Chin-Chen Chang
Cited by
Cited by
Reversible data hiding based on histogram modification of pixel differences
WL Tai, CM Yeh, CC Chang
IEEE transactions on circuits and systems for video technology 19 (6), 906-910, 2009
A steganographic method based upon JPEG and quantization table modification
CC Chang, TS Chen, LZ Chung
Information Sciences 141 (1-2), 123-138, 2002
SVD-based digital image watermarking scheme
CC Chang, P Tsai, CC Lin
Pattern Recognition Letters 26 (10), 1577-1586, 2005
Blockchain based searchable encryption for electronic health record sharing
L Chen, WK Lee, CC Chang, KKR Choo, N Zhang
Future generation computer systems 95, 420-429, 2019
Remote password authentication with smart cards
CC Chang, TC Wu
IEE Proceedings E (Computers and Digital Techniques) 138 (3), 165-168, 1991
Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy
CC Chang, JY Hsiao, CS Chan
Pattern Recognition 36 (7), 1583-1595, 2003
Multilevel reversible data hiding based on histogram modification of difference images
CC Lin, WL Tai, CC Chang
Pattern Recognition 41 (12), 3582-3591, 2008
Reversible hiding in DCT-based compressed images
CC Chang, CC Lin, CS Tseng, WL Tai
Information Sciences 177 (13), 2768-2786, 2007
A new encryption algorithm for image cryptosystems
CC Chang, MS Hwang, TS Chen
Journal of Systems and Software 58 (2), 83-91, 2001
Isolated items discarding strategy for discovering high utility itemsets
YC Li, JS Yeh, CC Chang
Data & Knowledge Engineering 64 (1), 198-217, 2008
A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks
CC Chang, HD Le
IEEE Transactions on wireless communications 15 (1), 357-366, 2015
A steganographic method for digital images using side match
CC Chang, HW Tseng
Pattern Recognition Letters 25 (12), 1431-1437, 2004
Anti-CD3 and nasal proinsulin combination therapy enhances remission from recent-onset autoimmune diabetes by inducing Tregs
D Bresson, L Togher, E Rodrigo, Y Chen, JA Bluestone, KC Herold, ...
The Journal of clinical investigation 116 (5), 1371-1381, 2006
Chronological evolution of IgM, IgA, IgG and neutralisation antibodies after infection with SARS-associated coronavirus
PR Hsueh, LM Huang, PJ Chen, CL Kao, PC Yang
Clinical microbiology and infection 10 (12), 1062-1066, 2004
Sharing secrets in stego images with authentication
CC Chang, YP Hsieh, CH Lin
Pattern Recognition 41 (10), 3130-3137, 2008
A virtual image cryptosystem based upon vector quantization
TS Chen, CC Chang, MS Hwang
IEEE transactions on Image Processing 7 (10), 1485-1488, 1998
High payload steganography mechanism using hybrid edge detector
WJ Chen, CC Chang, THN Le
Expert Systems with applications 37 (4), 3292-3301, 2010
An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
JH Yang, CC Chang
Computers & security 28 (3-4), 138-143, 2009
A reversible data hiding scheme based on side match vector quantization
CC Chang, WL Tai, CC Lin
IEEE Transactions on Circuits and Systems for Video Technology 16 (10), 1301 …, 2006
Brain tumor detection using color-based k-means clustering segmentation
MN Wu, CC Lin, CC Chang
Third international conference on intelligent information hiding and …, 2007
The system can't perform the operation now. Try again later.
Articles 1–20