Skip to main content

Page of 2 next disabled
and
  1. No Access

    Chapter and Conference Paper

    Efficient Facial Features War** Using BSM (Bayesian Shape Model)

    This paper proposes an efficient method for war** facial features. The existing methods use points, which are standard for facial features war**, without the reason or calculation. And existing methods hav...

    Joo-Hyung Kwon, Gye-Young Kim, Youngsong Mun in Computational Science and Its Applications… (2008)

  2. No Access

    Chapter and Conference Paper

    Supporting Address Autoconfiguration for IPv6 in IEEE 802.16e Based Network

    Introduction of IPv6 protocol in IEEE 802.16e based network without any modification could occur many problems due to IEEE 802.16 standard’s point-to-multipoint and connection oriented features and absent of t...

    Kyunghye Lee, Miyoung Kim, Gye-Young Kim in Computational Science and Its Applications… (2008)

  3. No Access

    Chapter and Conference Paper

    Method of Extract Changing Scene in Animation

    In this paper, we propose that method of extract changing scene in animation. A new method differed about attributes of animation based on already exist one. We mix histogram method and block method plus new t...

    Young Jae Park, Youngsong Mun, Keun Su Lee in Computational Science and Its Applications… (2008)

  4. No Access

    Article

    Texture feature-based text region segmentation in social multimedia data

    This paper proposes a method of effectively segmenting text areas that exist in images by using the texture features of various types of input images obtained in social multimedia networks with an artificial n...

    Sul-Ho Kim, Kwon-Jae An, Seok-Woo Jang, Gye-Young Kim in Multimedia Tools and Applications (2016)

  5. No Access

    Chapter and Conference Paper

    Extraction of Camera Parameters for Image-Based Motion Capture

    There are some limitations in acquiring motion data from images without markers. But, low-cost ultra-speed cameras have been commercialized, therefore we can overcome the limitations using ultra-speed cameras....

    Nu-lee Song, Man-ki Kim, Hern-soo Han in Advances in Computer Science and Ubiquitou… (2020)

  6. No Access

    Article

    Pupil detection and gaze tracking using a deformable template

    This paper suggests a method for tracking gaze of a person at a distance around 2 m, using a single pan-tilt-zoom (PTZ) camera. In the suggested method, images are acquired for gaze tracking by turning the cam...

    Gyung-Ju Lee, Seok-Woo Jang, Gye-Young Kim in Multimedia Tools and Applications (2020)

  7. No Access

    Article

    Robust hand pose estimation using visual sensor in IoT environment

    In Internet of Things (IoT) environments, visual sensors with good performance have been used to create and apply various kinds of image data. Particularly, in the field of human–computer interaction, the imag...

    Sul-Ho Kim, Seok-Woo Jang, **-Ho Park, Gye-Young Kim in The Journal of Supercomputing (2020)

  8. No Access

    Chapter and Conference Paper

    Robust 3D Reconstruction Through Noise Reduction of Ultra-Fast Images

    3D reconstruction from multiple view images has been studied extensively in computer vision tasks. In order to increase the accuracy of the 3D reconstruction, it is important to secure the number of image fram...

    Nu-lee Song, **-Ho Park, Gye-Young Kim in Advances in Computer Science and Ubiquitou… (2021)

  9. No Access

    Chapter and Conference Paper

    Generation of Fake Iris Images Using CycleGAN

    With the development of biometric recognition technology, identification of users through biometric information such as iris, fingerprint, and palm print is being applied to many areas. In the case of iris, va...

    Jae-gab Choi, **-Ho Park, Gye-Young Kim in Advances in Computer Science and Ubiquitou… (2021)

  10. No Access

    Chapter and Conference Paper

    Restore Fingerprints Using Pix2Pix

    Previously studied fingerprint readers usually used Minutiae feature. Minutiae uses both directional maps and skeleton images because of its high FMR (False Match Rate). But unlike security attacks on Minutiae...

    Ji-Hwan Moon, **-Ho Park, Gye-Young Kim in Advances in Computer Science and Ubiquitou… (2021)

  11. No Access

    Article

    A Novel Fingerprint Recovery Scheme using Deep Neural Network-based Learning

    Minutiae used in most fingerprint recognition devices is robust to presentation attack, but generates a high false match rate. Thus, it is applied along with orientation map or skeleton images. There has been ...

    Samuel Lee, Seok-Woo Jang, Dongho Kim, Hernsoo Hahn in Multimedia Tools and Applications (2021)

Page of 2 next disabled