![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Special issue: Advanced technology for smart home automation and entertainment
-
Article
Study of detection method for spoofed IP against DDoS attacks
Cybercriminals are learning to harness the power of simpler devices like connected cameras. In September of 2016, Mirai software was used to infect more than 100,000 devices and unleash one of the largest dist...
-
Article
Mining intelligent solution to compensate missing data context of medical IoT devices
When gathering experimental data generated by medical IoT devices, the perennial problem is missing data due to recording instruments, errors introduced which cause data to be discarded, or the data is missed ...
-
Article
Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC
The problem of digital forgeries has become more and more serious in various fields like entertainment, digital forensics, and journalism. This paper proposes a self-embedding watermarking scheme for the resto...
-
Article
Palmprint recognition system on mobile devices with double-line-single-point assistance
Compared with other biometrics, palmprint has several advantages in authentication on mobile devices. However, some serious challenges severely restrict the development of palmprint recognition on mobile envir...
-
Article
Aspect ratio invariant visual cryptography by image filtering and resizing
In visual cryptographic scheme (VCS), each secret pixel is expanded to m subpixels in shadow images to encrypt a secret image. Apparently, we should put these m subpixels as a rectangle such that the blocks can b...
-
Chapter and Conference Paper
A (2, 2) Secret Sharing Scheme Based on Hamming Code and AMBTC
We present a secret sharing scheme based on absolute moment block truncation coding (AMBTC) and Hamming code theory. AMBTC is composed of bit planes and two representative gray level pixel values, which are th...
-
Chapter and Conference Paper
Data Hiding in a Halftone Image Using Hamming Code (15, 11)
This paper presents a data hiding technique for a halftone image. Each block of halftone bitmaps is transformed into a sequence of binary bits, and then regarded as a codeword. From the codeword, we can get a ...
-
Chapter and Conference Paper
Study of Optimal Traffic Information Using Agents Techniques
Recently in Korea, DMB TPEG service showing the optimal road while esca** the jammed way is popular. Such latest service also provides the traffic information after average 5 minutes of the recent traffic si...
-
Chapter and Conference Paper
iSCSI Protocol Parameter Optimization for Mobile Appliance Remote Storage System at Smart Home Environment Approach
In Mobile appliance, users have a limited amount of storage availability to them due to their limited size and weight. To relieve problem we developed iSCSI remote storage system, which is an excellent solutio...
-
Chapter and Conference Paper
Dynamic EPG Implementation for Ubiquitous Environment
In this paper, we proposed EPG as a suitable method for digital broadcasting in a ubiquitous environment. As an application technique for user custom UI service in a Ubiquitous Environment, a dynamic EPG prese...
-
Chapter and Conference Paper
Product Control System Using RFID Tag Information and Data Mining
In this paper, we suggest a method that applies RFID tag information and a data mining technology to a manufacturing execution system (MES) for efficient process control. The MES is an efficient process contro...
-
Chapter and Conference Paper
Traffic Signal Planning Using a Smart Agent System
The multi-agent systems approach can provide a new desirable solution to the problems of traffic congestion and traffic accidents. Currently, a traffic simulator is needed to understand and explore the difficu...