Heung-Kyu Lee

Orcid: 0000-0002-8119-9407

According to our database1, Heung-Kyu Lee authored at least 157 papers between 1994 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Learning JPEG Compression Artifacts for Image Manipulation Detection and Localization.
Int. J. Comput. Vis., 2022

2021
Deep Convolutional Neural Network for Identifying Seam-Carving Forgery.
IEEE Trans. Circuits Syst. Video Technol., 2021

Discipline vs guidance: comparison of visual engagement approaches in immersive virtual environments.
Multim. Tools Appl., 2021

Dual-path convolutional neural network for classifying fine-grained manipulations in H.264 videos.
Multim. Tools Appl., 2021

Frame-rate Up-conversion Detection Based on Convolutional Neural Network for Learning Spatiotemporal Features.
CoRR, 2021

End-to-End Anti-Forensics Network of Single and Double JPEG Detection.
IEEE Access, 2021

CAT-Net: Compression Artifact Tracing Network for Detection and Localization of Image Splicing.
Proceedings of the IEEE Winter Conference on Applications of Computer Vision, 2021

2020
WAN: Watermarking Attack Network.
CoRR, 2020

BitMix: Data Augmentation for Image Steganalysis.
CoRR, 2020

Manipulation Classification for JPEG Images Using Multi-Domain Features.
IEEE Access, 2020

NSCT-Based Robust and Perceptual Watermarking for DIBR 3D Images.
IEEE Access, 2020

Robust Spherical Panorama Image Watermarking Against Viewpoint Desynchronization.
IEEE Access, 2020

Local-Source Enhanced Residual Network for Steganalysis of Digital Images.
IEEE Access, 2020

2019
Image Recapture Prevention Using Secure Display Schemes on Polarized 3D System.
IEEE Trans. Circuits Syst. Video Technol., 2019

Robust watermarking in curvelet domain for preserving cleanness of high-quality images.
Multim. Tools Appl., 2019

Finding robust domain from attacks: A learning framework for blind watermarking.
Neurocomputing, 2019

Learning deep features for source color laser printer identification based on cascaded learning.
Neurocomputing, 2019

Two-Stream Network for Detecting Double Compression of H.264 Videos.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

Content-Aware Image Resizing Detection Using Deep Neural Network.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

2018
Median Filtered Image Restoration and Anti-Forensics Using Adversarial Networks.
IEEE Signal Process. Lett., 2018

Paired mini-batch training: A new deep network training for image forensics and steganalysis.
Signal Process. Image Commun., 2018

A SIFT features based blind watermarking for DIBR 3D images.
Multim. Tools Appl., 2018

Frame-rate conversion detection based on periodicity of motion artifact.
Multim. Tools Appl., 2018

Cropping-resilient 3D mesh watermarking based on consistent segmentation and mesh steganalysis.
Multim. Tools Appl., 2018

Convolutional Neural Network Architecture for Recovering Watermark Synchronization.
CoRR, 2018

Robust curvelet domain watermarking technique that preserves cleanness of high quality images.
CoRR, 2018

Copyright Protections of Digital Content in the Age of 3D Printer: Emerging Issues and Survey.
IEEE Access, 2018

Spherical Panorama Image Watermarking Using Viewpoint Detection.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

Double JPEG Detection in Mixed JPEG Quality Factors Using Deep Convolutional Neural Network.
Proceedings of the Computer Vision - ECCV 2018, 2018

2017
Blind 3D Mesh Watermarking for 3D Printed Model by Analyzing Layering Artifact.
IEEE Trans. Inf. Forensics Secur., 2017

Detection of Hue Modification Using Photo Response Nonuniformity.
IEEE Trans. Circuits Syst. Video Technol., 2017

DeepPore: Fingerprint Pore Extraction Using Deep Convolutional Neural Networks.
IEEE Signal Process. Lett., 2017

Detecting digital image forgery in near-infrared image of CCTV.
Multim. Tools Appl., 2017

Blind 3D mesh watermarking based on cropping-resilient synchronization.
Multim. Tools Appl., 2017

Enhanced resampling detection based on image correlation of 3D stereoscopic images.
EURASIP J. Image Video Process., 2017

A Robust Blind Watermarking Using Convolutional Neural Network.
CoRR, 2017

Robust 3D Mesh Watermarking Scheme for an Anti-Collusion Fingerprint Code.
Proceedings of the Information Security Applications - 18th International Conference, 2017

Exposing Digital Forgeries by Detecting a Contextual Violation Using Deep Neural Networks.
Proceedings of the Information Security Applications - 18th International Conference, 2017

Detecting composite image manipulation based on deep neural networks.
Proceedings of the International Conference on Systems, Signals and Image Processing, 2017

GAN-D: Generative adversarial networks for image deconvolution.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2017

Improved 3D Mesh Steganalysis Using Homogeneous Kernel Map.
Proceedings of the Information Science and Applications 2017, 2017

Perceptual Watermarking for Stereoscopic 3D Image Based on Visual Discomfort.
Proceedings of the Information Science and Applications 2017, 2017

Fingerprint Spoof Detection Using Contrast Enhancement and Convolutional Neural Networks.
Proceedings of the Information Science and Applications 2017, 2017

Content Recapture Detection Based on Convolutional Neural Networks.
Proceedings of the Information Science and Applications 2017, 2017

Identifying photorealistic computer graphics using convolutional neural networks.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

2016
Blind 3D Mesh Watermarking Based on Sphere-Shape Template.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Secure Image Display through Visual Cryptography: Exploiting Temporal Responsibilities of the Human Eye.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016

2015
Recaptured video detection based on sensor pattern noise.
EURASIP J. Image Video Process., 2015

Robust Imperceptible Video Watermarking for MPEG Compression and DA-AD Conversion Using Visual Masking.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

3D Print-Scan Resilient Watermarking Using a Histogram-Based Circular Shift Coding Structure.
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015

A robust 3D mesh watermarking scheme against cropping.
Proceedings of the 2015 International Conference on 3D Imaging, 2015

2014
Estimation of linear transformation by analyzing the periodicity of interpolation.
Pattern Recognit. Lett., 2014

Detecting Trace of Seam Carving for Forensic Analysis.
IEICE Trans. Inf. Syst., 2014

Fingerprint-PKI authentication using Zernike moments.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

Hue modification estimation using sensor pattern noise.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

Color laser printer identification using photographed halftone images.
Proceedings of the 22nd European Signal Processing Conference, 2014

Robust video watermarking for MPEG compression and DA-AD conversion.
Proceedings of the 1st international workshop on Information hiding and its criteria for evaluation, 2014

2013
Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments.
IEEE Trans. Inf. Forensics Secur., 2013

Detection of Upscale-Crop and Partial Manipulation in Surveillance Video Based on Sensor Pattern Noise.
Sensors, 2013

Color laser printer forensic based on noisy feature and support vector machine classifier.
Multim. Tools Appl., 2013

Rotation-Tolerant Camera Identification Using Optimal Tradeoff Circular Harmonic Function Correlation Filter.
IEICE Trans. Inf. Syst., 2013

2012
Robust DT-CWT Watermarking for DIBR 3D Images.
IEEE Trans. Broadcast., 2012

Screenshot identification by analysis of directional inequality of interlaced video.
EURASIP J. Image Video Process., 2012

Real-time video watermarking system on the compressed domain for high-definition video contents: Practical issues.
Digit. Signal Process., 2012

Stereoscopic watermarking by horizontal noise mean shifting.
Proceedings of the Media Watermarking, 2012

Source camcorder identification from cropped and scaled videos.
Proceedings of the Media Watermarking, 2012

Dual video watermarking for CCL protection and manipulation detection.
Proceedings of the 2012 IEEE International Symposium on Circuits and Systems, 2012

2011
Color Extended Visual Cryptography Using Error Diffusion.
IEEE Trans. Image Process., 2011

CFA pattern identification of digital cameras using intermediate value counting.
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, 2011

Detecting Re-captured Videos Using Shot-Based Photo Response Non-Uniformity.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

Invisible logo watermarking using visualization of spread spectrum signal on high-definition video.
Proceedings of the 7th International Symposium on Image and Signal Processing and Analysis, 2011

Video Watermarking on Overlay Layer.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

Perceptual Watermarking for 3D Stereoscopic Video Using Depth Information.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

A hybrid watermarking scheme for CCL-applied video contents.
Proceedings of the European Workshop on Visual Information Processing, 2011

2010
Digital Cinema Watermarking for Estimating the Position of the Pirate.
IEEE Trans. Multim., 2010

Spatial error concealment technique for losslessly compressed images using data hiding in error-prone channels.
J. Commun. Networks, 2010

Secure Bit-Plane Based Steganography for Secret Communication.
IEICE Trans. Inf. Syst., 2010

Improved Steganographic Method Preserving Pixel-Value Differencing Histogram with Modulus Function.
EURASIP J. Adv. Signal Process., 2010

On classification of source cameras: A graph based approach.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

Screenshot identification using combing artifact from interlaced video.
Proceedings of the Multimedia and Security Workshop, 2010

Color laser printer forensics with noise texture analysis.
Proceedings of the Multimedia and Security Workshop, 2010

Enhancing perceptual quality of watermarked high-definition video through composite mask.
Proceedings of the 2nd International Conference on Image Processing Theory Tools and Applications, 2010

Improved Watermark Estimation Scheme Based on Neighborhood Filter.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Steganalysis Scheme Using the Difference Image of Calibrated Sub-sampling.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Detection of Copy-Rotate-Move Forgery Using Zernike Moments.
Proceedings of the Information Hiding - 12th International Conference, 2010

Source camera identification from significant noise residual regions.
Proceedings of the International Conference on Image Processing, 2010

Scanner identification using spectral noise in the frequency domain.
Proceedings of the International Conference on Image Processing, 2010

Electrophotographic printer identification by halftone texture analysis.
Proceedings of the IEEE International Conference on Acoustics, 2010

2009
DE-Based Reversible Data Hiding With Improved Overflow Location Map.
IEEE Trans. Circuits Syst. Video Technol., 2009

Reversible data hiding exploiting spatial correlation between sub-sampled images.
Pattern Recognit., 2009

Supplementary loss concealment technique for image transmission through data hiding.
Multim. Tools Appl., 2009

Improved watermark synchronization based on local autocorrelation function.
J. Electronic Imaging, 2009

Forensic Tracking Watermarking against In-theater Piracy.
Proceedings of the Information Hiding, 11th International Workshop, 2009

Robust lossless data hiding based on block gravity center for selective authentication.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

Spatial self-synchronizing video watermarking technique.
Proceedings of the International Conference on Image Processing, 2009

Improved watermark detection robust to camcorder capture based on quadrangle estimation.
Proceedings of the International Conference on Image Processing, 2009

Color laser printer identification by analyzing statistical features on discrete wavelet transform.
Proceedings of the International Conference on Image Processing, 2009

2008
Difference Expansion Based Reversible Data Hiding Using Two Embedding Directions.
IEEE Trans. Multim., 2008

Vector Watermarking Robust to Both Global and Local Geometrical Distortions.
IEEE Signal Process. Lett., 2008

Practical, Real-Time, and Robust Watermarking on the Spatial Domain for High-Definition Video Contents.
IEICE Trans. Inf. Syst., 2008

Document Forgery Detection with SVM Classifier and Image Quality Measures.
Proceedings of the Advances in Multimedia Information Processing, 2008

Steganalytic Measures for the Steganography Using Pixel-Value Differencing and Modulus Function.
Proceedings of the Advances in Multimedia Information Processing, 2008

Histogram-based reversible data hiding technique using subsampling.
Proceedings of the 10th workshop on Multimedia & Security, 2008

Watermarking curves using 2D mesh spectral transform.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008

Curve Watermarking Technique for Fingerprinting Digital Maps.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Robust watermark detection against D-A/A-D conversion for digital cinema using local auto-correlation function.
Proceedings of the International Conference on Image Processing, 2008

2007
Geometrically invariant watermarking: synchronization through circular Hough transform.
Multim. Tools Appl., 2007

Error Concealment Technique of Satellite Imagery Transmission through Information Hiding.
IEICE Trans. Inf. Syst., 2007

A Practical Real-Time Video Watermarking Scheme Robust against Downscaling Attack.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

Reversible Data Hiding Using Prediction Error Values Embedding.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

Blind Image Watermarking Scheme in DWT-SVD Domain.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
Web image retrieval using majority-based ranking approach.
Multim. Tools Appl., 2006

Algebraic analysis of the topological properties of a banyan network and its application in fault-tolerant switching networks.
J. Parallel Distributed Comput., 2006

New Digital Fingerprint Code Construction Scheme Using Group-Divisible Design.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

The service curve service discipline for the rate-controlled EDF service discipline in variable-sized packet networks.
Comput. Commun., 2006

Implementation of real-time watermarking scheme for high-quality video.
Proceedings of the 8th workshop on Multimedia & Security, 2006

Real-Time Watermark Embedding for High Resolution Video Watermarking.
Proceedings of the Advances in Information and Computer Security, 2006

Multi Bit Plane Image Steganography.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006

2005
Improved autocorrelation function based watermarking with side information.
J. Electronic Imaging, 2005

Erratum to "Re-ranking algorithm using post-retrieval clustering for content-based image retrieval" [Information Processing and Management 41 (2004) 177-194].
Inf. Process. Manag., 2005

Re-ranking algorithm using post-retrieval clustering for content-based image retrieval.
Inf. Process. Manag., 2005

Image Watermarking Resistant To Combined Geometric And Removal Attacks.
Int. J. Image Graph., 2005

CIGMA: Active Inventory Service in Global E-Market Based on Efficient Catalog Management.
IEICE Trans. Inf. Syst., 2005

Feature-Based Image Watermarking Method Using Scale-Invariant Keypoints.
Proceedings of the Advances in Multimedia Information Processing, 2005

Comparison of Feature Extraction Techniques for Watermark Synchronization.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Zero-Based Code Modulation Technique for Digital Video Fingerprinting.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Evaluation of Feature Extraction Techniques for Robust Watermarking.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

Averaging attack resilient video fingerprinting.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

2004
Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

2003
Invariant image watermark using Zernike moments.
IEEE Trans. Circuits Syst. Video Technol., 2003

Extraction of digital elevation models from satellite stereo images through stereo matching based on epipolarity and scene geometry.
Image Vis. Comput., 2003

A generalized hierarchical fair service curve algorithm for high network utilization and link-sharing.
Comput. Networks, 2003

Autocorrelation-function-based watermarking with side information.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

CIGMA: aCtive inventory service in Global e-MArket Based on Efficient Catalog Management.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

Majority Based Ranking Approach in Web Image Retrieval.
Proceedings of the Image and Video Retrieval, Second International Conference, 2003

2002
BSS: A New Approach for Watermark Attack.
Proceedings of the 4th International Symposium on Multimedia Software Engineering, 2002

Robust Image Watermark Using Radon Transform and Bispectrum Invariants.
Proceedings of the Information Hiding, 5th International Workshop, 2002

The service curve service discipline with the service curve service discipline for the rate-controlled EDF service discipline in variable-sized packet networks [sic].
Proceedings of the IEEE International Conference on Communications, 2002

A Ranking Algorithm Using Dynamic Clustering for Content-Based Image Retrieval.
Proceedings of the Image and Video Retrieval, International Conference, 2002

2001
Access emulation and buffering techniques for streaming of non-stream format video files.
IEEE Trans. Consumer Electron., 2001

MPEG-compliant joint source/channel coding using discrete cosine transform and substream scheduling for visual communication over packet networks.
J. Electronic Imaging, 2001

2000
Block-matching algorithm based on an adaptive reduction of the search area for motion estimation.
Real Time Imaging, 2000

Perceptually tuned robust watermarking scheme for digital images.
Pattern Recognit. Lett., 2000

Digital image watermarking on a special object: the human face.
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000

Adaptive video watermarking using motion information.
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000

Towards Knowledge-Based Extraction of Roads from 1m-Resolution Satellite Images.
Proceedings of the 4th IEEE Southwest Symposium on Image Analysis and Interpretation, 2000

1999
The deflection self-routing Banyan network: a large-scale ATM switch using the fully adaptive self-routing and its performance analyses.
IEEE/ACM Trans. Netw., 1999

A new block-matching algorithm based on an adaptive search area adjustment using spatio-temporal correlation.
IEEE Trans. Consumer Electron., 1999

Performance Evaluation of Non-preemptive Policies for Scheduling Readers and Writers.
ACM SIGOPS Oper. Syst. Rev., 1999

Joint Source/Channel Coding to Maximize Perceptual Video Quality on Packet Networks.
Real Time Imaging, 1999

Implementation of online video-on-demand system over the Internet.
Proceedings of the Color Imaging: Device-Independent Color, 1999

1998
Analysis and Solution of Non-preemptive Policies for Scheduling Readers and Writers.
ACM SIGOPS Oper. Syst. Rev., 1998

Block-matching algorithm based on dynamic adjustment of search window for low bit-rate video coding.
J. Electronic Imaging, 1998

Fuzzy Logic Based Satellite Image Classification: Generation of Fuzzy Membership Function and Rule from Training Set.
Proceedings of IAPR Workshop on Machine Vision Applications, 1998

1996
A prediction-based adaptive location policy for distributed load balancing.
J. Syst. Archit., 1996

1995
The cyclic banyan network: a fault tolerant multistage interconnection network with the fully-adaptive self-routing.
Proceedings of the Seventh IEEE Symposium on Parallel and Distributed Processing, 1995

1994
Ring-Banyan Network: A Faul Tolerant Multistage Interconnection Network and its Fault Diagnosis.
Proceedings of the Dependable Computing, 1994


  Loading...