Остановите войну!
for scientists:
default search action
Yongwha Chung
- > Home > Persons > Yongwha Chung
Publications
- 2014
- [j21]Daesung Moon, Yongwha Chung, Chang-Ho Seo, Sung-Young Kim, Jeong-Nyeo Kim:
A practical implementation of fuzzy fingerprint vault for smart cards. J. Intell. Manuf. 25(2): 293-302 (2014) - 2013
- [j18]Hae-Min Moon, Seung-Hoon Chae, Daesung Moon, Yongwha Chung, Sung Bum Pan:
Intelligent video surveillance system using two-factor human information. Telecommun. Syst. 52(4): 2249-2257 (2013) - 2011
- [j16]Sungju Lee, Yongwha Chung, Daesung Moon, Sung Bum Pan, Chang-Ho Seo:
A Practical Implementation of Fuzzy Fingerprint Vault. KSII Trans. Internet Inf. Syst. 5(10): 1783-1798 (2011) - 2010
- [j12]Daesung Moon, Byungkwan Park, Yongwha Chung, Jin-Won Park:
Recovery of flash memories for reliable mobile storages. Mob. Inf. Syst. 6(2): 177-191 (2010) - 2009
- [j10]Daesung Moon, Yongwha Chung, Sung Bum Pan, Jin-Won Park:
Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System. EURASIP J. Adv. Signal Process. 2009 (2009) - [j9]Daesung Moon, Sungju Lee, Yongwha Chung:
Configurable fuzzy fingerprint vault for Match-on-Card system. IEICE Electron. Express 6(14): 993-999 (2009) - [j8]Sungju Lee, Woo-Yong Choi, Daesung Moon, Yongwha Chung, Juman Kim:
Secure fuzzy fingerprint vault against correlation attack. IEICE Electron. Express 6(18): 1368-1373 (2009) - [j7]Sungju Lee, Daesung Moon, Yongwha Chung:
Inserting Chaff Minutiae for the Geometric Hashing-based Fuzzy Fingerprint Vault. J. Inf. Sci. Eng. 25(4): 1177-1190 (2009) - [c40]Sung Jin Lim, Seung-Hoon Chae, Daesung Moon, Yongwha Chung, Namil Lee, Sung Bum Pan:
VLSI Architecture for the Fuzzy Fingerprint Vault with Automatic Alignment Module. FGIT-FGCN 2009: 470-476 - 2008
- [j6]Sung Bum Pan, Daesung Moon, Kichul Kim, Yongwha Chung:
A fingerprint matching hardware for smart cards. IEICE Electron. Express 5(4): 136-144 (2008) - [j5]Woo-Yong Choi, Sungju Lee, Daesung Moon, Yongwha Chung, Kiyoung Moon:
A fast algorithm for polynomial reconstruction of fuzzy fingerprint vault. IEICE Electron. Express 5(18): 725-731 (2008) - 2007
- [c36]Sungju Lee, Daesung Moon, Seunghwan Jung, Yongwha Chung:
Protecting Secret Keys with Fuzzy Fingerprint Vault Based on a 3D Geometric Hash Table. ICANNGA (2) 2007: 432-439 - [c35]Daesung Moon, Sungju Lee, Seunghwan Jung, Yongwha Chung, Miae Park, Okyeon Yi:
Fingerprint Template Protection Using Fuzzy Vault. ICCSA (3) 2007: 1141-1151 - [c34]Hakjae Kim, Sungju Lee, Daesung Moon, Yongwha Chung:
Energy-Efficient Transmissions of Fingerprint Images Using Both Encryption and Fingerprinting Techniques. ICIC (3) 2007: 858-867 - [c32]Sungju Lee, Daesung Moon, Yongwha Chung:
Feature Distribution of the Fingerprint Template Generated by the Geometric Hashing-Based Fuzzy Vault. KES (2) 2007: 816-823 - 2006
- [c31]Sung Bum Pan, Daesung Moon, Kichul Kim, Yongwha Chung:
A VLSI Implementation of Minutiae Extraction for Secure Fingerprint Authentication. CIS 2006: 605-615 - [c30]Byungkwan Park, Daesung Moon, Yongwha Chung, Jin-Won Park:
Capacity Planning for Scalable Fingerprint Authentication. KES (1) 2006: 906-915 - [c28]Daesung Moon, Sungju Lee, Seunghwan Jung, Yongwha Chung, Okyeon Yi, Namil Lee, Kiyoung Moon:
Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords. WISA 2006: 100-109 - [c27]Byungkwan Park, Daesung Moon, Yongwha Chung, Jin-Won Park:
Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification. WISA 2006: 110-120 - 2005
- [c26]Daesung Moon, Taehae Kim, Seunghwan Jung, Yongwha Chung, Kiyoung Moon, Dosung Ahn, Sang-Kyoon Kim:
Performance Evaluation of Watermarking Techniques for Secure Multimodal Biometric Systems. CIS (2) 2005: 635-642 - [c25]Yongwha Chung, Daesung Moon, Sungju Lee, Seunghwan Jung, Taehae Kim, Dosung Ahn:
Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault. CISC 2005: 358-369 - [c24]Taehae Kim, Yongwha Chung, Seunghwan Jung, Daesung Moon:
Secure Remote Fingerprint Verification Using Dual Watermarks. DRMTICS 2005: 217-227 - [c23]Daesung Moon, Yongwha Chung, Kiyoung Moon, Sung Bum Pan:
Secure and Efficient Transmissions of Fingerprint Images for Embedded Processors. ICIAR 2005: 1106-1117 - [c21]Yongwha Chung, Daesung Moon, Kiyoung Moon, Sung Bum Pan:
Hiding Biometric Data for Secure Transmission. KES (3) 2005: 1049-1057 - [c20]Yongwha Chung, Daesung Moon, Taehae Kim, Sung Bum Pan:
A Secure Fingerprint Authentication System on an Untrusted Computing Environment. TrustBus 2005: 299-310 - 2004
- [c19]Yongwha Chung, Byung-Hee Hwang, Woo-Yong Choi, Daesung Moon, Sung Bum Pan, Sang-Hwa Chung:
A Hardware Implementation of Speaker Verification Using Support Vector Machine. Security and Management 2004: 353-358 - [c18]Yongwha Chung, Daesung Moon, Sung Bum Pan, Min Kim, Kichul Kim:
A Hardware Implementation of Fingerprint Verification for Secure Biometric Authentication Systems. ICIAR (2) 2004: 770-777 - [c16]Yongwha Chung, Daesung Moon, Taehae Kim, Jin-Won Park:
Workload Dispatch Planning for Real-Time Fingerprint Authentication on a Sensor-Client-Server Model. PDCAT 2004: 833-838 - 2003
- [j4]Sung Bum Pan, Daesung Moon, Youn-Hee Gil, Dosung Ahn, Yongwha Chung:
An ultra-low memory fingerprint matching algorithm and its implementation on a 32-bit smart card. IEEE Trans. Consumer Electron. 49(2): 453-459 (2003) - [c13]Daesung Moon, Youn-Hee Gil, Sung Bum Pan, Yongwha Chung:
Implementation of the USB Token System for Fingerprint Verification. SCIA 2003: 998-1005 - [c11]Daesung Moon, Youn-Hee Gil, Dosung Ahn, Sung Bum Pan, Yongwha Chung, Chee-Hang Park:
Fingerprint-Based Authentication for USB Token Systems. WISA 2003: 355-364 - 2002
- [c10]Daesung Moon, Youn-Hee Gil, Sung Bum Pan, Yongwha Chung:
A Fingerprint Matching Algorithm Using Image Recognition and Fuzzy Control. IC-AI 2002: 135-138 - [c9]Youn-Hee Gil, Daesung Moon, Sung Bum Pan, Yongwha Chung:
Fingerprint Verification System Involving Smart Card. ICISC 2002: 510-524
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-09 00:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint