Reversible data hiding based on histogram modification of pixel differences WL Tai, CM Yeh, CC Chang IEEE transactions on circuits and systems for video technology 19 (6), 906-910, 2009 | 750 | 2009 |
A steganographic method based upon JPEG and quantization table modification CC Chang, TS Chen, LZ Chung Information Sciences 141 (1-2), 123-138, 2002 | 525 | 2002 |
SVD-based digital image watermarking scheme CC Chang, P Tsai, CC Lin Pattern Recognition Letters 26 (10), 1577-1586, 2005 | 521 | 2005 |
Remote password authentication with smart cards CC Chang, TC Wu IEE Proceedings E (Computers and Digital Techniques) 138 (3), 165-168, 1991 | 503 | 1991 |
Blockchain based searchable encryption for electronic health record sharing L Chen, WK Lee, CC Chang, KKR Choo, N Zhang Future generation computer systems 95, 420-429, 2019 | 501 | 2019 |
Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy CC Chang, JY Hsiao, CS Chan Pattern Recognition 36 (7), 1583-1595, 2003 | 488 | 2003 |
Multilevel reversible data hiding based on histogram modification of difference images CC Lin, WL Tai, CC Chang Pattern Recognition 41 (12), 3582-3591, 2008 | 463 | 2008 |
Reversible hiding in DCT-based compressed images CC Chang, CC Lin, CS Tseng, WL Tai Information Sciences 177 (13), 2768-2786, 2007 | 431 | 2007 |
A new encryption algorithm for image cryptosystems CC Chang, MS Hwang, TS Chen Journal of Systems and Software 58 (2), 83-91, 2001 | 426 | 2001 |
Isolated items discarding strategy for discovering high utility itemsets YC Li, JS Yeh, CC Chang Data & Knowledge Engineering 64 (1), 198-217, 2008 | 376 | 2008 |
A steganographic method for digital images using side match CC Chang, HW Tseng Pattern Recognition Letters 25 (12), 1431-1437, 2004 | 376 | 2004 |
A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks CC Chang, HD Le IEEE Transactions on wireless communications 15 (1), 357-366, 2015 | 374 | 2015 |
Anti-CD3 and nasal proinsulin combination therapy enhances remission from recent-onset autoimmune diabetes by inducing Tregs D Bresson, L Togher, E Rodrigo, Y Chen, JA Bluestone, KC Herold, ... The Journal of clinical investigation 116 (5), 1371-1381, 2006 | 353 | 2006 |
Chronological evolution of IgM, IgA, IgG and neutralisation antibodies after infection with SARS-associated coronavirus PR Hsueh, LM Huang, PJ Chen, CL Kao, PC Yang Clinical microbiology and infection 10 (12), 1062-1066, 2004 | 332 | 2004 |
Sharing secrets in stego images with authentication CC Chang, YP Hsieh, CH Lin Pattern Recognition 41 (10), 3130-3137, 2008 | 321 | 2008 |
A virtual image cryptosystem based upon vector quantization TS Chen, CC Chang, MS Hwang IEEE transactions on Image Processing 7 (10), 1485-1488, 1998 | 292 | 1998 |
High payload steganography mechanism using hybrid edge detector WJ Chen, CC Chang, THN Le Expert Systems with applications 37 (4), 3292-3301, 2010 | 284 | 2010 |
An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem JH Yang, CC Chang Computers & security 28 (3-4), 138-143, 2009 | 281 | 2009 |
A reversible data hiding scheme based on side match vector quantization CC Chang, WL Tai, CC Lin IEEE Transactions on Circuits and Systems for Video Technology 16 (10), 1301 …, 2006 | 278 | 2006 |
Brain tumor detection using color-based k-means clustering segmentation MN Wu, CC Lin, CC Chang Third international conference on intelligent information hiding and …, 2007 | 271 | 2007 |