עקוב אחר
Hyunho Kang
Hyunho Kang
National Institute of Technology, Tokyo College
כתובת אימייל מאומתת בדומיין tokyo-ct.ac.jp
כותרת
צוטט על ידי
צוטט על ידי
שנה
Cryptographie key generation from PUF data using efficient fuzzy extractors
H Kang, Y Hori, T Katashita, M Hagiwara, K Iwamura
16th International conference on advanced communication technology, 23-26, 2014
1112014
Evaluation of physical unclonable functions for 28-nm process field-programmable gate arrays
Y Hori, H Kang, T Katashita, A Satoh, S Kawamura, K Kobara
Journal of Information Processing 22 (2), 344-356, 2014
602014
Full-index-embedding patchwork algorithm for audio watermarking
H Kang, K Yamaguchi, B Kurkoski, K Yamaguchi, K Kobayashi
IEICE transactions on information and systems 91 (11), 2731-2734, 2008
482008
An image steganography using pixel characteristics
YR Park, HH Kang, SU Shin, KR Kwon
Computational Intelligence and Security: International Conference, CIS 2005 …, 2005
482005
Pseudo-LFSR PUF: A compact, efficient and reliable physical unclonable function
Y Hori, H Kang, T Katashita, A Satoh
2011 International Conference on Reconfigurable Computing and FPGAs, 223-228, 2011
472011
A steganographic scheme in digital images using information of neighboring pixels
YR Park, HH Kang, SU Shin, KR Kwon
Advances in Natural Computation: First International Conference, ICNC 2005 …, 2005
352005
Performance evaluation of the first commercial PUF-embedded RFID
H Kang, Y Hori, A Satoh
The 1st IEEE Global Conference on Consumer Electronics 2012, 5-8, 2012
272012
Performance analysis for puf data using fuzzy extractor
H Kang, Y Hori, T Katashita, M Hagiwara, K Iwamura
Ubiquitous Information Technologies and Applications: CUTE 2013, 277-284, 2014
232014
Integrity verification of secret information in image steganography
Y Park, H Kang, K Yamaguchi, K Kobayashi
Symposium on Information Theory and its Applications, Hakodate, Hokkaido …, 2006
232006
The Implementation of Fuzzy Extractor is Not Hard to Do: An Approach Using PUF Data
H Kang, Y Hori, T Katashita, M Hagiwara
The 30th Symposium on Cryptography and Information Security (SCIS2013), 2013
202013
Data augmentation for deep learning using generative adversarial networks
D Yorioka, H Kang, K Iwamura
2020 IEEE 9th Global Conference on Consumer Electronics (GCCE), 516-518, 2020
192020
A semi-fragile watermarking using JND
H Kang, J Park
Proceedings of STEG, 127-131, 2003
192003
Watermarking for tamper detection and recovery
Y Park, H Kang, K Yamaguchi, K Kobayashi
IEICE Electronics Express 5 (17), 689-696, 2008
182008
Searchable encryption of image based on secret sharing scheme
AAAM Kamal, K Iwamura, H Kang
2017 Asia-Pacific Signal and Information Processing Association Annual …, 2017
172017
Information hiding method using best DCT and wavelet coefficients and its watermark competition
H Kang, K Iwamura
Entropy 17 (3), 1218-1235, 2015
112015
Collusion Resistant Watermarking for Deep Learning Models Protection
S Kakikura, H Kang, K Iwamura
2022 24th International Conference on Advanced Communication Technology …, 2022
102022
Watermarking based on the difference of discrete cosine transform coefficients and an error-correcting code
H Kang, K Iwamura
Proceedings of the 1st international workshop on Information hiding and its …, 2014
92014
Asymmetric Secret Sharing Scheme Suitable for Cloud Systems
S Takahashi, H Kang, K Iwamura
The 11th Annual IEEE Consumer Communications and Networking Conference (CCNC …, 2014
92014
Video fingerprinting system using wavelet and error correcting code
H Kang, B Kurkoski, Y Park, H Lee, S Shin, K Yamaguchi, K Kobayashi
Information Security Applications: 6th International Workshop, WISA 2005 …, 2006
92006
Direct challenge ring oscillator PUF (DC-ROPUF) with novel response selection
M Ikeda, H Kang, K Iwamura
2017 IEEE 6th Global Conference on Consumer Electronics (GCCE), 1-2, 2017
82017
המערכת אינה יכולה לבצע את הפעולה כעת. נסה שוב מאוחר יותר.
מאמרים 1–20