Chin-Chen Chang

Chin-Chen Chang
  • Feng Chia University

About

866
Publications
87,476
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
17,751
Citations
Current institution
Feng Chia University

Publications

Publications (866)
Article
Full-text available
As information technology has quickly developed, many different industries have emerged along with it. Fields using 3D models as their fundamental data formats are no exception. This study examines applying reversible data hiding techniques of encrypted 2D media to 3D mesh models for privacy protection purposes. Examining the unique characteristics...
Article
Full-text available
In response to the Cybersecurity Law, organizations face numerous management and technical requirements. Detection techniques such as vulnerability scanning and penetration testing are employed to identify risks. Addressing these vulnerabilities demands substantial manpower, time, and financial resources. Security concerns also arise during digital...
Article
Full-text available
With the increasing use of digital image compression technology, ensuring data integrity and security within the compression domain has become a crucial area of research. Absolute moment block truncation coding (AMBTC), an efficient lossy compression algorithm, is widely used for low-bitrate image storage and transmission. However, existing studies...
Article
Dual-image reversible data hiding (RDH) schemes typically hide secret data in the cover image to generate two marked images that must be received by two trusted receivers over public transmission channels. To measure the performance of an RDH method, the two important indicators are embedding capacity and visual quality. However, existing dual-imag...
Article
Full-text available
With the rapid development of technologies such as vision–language modeling, sharing images with corresponding descriptions has become a common means of information transfer. Studying data-hiding techniques for JPEG images can protect sensitive descriptions, such as personal information associated with them while sharing images. Therefore, research...
Article
Full-text available
Visual question answering (VQA), a core task in multimodal learning, requires models to effectively integrate visual and natural language information to perform reasoning and semantic understanding in complex scenarios. However, self-attention mechanisms often struggle to capture multi-scale information and key region features within images compreh...
Article
Full-text available
As artificial intelligence increasingly automates the recognition and analysis of visual content, it poses significant risks to privacy, security, and autonomy. Computer vision systems can surveil and exploit data without consent. With these concerns in mind, we introduce a novel method to control whether images can be recognized by computer vision...
Article
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI schemes suffer from lower security and limited embedding capacity. To tackle these challenges, we propose a reversible data hiding wi...
Article
The graph-based traffic forecasting is generally realized on the assumption of sufficient data, which could be impractical in the regions without well-deployed mobile sensors or data-processing facilities. Recent studies have developed a solution with the cross-region transfer learning, i.e. transferring traffic knowledge from the source regions to...
Article
This article proposes a robust decoupling network named RDNet to provide stable traffic predictions even when perturbations exist in historical data. A decoupling block is designed in the RDNet for dividing traffic data into the invariable component (IC) and variable component (VC). The IC of historical or future data is estimated through the invar...
Article
Full-text available
To reduce bandwidth usage in communications, absolute moment block truncation coding is employed to compress cover images. Confidential data are embedded into compressed images using reversible data-hiding technology for purposes such as image management, annotation, or authentication. As data size increases, enhancing embedding capacity becomes es...
Article
Data sharing in Vehicular Social Networks (VSNs) is an essential road service that assists vehicle driving and promotes intelligent transportation applications. In VSNs, vehicles regularly collect and upload valuable data to share with other vehicles. Data encryption can be employed during data uploading and sharing to prevent malicious tampering a...
Article
To achieve accurate traffic forecasting, previous research has employed inner and outer aggregation for information aggregation, and attention mechanisms for heterogeneous spatiotemporal dependency learning, which results in inefficient model learning. While learning efficiency is critical due to the need for updating frequently the model to allevi...
Article
Full-text available
The proliferation of Internet of Things (IoT) devices has introduced significant security challenges, including weak authentication, insufficient data protection, and firmware vulnerabilities. To address these issues, we propose a linguistic secret sharing scheme tailored for IoT applications. This scheme leverages neural networks to embed private...
Article
Full-text available
With the development of the information age, all walks of life are inseparable from the internet. Every day, huge amounts of data are transmitted and stored on the internet. Therefore, to improve transmission efficiency and reduce storage occupancy, compression technology is becoming increasingly important. Based on different application scenarios,...
Article
Full-text available
In an AI-immersing age, scholars look for new possibilities of employing AI technology to their fields, and how to strengthen security and protect privacy is no exception. In a coverless data hiding domain, the embedding capacity of an image generally depends on the size of a chosen database. Therefore, choosing a suitable database is a critical is...
Preprint
Full-text available
The proliferation of Internet of Things (IoT) devices has introduced significant security challenges, including weak authentication, insufficient data protection, and firmware vulnerabilities. To address these issues, we propose a linguistic secret sharing scheme tailored for IoT applications. This scheme leverages neural networks to embed private...
Article
Full-text available
Reversible data-hiding in encrypted images (RDHEI) plays a pivotal role in preserving privacy within images stored on cloud platforms. Recently, Wang et al. introduced a dual-stage permutation encryption scheme, which is highly compatible with RDHEI techniques. In this study, we undertake an exhaustive examination of the characteristics inherent to...
Article
Full-text available
Data hiding in digital images is an important cover communication technique. This paper studies the lossless data hiding in an image compression domain. We present a novel lossless data hiding scheme in vector quantization (VQ) compressed images using adaptive prediction difference coding. A modified adaptive index rearrangement (AIR) is presented...
Article
Full-text available
Centralized storage and identity identification methods pose many risks, including hacker attacks, data misuse, and single points of failure. Additionally, existing centralized identity management methods face interoperability issues and rely on a single identity provider, leaving users without control over their identities. Therefore, this paper p...
Article
Full-text available
As we move into the digital era, the pace of technological advancement is accelerating rapidly. Network traffic often becomes congested during the transmission of large data volumes. To mitigate this, data compression plays a crucial role in minimizing transmitted data. Vector quantization (VQ) stands out as a potent compression technique where eac...
Article
Full-text available
Secret sharing is a data security technique that divides secret information into multiple parts, embeds these parts into various shares, and distributes these shares to different participants. The original secret information can be retrieved only when the number of shares gathered meets a required threshold. This paper proposes a secret sharing met...
Article
Full-text available
Data hiding in digital images is a potent solution for covert communication, embedding sensitive data into cover images. However, most existing methods are tailored for one-to-one scenarios, which present security risks. To mitigate this vulnerability, we introduce an innovative one-to-two data hiding scheme that employs a two-tier bit-flipping str...
Article
Full-text available
Owing to life style changes during COVID, communication channels were forced to change. Online services ramped up to replace traditional services. It became daily practice for most of us that documents, files, photos, and videos were transmitted through the internet and websites. Information security was one of the big issues requiring more and mor...
Article
Full-text available
The reversible data hiding scheme in the encrypted domain is a potential solution to the concerns regarding user privacy in cloud applications. The 3D mesh model is an emerging file format and is widely used in engineering modeling, special effects, and video games. However, studies on reversible data hiding in encrypted 3D mesh models are still in...
Article
The purpose of Facial Beauty Prediction (FBP) is to automatically assess facial attractiveness based on human aesthetics. Most neural network-based prediction methods do not consider the ranking information in the task. For scoring tasks like facial beauty prediction, there is abundant ranking information both between images and within images. Reas...
Article
Full-text available
As cloud storage and multimedia communication continue to evolve, the preservation of image privacy is becoming increasingly important. Reversible data hiding in encrypted images (RDHEI) is an effective method for enhancing the protection of personal privacy. To improve the embedding capacity, this paper introduces a novel scheme for RDHEI using bl...
Article
Full-text available
In recent years, data hiding techniques have emerged as a prominent area of research due to the increasing demand for information security. Existing data hiding techniques typically do not prioritize the verification of the correctness of the extracted data, nor do they attempt to rectify any erroneous information extracted. This paper presents a s...
Article
Full-text available
The verification of image integrity has attracted increasing attention. Irreversible algorithms embed fragile watermarks into cover images to verify their integrity, but they are not reversible due to unrecoverable loss. In this paper, a new dual tampering detection scheme for reversible image fragile watermarking is proposed. The insect matrix rev...
Article
Full-text available
In recent decades, information security has become increasingly valued, including many aspects of privacy protection, copyright protection, and digital forensics. Therefore, many data hiding schemes have been proposed and applied to various carriers such as text, images, audio, and videos. Vector Quantization (VQ) compression is a well-known method...
Article
Full-text available
Prediction error expansion (PEE) is an attractive approach for reversible data hiding (RDH). The key issue for PEE-based RDH is to improve the prediction accuracy and design a better modulation mapping. This paper proposes a novel prediction error modulation (PEM) scheme, which comprises a prediction neural network and a modulation mapping rule gen...
Article
Full-text available
To serve a convenient healthcare network, storing medical images and diagnosis records in the cloud is a straightforward solution. Encrypting the medical images before uploading them to the cloud is a trivial strategy to prevent data breaches. However, the availability of images is also reduced. Since all images look noisy, one cannot obtain the in...
Article
Full-text available
Fuzzy k-means clustering is widely acknowledged for its remarkable performance in data clustering. However, its effectiveness must improve when dealing with high-dimensional data characterized by complex distributions, leading to subpar clustering results. To tackle this challenge, we introduce a novel clustering method named Joint Learning of Fuzz...
Article
Full-text available
Information has been uploaded and downloaded through the Internet, day in and day out, ever since we immersed ourselves in the Internet. Data security has become an area demanding high attention, and one of the most efficient techniques for protecting data is data hiding. In recent studies, it has been shown that the indices of a codebook can be re...
Article
Full-text available
With the emergence of the big data era, data privacy has become an increasingly important concern. Digital image, as one of the most prevalent forms of data, frequently contains sensitive information. Thus, ensuring the protection of this information has become a pressing issue. Consequently, researchers have been exploring various encryption algor...
Article
Since the COVID-19 outbreak, there’s been a growing need for contactless healthcare to meet medical diagnosis demands. Electronic health systems using the Internet of Things (IoT) are rapidly advancing, transmitting significant amounts of private medical data online. In telemedicine, where patients are diagnosed remotely, sensitive information such...
Article
Crypto-space reversible data hiding has emerged as an effective technique for transmitting secret information over the internet. However, most existing schemes are designed for uncompressed images, while almost all images are processed and transmitted in compressed formats. There is an urgent need to develop methods for compressed images, such as J...
Article
Pixel value ordering (PVO) is an efficient method for implementing reversible data hiding, which can achieve embedding based on overlapping pixel blocks when combined with the flexible patch moving (FPM) mode, especially the two-dimensional (2D) FPM mode. However, the existing 2D FPM mode, whose pairing way of prediction error is not conducive to g...
Preprint
Full-text available
Information is uploaded and downloaded through the Internet day in and day out ever since we immersed ourselves in the Internet. Data security becomes an area demanding high attention and one of the efficient techniques to protect data is data hiding. Among various data hiding schemes, more applications prefer the schemes with reversibility. In rec...
Article
Full-text available
The security and privacy of digital images are a major concern in cyberspace. JPEG is the most widely used image compression standard and yet there are problems with format compatibility and file size preservation in most of the modern encryption schemes for JPEG images. To address these problems, we propose a novel properties-preserving encryption...
Article
Full-text available
With the development of Internet technology, information security and data protection have become particularly important. Reversible data hiding is an effective technique for data integrity and privacy protection, and secret image sharing is a distinct research field within reversible data hiding. Due to the ability of sharing secret information be...
Article
Full-text available
In the context of healthcare 4.0, cloud-based eHealth is a common paradigm, enabling stakeholders to access medical data and interact efficiently. However, it still faces some serious security issues that cannot be ignored. One of the major challenges is the assurance of the integrity of medical data remotely stored in the cloud. To solve this prob...
Article
Full-text available
The internet of things (IoT) has become a popular technology in communication which utilizes the concept of connecting things together and exchanges information through various networks. Since data can be transferred through a wide range of channels, IoT systems suffer from potential data leakages. One of the common ways to reduce such risks is to...
Article
Recently, the design of spiking neural networks (SNNs) processors based on FPGA have become a hot research topic for their low power and high efficiency. However, most existing works lack flexibility in configuration to accomplish efficient computation of deep SNNs with different network structures (e.g., residuals). In this brief, a high-performan...
Article
Full-text available
Cloud storage security has received widespread attention from industry and academia. When cloud data is damaged and tampered by various types of security attacks, it is one of the most common methods to track accidents through log analysis. In order to support credible forensic analysis of user operation behavior logs in a shared cloud environment...
Article
Full-text available
Deep learning brings the opportunity to achieve effective speech steganalysis in speech signals. However, the speech samples used to train speech steganalysis models (i.e., steganalyzers) are usually sensitive and distributed among different agencies, making it impractical to train an effective centralized steganalyzer. Therefore, in this paper, we...
Article
Full-text available
Image authentication is one technique that provides integrity protection for digital images, making them sensitive to any slight modification. Recently, the detectability of absolute moment block truncation coding (AMBTC) compressed images has been attracting more attention due to its integrity authentication concerns. Thus, this paper proposes an...
Article
Fine-grained image classification is one of the key basic tasks of computer vision. The appearance of traditional deep convolutional neural network (DCNN) combined with attention mechanism can focus on partial and local features of fine-grained images, but it still lacks the consideration of the embedding mode of different attention modules in the...
Article
Full-text available
Visual Question Answering (VQA) usually uses deep attention mechanisms to learn fine-grained visual content of images and textual content of questions. However, the deep attention mechanism can only learn high-level semantic information while ignoring the impact of the low-level semantic information on answer prediction. For such, we design a High-...
Article
Vector quantization (VQ) technique is widely used in digital image compression. Some reversible data hiding schemes have been proposed to embed secret data (eg, password, timestamp, and watermark) into a VQ index table. In real application scenarios, users usually train codebooks on their own data sets instead of using the public codebooks directly...
Article
Smart home (s-home) is an important IoT-based application in improving living environment. Many cryptography-based protection schemes have been proposed to guarantee data confidentiality in smart home. Access control is a promising method to protect generated data from unauthorized access, and it is also urgently needed in smart home. Current centr...
Article
Full-text available
A novel data hiding method based on overlapped (7,4) Hamming code is proposed in this paper. 11-bit codewords are constructed from two overlapped (7,4) Hamming codes, and then a look-up table of 11-bit codeword is established, from which the suitable 11-bit codeword can be selected to minimize the stego image distortion. Because Hamming codes, rath...
Article
Full-text available
Images uploaded to the cloud may be confidential or related to personal private information, so they need to be encrypted before uploading to the cloud storage. At the service provider side, appending additional information is usually required for transmission or database management. Reversible data hiding in encrypted images (RDHEI) serves as a te...
Article
Full-text available
In this paper, based on the concept of Code Division Multiple Access (CDMA), we propose an innovative secret message multiplexing scheme by digital image data hiding. Multiple secret messages distributed for several participants are encoded into a CDMA codeword through CDMA multiplexing and then embedded into a grayscale image. At the receiving sid...
Article
Full-text available
Reversible data hiding in encrypted images (RDHEI) is commonly used for privacy protection in images stored on cloud storage. Currently, block permutation and co-modulation (BPCM) encryption is commonly utilized in most existing RDHEI schemes to generate encrypted images. In this paper, we analyze the vulnerabilities of RDHEI based on BPCM encrypti...
Article
Steganography based on fixed codebook has become one of the most important branches of speech steganography due to its high imperceptibility and having the largest available carrier space. As its countermeasure technique, this paper presents a novel steganalysis method based on separable convolution network (SepSteNet) with dual-stream pyramid enha...
Article
Image covert communication camouflages or conceals sensitive information in regular digital images during transmission to avoid detection or interception. It is widely used in military, intelligence, and law enforcement agencies. Data hiding is a feasible solution for covert communication, which embeds confidential information in cover media while...
Article
Reversible data hiding in encrypted 3D models (RDHEM) is an emerging steganography technique, capable of both encrypting the cover model to ensure confidentiality and embedding additional messages for covert communication. However, the embedding capacity provided by recent RDHEM methods is still at a low level. In this paper, an adaptive vertex gro...
Article
With the development of speech steganography technology, steganographers are more and more inclined to realize more secure covert communication by combining a series of steganography methods. Thus, this letter presents a novel multi-encoder network (MENet) to achieve more efficient detection of multiple steganography methods. Differing from the pre...
Article
The prosperous Internet communication technologies have led to e-commerce in mobile computing and made Web of Things become popular. Electronic payment is the most important part of e-commerce, so many electronic payment schemes have been proposed. However, most of proposed schemes cannot give change. Based on proxy blind signatures, an e-cash paym...
Chapter
This paper proposes a high capacity reversible data hiding (RDH) scheme by extending the unidirectional generalized integer transform (UGIT) to bidirectional GIT (BGIT). For non-embeddable blocks in UGIT based scheme, we further divide into two sets: to-be-overflow blocks and overflow blocks. And then we embed data into to-be-overflow blocks by sca...
Article
Pest monitoring of forest areas is essential to pest control. The existing remote sensing satellite image methods have been widely used in detecting pine wilt disease due to their low cost and large detection range. However, most existing methods for pine wilt disease detection are based on multi-phase remote sensing satellite imagery and use manua...
Article
Full-text available
Due to its applications in cloud computing, research on reversible data hiding in encrypted images (RDHEI) is becoming more and more important. This paper proposes a reversible data hiding scheme for encrypted images that utilizes an all-permutation technique to embed data into encrypted images. The proposed scheme follows a block-wise data hiding...
Article
Full-text available
Fog computing, as a new distributed computing framework, extends the tasks originally done in the cloud data center to the edge of the network and brings more serious security challenges while providing convenience. Abnormal network traffic detection is an effective means to defense malicious behavior, can detect a variety of known attacks. Althoug...
Article
Full-text available
How to hide messages in digital images so that messages cannot be discovered and tampered with is a compelling topic in the research area of cybersecurity. The interpolation-based reversible data hiding (RDH) scheme is especially useful for the application of medical image management. The biometric information of patients acquired by biosensors is...
Article
Full-text available
Data stream is a type of data that continue to grow over time. For example, network security data stream will constantly be generated in the field of data security, and encrypted data stream will be generated in the privacy protection scenario. Clustering is a basic task in the analysis of data stream. In addition to the large amount of data and li...
Article
Full-text available
Mobile devices have been increasingly used to take pictures without leaving a trace. However, the application system can lead to confidential information leaks. A framework for screen-shooting-resilient watermarking via deep networks (SSDeN) in the frequency domain is put forward in this study to solve this problem. The proposed framework can extra...
Article
To prevent the abuse of low‐rate speech‐based steganography from threatening cyberspace security, the corresponding steganalysis approaches have been developed and received significant attention from research community. However, most existing steganalysis methods assume that steganography methods are known in advance, which in practice is impractic...
Article
Full-text available
Person search is of great significance to public safety research, such as crime surveillance, video surveillance and security. Person search is a method of locating and identifying the queried person from a complete set of images. The main cause of false recall and missed detection in person search is the presence of person occlusion in the images....
Article
Full-text available
With the increasing need for privacy-preserving, data hiding in encrypted images has attracted more attention in the data hiding area. The existing data hiding methods for encrypted images mainly focus on improving the embedding capacity. Recently, some researchers have begun to pay attention to the robustness of the data hiding in encrypted images...

Network

Cited By