Search the dblp DataBase
Chin-Chen Chang :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
M. T. Fang , Richard C. T. Lee , Chin-Chen Chang The Idea of De-Clustering and its Applications. [Citation Graph (11, 9)][DBLP ] VLDB, 1986, pp:181-188 [Conf ] Chin-Chen Chang , Richard C. T. Lee , David Hung-Chang Du Some Properties of Cartesian Product Files. [Citation Graph (7, 5)][DBLP ] SIGMOD Conference, 1980, pp:157-168 [Conf ] Chin-Chen Chang , M. W. Du , Richard C. T. Lee Performance Analyses of Cartesian Product Files and Random Files. [Citation Graph (4, 0)][DBLP ] IEEE Trans. Software Eng., 1984, v:10, n:1, pp:88-99 [Journal ] C. Y. Chen , Chin-Chen Chang On GDM allocation for partial range queries. [Citation Graph (3, 0)][DBLP ] Inf. Syst., 1992, v:17, n:5, pp:381-394 [Journal ] C. C. Chang The Study of a Letter Oriented Minimal Perfect Hashing Scheme. [Citation Graph (1, 0)][DBLP ] FODO, 1985, pp:91-99 [Conf ] C. C. Chang , L. S. Lian On Strict Optimality Property of Allocating Binary Cartesian Product Files on Multiple Disk Systems. [Citation Graph (1, 0)][DBLP ] FODO, 1985, pp:159-175 [Conf ] C. C. Chang , J. C. Shieh On the Complexity of File Allocation Problem. [Citation Graph (1, 0)][DBLP ] FODO, 1985, pp:177-181 [Conf ] Chin-Chen Chang , C. Y. Chen Orthogonal Range Retrieval Using Bucket Address Hashing. [Citation Graph (1, 12)][DBLP ] SSDBM, 1988, pp:133-140 [Conf ] C. C. Chang Application of Principal Component Analysis to Multi-Disk Concurrent Accessing. [Citation Graph (1, 0)][DBLP ] BIT, 1988, v:28, n:2, pp:205-214 [Journal ] Chin-Chen Chang , C. Y. Chen Performance of Two-Disk Partition Data Allocations. [Citation Graph (1, 0)][DBLP ] BIT, 1987, v:27, n:3, pp:306-314 [Journal ] Chin-Chen Chang , H. Y. Chen , C. Y. Chen Symbolic Gray Code As A Data Allocation Scheme For Two-Disc Systems. [Citation Graph (1, 0)][DBLP ] Comput. J., 1992, v:35, n:3, pp:299-305 [Journal ] Chin-Chen Chang , Tzong-Chen Wu Retrieving the Most Similar Symbolic Pictures from Pictorial Databases. [Citation Graph (1, 0)][DBLP ] Inf. Process. Manage., 1992, v:28, n:5, pp:581-588 [Journal ] Chin-Chen Chang , Richard C. T. Lee , M. W. Du Symbolic Gray Code as a Perfect Multiattribute Hashing Scheme for Partial Match Queries. [Citation Graph (1, 0)][DBLP ] IEEE Trans. Software Eng., 1982, v:8, n:3, pp:235-249 [Journal ] Chin-Chen Chang , Jung-San Lee , Chang-Chu Chen On the Forward and Backward Secrecy of HLL Group Key Exchange Mechanism. [Citation Graph (0, 0)][DBLP ] CIT, 2005, pp:702-705 [Conf ] Min-Hui Lin , Chin-Chen Chang A Novel Information Hiding Scheme Based on BTC. [Citation Graph (0, 0)][DBLP ] CIT, 2004, pp:66-71 [Conf ] Hsien-Wen Tseng , Chin-Chen Chang Steganography Using JPEG-Compressed Images. [Citation Graph (0, 0)][DBLP ] CIT, 2004, pp:12-17 [Conf ] Shin-Jia Hwang , Chin-Chen Chang A dynamic secret sharing scheme with cheater detection. [Citation Graph (0, 0)][DBLP ] ACISP, 1996, pp:48-55 [Conf ] Chu-Hsing Lin , Ching-Te Wang , Chin-Chen Chang A group-oriented (t, n) undeniable signature scheme without trusted center. [Citation Graph (0, 0)][DBLP ] ACISP, 1996, pp:266-274 [Conf ] Chin-Chen Chang , Ya-Fen Chang Yet Another Attack on a QR-based Password Authentication System. [Citation Graph (0, 0)][DBLP ] AINA (2), 2004, pp:170-173 [Conf ] Ya-Fen Chang , Chin-Chen Chang Enhanced Anonymous Auction Protocols with Freewheeling Bids. [Citation Graph (0, 0)][DBLP ] AINA (1), 2006, pp:353-358 [Conf ] Chin-Chen Chang , Chi-Shiang Chan , Ju Yuan Hsiao Lossless Image Compression Based on Two-Way Smaller Difference. [Citation Graph (0, 0)][DBLP ] AINA, 2003, pp:821-824 [Conf ] Chin-Chen Chang , Chi-Lung Chiang , Ju Yuan Hsiao A DCT-Domain System for Hiding Fractal Compressed Images. [Citation Graph (0, 0)][DBLP ] AINA, 2005, pp:83-86 [Conf ] Ya-Fen Chang , Chin-Chen Chang , Yu-Wei Su A secure improvement on the user-friendly remote authentication scheme with no time concurrency mech. [Citation Graph (0, 0)][DBLP ] AINA (2), 2006, pp:741-745 [Conf ] Chin-Chen Chang , Ren-Junn Hwang A New Scheme to Protect Confidential Images. [Citation Graph (0, 0)][DBLP ] AINA (1), 2004, pp:158-164 [Conf ] Chin-Chen Chang , Jui-Yi Kuo An Efficient Multi-Server Password Authenticated Key Agreement Scheme Using Smart Cards with Access Control. [Citation Graph (0, 0)][DBLP ] AINA, 2005, pp:257-260 [Conf ] Chin-Chen Chang , Ying-Tse Kuo , Chu-Hsing Lin Fast Algorithms for Common-Multiplicand Multiplication and Exponentiation by Performing Complements. [Citation Graph (0, 0)][DBLP ] AINA, 2003, pp:807-811 [Conf ] Chin-Chen Chang , Tzu-Chuen Lu , Yi-Long Liu Bandwidth Efficiency of an Image Compression Method for Information Hiding. [Citation Graph (0, 0)][DBLP ] AINA (1), 2004, pp:426-432 [Conf ] Chin-Chen Chang , Chu-Hsing Lin , Wei Lee , Pai-Cheng Hwang Secret Sharing with Access Structures in a Hierarchy. [Citation Graph (0, 0)][DBLP ] AINA (2), 2004, pp:31-34 [Conf ] Chin-Chen Chang , Iuon-Chang Lin , Hui-Min Tsai A Dynamic Mechanism for Determining Relationships in a Partially Ordered User Hierarchy. [Citation Graph (0, 0)][DBLP ] AINA (1), 2004, pp:133-138 [Conf ] Chin-Chen Chang , Iuon-Chang Lin , Hui-Min Tsai , Hsiao-Hsi Wang A Key Assignment Scheme for Controlling Access in Partially Ordered User Hierarchies. [Citation Graph (0, 0)][DBLP ] AINA (2), 2004, pp:376-379 [Conf ] Chin-Chen Chang , Wei-Liang Tai , Min-Hui Lin A Reversible Data Hiding Scheme with Modified Side Match Vector Quantization. [Citation Graph (0, 0)][DBLP ] AINA, 2005, pp:947-952 [Conf ] Chao-Wen Chan , Chin-Chen Chang Huffman Tree Decomposition and Its Coding Applications. [Citation Graph (0, 0)][DBLP ] AINA, 2003, pp:683-688 [Conf ] Yung-Kuan Chan , Chin-Chen Chang Spatial Video Retrieval Based on the Piecewise Method. [Citation Graph (0, 0)][DBLP ] AINA (1), 2004, pp:171-176 [Conf ] Chi-Shiang Chan , Chin-Chen Chang A Lossless Medical Image Compression Scheme Using Modified S-Tree Structure. [Citation Graph (0, 0)][DBLP ] AINA, 2005, pp:75-78 [Conf ] Hui-Feng Huang , Chin-Chen Chang A New Design for Efficient t-out-n Oblivious Transfer Scheme. [Citation Graph (0, 0)][DBLP ] AINA, 2005, pp:499-502 [Conf ] Chi-Hsiung Huang , Chia-Yin Lee , Chu-Hsing Lin , Chin-Chen Chang , Kuo-Lun Chen Authenticated Encryption Schemes with Message Linkage for Threshold Signatures. [Citation Graph (0, 0)][DBLP ] AINA, 2005, pp:261-264 [Conf ] Ren-Junn Hwang , Chin-Chen Chang Enhancing the Efficiency of (v, r, n)-Fairness Secret Sharing Scheme. [Citation Graph (0, 0)][DBLP ] AINA (1), 2004, pp:208-212 [Conf ] Yeu-Pong Lai , Chin-Chen Chang A Simple Forward Secure Blind Signature Scheme Based on Master Keys and Blind Signatures. [Citation Graph (0, 0)][DBLP ] AINA, 2005, pp:139-144 [Conf ] Chia-Yin Lee , Chu-Hsing Lin , Chin-Chen Chang An Improved Low Computation Cost User Authentication Scheme for Mobile Communication. [Citation Graph (0, 0)][DBLP ] AINA, 2005, pp:249-252 [Conf ] Ching-Te Wang , Chin-Chen Chang , Chu-Hsing Lin Using IC Cards to Remotely Login Passwords without Verification Tables. [Citation Graph (0, 0)][DBLP ] AINA (1), 2004, pp:321-326 [Conf ] Ching-Te Wang , Chu-Hsing Lin , Chin-Chen Chang Signature Schemes Based on Two Hard Problems Simultaneously. [Citation Graph (0, 0)][DBLP ] AINA, 2003, pp:557-560 [Conf ] Ching-Te Wang , Chu-Hsing Lin , Chin-Chen Chang Supervising Secret-Key Agreements in a Level-Based Hierarchy. [Citation Graph (0, 0)][DBLP ] AINA (1), 2004, pp:309-314 [Conf ] Chin-Chen Chang , Tzu-Chuen Lu A Color-Based Image Retrieval Method Using Color Distribution and Common Bitmap. [Citation Graph (0, 0)][DBLP ] AIRS, 2005, pp:56-71 [Conf ] Chin-Chen Chang , Yeu-Pong Lai A Parallel Modular Exponentiation Scheme for Transformed Exponents. [Citation Graph (0, 0)][DBLP ] APPT, 2005, pp:443-452 [Conf ] Yu-Chiang Li , Jieh-Shan Yeh , Chin-Chen Chang A Fast Algorithm for Mining Share-Frequent Itemsets. [Citation Graph (0, 0)][DBLP ] APWeb, 2005, pp:417-428 [Conf ] Chin-Chen Chang , Tzong-Chen Wu , C. P. Chen The Design of a Conference Key Distribution System. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1992, pp:459-466 [Conf ] Iuon-Chang Lin , Chin-Chen Chang An Efficient Fault-Tolerant Digital Signature Scheme Based on the Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP ] ATC, 2006, pp:601-610 [Conf ] Yu-Chiang Li , Chin-Chen Chang A New FP-Tree Algorithm for Mining Frequent Itemsets. [Citation Graph (0, 0)][DBLP ] AWCC, 2004, pp:266-277 [Conf ] Chih-Yang Lin , Chin-Chen Chang A Prediction Scheme for Image Vector Quantization Based on Mining Association Rules. [Citation Graph (0, 0)][DBLP ] AWCC, 2004, pp:230-240 [Conf ] Ming-Ni Wu , Min-Hui Lin , Chin-Chen Chang A LSB Substitution Oriented Image Hiding Strategy Using Genetic Algorithms. [Citation Graph (0, 0)][DBLP ] AWCC, 2004, pp:219-229 [Conf ] Chin-Chen Chang , Jung-San Lee Improvement on an Optimized Protocol for Mobile Network Authentication and Security. [Citation Graph (0, 0)][DBLP ] CIS (2), 2005, pp:538-541 [Conf ] Chin-Chen Chang , Chia-Chen Lin , Jun-Bin Yeh Adaptive Hiding Scheme Based on VQ-Indices Using Commutable Codewords. [Citation Graph (0, 0)][DBLP ] CIS (2), 2005, pp:567-572 [Conf ] Hui-Feng Huang , Chin-Chen Chang Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function. [Citation Graph (0, 0)][DBLP ] CIS (2), 2005, pp:554-559 [Conf ] Ming-Ni Wu , Chia-Chen Lin , Chin-Chen Chang Image Copy Detection with Rotating Tolerance. [Citation Graph (0, 0)][DBLP ] CIS (1), 2005, pp:464-469 [Conf ] Chiuyuan Chen , Chin-Chen Chang Connected Proper Interval Graphs and the Guard Problem in Spiral Polygons. [Citation Graph (0, 0)][DBLP ] Combinatorics and Computer Science, 1995, pp:39-47 [Conf ] Yung-Kuan Chan , Chin-Chen Chang Concealing a Secret Image Using the Breadth First Traversal Linear Quadtree Structure. [Citation Graph (0, 0)][DBLP ] CODAS, 2001, pp:213-0 [Conf ] C. Y. Chen , Chin-Chen Chang , Richard C. T. Lee , D. C. Lin A Temporal Join Mechanism Based on Trie-Ranking Data Structure. [Citation Graph (0, 0)][DBLP ] CODAS, 1996, pp:428-435 [Conf ] Chin-Feng Lee , Chin-Chen Chang Optimal Bit Lengths of Direction Signatures for Spatial Match Accessing Using Basic Linear Hashing Scheme. [Citation Graph (0, 0)][DBLP ] CODAS, 1996, pp:526-529 [Conf ] Chin-Chen Chang , Chao-Wen Chan Detecting Dealer Cheating in Secret Sharing Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC, 2000, pp:449-453 [Conf ] Chin-Chen Chang , Kuo-Feng Hwang , Yi Lin A Proof of Copyright Ownership Using Moment-Preserving. [Citation Graph (0, 0)][DBLP ] COMPSAC, 2000, pp:198-203 [Conf ] C. Y. Chen , Chin-Chen Chang , Richard C. T. Lee , D. C. Lin Optimal Linear Hashing Files for Orthogonal Range Retrieval. [Citation Graph (0, 0)][DBLP ] COMPSAC, 1996, pp:406-413 [Conf ] Iuon-Chang Lin , Chin-Chen Chang , Min-Shiang Hwang Security Enhancement for the "Simple Authentication Key Agreement Algorithm". [Citation Graph (0, 0)][DBLP ] COMPSAC, 2000, pp:113-115 [Conf ] Shin-Jia Hwang , Chin-Chen Chang , Wei-Pang Yang Some Active Attacks on Fast Server-Aided Secret Computation Protocols for Modular Exponentiation. [Citation Graph (0, 0)][DBLP ] Cryptography: Policy and Algorithms, 1995, pp:215-227 [Conf ] Hui-Feng Huang , Chin-Chen Chang An efficient deniable authentication protocol. [Citation Graph (0, 0)][DBLP ] CW, 2005, pp:307-310 [Conf ] Chao-Wen Chan , Chin-Chen Chang Key Exchange Protocols for Multiparty Communication Services. [Citation Graph (0, 0)][DBLP ] CW, 2002, pp:241-248 [Conf ] Ya-Fen Chang , Chin-Chen Chang Password-authenticated 3PEKE with Round Efficiency without Server's Public Key. [Citation Graph (0, 0)][DBLP ] CW, 2005, pp:340-344 [Conf ] Chin-Chen Chang , Ya-Fen Chang , Wen-Chuan Wu An Extendable-Message-Passing Protocol with Signatures Based on Two Hard Problems and Its Applications. [Citation Graph (0, 0)][DBLP ] CW, 2005, pp:93-100 [Conf ] Chin-Chen Chang , Ju Yuan Hsiao , Chi-Lung Chiang An Image Copyright Protection Scheme Based on Torus Automorphism. [Citation Graph (0, 0)][DBLP ] CW, 2002, pp:217-224 [Conf ] Chin-Chen Chang , Jui-Yi Kuo , Jung-San Lee Time-bounded Based Password Authentication Scheme. [Citation Graph (0, 0)][DBLP ] CW, 2005, pp:117-122 [Conf ] Chin-Chen Chang , Pei-Yu Lin A Compression-Based Data Hiding Scheme Using Vector Quantization and Principle Component Analysis. [Citation Graph (0, 0)][DBLP ] CW, 2004, pp:369-375 [Conf ] Chin-Chen Chang , Jung-San Lee An Efficient and Secure Multi-Server Password Authentication Scheme using Smart Cards. [Citation Graph (0, 0)][DBLP ] CW, 2004, pp:417-422 [Conf ] Chin-Chen Chang , Po-Wen Lu , Ju Yuan Hsiao A Hybrid Method for Estimating the Euclidean Distance between Two Vectors. [Citation Graph (0, 0)][DBLP ] CW, 2002, pp:183-190 [Conf ] Chin-Chen Chang , Tai-Xing Yu Sharing a Secret Gray Image in Multiple Images. [Citation Graph (0, 0)][DBLP ] CW, 2002, pp:230-240 [Conf ] Hui-Feng Huang , Chin-Chen Chang Cryptanalysis of the WD Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] CW, 2002, pp:249-254 [Conf ] C. C. Chang , D. F. Leu Multikey Sorting as a File Organization Scheme When Queries Are Not Equally Likely. [Citation Graph (0, 0)][DBLP ] DASFAA, 1989, pp:219-224 [Conf ] J. Liang , C. C. Chang Similarity Retrieval on Pictorial Databases Based upon Module Operation. [Citation Graph (0, 1)][DBLP ] DASFAA, 1993, pp:19-26 [Conf ] Chin-Chen Chang , Chi-Shiang Chan , Yi-Hsuan Fan A Secret Image Sharing Scheme Based on Vector Quantization Mechanism. [Citation Graph (0, 0)][DBLP ] EUC, 2006, pp:469-478 [Conf ] Yung-Kuan Chan , Chin-Chen Chang An Efficient Data Structure for Storing Similar Binary Images. [Citation Graph (0, 0)][DBLP ] FODO, 1998, pp:268-275 [Conf ] C. C. Chang Database Research and Development in Taiwan. [Citation Graph (0, 0)][DBLP ] FODO, 1985, pp:603-605 [Conf ] Chin-Chen Chang , Jaw-Ji Shen Consecutive Retrieval Organization as a File Allocation Scheme on Multiple Disk Systems. [Citation Graph (0, 0)][DBLP ] FODO, 1985, pp:113-124 [Conf ] Yu-Chiang Li , Jieh-Shan Yeh , Chin-Chen Chang Direct Candidates Generation: A Novel Algorithm for Discovering Complete Share-Frequent Itemsets. [Citation Graph (0, 0)][DBLP ] FSKD (2), 2005, pp:551-560 [Conf ] Chin-Chen Chang , Daniel J. Buehrer De-Clustering Image Databases. [Citation Graph (0, 0)][DBLP ] Future Databases, 1992, pp:142-145 [Conf ] Yueh-Yi Lai , Wen-Kai Tai , Chin-Chen Chang , Chen-Duo Liu Synthesizing transition textures on succession patterns. [Citation Graph (0, 0)][DBLP ] GRAPHITE, 2005, pp:273-276 [Conf ] Chin-Chen Chang , Hsien-Chu Hsia , Tung-Shou Chen A Progressive Image Transmission Scheme Based on Block Truncation Coding. [Citation Graph (0, 0)][DBLP ] Human.Society@Internet, 2001, pp:383-397 [Conf ] Hui-Feng Huang , Chin-Chen Chang A Novel Conference Key Distribution System with Re-keying Protocol. [Citation Graph (0, 0)][DBLP ] Human.Society@Internet, 2005, pp:282-290 [Conf ] Kuo-Lung Hung , Chin-Chen Chang A Robust and Recoverable Tamper Proofing Technique for Image Authentication. [Citation Graph (0, 0)][DBLP ] Human.Society@Internet 2003, 2003, pp:44-53 [Conf ] C. C. Chang , J. C. Shieh On the Design of Ordered Minimal Perfect Hashing Functions. [Citation Graph (0, 5)][DBLP ] ICDE, 1986, pp:112-115 [Conf ] Chin-Chen Chang , Ya-Fen Chang The Security Flaw of an Untraceable Signature Scheme. [Citation Graph (0, 0)][DBLP ] ICEB, 2004, pp:1379-1381 [Conf ] Chao-Wen Chan , Chin-Chen Chang A New Scheme for the Electronic Coin. [Citation Graph (0, 0)][DBLP ] ICEBE, 2006, pp:339-343 [Conf ] Hui-Feng Huang , Chin-Chen Chang An Untraceable Electronic Cash System Using Fair Blind Signatures. [Citation Graph (0, 0)][DBLP ] ICEBE, 2006, pp:39-46 [Conf ] Ya-Fen Chang , Chin-Chen Chang An Improvement on Strong-Password Authentication Protocols. [Citation Graph (0, 0)][DBLP ] ICESS, 2005, pp:629-637 [Conf ] Chin-Chen Chang , Kuo-Feng Hwang Towards the Forgery of a Group Signature without Knowing the Group Center's Secret. [Citation Graph (0, 0)][DBLP ] ICICS, 2001, pp:47-51 [Conf ] Chin-Chen Chang , Iuon-Chang Lin Cryptanalysis of the Improved User Efficient Blind Signatures. [Citation Graph (0, 0)][DBLP ] ICICS, 2001, pp:42-46 [Conf ] Hui-Feng Huang , Chin-Chen Chang An Efficient Convertible Authenticated Encryption Scheme and Its Variant. [Citation Graph (0, 0)][DBLP ] ICICS, 2003, pp:382-392 [Conf ] Chin-Chen Chang , Cheng-Yi Liu Modified curvature scale space feature alignment approach for hand posture recognition. [Citation Graph (0, 0)][DBLP ] ICIP (3), 2003, pp:309-312 [Conf ] Chin-Chen Chang Novel hierarchical approach for radiosity. [Citation Graph (0, 0)][DBLP ] ICME, 2004, pp:863-866 [Conf ] Chin-Chen Chang , Chung-Mou Pengwu Gesture recognition approach for sign language using curvature scale space and hidden Markov model. [Citation Graph (0, 0)][DBLP ] ICME, 2004, pp:1187-1190 [Conf ] Yung-Kuan Chan , Chin-Chen Chang Image Retrieval Based on Tolerable Difference of Direction. [Citation Graph (0, 0)][DBLP ] ICOIN, 2001, pp:387-392 [Conf ] Chin-Chen Chang , Jun-Chou Chuang , Pei-Yu Lin Sharing a Secret Two-Tone Image in Two Gray-Level Images. [Citation Graph (0, 0)][DBLP ] ICPADS (2), 2005, pp:300-304 [Conf ] Chin-Chen Chang , Po-Wen Lu An Image Refining Method Using Digital Watermark via Vector Quantization. [Citation Graph (0, 0)][DBLP ] ICPADS (2), 2005, pp:585-589 [Conf ] Chin-Chen Chang , Chwei-Shyong Tsai , Tung-Shou Chen A New Scheme for Sharing Secret Color Images in Computer Network. [Citation Graph (0, 0)][DBLP ] ICPADS, 2000, pp:21-27 [Conf ] Kuo-Feng Hwang , Chin-Chen Chang , Chao-Wen Chan A Search Scheme Resulting in Mixing Compressed Text Files. [Citation Graph (0, 0)][DBLP ] ICPADS (1), 2005, pp:762-768 [Conf ] Chin-Chen Chang , Fun-Chou Shiue , Tung-Shou Chen Tree Structured Vector Quantization with Dynamic Path Search. [Citation Graph (0, 0)][DBLP ] ICPP Workshops, 1999, pp:536-541 [Conf ] Chin-Chen Chang , I-Yen Chen , Yea-Shuan Huang Hand Pose Recognition Using Curvature Scale Space. [Citation Graph (0, 0)][DBLP ] ICPR (2), 2002, pp:386-389 [Conf ] Timothy K. Shih , Chin-Chen Chang , Hsiau Wen Lin Reusability on Learning Object Repository. [Citation Graph (0, 0)][DBLP ] ICWL, 2006, pp:203-214 [Conf ] Chin-Chen Chang , Kuo-Lun Chen A Signature Scheme with (t, n) Shared Verification and Message Recovery. [Citation Graph (0, 0)][DBLP ] iiWAS, 2004, pp:- [Conf ] Chao-Wen Chan , Chin-Chen Chang A Scheme for (t, n)-Threshold Secret Image Sharing. [Citation Graph (0, 0)][DBLP ] IMECS, 2006, pp:619-624 [Conf ] Ya-Fen Chang , Chin-Chen Chang , Wei-Liang Tai Comments on Distributed Sign-and-Encryption Schemes. [Citation Graph (0, 0)][DBLP ] IMECS, 2006, pp:178-180 [Conf ] Chin-Chen Chang , Keng-Chu Lin Yet Another Attack on Mutual Authentication and Key Exchange Protocols for Low Power Wireless Communications. [Citation Graph (0, 0)][DBLP ] IMECS, 2006, pp:959-962 [Conf ] Chin-Chen Chang , Chia-Chi Wu An Improvement of the Design of Integrating Subliminal Channel with Access Control. [Citation Graph (0, 0)][DBLP ] IMECS, 2006, pp:276-279 [Conf ] Chin-Chen Chang , Wen-Bin Wu , Jieh-Shan Yeh A Cryptanalysis on a Generalized Threshold Cryptosystem. [Citation Graph (0, 0)][DBLP ] IMECS, 2006, pp:452-455 [Conf ] Hui-Feng Huang , Chin-Chen Chang An Untraceable Forward-Secure Blind Signature Scheme. [Citation Graph (0, 0)][DBLP ] IMECS, 2006, pp:441-446 [Conf ] Yung-Kuan Chan , Chin-Chen Chang , Jau-Ji Shen A Compact Patricia Trie for a Large Set of Keys. [Citation Graph (0, 0)][DBLP ] ISDB, 2002, pp:31-36 [Conf ] Chin-Chen Chang , Chi-Shiang Chan , Ya-Ping Pan An Inverse Halftoning Technique using Genetic Algorithm. [Citation Graph (0, 0)][DBLP ] ISDB, 2002, pp:184-189 [Conf ] Tzu-Chuen Lu , Chin-Chen Chang , S. Wesley Changchien An Association Rule Mining Method for Spatial Database. [Citation Graph (0, 0)][DBLP ] ISDB, 2002, pp:281-286 [Conf ] Ren-Junn Hwang , Chin-Chen Chang A Method for Sending Confidential Messages to a Group without Trusted Parties. [Citation Graph (0, 0)][DBLP ] ISPA, 2003, pp:375-381 [Conf ] Chin-Chen Chang , Chun-Sen Tseng , Chia-Chen Lin Hiding Data in Binary Images. [Citation Graph (0, 0)][DBLP ] ISPEC, 2005, pp:338-349 [Conf ] Chin-Chen Chang , Iuon-Chang Lin , Timothy K. Shih An Efficient Edge Detection Technique for Chinese Calligraphy. [Citation Graph (0, 0)][DBLP ] JCIS, 2002, pp:960-963 [Conf ] Chin-Chen Chang , Ming-Ni Wu An Algorithm for Color Image Compression Base on Common Bit Map Block Truncation Coding. [Citation Graph (0, 0)][DBLP ] JCIS, 2002, pp:964-967 [Conf ] Tzu-Chuen Lu , Chin-Chen Chang A Bandwidth Efficiency of the Locally Adaptive Compression Method for Hiding Secret Messages. [Citation Graph (0, 0)][DBLP ] JCIS, 2006, pp:- [Conf ] Hsien-Chu Wu , Chin-Chen Chang , Ting-Wei Yu A DCT-based Recoverable Image Authentication. [Citation Graph (0, 0)][DBLP ] JCIS, 2006, pp:- [Conf ] Hsien-Chu Wu , Hui-Chuan Lin , Chin-Chen Chang Reversible Palette Image Steganography Based on De-clustering and Predictive Coding. [Citation Graph (0, 0)][DBLP ] JCIS, 2006, pp:- [Conf ] Ya-Fen Chang , Chin-Chen Chang Comments on Abe et al.'s Threshold Signer-ambiguous Signature Scheme from Variety of Keys. [Citation Graph (0, 0)][DBLP ] JCIS, 2006, pp:- [Conf ] Chin-Chen Chang , Yung-Chen Chou , Jau-Ji Shen Improving Image Quality for JPEG Compression. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:442-448 [Conf ] Chin-Chen Chang , Tzu-Chuen Lu Method for Searching Similar Images Using Quality Index Measurement. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1224-1230 [Conf ] Chin-Chen Chang , Chih-Yang Lin , Yu-Zheng Wang VQ Image Steganographic Method with High Embedding Capacity Using Multi-way Search Approach. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1058-1064 [Conf ] Chin-Chen Chang , Tzu-Chuen Lu , Jun-Bin Yeh A Bandwidth Efficiency of Lempel-Ziv Scheme for Data Authentication. [Citation Graph (0, 0)][DBLP ] KES (4), 2005, pp:249-256 [Conf ] Chin-Chen Chang , Wen-Chuan Wu A Reversible Information Hiding Scheme Based on Vector Quantization. [Citation Graph (0, 0)][DBLP ] KES (3), 2005, pp:1101-1107 [Conf ] Chin-Chen Chang A Perspective on the Development of Digital Libraries in Taiwan. [Citation Graph (0, 0)][DBLP ] Kyoto International Conference on Digital Libraries, 2000, pp:44-46 [Conf ] Chin-Chen Chang , Jyh-Chiang Yeh , Ju Yuan Hsiao A Method for Protecting Digital Images from Being Copied Illegally. [Citation Graph (0, 0)][DBLP ] Kyoto International Conference on Digital Libraries, 2000, pp:348-355 [Conf ] Jun-Chou Chuang , Chin-Chen Chang Detection and Restoration of a Tampered Medical Image. [Citation Graph (0, 0)][DBLP ] MIAR, 2004, pp:78-85 [Conf ] Kuo-Lung Hung , Chin-Chen Chang , Tung-Shou Chen An Efficient Block-based Scheme for Progressively Transmitting Lossless Images. [Citation Graph (0, 0)][DBLP ] MMM, 2003, pp:313-328 [Conf ] Chin-Chen Chang , Wen-Chuan Wu A novel data hiding scheme for keeping high stego-image quality. [Citation Graph (0, 0)][DBLP ] MMM, 2006, pp:- [Conf ] Chin-Chen Chang , Tung-Shou Chen An Improved Prediction Method for Quadtree Image Coding. [Citation Graph (0, 0)][DBLP ] ISMSE, 2000, pp:269-275 [Conf ] Chin-Chen Chang , Shu-Kai Yang , Jun-Wei Hsieh , Ding-Zhou Duan , Ming-Fen Lin A Fuzzy Inference System for Simplifying Surfaces with Color. [Citation Graph (0, 0)][DBLP ] IEEE Pacific Rim Conference on Multimedia, 2001, pp:1078-1083 [Conf ] Chin-Chen Chang , Chi-Shiang Chan , Ju Yuan Hsiao A Color Image Retrieval Method Based on Local Histogram. [Citation Graph (0, 0)][DBLP ] IEEE Pacific Rim Conference on Multimedia, 2001, pp:831-836 [Conf ] Chin-Chen Chang , Yung-Chen Chou , Wen-Chuan Wu Image Retrieval Using Spatial Color and Edge Detection. [Citation Graph (0, 0)][DBLP ] PCM (1), 2005, pp:981-992 [Conf ] Chin-Chen Chang , Ju Yuan Hsiao , Chi-Lung Chiang A Cross-Type Peak-and-Valley Filter for Error Prevention and Resilience in Image Communications. [Citation Graph (0, 0)][DBLP ] IEEE Pacific Rim Conference on Multimedia, 2002, pp:393-400 [Conf ] Chin-Chen Chang , Chih-Ping Hsieh , Ju Yuan Hsiao A Fast and Efficient Noise Reduction Method Suitable for Low Noise Density. [Citation Graph (0, 0)][DBLP ] IEEE Pacific Rim Conference on Multimedia, 2002, pp:386-392 [Conf ] Chin-Chen Chang , Yuan-Yuan Su A Dynamic Color Palette for Color Images Coding. [Citation Graph (0, 0)][DBLP ] IEEE Pacific Rim Conference on Multimedia, 2002, pp:369-376 [Conf ] Chin-Chen Chang , Piyu Tsai , Min-Hui Lin An Adaptive Steganography for Index-Based Images Using Codeword Grouping. [Citation Graph (0, 0)][DBLP ] PCM (3), 2004, pp:731-738 [Conf ] Chin-Chen Chang , Jyh-Chiang Yeh , Ju Yuan Hsiao A Novel Scheme for Securing Image Steganography. [Citation Graph (0, 0)][DBLP ] IEEE Pacific Rim Conference on Multimedia, 2001, pp:804-811 [Conf ] Chwei-Shyong Tsai , Chin-Chen Chang A Generalized Secret Image Sharing and Recovery Scheme. [Citation Graph (0, 0)][DBLP ] IEEE Pacific Rim Conference on Multimedia, 2001, pp:963-968 [Conf ] Chin-Chen Chang , Jyh-Jong Leu , Pai-Cheng Huang , Wei-Bin Lee A Scheme for Obtaining a Message from the Digital Multisignature. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1998, pp:154-163 [Conf ] Chin-Chen Chang , Yu-Chiang Li , Jung-San Lee An Efficient Algorithm for Incremental Mining of Association Rules. [Citation Graph (0, 0)][DBLP ] RIDE, 2005, pp:3-10 [Conf ] Chin-Chen Chang , Horng-Chin Lee A Solution to Generalized Group Oriented Cryptography. [Citation Graph (0, 0)][DBLP ] SEC, 1992, pp:265-275 [Conf ] Daniel J. Buehrer , Chin-Chen Chang Application of a Reciprocal Confluence Tree Unit to Similar-Picture Retrieval. [Citation Graph (0, 0)][DBLP ] SSD, 1993, pp:437-442 [Conf ] Chin-Chen Chang , Kuo-Lun Chen , Chu-Hsing Lin , Jen-Chieh Chang A Group-Oriented (t, n) Threshold Signature Scheme Against Replay Attacks. [Citation Graph (0, 0)][DBLP ] UIC, 2006, pp:816-825 [Conf ] Jen-Ho Yang , Chin-Chen Chang , Chih-Hung Wang A Practical Solution to the (t , n ) Threshold Untraceable Signature with (k , l ) Verification Scheme. [Citation Graph (0, 0)][DBLP ] UIC, 2006, pp:998-1007 [Conf ] Chin-Chen Chang , Jun-Chou Chuang , Yih-Shin Hu Similar Image Retrieval Based on Wavelet Transformation. [Citation Graph (0, 0)][DBLP ] WAA, 2003, pp:294-0 [Conf ] Chin-Chen Chang , Yung-Chen Chou , Jau-Ji Shen A Discrete Wavelet Transform Based State-Codebook Search Algorithm for Vector Quantization. [Citation Graph (0, 0)][DBLP ] ICICIC (1), 2006, pp:197-200 [Conf ] Chin-Chen Chang , Kuo-Lung Hung An Efficient Euclidean Distance Estimation Scheme for Accelerating VQ Encoding. [Citation Graph (0, 0)][DBLP ] ICICIC (1), 2006, pp:194-196 [Conf ] Chin-Chen Chang , Tzu-Chuen Lu A Wavelet-Based Progressive Digital Image Transmission Scheme. [Citation Graph (0, 0)][DBLP ] ICICIC (2), 2006, pp:681-684 [Conf ] Ming-Ni Wu , Chia-Chen Lin , Chin-Chen Chang A Fast Wavelet-Based Image Progressive Transmission Method Based on Vector Quantization. [Citation Graph (0, 0)][DBLP ] ICICIC (2), 2006, pp:677-680 [Conf ] Chin-Chen Chang , Wei-Liang Tai , Chia-Chen Lin A Multipurpose Wavelet-Based Image Watermarking. [Citation Graph (0, 0)][DBLP ] ICICIC (3), 2006, pp:70-73 [Conf ] Chin-Chen Chang , Tung-Shou Chen , Hsien-Chu Hsia An ImageWatermarking Scheme Using Pattern Coding Technique. [Citation Graph (0, 0)][DBLP ] ICICIC (3), 2006, pp:467-470 [Conf ] Chia-Chen Lin , Chin-Chen Chang An Image Hiding Scheme Based on Du's Disk Allocation Method. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:617-620 [Conf ] Chin-Chen Chang , Yung-Chen Chang , Jau-Ji Shen A Heuristic Method for Extracting Enhanced Watermarks from Digital Images. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:453-456 [Conf ] Chin-Chen Chang , Yung-Chen Chang , Jau-Ji Shen A Novel Image Compression Algorithm Based on Sixteen Most Lately Used Encoded Codewords. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:545-548 [Conf ] Chin-Chen Chang , Yung-Chen Chou Quantization Index Modulation Using Vector Quantization with DWT Based State-Codebook Search. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:549-554 [Conf ] Chung-Chuan Wang , Chin-Chen Chang , Jinn-ke Jan , Jieh-Shan Yeh Novel Steganographic Schemes Based on Row-Major Mapping Relation. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:392-395 [Conf ] Chin-Chen Chang , Yi-Hui Chen , Kuan-Ming Li Improved SMVQ Scheme with Edge-Directed Prediction. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:541-544 [Conf ] Chin-Chen Chang , Jun-Chou Chuang Progressive Image Transmission Using Significant Features and Linear Regression Prediction. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:681-684 [Conf ] Chin-Chen Chang , Tung-Shou Chen , Yi Lin An efficient accessing technique of Chinese characters using Boshiamy Chinese input system. [Citation Graph (0, 0)][DBLP ] IRAL, 2000, pp:61-67 [Conf ] Chin-Chen Chang , Hao-Chuan Tsai , Yi-Hui Chen An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards. [Citation Graph (0, 0)][DBLP ] MUE, 2007, pp:1210-1215 [Conf ] Chin-Chen Chang , Chu-Hsing Lin , Chien-Yuan Chen A Conference Key Distribution Scheme Using Interpolating Polynomials. [Citation Graph (0, 0)][DBLP ] MUE, 2007, pp:963-967 [Conf ] Hui-Feng Huang , Chin-Chen Chang An Efficient Key-Lock-Pair Mechanism Based on Division Algorithm. [Citation Graph (0, 0)][DBLP ] MUE, 2007, pp:982-986 [Conf ] C. C. Chang On the Design of a Key-Lock-Pair Mechanism in Information Protection Systems. [Citation Graph (0, 0)][DBLP ] BIT, 1986, v:26, n:4, pp:410-417 [Journal ] Chin-Chen Chang , Huey-Cheue Kowng , Tzong-Chen Wu A Refinement of a Compression-Oriented Addressing Scheme. [Citation Graph (0, 0)][DBLP ] BIT, 1993, v:33, n:4, pp:530-535 [Journal ] Chin-Chen Chang , Chu-Hsing Lin A Reciprocal Confluence Tree Unit and Its Applications. [Citation Graph (0, 0)][DBLP ] BIT, 1990, v:30, n:1, pp:27-33 [Journal ] J. K. Jan , Chin-Chen Chang A Key-Lock-Pair Oriented Access Control Scheme for the Growth of Users and Files. [Citation Graph (0, 0)][DBLP ] BIT, 1993, v:33, n:3, pp:382-389 [Journal ] Iuon-Chang Lin , Chin-Chen Chang A (t, n) Threshold Secret Sharing System with Efficient Identification of Cheaters. [Citation Graph (0, 0)][DBLP ] Computers and Artificial Intelligence, 2005, v:24, n:5, pp:- [Journal ] Chin-Chen Chang , Zen-Chung Shih An accuracy enhancement algorithm for hierarchical radiosity. [Citation Graph (0, 0)][DBLP ] Computers & Graphics, 1998, v:22, n:2-3, pp:225-232 [Journal ] C. C. Chang An Information Protection Scheme Based Upon Number Theory. [Citation Graph (0, 0)][DBLP ] Comput. J., 1987, v:30, n:3, pp:249-253 [Journal ] Chin-Chen Chang , C. Y. Chen Performance Analysis of the Generalised Disc Modulo Allocation method for Multiple Key Hashing Files on Multi-Disc Systems. [Citation Graph (0, 0)][DBLP ] Comput. J., 1987, v:30, n:6, pp:535-540 [Journal ] Chin-Chen Chang , C. Y. Chen A Recursive Performance Formula of the Disc Modulo Allocation Method for Binary Cartesian Product Files. [Citation Graph (0, 0)][DBLP ] Comput. J., 1988, v:31, n:6, pp:565-566 [Journal ] Chin-Chen Chang , C. Y. Chen , J. K. Jan On the Design of a Machine-Independent Perfect Hashing Scheme. [Citation Graph (0, 0)][DBLP ] Comput. J., 1991, v:34, n:5, pp:469-474 [Journal ] Chin-Chen Chang , Chih-Yang Lin Perfect Hashing Schemes for Mining Association Rules. [Citation Graph (0, 0)][DBLP ] Comput. J., 2005, v:48, n:2, pp:168-179 [Journal ] Chin-Chen Chang , Richard C. T. Lee A Letter-Oriented Minimal Perfect Hashing Scheme. [Citation Graph (0, 0)][DBLP ] Comput. J., 1986, v:29, n:3, pp:277-281 [Journal ] Chin-Chen Chang , H. F. Lin , C. Y. Chen Optimality Properties of the Disc Modulo Allocation Method for k-ary Multiple Key Hashing Files. [Citation Graph (0, 0)][DBLP ] Comput. J., 1992, v:35, n:4, pp:390-394 [Journal ] Chu-Hsing Lin , Chin-Chen Chang , Richard C. T. Lee A Record-Oriented Cryptosystem for Database Sharing (Short Note). [Citation Graph (0, 0)][DBLP ] Comput. J., 1992, v:35, n:6, pp:658-660 [Journal ] Hsien-Wen Tseng , Chin-Chen Chang Construction of Symmetrical Reversible Variable Length Codes Using Backtracking. [Citation Graph (0, 0)][DBLP ] Comput. J., 2003, v:46, n:1, pp:100-105 [Journal ] Hsien-Wen Tseng , Chin-Chen Chang A Branch-and-Bound Algorithm for the Construction of Reversible Variable Length Codes. [Citation Graph (0, 0)][DBLP ] Comput. J., 2004, v:47, n:6, pp:701-707 [Journal ] Chin-Chen Chang , Pai-Cheng Huang , Wei-Bin Lee Conference key distribution schemes for portable communication systems. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1999, v:22, n:12, pp:1160-1164 [Journal ] Chin-Chen Chang , Jung-San Lee , Ya-Fen Chang Efficient authentication protocols of GSM. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2005, v:28, n:8, pp:921-928 [Journal ] Chin-Chen Chang , Sun-Min Tsu , Chien-Yuan Chen Remote scheme for password authentication based on theory of quadratic residues. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1995, v:18, n:12, pp:936-942 [Journal ] Chin-Chen Chang , Tzong-Chen Wu , Chi-Sung Laih Cryptanalysis of a Password Authentication Scheme Using Quadratic Residues. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1995, v:18, n:1, pp:45-47 [Journal ] Ren-Junn Hwang , Chin-Chen Chang An on-line secret sharing scheme for multi-secrets. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1998, v:21, n:13, pp:1170-1176 [Journal ] Ming-Yung Ko , Tzonelih Hwang , C. C. Chang Attacks on an ID-based signature scheme based on Rabin's public key cryptosystem. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1994, v:17, n:9, pp:674-676 [Journal ] Wei-Bin Lee , Chin-Chen Chang Three ID-based information security functions. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1997, v:20, n:14, pp:1301-1307 [Journal ] Wei-Bin Lee , Chin-Chen Chang Authenticity of public keys in asymmetric cryptosystems. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1998, v:21, n:2, pp:195-198 [Journal ] Wei-Bin Lee , Chin-Chen Chang Using RSA with low exponent in a public network. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1998, v:21, n:3, pp:284-286 [Journal ] Chu-Hsing Lin , Chin-Chen Chang Method for constructing a group-oriented cipher system. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1994, v:17, n:11, pp:805-808 [Journal ] Ching-Te Wang , Chu-Hsing Lin , Chin-Chen Chang Threshold signature schemes with traceable signers in group communications. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1998, v:21, n:8, pp:771-776 [Journal ] Chin-Chen Chang , Ya-Fen Chang Efficient anonymous auction protocols with freewheeling bids. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:8, pp:728-734 [Journal ] Chin-Chen Chang , J. K. Jan , Daniel J. Buehrer A scheme to determine the relationship between two users in a hierarchy. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1994, v:13, n:3, pp:255-261 [Journal ] Chin-Chen Chang , Yeu-Pong Lai A flexible date-attachment scheme on e-cash. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:2, pp:160-166 [Journal ] Chin-Chen Chang , Jung-San Lee An anonymous voting mechanism based on the key exchange protocol. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:4, pp:307-314 [Journal ] Chin-Chen Chang , Jao-Ji Shen , Tzong-Chen Wu Access control with binary keys. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1994, v:13, n:8, pp:681-686 [Journal ] J. K. Jan , Chin-Chen Chang , S. J. Wang A dynamic key-lock-pair access control scheme. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1991, v:10, n:2, pp:129-139 [Journal ] Chi-Sung Laih , Wen-Hong Chiou , Chin-Chen Chang Authentication and protection of public keys. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1994, v:13, n:7, pp:581-585 [Journal ] Min-Hui Lin , Chin-Chen Chang , Yan-Ren Chen A fair and secure mobile agent environment based on blind signature and proxy host. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2004, v:23, n:3, pp:199-212 [Journal ] Hsien-Chu Wu , Chin-Chen Chang A novel digital image watermarking scheme based on the vector quantization technique. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:6, pp:460-471 [Journal ] Hui-Min Tsai , Chin-Chen Chang A cryptographic implementation for dynamic access control in a user hierarchy. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1995, v:14, n:2, pp:159-166 [Journal ] Tzong-Chen Wu , Chin-Chen Chang Cryptographic key assignment scheme for hierarchical access control. [Citation Graph (0, 0)][DBLP ] Comput. Syst. Sci. Eng., 2001, v:16, n:1, pp:25-28 [Journal ] Iuon-Chang Lin , Min-Shiang Hwang , Chin-Chen Chang The General Pay-Word: A Micro-payment Scheme Based on n -dimension One-way Hash Chain. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2005, v:36, n:1, pp:53-67 [Journal ] Chin-Chen Chang , Chin-Feng Lee A Bin-Tree Oriented Iconic Indexing Scheme for Retrieving Symbolic Pictures. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 1998, v:26, n:2, pp:121-133 [Journal ] Ji-Han Jiang , Chin-Chen Chang , Tung-Shou Chen A Compact Sparse Matrix Representation Using Random Hash Functions. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2000, v:32, n:1, pp:29-49 [Journal ] Ching-Te Wang , Chin-Chen Chang , Chu-Hsing Lin A New Micro-Payment System Using General Payword Chain. [Citation Graph (0, 0)][DBLP ] Electronic Commerce Research, 2002, v:2, n:1-2, pp:159-168 [Journal ] Iuon-Chang Lin , Min-Shiang Hwang , Chin-Chen Chang A new key assignment scheme for enforcing complicated access control policies in hierarchy. [Citation Graph (0, 0)][DBLP ] Future Generation Comp. Syst., 2003, v:19, n:4, pp:457-462 [Journal ] Yu-Chen Hu , Chin-Chen Chang An Improved Tree-Structured Codebook Search Algorithm for Grayscale Image Compression. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2006, v:70, n:3, pp:251-260 [Journal ] Chin-Chen Chang , Chi-Shiang Chan An Inverse Halftoning Technique Using Modified Look-Up Tables. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2005, v:68, n:3, pp:207-220 [Journal ] Chin-Chen Chang , Jun-Chou Chuang , Yu-Chen Hu Spatial Domain Image Hiding Scheme Using Pixel-Values Differencing. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2006, v:70, n:3, pp:171-184 [Journal ] Chin-Chen Chang , Chih-Yang Lin , Henry Chou Perfect Hashing Schemes for Mining Traversal Patterns. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2006, v:70, n:3, pp:185-202 [Journal ] Chin-Chen Chang , Piyu Tsai , Min-Hui Lin An Adaptive Steganographic Scheme for Color Images. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2004, v:62, n:3-4, pp:275-289 [Journal ] Tzu-Chuen Lu , Chin-Chen Chang Data Compressor for VQ Index Tables. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2005, v:65, n:4, pp:353-371 [Journal ] Chao-Wen Chan , Chin-Chen Chang A New Channel for Image Hiding Based on Interpolating polynomials. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2003, v:58, n:2, pp:93-104 [Journal ] Chi-Shiang Chan , Chin-Chen Chang An Image Hiding Scheme Based on Multi-bit-reference Substitution Table Using Dynamic Programming Strategy. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2005, v:65, n:4, pp:291-305 [Journal ] Hui-Feng Huang , Chin-Chen Chang An Efficient and Practical (t, n) Threshold Proxy Signature Scheme with Known Signers. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2003, v:56, n:3, pp:243-253 [Journal ] Chih-Yang Lin , Chin-Chen Chang , Chia-Chen Lin A New Density-Based Scheme for Clustering Based on Genetic Algorithm. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2005, v:68, n:4, pp:315-331 [Journal ] Hsien-Chu Wu , Chin-Chen Chang Hiding Digital Watermarks Using Fractal Compression Technique. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2003, v:58, n:2, pp:189-202 [Journal ] Hsien-Chu Wu , Chin-Chen Chang Embedding Invisible Watermarks into Digital Images Based on Side-Match Vector Quantization. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2004, v:63, n:1, pp:89-106 [Journal ] Yuan-Hui Yu , Chin-Chen Chang Scenery Image Segmentation Using Support Vector Machines. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2004, v:61, n:3-4, pp:379-388 [Journal ] Chwei-Shyong Tsai , Chin-Chen Chang An Improvement to Image Segment Based on Human Visual System for Object-based Coding. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2003, v:58, n:2, pp:167-178 [Journal ] Chwei-Shyong Tsai , Chin-Chen Chang A DWT-based Deblocking Technique Based on Edge Detection and Zero Masking for Reducing Blocking Effect. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2003, v:58, n:2, pp:179-188 [Journal ] Ming-Ni Wu , Chia-Chen Lin , Chin-Chen Chang A Robust Content-Based Copy Detection Scheme. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2006, v:71, n:2-3, pp:351-366 [Journal ] Chia-Chen Lin , Yu-Chen Hu , Chin-Chen Chang A Novel Image Ownership Protection Scheme Based on Rehashing Concept and Vector Quantization. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2006, v:71, n:4, pp:443-451 [Journal ] Chin-Chen Chang , Guei-Mei Chen , Yu-Chen Hu A Novel Index Coding Scheme for Vector Quantization. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2006, v:71, n:2-3, pp:215-227 [Journal ] Chin-Chen Chang , Chih-Yang Lin Reversible Data Embedding Based on Prediction Approach for VQ and SMVQ Compressed Images. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2006, v:74, n:2-3, pp:189-207 [Journal ] Chin-Chen Chang , Tzu-Chuen Lu , Jun-Bin Ya VQ Codebook Searching Algorithm Based on Correlation Property. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2007, v:76, n:1-2, pp:39-57 [Journal ] Chin-Chen Chang , Chang-Chu Chen Full-Searching-Equivalent Vector Quantization Using Two-Bounds Triangle Inequality. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2007, v:76, n:1-2, pp:25-37 [Journal ] Ya-Fen Chang , Chin-Chen Chang Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2007, v:76, n:1-2, pp:13-23 [Journal ] Chin-Chen Chang , Chih-Yang Lin , Chun-Sen Tseng Secret Image Hiding and Sharing Based on the (t, n)-Threshold. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2007, v:76, n:4, pp:399-411 [Journal ] Hsien-Chu Wu , Chin-Chen Chang An Image Retrieval Method Based on Color-Complexity and Spatial-Histogram Features. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2007, v:76, n:4, pp:481-493 [Journal ] Jen-Ho Yang , Chin-Chen Chang , Chien-Yuan Chen A high-speed division algorithm in residue number system using parity. [Citation Graph (0, 0)][DBLP ] Int. J. Comput. Math., 2004, v:81, n:6, pp:775-780 [Journal ] Chin-Chen Chang , Guu-In Chen Bi-level Lossless Calligraphy Compression Using Location Propagation and Width Inheritance. [Citation Graph (0, 0)][DBLP ] Int. J. Comput. Proc. Oriental Lang., 2001, v:14, n:4, pp:309-339 [Journal ] Kuo-Lung Hung , Chin-Chen Chang A Novel Progressive Image Transmission Technique for Chinese Calligraphy. [Citation Graph (0, 0)][DBLP ] Int. J. Comput. Proc. Oriental Lang., 2001, v:14, n:4, pp:293-307 [Journal ] Kuo-Lung Hung , Chin-Chen Chang Error Prevention and Concealment for Chinese Calligraphy Based on Block Truncation Coding. [Citation Graph (0, 0)][DBLP ] Int. J. Comput. Proc. Oriental Lang., 2002, v:15, n:1, pp:101-113 [Journal ] Chin-Chen Chang Adaptive multiple sets of CSS features for hand posture recognition. [Citation Graph (0, 0)][DBLP ] Neurocomputing, 2006, v:69, n:16-18, pp:2017-2025 [Journal ] Yung-Kuan Chan , Chin-Chen Chang A Color Image Retrieval Method Based on Color Moment and Color Variance of Adjacent Pixels. [Citation Graph (0, 0)][DBLP ] IJPRAI, 2002, v:16, n:1, pp:113-125 [Journal ] Chin-Chen Chang , Yaw-Wen Chen , Daniel J. Buehrer A Two-Dimensional Shape Recognition Scheme Based on Principal Component Analysis. [Citation Graph (0, 0)][DBLP ] IJPRAI, 1994, v:8, n:4, pp:859-875 [Journal ] Chin-Chen Chang , Ji-Han Jiang A Spatial Filter for Similarity Retrieval. [Citation Graph (0, 0)][DBLP ] IJPRAI, 1996, v:10, n:6, pp:711-730 [Journal ] Chin-Chen Chang , Min-Hui Lin , Yu-Chen Hu A Fast and Secure Image Hiding Scheme Based on LSB Substitution. [Citation Graph (0, 0)][DBLP ] IJPRAI, 2002, v:16, n:4, pp:399-416 [Journal ] Chin-Chen Chang , Yuan-Hui Yu An Efficient Approach For Face Detection And Facial Feature Location Using Prune-And-Search Technique. [Citation Graph (0, 0)][DBLP ] IJPRAI, 2004, v:18, n:6, pp:987-1005 [Journal ] Yu-Chen Hu , Chin-Chen Chang Edge Detection Using Block Truncation Coding. [Citation Graph (0, 0)][DBLP ] IJPRAI, 2003, v:17, n:6, pp:951-966 [Journal ] Min-Hui Lin , Yu-Chen Hu , Chin-Chen Chang Both Color and Gray Scale Secret Images Hiding in a Color Image. [Citation Graph (0, 0)][DBLP ] IJPRAI, 2002, v:16, n:6, pp:697-714 [Journal ] Chin-Chen Chang , Kuo-Feng Hwang , Min-Shiang Hwang A Feature-Oriented Copyright Owner Proving Technique for Still Images. [Citation Graph (0, 0)][DBLP ] International Journal of Software Engineering and Knowledge Engineering, 2002, v:12, n:3, pp:317-0 [Journal ] Chin-Chen Chang , Chi-Shiang Chan A Watermarking Scheme Based on Principal Component Analysis Technique. [Citation Graph (0, 0)][DBLP ] Informatica, Lith. Acad. Sci., 2003, v:14, n:4, pp:431-444 [Journal ] Chin-Chen Chang , Kuo-Feng Hwang Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards. [Citation Graph (0, 0)][DBLP ] Informatica, Lith. Acad. Sci., 2003, v:14, n:3, pp:289-294 [Journal ] Chin-Chen Chang , Iuon-Chang Lin Cryptanalysis of the Modified Remote Login Authentication Scheme Based on a Geometric Approach. [Citation Graph (0, 0)][DBLP ] Informatica, Lith. Acad. Sci., 2005, v:16, n:1, pp:37-44 [Journal ] Chin-Chen Chang , Hsien-Wen Tseng VQ-Based Image Watermarking Using Anti-Gray Coding. [Citation Graph (0, 0)][DBLP ] Informatica, Lith. Acad. Sci., 2004, v:15, n:2, pp:147-160 [Journal ] Hsien-Wen Tseng , Chin-Chen Chang High Capacity Data Hiding in JPEG-Compressed Images. [Citation Graph (0, 0)][DBLP ] Informatica, Lith. Acad. Sci., 2004, v:15, n:1, pp:127-142 [Journal ] Chin-Chen Chang , Pei-Fang Chung A Technique of Watermarking for Digital Images Using (t, n)-Threshold Scheme. [Citation Graph (0, 0)][DBLP ] Informatica (Slovenia), 2000, v:24, n:1, pp:- [Journal ] Chin-Chen Chang , Jun-Chou Chuang , Tung-Shou Chen Recognition of Image Authenticity Using Significant DCT Coefficients Quantization. [Citation Graph (0, 0)][DBLP ] Informatica (Slovenia), 2002, v:26, n:4, pp:- [Journal ] Chin-Chen Chang , Kuo-Feng Hwang , Min-Shiang Hwang A Digital Watermarking Scheme Using Human Visual Effects. [Citation Graph (0, 0)][DBLP ] Informatica (Slovenia), 2000, v:24, n:4, pp:- [Journal ] Chin-Chen Chang , Chwei-Shyong Tsai A Technique for Computing Watermarks from Digital Images. [Citation Graph (0, 0)][DBLP ] Informatica (Slovenia), 2000, v:24, n:3, pp:- [Journal ] Kuo-Lung Hung , Chin-Chen Chang An improvement of a technique for color quantization using reduction of color space dimensionality. [Citation Graph (0, 0)][DBLP ] Informatica (Slovenia), 2002, v:26, n:1, pp:- [Journal ] Hsien-Wen Tseng , Chin-Chen Chang A Very Low Bit Rate Image Compressor Using Transformed Classified Vector Quantization. [Citation Graph (0, 0)][DBLP ] Informatica (Slovenia), 2005, v:29, n:3, pp:335-342 [Journal ] Chin-Chen Chang , Chi-Yien Chung An efficient protocol for anonymous multicast and reception. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 2003, v:85, n:2, pp:99-103 [Journal ] Chin-Chen Chang , Shin-Jia Hwang A Simple Approach for Generating RSA Keys. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1997, v:63, n:1, pp:19-21 [Journal ] Chien-Yuan Chen , Chin-Chen Chang A fast modular multiplication algorithm for calculating the product AB modulo N. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1999, v:72, n:3-4, pp:77-81 [Journal ] Shin-Jia Hwang , Chin-Chen Chang , Wei-Pang Yang Autenticated Encryption Schemes with Message Linkage. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1996, v:58, n:4, pp:189-195 [Journal ] Wei-Bin Lee , Chin-Chen Chang Integrating Authentication in Public Key Distribution System. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1996, v:57, n:1, pp:49-52 [Journal ] Wei-Bin Lee , Chin-Chen Chang Authenticated Encryption Schemes with Linkage Between Message Blocks. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1997, v:63, n:5, pp:247-250 [Journal ] Chin-Chen Chang , Tzong-Chen Wu Controlling the Access Requests in an Information Protection System. [Citation Graph (0, 0)][DBLP ] Inf. Process. Manage., 1993, v:29, n:1, pp:61-68 [Journal ] Tzu-Chuen Lu , Chin-Chen Chang Color image retrieval technique based on color features and image bitmap. [Citation Graph (0, 0)][DBLP ] Inf. Process. Manage., 2007, v:43, n:2, pp:461-472 [Journal ] C. Y. Chen , Chin-Chen Chang , Richard C. T. Lee On the design of multiple key hashing files for concurrent orthogonal range retrieval between two disks. [Citation Graph (0, 0)][DBLP ] Inf. Syst., 1991, v:16, n:6, pp:613-625 [Journal ] C. Y. Chen , Chin-Chen Chang , Richard C. T. Lee Optimal MMI file systems for orthogonal range retrieval. [Citation Graph (0, 0)][DBLP ] Inf. Syst., 1993, v:18, n:1, pp:37-54 [Journal ] Chin-Chen Chang , Ren-Junn Hwang , Tzong-Chen Wu Crypographic key assignment scheme for access control in a hierarchy. [Citation Graph (0, 0)][DBLP ] Inf. Syst., 1992, v:17, n:3, pp:243-247 [Journal ] Chu-Hsing Lin , Chin-Chen Chang , Richard C. T. Lee A conference key broadcasting system using sealed locks. [Citation Graph (0, 0)][DBLP ] Inf. Syst., 1992, v:17, n:4, pp:323-328 [Journal ] Chu-Hsing Lin , Chin-Chen Chang , Tzong-Chen Wu , Richard C. T. Lee Password authentication using Newton's interpolating polynomials. [Citation Graph (0, 0)][DBLP ] Inf. Syst., 1991, v:16, n:1, pp:97-102 [Journal ] Tzong-Chen Wu , Yi-Shiung Yeh , Chin-Chen Chang Algebraic operations on encryped relational databases. [Citation Graph (0, 0)][DBLP ] Inf. Syst., 1993, v:18, n:1, pp:55-62 [Journal ] Chin-Chen Chang An ordered minimal perfect hashing scheme based upon Euler's theorem. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 1984, v:32, n:3, pp:165-172 [Journal ] Chin-Chen Chang Optimal information retrieval when queries are not random. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 1984, v:34, n:3, pp:199-223 [Journal ] Chin-Chen Chang Letter-oriented reciprocal hashing scheme. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 1986, v:38, n:3, pp:243-255 [Journal ] Chin-Chen Chang A scheme for constructing ordered minimal perfect hashing functions. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 1986, v:39, n:2, pp:187-195 [Journal ] Chin-Chen Chang , C. Y. Chen A note on allocating k-ary multiple key hashing files among multiple disks. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 1991, v:55, n:1-3, pp:69-76 [Journal ] Chin-Chen Chang , Tung-Shou Chen , Lou-Zo Chung A steganographic method based upon JPEG and quantization table modification. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2002, v:141, n:1-2, pp:123-138 [Journal ] Chin-Chen Chang , M. W. Du , Richard C. T. Lee The hierarchical ordering in multiattribute files. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 1983, v:31, n:1, pp:41-75 [Journal ] Chin-Chen Chang , Ren-Junn Hwang Sharing Secret Omages using Shadow Codebooks. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 1998, v:111, n:1-4, pp:335-345 [Journal ] Chin-Chen Chang , Chu-Hsing Lin , Richard C. T. Lee Hierarchy representations based on arithmetic coding for dynamic information protection systems. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 1992, v:64, n:1-2, pp:35-48 [Journal ] Chin-Chen Chang , Der-Chyuan Lou , Tzong-Chen Wu A Binary Access Control Method Using Prime Factorization. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 1997, v:96, n:1&2, pp:15-26 [Journal ] Annie Y. H. Chou , Wei-Pang Yang , Chin-Chen Chang Some Properties of Optimal Cartesian Product Files for Orthogonal Range Queries. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 1996, v:90, n:1-4, pp:91-107 [Journal ] J. Liang , Chin-Chen Chang , Ron McFadyen , Richard C. T. Lee Optimal Multiple Key Hashing Files for Orthogonal Range Queries. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 1994, v:79, n:1-2, pp:145-158 [Journal ] Tzong-Chen Wu , Chin-Chen Chang Controlling Access in Tree Hierarchies. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 1994, v:78, n:1-2, pp:69-76 [Journal ] Hui-Feng Huang , Chin-Chen Chang A novel efficient (t , n ) threshold proxy signature scheme. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2006, v:176, n:10, pp:1338-1349 [Journal ] Chin-Chen Chang , Chih-Yang Lin , Yu-Zheng Wang New image steganographic methods using run-length approach. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2006, v:176, n:22, pp:3393-3408 [Journal ] Chin-Chen Chang , Chih-Yang Lin Reversible steganographic method using SMVQ approach based on declustering. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2007, v:177, n:8, pp:1796-1805 [Journal ] Chin-Chen Chang , Jun-Chou Chuang , Yih-Shin Hu Retrieving digital images from a JPEG compressed image database. [Citation Graph (0, 0)][DBLP ] Image Vision Comput., 2004, v:22, n:6, pp:471-484 [Journal ] Chin-Chen Chang , Yung-Chen Chou , Yuan-Hui Yu , Kai-Jung Shih An image zooming technique based on vector quantization approximation. [Citation Graph (0, 0)][DBLP ] Image Vision Comput., 2005, v:23, n:13, pp:1214-1225 [Journal ] Yuan-Hui Yu , Chin-Chen Chang A new edge detection approach based on image context analysis. [Citation Graph (0, 0)][DBLP ] Image Vision Comput., 2006, v:24, n:10, pp:1090-1102 [Journal ] Yuan-Hui Yu , Chin-Chen Chang , Yu-Chen Hu A genetic-based adaptive threshold selection method for dynamic path tree structured vector quantization. [Citation Graph (0, 0)][DBLP ] Image Vision Comput., 2005, v:23, n:6, pp:597-609 [Journal ] Jen Nan Chen , Chin-Chen Chang A Chinese Character Retrieval Scheme Using Shuang Pinyin. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 1992, v:8, n:3, pp:487-507 [Journal ] Chin-Chen Chang A Composite Perfect Hashing Scheme for Large Letter-Oriented Key Sets. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 1991, v:7, n:2, pp:173-186 [Journal ] Chin-Chen Chang Spatial Match Retrieval of Symbolic Pictures. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 1991, v:7, n:3, pp:405-422 [Journal ] Yuh-Jiun Chen , Chin-Chen Chang , Wei-Pang Yang Shortest Weighted Length Addition Chains. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 1995, v:11, n:2, pp:295-305 [Journal ] Chin-Chen Chang , C. Y. Chen Some Properties of Cartesian Product Files for Disk Modulo Allocation Method in a Two-disk System. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 1987, v:3, n:2, pp:151-176 [Journal ] Chien-Yuan Chen , Chin-Chen Chang , Wei-Pang Yang Cryptanalysis of the Secret Exponent of the RSA Scheme. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 1996, v:12, n:2, pp:277-290 [Journal ] Chin-Chen Chang , C. Y. Chen Gray Code as a De-clustering Scheme for Concurrent Disk Retrieval. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 1987, v:3, n:2, pp:177-188 [Journal ] Chin-Chen Chang , Lin-Li Chen , Tung-Shou Chen A New Two-Path Search Algorithm for Block Motion Estimation of Video Data. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 2001, v:17, n:3, pp:405-415 [Journal ] Chin-Chen Chang , Ruey-Feng Chang , Wen-Tsai Lee , Ching-Lin Kuo A Fast Search Algorithm for Vector Quantization. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 1996, v:12, n:4, pp:593-602 [Journal ] Chin-Chen Chang , Jiann-Jone Chen , Wen-Kai Tai , Chin-Chuan Han New Approach for Static Gesture Recognition. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 2006, v:22, n:5, pp:1047-1057 [Journal ] Chin-Chen Chang , Woan-Jing Horng , Daniel J. Buehrer A Cascade Exponentiation Evaluation Scheme Based on the Lempel-Ziv-Welch Compression Algorithm. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 1995, v:11, n:3, pp:417-431 [Journal ] C. Y. Chen , H. F. Lin , Chin-Chen Chang , Richard C. T. Lee Multidisk Smaller Sized MKH file Allocation for Partial Match Retrieval. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 1997, v:13, n:1, pp:125-141 [Journal ] Chin-Chen Chang , Feng-Yi Liou A Digital Multisignature Scheme Based upon the Digital Signature Scheme of a Modified ElGamal Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 1994, v:11, n:3, pp:423-432 [Journal ] Chin-Chen Chang , Ling-Hua Wu A New Password Authentication Scheme. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 1990, v:6, n:2, pp:139-147 [Journal ] Chin-Chen Chang , Shu-Kai Yang , Ding-Zhou Duan , Ming-Fen Lin A Fuzzy-based Approach to Mesh Simplification. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 2002, v:18, n:3, pp:459-466 [Journal ] Chin-Chen Chang , Shu-Kai Yang , Ding-Zhou Duan , Ming-Fen Lin A Fuzzy-based Approach to Mesh Simplification. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 2002, v:18, n:3, pp:459-466 [Journal ] Annie Y. H. Chou , Wei-Pang Yang , Chin-Chen Chang Optimal Two-Attribute Cartesian Product Files for Orthogonal Range Queries. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 1995, v:11, n:4, pp:625-647 [Journal ] Ren-Junn Hwang , Chin-Chen Chang An Improved Threshold Scheme Based on Modular ARithmetic. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 1999, v:15, n:5, pp:691-699 [Journal ] Wei-Bin Lee , Chin-Chen Chang On Key Changeable ID-Based Digital Signature Scheme. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 1996, v:12, n:3, pp:381-386 [Journal ] Wei-Bin Lee , Chin-Chen Chang (t, n) Threshold Digital Signature With Traceability Property. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 1999, v:15, n:5, pp:669-678 [Journal ] Chu-Hsing Lin , Richard C. T. Lee , Chin-Chen Chang A Dynamic Access Control Mechanism in Information Protection Systems. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 1990, v:6, n:1, pp:25-35 [Journal ] Chin-Chen Chang , Ren-Junn Hwang A new scheme to protect confidential images. [Citation Graph (0, 0)][DBLP ] Journal of Interconnection Networks, 2004, v:5, n:3, pp:221-232 [Journal ] Chin-Chen Chang , Horng-Chin Lee A New Generalized Group-Oriented Cryptoscheme Without Trusted Centers. [Citation Graph (0, 0)][DBLP ] IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:725-729 [Journal ] Chin-Chen Chang , Daniel J. Buehrer An Improvement to Ziegler's Sparse Matrix Compression Algorithm. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1996, v:35, n:1, pp:67-71 [Journal ] Chin-Chen Chang , Shin-Jia Hwang , Daniel J. Buehrer New concepts for multiple stack systems: Born and reborn. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1994, v:27, n:1, pp:45-54 [Journal ] Chin-Chen Chang , Min-Shiang Hwang , Tung-Shou Chen A new encryption algorithm for image cryptosystems. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2001, v:58, n:2, pp:83-91 [Journal ] Chin-Chen Chang , Chin-Feng Lee A spatial match retrieval mechanism for symbolic pictures. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1998, v:44, n:1, pp:73-83 [Journal ] Chin-Chen Chang , Tian-Fu Lee , Jyh-Jong Leu Partition search filter and its performance analysis. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1999, v:47, n:1, pp:35-43 [Journal ] Ren-Junn Hwang , Wei-Bin Lee , Chin-Chen Chang A concept of designing cheater identification methods for secret sharing. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1999, v:46, n:1, pp:7-11 [Journal ] Hui-Feng Huang , Chin-Chen Chang A new design of efficient partially blind signature scheme. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2004, v:73, n:3, pp:397-403 [Journal ] Chin-Feng Lee , Chin-Chen Chang Breadth-first search oriented symbolic picture representation for spatial match retrieval. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2000, v:52, n:1, pp:11-23 [Journal ] Der-Chyuan Lou , Chin-Chen Chang An adaptive exponentiation method. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1998, v:42, n:1, pp:59-69 [Journal ] Hsien-Chu Wu , Chin-Chen Chang Detection and restoration of tampered JPEG compressed images. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2002, v:64, n:2, pp:151-161 [Journal ] Chwei-Shyong Tsai , Chin-Chen Chang , Tung-Shou Chen Sharing multiple secrets in digital images. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2002, v:64, n:2, pp:163-170 [Journal ] Hsien-Wen Tseng , Chin-Chen Chang Error resilient locally adaptive data compression. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2006, v:79, n:8, pp:1156-1160 [Journal ] Chin-Chen Chang , Tzu-Chuen Lu A difference expansion oriented data hiding scheme for restoring the original host images. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2006, v:79, n:12, pp:1754-1766 [Journal ] Chin-Chen Chang , Tzu-Chuen Lu Reversible index-domain information hiding scheme based on side-match vector quantization. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2006, v:79, n:8, pp:1120-1129 [Journal ] Chin-Chen Chang , Zen-Chung Shih Tighter error bounds and weighted error metrics for hierarchical radiosity. [Citation Graph (0, 0)][DBLP ] Journal of Visualization and Computer Animation, 1998, v:9, n:2, pp:53-63 [Journal ] Shu-Kai Yang , Chin-Chen Chang , Ding-Zhou Duan , Ming-Fen Lin A novel progressive modelling algorithm for 3D models. [Citation Graph (0, 0)][DBLP ] Journal of Visualization and Computer Animation, 2002, v:13, n:3, pp:187-198 [Journal ] Chin-Chen Chang , Wen-Bin Wu A secure voting system on a public network. [Citation Graph (0, 0)][DBLP ] Networks, 1997, v:29, n:2, pp:81-87 [Journal ] Der-Chyuan Lou , Chin-Chen Chang A Parallel Two-List Algorithm for the Knapsack Problem. [Citation Graph (0, 0)][DBLP ] Parallel Computing, 1997, v:22, n:14, pp:1985-1996 [Journal ] Chin-Chen Chang , Chi-Shiang Chan , Yi-Hsuan Fan Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels. [Citation Graph (0, 0)][DBLP ] Pattern Recognition, 2006, v:39, n:6, pp:1155-1167 [Journal ] Chin-Chen Chang , S. M. Hwang , Daniel J. Buehrer A shape recognition scheme based on relative distances of feature points from the centroid. [Citation Graph (0, 0)][DBLP ] Pattern Recognition, 1991, v:24, n:11, pp:1053-1063 [Journal ] Chin-Chen Chang , Ju Yuan Hsiao , Chi-Shiang Chan Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. [Citation Graph (0, 0)][DBLP ] Pattern Recognition, 2003, v:36, n:7, pp:1583-1595 [Journal ] Chin-Chen Chang , Suh-Yin Lee Retrieval of similar pictures on pictorial databases. [Citation Graph (0, 0)][DBLP ] Pattern Recognition, 1991, v:24, n:7, pp:675-680 [Journal ] Chin-Chen Chang , Chin-Feng Lee Relative coordinates oriented symbolic string for spatial relationship retrieval. [Citation Graph (0, 0)][DBLP ] Pattern Recognition, 1995, v:28, n:4, pp:563-570 [Journal ] Yuan-Hui Yu , Chin-Chen Chang , Yu-Chen Hu Hiding secret data in images via predictive coding. [Citation Graph (0, 0)][DBLP ] Pattern Recognition, 2005, v:38, n:5, pp:691-705 [Journal ] Chi-Shiang Chan , Chin-Chen Chang An efficient image authentication method based on Hamming code. [Citation Graph (0, 0)][DBLP ] Pattern Recognition, 2007, v:40, n:2, pp:681-690 [Journal ] Yung-Kuan Chan , Chin-Chen Chang Image matching using run-length feature. [Citation Graph (0, 0)][DBLP ] Pattern Recognition Letters, 2001, v:22, n:5, pp:447-455 [Journal ] Chin-Chen Chang , Jun-Chou Chuang An image intellectual property protection scheme for gray-level images using visual secret sharing strategy. [Citation Graph (0, 0)][DBLP ] Pattern Recognition Letters, 2002, v:23, n:8, pp:931-94 [Journal ] Chin-Chen Chang , Guei-Mei Chen , Min-Hui Lin Information hiding based on search-order coding for VQ indices. [Citation Graph (0, 0)][DBLP ] Pattern Recognition Letters, 2004, v:25, n:11, pp:1253-1261 [Journal ] Chin-Chen Chang , Yih-Shin Hu , Tzu-Chuen Lu A watermarking-based image ownership and tampering authentication scheme. [Citation Graph (0, 0)][DBLP ] Pattern Recognition Letters, 2006, v:27, n:5, pp:439-446 [Journal ] Chin-Chen Chang , D. C. Lin A spatial data representation: an adaptive 2D-H string. [Citation Graph (0, 0)][DBLP ] Pattern Recognition Letters, 1996, v:17, n:2, pp:175-185 [Journal ] Chin-Chen Chang , Yu-Chiang Li , Jun-Bin Yeh Fast codebook search algorithms based on tree-structured vector quantization. [Citation Graph (0, 0)][DBLP ] Pattern Recognition Letters, 2006, v:27, n:10, pp:1077-1086 [Journal ] Chin-Chen Chang , Hsien-Wen Tseng A steganographic method for digital images using side match. [Citation Graph (0, 0)][DBLP ] Pattern Recognition Letters, 2004, v:25, n:12, pp:1431-1437 [Journal ] Chin-Chen Chang , Piyu Tsai , Chia-Chen Lin SVD-based digital image watermarking scheme. [Citation Graph (0, 0)][DBLP ] Pattern Recognition Letters, 2005, v:26, n:10, pp:1577-1586 [Journal ] Chin-Chen Chang , Tzong-Chen Wu A hashing-oriented nearest neighbor searching scheme. [Citation Graph (0, 0)][DBLP ] Pattern Recognition Letters, 1993, v:14, n:8, pp:625-630 [Journal ] Chin-Chen Chang , Tzong-Chen Wu An exact match retrieval scheme based upon principal component analysis. [Citation Graph (0, 0)][DBLP ] Pattern Recognition Letters, 1995, v:16, n:5, pp:465-470 [Journal ] Chin-Chen Chang , Tai-Xing Yu Cryptanalysis of an encryption scheme for binary images. [Citation Graph (0, 0)][DBLP ] Pattern Recognition Letters, 2002, v:23, n:14, pp:1847-1852 [Journal ] C. Y. Chen , Chin-Chen Chang An object-oriented similarity retrieval algorithm for iconic image databases. [Citation Graph (0, 0)][DBLP ] Pattern Recognition Letters, 1993, v:14, n:6, pp:465-470 [Journal ] C. Y. Chen , Chin-Chen Chang , Richard Chia-Tung Lee A near pattern-matching scheme based upon principal component analysis. [Citation Graph (0, 0)][DBLP ] Pattern Recognition Letters, 1995, v:16, n:4, pp:339-345 [Journal ] Kuo-Feng Hwang , Chin-Chen Chang A fast pixel mapping algorithm using principal component analysis. [Citation Graph (0, 0)][DBLP ] Pattern Recognition Letters, 2002, v:23, n:14, pp:1747-1753 [Journal ] Tzong-Chen Wu , Chin-Chen Chang Application of geometric hashing to iconic database retrieval. [Citation Graph (0, 0)][DBLP ] Pattern Recognition Letters, 1994, v:15, n:9, pp:871-876 [Journal ] Chin-Chen Chang , Iuon-Chang Lin Novel full-search schemes for speeding up image coding using vector quantization. [Citation Graph (0, 0)][DBLP ] Real-Time Imaging, 2004, v:10, n:2, pp:95-102 [Journal ] Piyu Tsai , Chin-Chen Chang , Yu-Chen Hu An Adaptive Two-Stage Edge Detection Scheme for Digital Color Images. [Citation Graph (0, 0)][DBLP ] Real-Time Imaging, 2002, v:8, n:4, pp:329-343 [Journal ] Hsien-Wen Tseng , Chin-Chen Chang A Fast and Simple Algorithm for the Construction of Asymmetrical Reversible Variable Length Codes. [Citation Graph (0, 0)][DBLP ] Real-Time Imaging, 2003, v:9, n:1, pp:3-10 [Journal ] Ya-Fen Chang , Chin-Chen Chang A secure and efficient strong-password authentication protocol. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2004, v:38, n:3, pp:79-90 [Journal ] Ya-Fen Chang , Chin-Chen Chang An efficient authentication protocol for mobile satellite communication systems. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2005, v:39, n:1, pp:70-84 [Journal ] Ya-Fan Chang , Chin-Chen Chang , Chia-Lin Kao An improvement on a deniable authentication protocol. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2004, v:38, n:3, pp:65-74 [Journal ] Ya-Fen Chang , Chin-Chen Chang , Jui-Yi Kuo A secure one-time password authentication scheme using smart cards without limiting login times. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2004, v:38, n:4, pp:80-90 [Journal ] Chin-Chen Chang , Iuon-Chang Lin An improvement of delegated multisignature scheme with document decomposition. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2004, v:38, n:4, pp:52-57 [Journal ] Chin-Chen Chang , Yeu-Pong Lai A convertible group signature scheme. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2004, v:38, n:4, pp:58-65 [Journal ] Chin-Chen Chang , Iuon-Chang Lin Remarks on fingerprint-based remote user authentication scheme using smart cards. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2004, v:38, n:4, pp:91-96 [Journal ] Min-Hui Lin , Chin-Chen Chang A secure one-time password authentication scheme with low-computation for mobile communications. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2004, v:38, n:2, pp:76-84 [Journal ] Chin-Chen Chang , Tzong-Chen Wu A Letter-oriented Perfect Hashing Scheme Based upon Sparse Table Compression. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 1991, v:21, n:1, pp:35-49 [Journal ] Chu-Hsing Lin , Chin-Chen Chang , Richard C. T. Lee New Public-Key Cipher System Based Upon the Diophantine Equations. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1995, v:44, n:1, pp:13-19 [Journal ] Chin-Chen Chang , Jer-Sheng Chou , Tung-Shou Chen An efficient computation of Euclidean distances using approximated look-up table. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Circuits Syst. Video Techn., 2000, v:10, n:4, pp:594-599 [Journal ] Tung-Shou Chen , Chin-Chen Chang A new image coding algorithm using variable-rate side-match finite-state vector quantization. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Image Processing, 1997, v:6, n:8, pp:1185-1187 [Journal ] Tung-Shou Chen , Chin-Chen Chang , Min-Shiang Hwang A virtual image cryptosystem based upon vector quantization. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Image Processing, 1998, v:7, n:10, pp:1485-1488 [Journal ] C. Y. Chen , H. F. Lin , Chin-Chen Chang , Richard C. T. Lee Optimal Bucket Allocation Design of k-ary MKH Files for Partial Match Retrieval. [Citation Graph (0, 24)][DBLP ] IEEE Trans. Knowl. Data Eng., 1997, v:9, n:1, pp:148-160 [Journal ] Min-Shiang Hwang , Chin-Chen Chang , Kuo-Feng Hwang An ElGamal-Like Cryptosystem for Enciphering Large Messages. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2002, v:14, n:2, pp:445-446 [Journal ] Chin-Chen Chang , Timothy K. Shih , Iuon-Chang Lin Guessing by neighbors: an efficient reconstruction method for transmitting image progressively. [Citation Graph (0, 0)][DBLP ] The Visual Computer, 2003, v:19, n:5, pp:342-353 [Journal ] Chin-Chen Chang , Iuon-Chang Lin A new solution for assigning cryptographic keys to control access in mobile agent environments. [Citation Graph (0, 0)][DBLP ] , 2006, v:, n:, pp:137-146 [Journal ] Jen-Ho Yang , Chin-Chen Chang , Chih-Hung Wang An iterative modular multiplication algorithm in RNS. [Citation Graph (0, 0)][DBLP ] Applied Mathematics and Computation, 2005, v:171, n:1, pp:637-645 [Journal ] Chin-Chen Chang , Yeu-Pong Lai A division algorithm for residue numbers. [Citation Graph (0, 0)][DBLP ] Applied Mathematics and Computation, 2006, v:172, n:1, pp:368-378 [Journal ] Kuo-Lung Hung , Chin-Chen Chang Error prevention and resilience of VQ encoded images. [Citation Graph (0, 0)][DBLP ] Signal Processing, 2003, v:83, n:2, pp:431-437 [Journal ] Piyu Tsai , Yu-Chen Hu , Chin-Chen Chang A color image watermarking scheme based on color quantization. [Citation Graph (0, 0)][DBLP ] Signal Processing, 2004, v:84, n:1, pp:95-106 [Journal ] Chin-Chen Chang , Chi-Shiang Chan , Chun-Sen Tseng Removing blocking effects using an artificial neural network. [Citation Graph (0, 0)][DBLP ] Signal Processing, 2006, v:86, n:9, pp:2381-2387 [Journal ] Chia-Chi Wu , Chin-Chen Chang , Shang-Ru Yang An Efficient Fragile Watermarking for Web Pages Tamper-Proof. [Citation Graph (0, 0)][DBLP ] APWeb/WAIM Workshops, 2007, pp:654-663 [Conf ] Kuo-Lung Hung , Chin-Chen Chang Recoverable Tamper Proofing Technique for Image Authentication Using Irregular Sampling Coding. [Citation Graph (0, 0)][DBLP ] ATC, 2007, pp:333-343 [Conf ] Chin-Chen Chang , Yung-Chen Chou , Tzu-Chuen Lu A Semi-blind Watermarking Based on Discrete Wavelet Transform. [Citation Graph (0, 0)][DBLP ] ICICS, 2007, pp:164-176 [Conf ] Chin-Chen Chang , Chih-Yang Lin Density-Based Image Vector Quantization Using a Genetic Algorithm. [Citation Graph (0, 0)][DBLP ] MMM (1), 2007, pp:289-298 [Conf ] Chi-Shiang Chan , Chin-Chen Chang A Color Image Hiding Scheme Based on SMVQ and Modulo Operator. [Citation Graph (0, 0)][DBLP ] MMM (2), 2007, pp:461-470 [Conf ] Chin-Chen Chang , Chia-Chi Wu A Novel Key Agreement Scheme in a Multiple Server Environment. [Citation Graph (0, 0)][DBLP ] WISA, 2006, pp:187-197 [Conf ] Chung-Chuan Wang , Chin-Chen Chang , Xinpeng Zhang , Jinn-ke Jan Senary Huffman Compression - A Reversible Data Hiding Scheme for Binary Images. [Citation Graph (0, 0)][DBLP ] MCAM, 2007, pp:351-360 [Conf ] Chin-Chen Chang , Yi-Hui Chen , Yung-Chen Chou Reversible Data Embedding Technique for Palette Images Using De-clustering. [Citation Graph (0, 0)][DBLP ] MCAM, 2007, pp:130-139 [Conf ] Chao-Wen Chan , Chin-Chen Chang A New (t, n)-Threshold Scheme Based on Difference Equations. [Citation Graph (0, 0)][DBLP ] ESCAPE, 2007, pp:94-106 [Conf ] Chin-Chen Chang , Yih-Shin Hu , Chia-Chen Lin A Digital Watermarking Scheme Based on Singular Value Decomposition. [Citation Graph (0, 0)][DBLP ] ESCAPE, 2007, pp:82-93 [Conf ] Yu-Chiang Li , Jieh-Shan Yeh , Chin-Chen Chang MICF: An effective sanitization algorithm for hiding sensitive patterns on data mining. [Citation Graph (0, 0)][DBLP ] Advanced Engineering Informatics, 2007, v:21, n:3, pp:269-280 [Journal ] Ting-Fang Cheng , Jung-San Lee , Chin-Chen Chang Security enhancement of an IC-card-based remote login mechanism. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:9, pp:2280-2287 [Journal ] Chiuyuan Chen , Chin-Chen Chang , Gerard J. Chang Proper interval graphs and the guard problem. [Citation Graph (0, 0)][DBLP ] Discrete Mathematics, 1997, v:170, n:1-3, pp:223-230 [Journal ] Chin-Chen Chang , Wei-Liang Tai , Chia-Chen Lin A Novel Image Hiding Scheme Based on VQ and Hamming Distance. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2007, v:77, n:3, pp:217-228 [Journal ] Chin-Chen Chang , Chia-Te Liao An image coding scheme using SMVQ and support vector machines. [Citation Graph (0, 0)][DBLP ] Neurocomputing, 2006, v:69, n:16-18, pp:2327-2335 [Journal ] Ya-Fen Chang , Chin-Chen Chang Schemes for Digital Gift Certificates with Low Computation Complexity. [Citation Graph (0, 0)][DBLP ] Informatica, Lith. Acad. Sci., 2005, v:16, n:4, pp:503-518 [Journal ] Hsien-Wen Tseng , Chin-Chen Chang Hiding Data in Halftone Images. [Citation Graph (0, 0)][DBLP ] Informatica, Lith. Acad. Sci., 2005, v:16, n:3, pp:419-430 [Journal ] Iuon-Chang Lin , Chin-Chen Chang Security enhancement for digital signature schemes with fault tolerance in RSA. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2007, v:177, n:19, pp:4031-4039 [Journal ] Chin-Chen Chang , Chia-Chen Lin , Chun-Sen Tseng , Wei-Liang Tai Reversible hiding in DCT-based compressed images. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2007, v:177, n:13, pp:2768-2786 [Journal ] Chin-Chen Chang , Yu-Chiang Li , Wen-Hung Huang TFRP: An efficient microaggregation algorithm for statistical disclosure control. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2007, v:80, n:11, pp:1866-1878 [Journal ] Ming-Ni Wu , Chia-Chen Lin , Chin-Chen Chang Novel image copy detection with rotating tolerance. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2007, v:80, n:7, pp:1057-1069 [Journal ] Chin-Chen Chang , Yi-Hsuan Fan , Wei-Liang Tai Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. [Citation Graph (0, 0)][DBLP ] Pattern Recognition, 2008, v:41, n:2, pp:654-661 [Journal ] Chin-Chen Chang , Wei-Liang Tai , Chia-Chen Lin A Reversible Data Hiding Scheme Based on Side Match Vector Quantization. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Circuits Syst. Video Techn., 2006, v:16, n:10, pp:1301-1308 [Journal ] Chin-Chen Chang , Wen-Chuan Wu Fast Planar-Oriented Ripple Search Algorithm for Hyperspace VQ Codebook. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Image Processing, 2007, v:16, n:6, pp:1538-1547 [Journal ] Chin-Chen Chang , Wen-Chuan Wu , Yu-Chen Hu Lossless recovery of a VQ index table with embedded secret data. [Citation Graph (0, 0)][DBLP ] J. Visual Communication and Image Representation, 2007, v:18, n:3, pp:207-216 [Journal ] Chin-Chen Chang , Yeu-Pong Lai A parallel residue-to-binary conversion algorithm without trial division. [Citation Graph (0, 0)][DBLP ] Computers & Electrical Engineering, 2006, v:32, n:6, pp:454-467 [Journal ] Chin-Chen Chang , Chih-Yang Lin , Keng-Chu Lin Simple efficient mutual anonymity protocols for peer-to-peer network based on primitive roots. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:2, pp:662-676 [Journal ] Jung-San Lee , Chin-Chen Chang Secure communications for cluster-based ad hoc networks using node identities. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:4, pp:1377-1396 [Journal ] Efficient User Authentication and Key Establishment Protocols with Perfect Forward Secrecy for Mobile Devices. [Citation Graph (, )][DBLP ] Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control. [Citation Graph (, )][DBLP ] An Improved EMD Embedding Scheme Based on Secret Image Difference. [Citation Graph (, )][DBLP ] Lossless Data Hiding Based on Histogram Modification for Image Authentication. [Citation Graph (, )][DBLP ] Significance-Preserving Codebook Using Generic Algorithm. [Citation Graph (, )][DBLP ] A Self-Reference Watermarking Scheme Based on Wet Paper Coding. [Citation Graph (, )][DBLP ] A VSS Scheme of Image Size Invariant for Vertical Edge Enhancement. [Citation Graph (, )][DBLP ] A New Intelligent Authorization Agent Model in Grid. [Citation Graph (, )][DBLP ] An Enhancement of JPEG Still Image Compression with Adaptive Linear Regression and Golomb-Rice Coding. [Citation Graph (, )][DBLP ] Cryptanalysis of ID-Based Digital Signature Scheme on Elliptic Curve Cryptosystem. [Citation Graph (, )][DBLP ] Security Enhancement of Ku-Wang Authenticated Key Agreement Protocol. [Citation Graph (, )][DBLP ] A High Payload VQ Steganographic Method for Binary Images. [Citation Graph (, )][DBLP ] Reversible Quantization-Index Modulation Using Neighboring Correlation. [Citation Graph (, )][DBLP ] Two-Phase Algorithms for a Novel Utility-Frequent Mining Model. [Citation Graph (, )][DBLP ] A Remediable Image Authentication Scheme Based on Feature Extraction and Clustered VQ. [Citation Graph (, )][DBLP ] Data Hiding in Images by Hybrid LSB Substitution. [Citation Graph (, )][DBLP ] Information Hiding in Dual Images with Reversibility. [Citation Graph (, )][DBLP ] An e-mail signature protocol for anti-spam work-in-progress. [Citation Graph (, )][DBLP ] A broadcast-encryption-based key management scheme for dynamic multicast communications work-in-progress. [Citation Graph (, )][DBLP ] An adaptive EMD embedding method by condensing secret messages based on consecutive ones transformation and token substitution. [Citation Graph (, )][DBLP ] Using nearest covering codes to embed secret information in grayscale images. [Citation Graph (, )][DBLP ] Security design for three-party encrypted key exchange protocol using smart cards. [Citation Graph (, )][DBLP ] Embedding secret messages based on chaotic map and Huffman coding. [Citation Graph (, )][DBLP ] The design of e-traveler's check with efficiency and mutual authentication. [Citation Graph (, )][DBLP ] A reversible data hiding scheme based on dual steganographic images. [Citation Graph (, )][DBLP ] A High Embedding Efficiency Steganography Scheme for Wet Paper Codes. [Citation Graph (, )][DBLP ] A Resistant Secret Sharing Scheme. [Citation Graph (, )][DBLP ] A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation. [Citation Graph (, )][DBLP ] A Probabilistic Visual Secret Sharing Scheme for Grayscale Images with Voting Strategy. [Citation Graph (, )][DBLP ] A High Payload Steganographic Scheme Based on (7, 4) Hamming Code for Digital Images. [Citation Graph (, )][DBLP ] Secret Hiding Using Side Match Vector Quantization. [Citation Graph (, )][DBLP ] FA-Tree - A Dynamic Indexing Structure for Spatial Data. [Citation Graph (, )][DBLP ] Hiding Information Employing Reduplicating Embedding. [Citation Graph (, )][DBLP ] An Improvement on Authenticated Key Agreement Scheme. [Citation Graph (, )][DBLP ] Enhanced authentication scheme with anonymity for roaming service in global mobility networks. [Citation Graph (, )][DBLP ] An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. [Citation Graph (, )][DBLP ] An efficient and fair buyer-seller fingerprinting scheme for large scale networks. [Citation Graph (, )][DBLP ] A new steganographic method for color and grayscale image hiding. [Citation Graph (, )][DBLP ] Isolated items discarding strategy for discovering high utility itemsets. [Citation Graph (, )][DBLP ] Search in 0.084secs, Finished in 0.103secs