Hyunho Kang

According to our database1, Hyunho Kang authored at least 28 papers between 2010 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Collusion Resistant Watermarking for Deep Learning Models Protection.
Proceedings of the 24th International Conference on Advanced Communication Technology, 2022

Print to Scan Resistant Watermarking based on Green Noise Diffusion Method using Machine Learning.
Proceedings of the 24th International Conference on Advanced Communication Technology, 2022

2021
Physical Unclonable Function Using Hartley Oscillator.
Proceedings of the 10th IEEE Global Conference on Consumer Electronics, 2021

2020
Data Augmentation For Deep Learning Using Generative Adversarial Networks.
Proceedings of the 9th IEEE Global Conference on Consumer Electronics, 2020

Physical Unclonable Function Using Carbon Resistor.
Proceedings of the 9th IEEE Global Conference on Consumer Electronics, 2020

Video Tampering Detection based on High-Frequency Features using Machine Learning.
Proceedings of the AICCC 2020: 2020 3rd Artificial Intelligence and Cloud Computing Conference, 2020

Detecting Discrete Cosine Transform-Based Digital Watermarking Insertion Area Using Deep Learning.
Proceedings of the AICCC 2020: 2020 3rd Artificial Intelligence and Cloud Computing Conference, 2020

2018
Detection of Human Motion Gestures Using Machine Learning for Actual Emergency Situations.
Proceedings of the IEEE 7th Global Conference on Consumer Electronics, 2018

2017
Information Hiding and Its Criteria for Evaluation.
IEICE Trans. Inf. Syst., 2017

Digital Watermarking Scheme Based on Machine Learning for the IHC Evaluation Criteria.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017

Direct challenge ring oscillator PUF (DC-ROPUF) with novel response selection.
Proceedings of the IEEE 6th Global Conference on Consumer Electronics, 2017

Searchable encryption of image based on secret sharing scheme.
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017

2016
Image watermarking using the differences between two wavelet filters.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

Privacy-protected video surveillance in crowded environments using robust watermarking.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

Best embedding direction for spread spectrum-based video watermarking.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

2015
Information Hiding Method Using Best DCT and Wavelet Coefficients and ItsWatermark Competition.
Entropy, 2015

Mosaic-based Privacy-protection with Reversible Watermarking.
Proceedings of the SIGMAP 2015, 2015

Audio Watermarking Using Different Wavelet Filters.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

Face anti-spoofing based on image block difference and logistic regression analysis.
Proceedings of the IEEE 5th International Conference on Consumer Electronics - Berlin, 2015

Anti-counterfeiting Using Irregularities of Magnetic Flux Density.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Evaluation of Physical Unclonable Functions for 28-nm Process Field-Programmable Gate Arrays.
J. Inf. Process., 2014

Image Protection System with Steganography and Authentication.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A New Approach to Reversible Watermarking.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Watermarking based on the difference of discrete cosine transform coefficients and an error-correcting code.
Proceedings of the 1st international workshop on Information hiding and its criteria for evaluation, 2014

2013
Secret sharing scheme for cloud computing using IDs.
Proceedings of the IEEE 2nd Global Conference on Consumer Electronics, 2013

A storage-saving secret sharing scheme suitable for sensor networks.
Proceedings of the IEEE 2nd Global Conference on Consumer Electronics, 2013

2011
Pseudo-LFSR PUF: A Compact, Efficient and Reliable Physical Unclonable Function.
Proceedings of the 2011 International Conference on Reconfigurable Computing and FPGAs, 2011

2010
Wolf fingerprints against minutiae count matching systems.
IEICE Electron. Express, 2010


  Loading...