Cheonshik Kim
Orcid: 0000-0002-5847-6736Affiliations:
- Sejong University, Seoul, Republic of Korea
According to our database1,
Cheonshik Kim
authored at least 68 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
On csauthors.net:
Bibliography
2024
Multim. Tools Appl., March, 2024
J. Inf. Secur. Appl., 2024
2023
Intelligent analysis system of college students' employment and entrepreneurship situation: Big data and artificial intelligence-driven approach.
Comput. Electr. Eng., September, 2023
J. Inf. Secur. Appl., August, 2023
J. Netw. Comput. Appl., February, 2023
2021
Intragroup and intergroup secret image sharing based on homomorphic Lagrange interpolation.
J. Inf. Secur. Appl., 2021
2020
Sensors, 2020
Introduction to the special issue on deep learning for real-time information hiding and forensics.
J. Real Time Image Process., 2020
2019
Enhanced stego-image quality and embedding capacity for the partial reversible data hiding scheme.
Multim. Tools Appl., 2019
Editorial: Recent Advances in Mining Intelligence and Context-Awareness on IoT-Based Platforms.
Mob. Networks Appl., 2019
J. Real Time Image Process., 2019
KSII Trans. Internet Inf. Syst., 2019
2018
Palmprint recognition system on mobile devices with double-line-single-point assistance.
Pers. Ubiquitous Comput., 2018
Pers. Ubiquitous Comput., 2018
Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC.
Pers. Ubiquitous Comput., 2018
Pers. Ubiquitous Comput., 2018
Mining intelligent solution to compensate missing data context of medical IoT devices.
Pers. Ubiquitous Comput., 2018
J. Real Time Image Process., 2018
J. Real Time Image Process., 2018
Lossless data hiding for absolute moment block truncation coding using histogram modification.
J. Real Time Image Process., 2018
Secure medical images based on data hiding using a hybrid scheme with the Hamming code, LSB, and OPAP.
J. Real Time Image Process., 2018
J. Real Time Image Process., 2018
Improving capacity of Hamming (<i>n</i>, <i>k</i>)+1 stego-code by using optimized Hamming + <i>k</i>.
Digit. Signal Process., 2018
2017
Dual-source discrimination power analysis for multi-instance contactless palmprint recognition.
Multim. Tools Appl., 2017
Comput. Stand. Interfaces, 2017
Comput. Stand. Interfaces, 2017
2016
Design a new visual cryptography for human-verifiable authentication in accessing a database.
J. Real Time Image Process., 2016
J. Real Time Image Process., 2016
Int. J. Distributed Sens. Networks, 2016
Implicit Correlation Intensity Mining Based on the Monte Carlo Method with Attenuation.
Proceedings of the International Conference on Identification, 2016
Crowdsourcing Framework for Acoustic Sound Based Obstacle Echolocation through Smartphones for Visually Impaired.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016
2015
Vietnam. J. Comput. Sci., 2015
2014
Multim. Tools Appl., 2014
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014
2013
Pers. Ubiquitous Comput., 2013
KSII Trans. Internet Inf. Syst., 2013
Int. J. Distributed Sens. Networks, 2013
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013
2012
An Optimized Sub-texture Mapping Technique for an Arbitrary Texture Considering Topology Relations.
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012
2011
Data Hiding in Halftone Images by XOR Block-Wise Operation with Difference Minimization.
KSII Trans. Internet Inf. Syst., 2011
Improved Steganographic Embedding Exploiting Modification Direction in Multimedia Communications.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011
Proceedings of the Intelligent Information and Database Systems, 2011
2010
Proceedings of the Advances in Intelligent Information and Database Systems, 2010
Comput. Commun., 2010
Proceedings of the IEEE International Conference on Wireless Communications, 2010
2009
Proceedings of the 2009 International Conference on Hybrid Information Technology, 2009
Proceedings of the 2009 International Conference on Hybrid Information Technology, 2009
2008
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2008
2007
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007
2006
Proceedings of the Ubiquitous Convergence Technology, First International Conference, 2006
Proceedings of the Ubiquitous Convergence Technology, First International Conference, 2006
iSCSI Protocol Parameter Optimization for Mobile Appliance Remote Storage System at Smart Home Environment Approach.
Proceedings of the Ubiquitous Convergence Technology, First International Conference, 2006
Proceedings of the Advances in Hybrid Information Technology, 2006
2005
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005