Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    A Novel Fingerprint Recovery Scheme using Deep Neural Network-based Learning

    Minutiae used in most fingerprint recognition devices is robust to presentation attack, but generates a high false match rate. Thus, it is applied along with orientation map or skeleton images. There has been ...

    Samuel Lee, Seok-Woo Jang, Dongho Kim, Hernsoo Hahn in Multimedia Tools and Applications (2021)

  2. No Access

    Article

    Robust hand pose estimation using visual sensor in IoT environment

    In Internet of Things (IoT) environments, visual sensors with good performance have been used to create and apply various kinds of image data. Particularly, in the field of human–computer interaction, the imag...

    Sul-Ho Kim, Seok-Woo Jang, **-Ho Park, Gye-Young Kim in The Journal of Supercomputing (2020)

  3. No Access

    Article

    Pupil detection and gaze tracking using a deformable template

    This paper suggests a method for tracking gaze of a person at a distance around 2 m, using a single pan-tilt-zoom (PTZ) camera. In the suggested method, images are acquired for gaze tracking by turning the cam...

    Gyung-Ju Lee, Seok-Woo Jang, Gye-Young Kim in Multimedia Tools and Applications (2020)

  4. No Access

    Article

    Texture feature-based text region segmentation in social multimedia data

    This paper proposes a method of effectively segmenting text areas that exist in images by using the texture features of various types of input images obtained in social multimedia networks with an artificial n...

    Sul-Ho Kim, Kwon-Jae An, Seok-Woo Jang, Gye-Young Kim in Multimedia Tools and Applications (2016)

  5. No Access

    Chapter and Conference Paper

    Efficient Facial Features War** Using BSM (Bayesian Shape Model)

    This paper proposes an efficient method for war** facial features. The existing methods use points, which are standard for facial features war**, without the reason or calculation. And existing methods hav...

    Joo-Hyung Kwon, Gye-Young Kim, Youngsong Mun in Computational Science and Its Applications… (2008)

  6. No Access

    Chapter and Conference Paper

    Supporting Address Autoconfiguration for IPv6 in IEEE 802.16e Based Network

    Introduction of IPv6 protocol in IEEE 802.16e based network without any modification could occur many problems due to IEEE 802.16 standard’s point-to-multipoint and connection oriented features and absent of t...

    Kyunghye Lee, Miyoung Kim, Gye-Young Kim in Computational Science and Its Applications… (2008)

  7. No Access

    Chapter and Conference Paper

    Method of Extract Changing Scene in Animation

    In this paper, we propose that method of extract changing scene in animation. A new method differed about attributes of animation based on already exist one. We mix histogram method and block method plus new t...

    Young Jae Park, Youngsong Mun, Keun Su Lee in Computational Science and Its Applications… (2008)

  8. Chapter and Conference Paper

    3D Modeling of the Vessels from X-Ray Angiography

    Coronary artery diseases are usually revealed using X-ray angiographies. Such images are complex to analyze because they provide a 2D projection of a 3D object. Medical diagnosis suffers from inter- and intra-...

    Na-Young Lee, Gye-Young Kim, Hyung-Il Choi in Digital Human Modeling (2007)

  9. No Access

    Chapter and Conference Paper

    Robust Scene Change Detection Algorithm for Flashlights

    Flashlights in video cause abrupt brightness changes of a scene and will be detected as false scene change if not handled properly. So in this paper propose a robust scene change detection algorithm which can ...

    Kyong-Cheol Ko, Young-Min Cheon in Computational Science and Its Applications… (2007)

  10. No Access

    Chapter and Conference Paper

    Image Retrieval Using by Skin Color and Shape Feature

    In this paper, we propose a image retrieval method using skin color feature and shape feature. Section by using a method of snake, consider color information. Section II, image retrieval using by ICSS(Improve ...

    **-Young Park, Gye-Young Kim, Hyung-Il Choi in Computational Science and Its Applications… (2007)

  11. No Access

    Chapter and Conference Paper

    Transmission Rate Prediction of VBR Motion Image Using the Kalman Filter

    We propose a transmission rate prediction method of video data. The proposed method uses a Kalman filter for predicting transmission rate. It used algorithm to detect shot transition information by high speed ...

    Won Kim, Hyo-Jong Jang, Gye-Young Kim in Computational Science and Its Applications… (2006)

  12. No Access

    Chapter and Conference Paper

    Automatic Generation Technique of Three-Dimensional Model Corresponding to Individual Vessels

    We propose a new approach for automatically generating individual vessels to 3D(three-dimensional) model. The modeling process is carried out in two steps. The first step consists of selecting automatically tw...

    Na-Young Lee, Gye-Young Kim, Hyung-Il Choi in Computational Science and Its Applications… (2006)

  13. No Access

    Chapter and Conference Paper

    Wearable Multimodal Interface for Hel** Visually Handicapped Persons

    Handicapped Persons who partially or entirely lose their sensory for external stimuli struggle to lead on daily life due to lack of the ability of sensors. We propose a system to provide alternative sensory fo...

    Byeong-Seok Shin, Honam Ahn, Gye Young Kim in Advances in Artificial Reality and Tele-Ex… (2006)

  14. No Access

    Chapter and Conference Paper

    Video Shot Boundary Detection Algorithm

    We present a newly developed algorithm for automatically segmenting videos into basic shot units. A basic shot unit can be understood as an unbroken sequence of frames taken from one camera. At first we calcul...

    Kyong-Cheol Ko, Young Min Cheon in Computer Vision, Graphics and Image Proces… (2006)

  15. No Access

    Article

    A new incremental watermarking based on dual-tree complex wavelet transform

    This paper proposes a new incremental watermarking technique, which is robust for affine transformation and time-varying according to the degree of distortion, using Dual-Tree Complex Wavelet Transform (DT-CWT...

    Joong-Jae Lee, Won Kim, NA-Young Lee, Gye-Young Kim in The Journal of Supercomputing (2005)

  16. No Access

    Article

    A New Incremental Watermarking Based on Dual-Tree Complex Wavelet Transform

    This paper proposes a new incremental watermarking technique, which is robust for affine transformation and time-varying according to the degree of distortion, using Dual-Tree Complex Wavelet Transform (DT-CWT...

    Joong-Jae Lee, Won Kim, Na-Young Lee, Gye-Young Kim in The Journal of Supercomputing (2005)

  17. No Access

    Chapter and Conference Paper

    Flexible Background-Texture Analysis for Coronary Artery Extraction Based on Digital Subtraction Angiography

    Image subtraction makes it possible to enhance the visibility of the difference between two images. This technique has been used in digital subtraction angiography (DSA) that is a well established modality for...

    Sung-Ho Park, Jeong-Hee Cha, Joong-Jae Lee in Computational Science and Its Applications… (2005)

  18. No Access

    Chapter and Conference Paper

    Shot Transition Detection by Compensating for Global and Local Motions

    This paper proposes a method of detecting shot transitions by compensating for motions contained in video sequences. The proposed method detects shot transitions including cuts, fades, and dissolves after comp...

    Seok-Woo Jang, Gye-Young Kim, Hyung-Il Choi in Fuzzy Systems and Knowledge Discovery (2005)

  19. No Access

    Chapter and Conference Paper

    A Shakable Snake for Estimation of Image Contours

    Active contour models are powerful tool for object contour extraction. This paper addresses some problems of conventional snake models, and proposes a shakable snake based on a greedy snake. By using a method ...

    **-Sung Yoon, Joo-Chul Park, Seok-Woo Jang in Computational Science and Its Applications… (2004)

  20. No Access

    Chapter and Conference Paper

    A Robust Watermarking Technique in Geometric Distortion of Digital Image

    Generally, existing watermarking techniques are fragile in geometric distortion and have difficulty in detecting artificial manipulation of digital data. In this paper, we propose a robust watermarking techniq...

    Won Kim, Il-Ju Ko, Na-Young Lee in Computational Science and Its Applications… (2003)

previous disabled Page of 2