The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Chin-Chen Chang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. M. T. Fang, Richard C. T. Lee, Chin-Chen Chang
    The Idea of De-Clustering and its Applications. [Citation Graph (11, 9)][DBLP]
    VLDB, 1986, pp:181-188 [Conf]
  2. Chin-Chen Chang, Richard C. T. Lee, David Hung-Chang Du
    Some Properties of Cartesian Product Files. [Citation Graph (7, 5)][DBLP]
    SIGMOD Conference, 1980, pp:157-168 [Conf]
  3. Chin-Chen Chang, M. W. Du, Richard C. T. Lee
    Performance Analyses of Cartesian Product Files and Random Files. [Citation Graph (4, 0)][DBLP]
    IEEE Trans. Software Eng., 1984, v:10, n:1, pp:88-99 [Journal]
  4. C. Y. Chen, Chin-Chen Chang
    On GDM allocation for partial range queries. [Citation Graph (3, 0)][DBLP]
    Inf. Syst., 1992, v:17, n:5, pp:381-394 [Journal]
  5. C. C. Chang
    The Study of a Letter Oriented Minimal Perfect Hashing Scheme. [Citation Graph (1, 0)][DBLP]
    FODO, 1985, pp:91-99 [Conf]
  6. C. C. Chang, L. S. Lian
    On Strict Optimality Property of Allocating Binary Cartesian Product Files on Multiple Disk Systems. [Citation Graph (1, 0)][DBLP]
    FODO, 1985, pp:159-175 [Conf]
  7. C. C. Chang, J. C. Shieh
    On the Complexity of File Allocation Problem. [Citation Graph (1, 0)][DBLP]
    FODO, 1985, pp:177-181 [Conf]
  8. Chin-Chen Chang, C. Y. Chen
    Orthogonal Range Retrieval Using Bucket Address Hashing. [Citation Graph (1, 12)][DBLP]
    SSDBM, 1988, pp:133-140 [Conf]
  9. C. C. Chang
    Application of Principal Component Analysis to Multi-Disk Concurrent Accessing. [Citation Graph (1, 0)][DBLP]
    BIT, 1988, v:28, n:2, pp:205-214 [Journal]
  10. Chin-Chen Chang, C. Y. Chen
    Performance of Two-Disk Partition Data Allocations. [Citation Graph (1, 0)][DBLP]
    BIT, 1987, v:27, n:3, pp:306-314 [Journal]
  11. Chin-Chen Chang, H. Y. Chen, C. Y. Chen
    Symbolic Gray Code As A Data Allocation Scheme For Two-Disc Systems. [Citation Graph (1, 0)][DBLP]
    Comput. J., 1992, v:35, n:3, pp:299-305 [Journal]
  12. Chin-Chen Chang, Tzong-Chen Wu
    Retrieving the Most Similar Symbolic Pictures from Pictorial Databases. [Citation Graph (1, 0)][DBLP]
    Inf. Process. Manage., 1992, v:28, n:5, pp:581-588 [Journal]
  13. Chin-Chen Chang, Richard C. T. Lee, M. W. Du
    Symbolic Gray Code as a Perfect Multiattribute Hashing Scheme for Partial Match Queries. [Citation Graph (1, 0)][DBLP]
    IEEE Trans. Software Eng., 1982, v:8, n:3, pp:235-249 [Journal]
  14. Chin-Chen Chang, Jung-San Lee, Chang-Chu Chen
    On the Forward and Backward Secrecy of HLL Group Key Exchange Mechanism. [Citation Graph (0, 0)][DBLP]
    CIT, 2005, pp:702-705 [Conf]
  15. Min-Hui Lin, Chin-Chen Chang
    A Novel Information Hiding Scheme Based on BTC. [Citation Graph (0, 0)][DBLP]
    CIT, 2004, pp:66-71 [Conf]
  16. Hsien-Wen Tseng, Chin-Chen Chang
    Steganography Using JPEG-Compressed Images. [Citation Graph (0, 0)][DBLP]
    CIT, 2004, pp:12-17 [Conf]
  17. Shin-Jia Hwang, Chin-Chen Chang
    A dynamic secret sharing scheme with cheater detection. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:48-55 [Conf]
  18. Chu-Hsing Lin, Ching-Te Wang, Chin-Chen Chang
    A group-oriented (t, n) undeniable signature scheme without trusted center. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:266-274 [Conf]
  19. Chin-Chen Chang, Ya-Fen Chang
    Yet Another Attack on a QR-based Password Authentication System. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2004, pp:170-173 [Conf]
  20. Ya-Fen Chang, Chin-Chen Chang
    Enhanced Anonymous Auction Protocols with Freewheeling Bids. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2006, pp:353-358 [Conf]
  21. Chin-Chen Chang, Chi-Shiang Chan, Ju Yuan Hsiao
    Lossless Image Compression Based on Two-Way Smaller Difference. [Citation Graph (0, 0)][DBLP]
    AINA, 2003, pp:821-824 [Conf]
  22. Chin-Chen Chang, Chi-Lung Chiang, Ju Yuan Hsiao
    A DCT-Domain System for Hiding Fractal Compressed Images. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:83-86 [Conf]
  23. Ya-Fen Chang, Chin-Chen Chang, Yu-Wei Su
    A secure improvement on the user-friendly remote authentication scheme with no time concurrency mech. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2006, pp:741-745 [Conf]
  24. Chin-Chen Chang, Ren-Junn Hwang
    A New Scheme to Protect Confidential Images. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2004, pp:158-164 [Conf]
  25. Chin-Chen Chang, Jui-Yi Kuo
    An Efficient Multi-Server Password Authenticated Key Agreement Scheme Using Smart Cards with Access Control. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:257-260 [Conf]
  26. Chin-Chen Chang, Ying-Tse Kuo, Chu-Hsing Lin
    Fast Algorithms for Common-Multiplicand Multiplication and Exponentiation by Performing Complements. [Citation Graph (0, 0)][DBLP]
    AINA, 2003, pp:807-811 [Conf]
  27. Chin-Chen Chang, Tzu-Chuen Lu, Yi-Long Liu
    Bandwidth Efficiency of an Image Compression Method for Information Hiding. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2004, pp:426-432 [Conf]
  28. Chin-Chen Chang, Chu-Hsing Lin, Wei Lee, Pai-Cheng Hwang
    Secret Sharing with Access Structures in a Hierarchy. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2004, pp:31-34 [Conf]
  29. Chin-Chen Chang, Iuon-Chang Lin, Hui-Min Tsai
    A Dynamic Mechanism for Determining Relationships in a Partially Ordered User Hierarchy. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2004, pp:133-138 [Conf]
  30. Chin-Chen Chang, Iuon-Chang Lin, Hui-Min Tsai, Hsiao-Hsi Wang
    A Key Assignment Scheme for Controlling Access in Partially Ordered User Hierarchies. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2004, pp:376-379 [Conf]
  31. Chin-Chen Chang, Wei-Liang Tai, Min-Hui Lin
    A Reversible Data Hiding Scheme with Modified Side Match Vector Quantization. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:947-952 [Conf]
  32. Chao-Wen Chan, Chin-Chen Chang
    Huffman Tree Decomposition and Its Coding Applications. [Citation Graph (0, 0)][DBLP]
    AINA, 2003, pp:683-688 [Conf]
  33. Yung-Kuan Chan, Chin-Chen Chang
    Spatial Video Retrieval Based on the Piecewise Method. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2004, pp:171-176 [Conf]
  34. Chi-Shiang Chan, Chin-Chen Chang
    A Lossless Medical Image Compression Scheme Using Modified S-Tree Structure. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:75-78 [Conf]
  35. Hui-Feng Huang, Chin-Chen Chang
    A New Design for Efficient t-out-n Oblivious Transfer Scheme. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:499-502 [Conf]
  36. Chi-Hsiung Huang, Chia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang, Kuo-Lun Chen
    Authenticated Encryption Schemes with Message Linkage for Threshold Signatures. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:261-264 [Conf]
  37. Ren-Junn Hwang, Chin-Chen Chang
    Enhancing the Efficiency of (v, r, n)-Fairness Secret Sharing Scheme. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2004, pp:208-212 [Conf]
  38. Yeu-Pong Lai, Chin-Chen Chang
    A Simple Forward Secure Blind Signature Scheme Based on Master Keys and Blind Signatures. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:139-144 [Conf]
  39. Chia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang
    An Improved Low Computation Cost User Authentication Scheme for Mobile Communication. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:249-252 [Conf]
  40. Ching-Te Wang, Chin-Chen Chang, Chu-Hsing Lin
    Using IC Cards to Remotely Login Passwords without Verification Tables. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2004, pp:321-326 [Conf]
  41. Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang
    Signature Schemes Based on Two Hard Problems Simultaneously. [Citation Graph (0, 0)][DBLP]
    AINA, 2003, pp:557-560 [Conf]
  42. Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang
    Supervising Secret-Key Agreements in a Level-Based Hierarchy. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2004, pp:309-314 [Conf]
  43. Chin-Chen Chang, Tzu-Chuen Lu
    A Color-Based Image Retrieval Method Using Color Distribution and Common Bitmap. [Citation Graph (0, 0)][DBLP]
    AIRS, 2005, pp:56-71 [Conf]
  44. Chin-Chen Chang, Yeu-Pong Lai
    A Parallel Modular Exponentiation Scheme for Transformed Exponents. [Citation Graph (0, 0)][DBLP]
    APPT, 2005, pp:443-452 [Conf]
  45. Yu-Chiang Li, Jieh-Shan Yeh, Chin-Chen Chang
    A Fast Algorithm for Mining Share-Frequent Itemsets. [Citation Graph (0, 0)][DBLP]
    APWeb, 2005, pp:417-428 [Conf]
  46. Chin-Chen Chang, Tzong-Chen Wu, C. P. Chen
    The Design of a Conference Key Distribution System. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:459-466 [Conf]
  47. Iuon-Chang Lin, Chin-Chen Chang
    An Efficient Fault-Tolerant Digital Signature Scheme Based on the Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:601-610 [Conf]
  48. Yu-Chiang Li, Chin-Chen Chang
    A New FP-Tree Algorithm for Mining Frequent Itemsets. [Citation Graph (0, 0)][DBLP]
    AWCC, 2004, pp:266-277 [Conf]
  49. Chih-Yang Lin, Chin-Chen Chang
    A Prediction Scheme for Image Vector Quantization Based on Mining Association Rules. [Citation Graph (0, 0)][DBLP]
    AWCC, 2004, pp:230-240 [Conf]
  50. Ming-Ni Wu, Min-Hui Lin, Chin-Chen Chang
    A LSB Substitution Oriented Image Hiding Strategy Using Genetic Algorithms. [Citation Graph (0, 0)][DBLP]
    AWCC, 2004, pp:219-229 [Conf]
  51. Chin-Chen Chang, Jung-San Lee
    Improvement on an Optimized Protocol for Mobile Network Authentication and Security. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:538-541 [Conf]
  52. Chin-Chen Chang, Chia-Chen Lin, Jun-Bin Yeh
    Adaptive Hiding Scheme Based on VQ-Indices Using Commutable Codewords. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:567-572 [Conf]
  53. Hui-Feng Huang, Chin-Chen Chang
    Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:554-559 [Conf]
  54. Ming-Ni Wu, Chia-Chen Lin, Chin-Chen Chang
    Image Copy Detection with Rotating Tolerance. [Citation Graph (0, 0)][DBLP]
    CIS (1), 2005, pp:464-469 [Conf]
  55. Chiuyuan Chen, Chin-Chen Chang
    Connected Proper Interval Graphs and the Guard Problem in Spiral Polygons. [Citation Graph (0, 0)][DBLP]
    Combinatorics and Computer Science, 1995, pp:39-47 [Conf]
  56. Yung-Kuan Chan, Chin-Chen Chang
    Concealing a Secret Image Using the Breadth First Traversal Linear Quadtree Structure. [Citation Graph (0, 0)][DBLP]
    CODAS, 2001, pp:213-0 [Conf]
  57. C. Y. Chen, Chin-Chen Chang, Richard C. T. Lee, D. C. Lin
    A Temporal Join Mechanism Based on Trie-Ranking Data Structure. [Citation Graph (0, 0)][DBLP]
    CODAS, 1996, pp:428-435 [Conf]
  58. Chin-Feng Lee, Chin-Chen Chang
    Optimal Bit Lengths of Direction Signatures for Spatial Match Accessing Using Basic Linear Hashing Scheme. [Citation Graph (0, 0)][DBLP]
    CODAS, 1996, pp:526-529 [Conf]
  59. Chin-Chen Chang, Chao-Wen Chan
    Detecting Dealer Cheating in Secret Sharing Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2000, pp:449-453 [Conf]
  60. Chin-Chen Chang, Kuo-Feng Hwang, Yi Lin
    A Proof of Copyright Ownership Using Moment-Preserving. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2000, pp:198-203 [Conf]
  61. C. Y. Chen, Chin-Chen Chang, Richard C. T. Lee, D. C. Lin
    Optimal Linear Hashing Files for Orthogonal Range Retrieval. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 1996, pp:406-413 [Conf]
  62. Iuon-Chang Lin, Chin-Chen Chang, Min-Shiang Hwang
    Security Enhancement for the "Simple Authentication Key Agreement Algorithm". [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2000, pp:113-115 [Conf]
  63. Shin-Jia Hwang, Chin-Chen Chang, Wei-Pang Yang
    Some Active Attacks on Fast Server-Aided Secret Computation Protocols for Modular Exponentiation. [Citation Graph (0, 0)][DBLP]
    Cryptography: Policy and Algorithms, 1995, pp:215-227 [Conf]
  64. Hui-Feng Huang, Chin-Chen Chang
    An efficient deniable authentication protocol. [Citation Graph (0, 0)][DBLP]
    CW, 2005, pp:307-310 [Conf]
  65. Chao-Wen Chan, Chin-Chen Chang
    Key Exchange Protocols for Multiparty Communication Services. [Citation Graph (0, 0)][DBLP]
    CW, 2002, pp:241-248 [Conf]
  66. Ya-Fen Chang, Chin-Chen Chang
    Password-authenticated 3PEKE with Round Efficiency without Server's Public Key. [Citation Graph (0, 0)][DBLP]
    CW, 2005, pp:340-344 [Conf]
  67. Chin-Chen Chang, Ya-Fen Chang, Wen-Chuan Wu
    An Extendable-Message-Passing Protocol with Signatures Based on Two Hard Problems and Its Applications. [Citation Graph (0, 0)][DBLP]
    CW, 2005, pp:93-100 [Conf]
  68. Chin-Chen Chang, Ju Yuan Hsiao, Chi-Lung Chiang
    An Image Copyright Protection Scheme Based on Torus Automorphism. [Citation Graph (0, 0)][DBLP]
    CW, 2002, pp:217-224 [Conf]
  69. Chin-Chen Chang, Jui-Yi Kuo, Jung-San Lee
    Time-bounded Based Password Authentication Scheme. [Citation Graph (0, 0)][DBLP]
    CW, 2005, pp:117-122 [Conf]
  70. Chin-Chen Chang, Pei-Yu Lin
    A Compression-Based Data Hiding Scheme Using Vector Quantization and Principle Component Analysis. [Citation Graph (0, 0)][DBLP]
    CW, 2004, pp:369-375 [Conf]
  71. Chin-Chen Chang, Jung-San Lee
    An Efficient and Secure Multi-Server Password Authentication Scheme using Smart Cards. [Citation Graph (0, 0)][DBLP]
    CW, 2004, pp:417-422 [Conf]
  72. Chin-Chen Chang, Po-Wen Lu, Ju Yuan Hsiao
    A Hybrid Method for Estimating the Euclidean Distance between Two Vectors. [Citation Graph (0, 0)][DBLP]
    CW, 2002, pp:183-190 [Conf]
  73. Chin-Chen Chang, Tai-Xing Yu
    Sharing a Secret Gray Image in Multiple Images. [Citation Graph (0, 0)][DBLP]
    CW, 2002, pp:230-240 [Conf]
  74. Hui-Feng Huang, Chin-Chen Chang
    Cryptanalysis of the WD Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    CW, 2002, pp:249-254 [Conf]
  75. C. C. Chang, D. F. Leu
    Multikey Sorting as a File Organization Scheme When Queries Are Not Equally Likely. [Citation Graph (0, 0)][DBLP]
    DASFAA, 1989, pp:219-224 [Conf]
  76. J. Liang, C. C. Chang
    Similarity Retrieval on Pictorial Databases Based upon Module Operation. [Citation Graph (0, 1)][DBLP]
    DASFAA, 1993, pp:19-26 [Conf]
  77. Chin-Chen Chang, Chi-Shiang Chan, Yi-Hsuan Fan
    A Secret Image Sharing Scheme Based on Vector Quantization Mechanism. [Citation Graph (0, 0)][DBLP]
    EUC, 2006, pp:469-478 [Conf]
  78. Yung-Kuan Chan, Chin-Chen Chang
    An Efficient Data Structure for Storing Similar Binary Images. [Citation Graph (0, 0)][DBLP]
    FODO, 1998, pp:268-275 [Conf]
  79. C. C. Chang
    Database Research and Development in Taiwan. [Citation Graph (0, 0)][DBLP]
    FODO, 1985, pp:603-605 [Conf]
  80. Chin-Chen Chang, Jaw-Ji Shen
    Consecutive Retrieval Organization as a File Allocation Scheme on Multiple Disk Systems. [Citation Graph (0, 0)][DBLP]
    FODO, 1985, pp:113-124 [Conf]
  81. Yu-Chiang Li, Jieh-Shan Yeh, Chin-Chen Chang
    Direct Candidates Generation: A Novel Algorithm for Discovering Complete Share-Frequent Itemsets. [Citation Graph (0, 0)][DBLP]
    FSKD (2), 2005, pp:551-560 [Conf]
  82. Chin-Chen Chang, Daniel J. Buehrer
    De-Clustering Image Databases. [Citation Graph (0, 0)][DBLP]
    Future Databases, 1992, pp:142-145 [Conf]
  83. Yueh-Yi Lai, Wen-Kai Tai, Chin-Chen Chang, Chen-Duo Liu
    Synthesizing transition textures on succession patterns. [Citation Graph (0, 0)][DBLP]
    GRAPHITE, 2005, pp:273-276 [Conf]
  84. Chin-Chen Chang, Hsien-Chu Hsia, Tung-Shou Chen
    A Progressive Image Transmission Scheme Based on Block Truncation Coding. [Citation Graph (0, 0)][DBLP]
    Human.Society@Internet, 2001, pp:383-397 [Conf]
  85. Hui-Feng Huang, Chin-Chen Chang
    A Novel Conference Key Distribution System with Re-keying Protocol. [Citation Graph (0, 0)][DBLP]
    Human.Society@Internet, 2005, pp:282-290 [Conf]
  86. Kuo-Lung Hung, Chin-Chen Chang
    A Robust and Recoverable Tamper Proofing Technique for Image Authentication. [Citation Graph (0, 0)][DBLP]
    Human.Society@Internet 2003, 2003, pp:44-53 [Conf]
  87. C. C. Chang, J. C. Shieh
    On the Design of Ordered Minimal Perfect Hashing Functions. [Citation Graph (0, 5)][DBLP]
    ICDE, 1986, pp:112-115 [Conf]
  88. Chin-Chen Chang, Ya-Fen Chang
    The Security Flaw of an Untraceable Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ICEB, 2004, pp:1379-1381 [Conf]
  89. Chao-Wen Chan, Chin-Chen Chang
    A New Scheme for the Electronic Coin. [Citation Graph (0, 0)][DBLP]
    ICEBE, 2006, pp:339-343 [Conf]
  90. Hui-Feng Huang, Chin-Chen Chang
    An Untraceable Electronic Cash System Using Fair Blind Signatures. [Citation Graph (0, 0)][DBLP]
    ICEBE, 2006, pp:39-46 [Conf]
  91. Ya-Fen Chang, Chin-Chen Chang
    An Improvement on Strong-Password Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    ICESS, 2005, pp:629-637 [Conf]
  92. Chin-Chen Chang, Kuo-Feng Hwang
    Towards the Forgery of a Group Signature without Knowing the Group Center's Secret. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:47-51 [Conf]
  93. Chin-Chen Chang, Iuon-Chang Lin
    Cryptanalysis of the Improved User Efficient Blind Signatures. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:42-46 [Conf]
  94. Hui-Feng Huang, Chin-Chen Chang
    An Efficient Convertible Authenticated Encryption Scheme and Its Variant. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:382-392 [Conf]
  95. Chin-Chen Chang, Cheng-Yi Liu
    Modified curvature scale space feature alignment approach for hand posture recognition. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 2003, pp:309-312 [Conf]
  96. Chin-Chen Chang
    Novel hierarchical approach for radiosity. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:863-866 [Conf]
  97. Chin-Chen Chang, Chung-Mou Pengwu
    Gesture recognition approach for sign language using curvature scale space and hidden Markov model. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:1187-1190 [Conf]
  98. Yung-Kuan Chan, Chin-Chen Chang
    Image Retrieval Based on Tolerable Difference of Direction. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2001, pp:387-392 [Conf]
  99. Chin-Chen Chang, Jun-Chou Chuang, Pei-Yu Lin
    Sharing a Secret Two-Tone Image in Two Gray-Level Images. [Citation Graph (0, 0)][DBLP]
    ICPADS (2), 2005, pp:300-304 [Conf]
  100. Chin-Chen Chang, Po-Wen Lu
    An Image Refining Method Using Digital Watermark via Vector Quantization. [Citation Graph (0, 0)][DBLP]
    ICPADS (2), 2005, pp:585-589 [Conf]
  101. Chin-Chen Chang, Chwei-Shyong Tsai, Tung-Shou Chen
    A New Scheme for Sharing Secret Color Images in Computer Network. [Citation Graph (0, 0)][DBLP]
    ICPADS, 2000, pp:21-27 [Conf]
  102. Kuo-Feng Hwang, Chin-Chen Chang, Chao-Wen Chan
    A Search Scheme Resulting in Mixing Compressed Text Files. [Citation Graph (0, 0)][DBLP]
    ICPADS (1), 2005, pp:762-768 [Conf]
  103. Chin-Chen Chang, Fun-Chou Shiue, Tung-Shou Chen
    Tree Structured Vector Quantization with Dynamic Path Search. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 1999, pp:536-541 [Conf]
  104. Chin-Chen Chang, I-Yen Chen, Yea-Shuan Huang
    Hand Pose Recognition Using Curvature Scale Space. [Citation Graph (0, 0)][DBLP]
    ICPR (2), 2002, pp:386-389 [Conf]
  105. Timothy K. Shih, Chin-Chen Chang, Hsiau Wen Lin
    Reusability on Learning Object Repository. [Citation Graph (0, 0)][DBLP]
    ICWL, 2006, pp:203-214 [Conf]
  106. Chin-Chen Chang, Kuo-Lun Chen
    A Signature Scheme with (t, n) Shared Verification and Message Recovery. [Citation Graph (0, 0)][DBLP]
    iiWAS, 2004, pp:- [Conf]
  107. Chao-Wen Chan, Chin-Chen Chang
    A Scheme for (t, n)-Threshold Secret Image Sharing. [Citation Graph (0, 0)][DBLP]
    IMECS, 2006, pp:619-624 [Conf]
  108. Ya-Fen Chang, Chin-Chen Chang, Wei-Liang Tai
    Comments on Distributed Sign-and-Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    IMECS, 2006, pp:178-180 [Conf]
  109. Chin-Chen Chang, Keng-Chu Lin
    Yet Another Attack on Mutual Authentication and Key Exchange Protocols for Low Power Wireless Communications. [Citation Graph (0, 0)][DBLP]
    IMECS, 2006, pp:959-962 [Conf]
  110. Chin-Chen Chang, Chia-Chi Wu
    An Improvement of the Design of Integrating Subliminal Channel with Access Control. [Citation Graph (0, 0)][DBLP]
    IMECS, 2006, pp:276-279 [Conf]
  111. Chin-Chen Chang, Wen-Bin Wu, Jieh-Shan Yeh
    A Cryptanalysis on a Generalized Threshold Cryptosystem. [Citation Graph (0, 0)][DBLP]
    IMECS, 2006, pp:452-455 [Conf]
  112. Hui-Feng Huang, Chin-Chen Chang
    An Untraceable Forward-Secure Blind Signature Scheme. [Citation Graph (0, 0)][DBLP]
    IMECS, 2006, pp:441-446 [Conf]
  113. Yung-Kuan Chan, Chin-Chen Chang, Jau-Ji Shen
    A Compact Patricia Trie for a Large Set of Keys. [Citation Graph (0, 0)][DBLP]
    ISDB, 2002, pp:31-36 [Conf]
  114. Chin-Chen Chang, Chi-Shiang Chan, Ya-Ping Pan
    An Inverse Halftoning Technique using Genetic Algorithm. [Citation Graph (0, 0)][DBLP]
    ISDB, 2002, pp:184-189 [Conf]
  115. Tzu-Chuen Lu, Chin-Chen Chang, S. Wesley Changchien
    An Association Rule Mining Method for Spatial Database. [Citation Graph (0, 0)][DBLP]
    ISDB, 2002, pp:281-286 [Conf]
  116. Ren-Junn Hwang, Chin-Chen Chang
    A Method for Sending Confidential Messages to a Group without Trusted Parties. [Citation Graph (0, 0)][DBLP]
    ISPA, 2003, pp:375-381 [Conf]
  117. Chin-Chen Chang, Chun-Sen Tseng, Chia-Chen Lin
    Hiding Data in Binary Images. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:338-349 [Conf]
  118. Chin-Chen Chang, Iuon-Chang Lin, Timothy K. Shih
    An Efficient Edge Detection Technique for Chinese Calligraphy. [Citation Graph (0, 0)][DBLP]
    JCIS, 2002, pp:960-963 [Conf]
  119. Chin-Chen Chang, Ming-Ni Wu
    An Algorithm for Color Image Compression Base on Common Bit Map Block Truncation Coding. [Citation Graph (0, 0)][DBLP]
    JCIS, 2002, pp:964-967 [Conf]
  120. Tzu-Chuen Lu, Chin-Chen Chang
    A Bandwidth Efficiency of the Locally Adaptive Compression Method for Hiding Secret Messages. [Citation Graph (0, 0)][DBLP]
    JCIS, 2006, pp:- [Conf]
  121. Hsien-Chu Wu, Chin-Chen Chang, Ting-Wei Yu
    A DCT-based Recoverable Image Authentication. [Citation Graph (0, 0)][DBLP]
    JCIS, 2006, pp:- [Conf]
  122. Hsien-Chu Wu, Hui-Chuan Lin, Chin-Chen Chang
    Reversible Palette Image Steganography Based on De-clustering and Predictive Coding. [Citation Graph (0, 0)][DBLP]
    JCIS, 2006, pp:- [Conf]
  123. Ya-Fen Chang, Chin-Chen Chang
    Comments on Abe et al.'s Threshold Signer-ambiguous Signature Scheme from Variety of Keys. [Citation Graph (0, 0)][DBLP]
    JCIS, 2006, pp:- [Conf]
  124. Chin-Chen Chang, Yung-Chen Chou, Jau-Ji Shen
    Improving Image Quality for JPEG Compression. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:442-448 [Conf]
  125. Chin-Chen Chang, Tzu-Chuen Lu
    Method for Searching Similar Images Using Quality Index Measurement. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1224-1230 [Conf]
  126. Chin-Chen Chang, Chih-Yang Lin, Yu-Zheng Wang
    VQ Image Steganographic Method with High Embedding Capacity Using Multi-way Search Approach. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1058-1064 [Conf]
  127. Chin-Chen Chang, Tzu-Chuen Lu, Jun-Bin Yeh
    A Bandwidth Efficiency of Lempel-Ziv Scheme for Data Authentication. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:249-256 [Conf]
  128. Chin-Chen Chang, Wen-Chuan Wu
    A Reversible Information Hiding Scheme Based on Vector Quantization. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1101-1107 [Conf]
  129. Chin-Chen Chang
    A Perspective on the Development of Digital Libraries in Taiwan. [Citation Graph (0, 0)][DBLP]
    Kyoto International Conference on Digital Libraries, 2000, pp:44-46 [Conf]
  130. Chin-Chen Chang, Jyh-Chiang Yeh, Ju Yuan Hsiao
    A Method for Protecting Digital Images from Being Copied Illegally. [Citation Graph (0, 0)][DBLP]
    Kyoto International Conference on Digital Libraries, 2000, pp:348-355 [Conf]
  131. Jun-Chou Chuang, Chin-Chen Chang
    Detection and Restoration of a Tampered Medical Image. [Citation Graph (0, 0)][DBLP]
    MIAR, 2004, pp:78-85 [Conf]
  132. Kuo-Lung Hung, Chin-Chen Chang, Tung-Shou Chen
    An Efficient Block-based Scheme for Progressively Transmitting Lossless Images. [Citation Graph (0, 0)][DBLP]
    MMM, 2003, pp:313-328 [Conf]
  133. Chin-Chen Chang, Wen-Chuan Wu
    A novel data hiding scheme for keeping high stego-image quality. [Citation Graph (0, 0)][DBLP]
    MMM, 2006, pp:- [Conf]
  134. Chin-Chen Chang, Tung-Shou Chen
    An Improved Prediction Method for Quadtree Image Coding. [Citation Graph (0, 0)][DBLP]
    ISMSE, 2000, pp:269-275 [Conf]
  135. Chin-Chen Chang, Shu-Kai Yang, Jun-Wei Hsieh, Ding-Zhou Duan, Ming-Fen Lin
    A Fuzzy Inference System for Simplifying Surfaces with Color. [Citation Graph (0, 0)][DBLP]
    IEEE Pacific Rim Conference on Multimedia, 2001, pp:1078-1083 [Conf]
  136. Chin-Chen Chang, Chi-Shiang Chan, Ju Yuan Hsiao
    A Color Image Retrieval Method Based on Local Histogram. [Citation Graph (0, 0)][DBLP]
    IEEE Pacific Rim Conference on Multimedia, 2001, pp:831-836 [Conf]
  137. Chin-Chen Chang, Yung-Chen Chou, Wen-Chuan Wu
    Image Retrieval Using Spatial Color and Edge Detection. [Citation Graph (0, 0)][DBLP]
    PCM (1), 2005, pp:981-992 [Conf]
  138. Chin-Chen Chang, Ju Yuan Hsiao, Chi-Lung Chiang
    A Cross-Type Peak-and-Valley Filter for Error Prevention and Resilience in Image Communications. [Citation Graph (0, 0)][DBLP]
    IEEE Pacific Rim Conference on Multimedia, 2002, pp:393-400 [Conf]
  139. Chin-Chen Chang, Chih-Ping Hsieh, Ju Yuan Hsiao
    A Fast and Efficient Noise Reduction Method Suitable for Low Noise Density. [Citation Graph (0, 0)][DBLP]
    IEEE Pacific Rim Conference on Multimedia, 2002, pp:386-392 [Conf]
  140. Chin-Chen Chang, Yuan-Yuan Su
    A Dynamic Color Palette for Color Images Coding. [Citation Graph (0, 0)][DBLP]
    IEEE Pacific Rim Conference on Multimedia, 2002, pp:369-376 [Conf]
  141. Chin-Chen Chang, Piyu Tsai, Min-Hui Lin
    An Adaptive Steganography for Index-Based Images Using Codeword Grouping. [Citation Graph (0, 0)][DBLP]
    PCM (3), 2004, pp:731-738 [Conf]
  142. Chin-Chen Chang, Jyh-Chiang Yeh, Ju Yuan Hsiao
    A Novel Scheme for Securing Image Steganography. [Citation Graph (0, 0)][DBLP]
    IEEE Pacific Rim Conference on Multimedia, 2001, pp:804-811 [Conf]
  143. Chwei-Shyong Tsai, Chin-Chen Chang
    A Generalized Secret Image Sharing and Recovery Scheme. [Citation Graph (0, 0)][DBLP]
    IEEE Pacific Rim Conference on Multimedia, 2001, pp:963-968 [Conf]
  144. Chin-Chen Chang, Jyh-Jong Leu, Pai-Cheng Huang, Wei-Bin Lee
    A Scheme for Obtaining a Message from the Digital Multisignature. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:154-163 [Conf]
  145. Chin-Chen Chang, Yu-Chiang Li, Jung-San Lee
    An Efficient Algorithm for Incremental Mining of Association Rules. [Citation Graph (0, 0)][DBLP]
    RIDE, 2005, pp:3-10 [Conf]
  146. Chin-Chen Chang, Horng-Chin Lee
    A Solution to Generalized Group Oriented Cryptography. [Citation Graph (0, 0)][DBLP]
    SEC, 1992, pp:265-275 [Conf]
  147. Daniel J. Buehrer, Chin-Chen Chang
    Application of a Reciprocal Confluence Tree Unit to Similar-Picture Retrieval. [Citation Graph (0, 0)][DBLP]
    SSD, 1993, pp:437-442 [Conf]
  148. Chin-Chen Chang, Kuo-Lun Chen, Chu-Hsing Lin, Jen-Chieh Chang
    A Group-Oriented (t, n) Threshold Signature Scheme Against Replay Attacks. [Citation Graph (0, 0)][DBLP]
    UIC, 2006, pp:816-825 [Conf]
  149. Jen-Ho Yang, Chin-Chen Chang, Chih-Hung Wang
    A Practical Solution to the (t, n) Threshold Untraceable Signature with (k, l) Verification Scheme. [Citation Graph (0, 0)][DBLP]
    UIC, 2006, pp:998-1007 [Conf]
  150. Chin-Chen Chang, Jun-Chou Chuang, Yih-Shin Hu
    Similar Image Retrieval Based on Wavelet Transformation. [Citation Graph (0, 0)][DBLP]
    WAA, 2003, pp:294-0 [Conf]
  151. Chin-Chen Chang, Yung-Chen Chou, Jau-Ji Shen
    A Discrete Wavelet Transform Based State-Codebook Search Algorithm for Vector Quantization. [Citation Graph (0, 0)][DBLP]
    ICICIC (1), 2006, pp:197-200 [Conf]
  152. Chin-Chen Chang, Kuo-Lung Hung
    An Efficient Euclidean Distance Estimation Scheme for Accelerating VQ Encoding. [Citation Graph (0, 0)][DBLP]
    ICICIC (1), 2006, pp:194-196 [Conf]
  153. Chin-Chen Chang, Tzu-Chuen Lu
    A Wavelet-Based Progressive Digital Image Transmission Scheme. [Citation Graph (0, 0)][DBLP]
    ICICIC (2), 2006, pp:681-684 [Conf]
  154. Ming-Ni Wu, Chia-Chen Lin, Chin-Chen Chang
    A Fast Wavelet-Based Image Progressive Transmission Method Based on Vector Quantization. [Citation Graph (0, 0)][DBLP]
    ICICIC (2), 2006, pp:677-680 [Conf]
  155. Chin-Chen Chang, Wei-Liang Tai, Chia-Chen Lin
    A Multipurpose Wavelet-Based Image Watermarking. [Citation Graph (0, 0)][DBLP]
    ICICIC (3), 2006, pp:70-73 [Conf]
  156. Chin-Chen Chang, Tung-Shou Chen, Hsien-Chu Hsia
    An ImageWatermarking Scheme Using Pattern Coding Technique. [Citation Graph (0, 0)][DBLP]
    ICICIC (3), 2006, pp:467-470 [Conf]
  157. Chia-Chen Lin, Chin-Chen Chang
    An Image Hiding Scheme Based on Du's Disk Allocation Method. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:617-620 [Conf]
  158. Chin-Chen Chang, Yung-Chen Chang, Jau-Ji Shen
    A Heuristic Method for Extracting Enhanced Watermarks from Digital Images. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:453-456 [Conf]
  159. Chin-Chen Chang, Yung-Chen Chang, Jau-Ji Shen
    A Novel Image Compression Algorithm Based on Sixteen Most Lately Used Encoded Codewords. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:545-548 [Conf]
  160. Chin-Chen Chang, Yung-Chen Chou
    Quantization Index Modulation Using Vector Quantization with DWT Based State-Codebook Search. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:549-554 [Conf]
  161. Chung-Chuan Wang, Chin-Chen Chang, Jinn-ke Jan, Jieh-Shan Yeh
    Novel Steganographic Schemes Based on Row-Major Mapping Relation. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:392-395 [Conf]
  162. Chin-Chen Chang, Yi-Hui Chen, Kuan-Ming Li
    Improved SMVQ Scheme with Edge-Directed Prediction. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:541-544 [Conf]
  163. Chin-Chen Chang, Jun-Chou Chuang
    Progressive Image Transmission Using Significant Features and Linear Regression Prediction. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:681-684 [Conf]
  164. Chin-Chen Chang, Tung-Shou Chen, Yi Lin
    An efficient accessing technique of Chinese characters using Boshiamy Chinese input system. [Citation Graph (0, 0)][DBLP]
    IRAL, 2000, pp:61-67 [Conf]
  165. Chin-Chen Chang, Hao-Chuan Tsai, Yi-Hui Chen
    An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:1210-1215 [Conf]
  166. Chin-Chen Chang, Chu-Hsing Lin, Chien-Yuan Chen
    A Conference Key Distribution Scheme Using Interpolating Polynomials. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:963-967 [Conf]
  167. Hui-Feng Huang, Chin-Chen Chang
    An Efficient Key-Lock-Pair Mechanism Based on Division Algorithm. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:982-986 [Conf]
  168. C. C. Chang
    On the Design of a Key-Lock-Pair Mechanism in Information Protection Systems. [Citation Graph (0, 0)][DBLP]
    BIT, 1986, v:26, n:4, pp:410-417 [Journal]
  169. Chin-Chen Chang, Huey-Cheue Kowng, Tzong-Chen Wu
    A Refinement of a Compression-Oriented Addressing Scheme. [Citation Graph (0, 0)][DBLP]
    BIT, 1993, v:33, n:4, pp:530-535 [Journal]
  170. Chin-Chen Chang, Chu-Hsing Lin
    A Reciprocal Confluence Tree Unit and Its Applications. [Citation Graph (0, 0)][DBLP]
    BIT, 1990, v:30, n:1, pp:27-33 [Journal]
  171. J. K. Jan, Chin-Chen Chang
    A Key-Lock-Pair Oriented Access Control Scheme for the Growth of Users and Files. [Citation Graph (0, 0)][DBLP]
    BIT, 1993, v:33, n:3, pp:382-389 [Journal]
  172. Iuon-Chang Lin, Chin-Chen Chang
    A (t, n) Threshold Secret Sharing System with Efficient Identification of Cheaters. [Citation Graph (0, 0)][DBLP]
    Computers and Artificial Intelligence, 2005, v:24, n:5, pp:- [Journal]
  173. Chin-Chen Chang, Zen-Chung Shih
    An accuracy enhancement algorithm for hierarchical radiosity. [Citation Graph (0, 0)][DBLP]
    Computers & Graphics, 1998, v:22, n:2-3, pp:225-232 [Journal]
  174. C. C. Chang
    An Information Protection Scheme Based Upon Number Theory. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1987, v:30, n:3, pp:249-253 [Journal]
  175. Chin-Chen Chang, C. Y. Chen
    Performance Analysis of the Generalised Disc Modulo Allocation method for Multiple Key Hashing Files on Multi-Disc Systems. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1987, v:30, n:6, pp:535-540 [Journal]
  176. Chin-Chen Chang, C. Y. Chen
    A Recursive Performance Formula of the Disc Modulo Allocation Method for Binary Cartesian Product Files. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1988, v:31, n:6, pp:565-566 [Journal]
  177. Chin-Chen Chang, C. Y. Chen, J. K. Jan
    On the Design of a Machine-Independent Perfect Hashing Scheme. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1991, v:34, n:5, pp:469-474 [Journal]
  178. Chin-Chen Chang, Chih-Yang Lin
    Perfect Hashing Schemes for Mining Association Rules. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2005, v:48, n:2, pp:168-179 [Journal]
  179. Chin-Chen Chang, Richard C. T. Lee
    A Letter-Oriented Minimal Perfect Hashing Scheme. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1986, v:29, n:3, pp:277-281 [Journal]
  180. Chin-Chen Chang, H. F. Lin, C. Y. Chen
    Optimality Properties of the Disc Modulo Allocation Method for k-ary Multiple Key Hashing Files. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1992, v:35, n:4, pp:390-394 [Journal]
  181. Chu-Hsing Lin, Chin-Chen Chang, Richard C. T. Lee
    A Record-Oriented Cryptosystem for Database Sharing (Short Note). [Citation Graph (0, 0)][DBLP]
    Comput. J., 1992, v:35, n:6, pp:658-660 [Journal]
  182. Hsien-Wen Tseng, Chin-Chen Chang
    Construction of Symmetrical Reversible Variable Length Codes Using Backtracking. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2003, v:46, n:1, pp:100-105 [Journal]
  183. Hsien-Wen Tseng, Chin-Chen Chang
    A Branch-and-Bound Algorithm for the Construction of Reversible Variable Length Codes. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2004, v:47, n:6, pp:701-707 [Journal]
  184. Chin-Chen Chang, Pai-Cheng Huang, Wei-Bin Lee
    Conference key distribution schemes for portable communication systems. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:12, pp:1160-1164 [Journal]
  185. Chin-Chen Chang, Jung-San Lee, Ya-Fen Chang
    Efficient authentication protocols of GSM. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2005, v:28, n:8, pp:921-928 [Journal]
  186. Chin-Chen Chang, Sun-Min Tsu, Chien-Yuan Chen
    Remote scheme for password authentication based on theory of quadratic residues. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1995, v:18, n:12, pp:936-942 [Journal]
  187. Chin-Chen Chang, Tzong-Chen Wu, Chi-Sung Laih
    Cryptanalysis of a Password Authentication Scheme Using Quadratic Residues. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1995, v:18, n:1, pp:45-47 [Journal]
  188. Ren-Junn Hwang, Chin-Chen Chang
    An on-line secret sharing scheme for multi-secrets. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1998, v:21, n:13, pp:1170-1176 [Journal]
  189. Ming-Yung Ko, Tzonelih Hwang, C. C. Chang
    Attacks on an ID-based signature scheme based on Rabin's public key cryptosystem. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1994, v:17, n:9, pp:674-676 [Journal]
  190. Wei-Bin Lee, Chin-Chen Chang
    Three ID-based information security functions. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1997, v:20, n:14, pp:1301-1307 [Journal]
  191. Wei-Bin Lee, Chin-Chen Chang
    Authenticity of public keys in asymmetric cryptosystems. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1998, v:21, n:2, pp:195-198 [Journal]
  192. Wei-Bin Lee, Chin-Chen Chang
    Using RSA with low exponent in a public network. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1998, v:21, n:3, pp:284-286 [Journal]
  193. Chu-Hsing Lin, Chin-Chen Chang
    Method for constructing a group-oriented cipher system. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1994, v:17, n:11, pp:805-808 [Journal]
  194. Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang
    Threshold signature schemes with traceable signers in group communications. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1998, v:21, n:8, pp:771-776 [Journal]
  195. Chin-Chen Chang, Ya-Fen Chang
    Efficient anonymous auction protocols with freewheeling bids. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:8, pp:728-734 [Journal]
  196. Chin-Chen Chang, J. K. Jan, Daniel J. Buehrer
    A scheme to determine the relationship between two users in a hierarchy. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1994, v:13, n:3, pp:255-261 [Journal]
  197. Chin-Chen Chang, Yeu-Pong Lai
    A flexible date-attachment scheme on e-cash. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:2, pp:160-166 [Journal]
  198. Chin-Chen Chang, Jung-San Lee
    An anonymous voting mechanism based on the key exchange protocol. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:4, pp:307-314 [Journal]
  199. Chin-Chen Chang, Jao-Ji Shen, Tzong-Chen Wu
    Access control with binary keys. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1994, v:13, n:8, pp:681-686 [Journal]
  200. J. K. Jan, Chin-Chen Chang, S. J. Wang
    A dynamic key-lock-pair access control scheme. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1991, v:10, n:2, pp:129-139 [Journal]
  201. Chi-Sung Laih, Wen-Hong Chiou, Chin-Chen Chang
    Authentication and protection of public keys. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1994, v:13, n:7, pp:581-585 [Journal]
  202. Min-Hui Lin, Chin-Chen Chang, Yan-Ren Chen
    A fair and secure mobile agent environment based on blind signature and proxy host. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:3, pp:199-212 [Journal]
  203. Hsien-Chu Wu, Chin-Chen Chang
    A novel digital image watermarking scheme based on the vector quantization technique. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:6, pp:460-471 [Journal]
  204. Hui-Min Tsai, Chin-Chen Chang
    A cryptographic implementation for dynamic access control in a user hierarchy. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1995, v:14, n:2, pp:159-166 [Journal]
  205. Tzong-Chen Wu, Chin-Chen Chang
    Cryptographic key assignment scheme for hierarchical access control. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 2001, v:16, n:1, pp:25-28 [Journal]
  206. Iuon-Chang Lin, Min-Shiang Hwang, Chin-Chen Chang
    The General Pay-Word: A Micro-payment Scheme Based on n-dimension One-way Hash Chain. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:36, n:1, pp:53-67 [Journal]
  207. Chin-Chen Chang, Chin-Feng Lee
    A Bin-Tree Oriented Iconic Indexing Scheme for Retrieving Symbolic Pictures. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 1998, v:26, n:2, pp:121-133 [Journal]
  208. Ji-Han Jiang, Chin-Chen Chang, Tung-Shou Chen
    A Compact Sparse Matrix Representation Using Random Hash Functions. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2000, v:32, n:1, pp:29-49 [Journal]
  209. Ching-Te Wang, Chin-Chen Chang, Chu-Hsing Lin
    A New Micro-Payment System Using General Payword Chain. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research, 2002, v:2, n:1-2, pp:159-168 [Journal]
  210. Iuon-Chang Lin, Min-Shiang Hwang, Chin-Chen Chang
    A new key assignment scheme for enforcing complicated access control policies in hierarchy. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2003, v:19, n:4, pp:457-462 [Journal]
  211. Yu-Chen Hu, Chin-Chen Chang
    An Improved Tree-Structured Codebook Search Algorithm for Grayscale Image Compression. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2006, v:70, n:3, pp:251-260 [Journal]
  212. Chin-Chen Chang, Chi-Shiang Chan
    An Inverse Halftoning Technique Using Modified Look-Up Tables. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2005, v:68, n:3, pp:207-220 [Journal]
  213. Chin-Chen Chang, Jun-Chou Chuang, Yu-Chen Hu
    Spatial Domain Image Hiding Scheme Using Pixel-Values Differencing. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2006, v:70, n:3, pp:171-184 [Journal]
  214. Chin-Chen Chang, Chih-Yang Lin, Henry Chou
    Perfect Hashing Schemes for Mining Traversal Patterns. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2006, v:70, n:3, pp:185-202 [Journal]
  215. Chin-Chen Chang, Piyu Tsai, Min-Hui Lin
    An Adaptive Steganographic Scheme for Color Images. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2004, v:62, n:3-4, pp:275-289 [Journal]
  216. Tzu-Chuen Lu, Chin-Chen Chang
    Data Compressor for VQ Index Tables. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2005, v:65, n:4, pp:353-371 [Journal]
  217. Chao-Wen Chan, Chin-Chen Chang
    A New Channel for Image Hiding Based on Interpolating polynomials. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2003, v:58, n:2, pp:93-104 [Journal]
  218. Chi-Shiang Chan, Chin-Chen Chang
    An Image Hiding Scheme Based on Multi-bit-reference Substitution Table Using Dynamic Programming Strategy. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2005, v:65, n:4, pp:291-305 [Journal]
  219. Hui-Feng Huang, Chin-Chen Chang
    An Efficient and Practical (t, n) Threshold Proxy Signature Scheme with Known Signers. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2003, v:56, n:3, pp:243-253 [Journal]
  220. Chih-Yang Lin, Chin-Chen Chang, Chia-Chen Lin
    A New Density-Based Scheme for Clustering Based on Genetic Algorithm. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2005, v:68, n:4, pp:315-331 [Journal]
  221. Hsien-Chu Wu, Chin-Chen Chang
    Hiding Digital Watermarks Using Fractal Compression Technique. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2003, v:58, n:2, pp:189-202 [Journal]
  222. Hsien-Chu Wu, Chin-Chen Chang
    Embedding Invisible Watermarks into Digital Images Based on Side-Match Vector Quantization. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2004, v:63, n:1, pp:89-106 [Journal]
  223. Yuan-Hui Yu, Chin-Chen Chang
    Scenery Image Segmentation Using Support Vector Machines. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2004, v:61, n:3-4, pp:379-388 [Journal]
  224. Chwei-Shyong Tsai, Chin-Chen Chang
    An Improvement to Image Segment Based on Human Visual System for Object-based Coding. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2003, v:58, n:2, pp:167-178 [Journal]
  225. Chwei-Shyong Tsai, Chin-Chen Chang
    A DWT-based Deblocking Technique Based on Edge Detection and Zero Masking for Reducing Blocking Effect. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2003, v:58, n:2, pp:179-188 [Journal]
  226. Ming-Ni Wu, Chia-Chen Lin, Chin-Chen Chang
    A Robust Content-Based Copy Detection Scheme. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2006, v:71, n:2-3, pp:351-366 [Journal]
  227. Chia-Chen Lin, Yu-Chen Hu, Chin-Chen Chang
    A Novel Image Ownership Protection Scheme Based on Rehashing Concept and Vector Quantization. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2006, v:71, n:4, pp:443-451 [Journal]
  228. Chin-Chen Chang, Guei-Mei Chen, Yu-Chen Hu
    A Novel Index Coding Scheme for Vector Quantization. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2006, v:71, n:2-3, pp:215-227 [Journal]
  229. Chin-Chen Chang, Chih-Yang Lin
    Reversible Data Embedding Based on Prediction Approach for VQ and SMVQ Compressed Images. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2006, v:74, n:2-3, pp:189-207 [Journal]
  230. Chin-Chen Chang, Tzu-Chuen Lu, Jun-Bin Ya
    VQ Codebook Searching Algorithm Based on Correlation Property. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2007, v:76, n:1-2, pp:39-57 [Journal]
  231. Chin-Chen Chang, Chang-Chu Chen
    Full-Searching-Equivalent Vector Quantization Using Two-Bounds Triangle Inequality. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2007, v:76, n:1-2, pp:25-37 [Journal]
  232. Ya-Fen Chang, Chin-Chen Chang
    Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2007, v:76, n:1-2, pp:13-23 [Journal]
  233. Chin-Chen Chang, Chih-Yang Lin, Chun-Sen Tseng
    Secret Image Hiding and Sharing Based on the (t, n)-Threshold. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2007, v:76, n:4, pp:399-411 [Journal]
  234. Hsien-Chu Wu, Chin-Chen Chang
    An Image Retrieval Method Based on Color-Complexity and Spatial-Histogram Features. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2007, v:76, n:4, pp:481-493 [Journal]
  235. Jen-Ho Yang, Chin-Chen Chang, Chien-Yuan Chen
    A high-speed division algorithm in residue number system using parity. [Citation Graph (0, 0)][DBLP]
    Int. J. Comput. Math., 2004, v:81, n:6, pp:775-780 [Journal]
  236. Chin-Chen Chang, Guu-In Chen
    Bi-level Lossless Calligraphy Compression Using Location Propagation and Width Inheritance. [Citation Graph (0, 0)][DBLP]
    Int. J. Comput. Proc. Oriental Lang., 2001, v:14, n:4, pp:309-339 [Journal]
  237. Kuo-Lung Hung, Chin-Chen Chang
    A Novel Progressive Image Transmission Technique for Chinese Calligraphy. [Citation Graph (0, 0)][DBLP]
    Int. J. Comput. Proc. Oriental Lang., 2001, v:14, n:4, pp:293-307 [Journal]
  238. Kuo-Lung Hung, Chin-Chen Chang
    Error Prevention and Concealment for Chinese Calligraphy Based on Block Truncation Coding. [Citation Graph (0, 0)][DBLP]
    Int. J. Comput. Proc. Oriental Lang., 2002, v:15, n:1, pp:101-113 [Journal]
  239. Chin-Chen Chang
    Adaptive multiple sets of CSS features for hand posture recognition. [Citation Graph (0, 0)][DBLP]
    Neurocomputing, 2006, v:69, n:16-18, pp:2017-2025 [Journal]
  240. Yung-Kuan Chan, Chin-Chen Chang
    A Color Image Retrieval Method Based on Color Moment and Color Variance of Adjacent Pixels. [Citation Graph (0, 0)][DBLP]
    IJPRAI, 2002, v:16, n:1, pp:113-125 [Journal]
  241. Chin-Chen Chang, Yaw-Wen Chen, Daniel J. Buehrer
    A Two-Dimensional Shape Recognition Scheme Based on Principal Component Analysis. [Citation Graph (0, 0)][DBLP]
    IJPRAI, 1994, v:8, n:4, pp:859-875 [Journal]
  242. Chin-Chen Chang, Ji-Han Jiang
    A Spatial Filter for Similarity Retrieval. [Citation Graph (0, 0)][DBLP]
    IJPRAI, 1996, v:10, n:6, pp:711-730 [Journal]
  243. Chin-Chen Chang, Min-Hui Lin, Yu-Chen Hu
    A Fast and Secure Image Hiding Scheme Based on LSB Substitution. [Citation Graph (0, 0)][DBLP]
    IJPRAI, 2002, v:16, n:4, pp:399-416 [Journal]
  244. Chin-Chen Chang, Yuan-Hui Yu
    An Efficient Approach For Face Detection And Facial Feature Location Using Prune-And-Search Technique. [Citation Graph (0, 0)][DBLP]
    IJPRAI, 2004, v:18, n:6, pp:987-1005 [Journal]
  245. Yu-Chen Hu, Chin-Chen Chang
    Edge Detection Using Block Truncation Coding. [Citation Graph (0, 0)][DBLP]
    IJPRAI, 2003, v:17, n:6, pp:951-966 [Journal]
  246. Min-Hui Lin, Yu-Chen Hu, Chin-Chen Chang
    Both Color and Gray Scale Secret Images Hiding in a Color Image. [Citation Graph (0, 0)][DBLP]
    IJPRAI, 2002, v:16, n:6, pp:697-714 [Journal]
  247. Chin-Chen Chang, Kuo-Feng Hwang, Min-Shiang Hwang
    A Feature-Oriented Copyright Owner Proving Technique for Still Images. [Citation Graph (0, 0)][DBLP]
    International Journal of Software Engineering and Knowledge Engineering, 2002, v:12, n:3, pp:317-0 [Journal]
  248. Chin-Chen Chang, Chi-Shiang Chan
    A Watermarking Scheme Based on Principal Component Analysis Technique. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2003, v:14, n:4, pp:431-444 [Journal]
  249. Chin-Chen Chang, Kuo-Feng Hwang
    Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2003, v:14, n:3, pp:289-294 [Journal]
  250. Chin-Chen Chang, Iuon-Chang Lin
    Cryptanalysis of the Modified Remote Login Authentication Scheme Based on a Geometric Approach. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2005, v:16, n:1, pp:37-44 [Journal]
  251. Chin-Chen Chang, Hsien-Wen Tseng
    VQ-Based Image Watermarking Using Anti-Gray Coding. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2004, v:15, n:2, pp:147-160 [Journal]
  252. Hsien-Wen Tseng, Chin-Chen Chang
    High Capacity Data Hiding in JPEG-Compressed Images. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2004, v:15, n:1, pp:127-142 [Journal]
  253. Chin-Chen Chang, Pei-Fang Chung
    A Technique of Watermarking for Digital Images Using (t, n)-Threshold Scheme. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2000, v:24, n:1, pp:- [Journal]
  254. Chin-Chen Chang, Jun-Chou Chuang, Tung-Shou Chen
    Recognition of Image Authenticity Using Significant DCT Coefficients Quantization. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2002, v:26, n:4, pp:- [Journal]
  255. Chin-Chen Chang, Kuo-Feng Hwang, Min-Shiang Hwang
    A Digital Watermarking Scheme Using Human Visual Effects. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2000, v:24, n:4, pp:- [Journal]
  256. Chin-Chen Chang, Chwei-Shyong Tsai
    A Technique for Computing Watermarks from Digital Images. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2000, v:24, n:3, pp:- [Journal]
  257. Kuo-Lung Hung, Chin-Chen Chang
    An improvement of a technique for color quantization using reduction of color space dimensionality. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2002, v:26, n:1, pp:- [Journal]
  258. Hsien-Wen Tseng, Chin-Chen Chang
    A Very Low Bit Rate Image Compressor Using Transformed Classified Vector Quantization. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2005, v:29, n:3, pp:335-342 [Journal]
  259. Chin-Chen Chang, Chi-Yien Chung
    An efficient protocol for anonymous multicast and reception. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2003, v:85, n:2, pp:99-103 [Journal]
  260. Chin-Chen Chang, Shin-Jia Hwang
    A Simple Approach for Generating RSA Keys. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1997, v:63, n:1, pp:19-21 [Journal]
  261. Chien-Yuan Chen, Chin-Chen Chang
    A fast modular multiplication algorithm for calculating the product AB modulo N. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1999, v:72, n:3-4, pp:77-81 [Journal]
  262. Shin-Jia Hwang, Chin-Chen Chang, Wei-Pang Yang
    Autenticated Encryption Schemes with Message Linkage. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1996, v:58, n:4, pp:189-195 [Journal]
  263. Wei-Bin Lee, Chin-Chen Chang
    Integrating Authentication in Public Key Distribution System. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1996, v:57, n:1, pp:49-52 [Journal]
  264. Wei-Bin Lee, Chin-Chen Chang
    Authenticated Encryption Schemes with Linkage Between Message Blocks. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1997, v:63, n:5, pp:247-250 [Journal]
  265. Chin-Chen Chang, Tzong-Chen Wu
    Controlling the Access Requests in an Information Protection System. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Manage., 1993, v:29, n:1, pp:61-68 [Journal]
  266. Tzu-Chuen Lu, Chin-Chen Chang
    Color image retrieval technique based on color features and image bitmap. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Manage., 2007, v:43, n:2, pp:461-472 [Journal]
  267. C. Y. Chen, Chin-Chen Chang, Richard C. T. Lee
    On the design of multiple key hashing files for concurrent orthogonal range retrieval between two disks. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 1991, v:16, n:6, pp:613-625 [Journal]
  268. C. Y. Chen, Chin-Chen Chang, Richard C. T. Lee
    Optimal MMI file systems for orthogonal range retrieval. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 1993, v:18, n:1, pp:37-54 [Journal]
  269. Chin-Chen Chang, Ren-Junn Hwang, Tzong-Chen Wu
    Crypographic key assignment scheme for access control in a hierarchy. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 1992, v:17, n:3, pp:243-247 [Journal]
  270. Chu-Hsing Lin, Chin-Chen Chang, Richard C. T. Lee
    A conference key broadcasting system using sealed locks. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 1992, v:17, n:4, pp:323-328 [Journal]
  271. Chu-Hsing Lin, Chin-Chen Chang, Tzong-Chen Wu, Richard C. T. Lee
    Password authentication using Newton's interpolating polynomials. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 1991, v:16, n:1, pp:97-102 [Journal]
  272. Tzong-Chen Wu, Yi-Shiung Yeh, Chin-Chen Chang
    Algebraic operations on encryped relational databases. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 1993, v:18, n:1, pp:55-62 [Journal]
  273. Chin-Chen Chang
    An ordered minimal perfect hashing scheme based upon Euler's theorem. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1984, v:32, n:3, pp:165-172 [Journal]
  274. Chin-Chen Chang
    Optimal information retrieval when queries are not random. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1984, v:34, n:3, pp:199-223 [Journal]
  275. Chin-Chen Chang
    Letter-oriented reciprocal hashing scheme. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1986, v:38, n:3, pp:243-255 [Journal]
  276. Chin-Chen Chang
    A scheme for constructing ordered minimal perfect hashing functions. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1986, v:39, n:2, pp:187-195 [Journal]
  277. Chin-Chen Chang, C. Y. Chen
    A note on allocating k-ary multiple key hashing files among multiple disks. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1991, v:55, n:1-3, pp:69-76 [Journal]
  278. Chin-Chen Chang, Tung-Shou Chen, Lou-Zo Chung
    A steganographic method based upon JPEG and quantization table modification. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2002, v:141, n:1-2, pp:123-138 [Journal]
  279. Chin-Chen Chang, M. W. Du, Richard C. T. Lee
    The hierarchical ordering in multiattribute files. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1983, v:31, n:1, pp:41-75 [Journal]
  280. Chin-Chen Chang, Ren-Junn Hwang
    Sharing Secret Omages using Shadow Codebooks. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1998, v:111, n:1-4, pp:335-345 [Journal]
  281. Chin-Chen Chang, Chu-Hsing Lin, Richard C. T. Lee
    Hierarchy representations based on arithmetic coding for dynamic information protection systems. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1992, v:64, n:1-2, pp:35-48 [Journal]
  282. Chin-Chen Chang, Der-Chyuan Lou, Tzong-Chen Wu
    A Binary Access Control Method Using Prime Factorization. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1997, v:96, n:1&2, pp:15-26 [Journal]
  283. Annie Y. H. Chou, Wei-Pang Yang, Chin-Chen Chang
    Some Properties of Optimal Cartesian Product Files for Orthogonal Range Queries. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1996, v:90, n:1-4, pp:91-107 [Journal]
  284. J. Liang, Chin-Chen Chang, Ron McFadyen, Richard C. T. Lee
    Optimal Multiple Key Hashing Files for Orthogonal Range Queries. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1994, v:79, n:1-2, pp:145-158 [Journal]
  285. Tzong-Chen Wu, Chin-Chen Chang
    Controlling Access in Tree Hierarchies. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1994, v:78, n:1-2, pp:69-76 [Journal]
  286. Hui-Feng Huang, Chin-Chen Chang
    A novel efficient (t, n) threshold proxy signature scheme. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2006, v:176, n:10, pp:1338-1349 [Journal]
  287. Chin-Chen Chang, Chih-Yang Lin, Yu-Zheng Wang
    New image steganographic methods using run-length approach. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2006, v:176, n:22, pp:3393-3408 [Journal]
  288. Chin-Chen Chang, Chih-Yang Lin
    Reversible steganographic method using SMVQ approach based on declustering. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:8, pp:1796-1805 [Journal]
  289. Chin-Chen Chang, Jun-Chou Chuang, Yih-Shin Hu
    Retrieving digital images from a JPEG compressed image database. [Citation Graph (0, 0)][DBLP]
    Image Vision Comput., 2004, v:22, n:6, pp:471-484 [Journal]
  290. Chin-Chen Chang, Yung-Chen Chou, Yuan-Hui Yu, Kai-Jung Shih
    An image zooming technique based on vector quantization approximation. [Citation Graph (0, 0)][DBLP]
    Image Vision Comput., 2005, v:23, n:13, pp:1214-1225 [Journal]
  291. Yuan-Hui Yu, Chin-Chen Chang
    A new edge detection approach based on image context analysis. [Citation Graph (0, 0)][DBLP]
    Image Vision Comput., 2006, v:24, n:10, pp:1090-1102 [Journal]
  292. Yuan-Hui Yu, Chin-Chen Chang, Yu-Chen Hu
    A genetic-based adaptive threshold selection method for dynamic path tree structured vector quantization. [Citation Graph (0, 0)][DBLP]
    Image Vision Comput., 2005, v:23, n:6, pp:597-609 [Journal]
  293. Jen Nan Chen, Chin-Chen Chang
    A Chinese Character Retrieval Scheme Using Shuang Pinyin. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1992, v:8, n:3, pp:487-507 [Journal]
  294. Chin-Chen Chang
    A Composite Perfect Hashing Scheme for Large Letter-Oriented Key Sets. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1991, v:7, n:2, pp:173-186 [Journal]
  295. Chin-Chen Chang
    Spatial Match Retrieval of Symbolic Pictures. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1991, v:7, n:3, pp:405-422 [Journal]
  296. Yuh-Jiun Chen, Chin-Chen Chang, Wei-Pang Yang
    Shortest Weighted Length Addition Chains. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1995, v:11, n:2, pp:295-305 [Journal]
  297. Chin-Chen Chang, C. Y. Chen
    Some Properties of Cartesian Product Files for Disk Modulo Allocation Method in a Two-disk System. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1987, v:3, n:2, pp:151-176 [Journal]
  298. Chien-Yuan Chen, Chin-Chen Chang, Wei-Pang Yang
    Cryptanalysis of the Secret Exponent of the RSA Scheme. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1996, v:12, n:2, pp:277-290 [Journal]
  299. Chin-Chen Chang, C. Y. Chen
    Gray Code as a De-clustering Scheme for Concurrent Disk Retrieval. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1987, v:3, n:2, pp:177-188 [Journal]
  300. Chin-Chen Chang, Lin-Li Chen, Tung-Shou Chen
    A New Two-Path Search Algorithm for Block Motion Estimation of Video Data. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2001, v:17, n:3, pp:405-415 [Journal]
  301. Chin-Chen Chang, Ruey-Feng Chang, Wen-Tsai Lee, Ching-Lin Kuo
    A Fast Search Algorithm for Vector Quantization. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1996, v:12, n:4, pp:593-602 [Journal]
  302. Chin-Chen Chang, Jiann-Jone Chen, Wen-Kai Tai, Chin-Chuan Han
    New Approach for Static Gesture Recognition. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2006, v:22, n:5, pp:1047-1057 [Journal]
  303. Chin-Chen Chang, Woan-Jing Horng, Daniel J. Buehrer
    A Cascade Exponentiation Evaluation Scheme Based on the Lempel-Ziv-Welch Compression Algorithm. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1995, v:11, n:3, pp:417-431 [Journal]
  304. C. Y. Chen, H. F. Lin, Chin-Chen Chang, Richard C. T. Lee
    Multidisk Smaller Sized MKH file Allocation for Partial Match Retrieval. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1997, v:13, n:1, pp:125-141 [Journal]
  305. Chin-Chen Chang, Feng-Yi Liou
    A Digital Multisignature Scheme Based upon the Digital Signature Scheme of a Modified ElGamal Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1994, v:11, n:3, pp:423-432 [Journal]
  306. Chin-Chen Chang, Ling-Hua Wu
    A New Password Authentication Scheme. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1990, v:6, n:2, pp:139-147 [Journal]
  307. Chin-Chen Chang, Shu-Kai Yang, Ding-Zhou Duan, Ming-Fen Lin
    A Fuzzy-based Approach to Mesh Simplification. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2002, v:18, n:3, pp:459-466 [Journal]
  308. Chin-Chen Chang, Shu-Kai Yang, Ding-Zhou Duan, Ming-Fen Lin
    A Fuzzy-based Approach to Mesh Simplification. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2002, v:18, n:3, pp:459-466 [Journal]
  309. Annie Y. H. Chou, Wei-Pang Yang, Chin-Chen Chang
    Optimal Two-Attribute Cartesian Product Files for Orthogonal Range Queries. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1995, v:11, n:4, pp:625-647 [Journal]
  310. Ren-Junn Hwang, Chin-Chen Chang
    An Improved Threshold Scheme Based on Modular ARithmetic. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1999, v:15, n:5, pp:691-699 [Journal]
  311. Wei-Bin Lee, Chin-Chen Chang
    On Key Changeable ID-Based Digital Signature Scheme. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1996, v:12, n:3, pp:381-386 [Journal]
  312. Wei-Bin Lee, Chin-Chen Chang
    (t, n) Threshold Digital Signature With Traceability Property. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1999, v:15, n:5, pp:669-678 [Journal]
  313. Chu-Hsing Lin, Richard C. T. Lee, Chin-Chen Chang
    A Dynamic Access Control Mechanism in Information Protection Systems. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1990, v:6, n:1, pp:25-35 [Journal]
  314. Chin-Chen Chang, Ren-Junn Hwang
    A new scheme to protect confidential images. [Citation Graph (0, 0)][DBLP]
    Journal of Interconnection Networks, 2004, v:5, n:3, pp:221-232 [Journal]
  315. Chin-Chen Chang, Horng-Chin Lee
    A New Generalized Group-Oriented Cryptoscheme Without Trusted Centers. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:725-729 [Journal]
  316. Chin-Chen Chang, Daniel J. Buehrer
    An Improvement to Ziegler's Sparse Matrix Compression Algorithm. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1996, v:35, n:1, pp:67-71 [Journal]
  317. Chin-Chen Chang, Shin-Jia Hwang, Daniel J. Buehrer
    New concepts for multiple stack systems: Born and reborn. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1994, v:27, n:1, pp:45-54 [Journal]
  318. Chin-Chen Chang, Min-Shiang Hwang, Tung-Shou Chen
    A new encryption algorithm for image cryptosystems. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2001, v:58, n:2, pp:83-91 [Journal]
  319. Chin-Chen Chang, Chin-Feng Lee
    A spatial match retrieval mechanism for symbolic pictures. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1998, v:44, n:1, pp:73-83 [Journal]
  320. Chin-Chen Chang, Tian-Fu Lee, Jyh-Jong Leu
    Partition search filter and its performance analysis. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1999, v:47, n:1, pp:35-43 [Journal]
  321. Ren-Junn Hwang, Wei-Bin Lee, Chin-Chen Chang
    A concept of designing cheater identification methods for secret sharing. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1999, v:46, n:1, pp:7-11 [Journal]
  322. Hui-Feng Huang, Chin-Chen Chang
    A new design of efficient partially blind signature scheme. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2004, v:73, n:3, pp:397-403 [Journal]
  323. Chin-Feng Lee, Chin-Chen Chang
    Breadth-first search oriented symbolic picture representation for spatial match retrieval. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2000, v:52, n:1, pp:11-23 [Journal]
  324. Der-Chyuan Lou, Chin-Chen Chang
    An adaptive exponentiation method. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1998, v:42, n:1, pp:59-69 [Journal]
  325. Hsien-Chu Wu, Chin-Chen Chang
    Detection and restoration of tampered JPEG compressed images. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2002, v:64, n:2, pp:151-161 [Journal]
  326. Chwei-Shyong Tsai, Chin-Chen Chang, Tung-Shou Chen
    Sharing multiple secrets in digital images. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2002, v:64, n:2, pp:163-170 [Journal]
  327. Hsien-Wen Tseng, Chin-Chen Chang
    Error resilient locally adaptive data compression. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2006, v:79, n:8, pp:1156-1160 [Journal]
  328. Chin-Chen Chang, Tzu-Chuen Lu
    A difference expansion oriented data hiding scheme for restoring the original host images. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2006, v:79, n:12, pp:1754-1766 [Journal]
  329. Chin-Chen Chang, Tzu-Chuen Lu
    Reversible index-domain information hiding scheme based on side-match vector quantization. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2006, v:79, n:8, pp:1120-1129 [Journal]
  330. Chin-Chen Chang, Zen-Chung Shih
    Tighter error bounds and weighted error metrics for hierarchical radiosity. [Citation Graph (0, 0)][DBLP]
    Journal of Visualization and Computer Animation, 1998, v:9, n:2, pp:53-63 [Journal]
  331. Shu-Kai Yang, Chin-Chen Chang, Ding-Zhou Duan, Ming-Fen Lin
    A novel progressive modelling algorithm for 3D models. [Citation Graph (0, 0)][DBLP]
    Journal of Visualization and Computer Animation, 2002, v:13, n:3, pp:187-198 [Journal]
  332. Chin-Chen Chang, Wen-Bin Wu
    A secure voting system on a public network. [Citation Graph (0, 0)][DBLP]
    Networks, 1997, v:29, n:2, pp:81-87 [Journal]
  333. Der-Chyuan Lou, Chin-Chen Chang
    A Parallel Two-List Algorithm for the Knapsack Problem. [Citation Graph (0, 0)][DBLP]
    Parallel Computing, 1997, v:22, n:14, pp:1985-1996 [Journal]
  334. Chin-Chen Chang, Chi-Shiang Chan, Yi-Hsuan Fan
    Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 2006, v:39, n:6, pp:1155-1167 [Journal]
  335. Chin-Chen Chang, S. M. Hwang, Daniel J. Buehrer
    A shape recognition scheme based on relative distances of feature points from the centroid. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 1991, v:24, n:11, pp:1053-1063 [Journal]
  336. Chin-Chen Chang, Ju Yuan Hsiao, Chi-Shiang Chan
    Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 2003, v:36, n:7, pp:1583-1595 [Journal]
  337. Chin-Chen Chang, Suh-Yin Lee
    Retrieval of similar pictures on pictorial databases. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 1991, v:24, n:7, pp:675-680 [Journal]
  338. Chin-Chen Chang, Chin-Feng Lee
    Relative coordinates oriented symbolic string for spatial relationship retrieval. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 1995, v:28, n:4, pp:563-570 [Journal]
  339. Yuan-Hui Yu, Chin-Chen Chang, Yu-Chen Hu
    Hiding secret data in images via predictive coding. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 2005, v:38, n:5, pp:691-705 [Journal]
  340. Chi-Shiang Chan, Chin-Chen Chang
    An efficient image authentication method based on Hamming code. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 2007, v:40, n:2, pp:681-690 [Journal]
  341. Yung-Kuan Chan, Chin-Chen Chang
    Image matching using run-length feature. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 2001, v:22, n:5, pp:447-455 [Journal]
  342. Chin-Chen Chang, Jun-Chou Chuang
    An image intellectual property protection scheme for gray-level images using visual secret sharing strategy. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 2002, v:23, n:8, pp:931-94 [Journal]
  343. Chin-Chen Chang, Guei-Mei Chen, Min-Hui Lin
    Information hiding based on search-order coding for VQ indices. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 2004, v:25, n:11, pp:1253-1261 [Journal]
  344. Chin-Chen Chang, Yih-Shin Hu, Tzu-Chuen Lu
    A watermarking-based image ownership and tampering authentication scheme. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 2006, v:27, n:5, pp:439-446 [Journal]
  345. Chin-Chen Chang, D. C. Lin
    A spatial data representation: an adaptive 2D-H string. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 1996, v:17, n:2, pp:175-185 [Journal]
  346. Chin-Chen Chang, Yu-Chiang Li, Jun-Bin Yeh
    Fast codebook search algorithms based on tree-structured vector quantization. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 2006, v:27, n:10, pp:1077-1086 [Journal]
  347. Chin-Chen Chang, Hsien-Wen Tseng
    A steganographic method for digital images using side match. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 2004, v:25, n:12, pp:1431-1437 [Journal]
  348. Chin-Chen Chang, Piyu Tsai, Chia-Chen Lin
    SVD-based digital image watermarking scheme. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 2005, v:26, n:10, pp:1577-1586 [Journal]
  349. Chin-Chen Chang, Tzong-Chen Wu
    A hashing-oriented nearest neighbor searching scheme. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 1993, v:14, n:8, pp:625-630 [Journal]
  350. Chin-Chen Chang, Tzong-Chen Wu
    An exact match retrieval scheme based upon principal component analysis. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 1995, v:16, n:5, pp:465-470 [Journal]
  351. Chin-Chen Chang, Tai-Xing Yu
    Cryptanalysis of an encryption scheme for binary images. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 2002, v:23, n:14, pp:1847-1852 [Journal]
  352. C. Y. Chen, Chin-Chen Chang
    An object-oriented similarity retrieval algorithm for iconic image databases. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 1993, v:14, n:6, pp:465-470 [Journal]
  353. C. Y. Chen, Chin-Chen Chang, Richard Chia-Tung Lee
    A near pattern-matching scheme based upon principal component analysis. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 1995, v:16, n:4, pp:339-345 [Journal]
  354. Kuo-Feng Hwang, Chin-Chen Chang
    A fast pixel mapping algorithm using principal component analysis. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 2002, v:23, n:14, pp:1747-1753 [Journal]
  355. Tzong-Chen Wu, Chin-Chen Chang
    Application of geometric hashing to iconic database retrieval. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 1994, v:15, n:9, pp:871-876 [Journal]
  356. Chin-Chen Chang, Iuon-Chang Lin
    Novel full-search schemes for speeding up image coding using vector quantization. [Citation Graph (0, 0)][DBLP]
    Real-Time Imaging, 2004, v:10, n:2, pp:95-102 [Journal]
  357. Piyu Tsai, Chin-Chen Chang, Yu-Chen Hu
    An Adaptive Two-Stage Edge Detection Scheme for Digital Color Images. [Citation Graph (0, 0)][DBLP]
    Real-Time Imaging, 2002, v:8, n:4, pp:329-343 [Journal]
  358. Hsien-Wen Tseng, Chin-Chen Chang
    A Fast and Simple Algorithm for the Construction of Asymmetrical Reversible Variable Length Codes. [Citation Graph (0, 0)][DBLP]
    Real-Time Imaging, 2003, v:9, n:1, pp:3-10 [Journal]
  359. Ya-Fen Chang, Chin-Chen Chang
    A secure and efficient strong-password authentication protocol. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2004, v:38, n:3, pp:79-90 [Journal]
  360. Ya-Fen Chang, Chin-Chen Chang
    An efficient authentication protocol for mobile satellite communication systems. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2005, v:39, n:1, pp:70-84 [Journal]
  361. Ya-Fan Chang, Chin-Chen Chang, Chia-Lin Kao
    An improvement on a deniable authentication protocol. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2004, v:38, n:3, pp:65-74 [Journal]
  362. Ya-Fen Chang, Chin-Chen Chang, Jui-Yi Kuo
    A secure one-time password authentication scheme using smart cards without limiting login times. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2004, v:38, n:4, pp:80-90 [Journal]
  363. Chin-Chen Chang, Iuon-Chang Lin
    An improvement of delegated multisignature scheme with document decomposition. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2004, v:38, n:4, pp:52-57 [Journal]
  364. Chin-Chen Chang, Yeu-Pong Lai
    A convertible group signature scheme. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2004, v:38, n:4, pp:58-65 [Journal]
  365. Chin-Chen Chang, Iuon-Chang Lin
    Remarks on fingerprint-based remote user authentication scheme using smart cards. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2004, v:38, n:4, pp:91-96 [Journal]
  366. Min-Hui Lin, Chin-Chen Chang
    A secure one-time password authentication scheme with low-computation for mobile communications. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2004, v:38, n:2, pp:76-84 [Journal]
  367. Chin-Chen Chang, Tzong-Chen Wu
    A Letter-oriented Perfect Hashing Scheme Based upon Sparse Table Compression. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1991, v:21, n:1, pp:35-49 [Journal]
  368. Chu-Hsing Lin, Chin-Chen Chang, Richard C. T. Lee
    New Public-Key Cipher System Based Upon the Diophantine Equations. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1995, v:44, n:1, pp:13-19 [Journal]
  369. Chin-Chen Chang, Jer-Sheng Chou, Tung-Shou Chen
    An efficient computation of Euclidean distances using approximated look-up table. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Circuits Syst. Video Techn., 2000, v:10, n:4, pp:594-599 [Journal]
  370. Tung-Shou Chen, Chin-Chen Chang
    A new image coding algorithm using variable-rate side-match finite-state vector quantization. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 1997, v:6, n:8, pp:1185-1187 [Journal]
  371. Tung-Shou Chen, Chin-Chen Chang, Min-Shiang Hwang
    A virtual image cryptosystem based upon vector quantization. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 1998, v:7, n:10, pp:1485-1488 [Journal]
  372. C. Y. Chen, H. F. Lin, Chin-Chen Chang, Richard C. T. Lee
    Optimal Bucket Allocation Design of k-ary MKH Files for Partial Match Retrieval. [Citation Graph (0, 24)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1997, v:9, n:1, pp:148-160 [Journal]
  373. Min-Shiang Hwang, Chin-Chen Chang, Kuo-Feng Hwang
    An ElGamal-Like Cryptosystem for Enciphering Large Messages. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2002, v:14, n:2, pp:445-446 [Journal]
  374. Chin-Chen Chang, Timothy K. Shih, Iuon-Chang Lin
    Guessing by neighbors: an efficient reconstruction method for transmitting image progressively. [Citation Graph (0, 0)][DBLP]
    The Visual Computer, 2003, v:19, n:5, pp:342-353 [Journal]
  375. Chin-Chen Chang, Iuon-Chang Lin
    A new solution for assigning cryptographic keys to control access in mobile agent environments. [Citation Graph (0, 0)][DBLP]
    , 2006, v:, n:, pp:137-146 [Journal]
  376. Jen-Ho Yang, Chin-Chen Chang, Chih-Hung Wang
    An iterative modular multiplication algorithm in RNS. [Citation Graph (0, 0)][DBLP]
    Applied Mathematics and Computation, 2005, v:171, n:1, pp:637-645 [Journal]
  377. Chin-Chen Chang, Yeu-Pong Lai
    A division algorithm for residue numbers. [Citation Graph (0, 0)][DBLP]
    Applied Mathematics and Computation, 2006, v:172, n:1, pp:368-378 [Journal]
  378. Kuo-Lung Hung, Chin-Chen Chang
    Error prevention and resilience of VQ encoded images. [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2003, v:83, n:2, pp:431-437 [Journal]
  379. Piyu Tsai, Yu-Chen Hu, Chin-Chen Chang
    A color image watermarking scheme based on color quantization. [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2004, v:84, n:1, pp:95-106 [Journal]
  380. Chin-Chen Chang, Chi-Shiang Chan, Chun-Sen Tseng
    Removing blocking effects using an artificial neural network. [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2006, v:86, n:9, pp:2381-2387 [Journal]
  381. Chia-Chi Wu, Chin-Chen Chang, Shang-Ru Yang
    An Efficient Fragile Watermarking for Web Pages Tamper-Proof. [Citation Graph (0, 0)][DBLP]
    APWeb/WAIM Workshops, 2007, pp:654-663 [Conf]
  382. Kuo-Lung Hung, Chin-Chen Chang
    Recoverable Tamper Proofing Technique for Image Authentication Using Irregular Sampling Coding. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:333-343 [Conf]
  383. Chin-Chen Chang, Yung-Chen Chou, Tzu-Chuen Lu
    A Semi-blind Watermarking Based on Discrete Wavelet Transform. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:164-176 [Conf]
  384. Chin-Chen Chang, Chih-Yang Lin
    Density-Based Image Vector Quantization Using a Genetic Algorithm. [Citation Graph (0, 0)][DBLP]
    MMM (1), 2007, pp:289-298 [Conf]
  385. Chi-Shiang Chan, Chin-Chen Chang
    A Color Image Hiding Scheme Based on SMVQ and Modulo Operator. [Citation Graph (0, 0)][DBLP]
    MMM (2), 2007, pp:461-470 [Conf]
  386. Chin-Chen Chang, Chia-Chi Wu
    A Novel Key Agreement Scheme in a Multiple Server Environment. [Citation Graph (0, 0)][DBLP]
    WISA, 2006, pp:187-197 [Conf]
  387. Chung-Chuan Wang, Chin-Chen Chang, Xinpeng Zhang, Jinn-ke Jan
    Senary Huffman Compression - A Reversible Data Hiding Scheme for Binary Images. [Citation Graph (0, 0)][DBLP]
    MCAM, 2007, pp:351-360 [Conf]
  388. Chin-Chen Chang, Yi-Hui Chen, Yung-Chen Chou
    Reversible Data Embedding Technique for Palette Images Using De-clustering. [Citation Graph (0, 0)][DBLP]
    MCAM, 2007, pp:130-139 [Conf]
  389. Chao-Wen Chan, Chin-Chen Chang
    A New (t, n)-Threshold Scheme Based on Difference Equations. [Citation Graph (0, 0)][DBLP]
    ESCAPE, 2007, pp:94-106 [Conf]
  390. Chin-Chen Chang, Yih-Shin Hu, Chia-Chen Lin
    A Digital Watermarking Scheme Based on Singular Value Decomposition. [Citation Graph (0, 0)][DBLP]
    ESCAPE, 2007, pp:82-93 [Conf]
  391. Yu-Chiang Li, Jieh-Shan Yeh, Chin-Chen Chang
    MICF: An effective sanitization algorithm for hiding sensitive patterns on data mining. [Citation Graph (0, 0)][DBLP]
    Advanced Engineering Informatics, 2007, v:21, n:3, pp:269-280 [Journal]
  392. Ting-Fang Cheng, Jung-San Lee, Chin-Chen Chang
    Security enhancement of an IC-card-based remote login mechanism. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:9, pp:2280-2287 [Journal]
  393. Chiuyuan Chen, Chin-Chen Chang, Gerard J. Chang
    Proper interval graphs and the guard problem. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1997, v:170, n:1-3, pp:223-230 [Journal]
  394. Chin-Chen Chang, Wei-Liang Tai, Chia-Chen Lin
    A Novel Image Hiding Scheme Based on VQ and Hamming Distance. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2007, v:77, n:3, pp:217-228 [Journal]
  395. Chin-Chen Chang, Chia-Te Liao
    An image coding scheme using SMVQ and support vector machines. [Citation Graph (0, 0)][DBLP]
    Neurocomputing, 2006, v:69, n:16-18, pp:2327-2335 [Journal]
  396. Ya-Fen Chang, Chin-Chen Chang
    Schemes for Digital Gift Certificates with Low Computation Complexity. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2005, v:16, n:4, pp:503-518 [Journal]
  397. Hsien-Wen Tseng, Chin-Chen Chang
    Hiding Data in Halftone Images. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2005, v:16, n:3, pp:419-430 [Journal]
  398. Iuon-Chang Lin, Chin-Chen Chang
    Security enhancement for digital signature schemes with fault tolerance in RSA. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:19, pp:4031-4039 [Journal]
  399. Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng, Wei-Liang Tai
    Reversible hiding in DCT-based compressed images. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:13, pp:2768-2786 [Journal]
  400. Chin-Chen Chang, Yu-Chiang Li, Wen-Hung Huang
    TFRP: An efficient microaggregation algorithm for statistical disclosure control. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2007, v:80, n:11, pp:1866-1878 [Journal]
  401. Ming-Ni Wu, Chia-Chen Lin, Chin-Chen Chang
    Novel image copy detection with rotating tolerance. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2007, v:80, n:7, pp:1057-1069 [Journal]
  402. Chin-Chen Chang, Yi-Hsuan Fan, Wei-Liang Tai
    Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 2008, v:41, n:2, pp:654-661 [Journal]
  403. Chin-Chen Chang, Wei-Liang Tai, Chia-Chen Lin
    A Reversible Data Hiding Scheme Based on Side Match Vector Quantization. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Circuits Syst. Video Techn., 2006, v:16, n:10, pp:1301-1308 [Journal]
  404. Chin-Chen Chang, Wen-Chuan Wu
    Fast Planar-Oriented Ripple Search Algorithm for Hyperspace VQ Codebook. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2007, v:16, n:6, pp:1538-1547 [Journal]
  405. Chin-Chen Chang, Wen-Chuan Wu, Yu-Chen Hu
    Lossless recovery of a VQ index table with embedded secret data. [Citation Graph (0, 0)][DBLP]
    J. Visual Communication and Image Representation, 2007, v:18, n:3, pp:207-216 [Journal]
  406. Chin-Chen Chang, Yeu-Pong Lai
    A parallel residue-to-binary conversion algorithm without trial division. [Citation Graph (0, 0)][DBLP]
    Computers & Electrical Engineering, 2006, v:32, n:6, pp:454-467 [Journal]
  407. Chin-Chen Chang, Chih-Yang Lin, Keng-Chu Lin
    Simple efficient mutual anonymity protocols for peer-to-peer network based on primitive roots. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:2, pp:662-676 [Journal]
  408. Jung-San Lee, Chin-Chen Chang
    Secure communications for cluster-based ad hoc networks using node identities. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:4, pp:1377-1396 [Journal]

  409. Efficient User Authentication and Key Establishment Protocols with Perfect Forward Secrecy for Mobile Devices. [Citation Graph (, )][DBLP]


  410. Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control. [Citation Graph (, )][DBLP]


  411. An Improved EMD Embedding Scheme Based on Secret Image Difference. [Citation Graph (, )][DBLP]


  412. Lossless Data Hiding Based on Histogram Modification for Image Authentication. [Citation Graph (, )][DBLP]


  413. Significance-Preserving Codebook Using Generic Algorithm. [Citation Graph (, )][DBLP]


  414. A Self-Reference Watermarking Scheme Based on Wet Paper Coding. [Citation Graph (, )][DBLP]


  415. A VSS Scheme of Image Size Invariant for Vertical Edge Enhancement. [Citation Graph (, )][DBLP]


  416. A New Intelligent Authorization Agent Model in Grid. [Citation Graph (, )][DBLP]


  417. An Enhancement of JPEG Still Image Compression with Adaptive Linear Regression and Golomb-Rice Coding. [Citation Graph (, )][DBLP]


  418. Cryptanalysis of ID-Based Digital Signature Scheme on Elliptic Curve Cryptosystem. [Citation Graph (, )][DBLP]


  419. Security Enhancement of Ku-Wang Authenticated Key Agreement Protocol. [Citation Graph (, )][DBLP]


  420. A High Payload VQ Steganographic Method for Binary Images. [Citation Graph (, )][DBLP]


  421. Reversible Quantization-Index Modulation Using Neighboring Correlation. [Citation Graph (, )][DBLP]


  422. Two-Phase Algorithms for a Novel Utility-Frequent Mining Model. [Citation Graph (, )][DBLP]


  423. A Remediable Image Authentication Scheme Based on Feature Extraction and Clustered VQ. [Citation Graph (, )][DBLP]


  424. Data Hiding in Images by Hybrid LSB Substitution. [Citation Graph (, )][DBLP]


  425. Information Hiding in Dual Images with Reversibility. [Citation Graph (, )][DBLP]


  426. An e-mail signature protocol for anti-spam work-in-progress. [Citation Graph (, )][DBLP]


  427. A broadcast-encryption-based key management scheme for dynamic multicast communications work-in-progress. [Citation Graph (, )][DBLP]


  428. An adaptive EMD embedding method by condensing secret messages based on consecutive ones transformation and token substitution. [Citation Graph (, )][DBLP]


  429. Using nearest covering codes to embed secret information in grayscale images. [Citation Graph (, )][DBLP]


  430. Security design for three-party encrypted key exchange protocol using smart cards. [Citation Graph (, )][DBLP]


  431. Embedding secret messages based on chaotic map and Huffman coding. [Citation Graph (, )][DBLP]


  432. The design of e-traveler's check with efficiency and mutual authentication. [Citation Graph (, )][DBLP]


  433. A reversible data hiding scheme based on dual steganographic images. [Citation Graph (, )][DBLP]


  434. A High Embedding Efficiency Steganography Scheme for Wet Paper Codes. [Citation Graph (, )][DBLP]


  435. A Resistant Secret Sharing Scheme. [Citation Graph (, )][DBLP]


  436. A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation. [Citation Graph (, )][DBLP]


  437. A Probabilistic Visual Secret Sharing Scheme for Grayscale Images with Voting Strategy. [Citation Graph (, )][DBLP]


  438. A High Payload Steganographic Scheme Based on (7, 4) Hamming Code for Digital Images. [Citation Graph (, )][DBLP]


  439. Secret Hiding Using Side Match Vector Quantization. [Citation Graph (, )][DBLP]


  440. FA-Tree - A Dynamic Indexing Structure for Spatial Data. [Citation Graph (, )][DBLP]


  441. Hiding Information Employing Reduplicating Embedding. [Citation Graph (, )][DBLP]


  442. An Improvement on Authenticated Key Agreement Scheme. [Citation Graph (, )][DBLP]


  443. Enhanced authentication scheme with anonymity for roaming service in global mobility networks. [Citation Graph (, )][DBLP]


  444. An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. [Citation Graph (, )][DBLP]


  445. An efficient and fair buyer-seller fingerprinting scheme for large scale networks. [Citation Graph (, )][DBLP]


  446. A new steganographic method for color and grayscale image hiding. [Citation Graph (, )][DBLP]


  447. Isolated items discarding strategy for discovering high utility itemsets. [Citation Graph (, )][DBLP]


Search in 0.453secs, Finished in 0.476secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002