Book Chapters

01. Chang, C. C. and Shieh, J. C., (1987): "On the Complexity of File Allocation Problem," Foundations of Data Organization, (S. P. Ghosh, Y. Kambayashi, and K. Tanaka Eds.), Plenum Press, New York, 1987, pp. 177-181.

02. Chang, C. C. and Shen, J. J., (1987): "Consecutive Retrieval Organization as a File Allocation Scheme on Multiple Disk Systems," Foundations of Data Organization, (S. P. Ghosh, Y. Kambayashi, and K. Tanaka Eds.), Plenum Press, New York, 1987, pp. 113-124.

03. Chang, C. C. and Lian, L. S., (1987): "On Strict Optimality Property of Allocating Binary Cartesian Product Files on Multiple Disk Systems, Foundations of Data Organization, (S. P. Ghosh, Y. Kambayashi, and K. Tanaka Eds.), Plenum Press, New York, 1987, pp. 159-175.

04. Chang, C. C., (1987): "The Study of a Letter Oriented Minimal Perfect Hashing Scheme," Foundations of Data Organization, (S. P. Ghosh, Y. Kambayashi, and K. Tanaka Eds.), Plenum Press, New York, 1987, pp. 91-99.

05. Chang, C. C. and Chen, C. Y., (1988): "Orthogonal Range Retrieval Using Bucket Address Hashing," Statistical and Scientific Database Management, Lecture Notes in Computer Science, Vol. 339, (G. Goos, J. Hartmanis, M. Rafanelli, J. C. Klensin, and P. Svensson Eds.), Springer-Verlag, 1988, pp. 133-140.

06. Chang, C. C. and Buehrer, D. J., (1992): "A Survey of Some Spatial Match Query Algorithms," Advanced Database Research and Development Series, Vol. 1, Database Systems for Next-Generation Applications – Practice, (W. Kim and Y. Kambayashi Eds.), World Scientific Publishing Company, Singapore, 1992, pp. 218-223.

07. Chang, C. C. and Buehrer, D. J., (1992): "De-clustering Image Databases," Future Databases'92, Advanced Database Research and Development Series, Vol. 3, (W. Kim and Y. Kambayashi Eds.), World Scientific Publishing Company, Singapore, 1992, pp. 142-145.

08. Chang, C. C., Wu, T. C. and Chen, C. P., (1993): "The Design of a Conference Key Distribution Systems," Advances in Cryptology - Proceedings of AUSCRYPT '92, Lecture Notes in Computer Science Series, Vol. 718, (J. Seberry and Y. Zheng Eds.), Springer-Verlag, 1993, pp. 459-466.

09. Liang, J. and Chang, C. C., (1993): "Similarity Retrieval on Pictorial Databases Based upon Module Operation," Advanced Database Research and Development Series-Vol.4, Database Systems for Advanced Applications'93, (S. C. Moon and H. Ikeda Eds.), World Scientific Publishing Company, Singapore, 1993, pp. 19-26.

10. Buehrer, D. J. and Chang, C. C., (1993): "Application of a Reciprocal Confluence Tree Unit to Similar-Picture Retrieval," Advances in Spatial Databases, Lecture Notes in Computer Science, (D. Abel and B. C. Ooi Eds.), Springer-Verlag, 1993, pp. 437-442.

11. Buehrer, D. J., Chang, C. C. and Ling, S. M., (1996): "Using 2D String Decision Trees for Symbolic Picture Retrieval," Chapter 10 in Intelligent Image Database Systems: Spatial Reasoning, Image Indexing and Retrieval Using Symbolic Projections, (S. K. Chang, E. Jungert, and G. Tortora Eds.), World Scientific Publishing Co., 1996, pp. 219-228.

12. Lin, C. H., Wang, C. T. and Chang, C. C., (1996): "A Group-Oriented (t, n) Undeniable Signature Scheme without Trusted Center," Information Security and Privacy, (G. Goos, J. Harfmanis, and J. Leeuwen Eds.), Springer-Verlag, 1996, pp. 266-274.

13. Chen, C. Y., Chang, C. C., Lee, R. C. T. and Lin, D. C., (1997): "A Temporal Join Mechanism Based on Trie-ranking Data Structure," Advanced Database Research and Development Series, Vol. 7, Cooperative Database and Applications, (Y. Kambayashi and K.Yokota Eds.), World Scientific publishing Company, Singapore, 1997, pp. 428-435.

14. Hwang, S. J., Chang, C. C. and Yang, W. P., (1996): "Some Active Attacks on Fast Server-Aided Secret Computation Protocols for Modular Exponentiation," Lecture Notes in Computer Science - Cryptography Policy and Algorithms, (Dawson and Golic Jovan Eds.), Springer-Verlag, 1996, pp. 215-227.

15. Chang, C. C., Lee, W. T. and Kuo, C. L., (1997): "A Fast Image Encoding Scheme Using Vector Quantization," Information Systems and Technologies for Network Society, (Y. Kambayashi, Y. Masunaga, M. Takizawa, and Y. Anzai Eds.), World Scientific Publishing Company, Singapore, 1997, pp. 143-150.

16. Jiang, J. H., Chang. C. C. and Chen, T. S., (1997): "Selective Progressive Image Transmission Using Diagonal Sampling Technique," Digital Media Information Base, (M. Yoshikawa, S. Uemura, and Y. Kambayashi Eds.), World Scientific Publishing Company, Singapore, 1997, pp. 59-67.

17. Chang. C. C. and Lee, C. F., (1997): "An Efficient Indexing Scheme for Temporal Join in Relational Environment," Digital Media Information Base, (M. Yoshikawa, S. Uemura, and Y. Kambayashi Eds.), World Scientific Publishing Company, Singapore, 1997, pp. 176-181.

18. Chen, T. S. and Chang, C. C., (1997): "Progressive Image Transmission Using Side Match Method," Information Systems and Technologies for Network Society, (Y. Kambayashi, Y. Masunaga, M. Takizawa, and Y. Anzai Eds.), World Scientific Publishing Company, Singapore, 1997, pp. 191-198.

19. Chang, C. C. and Lee, C. F., (1997): "An Efficient Data Filter for Orthogonal Range Searching on Multiattribute Files," Information Systems and Technologies for Network Society, (Y. Kambayashi, Y. Masunaga, M. Takizawa, and Y. Anzai Eds.), World Scientific Publishing Company, Singapore, 1997, pp. 261-264.

20. Chang, C. C. and Jiang, J. H. (1997): "General Multilevel Signature Method for Data Filtering in Mobile Environments," Information Systems and Technologies for Network Society, (Y. Kambayashi, Y. Masunaga, M. Takizawa, and Y. Anzai Eds.), World Scientific Publishing Company, Singapore, 1997, pp. 385-391.

21. Lee, C. F. and Chang, C. C., (1997): "Optimal Bit Lengths of Direction Signatures for Spatial Match Accessing Using Basic Linear Hashing Scheme," Advanced Database Research and Development Series, Vol. 7, Cooperative Database and Applications, (Y. Kambayashi and K.Yokota Eds.), World Scientific Publishing Company, Singapore, 1997, pp. 526-529.

22. Chang, C. C., (1997): "Computer Science Education at Universities in Taiwan," Information Systems and Technologies for Network Society, (Y. Kambayashi, Y. Masunaga, M. Takizawa, and Y. Anzai Eds.), World Scientific Publishing Company, Singapore, 1997, pp. 5-10.

23. Chang, C. C., Leu, J. J., Hwang, P. C. and Lee, W. B., (1998): "A Scheme for Obtaining a Message from the Digital Multisignature," Lecture Notes in Computer Science: Public Key Cryptography, (H. Imai and Y. Zheng Eds.), Springer-Verlag, Germany, 1998, pp.154-163.

24. Shen, J. J., Chang, C. C. and Lee, C. H., (1999): "Normalization Cannot Make Profit for Query Processing in ROODB," Database, Web and Cooperative Systems, Vol. I, (G. Lasker, and Y. Zhang Eds), The International Institute for Advanced Studies in Systems Research and Cybernetics, Canada, 1999, pp. 137-144.

25. Chang, C. C., Chan, Y. K., Chou, A. Y. H. and Yang, W. P., (2001): "Representing Symbolic Pictures Using Iconic Indexing", Design and Management of Multimedia Information Systems: Opportunities and Challenges (M. R. Syed Editor), Idea Group Publishing Company, U. S. A., 2001, pp. 64-79.

26. Chang, C. C., Hung, Y. P., Shih, T. K. and Hwang, R. J., (2001): "Future Multimedia Databases and Research Directions," Distributed Multimedia Databases: Techniques and Applications, (T. K. Shih Ed.), Chapter 22, the Idea Group Publishing, USA, 2001.

27. Tsai, C. S., Chang, C. C., Chen, T. S. and Chen M. H., (2001): "Embedding Robust Gray-level Watermarks in an Image Using Discrete Cosine Transformation," Distributed Multimedia Databases: Techniques and Applications, (T. K. Shih Ed.), Chapter 13, the Idea Group Publishing, USA, 2001.

28. Chang, C. C. and Hwang, K. F., (2001): "Hiding Images Using Dynamic Bit-replacement and Human Visual System," Distributed Multimedia Databases: Techniques and Applications, (T. K. Shih Ed.), Chapter 12, the Idea Group Publishing, USA, 2001.

29. Chang, C. C., Chen, T. S. and Xiao, G. X., (2001): "A Simple Prediction Method for Progressive Image Transmission," Distributed Multimedia Databases: Techniques and Applications, (T. K. Shih Ed.), Chapter 16, the Idea Group Publishing, USA, 2001.

30. Chang, C. C. and Hwang, K. F., (2001): "Towards the Forgery of a Group Signature without Knowing the Group Center's Secret," Lecture Notes in Computer Science - Information and Communications Security, (S. Qing and T. Okamoto Eds.), Springer-Verlag, 2001, pp. 47-51.

31. Chang, C. C. and Lin, I. C., (2001): "Cryptanalysis of the improved user efficient blind signatures," Lecture Notes in Computer Science - Information and Communications Security, (S. Qing and T. Okamoto Eds.), Springer-Verlag, 2001, pp. 42-46.

32. Chang, C. C., Hsia, H. C. and Chen, T. S., (2001): "A New Progressive Image Transmission Scheme Based on Block Truncation Coding," The Human. Society @ Internet, (W. Kim, T. W. Ling, Y. J. Lee and S. S. Park Ed.), Springer-Verlage, Germany, 2001, pp. 383-397.

33. Chang, C. C., Yeh, J. C. and Hsiao, J. Y., (2001): "A Novel Scheme for Secure Image Steganography," Lecture Notes in Computer Science-Advances in Multimedia Information Processing-PCM2001, (H. Y. Shum, M. Liao, S. F. Chang Eds.), Springer-Verlag, Germany, 2001, pp. 804-811.

34. Tsai, C. S. and Chang, C. C., (2001): "A Generalized Secret Image Sharing and Recovery Scheme," Lecture Notes in Computer Science-Advances in Multimedia Information Processing-PCM2001, (H. Y. Shum, M. Liao, S. F. Chang Eds.), Springer Verlag, Germany, 2001, pp. 963-968.

35. Chang, C. C., Chan, C. S, and Hsiao, J. Y., (2001): "A Color Image Retrieve Method Based on Local Histogram," Lecture Notes in Computer Science-Advances in Multimedia Information Processing-PCM2001, (H. Y. Shum, M. Liao, S. F. Chang Eds.), Springer Verlag, Germany, 2001, pp. 831-836.

36. Chang, C. C. and Su, Y. Y., (2002): "A Dynamic Color Palette for Color Images Coding," Lecture Notes in Computer Science-Advances in Multimedia Information Processing-PCM2002, (Y. C. Chen, L. W. Chang, C. T. Hsu Eds.), Springer Verlag, Germany, 2002, pp.369-376.

37. Chang, C. C., Hsieh, C. P. and Hsiao, J. Y., (2002): "A Fast and Efficient Noise Reduction Method Suitable for Low Noise Density," Lecture Notes in Computer Science-Advances in Multimedia Information Processing-PCM2002, (Y. C. Chen, L. W. Chang, C. T. Hsu Eds.), Springer Verlag, Germany, 2002, pp.386-392.

38. Chang, C. C., Hsiao, J. Y. and Chiang, C. L., (2002): "A Cross-Type Peak-and-Valley Filter for Error Prevention and Resilience in Image Communications," Lecture Notes in Computer Science-Advances in Multimedia Information Processing-PCM2002, (Y. C. Chen, L. W. Chang, C. T. Hsu Eds.), Springer Verlag, Germany, 2002, pp.393-400.

39.Hwang, K. F. and Chang, C. C., (2004): "Recent Development of Visual Cryptography," Intelligent Watermarking Techniques, (J. S. Pan, H. C. Huang and L. C. Jain Eds.), World Scientific Publishing Company, Singapore (850 pages + 1 attached CD) (ISBN: 9-81238-757-9), 2004, Chapter 16, pp. 459-480.

40.Chang, C. C. and Lin, I. C., (2004):  "A Perceptually Tuned Watermarking Scheme for Digital Images Using Support Vector Machines," Intelligent Watermarking Techniques, (J. S. Pan, H. C. Huang and L. C. Jain Eds.), World Scientific Publishing Company, Singapore (850 pages + 1 attached CD) (ISBN: 9-81238-757-9), 2004, Chapter 15, pp. 429-458.

41.Chang, C. C. and Lin, I. C., (2004):  "Robust Image Watermarking Systems Using Neural Networks," Intelligent Watermarking Techniques, (J. S. Pan, H. C. Huang and L. C. Jain Eds.), World Scientific Publishing Company, Singapore (850 pages + 1 attached CD) (ISBN: 9-81238-757-9), 2004, Chapter 14, pp. 395-428.

42.Hung, K. L., Chang, C. C., (2003):“A Robust and Recoverable Tamper Proofing Technique for Image Authentication,” Lecture Notes in Computer Science- Web and Communication Technologies and Internet-Related Social Issues-HSI 2003 , (C. W. Chung, C. K. Kim, W. Kim, T. W. Ling, and K. H. Song Eds.), Springer Verlag, Germany, 2003, pp. 44-53.

43.Hwang, R. J. and Chang, C. C. (2003): “A Method for Sending Confidential Messages to a Group without Trusted Parties Lecture Notes in Computer Science- Parallel and Distributed Processing and Applications, (M. Guo and L. T. Yang Eds.), Springer Verlag, Germany, Vol. 2745, 2003, pp. 375-381.

44.Huang, H. F. and Chang, C. C. (2003): “An Efficient Convertible Authenticated Encryption Scheme and Its Variant,” Lecture Notes in Computer Science- Information and Communications Security (ICICS 2003), (S. Qing, D. Gollmann, J. Zhou Eds.), Springer Verlag, Germany, 2003, pp. 382-392.

45.Chang, C. C., Chuang, J. C. and Hu Y. S., (2003): “Image Feature Based on Wavelet Transformation for Similar Image Retrieval,” Proceedings of the Third International Conference on Wavelet Analysis and Its Applications, (J. P. Li, V. Wickerhauser, Y. Y. Tang, J. Daugman, L. Peng, and J. Zhao Eds.), World Scientific, Vol. 1, 2003, pp. 294-302.