Ki-Hyun Jung

Orcid: 0000-0002-0662-8355

According to our database1, Ki-Hyun Jung authored at least 51 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Forensic analysis and detection using polycolor model binary pattern for colorized images.
Multim. Tools Appl., April, 2024

2023
Exploring Symmetry in Digital Image Forensics Using a Lightweight Deep-Learning Hybrid Model for Multiple Smoothing Operators.
Symmetry, December, 2023

A Bibliometric Analysis of Convergence of Artificial Intelligence and Blockchain for Edge of Things.
J. Grid Comput., December, 2023

A review of different prediction methods for reversible data hiding.
J. Inf. Secur. Appl., November, 2023

Detecting Images in Two-Operator Series Manipulation: A Novel Approach Using Transposed Convolution and Information Fusion.
Symmetry, October, 2023

An Intelligent Bio-Inspired Autonomous Surveillance System Using Underwater Sensor Networks.
Sensors, September, 2023

Correction to: Enhanced adaptive data hiding method using LSB and pixel value differencing.
Multim. Tools Appl., September, 2023

Dual efficient reversible data hiding using Hamming code and OPAP.
J. Inf. Secur. Appl., August, 2023

Median filtering detection using optimal multi-direction threshold on higher-order difference pixels.
Multim. Tools Appl., 2023

Reversible data hiding with high visual quality using pairwise PVO and PEE.
Multim. Tools Appl., 2023

2022
Reversible Data Hiding Using an Improved Pixel Value Ordering and Complementary Strategy.
Symmetry, 2022

Permissions-Based Detection of Android Malware Using Machine Learning.
Symmetry, 2022

Special issue on emerging technologies for information hiding and forensics in multimedia systems.
Multim. Tools Appl., 2022

Enhanced interpolation-based AMBTC image compression using Weber's law.
Multim. Tools Appl., 2022

Median filtering forensics based on optimum thresholding for low-resolution compressed images.
Multim. Tools Appl., 2022

2021
Intra-Block Correlation Based Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling.
Symmetry, 2021

Enhanced adaptive data hiding method using LSB and pixel value differencing.
Multim. Tools Appl., 2021

Image Forensics using Optimal Normalization in Challenging Environment.
Proceedings of the International Conference on Electronics, Information, and Communication, 2021

2020
I-PVO based high capacity reversible data hiding using bin reservation strategy.
Multim. Tools Appl., 2020

Color image steganography scheme using gray invariant in AMBTC compression domain.
Multidimens. Syst. Signal Process., 2020

Enhanced pairwise IPVO-based reversible data hiding scheme using rhombus context.
Inf. Sci., 2020

Robust reversible data hiding scheme based on two-layer embedding strategy.
Inf. Sci., 2020

Reversible data hiding scheme based on pixel-value differencing in dual images.
Int. J. Distributed Sens. Networks, 2020

2019
Data-Hiding Scheme Using Multidirectional Pixel-Value Differencing on Colour Images.
Secur. Commun. Networks, 2019

A systematic survey on block truncation coding based data hiding techniques.
Multim. Tools Appl., 2019

Enhanced AMBTC based data hiding method using hamming distance and pixel value differencing.
J. Inf. Secur. Appl., 2019

A Study on Machine Learning for Steganalysis.
Proceedings of the 3rd International Conference on Machine Learning and Soft Computing, 2019

2018
Image steganography in spatial domain: A survey.
Signal Process. Image Commun., 2018

Reversible data hiding method using meaningful encrypted images.
Multim. Tools Appl., 2018

A survey of interpolation-based reversible data hiding methods.
Multim. Tools Appl., 2018

Authenticable reversible data hiding scheme with less distortion in dual stego-images.
Multim. Tools Appl., 2018

High-capacity reversible data hiding method using block expansion in digital images.
J. Real Time Image Process., 2018

Data hiding scheme improving embedding capacity using mixed PVD and LSB on bit plane.
J. Real Time Image Process., 2018

Local diagonal extrema number pattern: A new feature descriptor for face recognition.
Future Gener. Comput. Syst., 2018

2017
A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement.
Signal Process. Image Commun., 2017

A high-capacity reversible data hiding scheme based on sorting and prediction in digital images.
Multim. Tools Appl., 2017

An Efficient DWT and Intuitionistic Fuzzy Based Multimodality Medical Image Fusion.
Int. J. Imaging Syst. Technol., 2017

2016
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images.
Symmetry, 2016

Reversible secret image sharing scheme in encrypted images.
Multim. Tools Appl., 2016

2015
High-capacity index based data hiding method.
Multim. Tools Appl., 2015

Steganographic method based on interpolation and LSB substitution of digital images.
Multim. Tools Appl., 2015

2014
Data hiding using edge detector for scalable images.
Multim. Tools Appl., 2014

Data hiding method in binary images based on block masking for key authentication.
Inf. Sci., 2014

Three-Directional Data Hiding Method for Digital Images.
Cryptologia, 2014

2010
Normalized Adaptive Random Test for Integration Tests.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

2009
Data Hiding Method with Quality Control for Binary Images.
J. Softw. Eng. Appl., 2009

Data hiding using run length matching.
Int. J. Intell. Inf. Database Syst., 2009

Data hiding method using image interpolation.
Comput. Stand. Interfaces, 2009

2008
A High Capacity Data Hiding Method Using PVD and LSB.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Improved Data Hiding Method by Block Parity for Binary Images.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
The Hiding of Secret Data Using the Run Length Matching Method.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007


  Loading...