Yongwha Chung

Orcid: 0000-0001-6539-167X

According to our database1, Yongwha Chung authored at least 94 papers between 1996 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Behavior-Based Video Summarization System for Dog Health and Welfare Monitoring.
Sensors, March, 2023

2022
Multi-level Hierarchical Complex Behavior Monitoring System for Dog Psychological Separation Anxiety Symptoms.
Sensors, 2022

StaticPigDet: Accuracy Improvement of Static Camera-Based Pig Monitoring Using Background and Facility Information.
Sensors, 2022

EmbeddedPigCount: Pig Counting with Video Object Detection and Tracking on an Embedded Board.
Sensors, 2022

GAN-Based Video Denoising with Attention Mechanism for Field-Applicable Pig Detection System.
Sensors, 2022

2019
Fast Pig Detection with a Top-View Camera under Various Illumination Conditions.
Symmetry, 2019

Practical Monitoring of Undergrown Pigs for IoT-Based Large-Scale Smart Farm.
IEEE Access, 2019

A YOLO-based Separation of Touching-Pigs for Smart Pig Farm Applications.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

2018
Noise-Robust Sound-Event Classification System with Texture Analysis.
Symmetry, 2018

Resource-Efficient Pet Dog Sound Events Classification Using LSTM-FCN Based on Time-Series Data.
Sensors, 2018

A Kinect-Based Segmentation of Touching-Pigs for Real-Time Monitoring.
Sensors, 2018

CPU-GPU heterogeneous implementations of depth-based foreground detection.
IEICE Electron. Express, 2018

2017
Aging Detection of Electrical Point Machines Based on Support Vector Data Description.
Symmetry, 2017

Replacement Condition Detection of Railway Point Machines Using an Electric Current Sensor.
Sensors, 2017

Depth-Based Detection of Standing-Pigs in Moving Noise Environments.
Sensors, 2017

Real-time processing for intelligent-surveillance applications.
IEICE Electron. Express, 2017

Lying-Pig Detection using Depth Information.
Proceedings of the International Conference on Algorithms, Computing and Systems, Jeju Island, Republic of Korea, August 10, 2017

Touching-Pigs Segmentation using Concave Points in Continuous Video Frames.
Proceedings of the International Conference on Algorithms, Computing and Systems, Jeju Island, Republic of Korea, August 10, 2017

2016
Automatic Recognition of Aggressive Behavior in Pigs Using a Kinect Depth Sensor.
Sensors, 2016

Fault Detection and Diagnosis of Railway Point Machines by Sound Analysis.
Sensors, 2016

Automatic lung segmentation for large-scale medical image management.
Multim. Tools Appl., 2016

2015
Fast Video Encryption Using the H.264 Error Propagation Property for Smart Mobile Devices.
Sensors, 2015

Automated Detection of Cattle Mounting using Side-View Camera.
KSII Trans. Internet Inf. Syst., 2015

2014
A practical implementation of fuzzy fingerprint vault for smart cards.
J. Intell. Manuf., 2014

A Cost-Effective Pigsty Monitoring System Based on a Video Sensor.
KSII Trans. Internet Inf. Syst., 2014

CPU-GPU hybrid computing for feature extraction from video stream.
IEICE Electron. Express, 2014

Auto-configuration of the Initial Contour Using Level-Set Method for Lung Segmentation on Chest CT Images.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014

Formant-based acoustic features for cow's estrus detection in audio surveillance system.
Proceedings of the 11th IEEE International Conference on Advanced Video and Signal Based Surveillance, 2014

2013
Intelligent video surveillance system using two-factor human information.
Telecommun. Syst., 2013

Automatic Detection and Recognition of Pig Wasting Diseases Using Sound Data in Audio Surveillance Systems.
Sensors, 2013

Parallelizing H.264 and AES Collectively.
KSII Trans. Internet Inf. Syst., 2013

Power-Time Tradeoff of Parallel Execution on Multi-core Platforms.
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013

Quality-Workload Tradeoff in Pig Activity Monitoring Application.
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013

2012
Energy Efficient Image/Video Data Transmission on Commercial Multi-Core Processors.
Sensors, 2012

Overcoming Amdahl's Law by Distributing Workload Asymmetrically.
Proceedings of the Convergence and Hybrid Information Technology, 2012

2011
Offloading Socket Processing for Ubiquitous Services.
J. Inf. Sci. Eng., 2011

A Practical Implementation of Fuzzy Fingerprint Vault.
KSII Trans. Internet Inf. Syst., 2011

Fingerprint Template Protection Using One-Time Fuzzy Vault.
KSII Trans. Internet Inf. Syst., 2011

Slice-level selective encryption for protecting video data.
Proceedings of the 2011 International Conference on Information Networking, 2011

A Study on the Human Identification Technique for Privacy Protection in Intelligent Video Surveillance System.
Proceedings of the 2011 IEEE Asia-Pacific Services Computing Conference, 2011

2010
Recovery of flash memories for reliable mobile storages.
Mob. Inf. Syst., 2010

Parallel Processing of the Fuzzy Fingerprint Vault based on Geometric Hashing.
KSII Trans. Internet Inf. Syst., 2010

Ensuring Confidentiality and Integrity of Multimedia Data on Multi-core Platforms.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2010

2009
Inserting Chaff Minutiae for the Geometric Hashing-based Fuzzy Fingerprint Vault.
J. Inf. Sci. Eng., 2009

Configurable fuzzy fingerprint vault for Match-on-Card system.
IEICE Electron. Express, 2009

Secure fuzzy fingerprint vault against correlation attack.
IEICE Electron. Express, 2009

Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System.
EURASIP J. Adv. Signal Process., 2009

A fingerprint-based user authentication protocol considering both the mobility and security in the telematics environment.
Comput. Stand. Interfaces, 2009

JPEG 2000 and Digital Watermarking Technique Using in Medical Image.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009

A study on the digital watermarking technique for JPEG 2000.
Proceedings of the 2009 International Conference on Hybrid Information Technology, 2009

VLSI Architecture for the Fuzzy Fingerprint Vault with Automatic Alignment Module.
Proceedings of the Communication and Networking, 2009

2008
A fingerprint matching hardware for smart cards.
IEICE Electron. Express, 2008

A fast algorithm for polynomial reconstruction of fuzzy fingerprint vault.
IEICE Electron. Express, 2008

Dual Watermarking Method for Integrity of Medical Images.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

2007
Feature Distribution of the Fingerprint Template Generated by the Geometric Hashing-Based Fuzzy Vault.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

A Network I/O Architecture for Terminal-Initiated Traffics in an Ubiquitous Service Server.
Proceedings of the Information Networking. Towards Ubiquitous Networking and Services, 2007

Energy-Efficient Transmissions of Fingerprint Images Using Both Encryption and Fingerprinting Techniques.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, 2007

Fingerprint Template Protection Using Fuzzy Vault.
Proceedings of the Computational Science and Its Applications, 2007

Protecting Secret Keys with Fuzzy Fingerprint Vault Based on a 3D Geometric Hash Table.
Proceedings of the Adaptive and Natural Computing Algorithms, 8th International Conference, 2007

2006
Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

An Adaptive Intrusion Detection Algorithm Based on Clustering and Kernel-Method.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2006

Capacity Planning for Scalable Fingerprint Authentication.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

A VLSI Implementation of Minutiae Extraction for Secure Fingerprint Authentication.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
A Secure Fingerprint Authentication System on an Untrusted Computing Environment.
Proceedings of the Trust, 2005

Hiding Biometric Data for Secure Transmission.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

A Hardware Implementation for Fingerprint Retrieval.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Secure and Efficient Transmissions of Fingerprint Images for Embedded Processors.
Proceedings of the Image Analysis and Recognition, Second International Conference, 2005

Secure Remote Fingerprint Verification Using Dual Watermarks.
Proceedings of the Digital Rights Management: Technologies, 2005

Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

Performance Evaluation of Watermarking Techniques for Secure Multimodal Biometric Systems.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Workload Dispatch Planning for Real-Time Fingerprint Authentication on a Sensor-Client-Server Model.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

User Enrollment Using Multiple Snapshots of Fingerprint.
Proceedings of the Neural Information Processing, 11th International Conference, 2004

A Hardware Implementation of Fingerprint Verification for Secure Biometric Authentication Systems.
Proceedings of the Image Analysis and Recognition: International Conference, 2004

A Hardware Implementation of Speaker Verification Using Support Vector Machine.
Proceedings of the International Conference on Security and Management, 2004

2003
An ultra-low memory fingerprint matching algorithm and its implementation on a 32-bit smart card.
IEEE Trans. Consumer Electron., 2003

Fingerprint-Based Authentication for USB Token Systems.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

An Empirical Study of Multi-mode Biometric Systems Using Face and Fingerprint.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

Implementation of the USB Token System for Fingerprint Verification.
Proceedings of the Image Analysis, 13th Scandinavian Conference, 2003

An Experimental Study on Measuring Image Quality of Infant Fingerprints.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2003

Access Control System with High Level Security Using Fingerprints.
Proceedings of the 32nd Applied Image Pattern Recognition Workshop (AIPR 2003), 2003

2002
Fingerprint Verification System Involving Smart Card.
Proceedings of the Information Security and Cryptology, 2002

A Fingerprint Matching Algorithm Using Image Recognition and Fuzzy Control.
Proceedings of the International Conference on Artificial Intelligence, 2002

2001
Performance evaluation for CC-NUMA multiprocessors using an OLTP workload.
Microprocess. Microsystems, 2001

Performance Analysis of Smart Card-Based Fingerprint Recognition For Secure User Authentication.
Proceedings of the Towards The E-Society: E-Commerce, 2001

Face Recognition Using Support Vector Machines with the Feature Set Extracted by Genetic Algorithms.
Proceedings of the Audio- and Video-Based Biometric Person Authentication, 2001

2000
Performance of On-Chip Multiprocessors for Vision Tasks.
Proceedings of the Parallel and Distributed Processing, 2000

1999
Solving Irregular Inter-processor Data Dependency in Image Understanding Tasks.
Proceedings of the Parallel Computation, 1999

1998
Parallelizing Image Feature Extraction on Coarse-Grain Machines.
IEEE Trans. Pattern Anal. Mach. Intell., 1998

Parallel Algorithms for Perceptual Grouping on Distributed Memory Machines.
J. Parallel Distributed Comput., 1998

1997
An Algorithmic Framework for Parallelizing Vision Computations on Distributed-Memory Machines.
Proceedings of the 1997 International Conference on Parallel and Distributed Systems (ICPADS '97), 1997

Configurable Hardware for Symbolic Search Operations.
Proceedings of the 1997 International Conference on Parallel and Distributed Systems (ICPADS '97), 1997

1996
Load balancing strategies for symbolic vision computations.
Proceedings of the 3rd International Conference on High Performance Computing, 1996

An Asynchronous Parallel Algorithm for Symbolic Grouping Operations in Vision.
Proceedings of the Euro-Par '96 Parallel Processing, 1996


  Loading...