Skip to main content

and
  1. No Access

    Article

    Special issue: Advanced technology for smart home automation and entertainment

    Cheonshik Kim, Bryan (B.-G.) Kim in Personal and Ubiquitous Computing (2018)

  2. No Access

    Article

    Study of detection method for spoofed IP against DDoS attacks

    Cybercriminals are learning to harness the power of simpler devices like connected cameras. In September of 2016, Mirai software was used to infect more than 100,000 devices and unleash one of the largest dist...

    Yong-Joon Lee, Nam-Kyun Baik, Cheonshik Kim in Personal and Ubiquitous Computing (2018)

  3. No Access

    Article

    Mining intelligent solution to compensate missing data context of medical IoT devices

    When gathering experimental data generated by medical IoT devices, the perennial problem is missing data due to recording instruments, errors introduced which cause data to be discarded, or the data is missed ...

    Paul S. Fisher, Jimmy James II, **suk Baek in Personal and Ubiquitous Computing (2018)

  4. No Access

    Article

    Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC

    The problem of digital forgeries has become more and more serious in various fields like entertainment, digital forensics, and journalism. This paper proposes a self-embedding watermarking scheme for the resto...

    Cheonshik Kim, Dongkyoo Shin, Ching-Nung Yang in Personal and Ubiquitous Computing (2018)

  5. No Access

    Article

    Palmprint recognition system on mobile devices with double-line-single-point assistance

    Compared with other biometrics, palmprint has several advantages in authentication on mobile devices. However, some serious challenges severely restrict the development of palmprint recognition on mobile envir...

    Lu Leng, Fumeng Gao, Qi Chen, Cheonshik Kim in Personal and Ubiquitous Computing (2018)

  6. No Access

    Article

    Aspect ratio invariant visual cryptography by image filtering and resizing

    In visual cryptographic scheme (VCS), each secret pixel is expanded to m subpixels in shadow images to encrypt a secret image. Apparently, we should put these m subpixels as a rectangle such that the blocks can b...

    Ching-Nung Yang, Pin-Wei Chen, Hsiang-Wen Shih in Personal and Ubiquitous Computing (2013)

  7. No Access

    Chapter and Conference Paper

    A (2, 2) Secret Sharing Scheme Based on Hamming Code and AMBTC

    We present a secret sharing scheme based on absolute moment block truncation coding (AMBTC) and Hamming code theory. AMBTC is composed of bit planes and two representative gray level pixel values, which are th...

    Cheonshik Kim, Dongkyoo Shin, Dongil Shin in Intelligent Information and Database Syste… (2012)

  8. No Access

    Chapter and Conference Paper

    Data Hiding in a Halftone Image Using Hamming Code (15, 11)

    This paper presents a data hiding technique for a halftone image. Each block of halftone bitmaps is transformed into a sequence of binary bits, and then regarded as a codeword. From the codeword, we can get a ...

    Cheonshik Kim, Dongkyoo Shin, Dongil Shin in Intelligent Information and Database Systems (2011)

  9. No Access

    Chapter and Conference Paper

    Study of Optimal Traffic Information Using Agents Techniques

    Recently in Korea, DMB TPEG service showing the optimal road while esca** the jammed way is popular. Such latest service also provides the traffic information after average 5 minutes of the recent traffic si...

    You-Sik Hong, CheonShik Kim, Geuk Lee in Agent and Multi-Agent Systems: Technologie… (2008)

  10. No Access

    Chapter and Conference Paper

    iSCSI Protocol Parameter Optimization for Mobile Appliance Remote Storage System at Smart Home Environment Approach

    In Mobile appliance, users have a limited amount of storage availability to them due to their limited size and weight. To relieve problem we developed iSCSI remote storage system, which is an excellent solutio...

    Shaikh Muhammad Allayear, Sung Soon Park in Ubiquitous Convergence Technology (2007)

  11. No Access

    Chapter and Conference Paper

    Dynamic EPG Implementation for Ubiquitous Environment

    In this paper, we proposed EPG as a suitable method for digital broadcasting in a ubiquitous environment. As an application technique for user custom UI service in a Ubiquitous Environment, a dynamic EPG prese...

    In Jung Park, Duck Je Park, Cheonshik Kim in Ubiquitous Convergence Technology (2007)

  12. No Access

    Chapter and Conference Paper

    Product Control System Using RFID Tag Information and Data Mining

    In this paper, we suggest a method that applies RFID tag information and a data mining technology to a manufacturing execution system (MES) for efficient process control. The MES is an efficient process contro...

    Cheonshik Kim, San-Yep Nam, Duk-Je Park, Injung Park in Ubiquitous Convergence Technology (2007)

  13. No Access

    Chapter and Conference Paper

    Traffic Signal Planning Using a Smart Agent System

    The multi-agent systems approach can provide a new desirable solution to the problems of traffic congestion and traffic accidents. Currently, a traffic simulator is needed to understand and explore the difficu...

    You-Sik Hong, Geuk Lee, Cheonshik Kim in Agent and Multi-Agent Systems: Technologie… (2007)