Technology
  43. 2009, 01 - Present, Associate Editor of International Journal on Advances in Internet Technology
  44. 2009, 01 - Present, Editorial Advisory Committee Member of Kansei Engineering and Soft Computing: Theory and Practice
  45. 2009, 01 - Present, Editor of the Journal of Future Generation Information Technology, Korea
  46. 2009, 01 - Present, Co-Editor-in-Chief of International Journal of Information Hiding and Multimedia Signal Processing
  47. 2008, 08 - Present, Guest Editor of the Special Issue - Electronic Commerce and Security for Journal of Communications, Finland
  48. 2008, 07 - Present, Advisor of International Journal of Intelligent Information Technology Application, Hong Kong
  49. 2008, 01 - Present, Guest Editor of Journal of Supercomputing, Korea
  50. 2008, 01 - Present, Co-editor of the Proceedings of International Conference on Intelligent Systems Design and Applications (ISDA08)
  51. 2008, 01 - Present, Guest Editor of the Special Issue - Mobile Computing for Journal of Pervasive Computing and Communications (JPCC)
  52. 2007, 10 - Present, Editorial Board Member of International Journal of Internet Technology and Secured Transactions, Switzerland
  53. 2007, 10 - Present, Editorial Board Member of International Journal of Knowledge Engineering and Soft Data Paradigms (KESDP), Japan
  54. 2007, 10 - Present, Editorial Board Member of The Open Information Science Journal
  55. 2007, 08 - Present, Guest Editor of Journal of Shanghai University: Applied Science, China
  56. 2007, 02 - Present, Program Committee Member of Journal of Automation, Mobile Robotics and Intelligent Systems, Poland
  57. 2007, 01, Editor of Antarctica Journal of Mathematics, India
  58. 2006, 06 - Present, Editorial Advisory Board Member of Recent Patents on Engineering, U.S.A.
  59. 2006, 03 - 2008, 09, Editor-in-Chief of Journal of Computers of the R.O.C.
  60. 2006, 01 - Present, Co-Editor-in-Chief of International Journal of Computer Sciences and Engineering Systems, India
  61. 2005, 11 - Present, Associated Editor of Advisory Board of the International Journal of Autonomic and Trusted Computing
  62. 2005, 11 - Present, Member of Advisory Board of the International Journal of Innovational Computing and Information Control
  63. 2005, 01 - Present, Member of Guest Editorial Board of the International Journal of Pervasive Computing and Communications
  64. 2004, 06 - Present, Editorial and Advisory Board Member of International Journal of Information and Computer Security
  65. 2003, 12 - Present, Editorial Consultant of Communications of Chinese Cryptography Information Security Association (CCISA)
  66. 2002, 07 - Present, Associate Editor of Chaoyang Business and Management Review
  67. 1999, 11 - Present, Advisory Board Member of International Journal of Information Security
  68. 1994, 01 - 1997, 12, Editor of Information Sciences, U.S.A.
  69. 1992, 02, Editor of Advance Database Research and Development Series (World Scientific Publishing Co., Singapore) - Vol. 1 Database Systems for Next - Generation Application Principles and Practice; Vol. 2 Database Systems for Advanced Application; Vol. 3 Future Database
  70. 1990, 12 - Present, Associate Editor of International Journal of Information and Management Science
  71. 1990, 12 - 1994, 01, Associate Editor and Computer Science Coordinator of Journal of the Chinese Institute of Engineers
  72. 1989, 01 - Present, Associate Editor of Journal of Computers
  73. 1989, 01 - 1990, 11, Associate Editor of International Journal of Policy and Information
  74. 1987, 10 - Present, Editor-in-Chief of Information and Education Bimonthly
  75. 1987, 01 - 1994, 01, Associate Editor of Journal of the Chinese Institute of Engineers
  76. 1986, 11 - 1988, 12, Associate Editor of Computer Quarterly
  77. 1986, 04 - 1993, 01, Associate Editor of Journal of Information Science and Engineering
  78. 1986, 04 - 1988, 03, Associate Editor of Journal of Electrical Engineering

Ph. D. students

  1. Meng, Ke-Ju: Randomization based secure secret sharing research in theory and applications (Completion Date: 07, 2021)
  2. Wang, Rong: Research on Several Problems Related to Privacy-Preserving Microdata Publishing (Completion Date: 03, 2021)
  3. Xie, Xiao-Zhu: Hiding Messages in Some Digital Image Domains with Reversibility (Completion Date: 01, 2021)
  4. Huang, Peng-Cheng: The Study of Hiding Data and Sharing Secret Message in QR Codes (Completion Date: 01, 2021)
  5. Liu, Li: Research on data hiding technology for privacy protection in cloud environment (Completion Date: 03, 2020)
  6. Zhuang Xu: The Research of Technique on Anti-spamming of Web Page (Completion Date: 03, 2020)
  7. Nguyen Ngoc Tu: Untraceable Multi-factor Authenticated Key Agreement Protocols for Public Network Communications (Completion Date: 06, 2018)
  8. Wu, Hsiao-Ling: Secure Authentication Schemes for E-Commerce Applications (Completion Date: 08, 2018)
  9. Le Hai Duong: Smart Card Based Authenticated Key Agreement Schemes (Completion Date: 08, 2015)
  10. Huang, Ying-Hsuan: (k, n)-Image Reversible Data Hiding (Completion Date: 07, 2015)
  11. Huynh, Ngoc-Tu: Verifiable Lossless Multi-Image Sharing Schemes for Secret Image Embedding (Completion Date: 06, 2015)
  12. Nguyen, Thai-Son: Reversible Information Hiding Techniques and Their Applications in Image Protection (Completion Date: 06, 2015)
  13. Wang, Xing-Tian: Research on Data Embedding Methods Based on Grayscale Image (Completion Date: 06, 2015)
  14. Cheng, Ting-Fang: Secure Authentication Protocols and Their Applications (Completion Date: 06, 2013)
  15. Chang, Shih-Chang: The Study of Authentication Schemes in Wireless Environment and their Applications to E-Commerce (Completion Date: 06, 2013)
  16. Chen, Kuo-Nan: Hiding Secret Information in Image Compression Code and Image Protection Techniques (Completion Date: 12, 2011)
  17. Pai, Pei-Yan: The study of segmentation and hiding techniques for medical images (Completion Date: 04, 2011)
  18. Wu, Chia-Chi: Security Mechanisms for Electronic Business Applications (Completion Date: 01, 2011)
  19. Lee, Chia-Yin: Secure Communication Schemes in Network Environments (Completion Date: 12, 2010)
  20. Tsai, Hao-Chuan: Authentication and Key Agreement Schemes for Network Applications (Completion Date: 12, 2010)
  21. Chen, Chang-Chu: Efficient Image Encoding and Information Embedding Techniques (Completion Date: 06, 2010)
  22. Wang, Zhi-Hui: The Research on Reversible Data Embedding Techniques (Completion Date: 04, 2010)
  23. Wang, Chung-Chuan: The Study of Stegnography and Watermark on Binary Images (Completion Date: 01, 2010)
  24. Kieu, The Duc: Reversible Information Hiding Techniques for Digital Watermarking and Steganographic Applications (Completion Date: 06, 2009)
  25. Hsieh, Yi-Pei: Embedding Secrets in Digital Images and Their Compression Codes (Completion Date: 06, 2009)
  26. Chen, Yi-Hui: Secret Hiding and Retrieval Techniques for Digital Media (Completion Date: 06, 2009)
  27. Lin, Pei-Yu: Removable Digital Watermarking and Image Protection Mechanisms (Completion Date: 06, 2009)
  28. Yang, Jen-Ho: Authentication Protocols for E-Commerce Applications (Completion Date: 06, 2009)
  29. Tai, Wei-Liang: Image Steganography and Reversible Data Embedding Techniques (Completion Date: 12, 2008)
  30. Chou, Yung-Chen: A Study of Digital Image Coding and Retrieving Techniques (Completion Date: 12, 2008)
  31. Lee, Jung-San: Security Technologies on Wireless Communications and Applications in Electronic Commerce (Completion Date: 03, 2008)
  32. Wu, Ming-Ni: Some Information Hiding Schemes for Various Image Types (Completion Date: November 2007)
  33. Wu, Wen-Chuan: The Study of Vector Quantization and Its Applications to Information Hiding (Completion Date: 07, 2007)
  34. Lee, Yu-Chiang: Fast Algorithms for Mining Frequent Itemsets (Completion Date: 05, 2007)
  35. Lin, Chih-Yang: Data Mining and Its Applications to Image Processing (Completion Date: 10, 2006)
  36. Chan, Chi-Hsiang: The Study of Image Steganography and Digital Watermarking (Completion Date: 12, 2005)
  37. Chang, Ya-Fen: Authentication and Digital Signature Schemes and Their Applications to E-commerce (Completion Date: 12, 2005)
  38. Lu, Tzu-Chun: The Study of Information Hiding Mechanisms (Completion Date: 12, 2005)
  39. Huang, Hui-Feng: The Design and Applications of Some Digital Signatures (Completion Date: 01, 2005)
  40. Chan, Chao-Wen: The Enhancements of Some Public Key Cryptosystems and Their Applications in Electronic Commerce (Completion Date: 01, 2005)
  41. Tseng, Hsien-Wen: Image Coding Schemes for Data Hiding and Error Resiliency (Completion Date: 01, 2005)
  42. Yu, Yuan-Hui: The Study of Digital Image Hiding and Recognition (Completion Date: 01, 2005)
  43. Chuang, Jun-Chou: Steganography and Watermarking in Digital Images (Completion Date: 10, 2004)
  44. Lai, Yi-Pong: Fast Exponentiation Computations and Number System Transformations (Completion Date: 07, 2004)
  45. Lin, Yung-Chang: Data Communication and Security in Mobile Computing Environment (Completion Date: 03, 2004)
  46. Tsai, Pi-Yu: The Study of Image Protection Mechanisms for Image Hiding and Image Authentication (Completion Date: 01, 2004)
  47. Huang, Kuo-Feng: Secure Encryption and Authentication Schemes for Text Data and Digital Images (Completion Date: 06, 2002)
  48. Wu, Hsien-Chu: Copyright Protection Techniques for Digital Images and Their Applications to Tampering Proof and Recovery (Completion Date: 06, 2002)
  49. Tsai, Chui-Hsiung: A Study of Image Intellectual Property Rights Protection and Image Camouflage (Completion Date: 05, 2002)
  50. Hung, Kuo-Lung: Block Reconstruction Techniques for Image Recovery (Completion Date: 01, 2002)
  51. Chan, Yung-Kuan: Similar Image and Video Retrieval Systems Based on Spatial and Color Attributes (Completion Date: 12, 2000)
  52. Wang, Ching-Te: Designing Some Cryptographic Schemes for Group Communication Systems (Completion Date: 12, 1999)
  53. Chiang, Chi-Han: Effective Algorithms for Compressing Various Data (Completion Date: 12, 1999)
  54. Hu, Yu-Cheng: Some Image Encoding Schemes Based on Vector Quantization (Completion Date:  12,  1999)
  55. Li, Chin-Feng: Some Indexing Design and File Organizations for Spatial Match Retrieval (Completion Date: 06, 1998)
  56. Huang, Jen-Chun: Some Secret Sharing Schemes and Their Applications (Completion Date: 04, 1998)
  57. Lee, Wei-Bin: Designing Some Digital Signature Schemes and Extending Their Applications to Information Security Systems (Completion Date: 05, 1997)
  58. Lou, Te-Chuan: Fast Computations for Some Public Key Cryptosystems (Completion Date: 03, 1997)
  59. Chen, Chien-Yuan: The Study of Properties and Applications for Public Key Cryptosystem Based on Number Theorem (Completion Date: 04, 1996)
  60. Huang, Hsin-Chia: The Design and Server-Aided Secret Computation of Digital Signatures (Completion Date: 04, 1996)
  61. Chen, Chih-Ying: The Study of Properties for Local Queries in Multi-Key File Systems (Completion Date: 06, 1995)
  62. Shih, Chien-Chin: Some Properties on Vectorial Addition Chains (Completion Date: 12, 1994)
  63. Wu, Tsung-Cheng: Title: The Study of Encryption and Control Techniques for Information System (Completion Date: 06, 1992)
  64. Lin, Chu-Hsing: Some Control Mechanisms for Data Security in Computer Systems (Completion Date: 06, 1991)

Master students

  1. Jhang, R. F.: A Data Hiding Scheme for JPEG Images and Tamper Detection for Medical Images (Completion Date: 12, 2021)
  2. Kao, W. J.: The Data Hiding Mechanisms for VQ-Compressed Images and Cover Images Using some Innovative Techniques (Completion Date: 12, 2021)
  3. Shih, C. S.: An Improvement on VQ Compression Method and Hiding Information in VQ Decompressed Images (Completion Date: 07, 2020)
  4. Li, G. L.: Several Data Hiding Schemes for AMBTC Compressed Codes (Completion Date: 07, 2020)
  5. Zheng, Y. Z.: Several Authentication Schemes with Anonymity for Open Network Environment (Completion Date: 07, 2020)
  6. Sun, M.: Research on Copyright Protection Algorithm for Game Character Concept Design (Completion Date: 06, 2020)
  7. He, M. Z.: Research and Application on Data Hiding in Image (Completion Date: 06, 2020)
  8. He, M.: Research on Data Hiding Algorithm Based on Absolute Moment Block Truncation Coding (Completion Date: 06, 2020)
  9. He, S. L.: An Image Authentication Scheme Based on Compessed AMBTC with Restoration (Completion Date: 07, 2019)
  10. Hu, H. D.: Design of Secret Sharing Schemes and Its Application in Data Backup (Completion Date: 07, 2019)
  11. Zhuag, R. H.: Research of Searchable Encryption Scheme of Uncertain Data (Completion Date: 07, 2019)
  12. Li, X. S.: Research on Image Information Hiding Technology Based on Turtle Shell Matrix (Completion Date: 07, 2019)
  13. Yu, J. E.: Research and Application of QR Code Security Authentication (Completion Date: 03, 2019)
  14. Zeng, Q. F.: Adaptive Information Hiding with High Embedding Capacity Using Modification of Pixel Prediction Errors (Completion Date: 06, 2018)
  15. Tang, R.: Reserach of Block Based High Capacity Image Data Hiding Schemes (Completion Date: 05, 2018)
  16. Zhu, Z. H.: Steganography Based on Guitar Music (Completion Date: 05, 2018)
  17. Wang, J. Q.: Feature Selection and Detection Performance Improvement for Mining Fraud Web (Completion Date: 05, 2018)
  18. Lin, J.:Research of Classification Detecion Method for Highly Imbalanced Data of Web Spam(Completion Date: 05, 2018)
  19. Tan, J. F.: Integrating Cost-Sensitive and Deep Learning for Image Classification (Completion Date: 05, 2018)
  20. Sun, M. H.: The Reserach of Robust Hash Algorithm for Color Images (Completion Date: 07, 2017)
  21. Di, Y. F.: Research on Removable and High Robust Watermarking Scheme Based on Transform Domain (Completion Date: 07, 2017)
  22. Wu, Y. H.: Research of Reversible Data Hiding Algorithm Based on Image (Completion Date: 07, 2017)
  23. Mao, K.: Research on Image Information Hiding Technology Based on Hamming Code (Completion Date: 04, 2017)
  24. Hsu, W. L.: Research on Key Technology of Information Hiding Based on Image Space Domain (Completion Date: 04, 2017)
  25. Kuo, I: Research on Information Hiding Technology for Cloud Computing Security Application (Completion Date: 04, 2017)
  26. Kuo, P: Research on Multi-Feature Data Routing Strategy in Deduplication (Completion Date: 04, 2017)
  27. Kao, H: Research on the Application of Digital Watermarking in Privacy in Cloud Environment (Completion Date: 04, 2017)
  28. Peng, H. H.: Research on Credit Card Authentication Algorithm Based on Secret Sharing and Image Watermarking (Completion Date: 12, 2016)
  29. Chang, K. L.: QR Code Landscaping Algorithm and Security Mechanism Research (Completion Date: 12, 2016)
  30. Wu, C. H.: Certificateless Authentication Method on Wireless Body Area Network (Completion Date: 06, 2016)
  31. Lo, Y. Y.: Research on Key Agreement Authentication Method and Telemedicine Information System Authentication Method Based on Passing Code (Completion Date: 06, 2016)
  32. Chien, T. I.: Based on Image Sharpening and Image Compression and Encryption (Completion Date: 06, 2016)
  33. Wang, Y. K.: Embedded Information in the Absence of Distortion Data Compression Code, Compressed Images and Encrypted Image of the Study (Completion Date: 06, 2016)
  34. Wang, C. M.: Research on Reversible Data Hiding Technology of ABTC-EQ Compression Codes and AMBTC Decompression Images (Completion Date: 06, 2016)
  35. Hsu, C. I.: Research on Effective Color Image Retrieval Technology Based on Block Truncation Coding (Completion Date: 06, 2016)
  36. Jin, Q.: Research on optimized block truncation coding and data hiding algorithm based on compressed images (Completion Date: 06, 2016)
  37. Xia, B. B.: Reversible data hiding based on vector quantization (Completion Date: 06, 2016)
  38. Bai, J. l.: Some Techniques for Information Hiding in Images (Completion Date: 05, 2016)
  39. Chang, W. C.: Reversible Data Hiding for Encrypted and Compressed Digital Image (Completion Date: 06, 2015)
  40. Hsueh, H. S.: Data Hiding Schemes for Still Images and Videos (Completion Date: 06, 2015)
  41. Shih, T. H.: The Study of Reversible Authentication Techniques for Digital Images (Completion Date: 06, 2015)
  42. Yang, X. Q.: Semi-fragile Watermarking Algorithms for Tamper Detection and Image Authentication (Completion Date: 06, 2015)
  43. Li, F.: Reversible Image Hiding Algorithms based on Wavelet Transformation (Completion Date: 12, 2014)
  44. Hsueh, W. Y.: Multi-Server Remote User Authentication Mechanisms Using Smart Card (Completion Date: 06, 2014)
  45. Chou, Y. C.: A Study of Group Authentication and Data Protection (Completion Date: 06, 2014)
  46. Chung, T. F.: Authentication and Data Hiding Schemes for Digital Images (Completion Date: 06, 2014)
  47. Lin, M. C.: Embedding Secret Information in VQ Index Tables (Completion Date: 06, 2014)
  48. Yang, H. R.: Study on Data Hiding Algorithms Based on Compression Codes (Completion Date: 06, 2014)
  49. Jia, X. D.: Research on Privacy-preserving Identity Authentication Protocols in Vehicular Ad Hoc Networks (Completion Date: 06, 2014)
  50. Hsu, T. J. Some Data Hiding Techniques and Their Applications (Completion Date: 06, 2013)
  51. Chen, W. Y.: Authentication Protocols for Some E-commerce Applications (Completion Date: 06, 2013)
  52. Chen, Y. C.: Reversible Data Embedding Schemes for VQ-Compressed Images (Completion Date: 06, 2013)
  53. Sun, C. Y.: Secure and Efficient Authentication Schemes for Wireless Communications (Completion Date: 06, 2013)
  54. Tsai, H. Y.: Pixel Unexpanded Visual Cryptography Techniques Based on Meaningful Shadows (Completion Date: 06, 2012)
  55. Chang, C. H.: Some Smart Card Oriented Authentication Protocols for Mobile Communication (Completion Date: 06, 2012)
  56. Lin, C. C.: Information Hiding and Visual Secret Sharing Based on Exploiting Modification Direction (Completion Date: 06, 2012)
  57. Wang, S. T.: Novel Reversible Data Hiding Schemes for Secret Images and Traditional Chinese Text Files (Completion Date: 06, 2012)
  58. Liao, L. T.: Two  Steganographic  Schemes for Embedding Large Secret Information (Completion Date: 06, 2012)
  59. Chiu, Y. P.: The study of Distortion and Distortion free Visual Secret Sharing Scheme (Completion Date: 06, 2012)
  60. Lin, T. Y.: Information Hiding Techniques for Script Files and Image Files (Completion Date: 06, 2012)
  61. Yue, S.: Image Data Hiding Scheme Based on Graph Coloring (Completion Date: 06, 2011)
  62. Cui, S. Y.: Image Data Hiding Based on Voronoi Diagram (Completion Date: 06, 2011)
  63. Marcos  Pizzolatti: The study of some reversible secret sharing schemes (Completion Date: 06, 2011)
  64. Vo  Phuoc  Hung: Sharing Secret Messages Using Meaningful Digital Shadow images (Completion Date: 06, 2011)
  65. Nguyen Thai Son: Reversible Data Hiding Techniques for VQ-compressed Domain (Completion Date: 06, 2011)
  66. Tsou, P. L.: Perceptual Robust Image Hashing Scheme Based on Halftone Mechanism and Non-Uniform Sampling (Completion Date: 06, 2011)
  67. Liu, C. M.: Non-Reversible and Reversible Data Hiding Based on Module Operation (Completion Date: 06, 2011)
  68. Chen, Y. W.: User Authentication and Key Agreement Protocols for Wireless Network Environment (Completion Date: 06, 2011)
  69. Chen, P. Y.: Reversible High-payload Information Hiding Scheme for Digital Cover Images and VQ Index Tables (Completion Date: 06, 2011)
  70. Tseng, W. T.: Authentication Protocols for Heterogeneous Communication Network Environment (Completion Date: 06, 2011)
  71. Yin, Z. X.: Hiding Information in Digital Images (Completion Date: 06, 2010)
  72. Wu, C. Y.: Reversible Data Hiding Schemes Using Repeatedly Embedding Strategy with High Capacity (Completion Date: 06, 2010)
  73. Tsai, M. C.: Digital Copyright Protection and Image Authentication Using Watermarking Strategy (Completion Date: 06, 2010)
  74. Liu, T. C.: The Study of Digital Images Embedding Techniques and Visual Secret Sharing Schemes (Completion Date: 06, 2010)
  75. Huynh, N. T.: Visual Cryptography for Users Verification (Completion Date: 06, 2010)
  76. Hsieh, M. H.: Preserving User-Participation in Insecure Networks Based on Visual Secret Sharing and Authentication Watermarking (Completion Date: 06, 2010)
  77. Huang, Y. C.: Mobile Conference Mechanism for Wireless Communication Users (Completion Date: 06, 2010)
  78. Lin, H. C.: Some Secret Embedding Schemes for Different Entities (Completion Date: 06, 2010)
  79. Li, Q.: A Study on Reversible Watermarking (Completion Date: 06, 2010)
  80. Liao, C. C.: The Study of Visually Sharing Secret Images (Completion Date: 06, 2009)
  81. Wang, H. C.: Embedding Secret Information in a Condenced Image and Multiple Image Files (Completion Date: 06, 2009)
  82. Chen, Y. C.: Segmentation and Classification Techniques for Retinal Images (Completion Date: 06, 2009)
  83. Chen, C. H.: Illumination-Balance Techniques for Text-photo Images (Completion Date: 06, 2009)
  84. Wu, Y. C.: Authenticated Communication Systems for E-mail Protocal and Vehicular Ad Hoc Networks (Completion Date: 06, 2009)
  85. Lai, Y. W.: Message Broadcasting and Electronic Voting Schemes Based on Elliptic Curve Cryptosystem (Completion Date: 06, 2009)
  86. Le, T. H. N.: Secret Sharing Using Multiple Shadow Images (Completion Date: 06, 2009)
  87. Liu, L. J.: The Detection of Visual Secret Shadow Cheating and Digital Image Tampering (Completion Date: 06, 2008)
  88. Wang, Yi-Ran: The Study of Data Hiding Based on Modification Direction Embedding Method (Completion Date: 06, 2008)
  89. Chuang, Lin-Yi: The Optimal Solution and Improvement of Exploiting Modification Direction Embedding Method (Completion Date: 06, 2008)
  90. Huang, W. H.: Two Efficient Demosaicking Algorithms for Color Filter Array (Completion Date: 06, 2008)
  91. Wang, G. H.: The Study of High Quality Stego-image for Large Payload (Completion Date: 06, 2008)
  92. Yang, S. R.: Scalable Key Assignment Protocols in Internet (Completion Date: 06, 2008)
  93. Yah, C. M.: Reversible Data Hiding Schemes for Large Payload and Low Distortion (Completion Date: 06, 2008)
  94. Lin, S. Y.: Key Establishment and Agreement Protocols and Their Application to Internet and Wireless Environments (Completion Date: 06, 2007)
  95. Li, K. M.: A Predictive SMVQ Scheme and Data Embedding for Digital Images (Completion Date: 06, 2007)
  96. Chang, K. J.: Authentication Mechanisms and a Payment Protocol for Wireless Environment (Completion Date: 06, 2007)
  97. Chiu, Y. C.: Some Authentication Schemes and Their Applications to Internet and Wireless Environments (Completion Date: 06, 2007)
  98. Lin, C. H.: Some Visual Cryptoschemes for Secret Images (Completion Date: 06, 2007)
  99. Cheng, T. F.: An IC-Card-Based Remote Login Mechanism and a Proxy Raffle System in Computer Networks (Completion Date: 06, 2007)
  100. Chang, S. C.: A Mutual Authentication Scheme and Its Application to Electronics Traveler Checks (Completion Date: 06, 2007)
  101. Fan, Y. H.: The Design and Analysis of Information Hiding and Secret Image Sharing Schemes (Completion Date: 06, 2006)
  102. Cheng, Y. F.: Some Information Security Applications using Symmetric and Asymmetric Crypto Schemes (Completion Date: 06, 2006)
  103. Shue, Y. W.: Some Key Management Protocols for Insecure Networks (Completion Date: 06, 2006)
  104. Chang, P. Y.: Group Signature and Key Agreement Schemes Based on Diffie-Hellman Key Exchange Protocol (Completion Date: 06, 2006)
  105. Lin, K. C.: Some Efficient Techniques for Secure Peer-to-Peer Networking (Completion Date: 06, 2005)
  106. Kuo, J. Y.: Some Password Authentication Schemes Using Smart Cards for Single and Multiple Server Architectures (Completion Date: 06, 2005)
  107. Kao, C. L.: On Authentication Protocols for Communication Networks (Completion Date: 06, 2005)
  108. Yeh, J. B.: Hiding Secrets in Data Compression Codes (Completion Date: 06, 2005)
  109. Wang, Y. Z.: Some Image Steganography Schemes with High Embedding Capacity (Completion Date: 06, 2005)
  110. Tseng, C. S.: Various Secret Embedding Schemes for Binary and Gray Level Techniques (Completion Date: 06, 2005)
  111. Lin, P. Y.: Two Data Hiding Schemes for Grayscale Images and Image Compression Codes (Completion Date: 06, 2004)
  112. Liu, Y. L.: The Techniques of Digital Image Transmission and Authentication (Completion Date: 06, 2004)
  113. Tai, Wei-Liang: Hiding a Digital Image into Two Cover Images (Completion Date: 06, 2004)
  114. Hu, Y. H.: Retrieving Digital Images from Frequency Domain Transformed Databases (Completion Date: 06, 2004)
  115. Chou, H. C.: Some Studies on Digital Image Steganographic and Watermarking Techniques (Completion Date: 07, 2003)
  116. Liao, C. T.: Some Image Compression and Data Protection Techniques Using Support Vector Machines (Completion Date: 06, 2003)
  117. Chen, G. M.: Lossless Vector Quantization Indices Compression and Information Hiding Schemes Based on Search-Order Coding (Completion Date: 06, 2003)
  118. Wu, Wen-Juan: Data Hiding and Content Retrieval in Digital Image Database (Completion Date: 06, 2003)
  119. Lee, C. F.: Code Transformation Between Various Image Splitting Tree Representations and Chinese Calligraphy Transmission Progressively Based on Quadtrees (Completion Date: 06, 2003)
  120. Su, Y. Y.: Two Color Image Quantization Schemes for Non-true-color Display (Completion Date: 06, 2002)
  121. Chen, G. I.: TheStudy of Lossless Image Compression an Image Magnification (Completion Date: 06, 2002)
  122. Chung, C. Y.: Some Protocols for Passing Messages Securely and Protecting Rightful Ownership (Completion Date: 06, 2002)
  123. Pan,Y. P.: The Study of Multisecret Sharing Schemes and Their Applications to Access Control in a User Hierarchy (Completion Date: 06, 2002)
  124. Yu, T. X.: The Study of Digital Image Ciphering and Hiding Mechanisms (Completion Date: 06, 2001)
  125. Chan, C. S.: Some Data Hiding Techniques for Digital Images (Completion Date: 06, 2001)
  126. Yeh, J. C.: The Study of Copyright Protection Schemes for Digital Images (Completion Date: 06, 2001)
  127. Jiang, J. L.: The Design of Some Filter for Image Denoising (Completion Date: 06, 2001)
  128. Lu, P. W.: The Application of Vector Quantization Techniques to Digital Image Tamper Proofing (Completion Date: 06, 2001)
  129. Hsieh, C. P.: The Study of Denoising Technique for Digital Images (Completion Date: 06, 2001)
  130. Chuang, J. C.: The Study of Image Tampering Detection (Completion Date: 06, 2000)
  131. Hsia, H.C.: Two Hiding Techniques for Data Security and Image Copyright Protection (Completion Date: 06, 2000)
  132. Lin, Y.: Image Compression and Copyright Protection Using Edge Detection Methods (Completion Date: 06, 2000)
  133. Xiao, G. X.: Two Prediction Methods for Image Compression and Progressive Image Transmission (Completion Date: 06, 2000)
  134. Chung, P. F.: Two Copyright Protection Scheme for Digital Images (Completion Date: 06, 2000)
  135. Kuo, Y. T.: Fast Algorithm for Some Meta-Operations in Cryptographic Systems (Completion Date: 06, 1999)
  136. Chen, Kuo-Lun: Signing a Message by a Group of Signers and Verifying a Signature by a Group of Verifiers Using (t,n) Threshold Scheme (Completion Date: 06, 1999)
  137. Shine, F. C.: Some Techniques of Image Compression and Transmission Using Vector Quantization and Bit-plane (Completion Date: 06, 1998)
  138. Hwang, P. C.: Accessing Shared Secrets in a Hierarchy (Completion Date: 06, 1998)
  139. Jau, J. J.: Image Compression and Transmission Using Vector Quantization and S-tree (Completion Date: 06, 1998)
  140. Chen, L. L.Some Searching Techniques for Block Motion Estimation for Video Compression (Completion Date: 06, 1997)
  141. Sung, C. H.: Locally Adaptive Schemes for Data Compression Using  Multilist  Structure (Completion Date: 06, 1997)
  142. Chou, J. S.: An Image Coding Scheme Using Prediction of Euclidean Distance Computation on a Smaller Codebook (Completion Date: 06, 1996)
  143. Kuo, C. L.: Fast  Codeword  Search Techniques for Vector Quantization (Completion Date: 06, 1995)
  144. Leu,  JJyh-Jong: The Performance Analysis of Bloom and Random Filters (Completion Date: 05, 1995)
  145. Li, W. T.: A Fast Search Algorithm for Vector Quantization Based Upon Principal Component Analysis Technique (Completion Date: 05, 1995)
  146. Lin, D. C.: Utilizing the Concept of Longest Common Subsequence to Retrieve Similar Chinese Characters (Completion Date: 05, 1995)
  147. Horng, W. J.: A Cascade Exponentiation Evaluation Scheme Based on the Lempel-Ziv-Welch Compression Algorithm (Completion Date: 05, 1994)
  148. Wu, W. B.: A Secure Voting System on a Public Network (Completion Date: 05, 1994)
  149. Jiang, J. H.: A Spatial Filter for Similarity Retrieval (Completion Date: 05, 1994)
  150. Tsu, S. M.: An Improvement on a Probabilistic Encryption Scheme and Its Applications (Completion Date: 05, 1994)
  151. Lee, C. F.: A Greedy Relaxed Generalised Disc Modulo Allocation Method for Multiple Key Hashing Files on Multi-Disc Systems (Completion Date: 05, 1994)
  152. Lin, T. H.: A Secure Group-Oriented Secret Sharing Scheme (Completion Date: 05, 1993)
  153. Liao, W. Y.: A Remote password authentication scheme based upon ElGamal's signature scheme (Completion Date: 05, 1993)
  154. Wang, C. H.: A Modified Lempel-Ziv-Welch Encoding Scheme Based on the Frequencies of Characters (Completion Date: 05, 1993)
  155. Liou, F. Y.: A Digital Multisignature Scheme Based upon Modified E1Gamal's Public Key Cryptosystem And Its Digital Signature Scheme (Completion Date: 05, 1993)
  156. Lee, W. B.: On the Design and Implementation of an Analyzer and a Vaccination for Computer Viruses (Completion Date: 05, 1993)
  157. Kowng, H. C.: A Digital Signature Scheme Based Upon Theory of Quadratic Residues (Completion Date: 05, 1992)
  158. Chen, Y. W.: A Two-Dimensional Shape Recognition Scheme Based on Principal Component Analysis (Completion Date: 05, 1992)
  159. Chen, C. Y.: A Dynamic Access Control Scheme Based Upon Ziegler's Row Displacement Method (Completion Date: 05, 1992)
  160. Lee, H.C.: A Solution to Generalized Group Oriented Cryptography (Completion Date: 05, 1992)
  161. Hwang, S. J.: Sharing a Dynamic Secret (Completion Date: 11, 1991)
  162. Hwang, R. J.: Controlling Access in Hierarchical Structures Using Cryptographic Keys (Completion Date: 11, 1991)
  163. Wang, S. J.: A Dynamic Key-Lock-Pair Access Control Scheme (Completion Date: 05, 1991)
  164. Lin, J. F.: A Chinese Syllables Compression Scheme Based Upon Perfect Hashing (Completion Date: 05, 1990)
  165. Hwang, S. M.: A Shape Recognition Scheme Based on Relative Distances of Feature Points from the Centroid (Completion Date: 05, 1990)
  166. Chen, D. C.: A Modified Arithmetic Coding Scheme Suitable for Binary Search (Completion Date: 05, 1990)
  167. Dai, J. Y.: Sharing a Circular Storage for Multiple Stacks (Completion Date: 05, 1990)
  168. Lin, J. C.: A Fast Spatial Match Accessing Scheme for Symbolic Pictures (Completion Date: 05, 1990)
  169. Wu, C. H.: The Study of Security Technologies for Broadcasted Network Systems (Completion Date: 05, 1989)
  170. Wu, L. H.: An Arithmetic Coding Oriented Single Key Access Control Scheme (Completion Date: 05, 1989)
  171. Liao, H. T.: A New Approach to Assign Cryptographic Keys in a Tree Structure for Access Control (Completion Date: 05, 1989)
  172. Wu, T. C.: The Studies of Computer Authentication and Secure Broadcasting Based upon Euclidean Geometry (Completion Date: 05, 1989)
  173. Chow, L. C.: The Study of Visual Form Transformation System (Completion Date: 05, 1989)
  174. Chou, A. Y. H.: The Study of File Systems Suitable for Queries (Completion Date: 05, 1989)
  175. Leu, D. F.: Multi-key Sorting as a File Organization Scheme When Queries Are Not Equally Likely (Completion Date: 05, 1988)
  176. Hsiao, J. Y.: Strings Near-Matching Techniques for Large Textual Files (Completion Date: 05, 1988)
  177. Chen, C. H.: Organizing Distributed Data Based for Parallel Searching (Completion Date: 05, 1988)
  178. Chang, S. S.: Optimal Properties of Binary Cartesian Product File System (Completion Date: 05, 1988)
  179. Mong, I. H.: A New Data Compression Scheme Based upon Lempel-Ziv Universal Algorithm (Completion Date: 05, 1988)
  180. Wang, C. T.: The Development of a Computer Assisted Instruction System for Structure Assembly Languages (Completion Date: 05, 1987)
  181. Wu, H.C.: The Design of a Minimal Perfect Hashing Function for Mandarin Symbols System (Completion Date: 05, 1987)
  182. Chen, C. H.: The Study of Data Missing and Data Integrity (Completion Date: 05, 1987)
  183. Chang, C. H.: A Dynamic Access Control Scheme Based upon Chinese Remainder Theorem (Completion Date: 05, 1987)
  184. Cheng, W. Y.: The Study of a User-Hierarchy Mechanism for Computer System Resources (Completion Date: 05, 1987)
  185. Lin, C. H.: A Strategy of Information Secure Broadcasting (Completion Date: 05, 1986)
  186. Lee, Y. P.: A Letter Oriented Minimal Perfect Rehashing Scheme Based upon Reciprocal Hashing (Completion Date: 05, 1986)
  187. Hsiao, M. D.: The Study of File Allocation Strategies for Concurrent Retrieval (Completion Date: 05, 1986)
  188. Chen, H. Y.: Symbolic Gray Code as a Data Allocation Scheme for Two-Disk Systems (Completion Date: 05, 1986)
  189. Chen, C. P.: A Key-Lock-Pair Mechanism Based on Generalized Chinese Remainder Theorem (Completion Date: 05, 1986)
  190. Shieh, J. C.: Hung, M. F.An Access Control Mechanism for Information Protection System (Completion Date: 05, 1986)
  191. Shieh, J. C.: On the Design of Letter Oriented Minimal Perfect Hashing Functions (Completion Date: 05, 1985)
  192. Tsai, W. H.: A Branch and Bound Algorithm for Allocating Multi-attribute File Systems (Completion Date: 05, 1985)
  193. Yuan, S. T.: A Parallel Scheme of the Closest Pair Problem and All Closest Points Problem for VLSI Systems (Completion Date: 05, 1985)
  194. Liang, J.: Performance Analysis of the k-nearest Neighbor Search Technique Based upon Multiple Key Hashing Functions (Completion Date: 05, 1984)
  195. Lian, L. S.: Toward the Strict Optimality Study on Concurrent Disk Accessing (Completion Date: 05, 1984)
  196. Su, D. H.: Some Properties of Multi-Attribute File System Based upon Multiple Key Hashing Functions for Partial Match Queries (Completion Date: 05, 1984)
  197. Shen, Jau-Ji: Performance Analysis of the Disk Modulo Allocation Method for Concurrent Accessing on Multiple Disk System (Completion Date: 05, 1984)
Last update:2024-3-28, 9:09 a.m. Next update:2024-3-29, 9 a.m.