Chin-Chen Chang

From MaRDI portal
Person:287119

Available identifiers

zbMath Open chang.chin-chenWikidataQ102308196 ScholiaQ102308196MaRDI QIDQ287119

List of research outcomes

PublicationDate of PublicationType
A video watermark algorithm based on tensor decomposition2022-08-03Paper
High-capacity reversible data hiding in encrypted images based on two-phase histogram shifting2022-08-03Paper
AMBTC based high payload data hiding with modulo-2 operation and Hamming code2021-08-13Paper
An improved integer transform combining with an irregular block partition2019-11-13Paper
Real-time error-free reversible data hiding in encrypted images using \((7,4)\) Hamming code and most significant bit prediction2019-11-13Paper
An information theoretically secure e-lottery scheme based on symmetric bivariate polynomials2019-11-13Paper
Some active attacks on fast server-aided secret computation protocols for modular exponentiation2019-10-10Paper
Public audit for operation behavior logs with error locating in cloud storage2019-08-14Paper
A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting2017-11-20Paper
https://portal.mardi4nfdi.de/entity/Q52714462017-07-11Paper
Authenticated encryption schemes with linkage between message blocks2016-06-01Paper
A simple approach for generating RSA keys2016-05-26Paper
https://portal.mardi4nfdi.de/entity/Q34480182015-10-28Paper
https://portal.mardi4nfdi.de/entity/Q34480702015-10-28Paper
Provably secure three party encrypted key exchange scheme with explicit authentication2015-09-23Paper
A Reliable Real-time Multicast Authentication Protocol with Provable Accuracy2014-05-12Paper
Chaotic maps-based password-authenticated key agreement using smart cards2014-01-08Paper
High capacity SMVQ-based hiding scheme using adaptive index2010-08-06Paper
A Data Hiding Method for Text Documents Using Multiple-Base Encoding2010-06-15Paper
Lossless image compression based on multiple-tables arithmetic coding2009-11-13Paper
Removing blocking effects using an artificial neural network2009-10-29Paper
https://portal.mardi4nfdi.de/entity/Q31849182009-10-22Paper
https://portal.mardi4nfdi.de/entity/Q31849192009-10-22Paper
https://portal.mardi4nfdi.de/entity/Q31830752009-10-16Paper
An on-line electronic check system with mutual authentication2009-10-15Paper
Robust non-interactivet-out-of-noblivious transfer based on the RSA cryptosystem2009-07-14Paper
Attacks on provably secure proxy-protected signature schemes based on factoring2009-07-14Paper
Preventing Cheating in Computational Visual Cryptography2009-06-30Paper
An Information-Hiding Scheme Based on Quantization-Based Embedding Technique2009-06-23Paper
A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes2009-05-22Paper
NovelWatermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel Patterns2009-05-22Paper
A lossless data embedding technique by joint neighboring coding2009-05-07Paper
Authors reply ``Sharing secrets in stego images with authentication2009-05-07Paper
Distortion-free secret image sharing mechanism using modulus operator2009-04-03Paper
A countable and time-bound password-based user authentication scheme for the applications of electronic commerce2009-03-25Paper
A New (t,n) −Threshold Scheme Based on Difference Equations2009-03-03Paper
https://portal.mardi4nfdi.de/entity/Q36018442009-02-12Paper
https://portal.mardi4nfdi.de/entity/Q36018842009-02-12Paper
Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control2009-02-10Paper
A mutual authenticated key agreement scheme over insecure networks2008-12-11Paper
https://portal.mardi4nfdi.de/entity/Q35360822008-11-17Paper
A color image watermarking scheme based on color quantization2008-10-16Paper
A two-codebook combination and three-phase block matching based image-hiding scheme with high embedding capacity2008-08-13Paper
Sharing secrets in stego images with authentication2008-08-13Paper
https://portal.mardi4nfdi.de/entity/Q35127942008-07-21Paper
Lossless data hiding for color images based on block truncation coding2008-05-09Paper
https://portal.mardi4nfdi.de/entity/Q54595512008-04-29Paper
https://portal.mardi4nfdi.de/entity/Q54501072008-03-19Paper
Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery2007-11-07Paper
https://portal.mardi4nfdi.de/entity/Q54228212007-10-30Paper
https://portal.mardi4nfdi.de/entity/Q54225912007-10-29Paper
Security enhancement of key authentication schemes based on discrete logarithms2007-10-22Paper
Security enhancement for digital signature schemes with fault tolerance in RSA2007-10-10Paper
An efficient ID-based user identification scheme for mutual authentication in mobile environments2007-09-18Paper
Comments on WLT attack on an enhanced timestamp-based password authentication scheme2007-09-18Paper
Security enhancement of Yang-Li hierarchical access control mechanism2007-09-18Paper
Comments on e-mail protocols providing forward secrecy2007-09-18Paper
https://portal.mardi4nfdi.de/entity/Q52941692007-07-24Paper
https://portal.mardi4nfdi.de/entity/Q52941732007-07-24Paper
Security enhancement of an IC-card-based remote login mechanism2007-06-04Paper
https://portal.mardi4nfdi.de/entity/Q34379592007-05-10Paper
https://portal.mardi4nfdi.de/entity/Q34296352007-04-02Paper
https://portal.mardi4nfdi.de/entity/Q34296362007-04-02Paper
https://portal.mardi4nfdi.de/entity/Q34246342007-03-07Paper
https://portal.mardi4nfdi.de/entity/Q34160792007-01-19Paper
A parallel residue-to-binary conversion algorithm without trial division2007-01-09Paper
An efficient image authentication method based on Hamming code2006-12-07Paper
Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels2006-08-14Paper
https://portal.mardi4nfdi.de/entity/Q54806552006-08-03Paper
https://portal.mardi4nfdi.de/entity/Q54801732006-07-26Paper
https://portal.mardi4nfdi.de/entity/Q54801752006-07-26Paper
https://portal.mardi4nfdi.de/entity/Q54801782006-07-26Paper
https://portal.mardi4nfdi.de/entity/Q54728602006-06-19Paper
https://portal.mardi4nfdi.de/entity/Q54728632006-06-19Paper
https://portal.mardi4nfdi.de/entity/Q54728892006-06-19Paper
https://portal.mardi4nfdi.de/entity/Q54729012006-06-19Paper
An anonymous and flexible í-out-of-n electronic voting scheme2006-06-19Paper
A novel efficient \((t,n)\) threshold proxy signature scheme2006-05-16Paper
A division algorithm for residue numbers2006-04-28Paper
An iterative modular multiplication algorithm in RNS2006-02-07Paper
https://portal.mardi4nfdi.de/entity/Q33673632006-01-24Paper
https://portal.mardi4nfdi.de/entity/Q57066722005-11-21Paper
A time-stamping protocol for digital watermarking2005-11-14Paper
Authentication schemes with no verification table2005-10-28Paper
SIMILAR IMAGE RETRIEVAL BASED ON WAVELET TRANSFORMATION2005-09-27Paper
The general pay-word: A micro-payment scheme based on \(n\)-dimension one-way hash chain2005-08-17Paper
A scheme for threshold multi-secret sharing2005-08-05Paper
https://portal.mardi4nfdi.de/entity/Q54615942005-07-26Paper
https://portal.mardi4nfdi.de/entity/Q54616002005-07-26Paper
https://portal.mardi4nfdi.de/entity/Q46680612005-04-18Paper
https://portal.mardi4nfdi.de/entity/Q46680622005-04-18Paper
https://portal.mardi4nfdi.de/entity/Q46595142005-03-21Paper
https://portal.mardi4nfdi.de/entity/Q46542662005-03-03Paper
https://portal.mardi4nfdi.de/entity/Q46542782005-03-03Paper
A fast modular square computing method based on the generalized Chinese remainder theorem for prime moduli2005-02-22Paper
Digital signature with message recovery using self-certified public keys without trustworthy system authority2005-02-22Paper
A high-speed division algorithm in residue number system using parity-checking technique2005-01-14Paper
https://portal.mardi4nfdi.de/entity/Q48316892005-01-03Paper
https://portal.mardi4nfdi.de/entity/Q48282952004-11-25Paper
https://portal.mardi4nfdi.de/entity/Q48282982004-11-25Paper
https://portal.mardi4nfdi.de/entity/Q48282992004-11-25Paper
https://portal.mardi4nfdi.de/entity/Q48257222004-11-05Paper
https://portal.mardi4nfdi.de/entity/Q48259652004-11-05Paper
https://portal.mardi4nfdi.de/entity/Q48236442004-10-28Paper
https://portal.mardi4nfdi.de/entity/Q48236592004-10-28Paper
https://portal.mardi4nfdi.de/entity/Q48236872004-10-28Paper
PARALLEL COMPUTATION OF THE MODULAR CASCADE EXPONENTIATION2004-10-06Paper
https://portal.mardi4nfdi.de/entity/Q48184182004-09-28Paper
https://portal.mardi4nfdi.de/entity/Q44735702004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44735712004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44626302004-05-18Paper
Parallel computational algorithms for generalized Chinese remainder theorem.2004-03-14Paper
https://portal.mardi4nfdi.de/entity/Q44500342004-02-15Paper
https://portal.mardi4nfdi.de/entity/Q44519482004-02-11Paper
https://portal.mardi4nfdi.de/entity/Q44459662004-02-02Paper
https://portal.mardi4nfdi.de/entity/Q44463462004-02-02Paper
https://portal.mardi4nfdi.de/entity/Q44463842004-02-02Paper
https://portal.mardi4nfdi.de/entity/Q44464202004-02-02Paper
https://portal.mardi4nfdi.de/entity/Q44421732004-01-20Paper
https://portal.mardi4nfdi.de/entity/Q44361092003-11-23Paper
https://portal.mardi4nfdi.de/entity/Q44309792003-10-13Paper
Construction of Symmetrical Reversible Variable Length Codes Using Backtracking2003-08-07Paper
A steganographic method based upon JPEG and quantization table modification2003-06-25Paper
An Adaptive Two-Stage Edge Detection Scheme for Digital Color Images2003-04-03Paper
A threshold decryption scheme without session keys2003-02-20Paper
Image matching using run-length feature2003-02-20Paper
A fast pixel mapping algorithm using principal component analysis2003-02-11Paper
Cryptanalysis of an encryption scheme for binary images2003-02-11Paper
A novel progressive modelling algorithm for 3D models2003-02-04Paper
Error prevention and resilience of VQ encoded images2003-01-22Paper
An efficient protocol for anonymous multicast and reception.2003-01-21Paper
Two 2D search filters and their performance analyses2002-12-19Paper
https://portal.mardi4nfdi.de/entity/Q45357592002-11-05Paper
https://portal.mardi4nfdi.de/entity/Q31482892002-09-30Paper
A compact sparse matrix representation using random hash functions2002-07-29Paper
A fast modular multiplication algorithm for calculating the product \(AB\) modulo \(N\)2002-07-25Paper
An image intellectual property protection scheme for gray-level images using visual secret sharing strategy2002-06-27Paper
https://portal.mardi4nfdi.de/entity/Q27832632002-04-15Paper
https://portal.mardi4nfdi.de/entity/Q27300882001-10-01Paper
A method for computing Lucas sequences2001-07-15Paper
A virtual image cryptosystem based upon vector quantization2000-09-06Paper
A multichannel storage arrangement scheme of pictorial databases for concurrent spatial match retrieval2000-07-09Paper
https://portal.mardi4nfdi.de/entity/Q42463382000-06-14Paper
https://portal.mardi4nfdi.de/entity/Q49529062000-05-10Paper
https://portal.mardi4nfdi.de/entity/Q42220421999-05-05Paper
A bin-tree oriented iconic indexing scheme for retrieving symbolic pictures1998-08-13Paper
A parallel two-list algorithm for the knapsack problem1998-07-23Paper
Some properties of optimal cartesian product files for orthogonal range queries1998-02-25Paper
https://portal.mardi4nfdi.de/entity/Q38400901998-01-01Paper
https://portal.mardi4nfdi.de/entity/Q43638241997-12-15Paper
A secure voting system on a public network1997-11-25Paper
https://portal.mardi4nfdi.de/entity/Q43638191997-11-12Paper
Proper interval graphs and the guard problem1997-08-10Paper
Parallel computation of the multi-exponentiation for cryptosystems1997-06-30Paper
https://portal.mardi4nfdi.de/entity/Q56901531997-05-11Paper
Integrating authentication in public key distribution system1997-02-27Paper
Authenticated encryption schemes with message linkage1997-02-27Paper
Efficient cheater identification method for threshold schemes1997-01-01Paper
Some properties of vectorial addition chains1996-05-28Paper
Arithmetic operations on encrypted data1996-05-01Paper
https://portal.mardi4nfdi.de/entity/Q48357791995-06-08Paper
Controlling access in tree hierarchies1995-02-05Paper
An authentication-combined access control scheme using a one-way function1994-10-04Paper
A refinement of a compression-oriented addressing scheme1994-03-22Paper
Optimal MMI file systems for orthogonal range retrieval1994-01-31Paper
Algebraic operations on encrypted relational databases1994-01-31Paper
Using smart cards to authenticate remote passwords1994-01-06Paper
Access control in a hierarchy using a one-way trap door function1994-01-06Paper
On GDM allocation method for partial range queries1993-12-20Paper
A fast algorithm to retrieve symbolic pictures1993-01-16Paper
A password authentication scheme based on discrete logarithms1992-06-28Paper
https://portal.mardi4nfdi.de/entity/Q39853451992-06-27Paper
A note on allocating k-ary multiple key hashing files among multiple disks1991-01-01Paper
A reciprocal confluence tree unit and its applications1990-01-01Paper
Application of principal component analysis to multi-disk concurrent accessing1988-01-01Paper
Short notes: A Recursive Performance Formula of the Disc Modulo Allocation Method for Binary Cartesian Product Files1988-01-01Paper
An Information Protection Scheme Based upon Number Theory1987-01-01Paper
An Information Protection Scheme Based upon Number Theory1987-01-01Paper
On the design of a key-lock-pair mechanism in information protection systems1986-01-01Paper
A scheme for constructing ordered minimal perfect hashing functions1986-01-01Paper
A Letter-oriented Minimal Perfect Hashing Scheme1986-01-01Paper
Query Processing in a Fragmented Relational Distributed System: Mermaid1985-01-01Paper
An ordered minimal perfect hashing scheme based upon Euler's theorem1984-01-01Paper
Optimal information retrieval when queries are not random1984-01-01Paper
Performance Analyses of Cartesian Product Files and Random Files1984-01-01Paper
https://portal.mardi4nfdi.de/entity/Q36786961984-01-01Paper
The hierarchical ordering in multiattribute files1983-01-01Paper
Symbolic Gray Code as a Perfect Multiattribute Hashing Scheme for Partial Match Queries1982-01-01Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Chin-Chen Chang