Showing results 1 to 7 of 7
Biometric-PKI Authentication System Using Fingerprint Minutiae Jang, Han-Ul; Lee, Heung-Kyu, Int. Sym. on Information Hiding and Protection(SIHP’2014), pp.25 - 30, EII(Engineering Information Institute), 2014-03-10 |
Detecting composite image manipulation based on deep neural networks Choi, Hak-Yeol; Jang, Han-Ul; Kim, Dongkyu; Son, Jeongho; Mun, Seung-Min; Choi, Sunghee; Lee, Heung-Kyu, 24th International Conference on Systems, Signals and Image Processing, IWSSIP 2017, pp.1 - 5, IEEE Computer Society, 2017-05-22 |
Exposing Digital Forgeries by Detecting a Contextual Violation Using Deep Neural Networks Hou, Jong-Uk; Jang, Han-Ul; Park, Jin-Seok; Lee, Heung-Kyu, 18th World International Conference on Information Security and Application (WISA), pp.63 - 74, Korea Institute of Information Security & Cryptology, 2017-08-24 |
Fingerprint-PKI Authentication Using Zernike Moments Jang, Han-Ul; Hyun, Dai-Kyung; Jung, Dae-Jin; Lee, Heung-Kyu, Int. Conf. on Image Processing(ICIP’2014), pp.5022 - 5026, IEEE Signal Processing Society, 2014-10-27 |
Hue Modification Estimation Using Sensor Pattern Noise Hou, Jong-Uk; Jang, Han-Ul; Lee, Heung-Kyu, Int. Conf. on Image Processing(ICIP’2014), pp.5287 - 5291, IEEE Signal Processing Society, 2014-10-27 |
Improved 3D mesh steganalysis using homogeneous kernel map Kim, Dongkyu; Jang, Han-Ul; Choi, Hak-Yeol; Son, Jeongho; Yu, In-Jae; Lee, Heung-Kyu, 8th International Conference on Information Science and Applications, ICISA 2017, pp.358 - 365, Springer Verlag, 2017-03-20 |
Perceptual 3D watermarking using mesh saliency Son, Jeongho; Kim, Dongkyu; Choi, Hak-Yeol; Jang, Han-Ul; Choi, Sunghee, 8th International Conference on Information Science and Applications, ICISA 2017, pp.315 - 322, Springer Verlag, 2017-03 |
Discover