Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    Automatic lung segmentation for large-scale medical image management

    Digital medical images assist specialists in improving their diagnostic efficiency and in treating diseases. For example, the chest Computed Tomography (CT) images help in diagnosing the lung disease. The ches...

    Seung-Hoon Chae, Hae-Min Moon, Yongwha Chung in Multimedia Tools and Applications (2016)

  2. No Access

    Article

    A practical implementation of fuzzy fingerprint vault for smart cards

    Biometric-based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as the compromise of the data will be permanent. ...

    Daesung Moon, Yongwha Chung, Changho Seo in Journal of Intelligent Manufacturing (2014)

  3. No Access

    Chapter and Conference Paper

    Quality-Workload Tradeoff in Pig Activity Monitoring Application

    Generally, there is a tradeoff between quality and computational workload required to obtain that quality. In this paper, we focus on practical issues in implementing a pig activity monitoring system. We first...

    Haelyeon Kim, Yeonwoo Chung, Sungju Lee in Mobile, Ubiquitous, and Intelligent Comput… (2014)

  4. No Access

    Chapter and Conference Paper

    Auto-configuration of the Initial Contour Using Level-Set Method for Lung Segmentation on Chest CT Images

    Digital medical images assist specialists in improving their diagnostic efficiency and in treating diseases. For example, the chest Computed Tomography (CT) images help in diagnosing the lung disease. The ches...

    Seung-Hoon Chae, Hae-Min Moon, Yongwha Chung in Frontier and Innovation in Future Computin… (2014)

  5. No Access

    Chapter and Conference Paper

    Power-Time Tradeoff of Parallel Execution on Multi-core Platforms

    It is anticipated that high-performance handheld multi-core devices will be used as WSN processing nodes in the near future. Reducing execution time by deploying parallel applications on multi-core platforms c...

    Sungju Lee, Heegon Kim, Yongwha Chung in Mobile, Ubiquitous, and Intelligent Computing (2014)

  6. No Access

    Chapter and Conference Paper

    Parallel Processing of Multimedia Data in a Heterogeneous Computing Environment

    Recently, many multimedia applications can be parallelized by using multicore platforms such as CPU and GPU. In this paper, we propose a parallel processing approach for a multimedia application by using both ...

    Heegon Kim, Sungju Lee, Yongwha Chung, Daihee Park in Multimedia and Ubiquitous Engineering (2014)

  7. No Access

    Article

    Intelligent video surveillance system using two-factor human information

    Recently, with the increase of terror and crime the utilization of security surveillance systems including CCTV increases. However, the issues of privacy invasion occurred by exposing the data recorded through...

    Hae-Min Moon, Seung-Hoon Chae, Daesung Moon, Yongwha Chung in Telecommunication Systems (2013)

  8. No Access

    Chapter and Conference Paper

    Overcoming Amdahl’s Law by Distributing Workload Asymmetrically

    Recently, many applications can be parallelized by using multicore platforms. In this paper, we propose a load balancing technique in parallelizing an application whose first module has data independency and i...

    Heegon Kim, Sungju Lee, Yongwha Chung in Convergence and Hybrid Information Technology (2012)

  9. No Access

    Book and Conference Proceedings

    Information Security Applications

    11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers

    Yongwha Chung, Moti Yung in Lecture Notes in Computer Science (2011)

  10. No Access

    Chapter and Conference Paper

    Ensuring Confidentiality and Integrity of Multimedia Data on Multi-core Platforms

    SECMPEG selectively encrypts data to protect MPEG video streams with minimum overhead. However, this scheme is known to provide only confidentiality but not integrity for data. In this paper, we apply AES-CCM ...

    Eunji Lee, Sungju Lee, Yongwha Chung in Algorithms and Architectures for Parallel … (2010)

  11. Article

    Open Access

    Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes impor...

    Daesung Moon, Yongwha Chung, Sung Bum Pan in EURASIP Journal on Advances in Signal Proc… (2009)

  12. No Access

    Chapter and Conference Paper

    VLSI Architecture for the Fuzzy Fingerprint Vault with Automatic Alignment Module

    Biometrics-based user authentication has several advantages over the traditional password-based systems for standalone authentication applications. However, security of biometric data is particularly important...

    Sung ** Lim, Seung-Hoon Chae, Deasung Moon, Yongwha Chung in Communication and Networking (2009)

  13. No Access

    Chapter and Conference Paper

    A Network I/O Architecture for Terminal-Initiated Traffics in an Ubiquitous Service Server

    In ubiquitous environment, terminal-initiated traffics(e.g., sensor data streams) will become more popularized than human-initiated traffics(e.g., web browsing, file transfer, and media streaming). The characteri...

    Kyoung Park, Soocheol Oh, Seongwoon Kim in Information Networking. Towards Ubiquitous… (2008)

  14. No Access

    Chapter and Conference Paper

    Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords

    Biometric based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as compromise of the data will be permanent. Cancela...

    Daesung Moon, Sungju Lee, Seunghwan Jung in Information Security Applications (2007)

  15. No Access

    Chapter and Conference Paper

    A VLSI Implementation of Minutiae Extraction for Secure Fingerprint Authentication

    To heighten the biometrics security level, the biometrics feature extraction and verification need to be performed within smart cards, not in external card readers. However, the smart card chip has very limite...

    Sung Bum Pan, Daesung Moon, Kichul Kim in Computational Intelligence and Security (2007)

  16. No Access

    Chapter and Conference Paper

    Energy-Efficient Transmissions of Fingerprint Images Using Both Encryption and Fingerprinting Techniques

    As user authentication by using biometric information such as fingerprint has been widely accepted, there has been a growing interest in protecting the biometric information itself against external attackers. Esp...

    Hakjae Kim, Sungju Lee, Daesung Moon in Advanced Intelligent Computing Theories an… (2007)

  17. No Access

    Chapter and Conference Paper

    Protecting Secret Keys with Fuzzy Fingerprint Vault Based on a 3D Geometric Hash Table

    Biometrics-based user authentication has several advantages over traditional password-based systems for standalone authentication applications such as home networks. This is also true for new authentication ar...

    Sungju Lee, Daesung Moon, Seunghwan Jung in Adaptive and Natural Computing Algorithms (2007)

  18. No Access

    Chapter and Conference Paper

    Feature Distribution of the Fingerprint Template Generated by the Geometric Hashing-Based Fuzzy Vault

    Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems, and some implementations for fingerprint have been reported to protect the stored fingerprint template by h...

    Sungju Lee, Daesung Moon, Yongwha Chung in Knowledge-Based Intelligent Information an… (2007)

  19. No Access

    Chapter and Conference Paper

    Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification

    Verification of a person’s identity using fingerprint has several advantages over the present practices of Personal Identification Numbers(PINs) and passwords. Also, as the VLSI technology has been improved, t...

    Byungkwan Park, Daesung Moon, Yongwha Chung in Information Security Applications (2007)

  20. No Access

    Chapter and Conference Paper

    Fingerprint Template Protection Using Fuzzy Vault

    Biometric-based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as the compromise of the data will be permanent. ...

    Daesung Moon, Sungju Lee, Seunghwan Jung in Computational Science and Its Applications… (2007)

previous disabled Page of 2