Cheonshik Kim

According to our database1, Cheonshik Kim authored at least 56 papers between 2005 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Editorial: Recent Advances in Mining Intelligence and Context-Awareness on IoT-Based Platforms.
MONET, 2019

2018
Palmprint recognition system on mobile devices with double-line-single-point assistance.
Personal and Ubiquitous Computing, 2018

Study of detection method for spoofed IP against DDoS attacks.
Personal and Ubiquitous Computing, 2018

Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC.
Personal and Ubiquitous Computing, 2018

Special issue: Advanced technology for smart home automation and entertainment.
Personal and Ubiquitous Computing, 2018

Mining intelligent solution to compensate missing data context of medical IoT devices.
Personal and Ubiquitous Computing, 2018

Adaptive real-time reversible data hiding for JPEG images.
J. Real-Time Image Processing, 2018

A real-time secret image sharing with fairness.
J. Real-Time Image Processing, 2018

Reversible data hiding scheme with edge-direction predictor and modulo operation.
J. Real-Time Image Processing, 2018

Lossless data hiding for absolute moment block truncation coding using histogram modification.
J. Real-Time Image Processing, 2018

Secure medical images based on data hiding using a hybrid scheme with the Hamming code, LSB, and OPAP.
J. Real-Time Image Processing, 2018

Special Issue: Real-Time Data Hiding and Visual Cryptography.
J. Real-Time Image Processing, 2018

Improving capacity of Hamming (n, k)+1 stego-code by using optimized Hamming + k.
Digital Signal Processing, 2018

Separable reversible data hiding in encrypted halftone image.
Displays, 2018

2017
Dual-source discrimination power analysis for multi-instance contactless palmprint recognition.
Multimedia Tools Appl., 2017

A new sharing digital image scheme with clearer shadow images.
Computer Standards & Interfaces, 2017

Improving stego image quality in image interpolation based data hiding.
Computer Standards & Interfaces, 2017

2016
Data hiding based on overlapped pixels using hamming code.
Multimedia Tools Appl., 2016

Design a new visual cryptography for human-verifiable authentication in accessing a database.
J. Real-Time Image Processing, 2016

An energy-efficient video transport protocol for personal cloud-based computing.
J. Real-Time Image Processing, 2016

Secure protection of video recorder video in smart car.
IJDSN, 2016

Implicit Correlation Intensity Mining Based on the Monte Carlo Method with Attenuation.
Proceedings of the International Conference on Identification, 2016

Crowdsourcing Framework for Acoustic Sound Based Obstacle Echolocation through Smartphones for Visually Impaired.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016

2015
(1, 7, 4) Data hiding scheme for searching in hidden text with automata.
Vietnam J. Computer Science, 2015

Watermark with DSA signature using predictive coding.
Multimedia Tools Appl., 2015

2014
Data hiding by an improved exploiting modification direction.
Multimedia Tools Appl., 2014

A secret sharing scheme for EBTC using steganography.
J. Intelligent Manufacturing, 2014

Steganography Based on Grayscale Images Using (5, 3) Hamming Code.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Lossless Data Hiding for Binary Document Images Using n n -Pairs Pattern.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

Improving Data Hiding Capacity Based on Hamming Code.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014

2013
Aspect ratio invariant visual cryptography by image filtering and resizing.
Personal and Ubiquitous Computing, 2013

Data-Hiding for Halftone Images Using an Improved CPT scheme.
TIIS, 2013

Binary Image Data Hiding Using Matrix Encoding Technique in Sensors.
IJDSN, 2013

New ID-Based Proxy Signature Scheme with Message Recovery.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

Architecture of a Context Aware Framework for Automated Mobile Device Configuration.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

Data Hiding Based on Palette Images Using Weak Bases of Z2-Modules.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

2012
Enhanced Matrix-Based Secret Image Sharing Scheme.
IEEE Signal Process. Lett., 2012

An Optimized Sub-texture Mapping Technique for an Arbitrary Texture Considering Topology Relations.
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012

New Electronic Acupuncture System Using Intelligence.
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012

A (2, 2) Secret Sharing Scheme Based on Hamming Code and AMBTC.
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012

2011
Data Hiding in Halftone Images by XOR Block-Wise Operation with Difference Minimization.
TIIS, 2011

Improved Steganographic Embedding Exploiting Modification Direction in Multimedia Communications.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

Data Hiding in a Halftone Image Using Hamming Code (15, 11).
Proceedings of the Intelligent Information and Database Systems, 2011

2010
Data Hiding Based on Compressed Dithering Images.
Proceedings of the Advances in Intelligent Information and Database Systems, 2010

A secure and efficient SIP authentication scheme for converged VoIP networks.
Computer Communications, 2010

Improved modification direction methods.
Computers & Mathematics with Applications, 2010

(N, 1) secret sharing approach based on steganography with gray digital images.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

2009
Optimal green time calculation using artificial intelligence.
Proceedings of the 2009 International Conference on Hybrid Information Technology, 2009

A study on intelligent cyber university.
Proceedings of the 2009 International Conference on Hybrid Information Technology, 2009

2008
Study of Optimal Traffic Information Using Agents Techniques.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2008

2007
Traffic Signal Planning Using a Smart Agent System.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007

2006
Dynamic EPG Implementation for Ubiquitous Environment.
Proceedings of the Ubiquitous Convergence Technology, First International Conference, 2006

Product Control System Using RFID Tag Information and Data Mining.
Proceedings of the Ubiquitous Convergence Technology, First International Conference, 2006

iSCSI Protocol Parameter Optimization for Mobile Appliance Remote Storage System at Smart Home Environment Approach.
Proceedings of the Ubiquitous Convergence Technology, First International Conference, 2006

Personalized E-Learning Process Using Effective Assessment and Feedback.
Proceedings of the Advances in Hybrid Information Technology, 2006

2005
Multiresolution approach for texture segmentation using MRF models.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005


  Loading...