!!Chin-Chen Chang - Selected Publications
\\
[[1] Wang, X., Chang, C. C., & Lin, C. C. (2021). Reversible data hiding in encrypted images with block-based adaptive MSB encoding. Information Sciences, 567, 375-394. Google Scholar Citations: 8.\\
\\
[[2] Chen, K., & Chang, C. C. (2019). High-capacity reversible data hiding in encrypted images based on extended run-length coding and block-based MSB plane rearrangement. Journal of Visual Communication and Image Representation, 58, 334-344. Google Scholar Citations: 59.\\
\\
[[3] Chang, C. C., Lee, W. K., Liu, Y., Goi, B. M., & Phan, R. C. W. (2018). Signature gateway: Offloading signature generation to IoT gateway accelerated by GPU. IEEE Internet of Things Journal, 6(3), 4448-4461. Google Scholar Citations: 18.\\
\\
[[4] Chang, C. C., Wu, H. L., & Sun, C. Y. (2017). Notes on “Secure authentication scheme for IoT and cloud servers”. Pervasive and Mobile Computing, 38, 275-278. Google Scholar Citations: 44.\\
\\
[[5] Chang, C. C., & Le, H. D. (2015). A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Transactions on Wireless Communications, 15(1), 357-366. Google Scholar Citations: 238.\\
\\
[[6] Tai, W. L., Yeh, C. M., & Chang, C. C. (2009). Reversible data hiding based on histogram modification of pixel differences. IEEE Transactions on Circuits and Systems for Video Technology, 19(6), 906-910. Google Scholar Citations: 676.\\
\\
[[7] Chang, C. C., Lin, C. C., Tseng, C. S., & Tai, W. L. (2007). Reversible hiding in DCT-based compressed images. Information Sciences, 177(13), 2768-2786. Google Scholar Citations: 396.\\
\\
[[8] Chang, C. C., Tai, W. L., & Lin, C. C. (2006). A reversible data hiding scheme based on side match vector quantization. IEEE Transactions on Circuits and Systems for Video Technology, 16(10), 1301-1308. Google Scholar Citations: 258.\\
\\
[[9] Chang, C. C., Hsiao, J. Y., & Chan, C. S. (2003). Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recognition, 36(7), 1583-1595. Google Scholar Citations: 437.\\
\\
[[10] Chang, C. C., Chen, T. S., & Chung, L. Z. (2002). A steganographic method based upon JPEG and quantization table modification. Information Sciences, 141(1-2), 123-138. Google Scholar Citations: 488.