Jin Wook Shin

According to our database1, Jin Wook Shin authored at least 13 papers between 2003 and 2014.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
25.2 A 1.2V 8Gb 8-channel 128GB/s high-bandwidth memory (HBM) stacked DRAM with effective microbump I/O test methods using 29nm process and TSV.
Proceedings of the 2014 IEEE International Conference on Solid-State Circuits Conference, 2014

2010
Effective Fingerprint Quality Estimation for Diverse Capture Sensors.
Sensors, 2010

Contents-based digital image protection using 2-D cellular automata transforms.
IEICE Electron. Express, 2010

Fingerprint Reference Point Determination Based on Orientation Features.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Blind Watermark Scheme Using Cellular Automata Transform.
Proceedings of the 2010 International Conference on Image Processing, 2010

Calculation of Lyapunov Exponent Spectras Based on Different Parameter Sets in the Bonhoeffer-van der Pol Model.
Proceedings of the 2010 International Conference on Scientific Computing, 2010

2006
A novel copyright protection for digital images using extra scrambled information.
Proceedings of the VISAPP 2006: Proceedings of the First International Conference on Computer Vision Theory and Applications, 2006

Fingerprint Matching Using Invariant Moment Features.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

An Image Protection Scheme Using the Wavelet Coefficients Based on Fingerprinting Technique.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2004
Comparing Study for Detecting Microcalcifications in Digital Mammogram Using Wavelets.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2004

Automatic Gateway Selection in Bluetooth Scatternet.
Proceedings of the Embedded and Ubiquitous Computing, 2004

Microcalcifications Detection in Digital Mammogram Using Morphological Bandpass Filters.
Proceedings of the Computational and Information Science, First International Symposium, 2004

2003
New Mechanisms for End-to-End Security Using IPSec in NAT-Based Private Networks.
Proceedings of the Web Communication Technologies and Internet-Related Social Issues, 2003


  Loading...