Skip to main content

and
  1. No Access

    Book and Conference Proceedings

    Information Security Applications

    11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers

    Yongwha Chung, Moti Yung in Lecture Notes in Computer Science (2011)

  2. No Access

    Chapter and Conference Paper

    Ensuring Confidentiality and Integrity of Multimedia Data on Multi-core Platforms

    SECMPEG selectively encrypts data to protect MPEG video streams with minimum overhead. However, this scheme is known to provide only confidentiality but not integrity for data. In this paper, we apply AES-CCM ...

    Eunji Lee, Sungju Lee, Yongwha Chung in Algorithms and Architectures for Parallel … (2010)

  3. No Access

    Chapter and Conference Paper

    Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords

    Biometric based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as compromise of the data will be permanent. Cancela...

    Daesung Moon, Sungju Lee, Seunghwan Jung in Information Security Applications (2007)

  4. No Access

    Chapter and Conference Paper

    A VLSI Implementation of Minutiae Extraction for Secure Fingerprint Authentication

    To heighten the biometrics security level, the biometrics feature extraction and verification need to be performed within smart cards, not in external card readers. However, the smart card chip has very limite...

    Sung Bum Pan, Daesung Moon, Kichul Kim in Computational Intelligence and Security (2007)

  5. No Access

    Chapter and Conference Paper

    Protecting Secret Keys with Fuzzy Fingerprint Vault Based on a 3D Geometric Hash Table

    Biometrics-based user authentication has several advantages over traditional password-based systems for standalone authentication applications such as home networks. This is also true for new authentication ar...

    Sungju Lee, Daesung Moon, Seunghwan Jung in Adaptive and Natural Computing Algorithms (2007)

  6. No Access

    Chapter and Conference Paper

    Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification

    Verification of a person’s identity using fingerprint has several advantages over the present practices of Personal Identification Numbers(PINs) and passwords. Also, as the VLSI technology has been improved, t...

    Byungkwan Park, Daesung Moon, Yongwha Chung in Information Security Applications (2007)

  7. No Access

    Chapter and Conference Paper

    Performance Evaluation of Watermarking Techniques for Secure Multimodal Biometric Systems

    In this paper, we describe various watermarking techniques for secure user verification in the remote, multimodal biometric systems employing both fingerprint and face information, and compare their effects on...

    Daesung Moon, Taehae Kim, SeungHwan Jung in Computational Intelligence and Security (2005)

  8. No Access

    Chapter and Conference Paper

    Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault

    Biometrics-based user authentication has several advantages over traditional password-based systems for standalone authentication applications. This is also true for new authentication architectures known as cryp...

    Yongwha Chung, Daesung Moon, Sungju Lee in Information Security and Cryptology (2005)

  9. No Access

    Chapter and Conference Paper

    Fingerprint-Based Authentication for USB Token Systems

    In the modern electronic world, the authentication of a person is an important task in many areas of day-to-day. Using biometrics to authenticate a person’s identity has several advantages over the present pra...

    Daesung Moon, Youn Hee Gil, Dosung Ahn, Sung Bum Pan in Information Security Applications (2004)

  10. No Access

    Chapter and Conference Paper

    User Enrollment Using Multiple Snapshots of Fingerprint

    As a method of preserving of privacy and the security of sensitive information, biometrics has been studied and used for the past few decades. A number of fingerprint verification approaches have been proposed...

    Younhee Gil, Dosung Ahn, Choonwoo Ryu, Sungbum Pan in Neural Information Processing (2004)

  11. No Access

    Chapter and Conference Paper

    Fingerprint Verification System Involving Smart Card

    The fingerprint has been used as biometrics for user identification and authentication because of its characteristics like uniqueness in that no two fingerprints pair from different fingers is definitely ident...

    Younhee Gil, Daesung Moon, Sungbum Pan in Information Security and Cryptology — ICIS… (2003)

  12. No Access

    Chapter and Conference Paper

    Solving Irregular Inter-processor Data Dependency in Image Understanding Tasks

    It is challenging to parallelize the problems with irregular computation and communication. In this paper, we proposed a scalable and efficient algorithm for solving irregular inter-processor data dependency i...

    Yongwha Chung, **-Won Park in Parallel Computation (1999)