Cryptographie key generation from PUF data using efficient fuzzy extractors H Kang, Y Hori, T Katashita, M Hagiwara, K Iwamura 16th International conference on advanced communication technology, 23-26, 2014 | 111 | 2014 |
Evaluation of physical unclonable functions for 28-nm process field-programmable gate arrays Y Hori, H Kang, T Katashita, A Satoh, S Kawamura, K Kobara Journal of Information Processing 22 (2), 344-356, 2014 | 60 | 2014 |
Full-index-embedding patchwork algorithm for audio watermarking H Kang, K Yamaguchi, B Kurkoski, K Yamaguchi, K Kobayashi IEICE transactions on information and systems 91 (11), 2731-2734, 2008 | 48 | 2008 |
An image steganography using pixel characteristics YR Park, HH Kang, SU Shin, KR Kwon Computational Intelligence and Security: International Conference, CIS 2005 …, 2005 | 48 | 2005 |
Pseudo-LFSR PUF: A compact, efficient and reliable physical unclonable function Y Hori, H Kang, T Katashita, A Satoh 2011 International Conference on Reconfigurable Computing and FPGAs, 223-228, 2011 | 47 | 2011 |
A steganographic scheme in digital images using information of neighboring pixels YR Park, HH Kang, SU Shin, KR Kwon Advances in Natural Computation: First International Conference, ICNC 2005 …, 2005 | 35 | 2005 |
Performance evaluation of the first commercial PUF-embedded RFID H Kang, Y Hori, A Satoh The 1st IEEE Global Conference on Consumer Electronics 2012, 5-8, 2012 | 27 | 2012 |
Performance analysis for puf data using fuzzy extractor H Kang, Y Hori, T Katashita, M Hagiwara, K Iwamura Ubiquitous Information Technologies and Applications: CUTE 2013, 277-284, 2014 | 23 | 2014 |
Integrity verification of secret information in image steganography Y Park, H Kang, K Yamaguchi, K Kobayashi Symposium on Information Theory and its Applications, Hakodate, Hokkaido …, 2006 | 23 | 2006 |
The Implementation of Fuzzy Extractor is Not Hard to Do: An Approach Using PUF Data H Kang, Y Hori, T Katashita, M Hagiwara The 30th Symposium on Cryptography and Information Security (SCIS2013), 2013 | 20 | 2013 |
Data augmentation for deep learning using generative adversarial networks D Yorioka, H Kang, K Iwamura 2020 IEEE 9th Global Conference on Consumer Electronics (GCCE), 516-518, 2020 | 19 | 2020 |
A semi-fragile watermarking using JND H Kang, J Park Proceedings of STEG, 127-131, 2003 | 19 | 2003 |
Watermarking for tamper detection and recovery Y Park, H Kang, K Yamaguchi, K Kobayashi IEICE Electronics Express 5 (17), 689-696, 2008 | 18 | 2008 |
Searchable encryption of image based on secret sharing scheme AAAM Kamal, K Iwamura, H Kang 2017 Asia-Pacific Signal and Information Processing Association Annual …, 2017 | 17 | 2017 |
Information hiding method using best DCT and wavelet coefficients and its watermark competition H Kang, K Iwamura Entropy 17 (3), 1218-1235, 2015 | 11 | 2015 |
Collusion Resistant Watermarking for Deep Learning Models Protection S Kakikura, H Kang, K Iwamura 2022 24th International Conference on Advanced Communication Technology …, 2022 | 10 | 2022 |
Watermarking based on the difference of discrete cosine transform coefficients and an error-correcting code H Kang, K Iwamura Proceedings of the 1st international workshop on Information hiding and its …, 2014 | 9 | 2014 |
Asymmetric Secret Sharing Scheme Suitable for Cloud Systems S Takahashi, H Kang, K Iwamura The 11th Annual IEEE Consumer Communications and Networking Conference (CCNC …, 2014 | 9 | 2014 |
Video fingerprinting system using wavelet and error correcting code H Kang, B Kurkoski, Y Park, H Lee, S Shin, K Yamaguchi, K Kobayashi Information Security Applications: 6th International Workshop, WISA 2005 …, 2006 | 9 | 2006 |
Direct challenge ring oscillator PUF (DC-ROPUF) with novel response selection M Ikeda, H Kang, K Iwamura 2017 IEEE 6th Global Conference on Consumer Electronics (GCCE), 1-2, 2017 | 8 | 2017 |