Chin-Chen Chang

From MaRDI portal
(Redirected from Person:287119)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
A dynamic secret sharing scheme with cheater detection2024-07-11Paper
A group-oriented \((t, n)\) undeniable signature scheme without trusted center2024-07-11Paper
Connected proper interval graphs and the guard problem in spiral polygons (extended abstract)2024-07-05Paper
A video watermark algorithm based on tensor decomposition
Mathematical Biosciences and Engineering
2022-08-03Paper
High-capacity reversible data hiding in encrypted images based on two-phase histogram shifting
Mathematical Biosciences and Engineering
2022-08-03Paper
AMBTC based high payload data hiding with modulo-2 operation and Hamming code
Mathematical Biosciences and Engineering
2021-08-13Paper
An improved integer transform combining with an irregular block partition
Symmetry
2019-11-13Paper
Real-time error-free reversible data hiding in encrypted images using \((7,4)\) Hamming code and most significant bit prediction
Symmetry
2019-11-13Paper
An information theoretically secure e-lottery scheme based on symmetric bivariate polynomials
Symmetry
2019-11-13Paper
Some active attacks on fast server-aided secret computation protocols for modular exponentiation
Cryptography: Policy and Algorithms
2019-10-10Paper
Public audit for operation behavior logs with error locating in cloud storage
Soft Computing
2019-08-14Paper
A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting
IEEE Transactions on Image Processing
2017-11-20Paper
Image sharing with steganography and authentication2017-07-11Paper
Authenticated encryption schemes with linkage between message blocks
Information Processing Letters
2016-06-01Paper
A simple approach for generating RSA keys
Information Processing Letters
2016-05-26Paper
scientific article; zbMATH DE number 6499824 (Why is no real title available?)2015-10-28Paper
scientific article; zbMATH DE number 6499850 (Why is no real title available?)2015-10-28Paper
Provably secure three party encrypted key exchange scheme with explicit authentication
Information Sciences
2015-09-23Paper
A Reliable Real-time Multicast Authentication Protocol with Provable Accuracy
Fundamenta Informaticae
2014-05-12Paper
Chaotic maps-based password-authenticated key agreement using smart cards
Communications in Nonlinear Science and Numerical Simulation
2014-01-08Paper
High capacity SMVQ-based hiding scheme using adaptive index
Signal Processing
2010-08-06Paper
A data hiding method for text documents using multiple-base encoding
Communications in Computer and Information Science
2010-06-15Paper
Lossless image compression based on multiple-tables arithmetic coding
Mathematical Problems in Engineering
2009-11-13Paper
Removing blocking effects using an artificial neural network
Signal Processing
2009-10-29Paper
scientific article; zbMATH DE number 5619711 (Why is no real title available?)2009-10-22Paper
Computing Lucas functions using addition chains.2009-10-22Paper
scientific article; zbMATH DE number 5617432 (Why is no real title available?)2009-10-16Paper
An on-line electronic check system with mutual authentication
Computers and Electrical Engineering
2009-10-15Paper
Attacks on provably secure proxy-protected signature schemes based on factoring
Journal of Discrete Mathematical Sciences and Cryptography
2009-07-14Paper
Robust non-interactivet-out-of-noblivious transfer based on the RSA cryptosystem
Journal of Discrete Mathematical Sciences and Cryptography
2009-07-14Paper
Preventing Cheating in Computational Visual Cryptography
Fundamenta Informaticae
2009-06-30Paper
An Information-Hiding Scheme Based on Quantization-Based Embedding Technique
Fundamenta Informaticae
2009-06-23Paper
A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes
Fundamenta Informaticae
2009-05-22Paper
NovelWatermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel Patterns
Fundamenta Informaticae
2009-05-22Paper
A lossless data embedding technique by joint neighboring coding
Pattern Recognition
2009-05-07Paper
Authors reply ``Sharing secrets in stego images with authentication
Pattern Recognition
2009-05-07Paper
Distortion-free secret image sharing mechanism using modulus operator
Pattern Recognition
2009-04-03Paper
A countable and time-bound password-based user authentication scheme for the applications of electronic commerce
Information Sciences
2009-03-25Paper
A New (t,n) −Threshold Scheme Based on Difference Equations
Combinatorics, Algorithms, Probabilistic and Experimental Methodologies
2009-03-03Paper
High capacity data hiding for grayscale image2009-02-12Paper
A large payload data embedding technique for color images2009-02-12Paper
Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control
Information Security and Cryptology
2009-02-10Paper
A mutual authenticated key agreement scheme over insecure networks
Journal of Discrete Mathematical Sciences and Cryptography
2008-12-11Paper
A novel cryptographic key assignment scheme with ID-based access control in a hierachy2008-11-17Paper
A color image watermarking scheme based on color quantization
Signal Processing
2008-10-16Paper
Sharing secrets in stego images with authentication
Pattern Recognition
2008-08-13Paper
A two-codebook combination and three-phase block matching based image-hiding scheme with high embedding capacity
Pattern Recognition
2008-08-13Paper
A novel group signature scheme based on bilinear pairings and gap Diffie-Hellman group2008-07-21Paper
Lossless data hiding for color images based on block truncation coding
Pattern Recognition
2008-05-09Paper
A concealed \(t\)-out-of-\(n\) signer ambigous signature scheme with variety of keys2008-04-29Paper
Three-phase lossless data hiding method for the VQ index table2008-03-19Paper
Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery
Pattern Recognition
2007-11-07Paper
A new \(t\)-out-\(n\) oblivious transfer with low bandwidth2007-10-30Paper
A novel identity-based society oriented signature scheme with anonymous signers2007-10-29Paper
Security enhancement of key authentication schemes based on discrete logarithms
Journal of Discrete Mathematical Sciences and Cryptography
2007-10-22Paper
Security enhancement for digital signature schemes with fault tolerance in RSA
Information Sciences
2007-10-10Paper
Comments on e-mail protocols providing forward secrecy
Journal of Discrete Mathematical Sciences and Cryptography
2007-09-18Paper
An efficient ID-based user identification scheme for mutual authentication in mobile environments
Journal of Discrete Mathematical Sciences and Cryptography
2007-09-18Paper
Comments on WLT attack on an enhanced timestamp-based password authentication scheme
Journal of Discrete Mathematical Sciences and Cryptography
2007-09-18Paper
Security enhancement of Yang-Li hierarchical access control mechanism
Journal of Discrete Mathematical Sciences and Cryptography
2007-09-18Paper
An image retrieval method based on color-complexity and spatial-histogram features2007-07-24Paper
Secret image hiding and sharing based on the \((t,n)\)-threshold2007-07-24Paper
Security enhancement of an IC-card-based remote login mechanism
Computer Networks
2007-06-04Paper
Similar image retrieval based on wavelet transformation2007-05-10Paper
Full-searching equivalent vector quantization method using two-bounds triangle inequality2007-04-02Paper
Tolerant key assignment for enforcing complicated access control policies in a hierarchy2007-04-02Paper
A \((t, n)\) threshold secret sharing system with efficient identification of cheaters2007-03-07Paper
scientific article; zbMATH DE number 5117073 (Why is no real title available?)2007-01-19Paper
A parallel residue-to-binary conversion algorithm without trial division
Computers and Electrical Engineering
2007-01-09Paper
An efficient image authentication method based on Hamming code
Pattern Recognition
2006-12-07Paper
Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels
Pattern Recognition
2006-08-14Paper
A novel index coding scheme for vector quantization2006-08-03Paper
Perfect hashing schemes for mining traversal patterns2006-07-26Paper
An improved tree-structured codebook search algorithm for grayscale image compression2006-07-26Paper
scientific article; zbMATH DE number 5042676 (Why is no real title available?)2006-07-26Paper
An anonymous and flexible í-out-of-n electronic voting scheme
Journal of Discrete Mathematical Sciences and Cryptography
2006-06-19Paper
scientific article; zbMATH DE number 5033856 (Why is no real title available?)2006-06-19Paper
Data compressor for VQ index tables2006-06-19Paper
An inverse halftoning technique using modified look-up tables2006-06-19Paper
scientific article; zbMATH DE number 5033822 (Why is no real title available?)2006-06-19Paper
A novel efficient \((t,n)\) threshold proxy signature scheme
Information Sciences
2006-05-16Paper
A division algorithm for residue numbers
Applied Mathematics and Computation
2006-04-28Paper
An iterative modular multiplication algorithm in RNS
Applied Mathematics and Computation
2006-02-07Paper
Schemes for digital gift certificates with low computation complexity2006-01-24Paper
scientific article; zbMATH DE number 2231115 (Why is no real title available?)2005-11-21Paper
A time-stamping protocol for digital watermarking
Applied Mathematics and Computation
2005-11-14Paper
Authentication schemes with no verification table
Applied Mathematics and Computation
2005-10-28Paper
SIMILAR IMAGE RETRIEVAL BASED ON WAVELET TRANSFORMATION
International Journal of Wavelets, Multiresolution and Information Processing
2005-09-27Paper
The general pay-word: A micro-payment scheme based on \(n\)-dimension one-way hash chain
Designs, Codes and Cryptography
2005-08-17Paper
A scheme for threshold multi-secret sharing
Applied Mathematics and Computation
2005-08-05Paper
scientific article; zbMATH DE number 2188487 (Why is no real title available?)2005-07-26Paper
scientific article; zbMATH DE number 2188492 (Why is no real title available?)2005-07-26Paper
scientific article; zbMATH DE number 2158222 (Why is no real title available?)2005-04-18Paper
scientific article; zbMATH DE number 2158223 (Why is no real title available?)2005-04-18Paper
scientific article; zbMATH DE number 2147849 (Why is no real title available?)2005-03-21Paper
scientific article; zbMATH DE number 2140442 (Why is no real title available?)2005-03-03Paper
scientific article; zbMATH DE number 2140430 (Why is no real title available?)2005-03-03Paper
A fast modular square computing method based on the generalized Chinese remainder theorem for prime moduli
Applied Mathematics and Computation
2005-02-22Paper
Digital signature with message recovery using self-certified public keys without trustworthy system authority
Applied Mathematics and Computation
2005-02-22Paper
A high-speed division algorithm in residue number system using parity-checking technique
International Journal of Computer Mathematics
2005-01-14Paper
scientific article; zbMATH DE number 2124283 (Why is no real title available?)2005-01-03Paper
scientific article; zbMATH DE number 2118903 (Why is no real title available?)2004-11-25Paper
scientific article; zbMATH DE number 2118906 (Why is no real title available?)2004-11-25Paper
scientific article; zbMATH DE number 2118907 (Why is no real title available?)2004-11-25Paper
scientific article; zbMATH DE number 2114210 (Why is no real title available?)2004-11-05Paper
scientific article; zbMATH DE number 2113983 (Why is no real title available?)2004-11-05Paper
scientific article; zbMATH DE number 2112192 (Why is no real title available?)2004-10-28Paper
scientific article; zbMATH DE number 2112219 (Why is no real title available?)2004-10-28Paper
scientific article; zbMATH DE number 2112202 (Why is no real title available?)2004-10-28Paper
PARALLEL COMPUTATION OF THE MODULAR CASCADE EXPONENTIATION
Parallel Algorithms and Applications
2004-10-06Paper
scientific article; zbMATH DE number 2104055 (Why is no real title available?)2004-09-28Paper
scientific article; zbMATH DE number 2080674 (Why is no real title available?)2004-08-04Paper
scientific article; zbMATH DE number 2080675 (Why is no real title available?)2004-08-04Paper
scientific article; zbMATH DE number 2066187 (Why is no real title available?)2004-05-18Paper
Parallel computational algorithms for generalized Chinese remainder theorem.
Computers and Electrical Engineering
2004-03-14Paper
scientific article; zbMATH DE number 2042265 (Why is no real title available?)2004-02-15Paper
scientific article; zbMATH DE number 2040842 (Why is no real title available?)2004-02-11Paper
scientific article; zbMATH DE number 2036445 (Why is no real title available?)2004-02-02Paper
scientific article; zbMATH DE number 2036441 (Why is no real title available?)2004-02-02Paper
scientific article; zbMATH DE number 2036485 (Why is no real title available?)2004-02-02Paper
scientific article; zbMATH DE number 2036467 (Why is no real title available?)2004-02-02Paper
scientific article; zbMATH DE number 2030032 (Why is no real title available?)2004-01-20Paper
scientific article; zbMATH DE number 2006812 (Why is no real title available?)2003-11-23Paper
scientific article; zbMATH DE number 1990806 (Why is no real title available?)2003-10-13Paper
Construction of Symmetrical Reversible Variable Length Codes Using Backtracking
The Computer Journal
2003-08-07Paper
A steganographic method based upon JPEG and quantization table modification
Information Sciences
2003-06-25Paper
An Adaptive Two-Stage Edge Detection Scheme for Digital Color Images
Real-Time Imaging
2003-04-03Paper
A threshold decryption scheme without session keys
Computers and Electrical Engineering
2003-02-20Paper
Image matching using run-length feature
Pattern Recognition Letters
2003-02-20Paper
A fast pixel mapping algorithm using principal component analysis
Pattern Recognition Letters
2003-02-11Paper
Cryptanalysis of an encryption scheme for binary images
Pattern Recognition Letters
2003-02-11Paper
A novel progressive modelling algorithm for 3D models
The Journal of Visualization and Computer Animation
2003-02-04Paper
Error prevention and resilience of VQ encoded images
Signal Processing
2003-01-22Paper
An efficient protocol for anonymous multicast and reception.
Information Processing Letters
2003-01-21Paper
Two 2D search filters and their performance analyses
International Journal of Computer Mathematics
2002-12-19Paper
scientific article; zbMATH DE number 1755972 (Why is no real title available?)2002-11-05Paper
scientific article; zbMATH DE number 1810461 (Why is no real title available?)2002-09-30Paper
A compact sparse matrix representation using random hash functions
Data & Knowledge Engineering
2002-07-29Paper
A fast modular multiplication algorithm for calculating the product \(AB\) modulo \(N\)
Information Processing Letters
2002-07-25Paper
An image intellectual property protection scheme for gray-level images using visual secret sharing strategy
Pattern Recognition Letters
2002-06-27Paper
A digital watermarking scheme using human visual effects
Informatica (Ljubljana)
2002-04-15Paper
A technique for computing watermarks from digital images
Informatica (Ljubljana)
2001-10-01Paper
A method for computing Lucas sequences
Computers & Mathematics with Applications
2001-07-15Paper
A virtual image cryptosystem based upon vector quantization
IEEE Transactions on Image Processing
2000-09-06Paper
A multichannel storage arrangement scheme of pictorial databases for concurrent spatial match retrieval
Computers & Mathematics with Applications
2000-07-09Paper
scientific article; zbMATH DE number 1294069 (Why is no real title available?)2000-06-14Paper
scientific article; zbMATH DE number 1445807 (Why is no real title available?)2000-05-10Paper
scientific article; zbMATH DE number 1229523 (Why is no real title available?)1999-05-05Paper
A bin-tree oriented iconic indexing scheme for retrieving symbolic pictures
Data & Knowledge Engineering
1998-08-13Paper
A parallel two-list algorithm for the knapsack problem
Parallel Computing
1998-07-23Paper
Some properties of optimal cartesian product files for orthogonal range queries
Information Sciences
1998-02-25Paper
scientific article; zbMATH DE number 1186876 (Why is no real title available?)1998-01-01Paper
scientific article; zbMATH DE number 1085405 (Why is no real title available?)1997-12-15Paper
A secure voting system on a public network1997-11-25Paper
scientific article; zbMATH DE number 1085400 (Why is no real title available?)1997-11-12Paper
Proper interval graphs and the guard problem
Discrete Mathematics
1997-08-10Paper
Parallel computation of the multi-exponentiation for cryptosystems
International Journal of Computer Mathematics
1997-06-30Paper
scientific article; zbMATH DE number 966906 (Why is no real title available?)1997-05-11Paper
Authenticated encryption schemes with message linkage
Information Processing Letters
1997-02-27Paper
Integrating authentication in public key distribution system
Information Processing Letters
1997-02-27Paper
Efficient cheater identification method for threshold schemes
IEE Proceedings - Computers and Digital Techniques
1997-01-01Paper
Some properties of vectorial addition chains
International Journal of Computer Mathematics
1996-05-28Paper
Arithmetic operations on encrypted data
International Journal of Computer Mathematics
1996-05-01Paper
scientific article; zbMATH DE number 761918 (Why is no real title available?)1995-06-08Paper
Controlling access in tree hierarchies
Information Sciences
1995-02-05Paper
An authentication-combined access control scheme using a one-way function
Computers & Mathematics with Applications
1994-10-04Paper
A refinement of a compression-oriented addressing scheme
BIT
1994-03-22Paper
Optimal MMI file systems for orthogonal range retrieval
Information Systems
1994-01-31Paper
Algebraic operations on encrypted relational databases
Information Systems
1994-01-31Paper
Using smart cards to authenticate remote passwords
Computers & Mathematics with Applications
1994-01-06Paper
Access control in a hierarchy using a one-way trap door function
Computers & Mathematics with Applications
1994-01-06Paper
On GDM allocation method for partial range queries
Information Systems
1993-12-20Paper
A fast algorithm to retrieve symbolic pictures
International Journal of Computer Mathematics
1993-01-16Paper
A password authentication scheme based on discrete logarithms
International Journal of Computer Mathematics
1992-06-28Paper
scientific article; zbMATH DE number 30297 (Why is no real title available?)1992-06-27Paper
A note on allocating k-ary multiple key hashing files among multiple disks
Information Sciences
1991-01-01Paper
A reciprocal confluence tree unit and its applications
BIT
1990-01-01Paper
Application of principal component analysis to multi-disk concurrent accessing
BIT
1988-01-01Paper
Short notes: A Recursive Performance Formula of the Disc Modulo Allocation Method for Binary Cartesian Product Files
The Computer Journal
1988-01-01Paper
An Information Protection Scheme Based upon Number Theory
The Computer Journal
1987-01-01Paper
An Information Protection Scheme Based upon Number Theory
The Computer Journal
1987-01-01Paper
On the design of a key-lock-pair mechanism in information protection systems
BIT
1986-01-01Paper
A scheme for constructing ordered minimal perfect hashing functions
Information Sciences
1986-01-01Paper
A Letter-oriented Minimal Perfect Hashing Scheme
The Computer Journal
1986-01-01Paper
Query Processing in a Fragmented Relational Distributed System: Mermaid
IEEE Transactions on Software Engineering
1985-01-01Paper
scientific article; zbMATH DE number 3900188 (Why is no real title available?)1984-01-01Paper
Performance Analyses of Cartesian Product Files and Random Files
IEEE Transactions on Software Engineering
1984-01-01Paper
An ordered minimal perfect hashing scheme based upon Euler's theorem
Information Sciences
1984-01-01Paper
Optimal information retrieval when queries are not random
Information Sciences
1984-01-01Paper
The hierarchical ordering in multiattribute files
Information Sciences
1983-01-01Paper
Symbolic Gray Code as a Perfect Multiattribute Hashing Scheme for Partial Match Queries
IEEE Transactions on Software Engineering
1982-01-01Paper


Research outcomes over time


This page was built for person: Chin-Chen Chang