Chih-Hsiang Chang

Chih-Hsiang Chang
Kaohsiung Medical University

About

388
Publications
34,847
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
8,114
Citations

Publications

Publications (388)
Article
Background Recognized as the biotechnology workhorse, Escherichia coli has been commonly employed for mass production of recombinant proteins. Target proteins that are overexpressed in E. coli usually accumulate in cell cyctoplasm. This inherent limitation renders the downstream process for protein recovery complicated and costly. This issue was ad...
Article
With the wide application of adaptive multi-rate (AMR) speech coder, steganography and steganalysis based on AMR coded speech streams have become a hot spot in the field of information hiding. Quantization Index Modulation (QIM)-based steganography is one of the most effective approaches to hide secret information into AMR coded speech streams with...
Article
The Internet of Vehicles (IoV), with the help of cloud computing, can provide rich and powerful application services for vehicles and drivers by sharing and analysing various IoV data. However, how to ensure the integrity of IoV data with multiple sources and diversity outsourced in the cloud is still an open challenge. To address this concern, thi...
Article
Heterogeneous cancers are usually recalcitrant to the conventional treatment method involving chemotherapy and radiotherapy. This issue was addressed by development of magnetic hyperthermia therapy (MHT) based on Escherichia coli. To be functional, E. coli was constructed to display the bivalent anti-HER2 affibody (denoted ZH2) on cell surface. The...
Article
The Intelligent Transportation System (ITS) provides more possibilities for the realization of smart cities by integrating the Internet of Things (IoT) and cloud computing. However, how to ensure security of IoT data stored in the cloud has become one of the biggest challenges at present. As a promising solution for realizing fine-grained access co...
Article
Full-text available
A prediction error histogram shifting (PEHS)-based reversible data hiding scheme is proposed in this paper. A novel representation for the secret stream, called signed-digit representation, is proposed to improve the image quality. The secret binary stream is first converted into a signed-digit stream, which results in a high occurrence of ‘0’. Mea...
Article
Full-text available
The quality of the watermarked image is degraded by introducing a large amount of the watermark, which also draws more attention of malicious attackers. Therefore, it is important to improve the quality of a watermarked image and improve the restoration capability of a tampered image. For this, a novel self-recovery based fragile watermarking schem...
Article
Full-text available
Secret image sharing is a technique for sharing a secret message in such a fashion that stego image shadows are generated and distributed to individual participants. Without the complete set of shadows shared among all participants, the secret could not be deciphered. This technique may serve as a crucial means for protecting private data in massiv...
Article
Full-text available
As the healthcare industry adopts the use of cloud to store personal health record (PHR), there is a need to ensure that we maintain the ability to perform efficient search on encrypted data (stored in the cloud). In this paper, we propose a secure searchable encryption scheme, which is designed to search on encrypted personal health records from a...
Article
The Internet of Things technology allows devices automatically connect with others or a server for the purposes of exchanging data. People can conveniently integrate data from those devices for a smart home, vehicular ad-hoc network, e-Health, etc. In 2017, Wang et al. proposed a simple authentication scheme for the Internet of Things. Although the...
Article
Full-text available
Cloud storage security has received widespread attention from industry and academia. When cloud data is damaged and tampered by various types of security attacks, it is one of the most common methods to track accidents through log analysis. In order to support credible forensic analysis of user operation behavior logs in a shared cloud environment...
Article
Full-text available
The Objectives of this study are (1) to evaluate tone production in Mandarin-speaking patients with post-stroke dysarthria (PSD) using an artificial neural network (ANN), (2) to investigate the efficacy of recognition performance of the ANN model contrast to the human listeners and the convolutional neural network (CNN) model, and (3) to explore re...
Article
Full-text available
The main purpose of data hiding is to hide secret data imperceptibly into multimedia, ensuring secure data transmission. Existing magic matrix-based data hiding schemes cannot achieve satisfactory visual quality for a given low payload because they adopt a single-layer embedding (i.e., the fixed-sized reference matrix (RM) embedding), rather than a...
Article
Full-text available
Steganalysis of adaptive multi-rate (AMR) speech is a hot topic for controlling cybercrimes grounded in steganography in related speech streams. In this paper, we first present a novel AMR steganalysis model, which utilizes extreme gradient boosting (XGBoost) as the classifier, instead of support vector machines (SVM) adopted in the previous scheme...
Article
Full-text available
With the rise of non-volatile memory used in cloud service, it becomes urgent to reduce the write cost so as to improve the data manipulation capability. This paper proposed a high embedding efficiency reversible data hiding scheme for encrypted images (RDH-EI). It embeds data at the locations of most significant bit (MSB) using matrix encoding, re...
Article
Full-text available
Protecting the security of information transmission over the Internet has become a critical contemporary issue. Compressed images are now widely used in mobile devices and the Internet cloud due to low storage requirements; therefore, many researchers have treated compressed images as a popular carrier in studies of studied reversible data hiding (...
Article
With increasing amounts of personal information being collected by various organizations, many privacy models have been proposed for masking the collected data so that the data can be published without releasing individual privacy. However, most existing privacy models are not applicable to high-dimensional data, because of the sparseness of high-d...
Article
Full-text available
In this paper, two reversible data hiding (RDH) methods for vector quantization (VQ)-compressed images are presented. In the first method, the difference-index table instead of the standard-index table is designed, and all difference indices are then classified into two groups, i.e., the to-be-mapped group and the candidate group, according to the...
Article
Full-text available
This paper proposes a data hiding scheme for high quality stego-images in the encrypted images based on a homomorphic encryption algorithm and matrix embedding method. To achieve the message embedding in the encryption domain, we first present an image encryption algorithm satisfying additive homomorphism based on the stream cipher. Then, we offer...
Article
Full-text available
Recently, reversible data hiding in encrypted compressed images (RDHECI) has attracted more attention due to privacy information protection concerns. Meanwhile, AMBTC as one technique of lossy image compression that has lower storage costs and the simplicity in computation and is extensively used in many applications. Hence, this paper proposes an...
Article
Full-text available
This paper proposes a novel adaptive image steganography method combining matrix coding, which can achieve better visual quality according to the given embedding rate compared with other existing schemes. The embedding processes are divided into two phases: preparation and implementation. In the preparation phase, all 128 combinations of a 7-bit bi...
Article
Full-text available
Most existing AMBTC (absolute moment block truncation coding)-based reversible data hiding (RDH) schemes cannot be decoded by traditional AMBTC decoders, because they change the coding structure of the AMBTC compressed code stream, which is unidentified for decoders. Even if some AMBTC-based RDH methods can be decoded by traditional AMBTC decoders,...
Chapter
More and more people use mobile phones to buy goods through scanning the printed aesthetic QR code. QR code has become an important payment tool in today’s business. However, there is an inevitable risk in payment processing. In particular, it is difficult to detect whether an aesthetic QR code has been tampered by the attacker. Therefore, it is ex...
Chapter
With the development of computers and networks, digital data can be transmitted quickly to anywhere in the world. Information security has become the focus of research for several researchers as it is essential to protect the information that is being transferred over the Internet. In 1980, Linde et al. proposed vector quantization (VQ), a simple c...
Article
Full-text available
This paper proposes a novel visual secret sharing scheme based on a turtle shell structure matrix (TSSM) with reversibility and lightweight authentication. With the assistance of TSSM, the secret data is embedded into the original cover image and three meaningful shadow images are generated. To increase the image quality of the generated shadows, t...
Article
Full-text available
QR code is designed as machine readable symbol, which is widely used in various fields of life due to its large message capacity and fast decoding speed. However, as a public standard, it will give rise to the security issue when delivering sensitive information with QR code. To overcome this weakness, this paper explores the characteristic of QR c...
Article
Full-text available
This paper presents an improved secure reversible data hiding scheme in encrypted images based on integer transformation, which does not need using a data hider key to protect the embedded secret data. We first segment the original image into blocks of various sizes based on the quadtree-based image partition. For each block, we reserve m least sig...
Article
Full-text available
Reversible data hiding (RDH) is a method that allows a cover image to be completely recovered from its corresponding stego image without distortion after the embedded secret messages have been extracted. Prediction-error expansion (PEE), as a classic RDH scheme, has been studied extensively due to its high quality of stego images. Based on predicti...
Article
Full-text available
In Malik et al.’s method, each pixel can be embedded with log23 bits by being modified at most 1. Thus, their method achieves significant hiding capacity while maintain good visual quality. However, in their method, in order to ensure reversibility, the first lower and the first upper quantization levels must be excluded from data embedding. To thi...
Article
Full-text available
Steganography in inactive Voice-over-IP frames is a new technique of information hiding, which can achieve large steganographic capacity while maintaining excellent imperceptibility. To prevent the illegitimate use of this technique, the entropy-based and poker test-based steganalysis methods have been presented. However, the detection performance...
Article
Full-text available
This paper proposed a high capacity reversible data hiding (RDH) scheme using three steganographic images, on which three successive embedding phases are performed. An embedding rule is elaborately designed to guide the data embedding and three alike stego-images are generated in the first phase. In view of the similarity of three stego-images, the...
Chapter
Facial expression recognition remains a challenging problem and the small datasets further exacerbate the task. Most previous works realize facial expression by fine-tuning the network pre-trained on a related domain. They have limitations inevitably. In this paper, we propose an optimal CNN model by transfer learning and fusing three characteristi...
Article
Full-text available
Remote data backup technology facilitates data storage for users. However, an attacker may intercept some sensitive data on transfer. To solve this problem, sensitive data should be encrypted before uploading to the remote storage. Thus, protecting the secret encryption key is very important. Liu et al. have designed a scheme to protect the secret...
Article
Full-text available
In this paper, we propose a new reversible data-hiding method in encrypted images. The method is a vacating room after encryption (VRAE) method that attempts to achieve the error-free recovery of images. In previous VRAE methods, errors may occur in recovering images because of inaccurate predictions, so these methods cannot achieve complete revers...
Article
Full-text available
Blockchain is an emerging technology that promises many exciting applications in various fields, including financial, medical, energy, and logistics management. However, there are still some limitations in the existing blockchain framework that prevents its widespread adoption in the commercial world. One important limitation is the storage require...
Article
Full-text available
This paper proposes a novel authentication scheme for absolute moment block truncation coding (AMBTC) of a compressed image using turtle shell based data hiding. For simplicity, we call it turtle shell based image authentication method (TSIA in short). For each block, a 3-bit authentication code (AC) is generated by combining the bitmap with a pseu...
Article
Full-text available
Data hiding is a technology that generates meaningful stego media by embedding secret data in the cover media. In this paper, we propose a novel data hiding scheme using a mini-Sudoku matrix (MSM). A candidate block associated with the mapping value of a cover pixel pair on the MSM is used to indicate where the original pair would be modified to. A...
Article
Full-text available
This paper proposes an innovative and novel steganography method for an AMBTC compressed image by combining a turtle-shell reference matrix and (7, 4) Hamming code, called hybrid strategy and block feature-based data hiding method (HBF-DH). Firstly, the proposed method compresses an original image by an AMBTC compression technique, and then applies...
Article
Full-text available
In this paper, we focus on steganalysis in adaptive multi-rate (AMR) speech streams, whose goal is to detect covert communication behaviors effectively to prevent illegal uses of AMR steganography. Differing from the existing methods for speech steganalysis, we present a novel steganalysis scheme based on multiple classifiers combination. Specifica...
Article
Full-text available
This study proposes a reversible data hiding (RDH) scheme based on pixel value ordering (PVO). RDH schemes based on PVO technique generally realize the prediction procedure by employing the sorted pixels in a block-wise manner, and then embedding secret data by expanding the prediction errors. Since these operations are carried out based on the blo...
Article
Full-text available
Most of the existing image steganographic approaches embed the secret information imperceptibly into a cover image by slightly modifying its content. However, the modification traces will cause some distortion in the stego-image, especially when embedding color image data that usually contain thousands of bits, which makes successful steganalysis p...
Article
Full-text available
In this paper, a novel dual-image-based reversible data hiding scheme using exploiting modification direction (EMD) is proposed. This scheme embeds two 5-base secret digits into each pixel pair of the cover image simultaneously according to the EMD matrix to generate two stego-pixel pairs. By shifting these stego-pixel pairs to the appropriate loca...
Article
Full-text available
QR code is an important means for delivering information which has been widely used in our daily life. As an ISO international standard, the QR code encoding and decoding process are disclosed publicly, thus it is easy to decode a QR code then forge a new QR code with the same QR code public message. It can lead to the problems of information forge...
Article
Full-text available
An efficient data hiding method with modulo-2 operation and Hamming code (3, 2) based on absolute moment block truncation coding (AMBTC) is proposed. In order to obtain good data hiding performance, different textures are assigned to different embedding strategies. The AMBTC compressed codes are divided into smooth and complex blocks according to t...
Article
Full-text available
Secret image sharing has been widely used in numerous areas such as remote sensing and information security. The goal is to share and recover one or more images using several image shares. However, most schemes only consider ordered shares. In addition, the dependency between the images and the share is determined, that is, which image the share be...
Article
Full-text available
Image colorization is a creative process of reasonably adding colors on gray-scale images to generate well-pleasing colorized images. The existing colorization methods normally require user-supplied hints of color points and doodles, or handpicked color reference images for transferring colors, or diverse color images for predicting the colorized r...
Article
Full-text available
QR code is an important approach of information transmission and is widely used in our daily life. As a public patent, the message embeded in a QR code can be easily decoded by any QR code reader, thus can lead to information leaks when delivering the secret message with QR code. To overcome this weakness, we exploited the characteristics of Reed-S...
Article
This paper proposes an adaptive dual-image-based reversible information hiding scheme. First, for a pixel pair in the original image, an associated square lattice is selected to determine the maximum distortion that will be induced by hiding information. Then, an embedding rule, which combines the selected square lattice with integer rounding, is c...
Article
Full-text available
Secret image sharing has been widely applied in numerous areas, such as military imaging systems, remote sensing, and so on. One of the problems for image sharing schemes is to efficiently recover original images from their shares preserved by the shareholders. However, most of the existing schemes are based on the assumption that the shares are di...
Article
Full-text available
Data hiding is a technology designed for safely transmitting secret data through open communication channels, in which the secret data are embedded into a cover carrier imperceptibly. Among the existing data hiding schemes, the exploiting-modification-direction (EMD) based schemes draw considerable attentions due to large embedding capacity. The pr...
Article
Full-text available
A turtle shell (TS) based reversible data hiding (RDH) scheme with two-dimensional histogram shifting (HS) is proposed. The proposed scheme extends the embeddable set from a peak point in HS scheme to a two-dimensional region, so as to improve the embedding capacity (EC). Firstly, a threshold T is used to divide the pixel-pairs into three groups: l...
Article
Full-text available
In this study, the authors propose a (n,n) secret image sharing scheme based on code division multiplexing. The secret data are decoded into n host images to generate n meaningful shares using n encoding codes. Any two of encoding codes are orthogonal to each other. If and only if with n shares together, the secret data can be retrieved successfull...
Article
As a critical parameter in evaluating the reliability of a multiprocessor system when processors malfunction, the \boldmath h-extra connectivity (h-EC) of a multiprocessor system modeled by a graph G, denoted by κ <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">o</sub> <sup xmlns:mml="http://www.w3.org...
Article
Full-text available
Data leakage in electronic health records (EHRs) could result in the compromise of patient privacy (e.g. medical conditions). Generally most data in EHRs remain unchanged once they are uploaded to the system; thus, blockchain can be potentially used to facilitate the sharing of such data. Different participating medical organizations and individual...
Article
Full-text available
In this paper, we propose a novel real-time dual-image-based reversible data hiding (RDH) scheme using turtle shells (TS) which decomposes and hides secret data into two shadows. After constructing a novelly designed TS-based reference matrix, one secret bit is concealed in the first shadow and four secret bits are embedded in the second shadow. Ac...
Conference Paper
The market for electronic games is big. The infringement of game concept design copyright is one big problem. Current copy detection methods use low-level features for image content matching and are difficult to perform copy detection of game character concept design. Therefore, we propose a copy detection method based on pose features. First, basi...
Article
Full-text available
Reversible data hiding for Joint Photographic Experts Group (JPEG) images has become popular in recent years, since JPEG images are widely used in practical applications. An improved reversible data hiding (RDH) method for JPEG images based on Huang et al.’s method is proposed. Huang et al. embedded data into discrete cosine transform (DCT) coeffic...
Article
Full-text available
Since most of the previous video watermark algorithms regard a video as a series of consecutive images, the embedding and extraction of watermark are performed on these images, and the correlation and redundancy among frames of a video are not considered. Such algorithms are weak in protecting against frame attacks. In order to improve the robustne...
Article
Full-text available
Data embedding is a technique for embedding secret information into the carrier data, such as text, audios, images, and videos. Meanwhile, it also can ensure that the changes in the carrier data are imperceptible by human eye to avoid attracting the attention of malicious attackers. In this paper, we propose a data embedding scheme based on the mul...
Article
Full-text available
Cloud storage provides an inexpensive and effective means for the storage and management of images, which in turn occupy a huge proportion and are usually stored in an archived mode. Considering the security and efficiency requirements of cloud images, an efficient real-time integrity audit scheme is in urgent need. However, existing solutions cann...
Article
Full-text available
Secret sharing is an important technique for security protection for multimedia information communication by dividing a secret message into several shadows that are held among a set of participants. In this paper, we introduce a novel secret image sharing (SIS) scheme using two meaningful digital images with cheating detection. It allows a dealer t...
Article
A reserving room before encryption (RRBE) framework is proposed to provide separable reversible data hiding for encrypted images in this paper. A combination of Interpolative AMBTC and Huffman coding is used to enhance the hiding capacity. In our scheme, a receiver with only the hiding key can extract the secret data without knowing about the conte...
Article
The heterogeneous nature of cancers renders the efficacy of the therapeutic treatment diversified. To address this issue, a theranostic approach was proposed by development of a hybrid peptide for simultaneous diagnosis and therapy of cancer cells. Peptide A was composed of the biotinylation site (BS), the HER2/neu-binding motif, and the dockerin d...