BibTeX records: Cheonshik Kim

download as .bib file

@article{DBLP:journals/mta/XiongZYK24,
  author       = {Lizhi Xiong and
                  Mengtao Zhang and
                  Ching{-}Nung Yang and
                  Cheonshik Kim},
  title        = {An enhanced {AMBTC} for color image compression using color palette},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {11},
  pages        = {31783--31803},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-16734-7},
  doi          = {10.1007/S11042-023-16734-7},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/XiongZYK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/YuZK23,
  author       = {Huan Yu and
                  Ru Zhang and
                  Cheonshik Kim},
  title        = {Intelligent analysis system of college students' employment and entrepreneurship
                  situation: Big data and artificial intelligence-driven approach},
  journal      = {Comput. Electr. Eng.},
  volume       = {110},
  pages        = {108823},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.compeleceng.2023.108823},
  doi          = {10.1016/J.COMPELECENG.2023.108823},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/YuZK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KimYZJ23,
  author       = {Cheonshik Kim and
                  Ching{-}Nung Yang and
                  Zhili Zhou and
                  Ki{-}Hyun Jung},
  title        = {Dual efficient reversible data hiding using Hamming code and {OPAP}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103544},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103544},
  doi          = {10.1016/J.JISA.2023.103544},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KimYZJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/NguyenNKD23,
  author       = {The{-}Vinh Nguyen and
                  Ngoc Phi Nguyen and
                  Cheonshik Kim and
                  Nhu{-}Ngoc Dao},
  title        = {Intelligent aerial video streaming: Achievements and challenges},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {211},
  pages        = {103564},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jnca.2022.103564},
  doi          = {10.1016/J.JNCA.2022.103564},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/NguyenNKD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangWLK21,
  author       = {Ching{-}Nung Yang and
                  Xiaotian Wu and
                  Hsuan{-}Yu Lin and
                  Cheonshik Kim},
  title        = {Intragroup and intergroup secret image sharing based on homomorphic
                  Lagrange interpolation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102910},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102910},
  doi          = {10.1016/J.JISA.2021.102910},
  timestamp    = {Wed, 08 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YangWLK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jrtip/ZhouYKC20,
  author       = {Zhili Zhou and
                  Ching{-}Nung Yang and
                  Cheonshik Kim and
                  Stelvio Cimato},
  title        = {Introduction to the special issue on deep learning for real-time information
                  hiding and forensics},
  journal      = {J. Real Time Image Process.},
  volume       = {17},
  number       = {1},
  pages        = {1--5},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11554-020-00947-2},
  doi          = {10.1007/S11554-020-00947-2},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jrtip/ZhouYKC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/LengYKZ20,
  author       = {Lu Leng and
                  Ziyuan Yang and
                  Cheonshik Kim and
                  Yue Zhang},
  title        = {A Light-Weight Practical Framework for Feces Detection and Trait Recognition},
  journal      = {Sensors},
  volume       = {20},
  number       = {9},
  pages        = {2644},
  year         = {2020},
  url          = {https://doi.org/10.3390/s20092644},
  doi          = {10.3390/S20092644},
  timestamp    = {Fri, 06 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/LengYKZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/KimSYCW19,
  author       = {Cheonshik Kim and
                  Dongkyoo Shin and
                  Ching{-}Nung Yang and
                  Yi{-}Cheng Chen and
                  Song{-}Yu Wu},
  title        = {Data Hiding Using Sequential Hamming + k with m Overlapped Pixels},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {13},
  number       = {12},
  pages        = {6159--6174},
  year         = {2019},
  url          = {https://doi.org/10.3837/tiis.2019.12.020},
  doi          = {10.3837/TIIS.2019.12.020},
  timestamp    = {Wed, 15 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/KimSYCW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jrtip/YangCLK19,
  author       = {Ching{-}Nung Yang and
                  Yung{-}Shun Chou and
                  Yan{-}Xiao Liu and
                  Cheonshik Kim},
  title        = {Exploiting error control in matrix coding-based data hiding over lossy
                  channel},
  journal      = {J. Real Time Image Process.},
  volume       = {16},
  number       = {3},
  pages        = {577--588},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11554-018-0829-1},
  doi          = {10.1007/S11554-018-0829-1},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jrtip/YangCLK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/KimKR19,
  author       = {Cheonshik Kim and
                  Byung{-}Gyu Kim and
                  Joel J. P. C. Rodrigues},
  title        = {Editorial: Recent Advances in Mining Intelligence and Context-Awareness
                  on IoT-Based Platforms},
  journal      = {Mob. Networks Appl.},
  volume       = {24},
  number       = {1},
  pages        = {160--162},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11036-018-1172-2},
  doi          = {10.1007/S11036-018-1172-2},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/KimKR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/KimSYC19,
  author       = {Cheonshik Kim and
                  Dongkyoo Shin and
                  Ching{-}Nung Yang and
                  Yung{-}Shun Chou},
  title        = {Generalizing Hamming+k data hiding by overlapped pixels},
  journal      = {Multim. Tools Appl.},
  volume       = {78},
  number       = {13},
  pages        = {17995--18015},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11042-018-7101-3},
  doi          = {10.1007/S11042-018-7101-3},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/KimSYC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/YangWCK19,
  author       = {Ching{-}Nung Yang and
                  Song{-}Yu Wu and
                  Yung{-}Shun Chou and
                  Cheonshik Kim},
  title        = {Enhanced stego-image quality and embedding capacity for the partial
                  reversible data hiding scheme},
  journal      = {Multim. Tools Appl.},
  volume       = {78},
  number       = {13},
  pages        = {18595--18616},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11042-019-7220-5},
  doi          = {10.1007/S11042-019-7220-5},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/YangWCK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/displays/KimSLY18,
  author       = {Cheonshik Kim and
                  Dongkyoo Shin and
                  Lu Leng and
                  Ching{-}Nung Yang},
  title        = {Separable reversible data hiding in encrypted halftone image},
  journal      = {Displays},
  volume       = {55},
  pages        = {71--79},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.displa.2018.04.002},
  doi          = {10.1016/J.DISPLA.2018.04.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/displays/KimSLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsp/KimSYC18,
  author       = {Cheonshik Kim and
                  Dongkyoo Shin and
                  Ching{-}Nung Yang and
                  Yung{-}Shun Chou},
  title        = {Improving capacity of Hamming (\emph{n}, \emph{k})+1 stego-code by
                  using optimized Hamming +{\unicode{8239}}\emph{k}},
  journal      = {Digit. Signal Process.},
  volume       = {78},
  pages        = {284--293},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.dsp.2018.03.016},
  doi          = {10.1016/J.DSP.2018.03.016},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dsp/KimSYC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jrtip/KimCYZB18,
  author       = {Cheonshik Kim and
                  Chin{-}Chen Chang and
                  Ching{-}Nung Yang and
                  Xinpeng Zhang and
                  Jinsuk Baek},
  title        = {Special Issue: Real-Time Data Hiding and Visual Cryptography},
  journal      = {J. Real Time Image Process.},
  volume       = {14},
  number       = {1},
  pages        = {1--4},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11554-018-0749-0},
  doi          = {10.1007/S11554-018-0749-0},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jrtip/KimCYZB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jrtip/LeeYKY18,
  author       = {Gil{-}Je Lee and
                  Eun{-}Jun Yoon and
                  Cheonshik Kim and
                  Kee{-}Young Yoo},
  title        = {A real-time secret image sharing with fairness},
  journal      = {J. Real Time Image Process.},
  volume       = {14},
  number       = {1},
  pages        = {5--12},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11554-015-0558-7},
  doi          = {10.1007/S11554-015-0558-7},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jrtip/LeeYKY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jrtip/KimSLY18,
  author       = {Cheonshik Kim and
                  Dongkyoo Shin and
                  Lu Leng and
                  Ching{-}Nung Yang},
  title        = {Lossless data hiding for absolute moment block truncation coding using
                  histogram modification},
  journal      = {J. Real Time Image Process.},
  volume       = {14},
  number       = {1},
  pages        = {101--114},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11554-016-0641-8},
  doi          = {10.1007/S11554-016-0641-8},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jrtip/KimSLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jrtip/KimSKY18,
  author       = {Cheonshik Kim and
                  Dongkyoo Shin and
                  Byung{-}Gyu Kim and
                  Ching{-}Nung Yang},
  title        = {Secure medical images based on data hiding using a hybrid scheme with
                  the Hamming code, LSB, and {OPAP}},
  journal      = {J. Real Time Image Process.},
  volume       = {14},
  number       = {1},
  pages        = {115--126},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11554-017-0674-7},
  doi          = {10.1007/S11554-017-0674-7},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jrtip/KimSKY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jrtip/KimYKY18,
  author       = {Dae{-}Soo Kim and
                  Eun{-}Jun Yoon and
                  Cheonshik Kim and
                  Kee{-}Young Yoo},
  title        = {Reversible data hiding scheme with edge-direction predictor and modulo
                  operation},
  journal      = {J. Real Time Image Process.},
  volume       = {14},
  number       = {1},
  pages        = {137--145},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11554-015-0548-9},
  doi          = {10.1007/S11554-015-0548-9},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jrtip/KimYKY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jrtip/YangKL18,
  author       = {Ching{-}Nung Yang and
                  Cheonshik Kim and
                  Yen{-}Hung Lo},
  title        = {Adaptive real-time reversible data hiding for {JPEG} images},
  journal      = {J. Real Time Image Process.},
  volume       = {14},
  number       = {1},
  pages        = {147--157},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11554-015-0555-x},
  doi          = {10.1007/S11554-015-0555-X},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jrtip/YangKL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/KimKRY18,
  author       = {Cheonshik Kim and
                  Bryan Kim and
                  Joel J. P. C. Rodrigues and
                  James C. N. Yang},
  title        = {Special issue: Advanced technology for smart home automation and entertainment},
  journal      = {Pers. Ubiquitous Comput.},
  volume       = {22},
  number       = {1},
  pages        = {1--2},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00779-017-1102-5},
  doi          = {10.1007/S00779-017-1102-5},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/puc/KimKRY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/KimSY18,
  author       = {Cheonshik Kim and
                  Dongkyoo Shin and
                  Ching{-}Nung Yang},
  title        = {Self-embedding fragile watermarking scheme to restoration of a tampered
                  image using {AMBTC}},
  journal      = {Pers. Ubiquitous Comput.},
  volume       = {22},
  number       = {1},
  pages        = {11--22},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00779-017-1061-x},
  doi          = {10.1007/S00779-017-1061-X},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/puc/KimSY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/LeeBKY18,
  author       = {Yong{-}Joon Lee and
                  Namkyun Baik and
                  Cheonshik Kim and
                  Ching{-}Nung Yang},
  title        = {Study of detection method for spoofed {IP} against DDoS attacks},
  journal      = {Pers. Ubiquitous Comput.},
  volume       = {22},
  number       = {1},
  pages        = {35--44},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00779-017-1097-y},
  doi          = {10.1007/S00779-017-1097-Y},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/puc/LeeBKY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/LengGCK18,
  author       = {Lu Leng and
                  Fumeng Gao and
                  Qi Chen and
                  Cheonshik Kim},
  title        = {Palmprint recognition system on mobile devices with double-line-single-point
                  assistance},
  journal      = {Pers. Ubiquitous Comput.},
  volume       = {22},
  number       = {1},
  pages        = {93--104},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00779-017-1105-2},
  doi          = {10.1007/S00779-017-1105-2},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/puc/LengGCK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/FisherJBK18,
  author       = {Paul S. Fisher and
                  Jimmy James II and
                  Jinsuk Baek and
                  Cheonshik Kim},
  title        = {Mining intelligent solution to compensate missing data context of
                  medical IoT devices},
  journal      = {Pers. Ubiquitous Comput.},
  volume       = {22},
  number       = {1},
  pages        = {219--224},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00779-017-1106-1},
  doi          = {10.1007/S00779-017-1106-1},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/puc/FisherJBK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/YangHK17,
  author       = {Ching{-}Nung Yang and
                  Shen{-}Chieh Hsu and
                  Cheonshik Kim},
  title        = {Improving stego image quality in image interpolation based data hiding},
  journal      = {Comput. Stand. Interfaces},
  volume       = {50},
  pages        = {209--215},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.csi.2016.10.005},
  doi          = {10.1016/J.CSI.2016.10.005},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/YangHK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/YangWYWK17,
  author       = {Ching{-}Nung Yang and
                  Chihi{-}Han Wu and
                  Zong{-}Xuan Yeh and
                  Daoshun Wang and
                  Cheonshik Kim},
  title        = {A new sharing digital image scheme with clearer shadow images},
  journal      = {Comput. Stand. Interfaces},
  volume       = {51},
  pages        = {118--131},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.csi.2016.11.015},
  doi          = {10.1016/J.CSI.2016.11.015},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/YangWYWK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LengLKB17,
  author       = {Lu Leng and
                  Ming Li and
                  Cheonshik Kim and
                  Xue Bi},
  title        = {Dual-source discrimination power analysis for multi-instance contactless
                  palmprint recognition},
  journal      = {Multim. Tools Appl.},
  volume       = {76},
  number       = {1},
  pages        = {333--354},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11042-015-3058-7},
  doi          = {10.1007/S11042-015-3058-7},
  timestamp    = {Sun, 16 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LengLKB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/KimSSY16,
  author       = {Cheonshik Kim and
                  Dongkyoo Shin and
                  Dongil Shin and
                  Ching{-}Nung Yang},
  title        = {Secure protection of video recorder video in smart car},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {12},
  number       = {12},
  year         = {2016},
  url          = {https://doi.org/10.1177/1550147716681792},
  doi          = {10.1177/1550147716681792},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/KimSSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jrtip/BaekK16,
  author       = {Jinsuk Baek and
                  Cheonshik Kim},
  title        = {An energy-efficient video transport protocol for personal cloud-based
                  computing},
  journal      = {J. Real Time Image Process.},
  volume       = {12},
  number       = {2},
  pages        = {303--310},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11554-014-0475-1},
  doi          = {10.1007/S11554-014-0475-1},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jrtip/BaekK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jrtip/YangSYK16,
  author       = {Ching{-}Nung Yang and
                  Li{-}Zhe Sun and
                  Xuehu Yan and
                  Cheonshik Kim},
  title        = {Design a new visual cryptography for human-verifiable authentication
                  in accessing a database},
  journal      = {J. Real Time Image Process.},
  volume       = {12},
  number       = {2},
  pages        = {483--494},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11554-015-0511-9},
  doi          = {10.1007/S11554-015-0511-9},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jrtip/YangSYK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/KimY16a,
  author       = {Cheonshik Kim and
                  Ching{-}Nung Yang},
  title        = {Data hiding based on overlapped pixels using hamming code},
  journal      = {Multim. Tools Appl.},
  volume       = {75},
  number       = {23},
  pages        = {15651--15663},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11042-014-2355-x},
  doi          = {10.1007/S11042-014-2355-X},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/KimY16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bdcloud/LiuD0WBK16,
  author       = {Chun{-}Chi Liu and
                  Rong Du and
                  Shengling Wang and
                  Chenyu Wang and
                  Rongfang Bie and
                  Cheonshik Kim},
  editor       = {Zhipeng Cai and
                  Rafal A. Angryk and
                  Wen{-}Zhan Song and
                  Yingshu Li and
                  Xiaojun Cao and
                  Anu G. Bourgeois and
                  Guangchun Luo and
                  Liang Cheng and
                  Bhaskar Krishnamachari},
  title        = {Crowdsourcing Framework for Acoustic Sound Based Obstacle Echolocation
                  through Smartphones for Visually Impaired},
  booktitle    = {2016 {IEEE} International Conferences on Big Data and Cloud Computing
                  (BDCloud), Social Computing and Networking (SocialCom), Sustainable
                  Computing and Communications (SustainCom), BDCloud-SocialCom-SustainCom
                  2016, Atlanta, GA, USA, October 8-10, 2016},
  pages        = {185--192},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/BDCloud-SocialCom-SustainCom.2016.38},
  doi          = {10.1109/BDCLOUD-SOCIALCOM-SUSTAINCOM.2016.38},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bdcloud/LiuD0WBK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iiki/XuZBLKS16,
  author       = {Shuaijing Xu and
                  Guangzhi Zhang and
                  Rongfang Bie and
                  Wenshuang Liang and
                  Cheonshik Kim and
                  Dongkyoo Shin},
  title        = {Implicit Correlation Intensity Mining Based on the Monte Carlo Method
                  with Attenuation},
  booktitle    = {International Conference on Identification, Information and Knowledge
                  in the Internet of Things, {IIKI} 2016, Beijing, China, October 20-21,
                  2016},
  pages        = {275--278},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/IIKI.2016.23},
  doi          = {10.1109/IIKI.2016.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iiki/XuZBLKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/KimY15a,
  author       = {Cheonshik Kim and
                  Ching{-}Nung Yang},
  title        = {Watermark with {DSA} signature using predictive coding},
  journal      = {Multim. Tools Appl.},
  volume       = {74},
  number       = {14},
  pages        = {5189--5203},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11042-013-1667-6},
  doi          = {10.1007/S11042-013-1667-6},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/KimY15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vjcs/HoaTKY15,
  author       = {Le Quang Hoa and
                  Nguyen Huy Truong and
                  Cheonshik Kim and
                  Ching{-}Nung Yang},
  title        = {(1, 7, 4) Data hiding scheme for searching in hidden text with automata},
  journal      = {Vietnam. J. Comput. Sci.},
  volume       = {2},
  number       = {4},
  pages        = {257--265},
  year         = {2015},
  url          = {https://doi.org/10.1007/s40595-015-0050-0},
  doi          = {10.1007/S40595-015-0050-0},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vjcs/HoaTKY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jim/KimSSTY14,
  author       = {Cheonshik Kim and
                  Dongkyoo Shin and
                  Dongil Shin and
                  Raylin Tso and
                  Ching{-}Nung Yang},
  title        = {A secret sharing scheme for {EBTC} using steganography},
  journal      = {J. Intell. Manuf.},
  volume       = {25},
  number       = {2},
  pages        = {241--249},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10845-012-0660-7},
  doi          = {10.1007/S10845-012-0660-7},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jim/KimSSTY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/Kim14,
  author       = {Cheonshik Kim},
  title        = {Data hiding by an improved exploiting modification direction},
  journal      = {Multim. Tools Appl.},
  volume       = {69},
  number       = {3},
  pages        = {569--584},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11042-012-1114-0},
  doi          = {10.1007/S11042-012-1114-0},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/Kim14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fcc/KimY14,
  author       = {Cheonshik Kim and
                  Ching{-}Nung Yang},
  editor       = {James Jong Hyuk Park and
                  Albert Y. Zomaya and
                  Hwa{-}Young Jeong and
                  Mohammad S. Obaidat},
  title        = {Improving Data Hiding Capacity Based on Hamming Code},
  booktitle    = {Frontier and Innovation in Future Computing and Communications, Proceedings
                  of the 2014 {FTRA} International Symposium on Frontier and Innovation
                  in Future Computing and Communications, {FCC} 2014, Auckland, New
                  Zealand, January 13-16, 2014},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {301},
  pages        = {697--706},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-94-017-8798-7\_80},
  doi          = {10.1007/978-94-017-8798-7\_80},
  timestamp    = {Fri, 27 Mar 2020 08:55:45 +0100},
  biburl       = {https://dblp.org/rec/conf/fcc/KimY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KimBF14,
  author       = {Cheonshik Kim and
                  Jinsuk Baek and
                  Paul S. Fisher},
  editor       = {Jooyoung Lee and
                  Jongsung Kim},
  title        = {Lossless Data Hiding for Binary Document Images Using n n -Pairs Pattern},
  booktitle    = {Information Security and Cryptology - {ICISC} 2014 - 17th International
                  Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8949},
  pages        = {317--327},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15943-0\_19},
  doi          = {10.1007/978-3-319-15943-0\_19},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KimBF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KimY14,
  author       = {Cheonshik Kim and
                  Ching{-}Nung Yang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Steganography Based on Grayscale Images Using (5, 3) Hamming Code},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {588--598},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_45},
  doi          = {10.1007/978-3-319-19321-2\_45},
  timestamp    = {Thu, 28 May 2020 12:51:40 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KimY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/HuyK13,
  author       = {Phan Trung Huy and
                  Cheonshik Kim},
  title        = {Binary Image Data Hiding Using Matrix Encoding Technique in Sensors},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {9},
  year         = {2013},
  url          = {https://doi.org/10.1155/2013/340963},
  doi          = {10.1155/2013/340963},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/HuyK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/HuyTKY13,
  author       = {Phan Trung Huy and
                  Nguyen Hai Thanh and
                  Cheonshik Kim and
                  Ching{-}Nung Yang},
  title        = {Data-Hiding for Halftone Images Using an Improved {CPT} scheme},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {7},
  number       = {2},
  pages        = {405--424},
  year         = {2013},
  url          = {https://doi.org/10.3837/tiis.2013.02.013},
  doi          = {10.3837/TIIS.2013.02.013},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/HuyTKY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/YangCSK13,
  author       = {Ching{-}Nung Yang and
                  Pin{-}Wei Chen and
                  Hsiang{-}Wen Shih and
                  Cheonshik Kim},
  title        = {Aspect ratio invariant visual cryptography by image filtering and
                  resizing},
  journal      = {Pers. Ubiquitous Comput.},
  volume       = {17},
  number       = {5},
  pages        = {843--850},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00779-012-0535-0},
  doi          = {10.1007/S00779-012-0535-0},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/puc/YangCSK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gpc/OpuBHK13,
  author       = {Md. Fazla Rabbi Opu and
                  Emon Biswas and
                  Mansura Habiba and
                  Cheonshik Kim},
  editor       = {James J. Park and
                  Hamid R. Arabnia and
                  Cheonshik Kim and
                  Weisong Shi and
                  Joon{-}Min Gil},
  title        = {Architecture of a Context Aware Framework for Automated Mobile Device
                  Configuration},
  booktitle    = {Grid and Pervasive Computing - 8th International Conference, {GPC}
                  2013 and Colocated Workshops, Seoul, Korea, May 9-11, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7861},
  pages        = {299--308},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38027-3\_32},
  doi          = {10.1007/978-3-642-38027-3\_32},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/gpc/OpuBHK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gpc/HuyKAHY13,
  author       = {Phan Trung Huy and
                  Cheonshik Kim and
                  Nguyen Tuan Anh and
                  Le Quang Hoa and
                  Ching{-}Nung Yang},
  editor       = {James J. Park and
                  Hamid R. Arabnia and
                  Cheonshik Kim and
                  Weisong Shi and
                  Joon{-}Min Gil},
  title        = {Data Hiding Based on Palette Images Using Weak Bases of Z2-Modules},
  booktitle    = {Grid and Pervasive Computing - 8th International Conference, {GPC}
                  2013 and Colocated Workshops, Seoul, Korea, May 9-11, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7861},
  pages        = {649--658},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38027-3\_70},
  doi          = {10.1007/978-3-642-38027-3\_70},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gpc/HuyKAHY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gpc/YoonCK13,
  author       = {Eun{-}Jun Yoon and
                  Yong Soo Choi and
                  Cheonshik Kim},
  editor       = {James J. Park and
                  Hamid R. Arabnia and
                  Cheonshik Kim and
                  Weisong Shi and
                  Joon{-}Min Gil},
  title        = {New ID-Based Proxy Signature Scheme with Message Recovery},
  booktitle    = {Grid and Pervasive Computing - 8th International Conference, {GPC}
                  2013 and Colocated Workshops, Seoul, Korea, May 9-11, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7861},
  pages        = {945--951},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38027-3\_111},
  doi          = {10.1007/978-3-642-38027-3\_111},
  timestamp    = {Sat, 11 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gpc/YoonCK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gpc/2013,
  editor       = {James J. Park and
                  Hamid R. Arabnia and
                  Cheonshik Kim and
                  Weisong Shi and
                  Joon{-}Min Gil},
  title        = {Grid and Pervasive Computing - 8th International Conference, {GPC}
                  2013 and Colocated Workshops, Seoul, Korea, May 9-11, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7861},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38027-3},
  doi          = {10.1007/978-3-642-38027-3},
  isbn         = {978-3-642-38026-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gpc/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spl/YangWLK12,
  author       = {Ching{-}Nung Yang and
                  Chih{-}Cheng Wu and
                  Yi{-}Chin Lin and
                  Cheonshik Kim},
  title        = {Enhanced Matrix-Based Secret Image Sharing Scheme},
  journal      = {{IEEE} Signal Process. Lett.},
  volume       = {19},
  number       = {12},
  pages        = {789--792},
  year         = {2012},
  url          = {https://doi.org/10.1109/LSP.2012.2220348},
  doi          = {10.1109/LSP.2012.2220348},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/spl/YangWLK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aciids/KimSSY12,
  author       = {Cheonshik Kim and
                  Dongkyoo Shin and
                  Dongil Shin and
                  Ching{-}Nung Yang},
  editor       = {Jeng{-}Shyang Pan and
                  Shyi{-}Ming Chen and
                  Ngoc Thanh Nguyen},
  title        = {A (2, 2) Secret Sharing Scheme Based on Hamming Code and {AMBTC}},
  booktitle    = {Intelligent Information and Database Systems - 4th Asian Conference,
                  {ACIIDS} 2012, Kaohsiung, Taiwan, March 19-21, 2012, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7197},
  pages        = {129--139},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28490-8\_14},
  doi          = {10.1007/978-3-642-28490-8\_14},
  timestamp    = {Thu, 16 Mar 2023 20:00:29 +0100},
  biburl       = {https://dblp.org/rec/conf/aciids/KimSSY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/npc/HongKKL12,
  author       = {YouSik Hong and
                  Hongkyun Kim and
                  Cheonshik Kim and
                  Geuk Lee},
  editor       = {James J. Park and
                  Albert Y. Zomaya and
                  Sang{-}Soo Yeo and
                  Sartaj Sahni},
  title        = {New Electronic Acupuncture System Using Intelligence},
  booktitle    = {Network and Parallel Computing, 9th {IFIP} International Conference,
                  {NPC} 2012, Gwangju, Korea, September 6-8, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7513},
  pages        = {524--531},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35606-3\_62},
  doi          = {10.1007/978-3-642-35606-3\_62},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/npc/HongKKL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/npc/LeeKC12,
  author       = {Sangyong Lee and
                  Cheonshik Kim and
                  Seongah Chin},
  editor       = {James J. Park and
                  Albert Y. Zomaya and
                  Sang{-}Soo Yeo and
                  Sartaj Sahni},
  title        = {An Optimized Sub-texture Mapping Technique for an Arbitrary Texture
                  Considering Topology Relations},
  booktitle    = {Network and Parallel Computing, 9th {IFIP} International Conference,
                  {NPC} 2012, Gwangju, Korea, September 6-8, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7513},
  pages        = {559--564},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35606-3\_66},
  doi          = {10.1007/978-3-642-35606-3\_66},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/npc/LeeKC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/YangYK11,
  author       = {Ching{-}Nung Yang and
                  Guo{-}Cin Ye and
                  Cheonshik Kim},
  title        = {Data Hiding in Halftone Images by {XOR} Block-Wise Operation with
                  Difference Minimization},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {5},
  number       = {2},
  pages        = {457--476},
  year         = {2011},
  url          = {https://doi.org/10.3837/tiis.2011.02.013},
  doi          = {10.3837/TIIS.2011.02.013},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/YangYK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aciids/KimSS11,
  author       = {Cheonshik Kim and
                  Dongkyoo Shin and
                  Dongil Shin},
  editor       = {Ngoc Thanh Nguyen and
                  Chonggun Kim and
                  Adam Janiak},
  title        = {Data Hiding in a Halftone Image Using Hamming Code (15, 11)},
  booktitle    = {Intelligent Information and Database Systems - Third International
                  Conference, {ACIIDS} 2011, Daegu, Korea, April 20-22, 2011, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6592},
  pages        = {372--381},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20042-7\_38},
  doi          = {10.1007/978-3-642-20042-7\_38},
  timestamp    = {Thu, 16 Mar 2023 20:00:28 +0100},
  biburl       = {https://dblp.org/rec/conf/aciids/KimSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sta/KimSSZ11,
  author       = {Cheonshik Kim and
                  Dongkyoo Shin and
                  Dongil Shin and
                  Xinpeng Zhang},
  editor       = {James J. Park and
                  Javier L{\'{o}}pez and
                  Sang{-}Soo Yeo and
                  Taeshik Shon and
                  David Taniar},
  title        = {Improved Steganographic Embedding Exploiting Modification Direction
                  in Multimedia Communications},
  booktitle    = {Secure and Trust Computing, Data Management and Applications - 8th
                  {FTRA} International Conference, {STA} 2011, Loutraki, Greece, June
                  28-30, 2011. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {186},
  pages        = {130--138},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22339-6\_16},
  doi          = {10.1007/978-3-642-22339-6\_16},
  timestamp    = {Fri, 22 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sta/KimSSZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cma/KimKCWZ10,
  author       = {Hyoung Joong Kim and
                  Cheonshik Kim and
                  YongSoo Choi and
                  Shuozhong Wang and
                  X. Zhang},
  title        = {Improved modification direction methods},
  journal      = {Comput. Math. Appl.},
  volume       = {60},
  number       = {2},
  pages        = {319--325},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.camwa.2010.01.006},
  doi          = {10.1016/J.CAMWA.2010.01.006},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cma/KimKCWZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/YoonYKHJC10,
  author       = {Eun{-}Jun Yoon and
                  Kee{-}Young Yoo and
                  Cheonshik Kim and
                  YouSik Hong and
                  Minho Jo and
                  Hsiao{-}Hwa Chen},
  title        = {A secure and efficient {SIP} authentication scheme for converged VoIP
                  networks},
  journal      = {Comput. Commun.},
  volume       = {33},
  number       = {14},
  pages        = {1674--1681},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.comcom.2010.03.026},
  doi          = {10.1016/J.COMCOM.2010.03.026},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/YoonYKHJC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/BaekKFC10,
  author       = {Jinsuk Baek and
                  Cheonshik Kim and
                  Paul S. Fisher and
                  Hongyang Chao},
  title        = {(N, 1) secret sharing approach based on steganography with gray digital
                  images},
  booktitle    = {Proceedings of the {IEEE} International Conference on Wireless Communications,
                  Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
                  Beijing, China},
  pages        = {325--329},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WCINS.2010.5541793},
  doi          = {10.1109/WCINS.2010.5541793},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnis/BaekKFC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/sci/Kim10,
  author       = {Cheonshik Kim},
  editor       = {Ngoc Thanh Nguyen and
                  Radoslaw P. Katarzyniak and
                  Shyi{-}Ming Chen},
  title        = {Data Hiding Based on Compressed Dithering Images},
  booktitle    = {Advances in Intelligent Information and Database Systems},
  series       = {Studies in Computational Intelligence},
  volume       = {283},
  pages        = {89--98},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12090-9\_8},
  doi          = {10.1007/978-3-642-12090-9\_8},
  timestamp    = {Thu, 16 Mar 2023 20:00:38 +0100},
  biburl       = {https://dblp.org/rec/series/sci/Kim10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ichit/HongOKICYJMKK09,
  author       = {YouSik Hong and
                  Sun{-}Jin Oh and
                  Cheonshik Kim and
                  Yong Soon Im and
                  Gyoo{-}Seok Choi and
                  Eun{-}Jun Yoon and
                  Yu Cheol Jeon and
                  Chanwoo Moon and
                  Myeon{-}Koo Kang and
                  Jeongsook Kim},
  editor       = {Geuk Lee and
                  Daniel Howard and
                  Jeong Jin Kang and
                  Dominik Slezak and
                  Tae Nam Ahn and
                  Chung{-}Huang Yang},
  title        = {A study on intelligent cyber university},
  booktitle    = {Proceedings of the 2009 International Conference on Hybrid Information
                  Technology, {ICHIT} 2009, Daejeon, Korea, August 27-29, 2009},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {321},
  pages        = {525--529},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1644993.1645091},
  doi          = {10.1145/1644993.1645091},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ichit/HongOKICYJMKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ichit/HongRKCKK09,
  author       = {YouSik Hong and
                  Su{-}Bong Ryou and
                  Cheonshik Kim and
                  Young Im Cho and
                  Kyung{-}Sook Kim and
                  Jeong Jin Kang},
  editor       = {Geuk Lee and
                  Daniel Howard and
                  Jeong Jin Kang and
                  Dominik Slezak and
                  Tae Nam Ahn and
                  Chung{-}Huang Yang},
  title        = {Optimal green time calculation using artificial intelligence},
  booktitle    = {Proceedings of the 2009 International Conference on Hybrid Information
                  Technology, {ICHIT} 2009, Daejeon, Korea, August 27-29, 2009},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {321},
  pages        = {632--636},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1644993.1645110},
  doi          = {10.1145/1644993.1645110},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ichit/HongRKCKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kesamsta/HongKL08,
  author       = {YouSik Hong and
                  Cheonshik Kim and
                  Geuk Lee},
  editor       = {Ngoc Thanh Nguyen and
                  GeunSik Jo and
                  Robert J. Howlett and
                  Lakhmi C. Jain},
  title        = {Study of Optimal Traffic Information Using Agents Techniques},
  booktitle    = {Agent and Multi-Agent Systems: Technologies and Applications, Second
                  {KES} International Symposium, {KES-AMSTA} 2008, Incheon, Korea, March
                  26-28, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4953},
  pages        = {868--877},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78582-8\_88},
  doi          = {10.1007/978-3-540-78582-8\_88},
  timestamp    = {Thu, 16 Mar 2023 20:00:31 +0100},
  biburl       = {https://dblp.org/rec/conf/kesamsta/HongKL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kesamsta/HongLKK07,
  author       = {YouSik Hong and
                  Geuk Lee and
                  Cheonshik Kim and
                  Jong Won Kim},
  editor       = {Ngoc Thanh Nguyen and
                  Adam Grzech and
                  Robert J. Howlett and
                  Lakhmi C. Jain},
  title        = {Traffic Signal Planning Using a Smart Agent System},
  booktitle    = {Agent and Multi-Agent Systems: Technologies and Applications, First
                  {KES} International Symposium, {KES-AMSTA} 2007, Wroclaw, Poland,
                  May 31- June 1, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4496},
  pages        = {938--947},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72830-6\_99},
  doi          = {10.1007/978-3-540-72830-6\_99},
  timestamp    = {Thu, 16 Mar 2023 20:00:31 +0100},
  biburl       = {https://dblp.org/rec/conf/kesamsta/HongLKK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ichit/KimJAP06,
  author       = {Cheonshik Kim and
                  Myunghee Jung and
                  Shaikh Muhammad Allayear and
                  Sung{-}Soon Park},
  editor       = {Marcin S. Szczuka and
                  Daniel Howard and
                  Dominik Slezak and
                  Haeng{-}Kon Kim and
                  Tai{-}Hoon Kim and
                  Il Seok Ko and
                  Geuk Lee and
                  Peter M. A. Sloot},
  title        = {Personalized E-Learning Process Using Effective Assessment and Feedback},
  booktitle    = {Advances in Hybrid Information Technology, First International Conference,
                  {ICHIT} 2006, Jeju Island, Korea, November 9-11, 2006, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4413},
  pages        = {63--72},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-77368-9\_7},
  doi          = {10.1007/978-3-540-77368-9\_7},
  timestamp    = {Tue, 14 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ichit/KimJAP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icuct/KimNPPH06,
  author       = {Cheonshik Kim and
                  San{-}Yep Nam and
                  Duk{-}Je Park and
                  Injung Park and
                  Taek{-}Young Hyun},
  editor       = {Frank Stajano and
                  Hyoung Joong Kim and
                  Jong{-}Suk Chae and
                  Seong{-}Dong Kim},
  title        = {Product Control System Using {RFID} Tag Information and Data Mining},
  booktitle    = {Ubiquitous Convergence Technology, First International Conference,
                  {ICUCT} 2006, Jeju Island, Korea, December 5-6, 2006, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4412},
  pages        = {100--109},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71789-8\_11},
  doi          = {10.1007/978-3-540-71789-8\_11},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/icuct/KimNPPH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icuct/AllayearPK06,
  author       = {Shaikh Muhammad Allayear and
                  Sung{-}Soon Park and
                  Cheonshik Kim},
  editor       = {Frank Stajano and
                  Hyoung Joong Kim and
                  Jong{-}Suk Chae and
                  Seong{-}Dong Kim},
  title        = {iSCSI Protocol Parameter Optimization for Mobile Appliance Remote
                  Storage System at Smart Home Environment Approach},
  booktitle    = {Ubiquitous Convergence Technology, First International Conference,
                  {ICUCT} 2006, Jeju Island, Korea, December 5-6, 2006, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4412},
  pages        = {110--119},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71789-8\_12},
  doi          = {10.1007/978-3-540-71789-8\_12},
  timestamp    = {Tue, 14 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icuct/AllayearPK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icuct/ParkPK06,
  author       = {Injung Park and
                  Duk{-}Je Park and
                  Cheonshik Kim},
  editor       = {Frank Stajano and
                  Hyoung Joong Kim and
                  Jong{-}Suk Chae and
                  Seong{-}Dong Kim},
  title        = {Dynamic {EPG} Implementation for Ubiquitous Environment},
  booktitle    = {Ubiquitous Convergence Technology, First International Conference,
                  {ICUCT} 2006, Jeju Island, Korea, December 5-6, 2006, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4412},
  pages        = {292--300},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71789-8\_30},
  doi          = {10.1007/978-3-540-71789-8\_30},
  timestamp    = {Wed, 24 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icuct/ParkPK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/igarss/JungYK05,
  author       = {Myunghee Jung and
                  Eui{-}Jung Yun and
                  Cheonshik Kim},
  title        = {Multiresolution approach for texture segmentation using {MRF} models},
  booktitle    = {{IEEE} International Geoscience {\&} Remote Sensing Symposium,
                  {IGARSS} 2005, July 25-29, 2005, Seoul, Korea, Proceedings},
  pages        = {3971--3974},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/IGARSS.2005.1525782},
  doi          = {10.1109/IGARSS.2005.1525782},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/igarss/JungYK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics