Chia-Chen Lin
Orcid: 0000-0003-4480-7351Affiliations:
- Providence University, Department of Computer Science and Information Management, Taichung, Taiwan
- National Chin-Yi University of Technology, Department of Computer Science and Information Engineering, Taichung, Taiwan
According to our database1,
Chia-Chen Lin
authored at least 153 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
A systematic scrutiny of artificial intelligence-based air pollution prediction techniques, challenges, and viable solutions.
J. Big Data, December, 2024
Towards property-preserving JPEG encryption with structured permutation and adaptive group differentiation.
Vis. Comput., September, 2024
Verifiable (<i>t, n</i>) Secret Image Sharing Scheme Based on Slim Turtle Shell Matrix.
J. Inf. Secur. Appl., February, 2024
Multim. Tools Appl., January, 2024
A High-Payload Data Hiding Scheme Based on Absolute Moment Block Truncation Coding for Minimizing Hiding Impact.
Symmetry, 2024
Multiple Perspective of Multipredictor Mechanism and Multihistogram Modification for High-Fidelity Reversible Data Hiding.
Comput. Syst. Sci. Eng., 2024
A Dynamic and Incremental Graphical Grid Authentication Technique for Mobile and Web Applications.
IEEE Access, 2024
IEEE Access, 2024
Enhancing User Trust and Interpretability in AI-Driven Feature Request Detection for Mobile App Reviews: An Explainable Approach.
IEEE Access, 2024
A Fast and Efficient 191-bit Elliptic Curve Cryptographic Processor Using a Hybrid Karatsuba Multiplier for IoT Applications.
IEEE Access, 2024
2023
An Intelligent Bio-Inspired Autonomous Surveillance System Using Underwater Sensor Networks.
Sensors, September, 2023
High-Capacity Reversible Data Hiding Based on Two-Layer Embedding Scheme for Encrypted Image Using Blockchain.
Comput., June, 2023
Symmetry, 2023
Proceedings of the 6th International Conference on Signal Processing and Machine Learning, 2023
Implementation of a Quality Evaluation System for Chest Compression based on OpenPose Model.
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023
Proceedings of the 4th Asia Service Sciences and Software Engineering Conference, 2023
2022
An image authentication and recovery scheme based on turtle Shell algorithm and AMBTC-compression.
Multim. Tools Appl., November, 2022
Position-Aware Guided Hiding Data Scheme with Reversibility and Adaptivity for Dual Images.
Symmetry, 2022
J. Vis. Commun. Image Represent., 2022
Reversal of pixel rotation: A reversible data hiding system towards cybersecurity in encrypted images.
J. Vis. Commun. Image Represent., 2022
Efficient Electronic Patient Information Hiding Scheme With Tamper Detection Function for Medical Images.
IEEE Access, 2022
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2022
2021
Symmetry, 2021
High capacity reversible data hiding in encrypted images based on prediction error and block classification.
Multim. Tools Appl., 2021
Pixel-based fragile image watermarking based on absolute moment block truncation coding.
Multim. Tools Appl., 2021
Reversible data hiding in encrypted images based on homomorphism and block-based congruence transformation.
Multim. Tools Appl., 2021
Correction to: An efficient dual prediction-based reversible data hiding and reduced code method for AMBTC.
Multim. Tools Appl., 2021
An efficient dual prediction-based reversible data hiding and reduced code method for AMBTC.
Multim. Tools Appl., 2021
Privacy-preserving reversible data hiding based on quad-tree block encoding and integer wavelet transform.
J. Vis. Commun. Image Represent., 2021
Inf. Sci., 2021
Reversible Data Hiding in Encrypted Image Based on (7, 4) Hamming Code and UnitSmooth Detection.
Entropy, 2021
Proceedings of the 22nd IEEE/ACIS International Conference on Software Engineering, 2021
2020
A Ring Signature Based Anonymity Authentication Scheme for Group Medical Consultation.
Symmetry, 2020
Multim. Tools Appl., 2020
A lightweight authenticable visual secret sharing scheme based on turtle shell structure matrix.
Multim. Tools Appl., 2020
An effective image self-recovery based fragile watermarking using self-adaptive weight-based compressed AMBTC.
Multim. Tools Appl., 2020
Int. J. Comput. Sci. Eng., 2020
IEEE Access, 2020
IEEE Access, 2020
Effective Self-Recovery and Tampering Localization Fragile Watermarking for Medical Images.
IEEE Access, 2020
IEEE Access, 2020
2019
High-Precision Authentication Scheme Based on Matrix Encoding for AMBTC-Compressed Images.
Symmetry, 2019
Reversible Steganographic Scheme for AMBTC-Compressed Image Based on (7, 4) Hamming Code.
Symmetry, 2019
Reversible Data Hiding Scheme Using Adaptive Block Truncation Coding Based on an Edge-Based Quantization Approach.
Symmetry, 2019
Symmetry, 2019
Content-Based Color Image Retrieval Using Block Truncation Coding Based on Binary Ant Colony Optimization.
Symmetry, 2019
Signal Process. Image Commun., 2019
A reversible data hiding scheme for JPEG images by doubling small quantized AC coefficients.
Multim. Tools Appl., 2019
Multim. Tools Appl., 2019
Int. J. Netw. Secur., 2019
Reversibility-oriented secret image sharing mechanism with steganography and authentication based on code division multiplexing.
IET Image Process., 2019
HBF-DH: An Enhanced Payload Hybrid Data Hiding Method Based on a Hybrid Strategy and Block Features.
IEEE Access, 2019
IEEE Access, 2019
TSIA: A Novel Image Authentication Scheme for AMBTC-Based Compressed Images Using Turtle Shell Based Reference Matrix.
IEEE Access, 2019
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019
2018
IEEE Trans. Circuits Syst. Video Technol., 2018
A DCT-based Robust Watermarking Scheme Surviving JPEG Compression with Voting Strategy.
J. Netw. Intell., 2018
2017
A novel hybrid image authentication scheme based on absolute moment block truncation coding.
Multim. Tools Appl., 2017
2016
Novel image authentication scheme with fine image quality for BTC-based compressed images.
Multim. Tools Appl., 2016
Multim. Tools Appl., 2016
J. Inf. Hiding Multim. Signal Process., 2016
A Novel Fragile Watermark-Based Image Authentication Scheme for AMBTC-Compressed Images.
J. Inf. Hiding Multim. Signal Process., 2016
A novel data-hiding and compression scheme based on block classification of SMVQ indices.
Digit. Signal Process., 2016
2015
Multim. Tools Appl., 2015
Hybrid Color Image Steganography Method Used for Copyright Protection and Content Authentication.
J. Inf. Hiding Multim. Signal Process., 2015
J. Inf. Hiding Multim. Signal Process., 2015
Reversible data hiding for VQ-compressed images based on search-order coding and state-codebook mapping.
Inf. Sci., 2015
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015
2014
J. Vis. Commun. Image Represent., 2014
J. Syst. Softw., 2014
A Novel SVD-based watermarking Scheme for Protecting Rightful Ownership of Digital Images.
J. Inf. Hiding Multim. Signal Process., 2014
KSII Trans. Internet Inf. Syst., 2014
KSII Trans. Internet Inf. Syst., 2014
KSII Trans. Internet Inf. Syst., 2014
Reversible Image Hiding for High Image Quality Based on Histogram Shifting and Local Complexity.
Int. J. Netw. Secur., 2014
Proceedings of the Multidisciplinary Social Networks Research - International Conference, 2014
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
A Blind Robust Reversible Watermark Scheme for Textual Relational Databases with Virtual Primary Key.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
Proceedings of the Intelligent Systems and Applications, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
2013
J. Syst. Softw., 2013
2012
J. Supercomput., 2012
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012
A Reversible Data Hiding Scheme for Block Truncation Compressions Based on Histogram Modification.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012
2011
J. Vis. Commun. Image Represent., 2011
A high quality and small shadow size visual secret sharing scheme based on hybrid strategy for grayscale images.
Digit. Signal Process., 2011
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011
2010
J. Inf. Hiding Multim. Signal Process., 2010
Expert Syst. Appl., 2010
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010
2009
Self-verifying visual secret sharing using error diffusion and interpolation techniques.
IEEE Trans. Inf. Forensics Secur., 2009
A data embedding scheme for color images based on genetic algorithm and absolute moment block truncation coding.
Soft Comput., 2009
J. Softw., 2009
A reversible information hiding scheme using left-right and up-down chinese character representation.
J. Syst. Softw., 2009
A Steganographic Scheme based on Wet Paper Codes Suitable for Uniformly Distributed Wet Pixels.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
A Novel Retinal Blood Vessel Segmentation Method Based on Line Operator and Edge Detector.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
A Novel Location Tracking Scheme for Reducing Location Updating Traffic in a Personal Communication System.
Wirel. Pers. Commun., 2008
Multilevel reversible data hiding based on histogram modification of difference images.
Pattern Recognit., 2008
Inf. Sci., 2008
Reversible data-embedding scheme using differences between original and predicted pixel values.
IET Inf. Secur., 2008
Adaptive Data Embedding Scheme Based on Similar and Dissimilar Clustering Strategies.
Fundam. Informaticae, 2008
A Conjoint Study of the Relationship between Website Attributes and Consumer Purchase Intentions.
Proceedings of the Pacific Asia Conference on Information Systems, 2008
A Probabilistic Visual Secret Sharing Scheme for Grayscale Images with Voting Strategy.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008
2007
Fundam. Informaticae, 2007
Fundam. Informaticae, 2007
Proceedings of the Ninth IEEE International Symposium on Multimedia, 2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Proceedings of the Combinatorics, 2007
2006
IEEE Trans. Circuits Syst. Video Technol., 2006
A Novel Image Ownership Protection Scheme Based on Rehashing Concept and Vector Quantization.
Fundam. Informaticae, 2006
Fundam. Informaticae, 2006
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006
A Fast Wavelet-Based Image Progressive Transmission Method Based on Vector Quantization.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006
2005
Fundam. Informaticae, 2005
Proceedings of the Soft Computing as Transdisciplinary Science and Technology, 2005
Proceedings of the Information Security Practice and Experience, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
2004
A secure one-time password authentication scheme with low-computation for mobile communications.
ACM SIGOPS Oper. Syst. Rev., 2004
Pattern Recognit. Lett., 2004
Int. J. Pattern Recognit. Artif. Intell., 2004
Comput. Secur., 2004
Proceedings of the Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30, 2004
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004
2002
Int. J. Pattern Recognit. Artif. Intell., 2002
Int. J. Pattern Recognit. Artif. Intell., 2002