Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    High Capacity Data Hiding Based on AMBTC and Interpolation

    Absolute Moment Block Truncation Coding (AMBTC) is a compression method with low complexity and simple computation to easily compress a block. Various AMBTC-like methods have been proposed for develo** data ...

    Cheonshik Kim, Dongkyoo Shin in Security with Intelligent Computing and Bi… (2020)

  2. No Access

    Chapter and Conference Paper

    Steganography Based on Grayscale Images Using (5, 3) Hamming Code

    Steganography is a technique to hide secret data in cover images securely. This technique is used for secret communication. However, steganography is not as strong as watermark against various attacks. “Hammin...

    Cheonshik Kim, Ching-Nung Yang in Digital-Forensics and Watermarking (2015)

  3. No Access

    Chapter and Conference Paper

    Lossless Data Hiding for Binary Document Images Using \(n\) -Pairs Pattern

    Lossless data embedding theory has entered a new era for data hiding and information security. In a lossless scheme, the original data and the embedded data should be completely recoverable. Our ...

    Cheonshik Kim, **suk Baek, Paul S. Fisher in Information Security and Cryptology - ICIS… (2015)

  4. No Access

    Chapter and Conference Paper

    Improving Data Hiding Capacity Based on Hamming Code

    Matrix encoding proposed by Crandall can be used in steganography data hiding methods. Hamming codes are kinds of cover codes. “Hamming + 1” proposed by Zhang et al. is an improved version of Matrix encoding s...

    Cheonshik Kim, Ching-Nung Yang in Frontier and Innovation in Future Computin… (2014)

  5. No Access

    Chapter and Conference Paper

    Steganography Based on Low Density Parity Check(LDPC)

    We propose a data hiding scheme based on Low Density Parity Check(LDPC) codes. Our proposed theoretical point of view, the blind watermarking can be transmitted through a noisy channel. Matrix encoding propose...

    Cheonshik Kim, Ching-Nung Yang in Future Information Technology (2014)

  6. No Access

    Chapter and Conference Paper

    New ID-Based Proxy Signature Scheme with Message Recovery

    In 2012, Singh-Verma proposed an ID-based proxy signature scheme with message recovery. Unfortunately, by giving two concrete attacks, Tian et al. showed that Singh-Verma’s scheme is not secure. This paper pro...

    Eun-Jun Yoon, YongSoo Choi, Cheonshik Kim in Grid and Pervasive Computing (2013)

  7. No Access

    Chapter and Conference Paper

    Data Hiding Based on Palette Images Using Weak Bases of Z2-Modules

    Many steganography schemes were invented for the purpose of safe communication. Such previous schemes often show good and reasonable performance, however, few have been based on paletted images; it is not easy...

    Phan Trung Huy, Cheonshik Kim, Nguyen Tuan Anh in Grid and Pervasive Computing (2013)

  8. No Access

    Chapter and Conference Paper

    Architecture of a Context Aware Framework for Automated Mobile Device Configuration

    In this paper an architecture for context aware framework for mobile phones has been represented. The main goal of this proposed architecture is to enable phones to configure themselves based on self-initiated...

    Md. Fazla Rabbi Opu, Emon Biswas, Mansura Habiba in Grid and Pervasive Computing (2013)

  9. No Access

    Chapter and Conference Paper

    A (2, 2) Secret Sharing Scheme Based on Hamming Code and AMBTC

    We present a secret sharing scheme based on absolute moment block truncation coding (AMBTC) and Hamming code theory. AMBTC is composed of bit planes and two representative gray level pixel values, which are th...

    Cheonshik Kim, Dongkyoo Shin, Dongil Shin in Intelligent Information and Database Syste… (2012)

  10. Chapter and Conference Paper

    New Electronic Acupuncture System Using Intelligence

    In recent years, scientific studies of traditional oriental medicine are accelrating. Furthermore, researches of medical examinations and treatments through collaboration of oriental medicine and western medic...

    You-Sik Hong, Hongkyun Kim, Cheonshik Kim, Geuk Lee in Network and Parallel Computing (2012)

  11. Chapter and Conference Paper

    An Optimized Sub-texture Map** Technique for an Arbitrary Texture Considering Topology Relations

    In recent years, texture map** techniques have become more advanced as providing real-time rendering tasks. However, few methods have been conducted in optimizing a sub-texture map** for an arbitrary textu...

    Sangyong Lee, Cheonshik Kim, Seongah Chin in Network and Parallel Computing (2012)

  12. No Access

    Chapter and Conference Paper

    Data Hiding in a Halftone Image Using Hamming Code (15, 11)

    This paper presents a data hiding technique for a halftone image. Each block of halftone bitmaps is transformed into a sequence of binary bits, and then regarded as a codeword. From the codeword, we can get a ...

    Cheonshik Kim, Dongkyoo Shin, Dongil Shin in Intelligent Information and Database Systems (2011)

  13. No Access

    Chapter and Conference Paper

    Improved Steganographic Embedding Exploiting Modification Direction in Multimedia Communications

    Steganography provides secure communications over the Internet with a cover image. However, it is difficult to transfer many messages with small-sized images. We have improved EMD (Exploiting Modification Dire...

    Cheonshik Kim, Dongkyoo Shin, Dongil Shin in Secure and Trust Computing, Data Managemen… (2011)

  14. No Access

    Chapter and Conference Paper

    Study of Optimal Traffic Information Using Agents Techniques

    Recently in Korea, DMB TPEG service showing the optimal road while esca** the jammed way is popular. Such latest service also provides the traffic information after average 5 minutes of the recent traffic si...

    You-Sik Hong, CheonShik Kim, Geuk Lee in Agent and Multi-Agent Systems: Technologie… (2008)

  15. No Access

    Chapter and Conference Paper

    iSCSI Protocol Parameter Optimization for Mobile Appliance Remote Storage System at Smart Home Environment Approach

    In Mobile appliance, users have a limited amount of storage availability to them due to their limited size and weight. To relieve problem we developed iSCSI remote storage system, which is an excellent solutio...

    Shaikh Muhammad Allayear, Sung Soon Park in Ubiquitous Convergence Technology (2007)

  16. No Access

    Chapter and Conference Paper

    Dynamic EPG Implementation for Ubiquitous Environment

    In this paper, we proposed EPG as a suitable method for digital broadcasting in a ubiquitous environment. As an application technique for user custom UI service in a Ubiquitous Environment, a dynamic EPG prese...

    In Jung Park, Duck Je Park, Cheonshik Kim in Ubiquitous Convergence Technology (2007)

  17. No Access

    Chapter and Conference Paper

    Product Control System Using RFID Tag Information and Data Mining

    In this paper, we suggest a method that applies RFID tag information and a data mining technology to a manufacturing execution system (MES) for efficient process control. The MES is an efficient process contro...

    Cheonshik Kim, San-Yep Nam, Duk-Je Park, Injung Park in Ubiquitous Convergence Technology (2007)

  18. No Access

    Chapter and Conference Paper

    Personalized E-Learning Process Using Effective Assessment and Feedback

    The amount and quality of feedback provided to the learner has an impact on the learning process. Personalized feedback is particularly important to the effective delivery of e-learning courses. E-learning del...

    Cheonshik Kim, Myunghee Jung in Advances in Hybrid Information Technology (2007)

  19. No Access

    Chapter and Conference Paper

    Traffic Signal Planning Using a Smart Agent System

    The multi-agent systems approach can provide a new desirable solution to the problems of traffic congestion and traffic accidents. Currently, a traffic simulator is needed to understand and explore the difficu...

    You-Sik Hong, Geuk Lee, Cheonshik Kim in Agent and Multi-Agent Systems: Technologie… (2007)