Skip to main content

previous disabled Page of 3
and
  1. No Access

    Article

    An enhanced AMBTC for color image compression using color palette

    Digital image has been used in various fields as an essential carrier. Many color images have been constantly produced since their more realistic description, which takes up much storage space and network band...

    Lizhi **ong, Mengtao Zhang, Ching-Nung Yang in Multimedia Tools and Applications (2024)

  2. Article

    Introduction to the special issue on deep learning for real-time information hiding and forensics

    Zhili Zhou, Ching-Nung Yang, Cheonshik Kim in Journal of Real-Time Image Processing (2020)

  3. No Access

    Chapter and Conference Paper

    High Capacity Data Hiding Based on AMBTC and Interpolation

    Absolute Moment Block Truncation Coding (AMBTC) is a compression method with low complexity and simple computation to easily compress a block. Various AMBTC-like methods have been proposed for develo** data ...

    Cheonshik Kim, Dongkyoo Shin in Security with Intelligent Computing and Bi… (2020)

  4. No Access

    Article

    Enhanced stego-image quality and embedding capacity for the partial reversible data hiding scheme

    Recently, Jana et al. proposed the partial reversible data hiding (PRDH) based on (7, 4) Hamming code, which deals with three images: the original image (OI), the cover image (CI), and the stego image (SI). Th...

    Ching-Nung Yang, Song-Yu Wu, Yung-Shun Chou in Multimedia Tools and Applications (2019)

  5. No Access

    Article

    Generalizing Hamming+k data hiding by overlapped pixels

    Matrix coding based data hiding (MCDH) using linear codes (syndrome coding) is an efficient coding method for steganographic schemes to improve their embedding efficiency. Hamming code data hiding (HDH) is a w...

    Cheonshik Kim, Dongkyoo Shin, Ching-Nung Yang in Multimedia Tools and Applications (2019)

  6. No Access

    Article

    Exploiting error control in matrix coding-based data hiding over lossy channel

    A steganographic scheme, matrix coding-based data hiding (MCDH), is constructed from covering function to enhance embedding efficiency, and, meanwhile, decrease the required changed bits. However, the MCDH may...

    Ching-Nung Yang, Yung-Shun Chou, Yanxiao Liu in Journal of Real-Time Image Processing (2019)

  7. Article

    Editorial: Recent Advances in Mining Intelligence and Context-Awareness on IoT-Based Platforms

    Cheonshik Kim, Byung-Gyu Kim, Joel J. P. C. Rodrigues in Mobile Networks and Applications (2019)

  8. No Access

    Article

    Special issue: Advanced technology for smart home automation and entertainment

    Cheonshik Kim, Bryan (B.-G.) Kim in Personal and Ubiquitous Computing (2018)

  9. No Access

    Article

    Study of detection method for spoofed IP against DDoS attacks

    Cybercriminals are learning to harness the power of simpler devices like connected cameras. In September of 2016, Mirai software was used to infect more than 100,000 devices and unleash one of the largest dist...

    Yong-Joon Lee, Nam-Kyun Baik, Cheonshik Kim in Personal and Ubiquitous Computing (2018)

  10. No Access

    Article

    Mining intelligent solution to compensate missing data context of medical IoT devices

    When gathering experimental data generated by medical IoT devices, the perennial problem is missing data due to recording instruments, errors introduced which cause data to be discarded, or the data is missed ...

    Paul S. Fisher, Jimmy James II, **suk Baek in Personal and Ubiquitous Computing (2018)

  11. No Access

    Article

    Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC

    The problem of digital forgeries has become more and more serious in various fields like entertainment, digital forensics, and journalism. This paper proposes a self-embedding watermarking scheme for the resto...

    Cheonshik Kim, Dongkyoo Shin, Ching-Nung Yang in Personal and Ubiquitous Computing (2018)

  12. No Access

    Article

    Palmprint recognition system on mobile devices with double-line-single-point assistance

    Compared with other biometrics, palmprint has several advantages in authentication on mobile devices. However, some serious challenges severely restrict the development of palmprint recognition on mobile envir...

    Lu Leng, Fumeng Gao, Qi Chen, Cheonshik Kim in Personal and Ubiquitous Computing (2018)

  13. No Access

    Article

    Reversible data hiding scheme with edge-direction predictor and modulo operation

    Since the first histogram shifting technique was proposed by Ni et al., many histogram based data hiding methods were proposed to improve their scheme. One of the methods is using difference value between cove...

    Dae-Soo Kim, Eun-Jun Yoon, Cheonshik Kim in Journal of Real-Time Image Processing (2018)

  14. No Access

    Article

    A real-time secret image sharing with fairness

    When traditional secret image sharing techniques reconstructed the secret, they input the shares over t. While less than t shares can know nothing about the secret, the problem arises when there are more than t s...

    Gil-Je Lee, Eun-Jun Yoon, Cheonshik Kim in Journal of Real-Time Image Processing (2018)

  15. No Access

    Article

    Lossless data hiding for absolute moment block truncation coding using histogram modification

    This paper presents a lossless data hiding method for an absolute moment block truncation coding (AMBTC) images, which is a compressed grayscale image. It is not easy to hide secret data in an AMBTC-compresse...

    Cheonshik Kim, Dongkyoo Shin, Lu Leng in Journal of Real-Time Image Processing (2018)

  16. No Access

    Article

    Adaptive real-time reversible data hiding for JPEG images

    Data hiding used to embed data, such as copyright information, into various forms of media such as image, audio, or text with a minimum amount of perceivable degradation to the “host” signal. Therefore, in man...

    Ching-Nung Yang, Cheonshik Kim, Yen-Hung Lo in Journal of Real-Time Image Processing (2018)

  17. No Access

    Article

    Secure medical images based on data hiding using a hybrid scheme with the Hamming code, LSB, and OPAP

    Some medical accidents in hospitals are related to mismanagement of medical images X-ray and computer tomography (CT). A counterfeit medical image leads to medical accidents. Thus, security of medical images i...

    Cheonshik Kim, Dongkyoo Shin, Byung-Gyu Kim in Journal of Real-Time Image Processing (2018)

  18. No Access

    Article

    Dual-source discrimination power analysis for multi-instance contactless palmprint recognition

    Due to the benefits of palmprint recognition and the advantages of biometric fusion systems, it is necessary to study multi-source palmprint fusion systems. Unfortunately, the research on multi-instance palmpr...

    Lu Leng, Ming Li, Cheonshik Kim, Xue Bi in Multimedia Tools and Applications (2017)

  19. No Access

    Article

    Data hiding based on overlapped pixels using hamming code

    Most data hiding schemes change the least significant bits to conceal messages in the cover images. Matrix encoding scheme is a well known scheme in this field. The matrix encoding proposed by Crandall can be ...

    Cheonshik Kim, Ching-Nung Yang in Multimedia Tools and Applications (2016)

  20. No Access

    Article

    An energy-efficient video transport protocol for personal cloud-based computing

    Recently, we are surrounded by a collection of heterogeneous computing devices such as desktop computers, laptops, smart phones, smart televisions, and tablet PCs. Each device is operated with its own host ope...

    **suk Baek, Cheonshik Kim in Journal of Real-Time Image Processing (2016)

previous disabled Page of 3