If you made any changes in Pure these will be visible here soon.

Research Output 1990 2019

  • 2813 Citations
  • 25 h-Index
  • 89 Article
  • 61 Conference contribution
  • 3 Chapter
  • 3 Editorial
Filter
Conference contribution
2019

Reversible data hiding in JPEG images based on multiple histograms modification

Lu, X., Huang, F. & Kim, H. J., 2019 Jan 1, Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, Proceedings. Sun, X., Pan, Z. & Bertino, E. (eds.). Springer Verlag, p. 442-454 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11634 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data Hiding
Discrete cosine transforms
Histogram
Run Length
Discrete Cosine Transform
2018

Intrusion detection and mitigation system using blockchain analysis for bitcoin exchange

Kim, S., Kim, B. & Kim, H. J., 2018 Oct 29, Proceedings of 2018 International Conference on Cloud Computing and Internet of Things, CCIOT 2018. Association for Computing Machinery, p. 40-44 5 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
2017
2 Citations (Scopus)

Website fingerprinting attack on Psiphon and its forensic analysis

Ejeta, T. G. & Kim, H. J., 2017, Digital Forensics and Watermarking - 16th International Workshop, IWDW 2017, Proceedings. Springer Verlag, Vol. 10431 LNCS. p. 42-51 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10431 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fingerprinting
Websites
Attack
Internet
Traffic
2016
2 Citations (Scopus)

Metadata protection scheme for JPEG privacy & security using hierarchical and group-based models

Lepsoy, J., Kim, S., Atnafu, D. & Kim, H. J., 2016 Mar 7, 2015 5th International Conference on Information and Communication Technology and Accessibility, ICTA 2015. Institute of Electrical and Electronics Engineers Inc., 7426905

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Metadata
2015
10 Citations (Scopus)

Automatic contrast enhancement using reversible data hiding

Kim, S., Lussi, R., Qu, X. & Kim, H. J., 2015 Dec 29, 2015 IEEE International Workshop on Information Forensics and Security, WIFS 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7368603

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Image enhancement
Smartphones
Automation
Experiments
Recovery
1 Citation (Scopus)

Weighted sparse representation using a learned distance metric for face recognition

Qu, X., Kim, S., Atnafu, D. & Kim, H. J., 2015 Dec 9, Proceedings - International Conference on Image Processing, ICIP. IEEE Computer Society, Vol. 2015-December. p. 4594-4598 5 p. 7351677

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Face recognition
Testing
Experiments
2014

Analyzing the effect of the distortion compensation in reversible watermarking

Kim, S. & Kim, H. J., 2014 Feb 24, Proceedings of SPIE - The International Society for Optical Engineering. Vol. 9069. 90690P

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reversible Watermarking
Watermarking
embedding
Military
Compensation and Redress
2 Citations (Scopus)

A new approach to preserve privacy data mining based on fuzzy theory in numerical database

Cui, R. & Kim, H. J., 2014 Feb 24, Proceedings of SPIE - The International Society for Optical Engineering. Vol. 9069. 90691A

Research output: Chapter in Book/Report/Conference proceedingConference contribution

privacy
data mining
Fuzzy Theory
Privacy
Data mining
5 Citations (Scopus)

Binary Coded Genetic Algorithm with Ensemble Classifier for feature selection in JPEG steganalysis

Sachnev, V. & Kim, H. J., 2014 Jan 1, IEEE ISSNIP 2014 - 2014 IEEE 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Conference Proceedings. IEEE Computer Society, 6827700

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Feature extraction
Classifiers
Genetic algorithms
Set theory
Labels
2 Citations (Scopus)

Enhanced discriminant linear regression classification for face recognition

Qu, X. & Kim, H. J., 2014 Jan 1, IEEE ISSNIP 2014 - 2014 IEEE 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Conference Proceedings. IEEE Computer Society, 6827696

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Face recognition
Linear regression
Experiments
5 Citations (Scopus)

JPEG copy paste forgery detection using BAG optimized for complex images

Ayalneh, D. A., Kim, H. J. & Choi, Y. S., 2014 Jan 1, International Conference on Advanced Communication Technology, ICACT. Institute of Electrical and Electronics Engineers Inc., p. 181-185 5 p. 6778945

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Forging
Digital forensics
7 Citations (Scopus)

Parkinson Disease Classification based on binary coded genetic algorithm and Extreme learning machine

Sachnev, V. & Kim, H. J., 2014 Jan 1, IEEE ISSNIP 2014 - 2014 IEEE 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Conference Proceedings. IEEE Computer Society, 6827649

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Learning systems
Genes
Genetic algorithms
Gene expression
Experiments
1 Citation (Scopus)

Reversible watermarking using edge based difference modification

Qu, X., Kim, S. & Kim, H. J., 2014 Feb 24, Proceedings of SPIE - The International Society for Optical Engineering. Vol. 9069. 90690Q

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reversible Watermarking
Watermarking
Pixels
pixels
expansion
2013

An attempt to generalize distortion measure for JPEG steganography

Sachnev, V. & Kim, H. J., 2013 Sep 3, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 7809 LNCS. p. 69-82 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7809 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Steganography
Data Hiding
Generalise
Steganalysis
Coefficient
1 Citation (Scopus)

Compressing JPEG compressed image using reversible data hiding technique

Kang, S. U., Qu, X. & Kim, H. J., 2013 Dec 1, 2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA 2013. 6694324

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Image quality
Pixels
2012

An improved matrix encoding scheme for JPEG steganography

Sachnev, V. & Kim, H. J., 2012 Sep 7, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 7128 LNCS. p. 3-15 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7128 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Steganography
Encoding
Steganalysis
Coefficient
Experiments
8 Citations (Scopus)

A projection based learning meta-cognitive RBF network classifier for effective diagnosis of Parkinson's disease

Sateesh Babu, G., Suresh, S., Uma Sangumathi, K. & Kim, H. J., 2012 Aug 23, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PART 2 ed. Vol. 7368 LNCS. p. 611-620 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7368 LNCS, no. PART 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

RBF Network
Parkinson's Disease
Radial basis function networks
Neurons
Neuron

Recognizing numbers from the low-resolution patterns in digital images

Tsomko, E. & Kim, H. J., 2012 Aug 23, International Workshop on Image Analysis for Multimedia Interactive Services. 6226777

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Railroad cars
Statistical methods
2011
1 Citation (Scopus)

An efficient pattern substitution watermarking method for binary images

Dong, K. & Kim, H. J., 2011 Feb 1, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6526 LNCS. p. 181-188 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6526 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Binary images
Binary Image
Watermarking
Substitution
Substitution reactions

An Efficient Pattern Substitution Watermarking Method for Binary Images

Dong, K. & Kim, H. J., 2011 Jan 1, Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers. Kim, H-J., Shi, Y. Q. & Barni, M. (eds.). Springer Verlag, p. 181-188 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6526 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Binary images
Binary Image
Watermarking
Substitution
Substitution reactions
3 Citations (Scopus)

Blocking effect and halftoning impulse suppression in an ED/OD BTC image with optimized texture-dependent filter sets

Guo, J. M., Su, C. C. & Kim, H. J., 2011 Aug 24, Proceedings 2011 International Conference on System Science and Engineering, ICSSE 2011. p. 593-596 4 p. 5961972

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Image coding
Image quality
Computer vision
Textures
Defects
27 Citations (Scopus)

Fast learning fully complex-valued classifiers for real-valued classification problems

Savitha, R., Suresh, S., Sundararajan, N. & Kim, H. J., 2011 Jun 6, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PART 1 ed. Vol. 6675 LNCS. p. 602-609 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6675 LNCS, no. PART 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Classification Problems
Classifiers
Classifier
Extreme Learning Machine
Learning systems
1 Citation (Scopus)

Interpolation method identification from resampled images

Kim, H. J., Lim, S., Jang, S., Kim, B. & Jung, E. S., 2011, International Workshop on Image Analysis for Multimedia Interactive Services. IEEE Computer Society

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Interpolation
Discrete Fourier transforms
Classifiers
7 Citations (Scopus)

Ternary data hiding technique for JPEG steganography

Sachnev, V. & Kim, H. J., 2011 Feb 1, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6526 LNCS. p. 202-210 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6526 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Steganography
Data Hiding
Ternary
Coefficient
Encoding

Ternary Data Hiding Technique for JPEG Steganography

Sachnev, V. & Kim, H. J., 2011 Jan 1, Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers. Kim, H-J., Shi, Y. Q. & Barni, M. (eds.). Springer Verlag, p. 202-210 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6526 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Steganography
Data Hiding
Ternary
Coefficient
Encoding
2010
2 Citations (Scopus)

A fast implementation of arithmetic coding

Kim, H. J., 2010 Jul 9, Advances in Web Technologies and Applications - Proceedings of the 12th Asia-Pacific Web Conference, APWeb 2010. p. 419-423 5 p. 5474097

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Binary sequences
Data compression
Experiments
1 Citation (Scopus)

A new approach to photography forensics using 3D analysis for correcting perception errors: A case study

Kim, H. J., Lim, S., Kim, B. & Jung, E. S., 2010 Dec 1, SMVC'10 - Proceedings of the 2010 ACM Workshop on Surreal Media and Virtual Cloning, Co-located with ACM Multimedia 2010. p. 27-30 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Photography
Aberrations
2009
4 Citations (Scopus)

A novel approach for JPEG steganography

Sachnev, V., Kim, H. J., Zhang, R. & Choi, Y. S., 2009 Dec 1, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5450 LNCS. p. 209-217 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5450 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Steganography
Data Hiding
Steganalysis
Detectability
Coefficient

A spectral technique for image clustering

Tsomko, E., Kim, H. J., Izquierdo, E. & Ones, V. G., 2009 Dec 1, 2009 International Conference on Ultra Modern Telecommunications and Workshops. 5345343

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Eigenvalues and eigenfunctions
52 Citations (Scopus)

Fast BCH syndrome coding for steganography

Zhang, R., Sachnev, V. & Kim, H. J., 2009 Nov 4, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5806 LNCS. p. 48-58 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5806 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Steganography
Coding
Pixels
Data Hiding
Time Complexity
7 Citations (Scopus)

Improving the modified matrix encoding on steganography method

Choi, Y. & Kim, H. J., 2009 Dec 1, 5th International Conference on Information Assurance and Security, IAS 2009. Vol. 1. p. 205-208 4 p. 5283888

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Steganography
2008
6 Citations (Scopus)

An improved reversible difference expansion watermarking algorithm

Vasiliy, S., Kim, H. J., Xiang, S. & Nam, J., 2008 Dec 1, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5041 LNCS. p. 254-263 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5041 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Watermarking
Reversible Watermarking
Pixel
Pixels
Cover

An improved steganographic method

Kim, H. J. & Md, A., 2008 Nov 17, SIGMAP 2008 - Proceedings of the International Conference on Signal Processing and Multimedia Applications. p. 145-150 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Citations (Scopus)

Efficient method of detecting globally blurry or sharp images

Tsomko, E. & Kim, H. J., 2008 Sep 19, WIAMIS 2008 - Proceedings of the 9th International Workshop on Image Analysis for Multimedia Interactive Services. p. 171-174 4 p. 4556912

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Digital cameras
Degradation
Defects
Experiments
3 Citations (Scopus)

Watermarking security incorporating natural scene statistics

Ni, J., Zhang, R., Fang, C., Huang, J., Wang, C. & Kim, H. J., 2008 Dec 1, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5284 LNCS. p. 132-146 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5284 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Watermarking
Statistics
Scale Mixture
Gaussian Mixture
Information analysis
2007
9 Citations (Scopus)

An innocuous visual cryptography scheme

Kim, H. J., Sachnev, V., Choi, S. J. & Xiang, S., 2007 Dec 1, 8th International Workshop on Image Analysis for Multimedia Interactive Services, WIAMIS 2007. 4279173

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
1 Citation (Scopus)

Ant colony optimization for satellite customer assignment

Kim, S. S., Kim, H. J., Mani, V. & Kim, C. H., 2007 Dec 1, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4412 LNCS. p. 170-179 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4412 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ant Colony System
Ants
Ant colony optimization
Assignment
Customers
4 Citations (Scopus)

Automated grocery ordering systems for smart home

Hong, K. S., Kim, H. J. & Lee, C. U., 2007 Dec 1, Proceedings of Future Generation Communication and Networking, FGCN 2007. Vol. 2. p. 87-92 6 p. 4426209

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Costs
Mathematical models
3 Citations (Scopus)

Geometrically invariant image watermarking in the DWT domain

Xiang, S. & Kim, H. J., 2007 Dec 1, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4867 LNCS. p. 76-90 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4867 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wavelet Analysis
Image Watermarking
Image watermarking
Discrete wavelet transforms
Watermark
72 Citations (Scopus)

Histogram-based image hashing scheme robust against geometric deformations

Xiang, S., Kim, H. J. & Huang, J., 2007 Dec 1, MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007. p. 121-128 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hash functions
Low pass filters
Bins
Invariance
Signal processing
2006

e-Learning media format for enhanced consumption on mobile application

Lee, S., Yang, S., Ro, Y. M. & Kim, H. J., 2006, CEUR Workshop Proceedings. Vol. 228.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Metadata
Mobile devices
Content based retrieval
Interoperability
Navigation
2 Citations (Scopus)

Genetic algorithm for satellite customer assignment

Kim, S. S., Kim, H. J., Mani, V. & Kim, C. H., 2006, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 4234 LNCS - III. p. 964-973 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4234 LNCS - III).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Assignment
Customers
Genetic algorithms
Genetic Algorithm
Satellites
2005
7 Citations (Scopus)

A new visual cryptography using natural images

Kim, H. J. & Choi, Y., 2005, Proceedings - IEEE International Symposium on Circuits and Systems. p. 5537-5540 4 p. 1465891

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Steganography
Cryptography
Inspection
5 Citations (Scopus)

A real coded genetic algorithm for data partitioning and scheduling in networks with arbitrary processor release time

Suresh, S., Mani, V., Omkar, S. N. & Kim, H. J., 2005, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3740 LNCS. p. 529-539 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3740 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data Partitioning
Real-coded Genetic Algorithm
Release Time
Genetic algorithms
Scheduling
4 Citations (Scopus)

Real-coded genetic algorithms for optimal static load balancing in distributed computing system with communication delays

Mani, V., Suresh, S. & Kim, H. J., 2005, Lecture Notes in Computer Science. Gervasi, O., Gavrilova, M. L., Kumar, V., Lagana, A., Lee, H. P., Mun, Y., Taniar, D. & Tan, C. J. K. (eds.). IV ed. Vol. 3483. p. 269-279 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Distributed computer systems
Resource allocation
Genetic algorithms
Communication
2 Citations (Scopus)

Security evaluation of generalized patchwork algorithm, from cryptanalytic viewpoint

Das, T. K., Kim, H. J. & Maitra, S., 2005, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3681 LNAI. p. 1240-1247 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3681 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Watermark
Polynomials
Evaluation
Mean square error
Attack
2004
7 Citations (Scopus)

A robust audio watermarking scheme

Kim, H. J., Kim, T. & Yeo, I. K., 2004, Proceedings - IEEE International Symposium on Circuits and Systems. Vol. 5.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Audio watermarking
Watermarking
Detectors
Image watermarking
Error detection

Watermark Detection Rate and Outliers

Kim, H. J., Kim, T. & Yeo, I. K., 2004, Proceedings of SPIE - The International Society for Optical Engineering. Schmalz, M. S. (ed.). Vol. 5208. p. 187-195 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Watermarking
Detectors
detectors
Error detection
products
2002
2 Citations (Scopus)

Scheduling divisible loads in non-blocking mode of communication: Optimal sequencing and arrangement in a single-level tree network

Kim, H. J., Kim, T. & Mani, V., 2002, 2002 Student Conference on Research and Development: Globalizing Research and Development in Electrical and Electronics Engineering, SCOReD 2002 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 464-467 4 p. 1033158

Research output: Chapter in Book/Report/Conference proceedingConference contribution

scheduling
Scheduling
communication
Communication
Processing
2001
25 Citations (Scopus)

Modified Patchwork Algorithm: A novel audio watermarking scheme

Yeo, I. K. & Kim, H. J., 2001, Proceedings - International Conference on Information Technology: Coding and Computing, ITCC 2001. Institute of Electrical and Electronics Engineers Inc., p. 237-242 6 p. 918798

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Audio watermarking
Discrete cosine transforms
Watermarking
Signal processing