Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    An enhanced AMBTC for color image compression using color palette

    Digital image has been used in various fields as an essential carrier. Many color images have been constantly produced since their more realistic description, which takes up much storage space and network band...

    Lizhi **ong, Mengtao Zhang, Ching-Nung Yang in Multimedia Tools and Applications (2024)

  2. Article

    Introduction to the special issue on deep learning for real-time information hiding and forensics

    Zhili Zhou, Ching-Nung Yang, Cheonshik Kim in Journal of Real-Time Image Processing (2020)

  3. No Access

    Article

    Enhanced stego-image quality and embedding capacity for the partial reversible data hiding scheme

    Recently, Jana et al. proposed the partial reversible data hiding (PRDH) based on (7, 4) Hamming code, which deals with three images: the original image (OI), the cover image (CI), and the stego image (SI). Th...

    Ching-Nung Yang, Song-Yu Wu, Yung-Shun Chou in Multimedia Tools and Applications (2019)

  4. No Access

    Article

    Generalizing Hamming+k data hiding by overlapped pixels

    Matrix coding based data hiding (MCDH) using linear codes (syndrome coding) is an efficient coding method for steganographic schemes to improve their embedding efficiency. Hamming code data hiding (HDH) is a w...

    Cheonshik Kim, Dongkyoo Shin, Ching-Nung Yang in Multimedia Tools and Applications (2019)

  5. No Access

    Article

    Exploiting error control in matrix coding-based data hiding over lossy channel

    A steganographic scheme, matrix coding-based data hiding (MCDH), is constructed from covering function to enhance embedding efficiency, and, meanwhile, decrease the required changed bits. However, the MCDH may...

    Ching-Nung Yang, Yung-Shun Chou, Yanxiao Liu in Journal of Real-Time Image Processing (2019)

  6. No Access

    Article

    Reversible data hiding scheme with edge-direction predictor and modulo operation

    Since the first histogram shifting technique was proposed by Ni et al., many histogram based data hiding methods were proposed to improve their scheme. One of the methods is using difference value between cove...

    Dae-Soo Kim, Eun-Jun Yoon, Cheonshik Kim in Journal of Real-Time Image Processing (2018)

  7. No Access

    Article

    A real-time secret image sharing with fairness

    When traditional secret image sharing techniques reconstructed the secret, they input the shares over t. While less than t shares can know nothing about the secret, the problem arises when there are more than t s...

    Gil-Je Lee, Eun-Jun Yoon, Cheonshik Kim in Journal of Real-Time Image Processing (2018)

  8. No Access

    Article

    Lossless data hiding for absolute moment block truncation coding using histogram modification

    This paper presents a lossless data hiding method for an absolute moment block truncation coding (AMBTC) images, which is a compressed grayscale image. It is not easy to hide secret data in an AMBTC-compresse...

    Cheonshik Kim, Dongkyoo Shin, Lu Leng in Journal of Real-Time Image Processing (2018)

  9. No Access

    Article

    Adaptive real-time reversible data hiding for JPEG images

    Data hiding used to embed data, such as copyright information, into various forms of media such as image, audio, or text with a minimum amount of perceivable degradation to the “host” signal. Therefore, in man...

    Ching-Nung Yang, Cheonshik Kim, Yen-Hung Lo in Journal of Real-Time Image Processing (2018)

  10. No Access

    Article

    Secure medical images based on data hiding using a hybrid scheme with the Hamming code, LSB, and OPAP

    Some medical accidents in hospitals are related to mismanagement of medical images X-ray and computer tomography (CT). A counterfeit medical image leads to medical accidents. Thus, security of medical images i...

    Cheonshik Kim, Dongkyoo Shin, Byung-Gyu Kim in Journal of Real-Time Image Processing (2018)

  11. No Access

    Article

    Dual-source discrimination power analysis for multi-instance contactless palmprint recognition

    Due to the benefits of palmprint recognition and the advantages of biometric fusion systems, it is necessary to study multi-source palmprint fusion systems. Unfortunately, the research on multi-instance palmpr...

    Lu Leng, Ming Li, Cheonshik Kim, Xue Bi in Multimedia Tools and Applications (2017)

  12. No Access

    Article

    Data hiding based on overlapped pixels using hamming code

    Most data hiding schemes change the least significant bits to conceal messages in the cover images. Matrix encoding scheme is a well known scheme in this field. The matrix encoding proposed by Crandall can be ...

    Cheonshik Kim, Ching-Nung Yang in Multimedia Tools and Applications (2016)

  13. No Access

    Article

    An energy-efficient video transport protocol for personal cloud-based computing

    Recently, we are surrounded by a collection of heterogeneous computing devices such as desktop computers, laptops, smart phones, smart televisions, and tablet PCs. Each device is operated with its own host ope...

    **suk Baek, Cheonshik Kim in Journal of Real-Time Image Processing (2016)

  14. No Access

    Article

    Design a new visual cryptography for human-verifiable authentication in accessing a database

    Visual cryptographic scheme (VCS) has an attractive property of decoding that can be performed directly by the human visual system without any computation. This novel stacking-to-see property of VCS can be sec...

    Ching-Nung Yang, Li-Zhe Sun, Xuehu Yan in Journal of Real-Time Image Processing (2016)

  15. Article

    Open Access

    Watermark with DSA signature using predictive coding

    This paper presents a predictor-based watermark scheme that embeds secret bit streams and a DSA signature into an image. For the copyrighting of digital media, a DSA signature is appropriate as a watermarking ...

    Cheonshik Kim, Ching-Nung Yang in Multimedia Tools and Applications (2015)

  16. No Access

    Article

    Data hiding by an improved exploiting modification direction

    This paper represents an improved data hiding scheme, CIE, which uses a codebook to improve the Exploiting Modification Direction (EMD) embedding scheme. In our scheme, one secret (2 n + x ...

    Cheonshik Kim in Multimedia Tools and Applications (2014)

  17. No Access

    Book and Conference Proceedings

    Grid and Pervasive Computing

    8th International Conference, GPC 2013 and Colocated Workshops, Seoul, Korea, May 9-11, 2013. Proceedings

    James J. (Jong Hyuk) Park, Hamid R. Arabnia in Lecture Notes in Computer Science (2013)

  18. No Access

    Chapter and Conference Paper

    New ID-Based Proxy Signature Scheme with Message Recovery

    In 2012, Singh-Verma proposed an ID-based proxy signature scheme with message recovery. Unfortunately, by giving two concrete attacks, Tian et al. showed that Singh-Verma’s scheme is not secure. This paper pro...

    Eun-Jun Yoon, YongSoo Choi, Cheonshik Kim in Grid and Pervasive Computing (2013)

  19. No Access

    Chapter and Conference Paper

    Data Hiding Based on Palette Images Using Weak Bases of Z2-Modules

    Many steganography schemes were invented for the purpose of safe communication. Such previous schemes often show good and reasonable performance, however, few have been based on paletted images; it is not easy...

    Phan Trung Huy, Cheonshik Kim, Nguyen Tuan Anh in Grid and Pervasive Computing (2013)

  20. No Access

    Chapter and Conference Paper

    Architecture of a Context Aware Framework for Automated Mobile Device Configuration

    In this paper an architecture for context aware framework for mobile phones has been represented. The main goal of this proposed architecture is to enable phones to configure themselves based on self-initiated...

    Md. Fazla Rabbi Opu, Emon Biswas, Mansura Habiba in Grid and Pervasive Computing (2013)

previous disabled Page of 2