Cheonshik Kim

Orcid: 0000-0002-5847-6736

Affiliations:
  • Sejong University, Seoul, Republic of Korea


According to our database1, Cheonshik Kim authored at least 67 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An enhanced AMBTC for color image compression using color palette.
Multim. Tools Appl., March, 2024

2023
Intelligent analysis system of college students' employment and entrepreneurship situation: Big data and artificial intelligence-driven approach.
Comput. Electr. Eng., September, 2023

Dual efficient reversible data hiding using Hamming code and OPAP.
J. Inf. Secur. Appl., August, 2023

Intelligent aerial video streaming: Achievements and challenges.
J. Netw. Comput. Appl., February, 2023

2021
Intragroup and intergroup secret image sharing based on homomorphic Lagrange interpolation.
J. Inf. Secur. Appl., 2021

2020
A Light-Weight Practical Framework for Feces Detection and Trait Recognition.
Sensors, 2020

Introduction to the special issue on deep learning for real-time information hiding and forensics.
J. Real Time Image Process., 2020

2019
Enhanced stego-image quality and embedding capacity for the partial reversible data hiding scheme.
Multim. Tools Appl., 2019

Generalizing Hamming+k data hiding by overlapped pixels.
Multim. Tools Appl., 2019

Editorial: Recent Advances in Mining Intelligence and Context-Awareness on IoT-Based Platforms.
Mob. Networks Appl., 2019

Exploiting error control in matrix coding-based data hiding over lossy channel.
J. Real Time Image Process., 2019

Data Hiding Using Sequential Hamming + k with m Overlapped Pixels.
KSII Trans. Internet Inf. Syst., 2019

2018
Palmprint recognition system on mobile devices with double-line-single-point assistance.
Pers. Ubiquitous Comput., 2018

Study of detection method for spoofed IP against DDoS attacks.
Pers. Ubiquitous Comput., 2018

Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC.
Pers. Ubiquitous Comput., 2018

Special issue: Advanced technology for smart home automation and entertainment.
Pers. Ubiquitous Comput., 2018

Mining intelligent solution to compensate missing data context of medical IoT devices.
Pers. Ubiquitous Comput., 2018

Adaptive real-time reversible data hiding for JPEG images.
J. Real Time Image Process., 2018

A real-time secret image sharing with fairness.
J. Real Time Image Process., 2018

Reversible data hiding scheme with edge-direction predictor and modulo operation.
J. Real Time Image Process., 2018

Lossless data hiding for absolute moment block truncation coding using histogram modification.
J. Real Time Image Process., 2018

Secure medical images based on data hiding using a hybrid scheme with the Hamming code, LSB, and OPAP.
J. Real Time Image Process., 2018

Special Issue: Real-Time Data Hiding and Visual Cryptography.
J. Real Time Image Process., 2018

Improving capacity of Hamming (<i>n</i>, <i>k</i>)+1 stego-code by using optimized Hamming + <i>k</i>.
Digit. Signal Process., 2018

Separable reversible data hiding in encrypted halftone image.
Displays, 2018

2017
Dual-source discrimination power analysis for multi-instance contactless palmprint recognition.
Multim. Tools Appl., 2017

A new sharing digital image scheme with clearer shadow images.
Comput. Stand. Interfaces, 2017

Improving stego image quality in image interpolation based data hiding.
Comput. Stand. Interfaces, 2017

2016
Data hiding based on overlapped pixels using hamming code.
Multim. Tools Appl., 2016

Design a new visual cryptography for human-verifiable authentication in accessing a database.
J. Real Time Image Process., 2016

An energy-efficient video transport protocol for personal cloud-based computing.
J. Real Time Image Process., 2016

Secure protection of video recorder video in smart car.
Int. J. Distributed Sens. Networks, 2016

Implicit Correlation Intensity Mining Based on the Monte Carlo Method with Attenuation.
Proceedings of the International Conference on Identification, 2016

Crowdsourcing Framework for Acoustic Sound Based Obstacle Echolocation through Smartphones for Visually Impaired.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016

2015
(1, 7, 4) Data hiding scheme for searching in hidden text with automata.
Vietnam. J. Comput. Sci., 2015

Watermark with DSA signature using predictive coding.
Multim. Tools Appl., 2015

2014
Data hiding by an improved exploiting modification direction.
Multim. Tools Appl., 2014

A secret sharing scheme for EBTC using steganography.
J. Intell. Manuf., 2014

Steganography Based on Grayscale Images Using (5, 3) Hamming Code.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Lossless Data Hiding for Binary Document Images Using n n -Pairs Pattern.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

Improving Data Hiding Capacity Based on Hamming Code.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014

2013
Aspect ratio invariant visual cryptography by image filtering and resizing.
Pers. Ubiquitous Comput., 2013

Data-Hiding for Halftone Images Using an Improved CPT scheme.
KSII Trans. Internet Inf. Syst., 2013

Binary Image Data Hiding Using Matrix Encoding Technique in Sensors.
Int. J. Distributed Sens. Networks, 2013

New ID-Based Proxy Signature Scheme with Message Recovery.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

Architecture of a Context Aware Framework for Automated Mobile Device Configuration.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

Data Hiding Based on Palette Images Using Weak Bases of Z2-Modules.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

2012
Enhanced Matrix-Based Secret Image Sharing Scheme.
IEEE Signal Process. Lett., 2012

An Optimized Sub-texture Mapping Technique for an Arbitrary Texture Considering Topology Relations.
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012

New Electronic Acupuncture System Using Intelligence.
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012

A (2, 2) Secret Sharing Scheme Based on Hamming Code and AMBTC.
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012

2011
Data Hiding in Halftone Images by XOR Block-Wise Operation with Difference Minimization.
KSII Trans. Internet Inf. Syst., 2011

Improved Steganographic Embedding Exploiting Modification Direction in Multimedia Communications.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

Data Hiding in a Halftone Image Using Hamming Code (15, 11).
Proceedings of the Intelligent Information and Database Systems, 2011

2010
Data Hiding Based on Compressed Dithering Images.
Proceedings of the Advances in Intelligent Information and Database Systems, 2010

A secure and efficient SIP authentication scheme for converged VoIP networks.
Comput. Commun., 2010

Improved modification direction methods.
Comput. Math. Appl., 2010

(N, 1) secret sharing approach based on steganography with gray digital images.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

2009
Optimal green time calculation using artificial intelligence.
Proceedings of the 2009 International Conference on Hybrid Information Technology, 2009

A study on intelligent cyber university.
Proceedings of the 2009 International Conference on Hybrid Information Technology, 2009

2008
Study of Optimal Traffic Information Using Agents Techniques.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2008

2007
Traffic Signal Planning Using a Smart Agent System.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007

2006
Dynamic EPG Implementation for Ubiquitous Environment.
Proceedings of the Ubiquitous Convergence Technology, First International Conference, 2006

Product Control System Using RFID Tag Information and Data Mining.
Proceedings of the Ubiquitous Convergence Technology, First International Conference, 2006

iSCSI Protocol Parameter Optimization for Mobile Appliance Remote Storage System at Smart Home Environment Approach.
Proceedings of the Ubiquitous Convergence Technology, First International Conference, 2006

Personalized E-Learning Process Using Effective Assessment and Feedback.
Proceedings of the Advances in Hybrid Information Technology, 2006

2005
Multiresolution approach for texture segmentation using MRF models.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005


  Loading...