If you made any changes in Pure these will be visible here soon.

Research Output 1990 2019

  • 2808 Citations
  • 25 h-Index
  • 89 Article
  • 61 Conference contribution
  • 3 Chapter
  • 3 Editorial
2019

Preface

Yoo, C. D., Shi, Y. Q., Piva, A., Kim, H. J. & Kim, G., 2019 Jan 1, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 11378 LNCS, p. V-VI

Research output: Contribution to journalEditorial

Reversible data hiding in JPEG images based on multiple histograms modification

Lu, X., Huang, F. & Kim, H. J., 2019 Jan 1, Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, Proceedings. Sun, X., Pan, Z. & Bertino, E. (eds.). Springer Verlag, p. 442-454 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11634 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data Hiding
Discrete cosine transforms
Histogram
Run Length
Discrete Cosine Transform

Reversible data hiding in JPEG images using quantized DC

Kim, S., Huang, F. & Kim, H. J., 2019 Jan 1, In : Entropy. 21, 9, 835.

Research output: Contribution to journalArticle

Open Access
embedding
direct current
coefficients
files
alternating current
2018

Intrusion detection and mitigation system using blockchain analysis for bitcoin exchange

Kim, S., Kim, B. & Kim, H. J., 2018 Oct 29, Proceedings of 2018 International Conference on Cloud Computing and Internet of Things, CCIOT 2018. Association for Computing Machinery, p. 40-44 5 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
2 Citations (Scopus)

Reversible Data Hiding with Automatic Brightness Preserving Contrast Enhancement

Kim, S., Lussi, R., Qu, X., Huang, F. & Kim, H. J., 2018 Sep 11, (Accepted/In press) In : IEEE Transactions on Circuits and Systems for Video Technology.

Research output: Contribution to journalArticle

Luminance
Image enhancement
Bins
5 Citations (Scopus)

Skewed Histogram Shifting for Reversible Data Hiding using a Pair of Extreme Predictions

Kim, S., Qu, X., Sachnev, V. & Kim, H. J., 2018 Jan 1, (Accepted/In press) In : IEEE Transactions on Circuits and Systems for Video Technology.

Research output: Contribution to journalArticle

Pixels
Experiments
2017
2 Citations (Scopus)

Classifying schizotypy using an audiovisual emotion perception test and scalp electroencephalography

Jeong, J. W., Wendimagegn, T. W., Chang, E., Chun, Y., Park, J. H., Kim, H. J. & Kim, H. T., 2017 Sep 12, In : Frontiers in Human Neuroscience. 11, 450.

Research output: Contribution to journalArticle

Scalp
Personality
Electroencephalography
Schizophrenia
Emotions
9 Citations (Scopus)

Improved reversible data hiding in JPEG images based on new coefficient selection strategy

Wedaj, F. T., Kim, S., Kim, H. J. & Huang, F., 2017 Dec 1, In : Eurasip Journal on Image and Video Processing. 2017, 1, 63.

Research output: Contribution to journalArticle

Authentication
Signal to noise ratio
Communication

Preface

Kraetzer, C., Shi, Y. Q., Dittmann, J. & Kim, H. J., 2017, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 10431 LNCS, p. V-VI

Research output: Contribution to journalEditorial

2 Citations (Scopus)

Website fingerprinting attack on Psiphon and its forensic analysis

Ejeta, T. G. & Kim, H. J., 2017, Digital Forensics and Watermarking - 16th International Workshop, IWDW 2017, Proceedings. Springer Verlag, Vol. 10431 LNCS. p. 42-51 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10431 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fingerprinting
Websites
Attack
Internet
Traffic
2016
24 Citations (Scopus)

A High-Security EEG-Based Login System with RSVP Stimuli and Dry Electrodes

Chen, Y., Atnafu, A. D., Schlattner, I., Weldtsadik, W. T., Roh, M. C., Kim, H. J., Lee, S. W., Blankertz, B. & Fazli, S., 2016 Dec 1, In : IEEE Transactions on Information Forensics and Security. 11, 12, p. 2635-2647 13 p., 7486116.

Research output: Contribution to journalArticle

Electroencephalography
Electrodes
Authentication

Digital-Forensics and Watermarking: 14th International Workshop, IWDW 2015 Tokyo, Japan, October 7-10, 2015 Revised Selected Papers

Shi, Y. Q., Kim, H. J., Pérez-González, F. & Echizen, I., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9569. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9569).

Research output: Chapter in Book/Report/Conference proceedingChapter

Digital Forensics
Digital watermarking
Digital Watermarking
Japan
Digital forensics
2 Citations (Scopus)

Framework for improving the security performance of ordinary distortion functions of JPEG steganography

Huang, F. & Kim, H. J., 2016 Jan 1, In : Multimedia Tools and Applications. 75, 1, p. 281-296 16 p.

Research output: Contribution to journalArticle

Steganography
Discrete cosine transforms
Internet
2 Citations (Scopus)

Improving JPEG-LS performance using location information

Woo, J. H. & Kim, H. J., 2016 Nov 30, In : KSII Transactions on Internet and Information Systems. 10, 11, p. 5547-5562 16 p.

Research output: Contribution to journalArticle

Image compression
Entropy
Experiments
2 Citations (Scopus)

Metadata protection scheme for JPEG privacy & security using hierarchical and group-based models

Lepsoy, J., Kim, S., Atnafu, D. & Kim, H. J., 2016 Mar 7, 2015 5th International Conference on Information and Communication Technology and Accessibility, ICTA 2015. Institute of Electrical and Electronics Engineers Inc., 7426905

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Metadata

Preface

Shi, Y. Q., Kim, H. J., Pérez-González, F. & Echizen, I., 2016, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9569

Research output: Contribution to journalArticle

59 Citations (Scopus)

Reversible Data Hiding in JPEG Images

Huang, F., Qu, X., Kim, H. J. & Huang, J., 2016 Sep 1, In : IEEE Transactions on Circuits and Systems for Video Technology. 26, 9, p. 1610-1621 12 p., 7225117.

Research output: Contribution to journalArticle

Discrete cosine transforms
Authentication
Redundancy
8 Citations (Scopus)

Reversible data hiding using a piecewise autoregressive predictor based on two-stage embedding

Lee, B. Y., Hwang, H. J. & Kim, H. J., 2016 Jul 1, In : Journal of Electrical Engineering and Technology. 11, 4, p. 974-986 13 p.

Research output: Contribution to journalArticle

Image watermarking
Linear regression
Pixels
Experiments
7 Citations (Scopus)

Reversible data hiding using least square predictor via the LASSO

Hwang, H. J., Kim, S. H. & Kim, H. J., 2016 Dec 1, In : Eurasip Journal on Image and Video Processing. 2016, 1, 42.

Research output: Contribution to journalArticle

Digital watermarking
Watermarking
2015
10 Citations (Scopus)

Automatic contrast enhancement using reversible data hiding

Kim, S., Lussi, R., Qu, X. & Kim, H. J., 2015 Dec 29, 2015 IEEE International Workshop on Information Forensics and Security, WIFS 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7368603

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Image enhancement
Smartphones
Automation
Experiments
Recovery
1 Citation (Scopus)

Early width estimation of fragmented JPEG with corrupted header

Ayalneh, D. A., Choi, Y. & Kim, H. J., 2015 Sep 17, (Accepted/In press) In : Multimedia Tools and Applications.

Research output: Contribution to journalArticle

Pixels
Recovery
8 Citations (Scopus)

Linear collaborative discriminant regression classification for face recognition

Qu, X., Kim, S., Cui, R. & Kim, H. J., 2015 Jul 27, In : Journal of Visual Communication and Image Representation. 31, p. 312-319 8 p.

Research output: Contribution to journalArticle

Face recognition
Linear regression
Measurement errors
1 Citation (Scopus)

Local pixel patterns

Huang, F., Qu, X., Kim, H. J. & Huang, J., 2015 Jun 1, In : Computational Visual Media. 1, 2, p. 157-170 14 p.

Research output: Contribution to journalArticle

Image texture
Pixels
Textures
85 Citations (Scopus)

Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding

Qu, X. & Kim, H. J., 2015 Jan 1, In : Signal Processing. 111, p. 249-260 12 p.

Research output: Contribution to journalArticle

Pixels
Image quality
3 Citations (Scopus)

Reversible binary image watermarking method using overlapping pattern substitution

Dong, K., Kim, H. J., Choi, Y. S., Joo, S. H. & Chung, B. H., 2015 Oct 1, In : ETRI Journal. 37, 5, p. 990-1000 11 p.

Research output: Contribution to journalArticle

Image watermarking
Binary images
Substitution reactions
Experiments
Data Hiding
Prediction Error
Predictors
Pixels
Pixel
5 Citations (Scopus)

Reversible watermarking based on compensation

Qu, X., Kim, S. & Kim, H. J., 2015 Jan 1, In : Journal of Electrical Engineering and Technology. 10, 1, p. 422-428 7 p.

Research output: Contribution to journalArticle

Watermarking
Pixels
Image quality
Compensation and Redress
Experiments
13 Citations (Scopus)

Scheduling in compute cloud with multiple data banks using divisible load paradigm

Suresh, S., Huang, H. & Kim, H. J., 2015 Apr 1, In : IEEE Transactions on Aerospace and Electronic Systems. 51, 2, p. 1288-1297 10 p., 7126183.

Research output: Contribution to journalArticle

Scheduling
Image classification
Processing
Linear programming
Satellites
1 Citation (Scopus)

Weighted sparse representation using a learned distance metric for face recognition

Qu, X., Kim, S., Atnafu, D. & Kim, H. J., 2015 Dec 9, Proceedings - International Conference on Image Processing, ICIP. IEEE Computer Society, Vol. 2015-December. p. 4594-4598 5 p. 7351677

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Face recognition
Testing
Experiments
2014
17 Citations (Scopus)

A Cognitive Ensemble of Extreme Learning Machines for Steganalysis Based on Risk-Sensitive Hinge Loss Function

Sachnev, V., Ramasamy, S., Sundaram, S., Kim, H. J. & Hwang, H. J., 2014, In : Cognitive Computation. 7, 1, p. 103-110 8 p.

Research output: Contribution to journalArticle

Hinges
Learning systems
Classifiers
Cognition
Machine Learning
50 Citations (Scopus)

A Meta-Cognitive Learning Algorithm for an Extreme Learning Machine Classifier

Savitha, R., Suresh, S. & Kim, H. J., 2014 Jan 1, In : Cognitive Computation. 6, 2, p. 253-263 11 p.

Research output: Contribution to journalArticle

Learning algorithms
Learning systems
Classifiers
Learning
Neurons

Analyzing the effect of the distortion compensation in reversible watermarking

Kim, S. & Kim, H. J., 2014 Feb 24, Proceedings of SPIE - The International Society for Optical Engineering. Vol. 9069. 90690P

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reversible Watermarking
Watermarking
embedding
Military
Compensation and Redress
2 Citations (Scopus)

An enhanced (t,n) threshold directed signature scheme

Hwang, J. Y., Kim, H. J., Lee, D. H. & Song, B., 2014 Aug 10, In : Information Sciences. 275, p. 284-292 9 p.

Research output: Contribution to journalArticle

Signature Scheme
Network protocols
Signature
Attack
Public key
2 Citations (Scopus)

A new approach to preserve privacy data mining based on fuzzy theory in numerical database

Cui, R. & Kim, H. J., 2014 Feb 24, Proceedings of SPIE - The International Society for Optical Engineering. Vol. 9069. 90691A

Research output: Chapter in Book/Report/Conference proceedingConference contribution

privacy
data mining
Fuzzy Theory
Privacy
Data mining
5 Citations (Scopus)

Binary Coded Genetic Algorithm with Ensemble Classifier for feature selection in JPEG steganalysis

Sachnev, V. & Kim, H. J., 2014 Jan 1, IEEE ISSNIP 2014 - 2014 IEEE 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Conference Proceedings. IEEE Computer Society, 6827700

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Feature extraction
Classifiers
Genetic algorithms
Set theory
Labels
2 Citations (Scopus)

Enhanced discriminant linear regression classification for face recognition

Qu, X. & Kim, H. J., 2014 Jan 1, IEEE ISSNIP 2014 - 2014 IEEE 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Conference Proceedings. IEEE Computer Society, 6827696

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Face recognition
Linear regression
Experiments
24 Citations (Scopus)

Hybrid real-coded genetic algorithm for data partitioning in multi-round load distribution and scheduling in heterogeneous systems

Suresh, S., Huang, H. & Kim, H. J., 2014 Jan 1, In : Applied Soft Computing Journal. 24, p. 500-510 11 p.

Research output: Contribution to journalArticle

Distributed computer systems
Parallel processing systems
Genetic algorithms
Chemical activation
Scheduling
5 Citations (Scopus)

JPEG copy paste forgery detection using BAG optimized for complex images

Ayalneh, D. A., Kim, H. J. & Choi, Y. S., 2014 Jan 1, International Conference on Advanced Communication Technology, ICACT. Institute of Electrical and Electronics Engineers Inc., p. 181-185 5 p. 6778945

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Forging
Digital forensics
7 Citations (Scopus)

Parkinson Disease Classification based on binary coded genetic algorithm and Extreme learning machine

Sachnev, V. & Kim, H. J., 2014 Jan 1, IEEE ISSNIP 2014 - 2014 IEEE 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Conference Proceedings. IEEE Computer Society, 6827649

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Learning systems
Genes
Genetic algorithms
Gene expression
Experiments
1 Citation (Scopus)

Reversible watermarking using edge based difference modification

Qu, X., Kim, S. & Kim, H. J., 2014 Feb 24, Proceedings of SPIE - The International Society for Optical Engineering. Vol. 9069. 90690Q

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reversible Watermarking
Watermarking
Pixels
pixels
expansion
2013

An attempt to generalize distortion measure for JPEG steganography

Sachnev, V. & Kim, H. J., 2013 Sep 3, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 7809 LNCS. p. 69-82 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7809 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Steganography
Data Hiding
Generalise
Steganalysis
Coefficient

A new approach for achieving k-anonymity in database based on fuzzy clustering and 0-1 integer programming

Won, H. S., Cui, R., Kim, H. J., Sundaram, S. & Sachnev, V., 2013 Apr 1, In : Information (Japan). 16, 4, p. 2759-2766 8 p.

Research output: Contribution to journalArticle

Fuzzy clustering
Integer programming
1 Citation (Scopus)

Compressing JPEG compressed image using reversible data hiding technique

Kang, S. U., Qu, X. & Kim, H. J., 2013 Dec 1, 2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA 2013. 6694324

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Image quality
Pixels
Bioinformatics
Computer science
Artificial intelligence
Artificial Intelligence
Computer Science

Optimal lossless data hiding using selective block manipulation based on local characteristics

Qu, X., Kim, H. J. & Choi, Y. S., 2013 Apr 1, In : Information (Japan). 16, 4, p. 2739-2758 20 p.

Research output: Contribution to journalArticle

Degradation

Reversible data hiding for halftone images using histogram modification

Kim, C., Choi, Y., Kim, H. J., Shin, D., Shin, D. & Yang, C. N., 2013 Mar 1, In : Information (Japan). 16, 3 A, p. 1861-1872 12 p.

Research output: Contribution to journalArticle

Experiments
2012
49 Citations (Scopus)

A fully complex-valued radial basis function classifier for real-valued classification problems

Savitha, R., Suresh, S., Sundararajan, N. & Kim, H. J., 2012 Feb 15, In : Neurocomputing. 78, 1, p. 104-110 7 p.

Research output: Contribution to journalArticle

Aptitude
Classifiers
Neurons
Benchmarking
Decision Making
27 Citations (Scopus)

An efficient embedder for BCH coding for steganography

Zhang, R., Sachnev, V., Botnan, M. B., Kim, H. J. & Heo, J., 2012 Nov 26, In : IEEE Transactions on Information Theory. 58, 12, p. 7272-7279 8 p., 6294443.

Research output: Contribution to journalArticle

Steganography
coding

An improved matrix encoding scheme for JPEG steganography

Sachnev, V. & Kim, H. J., 2012 Sep 7, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 7128 LNCS. p. 3-15 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7128 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Steganography
Encoding
Steganalysis
Coefficient
Experiments
5 Citations (Scopus)

A photographic forensic case study: Myths, principles and techniques

Kim, H. J., Lim, S., Moon, J., Kim, B. & Jung, E. S., 2012 Jan 1, In : Mathematical and Computer Modelling. 55, 1-2, p. 3-11 9 p.

Research output: Contribution to journalArticle

Photography
Aberrations
Drawing (graphics)
Aberration
Lenses