Reversible data hiding based on histogram modification of pixel differences WL Tai, CM Yeh, CC Chang IEEE transactions on circuits and systems for video technology 19 (6), 906-910, 2009 | 764 | 2009 |
Blockchain based searchable encryption for electronic health record sharing L Chen, WK Lee, CC Chang, KKR Choo, N Zhang Future generation computer systems 95, 420-429, 2019 | 552 | 2019 |
SVD-based digital image watermarking scheme CC Chang, P Tsai, CC Lin Pattern Recognition Letters 26 (10), 1577-1586, 2005 | 542 | 2005 |
A steganographic method based upon JPEG and quantization table modification CC Chang, TS Chen, LZ Chung Information Sciences 141 (1-2), 123-138, 2002 | 532 | 2002 |
Remote password authentication with smart cards CC Chang, TC Wu IEE Proceedings E (Computers and Digital Techniques) 138 (3), 165-168, 1991 | 505 | 1991 |
Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy CC Chang, JY Hsiao, CS Chan Pattern Recognition 36 (7), 1583-1595, 2003 | 496 | 2003 |
Multilevel reversible data hiding based on histogram modification of difference images CC Lin, WL Tai, CC Chang Pattern Recognition 41 (12), 3582-3591, 2008 | 468 | 2008 |
Reversible hiding in DCT-based compressed images CC Chang, CC Lin, CS Tseng, WL Tai Information Sciences 177 (13), 2768-2786, 2007 | 439 | 2007 |
A new encryption algorithm for image cryptosystems CC Chang, MS Hwang, TS Chen Journal of Systems and Software 58 (2), 83-91, 2001 | 428 | 2001 |
A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks CC Chang, HD Le IEEE Transactions on wireless communications 15 (1), 357-366, 2015 | 409 | 2015 |
A steganographic method for digital images using side match CC Chang, HW Tseng Pattern Recognition Letters 25 (12), 1431-1437, 2004 | 382 | 2004 |
Isolated items discarding strategy for discovering high utility itemsets YC Li, JS Yeh, CC Chang Data & Knowledge Engineering 64 (1), 198-217, 2008 | 381 | 2008 |
Anti-CD3 and nasal proinsulin combination therapy enhances remission from recent-onset autoimmune diabetes by inducing Tregs D Bresson, L Togher, E Rodrigo, Y Chen, JA Bluestone, KC Herold, ... The Journal of clinical investigation 116 (5), 1371-1381, 2006 | 357 | 2006 |
Chronological evolution of IgM, IgA, IgG and neutralisation antibodies after infection with SARS-associated coronavirus PR Hsueh, LM Huang, PJ Chen, CL Kao, PC Yang Clinical microbiology and infection 10 (12), 1062-1066, 2004 | 344 | 2004 |
Sharing secrets in stego images with authentication CC Chang, YP Hsieh, CH Lin Pattern Recognition 41 (10), 3130-3137, 2008 | 324 | 2008 |
A virtual image cryptosystem based upon vector quantization TS Chen, CC Chang, MS Hwang IEEE transactions on Image Processing 7 (10), 1485-1488, 1998 | 292 | 1998 |
High payload steganography mechanism using hybrid edge detector WJ Chen, CC Chang, THN Le Expert Systems with applications 37 (4), 3292-3301, 2010 | 290 | 2010 |
Dynamic-hash-table based public auditing for secure cloud storage H Tian, Y Chen, CC Chang, H Jiang, Y Huang, Y Chen, J Liu IEEE Transactions on Services Computing 10 (5), 701-714, 2015 | 284 | 2015 |
An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem JH Yang, CC Chang Computers & security 28 (3-4), 138-143, 2009 | 284 | 2009 |
Brain tumor detection using color-based k-means clustering segmentation MN Wu, CC Lin, CC Chang Third international conference on intelligent information hiding and …, 2007 | 284 | 2007 |