default search action
Hyunho Kang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c24]Sayoko Kakikura, Hyunho Kang, Keiichi Iwamura:
Collusion Resistant Watermarking for Deep Learning Models Protection. ICACT 2022: 40-43 - [c23]Yoshi Michael Cho, Hiroyuki Imada, Naoto Kawamura, Hyunho Kang, Keiichi Iwamura:
Print to Scan Resistant Watermarking based on Green Noise Diffusion Method using Machine Learning. ICACT 2022: 307-312 - 2021
- [c22]Ryota Soga, Hyunho Kang:
Physical Unclonable Function Using Hartley Oscillator. GCCE 2021: 955-958 - 2020
- [c21]Hiroki Ueda, Hyunho Kang, Keiichi Iwamura:
Video Tampering Detection based on High-Frequency Features using Machine Learning. AICCC 2020: 19-24 - [c20]Sayoko Kakikura, Hyunho Kang, Keiichi Iwamura, Naoto Kawamura:
Detecting Discrete Cosine Transform-Based Digital Watermarking Insertion Area Using Deep Learning. AICCC 2020: 25-30 - [c19]Daiki Yorioka, Hyunho Kang, Keiichi Iwamura:
Data Augmentation For Deep Learning Using Generative Adversarial Networks. GCCE 2020: 516-518 - [c18]Ryota Soga, Hyunho Kang:
Physical Unclonable Function Using Carbon Resistor. GCCE 2020: 559-561
2010 – 2019
- 2018
- [c17]Ryohei Niiuchi, Hyunho Kang, Keiichi Iwamura:
Detection of Human Motion Gestures Using Machine Learning for Actual Emergency Situations. GCCE 2018: 492-496 - 2017
- [j4]Keiichi Iwamura, Masaki Kawamura, Minoru Kuribayashi, Motoi Iwata, Hyunho Kang, Seiichi Gohshi, Akira Nishimura:
Information Hiding and Its Criteria for Evaluation. IEICE Trans. Inf. Syst. 100-D(1): 2-12 (2017) - [c16]Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura, Hyunho Kang:
Searchable encryption of image based on secret sharing scheme. APSIPA 2017: 1495-1503 - [c15]Masataka Ikeda, Hyunho Kang, Keiichi Iwamura:
Direct challenge ring oscillator PUF (DC-ROPUF) with novel response selection. GCCE 2017: 1-2 - [c14]Ryo Sakuma, Hyunho Kang, Keiichi Iwamura, Isao Echizen:
Digital Watermarking Scheme Based on Machine Learning for the IHC Evaluation Criteria. IIH-MSP (1) 2017: 370-380 - 2016
- [c13]Natsuki Kokui, Hyunho Kang, Keiichi Iwamura, Isao Echizen:
Best embedding direction for spread spectrum-based video watermarking. GCCE 2016: 1-3 - [c12]Yuichi Kusama, Hyunho Kang, Keiichi Iwamura, Isao Echizen:
Privacy-protected video surveillance in crowded environments using robust watermarking. GCCE 2016: 1-2 - [c11]YuFeng Yan, Hyunho Kang, Keiichi Iwamura, Isao Echizen:
Image watermarking using the differences between two wavelet filters. GCCE 2016: 1-3 - 2015
- [j3]Hyunho Kang, Keiichi Iwamura:
Information Hiding Method Using Best DCT and Wavelet Coefficients and ItsWatermark Competition. Entropy 17(3): 1218-1235 (2015) - [c10]Hyunho Kang, Keiichi Iwamura:
Anti-counterfeiting Using Irregularities of Magnetic Flux Density. CIT/IUCC/DASC/PICom 2015: 1325-1329 - [c9]Hyunho Kang:
Face anti-spoofing based on image block difference and logistic regression analysis. ICCE-Berlin 2015: 493-495 - [c8]Toshiki Ito, Hyunho Kang, Keiichi Iwamura, Kitahiro Kaneda, Isao Echizen:
Audio Watermarking Using Different Wavelet Filters. IWDW 2015: 312-320 - [c7]Yuichi Kusama, Hyunho Kang, Keiichi Iwamura:
Mosaic-based Privacy-protection with Reversible Watermarking. SIGMAP 2015: 98-103 - 2014
- [j2]Yohei Hori, Hyunho Kang, Toshihiro Katashita, Akashi Satoh, Shin-ichi Kawamura, Kazukuni Kobara:
Evaluation of Physical Unclonable Functions for 28-nm Process Field-Programmable Gate Arrays. J. Inf. Process. 22(2): 344-356 (2014) - [c6]Hyunho Kang, Keiichi Iwamura:
Watermarking based on the difference of discrete cosine transform coefficients and an error-correcting code. IWIHC@AsiaCCS 2014: 9-17 - [c5]Toshiki Ito, Ryo Sugimura, Hyunho Kang, Keiichi Iwamura, Kitahiro Kaneda, Isao Echizen:
A New Approach to Reversible Watermarking. IIH-MSP 2014: 455-458 - [c4]Hyunho Kang, Keiichi Iwamura:
Image Protection System with Steganography and Authentication. IIH-MSP 2014: 467-470 - 2013
- [c3]Satoshi Takahashi, Shiro Kobayashi, Hyunho Kang, Keiichi Iwamura:
Secret sharing scheme for cloud computing using IDs. GCCE 2013: 528-529 - [c2]Yoshihide Nagai, Hyunho Kang, Keiichi Iwamura:
A storage-saving secret sharing scheme suitable for sensor networks. GCCE 2013: 534-535 - 2011
- [c1]Yohei Hori, Hyunho Kang, Toshihiro Katashita, Akashi Satoh:
Pseudo-LFSR PUF: A Compact, Efficient and Reliable Physical Unclonable Function. ReConFig 2011: 223-228 - 2010
- [j1]Hyunho Kang, Shoko Yonezawa, Manabu Inuma, Akira Otsuka, Hideki Imai:
Wolf fingerprints against minutiae count matching systems. IEICE Electron. Express 7(10): 738-744 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint