Skip to main content

and
  1. No Access

    Article

    Special issue: Advanced technology for smart home automation and entertainment

    Cheonshik Kim, Bryan (B.-G.) Kim in Personal and Ubiquitous Computing (2018)

  2. No Access

    Article

    Study of detection method for spoofed IP against DDoS attacks

    Cybercriminals are learning to harness the power of simpler devices like connected cameras. In September of 2016, Mirai software was used to infect more than 100,000 devices and unleash one of the largest dist...

    Yong-Joon Lee, Nam-Kyun Baik, Cheonshik Kim in Personal and Ubiquitous Computing (2018)

  3. No Access

    Article

    Mining intelligent solution to compensate missing data context of medical IoT devices

    When gathering experimental data generated by medical IoT devices, the perennial problem is missing data due to recording instruments, errors introduced which cause data to be discarded, or the data is missed ...

    Paul S. Fisher, Jimmy James II, **suk Baek in Personal and Ubiquitous Computing (2018)

  4. No Access

    Article

    Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC

    The problem of digital forgeries has become more and more serious in various fields like entertainment, digital forensics, and journalism. This paper proposes a self-embedding watermarking scheme for the resto...

    Cheonshik Kim, Dongkyoo Shin, Ching-Nung Yang in Personal and Ubiquitous Computing (2018)

  5. No Access

    Article

    Palmprint recognition system on mobile devices with double-line-single-point assistance

    Compared with other biometrics, palmprint has several advantages in authentication on mobile devices. However, some serious challenges severely restrict the development of palmprint recognition on mobile envir...

    Lu Leng, Fumeng Gao, Qi Chen, Cheonshik Kim in Personal and Ubiquitous Computing (2018)

  6. No Access

    Article

    Aspect ratio invariant visual cryptography by image filtering and resizing

    In visual cryptographic scheme (VCS), each secret pixel is expanded to m subpixels in shadow images to encrypt a secret image. Apparently, we should put these m subpixels as a rectangle such that the blocks can b...

    Ching-Nung Yang, Pin-Wei Chen, Hsiang-Wen Shih in Personal and Ubiquitous Computing (2013)