Ching-Chun Chang

ORCID: 0000-0002-7539-1451
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Chaos-based Image/Signal Encryption
  • Digital Media Forensic Detection
  • Cryptography and Data Security
  • Advanced Data Compression Techniques
  • Distributed systems and fault tolerance
  • Computer Graphics and Visualization Techniques
  • Formal Methods in Verification
  • Advanced Image Processing Techniques
  • Advanced Image and Video Retrieval Techniques
  • Cooperative Communication and Network Coding
  • Image and Signal Denoising Methods
  • Cellular Automata and Applications
  • Advanced Photonic Communication Systems
  • Advanced Optical Network Technologies
  • Cloud Data Security Solutions
  • Generative Adversarial Networks and Image Synthesis
  • Complexity and Algorithms in Graphs
  • Distributed and Parallel Computing Systems
  • Advanced Authentication Protocols Security
  • Modular Robots and Swarm Intelligence
  • Advanced Data Storage Technologies
  • Privacy-Preserving Technologies in Data
  • Optical Network Technologies
  • Image Retrieval and Classification Techniques

Feng Chia University
2024-2025

University of Warwick
2019-2022

Tsinghua University
2021

Hangzhou Dianzi University
2021

National Center for High-Performance Computing
2005

The Ohio State University
1990

The University of Texas at Austin
1984

Healthcare industry is one of the promising fields adopting Internet Things (IoT) solutions. In this paper, we study secret sharing mechanisms towards resolving privacy and security issues in IoT-based healthcare applications. particular, show how multiple sources are possible to share their data amongst a group participants without revealing own another as well dealer. Only an authorised subset able reconstruct data. A collusion fewer has no better chance guessing private than...

10.3934/mbe.2019168 article EN cc-by Mathematical Biosciences & Engineering 2019-01-01

10.1016/j.jvcir.2022.103556 article EN Journal of Visual Communication and Image Representation 2022-06-09

As we move into the digital era, pace of technological advancement is accelerating rapidly. Network traffic often becomes congested during transmission large data volumes. To mitigate this, compression plays a crucial role in minimizing transmitted data. Vector quantization (VQ) stands out as potent technique where each image block encoded independently an index linked to codebook, effectively reducing bit rate. In this paper, introduce novel scheme for recompressing VQ indices, enabling...

10.3390/fi16080297 article EN cc-by Future Internet 2024-08-19

The proliferation of Internet Things (IoT) devices has introduced significant security challenges, including weak authentication, insufficient data protection, and firmware vulnerabilities. To address these issues, we propose a linguistic secret sharing scheme tailored for IoT applications. This leverages neural networks to embed private within texts transmitted by devices, using an ambiguous token selection algorithm that maintains the textual integrity cover messages. Our approach...

10.3390/electronics13214216 article EN Electronics 2024-10-27

The popularity of cloud computing has impelled more users to upload personal data into the server. need for secure transmission and privacy protection become a new challenge attracted considerable attention. In this paper, we propose high-capacity reversible hiding scheme in encrypted images (RDHEI) that compresses prediction errors usable blocks block-based images. On content owner side, original image is divided <a:math xmlns:a="http://www.w3.org/1998/Math/MathML" id="M1"> <a:mn>2</a:mn>...

10.1155/2021/9606116 article EN cc-by Security and Communication Networks 2021-06-30

Consider a network of communicating finite state machines that exchange messages over unbounded, FIFO channels. Each machine in this has number states (called nodes), and transitions edges), can be defined by labelled directed graph. A node one the is said to “live” iff it reached its infinitely often during course communication, provided behave some “fair” fashion. We discuss technique verify given live such network. This automated, effective even if under consideration unbounded (i.e. an...

10.1145/800222.806734 article EN 1984-01-01

To reduce bandwidth usage in communications, absolute moment block truncation coding is employed to compress cover images. Confidential data are embedded into compressed images using reversible data-hiding technology for purposes such as image management, annotation, or authentication. As size increases, enhancing embedding capacity becomes essential accommodate larger volumes of secret without compromising quality reversibility. Instead conventional encode each block, this work proposes an...

10.3390/cryptography9010004 article EN cc-by Cryptography 2024-12-30

In an AI-immersing age, scholars look for new possibilities of employing AI technology to their fields, and how strengthen security protect privacy is no exception. a coverless data hiding domain, the embedding capacity image generally depends on size chosen database. Therefore, choosing suitable database critical issue in hiding. A novel approach proposed by applying deep learning models generate texture-like cover images or code images. These are then used construct steganographic transmit...

10.3390/electronics13204013 article EN Electronics 2024-10-12

With the development of information age, all walks life are inseparable from internet. Every day, huge amounts data transmitted and stored on Therefore, to improve transmission efficiency reduce storage occupancy, compression technology is becoming increasingly important. Based different application scenarios, it divided into lossless lossy compression, which allows a certain degree compression. Vector quantization (VQ) widely used technology. Building upon VQ technology, we propose scheme...

10.3390/sym16111419 article EN Symmetry 2024-10-24

Secret sharing refers to a method for dividing secret into several shares and distributing them among series of participants. When enough are received, the can be reconstructed without information loss. This paper proposes new reversible data hiding in encrypted images based on Chinese remainder theorem (CRT) strategy. The most significant bit (MSB) 7 least (LSB) layers separately during encryption procedure, which LSB scrambled with CRT scheme. During embedding phase, additional bits...

10.1145/3502300.3502304 article EN 2021-11-19

Consideration is given to a system of n competitors, where if competitor selects its bids equally likely from set bid values, probability winning guaranteed be 1/n, regardless the values selected by other competitors in system. A discussion presented several variations this basic scheme, namely, bidding with unequal weights, more than one winner, and an unknown number competitors. Two economical, but approximate, schemes are discussed. In first select their constant size, second, each only...

10.1109/32.44368 article EN IEEE Transactions on Software Engineering 1990-01-01

Tiled display wall has been emerged as a platform for high-resolution and large-scale dataset visualization. Current development also incorporates it into general cluster computing, which usually involves large scale parallel computing. The emergence of the grid take advantage distributed facilities integrate them uniform accessible resource, provide great opportunity tiled used more extensively, in particular nowadays highly demanded networked In this work we developed grid-based wall. It...

10.1109/cnna.2005.1543224 article EN 2005-12-10

In this article, a framework of privacy-preserving inpainting for outsourced image and an encrypted-image scheme are proposed. Different with conventional in plaintext domain, there two entities, that is, content owner restorer, our framework. Content first encrypts his or her damaged privacy protection outsources the encrypted, to who may be cloud server powerful computation capability. Image restorer performs encrypted domain sends inpainted back authorized receiver, can acquire final...

10.1177/15501477211059092 article EN cc-by International Journal of Distributed Sensor Networks 2021-11-01

We propose and demonstrate an optical cross-connect with built-in optical-path supervision for all-optical wavelength routing networks, which does not tap off any power at the data wavelengths monitoring. principle of operation supervisory networks. Any error in due to failure crossconnect can be detected without tapping wavelengths, no dedicated monitoring light source is required.

10.1109/ecoc.1998.732734 article EN 2002-11-27
Coming Soon ...