Chin-Chen Chang - Selected Publications#


[1] Wang, X., Chang, C. C., & Lin, C. C. (2021). Reversible data hiding in encrypted images with block-based adaptive MSB encoding. Information Sciences, 567, 375-394. Google Scholar Citations: 8.

[2] Chen, K., & Chang, C. C. (2019). High-capacity reversible data hiding in encrypted images based on extended run-length coding and block-based MSB plane rearrangement. Journal of Visual Communication and Image Representation, 58, 334-344. Google Scholar Citations: 59.

[3] Chang, C. C., Lee, W. K., Liu, Y., Goi, B. M., & Phan, R. C. W. (2018). Signature gateway: Offloading signature generation to IoT gateway accelerated by GPU. IEEE Internet of Things Journal, 6(3), 4448-4461. Google Scholar Citations: 18.

[4] Chang, C. C., Wu, H. L., & Sun, C. Y. (2017). Notes on “Secure authentication scheme for IoT and cloud servers”. Pervasive and Mobile Computing, 38, 275-278. Google Scholar Citations: 44.

[5] Chang, C. C., & Le, H. D. (2015). A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Transactions on Wireless Communications, 15(1), 357-366. Google Scholar Citations: 238.

[6] Tai, W. L., Yeh, C. M., & Chang, C. C. (2009). Reversible data hiding based on histogram modification of pixel differences. IEEE Transactions on Circuits and Systems for Video Technology, 19(6), 906-910. Google Scholar Citations: 676.

[7] Chang, C. C., Lin, C. C., Tseng, C. S., & Tai, W. L. (2007). Reversible hiding in DCT-based compressed images. Information Sciences, 177(13), 2768-2786. Google Scholar Citations: 396.

[8] Chang, C. C., Tai, W. L., & Lin, C. C. (2006). A reversible data hiding scheme based on side match vector quantization. IEEE Transactions on Circuits and Systems for Video Technology, 16(10), 1301-1308. Google Scholar Citations: 258.

[9] Chang, C. C., Hsiao, J. Y., & Chan, C. S. (2003). Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recognition, 36(7), 1583-1595. Google Scholar Citations: 437.

[10] Chang, C. C., Chen, T. S., & Chung, L. Z. (2002). A steganographic method based upon JPEG and quantization table modification. Information Sciences, 141(1-2), 123-138. Google Scholar Citations: 488.

Imprint Privacy policy « This page (revision-4) was last changed on Tuesday, 19. July 2022, 10:47 by System
  • operated by