Skip to main content

and
  1. No Access

    Article

    Automatic lung segmentation for large-scale medical image management

    Digital medical images assist specialists in improving their diagnostic efficiency and in treating diseases. For example, the chest Computed Tomography (CT) images help in diagnosing the lung disease. The ches...

    Seung-Hoon Chae, Hae-Min Moon, Yongwha Chung in Multimedia Tools and Applications (2016)

  2. No Access

    Chapter and Conference Paper

    Auto-configuration of the Initial Contour Using Level-Set Method for Lung Segmentation on Chest CT Images

    Digital medical images assist specialists in improving their diagnostic efficiency and in treating diseases. For example, the chest Computed Tomography (CT) images help in diagnosing the lung disease. The ches...

    Seung-Hoon Chae, Hae-Min Moon, Yongwha Chung in Frontier and Innovation in Future Computin… (2014)

  3. No Access

    Article

    Intelligent video surveillance system using two-factor human information

    Recently, with the increase of terror and crime the utilization of security surveillance systems including CCTV increases. However, the issues of privacy invasion occurred by exposing the data recorded through...

    Hae-Min Moon, Seung-Hoon Chae, Daesung Moon, Yongwha Chung in Telecommunication Systems (2013)

  4. No Access

    Chapter and Conference Paper

    Overcoming Amdahl’s Law by Distributing Workload Asymmetrically

    Recently, many applications can be parallelized by using multicore platforms. In this paper, we propose a load balancing technique in parallelizing an application whose first module has data independency and i...

    Heegon Kim, Sungju Lee, Yongwha Chung in Convergence and Hybrid Information Technology (2012)

  5. No Access

    Book and Conference Proceedings

    Information Security Applications

    11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers

    Yongwha Chung, Moti Yung in Lecture Notes in Computer Science (2011)

  6. No Access

    Chapter and Conference Paper

    VLSI Architecture for the Fuzzy Fingerprint Vault with Automatic Alignment Module

    Biometrics-based user authentication has several advantages over the traditional password-based systems for standalone authentication applications. However, security of biometric data is particularly important...

    Sung ** Lim, Seung-Hoon Chae, Deasung Moon, Yongwha Chung in Communication and Networking (2009)

  7. No Access

    Chapter and Conference Paper

    A Network I/O Architecture for Terminal-Initiated Traffics in an Ubiquitous Service Server

    In ubiquitous environment, terminal-initiated traffics(e.g., sensor data streams) will become more popularized than human-initiated traffics(e.g., web browsing, file transfer, and media streaming). The characteri...

    Kyoung Park, Soocheol Oh, Seongwoon Kim in Information Networking. Towards Ubiquitous… (2008)

  8. No Access

    Chapter and Conference Paper

    Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords

    Biometric based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as compromise of the data will be permanent. Cancela...

    Daesung Moon, Sungju Lee, Seunghwan Jung in Information Security Applications (2007)

  9. No Access

    Chapter and Conference Paper

    Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification

    Verification of a person’s identity using fingerprint has several advantages over the present practices of Personal Identification Numbers(PINs) and passwords. Also, as the VLSI technology has been improved, t...

    Byungkwan Park, Daesung Moon, Yongwha Chung in Information Security Applications (2007)

  10. No Access

    Chapter and Conference Paper

    Secure Remote Fingerprint Verification Using Dual Watermarks

    As user authentication by using biometric information such as fingerprint has been widely accepted, there has been a growing interest in protecting the biometric information itself against external attackers. ...

    Taehae Kim, Yongwha Chung, Seunghwan Jung in Digital Rights Management. Technologies, I… (2006)

  11. No Access

    Chapter and Conference Paper

    Workload Dispatch Planning for Real-Time Fingerprint Authentication on a Sensor-Client-Server Model

    In this paper, we analyzed the collective performance of the task assignment of the fingerprint authentication on the sensor-client-server model. We first estimated the performance of primitive operations on t...

    Yongwha Chung, Daesung Moon, Taehae Kim in Parallel and Distributed Computing: Applic… (2005)

  12. No Access

    Chapter and Conference Paper

    Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault

    Biometrics-based user authentication has several advantages over traditional password-based systems for standalone authentication applications. This is also true for new authentication architectures known as cryp...

    Yongwha Chung, Daesung Moon, Sungju Lee in Information Security and Cryptology (2005)

  13. No Access

    Chapter and Conference Paper

    A Secure Fingerprint Authentication System on an Untrusted Computing Environment

    In this paper, we propose a secure and scalable solution for user authentication by using fingerprint verification on the sensor-client-server model, even with the client that is not necessarily trusted by the...

    Yongwha Chung, Daesung Moon, Taehae Kim in Trust, Privacy, and Security in Digital Bu… (2005)

  14. No Access

    Chapter and Conference Paper

    Fingerprint-Based Authentication for USB Token Systems

    In the modern electronic world, the authentication of a person is an important task in many areas of day-to-day. Using biometrics to authenticate a person’s identity has several advantages over the present pra...

    Daesung Moon, Youn Hee Gil, Dosung Ahn, Sung Bum Pan in Information Security Applications (2004)

  15. No Access

    Chapter and Conference Paper

    An Experimental Study on Measuring Image Quality of Infant Fingerprints

    The performance of fingerprint recognition algorithms depends on quality of input fingerprint images. This dependency becomes more apparent for infant fingerprints that are smaller than adult fingerprints. Thi...

    Sungwook Joun, Hakil Kim, Yongwha Chung in Knowledge-Based Intelligent Information an… (2003)

  16. No Access

    Chapter and Conference Paper

    Fingerprint Verification System Involving Smart Card

    The fingerprint has been used as biometrics for user identification and authentication because of its characteristics like uniqueness in that no two fingerprints pair from different fingers is definitely ident...

    Younhee Gil, Daesung Moon, Sungbum Pan in Information Security and Cryptology — ICIS… (2003)