• 2902 Citations
  • 26 h-Index
1990 …2019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2019

JPEG encryption with file format preservation and file size reduction

Kim, S. & Kim, H. J., 2019 Oct, 2019 IEEE 8th Global Conference on Consumer Electronics, GCCE 2019. Institute of Electrical and Electronics Engineers Inc., p. 215-216 2 p. 9015269. (2019 IEEE 8th Global Conference on Consumer Electronics, GCCE 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Preface

Yoo, C. D., Shi, Y. Q., Piva, A., Kim, H. J. & Kim, G., 2019 Jan 1, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 11378 LNCS, p. V-VI

Research output: Contribution to journalEditorial

Reversible data hiding in JPEG images based on multiple histograms modification

Lu, X., Huang, F. & Kim, H. J., 2019 Jan 1, Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, Proceedings. Sun, X., Pan, Z. & Bertino, E. (eds.). Springer Verlag, p. 442-454 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11634 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reversible data hiding in JPEG images using quantized DC

Kim, S., Huang, F. & Kim, H. J., 2019 Jan 1, In : Entropy. 21, 9, 835.

Research output: Contribution to journalArticle

Open Access
2018

Intrusion detection and mitigation system using blockchain analysis for bitcoin exchange

Kim, S., Kim, B. & Kim, H. J., 2018 Oct 29, Proceedings of 2018 International Conference on Cloud Computing and Internet of Things, CCIOT 2018. Association for Computing Machinery, p. 40-44 5 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reversible Data Hiding with Automatic Brightness Preserving Contrast Enhancement

Kim, S., Lussi, R., Qu, X., Huang, F. & Kim, H. J., 2018 Sep 11, (Accepted/In press) In : IEEE Transactions on Circuits and Systems for Video Technology.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Skewed Histogram Shifting for Reversible Data Hiding using a Pair of Extreme Predictions

Kim, S., Qu, X., Sachnev, V. & Kim, H. J., 2018 Jan 1, (Accepted/In press) In : IEEE Transactions on Circuits and Systems for Video Technology.

Research output: Contribution to journalArticle

8 Citations (Scopus)
2017

Classifying schizotypy using an audiovisual emotion perception test and scalp electroencephalography

Jeong, J. W., Wendimagegn, T. W., Chang, E., Chun, Y., Park, J. H., Kim, H. J. & Kim, H. T., 2017 Sep 12, In : Frontiers in Human Neuroscience. 11, 450.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Improved reversible data hiding in JPEG images based on new coefficient selection strategy

Wedaj, F. T., Kim, S., Kim, H. J. & Huang, F., 2017 Dec 1, In : Eurasip Journal on Image and Video Processing. 2017, 1, 63.

Research output: Contribution to journalArticle

10 Citations (Scopus)

Preface

Kraetzer, C., Shi, Y. Q., Dittmann, J. & Kim, H. J., 2017, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 10431 LNCS, p. V-VI

Research output: Contribution to journalEditorial

Website fingerprinting attack on Psiphon and its forensic analysis

Ejeta, T. G. & Kim, H. J., 2017, Digital Forensics and Watermarking - 16th International Workshop, IWDW 2017, Proceedings. Springer Verlag, Vol. 10431 LNCS. p. 42-51 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10431 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)
2016

A High-Security EEG-Based Login System with RSVP Stimuli and Dry Electrodes

Chen, Y., Atnafu, A. D., Schlattner, I., Weldtsadik, W. T., Roh, M. C., Kim, H. J., Lee, S. W., Blankertz, B. & Fazli, S., 2016 Dec 1, In : IEEE Transactions on Information Forensics and Security. 11, 12, p. 2635-2647 13 p., 7486116.

Research output: Contribution to journalArticle

42 Citations (Scopus)

Digital-Forensics and Watermarking: 14th International Workshop, IWDW 2015 Tokyo, Japan, October 7-10, 2015 Revised Selected Papers

Shi, Y. Q., Kim, H. J., Pérez-González, F. & Echizen, I., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9569. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9569).

Research output: Chapter in Book/Report/Conference proceedingChapter

Framework for improving the security performance of ordinary distortion functions of JPEG steganography

Huang, F. & Kim, H. J., 2016 Jan 1, In : Multimedia Tools and Applications. 75, 1, p. 281-296 16 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Improving JPEG-LS performance using location information

Woo, J. H. & Kim, H. J., 2016 Nov 30, In : KSII Transactions on Internet and Information Systems. 10, 11, p. 5547-5562 16 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Metadata protection scheme for JPEG privacy & security using hierarchical and group-based models

Lepsoy, J., Kim, S., Atnafu, D. & Kim, H. J., 2016 Mar 7, 2015 5th International Conference on Information and Communication Technology and Accessibility, ICTA 2015. Institute of Electrical and Electronics Engineers Inc., 7426905

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Preface

Shi, Y. Q., Kim, H. J., Pérez-González, F. & Echizen, I., 2016, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9569

Research output: Contribution to journalArticle

Reversible Data Hiding in JPEG Images

Huang, F., Qu, X., Kim, H. J. & Huang, J., 2016 Sep 1, In : IEEE Transactions on Circuits and Systems for Video Technology. 26, 9, p. 1610-1621 12 p., 7225117.

Research output: Contribution to journalArticle

67 Citations (Scopus)

Reversible data hiding using a piecewise autoregressive predictor based on two-stage embedding

Lee, B. Y., Hwang, H. J. & Kim, H. J., 2016 Jul 1, In : Journal of Electrical Engineering and Technology. 11, 4, p. 974-986 13 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)

Reversible data hiding using least square predictor via the LASSO

Hwang, H. J., Kim, S. H. & Kim, H. J., 2016 Dec 1, In : Eurasip Journal on Image and Video Processing. 2016, 1, 42.

Research output: Contribution to journalArticle

8 Citations (Scopus)
2015

Automatic contrast enhancement using reversible data hiding

Kim, S., Lussi, R., Qu, X. & Kim, H. J., 2015 Dec 29, 2015 IEEE International Workshop on Information Forensics and Security, WIFS 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7368603

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Citations (Scopus)

Early width estimation of fragmented JPEG with corrupted header

Ayalneh, D. A., Choi, Y. & Kim, H. J., 2015 Sep 17, (Accepted/In press) In : Multimedia Tools and Applications.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Linear collaborative discriminant regression classification for face recognition

Qu, X., Kim, S., Cui, R. & Kim, H. J., 2015 Jul 27, In : Journal of Visual Communication and Image Representation. 31, p. 312-319 8 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)

Local pixel patterns

Huang, F., Qu, X., Kim, H. J. & Huang, J., 2015 Jun 1, In : Computational Visual Media. 1, 2, p. 157-170 14 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding

Qu, X. & Kim, H. J., 2015 Jan 1, In : Signal Processing. 111, p. 249-260 12 p.

Research output: Contribution to journalArticle

92 Citations (Scopus)

Reversible binary image watermarking method using overlapping pattern substitution

Dong, K., Kim, H. J., Choi, Y. S., Joo, S. H. & Chung, B. H., 2015 Oct 1, In : ETRI Journal. 37, 5, p. 990-1000 11 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Reversible watermarking based on compensation

Qu, X., Kim, S. & Kim, H. J., 2015 Jan 1, In : Journal of Electrical Engineering and Technology. 10, 1, p. 422-428 7 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Scheduling in compute cloud with multiple data banks using divisible load paradigm

Suresh, S., Huang, H. & Kim, H. J., 2015 Apr 1, In : IEEE Transactions on Aerospace and Electronic Systems. 51, 2, p. 1288-1297 10 p., 7126183.

Research output: Contribution to journalArticle

14 Citations (Scopus)

Weighted sparse representation using a learned distance metric for face recognition

Qu, X., Kim, S., Atnafu, D. & Kim, H. J., 2015 Dec 9, Proceedings - International Conference on Image Processing, ICIP. IEEE Computer Society, Vol. 2015-December. p. 4594-4598 5 p. 7351677

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
2014

A Cognitive Ensemble of Extreme Learning Machines for Steganalysis Based on Risk-Sensitive Hinge Loss Function

Sachnev, V., Ramasamy, S., Sundaram, S., Kim, H. J. & Hwang, H. J., 2014, In : Cognitive Computation. 7, 1, p. 103-110 8 p.

Research output: Contribution to journalArticle

17 Citations (Scopus)

A Meta-Cognitive Learning Algorithm for an Extreme Learning Machine Classifier

Savitha, R., Suresh, S. & Kim, H. J., 2014 Jan 1, In : Cognitive Computation. 6, 2, p. 253-263 11 p.

Research output: Contribution to journalArticle

50 Citations (Scopus)

Analyzing the effect of the distortion compensation in reversible watermarking

Kim, S. & Kim, H. J., 2014 Feb 24, Proceedings of SPIE - The International Society for Optical Engineering. Vol. 9069. 90690P

Research output: Chapter in Book/Report/Conference proceedingConference contribution

An enhanced (t,n) threshold directed signature scheme

Hwang, J. Y., Kim, H. J., Lee, D. H. & Song, B., 2014 Aug 10, In : Information Sciences. 275, p. 284-292 9 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

A new approach to preserve privacy data mining based on fuzzy theory in numerical database

Cui, R. & Kim, H. J., 2014 Feb 24, Proceedings of SPIE - The International Society for Optical Engineering. Vol. 9069. 90691A

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Binary Coded Genetic Algorithm with Ensemble Classifier for feature selection in JPEG steganalysis

Sachnev, V. & Kim, H. J., 2014 Jan 1, IEEE ISSNIP 2014 - 2014 IEEE 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Conference Proceedings. IEEE Computer Society, 6827700

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Enhanced discriminant linear regression classification for face recognition

Qu, X. & Kim, H. J., 2014 Jan 1, IEEE ISSNIP 2014 - 2014 IEEE 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Conference Proceedings. IEEE Computer Society, 6827696

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Hybrid real-coded genetic algorithm for data partitioning in multi-round load distribution and scheduling in heterogeneous systems

Suresh, S., Huang, H. & Kim, H. J., 2014 Jan 1, In : Applied Soft Computing Journal. 24, p. 500-510 11 p.

Research output: Contribution to journalArticle

24 Citations (Scopus)

JPEG copy paste forgery detection using BAG optimized for complex images

Ayalneh, D. A., Kim, H. J. & Choi, Y. S., 2014 Jan 1, International Conference on Advanced Communication Technology, ICACT. Institute of Electrical and Electronics Engineers Inc., p. 181-185 5 p. 6778945

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Parkinson Disease Classification based on binary coded genetic algorithm and Extreme learning machine

Sachnev, V. & Kim, H. J., 2014 Jan 1, IEEE ISSNIP 2014 - 2014 IEEE 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Conference Proceedings. IEEE Computer Society, 6827649

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Reversible watermarking using edge based difference modification

Qu, X., Kim, S. & Kim, H. J., 2014 Feb 24, Proceedings of SPIE - The International Society for Optical Engineering. Vol. 9069. 90690Q

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
2013

An attempt to generalize distortion measure for JPEG steganography

Sachnev, V. & Kim, H. J., 2013 Sep 3, Digital Forensics and Watermaking - 11th International Workshop, IWDW 2012, Revised Selected Papers. p. 69-82 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7809 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A new approach for achieving k-anonymity in database based on fuzzy clustering and 0-1 integer programming

Won, H. S., Cui, R., Kim, H. J., Sundaram, S. & Sachnev, V., 2013 Apr 1, In : Information (Japan). 16, 4, p. 2759-2766 8 p.

Research output: Contribution to journalArticle

Compressing JPEG compressed image using reversible data hiding technique

Kang, S. U., Qu, X. & Kim, H. J., 2013 Dec 1, 2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA 2013. 6694324

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Optimal lossless data hiding using selective block manipulation based on local characteristics

Qu, X., Kim, H. J. & Choi, Y. S., 2013 Apr 1, In : Information (Japan). 16, 4, p. 2739-2758 20 p.

Research output: Contribution to journalArticle

Reversible data hiding for halftone images using histogram modification

Kim, C., Choi, Y., Kim, H. J., Shin, D., Shin, D. & Yang, C. N., 2013 Mar 1, In : Information (Japan). 16, 3 A, p. 1861-1872 12 p.

Research output: Contribution to journalArticle

2012

A fully complex-valued radial basis function classifier for real-valued classification problems

Savitha, R., Suresh, S., Sundararajan, N. & Kim, H. J., 2012 Feb 15, In : Neurocomputing. 78, 1, p. 104-110 7 p.

Research output: Contribution to journalArticle

50 Citations (Scopus)

An efficient embedder for BCH coding for steganography

Zhang, R., Sachnev, V., Botnan, M. B., Kim, H. J. & Heo, J., 2012 Nov 26, In : IEEE Transactions on Information Theory. 58, 12, p. 7272-7279 8 p., 6294443.

Research output: Contribution to journalArticle

28 Citations (Scopus)

An improved matrix encoding scheme for JPEG steganography

Sachnev, V. & Kim, H. J., 2012 Sep 7, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 7128 LNCS. p. 3-15 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7128 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution