Skip to main content

and
  1. Article

    Open Access

    User identification system based on 2D CQT spectrogram of EMG with adaptive frequency resolution adjustment

    User identification systems based on electromyogram (EMG) signals, generated inside the body in different signal patterns and exhibiting individual characteristics based on muscle development and activity, are...

    Jae Myung Kim, Gyuho Choi, Sungbum Pan in Scientific Reports (2024)

  2. No Access

    Chapter and Conference Paper

    The New Paradigm of Safe and Sustainable Transportation: Urban Air Mobility

    Urban Air Mobility (UAM) is a revolutionary air transportation system that enables on-demand air travel. To enable successful air transportation, efficient management of large-scale aircraft is a critical fact...

    Muhammad Yeasir Arafat, Sungbum Pan in Frontier Computing on Industrial Applicati… (2024)

  3. Article

    Open Access

    Global experimental verification of Docker-based secured mVoIP to protect against eavesdrop** and DoS attacks

    The cloud-computing paradigm has been driving the cloud-leveraged refactoring of existing information and communications technology services, including voice over IP (VoIP). In this paper, we design a prototyp...

    ByungRae Cha, JongWon Kim, HaeMin Moon in EURASIP Journal on Wireless Communications… (2017)

  4. No Access

    Chapter and Conference Paper

    A Novel Algorithm for Identification of Body Parts in Medical Images

    In this paper, we introduce an algorithm based on energy information obtained from Wavelet Transform for classification of medical images according to imaging modalities and body parts. Various medical image r...

    Jongan Park, Gwangwon Kang, Sungbum Pan in Fuzzy Systems and Knowledge Discovery (2006)

  5. No Access

    Chapter and Conference Paper

    A Hardware Implementation for Fingerprint Retrieval

    Recently, fingerprint has been received considerable attentions as a user authentication technique using biometrics. Fingerprint retrieval, which retrieves a candidate list of fingerprints having similar featu...

    Yongwha Chung, Kichul Kim, Min Kim in Knowledge-Based Intelligent Information an… (2005)

  6. No Access

    Chapter and Conference Paper

    Local and Global Feature Extraction for Face Recognition

    This paper proposes a new feature extraction method for face recognition. The proposed method is based on Local Feature Analysis (LFA). LFA is known as a local method for face recognition since it constructs k...

    Yong** Lee, Kyunghee Lee, Sungbum Pan in Audio- and Video-Based Biometric Person Au… (2005)

  7. No Access

    Chapter and Conference Paper

    Fusion for Multimodal Biometric Identification

    In this paper, we investigate fusion methods for multimodal identification using several unimodal identification results. One fingerprint identification system and two face identification systems are used as f...

    Yong** Lee, Kyunghee Lee, Hyungkeun Jee in Audio- and Video-Based Biometric Person Au… (2005)

  8. No Access

    Chapter and Conference Paper

    Secure and Efficient Transmissions of Fingerprint Images for Embedded Processors

    In this paper, we propose a secure and efficient protocol to transmit fingerprint images from a fingerprint sensor to a client by exploiting characteristics of fingerprint images. To guarantee the integrity/co...

    Daesung Moon, Yongwha Chung, Kiyoung Moon, SungBum Pan in Image Analysis and Recognition (2005)

  9. No Access

    Chapter and Conference Paper

    Local Feature Analysis with Class Information

    In this paper, we propose a new feature extraction method for face recognition. This method is based on Local Feature Analysis (LFA), a local method for face recognition since it constructs kernels detecting l...

    Yong** Lee, Kyunghee Lee, Dosung Ahn in Knowledge-Based Intelligent Information an… (2005)

  10. No Access

    Chapter and Conference Paper

    A Secure Fingerprint Authentication System on an Untrusted Computing Environment

    In this paper, we propose a secure and scalable solution for user authentication by using fingerprint verification on the sensor-client-server model, even with the client that is not necessarily trusted by the...

    Yongwha Chung, Daesung Moon, Taehae Kim in Trust, Privacy, and Security in Digital Bu… (2005)

  11. No Access

    Chapter and Conference Paper

    Hiding Biometric Data for Secure Transmission

    In this paper, we describe biometric watermarking techniques for secure user verification on the remote, multimodal biometric system employing both fingerprint and face information, and compare their effects o...

    Yongwha Chung, Daesung Moon, Kiyoung Moon in Knowledge-Based Intelligent Information an… (2005)

  12. No Access

    Chapter and Conference Paper

    User Enrollment Using Multiple Snapshots of Fingerprint

    As a method of preserving of privacy and the security of sensitive information, biometrics has been studied and used for the past few decades. A number of fingerprint verification approaches have been proposed...

    Younhee Gil, Dosung Ahn, Choonwoo Ryu, Sungbum Pan in Neural Information Processing (2004)

  13. No Access

    Chapter and Conference Paper

    Fingerprint Verification System Involving Smart Card

    The fingerprint has been used as biometrics for user identification and authentication because of its characteristics like uniqueness in that no two fingerprints pair from different fingers is definitely ident...

    Younhee Gil, Daesung Moon, Sungbum Pan in Information Security and Cryptology — ICIS… (2003)