Skip to main content

previous disabled Page of 4
and
  1. No Access

    Article

    Scenario-based cyber attack·defense education system on virtual machines integrated by web technologies for protection of multimedia contents in a network

    Security issues have been raised with the tremendous growth of social multimedia content evolving content distribution and social interaction. To protect the social multimedia contents in a network, informatio...

    Seongkyu Yeom, Dongil Shin, Dongkyoo Shin in Multimedia Tools and Applications (2021)

  2. No Access

    Chapter and Conference Paper

    High Capacity Data Hiding Based on AMBTC and Interpolation

    Absolute Moment Block Truncation Coding (AMBTC) is a compression method with low complexity and simple computation to easily compress a block. Various AMBTC-like methods have been proposed for develo** data ...

    Cheonshik Kim, Dongkyoo Shin in Security with Intelligent Computing and Bi… (2020)

  3. Article

    Erratum to: Real-time adult authentication scheme for digital contents using X.509 certificate in ubiquitous Web environment

    Jaeil Lee, Inkyung Jeon, Hyuk** Kwon, Dongil Shin in Journal of Real-Time Image Processing (2019)

  4. No Access

    Article

    Generalizing Hamming+k data hiding by overlapped pixels

    Matrix coding based data hiding (MCDH) using linear codes (syndrome coding) is an efficient coding method for steganographic schemes to improve their embedding efficiency. Hamming code data hiding (HDH) is a w...

    Cheonshik Kim, Dongkyoo Shin, Ching-Nung Yang in Multimedia Tools and Applications (2019)

  5. No Access

    Article

    Attack Detection Application with Attack Tree for Mobile System using Log Analysis

    Recently, the use of smart phones has greatly increased because of the development of cheap high-performance hardware. The biggest threat to a smart phone user is the loss of his/her personal information by an...

    Duhoe Kim, Dongil Shin, Dongkyoo Shin, Yong-Hyun Kim in Mobile Networks and Applications (2019)

  6. No Access

    Chapter and Conference Paper

    Cyber Battle Damage Assessment Framework and Detection of Unauthorized Wireless Access Point Using Machine Learning

    Recently, cyber attacks against national institutional information and communication networks have become increasingly intelligent and advanced. Cyber attacks are becoming a serious threat to a nation’s overal...

    Duhoe Kim, Doyeon Kim, Dongil Shin, Dongkyoo Shin, Yong-Hyun Kim in Frontier Computing (2019)

  7. No Access

    Chapter and Conference Paper

    Scenario Based Practical Information Protection Training System Using Virtualization System

    As information and communication technology develops, cyber threats are increasing with convenience. In order to cope with this, research and development of information security training systems is actively be...

    Sungkyu Yeom, Dongil Shin, Dongkyoo Shin in Frontier Computing (2019)

  8. No Access

    Article

    Fast attack detection system using log analysis and attack tree generation

    Many government branches report that internal networks are managed safely by separating them from the outside, but there is often a vulnerability that allows malicious codes to attack an internal network. Rece...

    Duhoe Kim, Yong-Hyun Kim, Dongil Shin, Dongkyoo Shin in Cluster Computing (2019)

  9. No Access

    Article

    Incremental learning method for cyber intelligence, surveillance, and reconnaissance in closed military network using converged IT techniques

    With the development of IT technology, cyber intelligence, surveillance, and reconnaissance (ISR) have become more important than traditional military ISR. In this paper, we propose an effective method to effi...

    Gyeongil Shin, Hosang Yooun, Dongil Shin, DongKyoo Shin in Soft Computing (2018)

  10. No Access

    Article

    Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC

    The problem of digital forgeries has become more and more serious in various fields like entertainment, digital forensics, and journalism. This paper proposes a self-embedding watermarking scheme for the resto...

    Cheonshik Kim, Dongkyoo Shin, Ching-Nung Yang in Personal and Ubiquitous Computing (2018)

  11. No Access

    Article

    Personal search system based on android using lifelog and machine learning

    Lifelog is the foundation on which lifelong services and healthcare services are implemented in a smart home system. It also plays a major role in the sub-processes of the system because it acquires informatio...

    Yun** Nam, Dongkyoo Shin, Dongil Shin in Personal and Ubiquitous Computing (2018)

  12. No Access

    Chapter and Conference Paper

    System Information Comparison and Analysis Technology for Cyber Attacks

    Although info-communication technologies are improving the quality of life, the damage due to insufficient security polices and various and powerful hacking techniques are increasing, affecting the national in...

    Hyeonsu Youn, Duhoe Kim, Yong-Hyun Kim in Advances in Computer Science and Ubiquitou… (2018)

  13. No Access

    Chapter and Conference Paper

    Life Log Collection and Analysis System Using Mobile Device

    With the increase in the number of smartphone users and the penetration rate now exceeding 85%, providing personalized services to individuals with smartphones has become an important research subject. In this...

    Yun** Nam, Dongkyoo Shin, Dongil Shin in Advances in Computer Science and Ubiquitou… (2018)

  14. No Access

    Article

    Real-time adult authentication scheme for digital contents using X.509 certificate in ubiquitous Web environment

    In the ubiquitous Web environment which exploits real-time image processing methods, easy access to a variety of digital contents such as movies, e-books, and digital songs significantly enhances people’s qual...

    Jaeil Lee, Inkyung Jeon, Hyuk** Kwon, Dongil Shin in Journal of Real-Time Image Processing (2018)

  15. No Access

    Chapter and Conference Paper

    Data Set Construction and Performance Comparison of Machine Learning Algorithm for Detection of Unauthorized AP

    With the frequent use of Wi-Fi and hotspots that provide a wireless Internet environment, awareness and threats to wireless AP security are steadily increasing. Especially when using unauthorized APs in compan...

    Doyeon Kim, Dongkyoo Shin, Dongil Shin in Advances in Computer Science and Ubiquitou… (2018)

  16. No Access

    Chapter and Conference Paper

    A Study on Comparison of KDD CUP 99 and NSL-KDD Using Artificial Neural Network

    Computer network face many security problems because various smart devices using computer networks are being developed and are rapidly spreading. Therefore, an Intrusion Detection System (IDS) is necessary for...

    Hyunjung Ji, Donghwa Kim, Dongkyoo Shin in Advances in Computer Science and Ubiquitou… (2018)

  17. No Access

    Chapter and Conference Paper

    Study on Customer Rating Using RFM and K-Means

    The RFM (Recency, Frequency, Monetary) market analysis technique is a widely used in the marketing field to analyze customer behavior. The interest in machine learning has recently increased to utilize the inc...

    Hyunjung Ji, Gyeongil Shin, Dongil Shin in Advances in Computer Science and Ubiquitou… (2018)

  18. No Access

    Article

    Lossless data hiding for absolute moment block truncation coding using histogram modification

    This paper presents a lossless data hiding method for an absolute moment block truncation coding (AMBTC) images, which is a compressed grayscale image. It is not easy to hide secret data in an AMBTC-compresse...

    Cheonshik Kim, Dongkyoo Shin, Lu Leng in Journal of Real-Time Image Processing (2018)

  19. No Access

    Article

    Secure medical images based on data hiding using a hybrid scheme with the Hamming code, LSB, and OPAP

    Some medical accidents in hospitals are related to mismanagement of medical images X-ray and computer tomography (CT). A counterfeit medical image leads to medical accidents. Thus, security of medical images i...

    Cheonshik Kim, Dongkyoo Shin, Byung-Gyu Kim in Journal of Real-Time Image Processing (2018)

  20. No Access

    Article

    Development of emotion recognition interface using complex EEG/ECG bio-signal for interactive contents

    With the changes in the interface paradigm, a user may not be satisfied using only a behavior-based interface such as a mouse and keyboard. In this paper, we propose a real-time user interface with emotion rec...

    Dongmin Shin, Dongil Shin, Dongkyoo Shin in Multimedia Tools and Applications (2017)

previous disabled Page of 4