The following pages link to Chin-Chen Chang (Q287119):
Displayed 50 items.
- A method for computing Lucas sequences (Q1975706) (← links)
- AMBTC based high payload data hiding with modulo-2 operation and Hamming code (Q2045580) (← links)
- A video watermark algorithm based on tensor decomposition (Q2160707) (← links)
- High-capacity reversible data hiding in encrypted images based on two-phase histogram shifting (Q2160750) (← links)
- Public audit for operation behavior logs with error locating in cloud storage (Q2318174) (← links)
- An improved integer transform combining with an irregular block partition (Q2333982) (← links)
- Real-time error-free reversible data hiding in encrypted images using \((7,4)\) Hamming code and most significant bit prediction (Q2333983) (← links)
- An information theoretically secure e-lottery scheme based on symmetric bivariate polynomials (Q2334963) (← links)
- A division algorithm for residue numbers (Q2369099) (← links)
- Security enhancement for digital signature schemes with fault tolerance in RSA (Q2384524) (← links)
- Lossless data hiding for color images based on block truncation coding (Q2427368) (← links)
- Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery (Q2459571) (← links)
- A scheme for threshold multi-secret sharing (Q2485603) (← links)
- The general pay-word: A micro-payment scheme based on \(n\)-dimension one-way hash chain (Q2486876) (← links)
- A novel efficient \((t,n)\) threshold proxy signature scheme (Q2489232) (← links)
- Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels (Q2499131) (← links)
- Authentication schemes with no verification table (Q2570754) (← links)
- A time-stamping protocol for digital watermarking (Q2571975) (← links)
- A note on allocating k-ary multiple key hashing files among multiple disks (Q2638766) (← links)
- Two 2D search filters and their performance analyses (Q2710757) (← links)
- (Q2730088) (← links)
- (Q2783263) (← links)
- Performance Analyses of Cartesian Product Files and Random Files (Q3036741) (← links)
- Parallel computation of the multi-exponentiation for cryptosystems (Q3123350) (← links)
- Efficient cheater identification method for threshold schemes (Q3125909) (← links)
- (Q3148289) (← links)
- A high-speed division algorithm in residue number system using parity-checking technique (Q3154810) (← links)
- (Q3183075) (← links)
- (Q3184918) (← links)
- (Q3184919) (← links)
- (Q3367363) (← links)
- (Q3416079) (← links)
- (Q3424634) (← links)
- (Q3429635) (← links)
- (Q3429636) (← links)
- (Q3437959) (← links)
- (Q3448018) (← links)
- (Q3448070) (← links)
- (Q3512794) (← links)
- (Q3536082) (← links)
- A mutual authenticated key agreement scheme over insecure networks (Q3545830) (← links)
- A Data Hiding Method for Text Documents Using Multiple-Base Encoding (Q3568592) (← links)
- Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control (Q3600354) (← links)
- (Q3601844) (← links)
- (Q3601884) (← links)
- A New (t,n) −Threshold Scheme Based on Difference Equations (Q3611900) (← links)
- A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes (Q3625771) (← links)
- NovelWatermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel Patterns (Q3625780) (← links)
- An Information-Hiding Scheme Based on Quantization-Based Embedding Technique (Q3633924) (← links)
- Preventing Cheating in Computational Visual Cryptography (Q3635989) (← links)