Chin-Chen Chang

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
A dynamic secret sharing scheme with cheater detection
 
2024-07-11Paper
A group-oriented \((t, n)\) undeniable signature scheme without trusted center
 
2024-07-11Paper
Connected proper interval graphs and the guard problem in spiral polygons (extended abstract)
 
2024-07-05Paper
A video watermark algorithm based on tensor decomposition
Mathematical Biosciences and Engineering
2022-08-03Paper
High-capacity reversible data hiding in encrypted images based on two-phase histogram shifting
Mathematical Biosciences and Engineering
2022-08-03Paper
AMBTC based high payload data hiding with modulo-2 operation and Hamming code
Mathematical Biosciences and Engineering
2021-08-13Paper
An improved integer transform combining with an irregular block partition
Symmetry
2019-11-13Paper
Real-time error-free reversible data hiding in encrypted images using \((7,4)\) Hamming code and most significant bit prediction
Symmetry
2019-11-13Paper
An information theoretically secure e-lottery scheme based on symmetric bivariate polynomials
Symmetry
2019-11-13Paper
Some active attacks on fast server-aided secret computation protocols for modular exponentiation
Cryptography: Policy and Algorithms
2019-10-10Paper
Public audit for operation behavior logs with error locating in cloud storage
Soft Computing
2019-08-14Paper
A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting
IEEE Transactions on Image Processing
2017-11-20Paper
Image sharing with steganography and authentication
 
2017-07-11Paper
Authenticated encryption schemes with linkage between message blocks
Information Processing Letters
2016-06-01Paper
A simple approach for generating RSA keys
Information Processing Letters
2016-05-26Paper
scientific article; zbMATH DE number 6499824 (Why is no real title available?)
 
2015-10-28Paper
scientific article; zbMATH DE number 6499850 (Why is no real title available?)
 
2015-10-28Paper
Provably secure three party encrypted key exchange scheme with explicit authentication
Information Sciences
2015-09-23Paper
A Reliable Real-time Multicast Authentication Protocol with Provable Accuracy
Fundamenta Informaticae
2014-05-12Paper
Chaotic maps-based password-authenticated key agreement using smart cards
Communications in Nonlinear Science and Numerical Simulation
2014-01-08Paper
High capacity SMVQ-based hiding scheme using adaptive index
Signal Processing
2010-08-06Paper
A data hiding method for text documents using multiple-base encoding
Communications in Computer and Information Science
2010-06-15Paper
Lossless image compression based on multiple-tables arithmetic coding
Mathematical Problems in Engineering
2009-11-13Paper
Removing blocking effects using an artificial neural network
Signal Processing
2009-10-29Paper
scientific article; zbMATH DE number 5619711 (Why is no real title available?)
 
2009-10-22Paper
Computing Lucas functions using addition chains.
 
2009-10-22Paper
scientific article; zbMATH DE number 5617432 (Why is no real title available?)
 
2009-10-16Paper
An on-line electronic check system with mutual authentication
Computers and Electrical Engineering
2009-10-15Paper
Attacks on provably secure proxy-protected signature schemes based on factoring
Journal of Discrete Mathematical Sciences and Cryptography
2009-07-14Paper
Robust non-interactivet-out-of-noblivious transfer based on the RSA cryptosystem
Journal of Discrete Mathematical Sciences and Cryptography
2009-07-14Paper
Preventing Cheating in Computational Visual Cryptography
Fundamenta Informaticae
2009-06-30Paper
An Information-Hiding Scheme Based on Quantization-Based Embedding Technique
Fundamenta Informaticae
2009-06-23Paper
A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes
Fundamenta Informaticae
2009-05-22Paper
NovelWatermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel Patterns
Fundamenta Informaticae
2009-05-22Paper
A lossless data embedding technique by joint neighboring coding
Pattern Recognition
2009-05-07Paper
Authors reply ``Sharing secrets in stego images with authentication
Pattern Recognition
2009-05-07Paper
Distortion-free secret image sharing mechanism using modulus operator
Pattern Recognition
2009-04-03Paper
A countable and time-bound password-based user authentication scheme for the applications of electronic commerce
Information Sciences
2009-03-25Paper
A New (t,n) −Threshold Scheme Based on Difference Equations
Combinatorics, Algorithms, Probabilistic and Experimental Methodologies
2009-03-03Paper
High capacity data hiding for grayscale image
 
2009-02-12Paper
A large payload data embedding technique for color images
 
2009-02-12Paper
Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control
Information Security and Cryptology
2009-02-10Paper
A mutual authenticated key agreement scheme over insecure networks
Journal of Discrete Mathematical Sciences and Cryptography
2008-12-11Paper
A novel cryptographic key assignment scheme with ID-based access control in a hierachy
 
2008-11-17Paper
A color image watermarking scheme based on color quantization
Signal Processing
2008-10-16Paper
Sharing secrets in stego images with authentication
Pattern Recognition
2008-08-13Paper
A two-codebook combination and three-phase block matching based image-hiding scheme with high embedding capacity
Pattern Recognition
2008-08-13Paper
A novel group signature scheme based on bilinear pairings and gap Diffie-Hellman group
 
2008-07-21Paper
Lossless data hiding for color images based on block truncation coding
Pattern Recognition
2008-05-09Paper
A concealed \(t\)-out-of-\(n\) signer ambigous signature scheme with variety of keys
 
2008-04-29Paper
Three-phase lossless data hiding method for the VQ index table
 
2008-03-19Paper
Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery
Pattern Recognition
2007-11-07Paper
A new \(t\)-out-\(n\) oblivious transfer with low bandwidth
 
2007-10-30Paper
A novel identity-based society oriented signature scheme with anonymous signers
 
2007-10-29Paper
Security enhancement of key authentication schemes based on discrete logarithms
Journal of Discrete Mathematical Sciences and Cryptography
2007-10-22Paper
Security enhancement for digital signature schemes with fault tolerance in RSA
Information Sciences
2007-10-10Paper
Comments on e-mail protocols providing forward secrecy
Journal of Discrete Mathematical Sciences and Cryptography
2007-09-18Paper
An efficient ID-based user identification scheme for mutual authentication in mobile environments
Journal of Discrete Mathematical Sciences and Cryptography
2007-09-18Paper
Comments on WLT attack on an enhanced timestamp-based password authentication scheme
Journal of Discrete Mathematical Sciences and Cryptography
2007-09-18Paper
Security enhancement of Yang-Li hierarchical access control mechanism
Journal of Discrete Mathematical Sciences and Cryptography
2007-09-18Paper
An image retrieval method based on color-complexity and spatial-histogram features
 
2007-07-24Paper
Secret image hiding and sharing based on the \((t,n)\)-threshold
 
2007-07-24Paper
Security enhancement of an IC-card-based remote login mechanism
Computer Networks
2007-06-04Paper
Similar image retrieval based on wavelet transformation
 
2007-05-10Paper
Full-searching equivalent vector quantization method using two-bounds triangle inequality
 
2007-04-02Paper
Tolerant key assignment for enforcing complicated access control policies in a hierarchy
 
2007-04-02Paper
A \((t, n)\) threshold secret sharing system with efficient identification of cheaters
 
2007-03-07Paper
scientific article; zbMATH DE number 5117073 (Why is no real title available?)
 
2007-01-19Paper
A parallel residue-to-binary conversion algorithm without trial division
Computers and Electrical Engineering
2007-01-09Paper
An efficient image authentication method based on Hamming code
Pattern Recognition
2006-12-07Paper
Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels
Pattern Recognition
2006-08-14Paper
A novel index coding scheme for vector quantization
 
2006-08-03Paper
Perfect hashing schemes for mining traversal patterns
 
2006-07-26Paper
An improved tree-structured codebook search algorithm for grayscale image compression
 
2006-07-26Paper
scientific article; zbMATH DE number 5042676 (Why is no real title available?)
 
2006-07-26Paper
An anonymous and flexible í-out-of-n electronic voting scheme
Journal of Discrete Mathematical Sciences and Cryptography
2006-06-19Paper
scientific article; zbMATH DE number 5033856 (Why is no real title available?)
 
2006-06-19Paper
Data compressor for VQ index tables
 
2006-06-19Paper
An inverse halftoning technique using modified look-up tables
 
2006-06-19Paper
scientific article; zbMATH DE number 5033822 (Why is no real title available?)
 
2006-06-19Paper
A novel efficient \((t,n)\) threshold proxy signature scheme
Information Sciences
2006-05-16Paper
A division algorithm for residue numbers
Applied Mathematics and Computation
2006-04-28Paper
An iterative modular multiplication algorithm in RNS
Applied Mathematics and Computation
2006-02-07Paper
Schemes for digital gift certificates with low computation complexity
 
2006-01-24Paper
scientific article; zbMATH DE number 2231115 (Why is no real title available?)
 
2005-11-21Paper
A time-stamping protocol for digital watermarking
Applied Mathematics and Computation
2005-11-14Paper
Authentication schemes with no verification table
Applied Mathematics and Computation
2005-10-28Paper
SIMILAR IMAGE RETRIEVAL BASED ON WAVELET TRANSFORMATION
International Journal of Wavelets, Multiresolution and Information Processing
2005-09-27Paper
The general pay-word: A micro-payment scheme based on \(n\)-dimension one-way hash chain
Designs, Codes and Cryptography
2005-08-17Paper
A scheme for threshold multi-secret sharing
Applied Mathematics and Computation
2005-08-05Paper
scientific article; zbMATH DE number 2188487 (Why is no real title available?)
 
2005-07-26Paper
scientific article; zbMATH DE number 2188492 (Why is no real title available?)
 
2005-07-26Paper
scientific article; zbMATH DE number 2158222 (Why is no real title available?)
 
2005-04-18Paper
scientific article; zbMATH DE number 2158223 (Why is no real title available?)
 
2005-04-18Paper
scientific article; zbMATH DE number 2147849 (Why is no real title available?)
 
2005-03-21Paper
scientific article; zbMATH DE number 2140442 (Why is no real title available?)
 
2005-03-03Paper
scientific article; zbMATH DE number 2140430 (Why is no real title available?)
 
2005-03-03Paper
A fast modular square computing method based on the generalized Chinese remainder theorem for prime moduli
Applied Mathematics and Computation
2005-02-22Paper
Digital signature with message recovery using self-certified public keys without trustworthy system authority
Applied Mathematics and Computation
2005-02-22Paper
A high-speed division algorithm in residue number system using parity-checking technique
International Journal of Computer Mathematics
2005-01-14Paper
scientific article; zbMATH DE number 2124283 (Why is no real title available?)
 
2005-01-03Paper
scientific article; zbMATH DE number 2118903 (Why is no real title available?)
 
2004-11-25Paper
scientific article; zbMATH DE number 2118906 (Why is no real title available?)
 
2004-11-25Paper
scientific article; zbMATH DE number 2118907 (Why is no real title available?)
 
2004-11-25Paper
scientific article; zbMATH DE number 2114210 (Why is no real title available?)
 
2004-11-05Paper
scientific article; zbMATH DE number 2113983 (Why is no real title available?)
 
2004-11-05Paper
scientific article; zbMATH DE number 2112192 (Why is no real title available?)
 
2004-10-28Paper
scientific article; zbMATH DE number 2112219 (Why is no real title available?)
 
2004-10-28Paper
scientific article; zbMATH DE number 2112202 (Why is no real title available?)
 
2004-10-28Paper
PARALLEL COMPUTATION OF THE MODULAR CASCADE EXPONENTIATION
Parallel Algorithms and Applications
2004-10-06Paper
scientific article; zbMATH DE number 2104055 (Why is no real title available?)
 
2004-09-28Paper
scientific article; zbMATH DE number 2080674 (Why is no real title available?)
 
2004-08-04Paper
scientific article; zbMATH DE number 2080675 (Why is no real title available?)
 
2004-08-04Paper
scientific article; zbMATH DE number 2066187 (Why is no real title available?)
 
2004-05-18Paper
Parallel computational algorithms for generalized Chinese remainder theorem.
Computers and Electrical Engineering
2004-03-14Paper
scientific article; zbMATH DE number 2042265 (Why is no real title available?)
 
2004-02-15Paper
scientific article; zbMATH DE number 2040842 (Why is no real title available?)
 
2004-02-11Paper
scientific article; zbMATH DE number 2036445 (Why is no real title available?)
 
2004-02-02Paper
scientific article; zbMATH DE number 2036441 (Why is no real title available?)
 
2004-02-02Paper
scientific article; zbMATH DE number 2036485 (Why is no real title available?)
 
2004-02-02Paper
scientific article; zbMATH DE number 2036467 (Why is no real title available?)
 
2004-02-02Paper
scientific article; zbMATH DE number 2030032 (Why is no real title available?)
 
2004-01-20Paper
scientific article; zbMATH DE number 2006812 (Why is no real title available?)
 
2003-11-23Paper
scientific article; zbMATH DE number 1990806 (Why is no real title available?)
 
2003-10-13Paper
Construction of Symmetrical Reversible Variable Length Codes Using Backtracking
The Computer Journal
2003-08-07Paper
A steganographic method based upon JPEG and quantization table modification
Information Sciences
2003-06-25Paper
An Adaptive Two-Stage Edge Detection Scheme for Digital Color Images
Real-Time Imaging
2003-04-03Paper
A threshold decryption scheme without session keys
Computers and Electrical Engineering
2003-02-20Paper
Image matching using run-length feature
Pattern Recognition Letters
2003-02-20Paper
A fast pixel mapping algorithm using principal component analysis
Pattern Recognition Letters
2003-02-11Paper
Cryptanalysis of an encryption scheme for binary images
Pattern Recognition Letters
2003-02-11Paper
A novel progressive modelling algorithm for 3D models
The Journal of Visualization and Computer Animation
2003-02-04Paper
Error prevention and resilience of VQ encoded images
Signal Processing
2003-01-22Paper
An efficient protocol for anonymous multicast and reception.
Information Processing Letters
2003-01-21Paper
Two 2D search filters and their performance analyses
International Journal of Computer Mathematics
2002-12-19Paper
scientific article; zbMATH DE number 1755972 (Why is no real title available?)
 
2002-11-05Paper
scientific article; zbMATH DE number 1810461 (Why is no real title available?)
 
2002-09-30Paper
A compact sparse matrix representation using random hash functions
Data & Knowledge Engineering
2002-07-29Paper
A fast modular multiplication algorithm for calculating the product \(AB\) modulo \(N\)
Information Processing Letters
2002-07-25Paper
An image intellectual property protection scheme for gray-level images using visual secret sharing strategy
Pattern Recognition Letters
2002-06-27Paper
A digital watermarking scheme using human visual effects
Informatica (Ljubljana)
2002-04-15Paper
A technique for computing watermarks from digital images
Informatica (Ljubljana)
2001-10-01Paper
A method for computing Lucas sequences
Computers & Mathematics with Applications
2001-07-15Paper
A virtual image cryptosystem based upon vector quantization
IEEE Transactions on Image Processing
2000-09-06Paper
A multichannel storage arrangement scheme of pictorial databases for concurrent spatial match retrieval
Computers & Mathematics with Applications
2000-07-09Paper
scientific article; zbMATH DE number 1294069 (Why is no real title available?)
 
2000-06-14Paper
scientific article; zbMATH DE number 1445807 (Why is no real title available?)
 
2000-05-10Paper
scientific article; zbMATH DE number 1229523 (Why is no real title available?)
 
1999-05-05Paper
A bin-tree oriented iconic indexing scheme for retrieving symbolic pictures
Data & Knowledge Engineering
1998-08-13Paper
A parallel two-list algorithm for the knapsack problem
Parallel Computing
1998-07-23Paper
Some properties of optimal cartesian product files for orthogonal range queries
Information Sciences
1998-02-25Paper
scientific article; zbMATH DE number 1186876 (Why is no real title available?)
 
1998-01-01Paper
scientific article; zbMATH DE number 1085405 (Why is no real title available?)
 
1997-12-15Paper
A secure voting system on a public network
 
1997-11-25Paper
scientific article; zbMATH DE number 1085400 (Why is no real title available?)
 
1997-11-12Paper
Proper interval graphs and the guard problem
Discrete Mathematics
1997-08-10Paper
Parallel computation of the multi-exponentiation for cryptosystems
International Journal of Computer Mathematics
1997-06-30Paper
scientific article; zbMATH DE number 966906 (Why is no real title available?)
 
1997-05-11Paper
Authenticated encryption schemes with message linkage
Information Processing Letters
1997-02-27Paper
Integrating authentication in public key distribution system
Information Processing Letters
1997-02-27Paper
Efficient cheater identification method for threshold schemes
IEE Proceedings - Computers and Digital Techniques
1997-01-01Paper
Some properties of vectorial addition chains
International Journal of Computer Mathematics
1996-05-28Paper
Arithmetic operations on encrypted data
International Journal of Computer Mathematics
1996-05-01Paper
scientific article; zbMATH DE number 761918 (Why is no real title available?)
 
1995-06-08Paper
Controlling access in tree hierarchies
Information Sciences
1995-02-05Paper
An authentication-combined access control scheme using a one-way function
Computers & Mathematics with Applications
1994-10-04Paper
A refinement of a compression-oriented addressing scheme
BIT
1994-03-22Paper
Optimal MMI file systems for orthogonal range retrieval
Information Systems
1994-01-31Paper
Algebraic operations on encrypted relational databases
Information Systems
1994-01-31Paper
Using smart cards to authenticate remote passwords
Computers & Mathematics with Applications
1994-01-06Paper
Access control in a hierarchy using a one-way trap door function
Computers & Mathematics with Applications
1994-01-06Paper
On GDM allocation method for partial range queries
Information Systems
1993-12-20Paper
A fast algorithm to retrieve symbolic pictures
International Journal of Computer Mathematics
1993-01-16Paper
A password authentication scheme based on discrete logarithms
International Journal of Computer Mathematics
1992-06-28Paper
scientific article; zbMATH DE number 30297 (Why is no real title available?)
 
1992-06-27Paper
A note on allocating k-ary multiple key hashing files among multiple disks
Information Sciences
1991-01-01Paper
A reciprocal confluence tree unit and its applications
BIT
1990-01-01Paper
Application of principal component analysis to multi-disk concurrent accessing
BIT
1988-01-01Paper
Short notes: A Recursive Performance Formula of the Disc Modulo Allocation Method for Binary Cartesian Product Files
The Computer Journal
1988-01-01Paper
An Information Protection Scheme Based upon Number Theory
The Computer Journal
1987-01-01Paper
An Information Protection Scheme Based upon Number Theory
The Computer Journal
1987-01-01Paper
On the design of a key-lock-pair mechanism in information protection systems
BIT
1986-01-01Paper
A scheme for constructing ordered minimal perfect hashing functions
Information Sciences
1986-01-01Paper
A Letter-oriented Minimal Perfect Hashing Scheme
The Computer Journal
1986-01-01Paper
Query Processing in a Fragmented Relational Distributed System: Mermaid
IEEE Transactions on Software Engineering
1985-01-01Paper
scientific article; zbMATH DE number 3900188 (Why is no real title available?)
 
1984-01-01Paper
Performance Analyses of Cartesian Product Files and Random Files
IEEE Transactions on Software Engineering
1984-01-01Paper
An ordered minimal perfect hashing scheme based upon Euler's theorem
Information Sciences
1984-01-01Paper
Optimal information retrieval when queries are not random
Information Sciences
1984-01-01Paper
The hierarchical ordering in multiattribute files
Information Sciences
1983-01-01Paper
Symbolic Gray Code as a Perfect Multiattribute Hashing Scheme for Partial Match Queries
IEEE Transactions on Software Engineering
1982-01-01Paper


Research outcomes over time


This page was built for person: Chin-Chen Chang