default search action
Ki-Hyun Jung
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j49]Saurabh Agarwal, Ki-Hyun Jung:
Digital image steganalysis using entropy driven deep neural network. J. Inf. Secur. Appl. 84: 103799 (2024) - [j48]Ahmed Raza, Mehdi Hussain, Hasan Tahir, Muhammad Zeeshan, Muhammad Adil Raja, Ki-Hyun Jung:
Forensic analysis of web browsers lifecycle: A case study. J. Inf. Secur. Appl. 85: 103839 (2024) - [j47]Saurabh Agarwal, Ki-Hyun Jung:
Forensic analysis and detection using polycolor model binary pattern for colorized images. Multim. Tools Appl. 83(14): 41683-41702 (2024) - [j46]Hira Aftab, Mehdi Hussain, Qaiser Riaz, Muhammad Zeeshan, Ki-Hyun Jung:
Hiding EPR and watermark in medical images using repeated pixel differencing. Multim. Tools Appl. 83(15): 43577-43605 (2024) - [j45]Saurabh Agarwal, Ki-Hyun Jung:
Image operator forensics and sequence estimation using robust deep neural network. Multim. Tools Appl. 83(16): 47431-47454 (2024) - 2023
- [j44]Deepak Sharma, Rajeev Kumar, Ki-Hyun Jung:
A Bibliometric Analysis of Convergence of Artificial Intelligence and Blockchain for Edge of Things. J. Grid Comput. 21(4): 79 (2023) - [j43]Cheonshik Kim, Ching-Nung Yang, Zhili Zhou, Ki-Hyun Jung:
Dual efficient reversible data hiding using Hamming code and OPAP. J. Inf. Secur. Appl. 76: 103544 (2023) - [j42]Rajeev Kumar, Deepak Sharma, Amit Dua, Ki-Hyun Jung:
A review of different prediction methods for reversible data hiding. J. Inf. Secur. Appl. 78: 103572 (2023) - [j41]Neeraj Kumar, Rajeev Kumar, Aruna Malik, Samayveer Singh, Ki-Hyun Jung:
Reversible data hiding with high visual quality using pairwise PVO and PEE. Multim. Tools Appl. 82(20): 30733-30758 (2023) - [j40]Saurabh Agarwal, Ki-Hyun Jung:
Median filtering detection using optimal multi-direction threshold on higher-order difference pixels. Multim. Tools Appl. 82(20): 30875-30893 (2023) - [j39]Mehdi Hussain, Qaiser Riaz, Shahzad Saleem, Abdul Ghafoor, Ki-Hyun Jung:
Correction to: Enhanced adaptive data hiding method using LSB and pixel value differencing. Multim. Tools Appl. 82(23): 36647 (2023) - [j38]Shadab Khan, Yash Veer Singh, Prasant Singh Yadav, Vishnu Sharma, Chia-Chen Lin, Ki-Hyun Jung:
An Intelligent Bio-Inspired Autonomous Surveillance System Using Underwater Sensor Networks. Sensors 23(18): 7839 (2023) - [j37]Saurabh Agarwal, Dae-Jea Cho, Ki-Hyun Jung:
Detecting Images in Two-Operator Series Manipulation: A Novel Approach Using Transposed Convolution and Information Fusion. Symmetry 15(10): 1898 (2023) - [j36]Saurabh Agarwal, Ki-Hyun Jung:
Exploring Symmetry in Digital Image Forensics Using a Lightweight Deep-Learning Hybrid Model for Multiple Smoothing Operators. Symmetry 15(12): 2096 (2023) - 2022
- [j35]Saurabh Agarwal, Ki-Hyun Jung:
Median filtering forensics based on optimum thresholding for low-resolution compressed images. Multim. Tools Appl. 81(5): 7047-7062 (2022) - [j34]Samayveer Singh, Ki-Hyun Jung:
Special issue on emerging technologies for information hiding and forensics in multimedia systems. Multim. Tools Appl. 81(14): 19463-19470 (2022) - [j33]Rajeev Kumar, Neeraj Kumar, Ki-Hyun Jung:
Enhanced interpolation-based AMBTC image compression using Weber's law. Multim. Tools Appl. 81(15): 20817-20828 (2022) - [j32]Fahad Akbar, Mehdi Hussain, Rafia Mumtaz, Qaiser Riaz, Ainuddin Wahid Abdul Wahab, Ki-Hyun Jung:
Permissions-Based Detection of Android Malware Using Machine Learning. Symmetry 14(4): 718 (2022) - [j31]Rajeev Kumar, Neeraj Kumar, Ki-Hyun Jung:
Reversible Data Hiding Using an Improved Pixel Value Ordering and Complementary Strategy. Symmetry 14(12): 2477 (2022) - 2021
- [j30]Mehdi Hussain, Qaiser Riaz, Shahzad Saleem, Abdul Ghafoor, Ki-Hyun Jung:
Enhanced adaptive data hiding method using LSB and pixel value differencing. Multim. Tools Appl. 80(13): 20381-20401 (2021) - [j29]Arun Kumar Rai, Neeraj Kumar, Rajeev Kumar, Hari Om, Satish Chand, Ki-Hyun Jung:
Intra-Block Correlation Based Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling. Symmetry 13(6): 1072 (2021) - [c6]Saurabh Agarwal, Ki-Hyun Jung:
Image Forensics using Optimal Normalization in Challenging Environment. ICEIC 2021: 1-4 - 2020
- [j28]Pyung-Han Kim, Kwan-Woo Ryu, Ki-Hyun Jung:
Reversible data hiding scheme based on pixel-value differencing in dual images. Int. J. Distributed Sens. Networks 16(7): 155014772091100 (2020) - [j27]Rajeev Kumar, Ki-Hyun Jung:
Robust reversible data hiding scheme based on two-layer embedding strategy. Inf. Sci. 512: 96-107 (2020) - [j26]Rajeev Kumar, Ki-Hyun Jung:
Enhanced pairwise IPVO-based reversible data hiding scheme using rhombus context. Inf. Sci. 536: 101-119 (2020) - [j25]Rajeev Kumar, Neeraj Kumar, Ki-Hyun Jung:
Color image steganography scheme using gray invariant in AMBTC compression domain. Multidimens. Syst. Signal Process. 31(3): 1145-1162 (2020) - [j24]Rajeev Kumar, Neeraj Kumar, Ki-Hyun Jung:
I-PVO based high capacity reversible data hiding using bin reservation strategy. Multim. Tools Appl. 79(31-32): 22635-22651 (2020)
2010 – 2019
- 2019
- [j23]Rajeev Kumar, Dae-Soo Kim, Ki-Hyun Jung:
Enhanced AMBTC based data hiding method using hamming distance and pixel value differencing. J. Inf. Secur. Appl. 47: 94-103 (2019) - [j22]Rajeev Kumar, Ki-Hyun Jung:
A systematic survey on block truncation coding based data hiding techniques. Multim. Tools Appl. 78(22): 32239-32259 (2019) - [j21]Pyung-Han Kim, Eun-Jun Yoon, Kwan-Woo Ryu, Ki-Hyun Jung:
Data-Hiding Scheme Using Multidirectional Pixel-Value Differencing on Colour Images. Secur. Commun. Networks 2019: 9038650:1-9038650:11 (2019) - [c5]Ki-Hyun Jung:
A Study on Machine Learning for Steganalysis. ICMLSC 2019: 12-15 - 2018
- [j20]Arvind Pillai, Rajkumar Soundrapandiyan, Swapnil Satapathy, Suresh Chandra Satapathy, Ki-Hyun Jung, Rajakumar Krishnan:
Local diagonal extrema number pattern: A new feature descriptor for face recognition. Future Gener. Comput. Syst. 81: 297-306 (2018) - [j19]Ki-Hyun Jung:
Data hiding scheme improving embedding capacity using mixed PVD and LSB on bit plane. J. Real Time Image Process. 14(1): 127-136 (2018) - [j18]Ki-Hyun Jung:
High-capacity reversible data hiding method using block expansion in digital images. J. Real Time Image Process. 14(1): 159-170 (2018) - [j17]Ki-Hyun Jung:
Authenticable reversible data hiding scheme with less distortion in dual stego-images. Multim. Tools Appl. 77(5): 6225-6241 (2018) - [j16]Ki-Hyun Jung:
A survey of interpolation-based reversible data hiding methods. Multim. Tools Appl. 77(7): 7795-7810 (2018) - [j15]Sang-Ho Shin, Ki-Hyun Jung:
Reversible data hiding method using meaningful encrypted images. Multim. Tools Appl. 77(12): 14841-14857 (2018) - [j14]Mehdi Hussain, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Bin Idris, Anthony T. S. Ho, Ki-Hyun Jung:
Image steganography in spatial domain: A survey. Signal Process. Image Commun. 65: 46-66 (2018) - 2017
- [j13]Rajkumar Soundrapandiyan, Marimuthu Karuppiah, Saru Kumari, Sanjay Kumar Tyagi, Fan Wu, Ki-Hyun Jung:
An Efficient DWT and Intuitionistic Fuzzy Based Multimodality Medical Image Fusion. Int. J. Imaging Syst. Technol. 27(2): 118-132 (2017) - [j12]Ki-Hyun Jung:
A high-capacity reversible data hiding scheme based on sorting and prediction in digital images. Multim. Tools Appl. 76(11): 13127-13137 (2017) - [j11]Mehdi Hussain, Ainuddin Wahid Abdul Wahab, Anthony T. S. Ho, Noman Javed, Ki-Hyun Jung:
A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement. Signal Process. Image Commun. 50: 44-57 (2017) - 2016
- [j10]Sang-Ho Shin, Ki-Hyun Jung:
Reversible secret image sharing scheme in encrypted images. Multim. Tools Appl. 75(21): 13931-13949 (2016) - [j9]Mehdi Hussain, Ainuddin Wahid Abdul Wahab, Noman Javed, Ki-Hyun Jung:
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images. Symmetry 8(6): 41 (2016) - 2015
- [j8]Ki-Hyun Jung, Kee-Young Yoo:
Steganographic method based on interpolation and LSB substitution of digital images. Multim. Tools Appl. 74(6): 2143-2155 (2015) - [j7]Ki-Hyun Jung, Kee-Young Yoo:
High-capacity index based data hiding method. Multim. Tools Appl. 74(6): 2179-2193 (2015) - 2014
- [j6]Ki-Hyun Jung, Kee-Young Yoo:
Three-Directional Data Hiding Method for Digital Images. Cryptologia 38(2): 178-191 (2014) - [j5]Ki-Hyun Jung, Kee-Young Yoo:
Data hiding method in binary images based on block masking for key authentication. Inf. Sci. 277: 188-196 (2014) - [j4]Ki-Hyun Jung, Kee-Young Yoo:
Data hiding using edge detector for scalable images. Multim. Tools Appl. 71(3): 1455-1468 (2014) - 2010
- [c4]Seung-Hun Shin, Seung-Kyu Park, Kyung-Hee Choi, Ki-Hyun Jung:
Normalized Adaptive Random Test for Integration Tests. COMPSAC Workshops 2010: 335-340
2000 – 2009
- 2009
- [j3]Ki-Hyun Jung, Kee-Young Yoo:
Data hiding method using image interpolation. Comput. Stand. Interfaces 31(2): 465-470 (2009) - [j2]Ki-Hyun Jung, Kee-Young Yoo:
Data hiding using run length matching. Int. J. Intell. Inf. Database Syst. 3(3): 311-325 (2009) - [j1]Ki-Hyun Jung, Kee-Young Yoo:
Data Hiding Method with Quality Control for Binary Images. J. Softw. Eng. Appl. 2(1): 20-24 (2009) - 2008
- [c3]Ki-Jong Kim, Ki-Hyun Jung, Kee-Young Yoo:
A High Capacity Data Hiding Method Using PVD and LSB. CSSE (3) 2008: 876-879 - [c2]Jin-Yong Byun, Ki-Hyun Jung, Kee-Young Yoo:
Improved Data Hiding Method by Block Parity for Binary Images. CSSE (3) 2008: 931-934 - 2007
- [c1]Ki-Hyun Jung, Jae-Gil Yu, Se-Min Kim, Ki-Jong Kim, Jin-Yong Byun, Kee-Young Yoo:
The Hiding of Secret Data Using the Run Length Matching Method. KES-AMSTA 2007: 1027-1034
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint