Hyoung Joong Kim
Hyoung Joong Kim
Professor of Korea University
Email verificata su
Citata da
Citata da
Reversible watermarking algorithm using sorting and prediction
V Sachnev, HJ Kim, J Nam, S Suresh, YQ Shi
IEEE Transactions on Circuits and Systems for Video Technology 19 (7), 989-999, 2009
A novel difference expansion transform for reversible data embedding
HJ Kim, V Sachnev, YQ Shi, J Nam, HG Choo
IEEE Transactions on Information Forensics and Security 3 (3), 456-465, 2008
Modified patchwork algorithm: A novel audio watermarking scheme
IK Yeo, HJ Kim
IEEE Transactions on speech and audio processing 11 (4), 381-386, 2003
No-reference image quality assessment using modified extreme learning machine classifier
S Suresh, RV Babu, HJ Kim
Applied soft computing 9 (2), 541-552, 2009
Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding
X Qu, HJ Kim
Signal Processing 111, 249-260, 2015
Invariant image watermarking based on statistical features in the low-frequency domain
S Xiang, HJ Kim, J Huang
IEEE Transactions on Circuits and Systems for Video Technology 18 (6), 777-790, 2008
A novel echo-hiding scheme with backward and forward kernels
HJ Kim, YH Choi
IEEE transactions on circuits and systems for video technology 13 (8), 885-889, 2003
Reversible data hiding in JPEG images
F Huang, X Qu, HJ Kim, J Huang
IEEE Transactions on Circuits and Systems for Video Technology 26 (9), 1610-1621, 2015
Histogram-based image hashing scheme robust against geometric deformations
S Xiang, HJ Kim, J Huang
Proceedings of the 9th workshop on Multimedia & security, 121-128, 2007
Audio watermarking techniques
HJ Kim, YH Choi, JW Seok, JW Hong
Intelligent Watermarking Techniques, 185-218, 2004
A sequential learning algorithm for self-adaptive resource allocation network classifier
S Suresh, K Dong, HJ Kim
Neurocomputing 73 (16-18), 3012-3019, 2010
Audio watermarking robust against time-scale modification and MP3 compression
S Xiang, HJ Kim, J Huang
Signal Processing 88 (10), 2372-2387, 2008
Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding
V Sachnev, HJ Kim, R Zhang
Proceedings of the 11th ACM Workshop on Multimedia and Security, 131-140, 2009
Apparatus and method for adapting 2d and 3d stereoscopic video signal
JH Nam, JW Hong, HK Kim, RC Kim, NI Cho, JJ Kim, M Kim, HJ Kim
US Patent App. 10/522,209, 2005
Electronic voting service using block-chain
K Lee, JI James, TG Ejeta, HJ Kim
Journal of Digital Forensics, Security and Law 11 (2), 8, 2016
Fast BCH syndrome coding for steganography
R Zhang, V Sachnev, HJ Kim
International Workshop on Information Hiding, 48-58, 2009
Digital Watermarking: 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005, Proceedings
M Barni, I Cox, T Kalker, HJ Kim
Springer, 2005
Optimal load distribution for tree network processors
HJ Kim, GI Jee, JG Lee
IEEE Transactions on Aerospace and Electronic Systems 32 (2), 607-612, 1996
Improved modification direction methods
HJ Kim, C Kim, Y Choi, S Wang, X Zhang
Computers & Mathematics with Applications 60 (2), 319-325, 2010
Reversible watermarking method using optimal histogram pair shifting based on prediction and sorting
HJ Hwang, HJ Kim, V Sachnev, SH Joo
KSII Transactions on Internet and Information Systems (TIIS) 4 (4), 655-670, 2010
Il sistema al momento non pu eseguire l'operazione. Riprova pi tardi.
Articoli 1–20