Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    A Novel Fingerprint Recovery Scheme using Deep Neural Network-based Learning

    Minutiae used in most fingerprint recognition devices is robust to presentation attack, but generates a high false match rate. Thus, it is applied along with orientation map or skeleton images. There has been ...

    Samuel Lee, Seok-Woo Jang, Dongho Kim, Hernsoo Hahn in Multimedia Tools and Applications (2021)

  2. No Access

    Chapter and Conference Paper

    Robust 3D Reconstruction Through Noise Reduction of Ultra-Fast Images

    3D reconstruction from multiple view images has been studied extensively in computer vision tasks. In order to increase the accuracy of the 3D reconstruction, it is important to secure the number of image fram...

    Nu-lee Song, **-Ho Park, Gye-Young Kim in Advances in Computer Science and Ubiquitou… (2021)

  3. No Access

    Chapter and Conference Paper

    Generation of Fake Iris Images Using CycleGAN

    With the development of biometric recognition technology, identification of users through biometric information such as iris, fingerprint, and palm print is being applied to many areas. In the case of iris, va...

    Jae-gab Choi, **-Ho Park, Gye-Young Kim in Advances in Computer Science and Ubiquitou… (2021)

  4. No Access

    Chapter and Conference Paper

    Restore Fingerprints Using Pix2Pix

    Previously studied fingerprint readers usually used Minutiae feature. Minutiae uses both directional maps and skeleton images because of its high FMR (False Match Rate). But unlike security attacks on Minutiae...

    Ji-Hwan Moon, **-Ho Park, Gye-Young Kim in Advances in Computer Science and Ubiquitou… (2021)

  5. No Access

    Article

    Robust hand pose estimation using visual sensor in IoT environment

    In Internet of Things (IoT) environments, visual sensors with good performance have been used to create and apply various kinds of image data. Particularly, in the field of human–computer interaction, the imag...

    Sul-Ho Kim, Seok-Woo Jang, **-Ho Park, Gye-Young Kim in The Journal of Supercomputing (2020)

  6. No Access

    Article

    Pupil detection and gaze tracking using a deformable template

    This paper suggests a method for tracking gaze of a person at a distance around 2 m, using a single pan-tilt-zoom (PTZ) camera. In the suggested method, images are acquired for gaze tracking by turning the cam...

    Gyung-Ju Lee, Seok-Woo Jang, Gye-Young Kim in Multimedia Tools and Applications (2020)

  7. No Access

    Chapter and Conference Paper

    Extraction of Camera Parameters for Image-Based Motion Capture

    There are some limitations in acquiring motion data from images without markers. But, low-cost ultra-speed cameras have been commercialized, therefore we can overcome the limitations using ultra-speed cameras....

    Nu-lee Song, Man-ki Kim, Hern-soo Han in Advances in Computer Science and Ubiquitou… (2020)

  8. No Access

    Article

    Texture feature-based text region segmentation in social multimedia data

    This paper proposes a method of effectively segmenting text areas that exist in images by using the texture features of various types of input images obtained in social multimedia networks with an artificial n...

    Sul-Ho Kim, Kwon-Jae An, Seok-Woo Jang, Gye-Young Kim in Multimedia Tools and Applications (2016)

  9. No Access

    Chapter and Conference Paper

    Efficient Facial Features War** Using BSM (Bayesian Shape Model)

    This paper proposes an efficient method for war** facial features. The existing methods use points, which are standard for facial features war**, without the reason or calculation. And existing methods hav...

    Joo-Hyung Kwon, Gye-Young Kim, Youngsong Mun in Computational Science and Its Applications… (2008)

  10. No Access

    Chapter and Conference Paper

    Supporting Address Autoconfiguration for IPv6 in IEEE 802.16e Based Network

    Introduction of IPv6 protocol in IEEE 802.16e based network without any modification could occur many problems due to IEEE 802.16 standard’s point-to-multipoint and connection oriented features and absent of t...

    Kyunghye Lee, Miyoung Kim, Gye-Young Kim in Computational Science and Its Applications… (2008)

  11. No Access

    Chapter and Conference Paper

    Method of Extract Changing Scene in Animation

    In this paper, we propose that method of extract changing scene in animation. A new method differed about attributes of animation based on already exist one. We mix histogram method and block method plus new t...

    Young Jae Park, Youngsong Mun, Keun Su Lee in Computational Science and Its Applications… (2008)

  12. Chapter and Conference Paper

    3D Modeling of the Vessels from X-Ray Angiography

    Coronary artery diseases are usually revealed using X-ray angiographies. Such images are complex to analyze because they provide a 2D projection of a 3D object. Medical diagnosis suffers from inter- and intra-...

    Na-Young Lee, Gye-Young Kim, Hyung-Il Choi in Digital Human Modeling (2007)

  13. No Access

    Chapter and Conference Paper

    Robust Scene Change Detection Algorithm for Flashlights

    Flashlights in video cause abrupt brightness changes of a scene and will be detected as false scene change if not handled properly. So in this paper propose a robust scene change detection algorithm which can ...

    Kyong-Cheol Ko, Young-Min Cheon in Computational Science and Its Applications… (2007)

  14. No Access

    Chapter and Conference Paper

    Image Retrieval Using by Skin Color and Shape Feature

    In this paper, we propose a image retrieval method using skin color feature and shape feature. Section by using a method of snake, consider color information. Section II, image retrieval using by ICSS(Improve ...

    **-Young Park, Gye-Young Kim, Hyung-Il Choi in Computational Science and Its Applications… (2007)

  15. No Access

    Chapter and Conference Paper

    Transmission Rate Prediction of VBR Motion Image Using the Kalman Filter

    We propose a transmission rate prediction method of video data. The proposed method uses a Kalman filter for predicting transmission rate. It used algorithm to detect shot transition information by high speed ...

    Won Kim, Hyo-Jong Jang, Gye-Young Kim in Computational Science and Its Applications… (2006)

  16. No Access

    Chapter and Conference Paper

    Automatic Generation Technique of Three-Dimensional Model Corresponding to Individual Vessels

    We propose a new approach for automatically generating individual vessels to 3D(three-dimensional) model. The modeling process is carried out in two steps. The first step consists of selecting automatically tw...

    Na-Young Lee, Gye-Young Kim, Hyung-Il Choi in Computational Science and Its Applications… (2006)

  17. No Access

    Chapter and Conference Paper

    Wearable Multimodal Interface for Hel** Visually Handicapped Persons

    Handicapped Persons who partially or entirely lose their sensory for external stimuli struggle to lead on daily life due to lack of the ability of sensors. We propose a system to provide alternative sensory fo...

    Byeong-Seok Shin, Honam Ahn, Gye Young Kim in Advances in Artificial Reality and Tele-Ex… (2006)

  18. No Access

    Chapter and Conference Paper

    Video Shot Boundary Detection Algorithm

    We present a newly developed algorithm for automatically segmenting videos into basic shot units. A basic shot unit can be understood as an unbroken sequence of frames taken from one camera. At first we calcul...

    Kyong-Cheol Ko, Young Min Cheon in Computer Vision, Graphics and Image Proces… (2006)

  19. No Access

    Article

    A new incremental watermarking based on dual-tree complex wavelet transform

    This paper proposes a new incremental watermarking technique, which is robust for affine transformation and time-varying according to the degree of distortion, using Dual-Tree Complex Wavelet Transform (DT-CWT...

    Joong-Jae Lee, Won Kim, NA-Young Lee, Gye-Young Kim in The Journal of Supercomputing (2005)

  20. No Access

    Article

    A New Incremental Watermarking Based on Dual-Tree Complex Wavelet Transform

    This paper proposes a new incremental watermarking technique, which is robust for affine transformation and time-varying according to the degree of distortion, using Dual-Tree Complex Wavelet Transform (DT-CWT...

    Joong-Jae Lee, Won Kim, Na-Young Lee, Gye-Young Kim in The Journal of Supercomputing (2005)

previous disabled Page of 2