Hyoung Joong Kim

Orcid: 0000-0002-1144-6660

According to our database1, Hyoung Joong Kim authored at least 111 papers between 1990 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Comparison of Impermant Loss for Various CFMMs.
Proceedings of the IEEE International Conference on Blockchain, 2024

2022
First Smart Contract Allowing Cryptoasset Recovery.
KSII Trans. Internet Inf. Syst., 2022

2021
Large-scale multimedia signal processing for security and digital forensics [SI 1163].
Multim. Tools Appl., 2021

2020
Reversible data hiding for binary images based on adaptive overlapping pattern.
EURASIP J. Inf. Secur., 2020

2019
Skewed Histogram Shifting for Reversible Data Hiding Using a Pair of Extreme Predictions.
IEEE Trans. Circuits Syst. Video Technol., 2019

Reversible Data Hiding With Automatic Brightness Preserving Contrast Enhancement.
IEEE Trans. Circuits Syst. Video Technol., 2019

Reversible Data Hiding in JPEG Images Using Quantized DC.
Entropy, 2019

Solving the large syndrome calculation problem in steganography.
CoRR, 2019

Reversible Data Hiding in JPEG Images Based on Multiple Histograms Modification.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

JPEG Encryption with File Format Preservation and File Size Reduction.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019

2018
Intrusion Detection and Mitigation System Using Blockchain Analysis for Bitcoin Exchange.
Proceedings of the 2018 International Conference on Cloud Computing and Internet of Things, 2018

2017
Improved reversible data hiding in JPEG images based on new coefficient selection strategy.
EURASIP J. Image Video Process., 2017

Website Fingerprinting Attack on Psiphon and Its Forensic Analysis.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

2016
A High-Security EEG-Based Login System with RSVP Stimuli and Dry Electrodes.
IEEE Trans. Inf. Forensics Secur., 2016

Reversible Data Hiding in JPEG Images.
IEEE Trans. Circuits Syst. Video Technol., 2016

Framework for improving the security performance of ordinary distortion functions of JPEG steganography.
Multim. Tools Appl., 2016

Early width estimation of fragmented JPEG with corrupted header.
Multim. Tools Appl., 2016

Electronic Voting Service Using Block-Chain.
J. Digit. Forensics Secur. Law, 2016

Improving JPEG-LS Performance Using Location Information.
KSII Trans. Internet Inf. Syst., 2016

Reversible data hiding using least square predictor via the LASSO.
EURASIP J. Image Video Process., 2016

2015
Scheduling in compute cloud with multiple data banks using divisible load paradigm.
IEEE Trans. Aerosp. Electron. Syst., 2015

Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding.
Signal Process., 2015

Linear collaborative discriminant regression classification for face recognition.
J. Vis. Commun. Image Represent., 2015

Local pixel patterns.
Comput. Vis. Media, 2015

Low Bit-Rate and High Fidelity Reversible Data Hiding.
CoRR, 2015

Collaborative Representation Classification Ensemble for Face Recognition.
CoRR, 2015

A Cognitive Ensemble of Extreme Learning Machines for Steganalysis Based on Risk-Sensitive Hinge Loss Function.
Cogn. Comput., 2015

Automatic contrast enhancement using reversible data hiding.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

Metadata protection scheme for JPEG privacy & security using hierarchical and group-based models.
Proceedings of the 5th International Conference on Information & Communication Technology and Accessibility, 2015

Weighted sparse representation using a learned distance metric for face recognition.
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015

2014
An enhanced (t, n) threshold directed signature scheme.
Inf. Sci., 2014

A Meta-Cognitive Learning Algorithm for an Extreme Learning Machine Classifier.
Cogn. Comput., 2014

Hybrid real-coded genetic algorithm for data partitioning in multi-round load distribution and scheduling in heterogeneous systems.
Appl. Soft Comput., 2014

Reversible Data Hiding Based on Combined Predictor and Prediction Error Expansion.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Binary Coded Genetic Algorithm with Ensemble Classifier for feature selection in JPEG steganalysis.
Proceedings of the 2014 IEEE Ninth International Conference on Intelligent Sensors, 2014

Parkinson Disease Classification based on binary coded genetic algorithm and Extreme learning machine.
Proceedings of the 2014 IEEE Ninth International Conference on Intelligent Sensors, 2014

Enhanced discriminant linear regression classification for face recognition.
Proceedings of the 2014 IEEE Ninth International Conference on Intelligent Sensors, 2014

2013
Compressing JPEG compressed image using reversible data hiding technique.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2013

2012
Scheduling nonlinear divisible loads in a single level tree network.
J. Supercomput., 2012

An Efficient Embedder for BCH Coding for Steganography.
IEEE Trans. Inf. Theory, 2012

Scheduling Second-Order Computational Load in Master-Slave Paradigm.
IEEE Trans. Aerosp. Electron. Syst., 2012

A photographic forensic case study: Myths, principles and techniques.
Math. Comput. Model., 2012

Integrated inventory and transportation decision for ubiquitous supply chain management.
J. Intell. Manuf., 2012

A fully complex-valued radial basis function classifier for real-valued classification problems.
Neurocomputing, 2012

Modified BCH data hiding scheme for JPEG steganography.
EURASIP J. Adv. Signal Process., 2012

Recognizing numbers from the low-resolution patterns in digital images.
Proceedings of the 13th International Workshop on Image Analysis for Multimedia Interactive Services, 2012

An Attempt to Generalize Distortion Measure for JPEG Steganography.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

A Projection Based Learning Meta-cognitive RBF Network Classifier for Effective Diagnosis of Parkinson's Disease.
Proceedings of the Advances in Neural Networks - ISNN 2012, 2012

2011
Histogram-Based Image Hashing for Searching Content-Preserving Copies.
Trans. Data Hiding Multim. Secur., 2011

Online learning neural tracker.
Neurocomputing, 2011

An Improved Matrix Encoding Scheme for JPEG Steganography.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

Fast Learning Fully Complex-Valued Classifiers for Real-Valued Classification Problems.
Proceedings of the Advances in Neural Networks - ISNN 2011, 2011

2010
An improved section-wise exploiting modification direction method.
Signal Process., 2010

Shape-based indexing scheme for camera view invariant 3-D object retrieval.
Multim. Tools Appl., 2010

Guest Editorial.
J. Multim., 2010

Reversible Watermarking Method Using Optimal Histogram Pair Shifting Based on Prediction and Sorting.
KSII Trans. Internet Inf. Syst., 2010

Near-optimal solution to pair-wise LSB matching via an immune programming strategy.
Inf. Sci., 2010

A sequential learning algorithm for self-adaptive resource allocation network classifier.
Neurocomputing, 2010

A Pervasive Secret Sharing Scheme For Embedded Visual Communication System.
Intell. Autom. Soft Comput., 2010

Reversible Watermarking Algorithm with Distortion Compensation.
EURASIP J. Adv. Signal Process., 2010

Improved modification direction methods.
Comput. Math. Appl., 2010

A new approach to photography forensics using 3d analysis for correcting perception errors: a case study.
Proceedings of the 2010 ACM Workshop on Surreal Media and Virtual Cloning, 2010

Ternary Data Hiding Technique for JPEG Steganography.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

An Efficient Pattern Substitution Watermarking Method for Binary Images.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

A Fast Implementation of Arithmetic Coding.
Proceedings of the Advances in Web Technologies and Applications, 2010

2009
A Floorprint-Based Defect Tolerance for Nano-Scale Application-Specific IC.
IEEE Trans. Instrum. Meas., 2009

Reversible Watermarking Algorithm Using Sorting and Prediction.
IEEE Trans. Circuits Syst. Video Technol., 2009

A new load distribution strategy for linear network with communication delays.
Math. Comput. Simul., 2009

Ubiquitous software controller to prevent deadlocks for automated guided vehicle systems in a container port terminal environment.
J. Intell. Manuf., 2009

No-reference image quality assessment using modified extreme learning machine classifier.
Appl. Soft Comput., 2009

Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding.
Proceedings of the Multimedia and Security Workshop, 2009

Fast BCH Syndrome Coding for Steganography.
Proceedings of the Information Hiding, 11th International Workshop, 2009

A spectral technique for image clustering.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009

A new lossless data compression method.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

Improving the Modified Matrix Encoding on Steganography Method.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
A Novel Difference Expansion Transform for Reversible Data Embedding.
IEEE Trans. Inf. Forensics Secur., 2008

Invariant Image Watermarking Based on Statistical Features in the Low-Frequency Domain.
IEEE Trans. Circuits Syst. Video Technol., 2008

Audio watermarking robust against time-scale modification and MP3 compression.
Signal Process., 2008

Efficient Method of Detecting Globally Blurry or Sharp Images.
Proceedings of the Ninth International Workshop on Image Analysis for Multimedia Interactive Services, 2008

An Improved Steganographic Method.
Proceedings of the SIGMAP 2008, 2008

A Novel Approach for JPEG Steganography.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

Watermarking Security Incorporating Natural Scene Statistics.
Proceedings of the Information Hiding, 10th International Workshop, 2008

2007
Knowledge-Assisted Media Analysis for Interactive Multimedia Applications.
EURASIP J. Adv. Signal Process., 2007

Geometrically Invariant Image Watermarking in the DWT Domain.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

An Innocuous Visual Cryptography Scheme.
Proceedings of the Eighth International Workshop on Image Analysis for Multimedia Interactive Services, 2007

Histogram-based image hashing scheme robust against geometric deformations.
Proceedings of the 9th workshop on Multimedia & Security, 2007

An Improved Reversible Difference Expansion Watermarking Algorithm.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

Automated Grocery Ordering Systems for Smart Home.
Proceedings of the Future Generation Communication and Networking, 2007

2006
Divisible load scheduling in distributed system with buffer constraints: genetic algorithm and linear programming approach.
Int. J. Parallel Emergent Distributed Syst., 2006

e-Learning Media Format for Enhanced Consumption on Mobile Application.
Proceedings of the 1st International Workshop on Semantic-Enhanced Multimedia Presentation Systems (SEMPS-2006), 2006

2005
Adaptive Divisible Load Scheduling Strategies for Workstation Clusters with Unknown Network Resources.
IEEE Trans. Parallel Distributed Syst., 2005

Computing BLAS level-2 operations on workstation clusters using the divisible load paradigm<sup>, </sup>.
Math. Comput. Model., 2005

Security Evaluation of Generalized Patchwork Algorithm from Cryptanalytic Viewpoint.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

A new visual cryptography using natural images.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

Real-Coded Genetic Algorithms for Optimal Static Load Balancing in Distributed Computing System with Communication Delays.
Proceedings of the Computational Science and Its Applications, 2005

A Real Coded Genetic Algorithm for Data Partitioning and Scheduling in Networks with Arbitrary Processor Release Time.
Proceedings of the Advances in Computer Systems Architecture, 10th Asia-Pacific Conference, 2005

2004
A robust audio watermarking scheme.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004

2003
A novel echo-hiding scheme with backward and forward kernels.
IEEE Trans. Circuits Syst. Video Technol., 2003

Introduction to the special issue on authentication, copyright protection, and information hiding.
IEEE Trans. Circuits Syst. Video Technol., 2003

Modified patchwork algorithm: a novel audio watermarking scheme.
IEEE Trans. Speech Audio Process., 2003

Generalized patchwork algorithm for image watermarking.
Multim. Syst., 2003

A Novel Optimal Load Distribution Algorithm for Divisible Loads.
Clust. Comput., 2003

Normalization Domain Watermarking Method Based on Pattern Extraction.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

2002
Large Matrix-vector Product Computations on Multicast Bus-oriented Workstation Clusters.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2002

2000
Scheduling Video Streams in Video-on-Demand Systems: A Survey.
Multim. Tools Appl., 2000

1998
Load Partitioning and Trade-Off Study for Large Matrix-Vector Computations in Multicast Bus Networks with Communication Delays.
J. Parallel Distributed Comput., 1998

1994
Scalable Data Parallel Implementations of Object Recognition Using Geometric Hashing.
J. Parallel Distributed Comput., 1994

1993
An O(1) Time Optimal Algorithm for Multiplying Matrices on Reconfigurable Mesh.
Inf. Process. Lett., 1993

Scalable geometric hashing on MasPar machines.
Proceedings of the Conference on Computer Vision and Pattern Recognition, 1993

1990
A parallel algorithm solving a tridiagonal Toeplitz linear system.
Parallel Comput., 1990

Partial Sum Problem Mapping Into a Hypercube.
Inf. Process. Lett., 1990


  Loading...