Hyunho Kang

Hyunho KANG, Ph.D.
Associate Professor

  • Tokyo, JAPAN
  • kang[at]tokyo-ct.ac.jp

CURRENT EMPLOYMENT

Associate Professor

Department of Electronic Engineering,

National Institute of Technology, Tokyo College, Japan

April 2017 - Current

My recent research work has been mainly focused on machine learning, deep learning, information security application, multimedia security (steganography, digital watermarking), biometric security and Physical Unclonable Functions.


TOKYO KOSEN KANG Lab.

Apr. 2024 - Mar. 2025

卒研生4名,専攻科生2名
大竹,島崎,新田,藤井,桑原(専攻科2年),荒井(専攻科2年・水戸研)

  • 大竹,"転移学習を活用した個別スタイル提案のためのコーディネート評価システムに関する研究," 卒業研究論文, Feb. 2025.(予定)
  • 島崎,"深層学習を用いた乗用車の雹害検知に関する研究," 卒業研究論文, Feb. 2025.(予定)
  • 新田,"インペインティング処理を用いた静的NeRFの高品質化に関する研究," 卒業研究論文, Feb. 2025.(予定)
  • 藤井,"指差し確認を用いた工場の事故防止に関する研究," 卒業研究論文, Feb. 2025.(予定)
  • 桑原,"複数の領域への電子透かしを用いたディープフェイク検出," 専攻科特別研究論文, Feb. 2025.(予定)
  • 荒井,"磁気光学乱数生成器の高速化に関する研究," 専攻科特別研究論文, Feb. 2025.(予定)

Apr. 2023 - Mar. 2024

卒研生3名,専攻科生3名
北嶋,宮田,立野,桑原(専攻科1年),荒井(専攻科1年・水戸研),小林(専攻科2年)

  • 北嶋,"物体検知を用いた車内置き去り対策に関する研究," 卒業研究論文, Feb. 2024.
  • 宮田,"3DCGのテクスチャにおける画像対画像変換によるスタイル変換," 卒業研究論文, Feb. 2024.
  • 立野,"BeautyGANと顔評価を用いた化粧品の個人化に関する研究," 卒業研究論文, Feb. 2024.
  • 小林,"顔特徴点に基づく部分的ディープフェイク動画の検出," 専攻科特別研究論文, Jan. 2024.

Apr. 2022 - Mar. 2023

卒研生6名,専攻科生1名
石塚,小原,北島,桑原,関根,深津,小林(専攻科)

  • 石塚,"バイクシェアリングシステムにおけるインセンティブの設定に関する研究," 卒業研究論文, Feb. 2023.
  • 小原,"自然言語モデルにおける個人情報流出に関する研究," 卒業研究論文, Feb. 2023.
  • 北島,"テキスト画像生成AI判別の必要性に関する研究," 卒業研究論文, Feb. 2023.
  • 桑原,"Vision Transformerを用いたDeep Fake検出に関する研究," 卒業研究論文, Feb. 2023.
  • 関根,"不審行動検知システムにおける微表情認識に関する研究," 卒業研究論文, Feb. 2023.
  • 深津,"超解像技術を用いた車のナンバープレートの認識率向上に関する研究," 卒業研究論文, Feb. 2023.

Apr. 2021 - Mar. 2022

卒研生5名,専攻科生2名
植田,小林,東,逸見,和田(永井研),ライアン(永井研(専攻科)),曽我(専攻科)

  • 植田,"画像認識を用いた森林火災検知に関する研究," 卒業研究論文, Feb. 2022.
  • 小林,"フェイク動画の検出に有効な顔領域に関する研究," 卒業研究論文, Feb. 2022.
  • 東,"AI画像処理アルゴリズムを利用した立位姿勢の評価に関する研究," 卒業研究論文, Feb. 2022.
  • 逸見,"Deep Learningを用いた布の欠陥検出に関する研究," 卒業研究論文, Feb. 2022.
  • 和田,"敵対的生成ネットワークを用いた脳波活動を誘導する音楽生成に関する研究," 卒業研究論文, Feb. 2022.
  • 曽我,"アナログ回路を用いた物理的クローン不可関数の発見と解析に関する研究," 専攻科特別研究論文, Jan. 2022.
  • ライアン,"指の動きとリズムの脳波関係に関する研究," 専攻科特別研究Ⅰ中間発表, Dec. 2021.

Apr. 2020 - Mar. 2021

卒研生3名,専攻科生2名
石野,清水,藤井,曽我(専攻科),大村(専攻科)

  • 石野,"磁力の抽出によるアナログ部品の真贋判定に関する研究," 卒業研究論文, Feb. 2021.
  • 清水,"フェイスランドマーク技術を用いた笑顔識別技術に関する研究," 卒業研究論文, Feb. 2021.
  • 藤井,"敵対例を用いた顔認証システムへの攻撃に関する研究," 卒業研究論文, Feb. 2021.
  • 大村,"SinGANを用いた画像電子透かしに対する攻撃の提案," 専攻科特別研究論文, Jan. 2021.
  • 曽我,"ハートレー発振器を用いた物理的クローン不可関数に関する研究," 専攻科特別研究Ⅰ中間発表, Dec. 2020.

Apr. 2019 - Mar. 2020

卒研生3名,専攻科生2名
曽我,工藤,福重,大村(専攻科),田島(専攻科)

  • 曽我,"カーボン抵抗を用いた物理的クローン不可関数に関する研究," 卒業研究論文, Jan. 2020.
  • 工藤,"頬を用いた3Dマスクの顔認証なりすまし防止に関する研究," 卒業研究論文, Jan. 2020.
  • 福重,"ウェーブレット変換を用いた画像電子透かしに関する研究," 卒業研究論文, Jan. 2020.
  • 田島,"機械学習を用いた危険物検出に関する研究," 専攻科特別研究論文, Jan. 2020.
  • 大村,"敵対的サンプル生成に向けた敵対的生成ネットワーク動向," 専攻科特別研究Ⅰ中間発表, Dec. 2019.

Apr. 2018 - Mar. 2019

卒研生5名,専攻科生1名
菅原,高手山,田中,冨塚,藤巻,田島(専攻科)

  • 菅原,"機械学習を用いた乳癌画像分類に関する研究," 卒業研究論文, Feb. 2019.
  • 高手山,"文字輪郭線の濃度特徴を用いたプリンタ識別," 卒業研究論文, Feb. 2019.
  • 田中,"深層学習を用いた透かし情報の抽出," 卒業研究論文, Feb. 2019.
  • 冨塚,"機械学習によるアナログ部品の認証に関する研究," 卒業研究論文, Feb. 2019.
  • 藤巻,"オプティカルフローを用いた顔認証なりすまし防止に関する研究," 卒業研究論文, Feb. 2019.

Apr. 2017 - Mar. 2018

卒研生4名
天野,竹内,田島,野本

  • 天野,"機械学習による髪型似合い度予測システムの開発," 卒業研究論文, Feb. 2018.
  • 竹内,"ウェーブレット変換を用いた撮影カメラ識別," 卒業研究論文, Feb. 2018.
  • 田島,"加速度センサと機械学習による個人認証システムの研究," 卒業研究論文, Feb. 2018.
  • 野本,"顔認証のなりすまし防止に関する研究," 卒業研究論文, Feb. 2018.

EXPERIENCE

Jul. 2017 - Mar. 2023

Visiting researcher at Iwamura Lab., Graduate School of Engineering, Tokyo University of Science, Japan.
Prof. Iwamura retired in March 2023. It was a valuable time.

Apr. 2013 - Mar. 2017

Assistant Professor, Department of Electrical Engineering, Tokyo University of Science, Japan

Sep. 2010 - Mar. 2013

AIST Postdoctoral Researcher, RISEC, AIST, Tsukuba, Japan
I was a member of the SASEBO project team. My work has been mainly focused on the evaluation of a Physical Unclonable Functions.

Apr. 2008 - Aug. 2010

Researcher/Assistant Professor, Chuo University, Tokyo, Japan
I was a member of Prof. Imai's Laboratory.

Aug. 2001 - Feb. 2005

A lecturer at a university, Busan, South Korea
I was a lecturer at the university for three and a half years.

(Pukyong National University, Kyungsung University, etc., in Busan, South Korea)

Oct. 1993 - Dec. 1995

Military service, Gyeonggi Province, South Korea
I was discharged from the army with the rank of sergeant.

Social activities

2025

TPC member
- IAICT 2025 (The 2025 IEEE INTERNATIONAL CONFERENCE ON INDUSTRY 4.0, ARTIFICIAL INTELLIGENCE, AND COMMUNICATIONS TECHNOLOGY), Bali, Indonesia, July 03-05, 2025.

2024

TPC member
- IAICT 2024 (The 2024 IEEE INTERNATIONAL CONFERENCE ON INDUSTRY 4.0, ARTIFICIAL INTELLIGENCE, AND COMMUNICATIONS TECHNOLOGY), Bali, Indonesia, July 04-06, 2024.

June 2023 - Current

副委員長
- 電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント(EMM) 研究会

2023

TPC member
- IAICT 2023 (The 2023 IEEE INTERNATIONAL CONFERENCE ON INDUSTRY 4.0, ARTIFICIAL INTELLIGENCE, AND COMMUNICATIONS TECHNOLOGY), Bali, Indonesia, July 13-15, 2023.

2022

TPC member
- IAICT 2022 (The 2022 IEEE INTERNATIONAL CONFERENCE ON INDUSTRY 4.0, ARTIFICIAL INTELLIGENCE, AND COMMUNICATIONS TECHNOLOGY), Bali, Indonesia, July 28-30, 2022.

2022

TPC member
- IWCMC 2022 Wireless Networks (IWCMC 2022 Wireless Networking Symposium), Dubrovnik, Croatia, May 30-June 3, 2022.

2021-2022

Organizing Committee Member (Web Chair)
- ACM ASIACCS 2022 (The 17th ACM ASIA Conference on Computer and Communications Security), Nagasaki, Japan, May 30-June 3rd, 2022.

2021

TPC member
- APSIPA ASC 2021 (Asia Pacific Signal and Information Processing Association Annual Summit and Conference)

2021

TPC member
- IWCMC 2021 Wireless Networks (IWCMC 2021 Wireless Networking Symposium)

2021

TPC member
- IAICT 2021, INTERNATIONAL CONFERENCE ON INDUSTRY 4.0, ARTIFICIAL INTELLIGENCE, AND COMMUNICATIONS TECHNOLOGY

2020

TPC member
- IAICT 2020, INTERNATIONAL CONFERENCE ON INDUSTRY 4.0, ARTIFICIAL INTELLIGENCE, AND COMMUNICATIONS TECHNOLOGY

Apr. 2019 - Current

専門委員
- 電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント(EMM) 研究会

2019

TPC member
- ICSigSys 2019, International Conference on Signals and Systems 2019

2019

TPC member
- IAICT 2019, INTERNATIONAL CONFERENCE ON INDUSTRY 4.0, ARTIFICIAL INTELLIGENCE, AND COMMUNICATIONS TECHNOLOGY

2018

論文誌編集委員
- 電子情報通信学会 和文論文誌D

Apr. 2017 - Mar. 2019

幹事補佐(2017),幹事(2018)
- 電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント(EMM) 研究会

Apr. 2013 - Current

幹事
- 電子情報通信学会 情報ハイディング及びその評価基準委員会(IHC委員会)

Apr. 2016 - Mar. 2017

専門委員
- 電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント(EMM) 研究会

2017

TPC member
- IEEE GLOBECOM 2017 MWN (Mobile and Wireless Networks)

2017

Vice Publicity Chair
- Joint 17th World Congress of International Fuzzy Systems Association and 9th International Conference on Soft Computing and Intelligent Systems (IFSA-SCIS 2017)

2017

TPC member
- WPMC-2017, the 20th International Symposium on Wireless Personal Multimedia Communications

2017

TPC member
- IEEE ICC 2017 MWN(Mobile and Wireless Networking)

2016

TPC member
- IEEE GLOBECOM 2016 MWN (Mobile and Wireless Networks)

2016

TPC member
- The 12th International Conference on Innovations in Information Technology (IIT’16)

2016

専門委員
- 情報処理学会 コンピュータセキュリティ(CSEC) 研究会

2015

Vice Organizing Chair
- 14th International Workshop on Digital-Forensics and Watermarking (IWDW2015)

2014

Web and Publicity Chair
- The First International Workshop on Information Hiding and its Criteria for evaluation (IWIHC) 2014

2011

TPC member
- IEEE ICC 2011 Communications and Information System Security Symposium (CISS)

PROJECT

(in Japan)

Apr. 2019 - Mar. 2022

科研費,基盤研究(C),研究代表者
- Research theme: アナログ部品に対する物理的クローン不可関数の発見

Apr. 2018 - Mar. 2021

科研費,基盤研究(C),研究分担者
- Research theme: 可視聴型情報ハイディングを応用したメディアアートに基づく新世代情報伝送技術の開発

Aug. 2011 - Mar. 2013

Collaboration with Toppan Printing Co., Ltd. (joining as a researcher member)
- The primary focus is on the evaluation of the commercial PUFs.

Apr. 2010 - Mar. 2013

CREST, JST (joined as a researcher member)
CREST - Fundamental technologies for dependable VLSI system

- Research theme: "The Design and Evaluation Methodology of Dependable VLSI for Tamper Resistance"

- The primary focus is on the evaluation of Physical Unclonable Functions.

Apr. 2010 - Mar. 2011

SCAT研究助成 (joined as a leader of the research)
一般財団法人 テレコム先端技術研究支援センター

- Research theme: 情報セキュリティ事故に対する体系的調査技術の研究

(I completed this work by a researcher of Chuo Univ. before joining the AIST.)

Sep. 2008 - Feb. 2010

新世代, METI (joined as a researcher member)
- Research theme: 証明可能な安全性をもつキャンセラブル・バイオメトリクス認証技術の構築とそれを利用した個人認証インフラストラクチャ実現に向けた研究開発

- 主にバイオメトリクスの各モダリティに対する認証アルゴリズムの調査と解析

EDUCATION

Apr. 2005 - Mar. 2008

University of Electro-Communications, Tokyo, Japan
D.Eng. Degree in Information Systems

  • Supervisors: Prof. Kingo Kobayashi and Prof. Kazuhiko Yamaguchi

Mar. 2002 - Feb. 2005

Pukyong National University, Busan, Korea
in a Ph.D. program

  • After my supervisor (Prof. Park) left this world, I quitted a Ph.D. program in Korea, and decided to go to Japan.

Apr. 2000 - Feb. 2001

Yokohama National University, Yokohama, Japan
Exchange student

Mar. 1999 - Sep. 2001

Pukyong National University, Busan, Korea
M.S. Degree in Computer Science

Feb. 1999

Dong-eui University, Busan, Korea
B.Eng. Degree in Computer Engineering
(three years of military service)

Feb. 1992

東菜高等学校(Dongnae High School), Busan, Korea
I graduated from high school in 1992.

Awards

9. Sayoko Kakikura, Hyunho Kang, Keiichi Iwamura, "Collusion Resistant Watermarking for Deep Learning Models Protection," 「Outstanding Paper Award in the ICACT2022 International Conference hosted by the Global IT Research Institute with IEEE Communication Society 」, 2022.02.16.

8. Ryota Soga, Hyunho Kang, 「IEEE GCCE 2020 Excellent Poster Award Gold Prize」, 2020.10.

7. Toshiki Ito, Hyunho Kang, Keiichi Iwamura,Kitahiro Kaneda, Isao Echizen, 「2015 IHC Evaluation Criteria and Competition (Audio Ver.4) Certificate of Assessment」,IEICE-EMM-IHC Committee,(A special session associated with IWDW2015) 2015.10.09.

6. Hyunho Kang, Keiichi Iwamura,「2014 IHC Evaluation Criteria and Competition (Image Ver.3) Certificate of Assessment」, IEICE-EMM-IHC Committee, (A workshop associated with ASIACCS2015) 2014.06.

5. Yohei Hori, Hyunho Kang, Toshihiro Katashita, Akashi Satoh, Shinichi Kawamura, Kazukuni Kobara, 「JIP(Journal of Information Processing) Specially Selected Paper Certificate」, 2014.04.15.

4. Hyunho Kang, Yohei Hori, Toshihiro Katashita, Manabu Hagiwara, Keiichi Iwamura, 「Outstanding Paper Award in the ICACT2014 International Conference hosted by the Global IT Research Institute with IEEE Communication Society 」, 2014.02.17.

3. 姜玄浩,岩村惠市,「第2回電子透かしコンテスト(静止画像)認定書」, 2013.09.04.

2. Hyunho Kang, Yohei Hori, Akashi Satoh, 「IEEE GCCE 2012 Excellent Paper Award」, 2012.10.04.

1. 堀 洋平, 片下 敏宏, 姜 玄浩, 佐藤 証, 「DICOMO 優秀論文賞」, 2012.10.02.

Invited Lecture/Talks

3. Hyunho Kang, Manabu Hagiwara, "PUFの概念と評価,そしてFuzzy Extractorによる鍵生成," 誤り訂正符号のワークショップ,沖縄,2013年9月25日~27日.

2. Hyunho Kang, "Physical Unclonable Functions: Concept, evaluation, attacks and others," Lecture Meeting on Hardware Security, National Security Research Institute, Daejeon, Korea, 2012.09.20.

1. Hyunho Kang, "Performance Evaluation for PUF-based Authentication Systems," 1st Korea-Japan R&D Collaboration Day, Busan, Korea, 2011.05.31.

RESEARCH PAPERS

2000 - Current

 

<2024>

186. Sotaro Kuwahara, Shunsuke Arai, Yuma Kawachi, Hyunho Kang, "Deepfake Detection with NAND Logic Using Two Region Watermarking," 2024 IEEE 13th Global Conference on Consumer Electronics (GCCE2024), Kokura, Oct. 29- Nov. 1, 2024.

185. Shunsuke Arai, Satta Jukka, Yuma Kawachi, Kousuke Nitta, Shinichiro Mito, Hyunho Kang, "Experimental Evaluation of Physical Unclonable Function Extracted from Contact Bounce of Mechanical Relay," 2024 IEEE 13th Global Conference on Consumer Electronics (GCCE2024), Kokura, Oct. 29- Nov. 1, 2024.

184. 荒井俊亮, 姜玄浩, 水戸 慎一郎, "FPGA を用いた磁気光学乱数生成器の高速化に関する検討," 応用物理学会春季学術講演会, 東京都市大学,2024年3月.

183. 比留間 湧介, 姜 玄浩,城石 英伸, "回転リングディスク電極(RRDE)法による水素・アンモニアの機械学習を用いたリアルタイム同時定量方法(2)," 電気化学会第91回大会要旨集, 名古屋大学,2024年3月.

182. 小林佐介, 姜玄浩, "顔特徴点に基づく部分的ディープフェイク動画の検出,"電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント研究会(EMM),韓国済州,2024年3月

181. 桑原聡太郎, 姜玄浩, "特徴埋め込みを持つVision Transformerを用いたディープフェイク検知に関する研究," 電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント研究会(EMM),韓国済州,2024年3月

180. 宮田惟心, 姜玄浩, "3DCGのテクスチャにおける画像対画像変換によるスタイル変換," 電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント研究会(EMM),韓国済州,2024年3月

179. 荒井俊亮, サッタ ユッカ, 水戸慎一郎, 姜玄浩, "機械式リレー回路を用いた物理的複製困難関数に関する研究," 電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント研究会(EMM),韓国済州,2024年3月.

 

<2023>

178. 箕輪侑晟, 小川穂高, 姜玄浩, 木村知彦, 濱住啓之, "マイクロ波帯FPU用SC-FDE無線伝送方式に関する検討 ~ OFDMとSC-FDEの非線形ひずみ特性の比較 ~," 放送技術研究会, 2023年11月

177. 趙 マイケル嘉, 河村 尚登, 姜玄浩, 岩村 恵市, "高堅牢 Hybrid 型電子透かしシステムの開発," 画像電子学科誌 (The Journal of the Institute of Image Electronics Engineers of Japan), Vol.52, No.3, pp.413-421, 2023年7月

176. 小川穂高, 鈴木智之, 箕輪侑晟, 姜玄浩, 木村知彦, 濱住啓之, "マイクロ波帯FPU用SC-FDE無線伝送方式の検討~ OFDMとSC-FDEの移動送信に対する伝送性能の比較 ~," 放送技術研究会, 2023年7月

175. 鈴木智之, 小川穂高, 箕輪侑晟, 姜玄浩, 木村知彦, 濱住啓之, "SC-FDE無線伝送方式によるSFNの検討~ マイクロ波帯FPUの固定伝送に対する性能評価 ~," 放送技術研究会, 2023年7月.

174. 比留間 湧介, 姜 玄浩,城石 英伸, "回転リングディスク電極(RRDE)法による水素・アンモニアの機械学習を用いたリアルタイム同時定量方法の開発," 電気化学会第90回大会要旨集, 2023年3月.

173. Sayoko Kakikura, Hyunho Kang, Keiichi Iwamura, "Deep Learning Model Protection using Negative Correlation-based Watermarking with Best Embedding Regions," ICACT Transactions on Advanced Communications Technology (TACT) Journal,Volume 11, Issue 4, pp.1438-1445, doi: 10.23919/ICACT56868.2023.10079421, July 2022年 (Date Added to IEEE Xplore: 29 March 2023).

172. 桑原聡太郎, 姜玄浩, "Vision Transformerを用いたDeepFakeの検出に関する研究," 電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント研究会(EMM),2023年3月.

171. 深津悠暉, 姜玄浩, "超解像技術を用いた車のナンバープレートの認識率向上に関する研究," 電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント研究会(EMM),2023年3月.

170. 小原 拓, 姜玄浩, "自然言語モデルにおける個人情報流出に関する研究," 電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント研究会(EMM),2023年3月.

169. 小林佐介, 姜玄浩, "転移学習によるフェイク動画の検出に有効な顔の領域に関する研究," 電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント研究会(EMM),2023年3月.

168. 北島 衛, 姜玄浩, "テキスト画像生成AI判別の必要性に関する研究," 電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント研究会(EMM),2023年3月.

167. 関根漱太郎, 姜玄浩, "不審行動検知システムにおける微表情認識に関する研究," 電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント研究会(EMM),2023年3月.

 

<2022>

166. 大平英里, 河村尚登, 姜玄浩, 岩村恵市, "透かし情報と改ざん検知パターンを多重化して埋め込む動画用電子透かし法," 電子情報通信学会 画像工学研究会(IE), IE2022-40, pp.21-26, 2022年11月.

165. Ryota Soga, Hyunho Kang, "PUFs Analysis for Unstable Signals Using Analog Circuit," Research Briefs on Information & Communication Technology Evolution (ReBICTE), Vol. 8, No. 4, July 5, 2022.(KAKEN 19K11977)

164. 植田 優貴, 姜玄浩, "画像認識を用いた森林火災検知に関する研究," 電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント研究会(EMM),2022年3月.(KAKEN 19K11977)

163. 和田 拓巳, 永井 翠, 姜玄浩, "敵対的生成ネットワークを用いた脳波活動を誘導する音楽生成の検討," 電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント研究会(EMM),2022年3月.

162. 曽我 諒太, 姜玄浩, "Wien bridge 発振器を用いた物理的クローン不可関数に関する研究," 電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント研究会(EMM),2022年3月.(KAKEN 19K11977)

161. 小林 佐介, 姜玄浩, "フェイク動画の検出に有効な顔領域の検討," 電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント研究会(EMM),2022年3月.(KAKEN 19K11977)

160. Yoshi Michael Cho, Hiroshi Imada, Naoto Kawamura, Hyunho Kang, Keiichi Iwamura, "Print to Scan Resistant Watermarking based on Green Noise Diffusion Method using Machine Learning," The 24th International Conference on Advanced Communications Technology (ICACT2022), IEEE Xplore, pp.307-312, Feb. 13-16. 2022.

159. Sayoko Kakikura, Hyunho Kang, Keiichi Iwamura, "Collusion Resistant Watermarking for Deep Learning Models Protection," The 24th International Conference on Advanced Communications Technology (ICACT2022), IEEE Xplore, pp.40-43, Feb. 13-16. 2022. (ICACT 2022 Outstanding Paper Award )

 

<2021>

158. 今田博之, 河村尚登,姜玄浩,岩村恵市,"機械学習を用いて埋め込み情報量と印刷耐性を向上させたグリーンノイズ拡散型電子透かし法," 画像電子学会誌(The Journal of the Institute of Image Electronics Engineers of Japan),Vo.50, No.4, pp.595-603, 2021.

157. Ryota Soga, Hyunho Kang, "Physical Unclonable Function Using Hartley Oscillator," 2021 IEEE 10th Global Conference on Consumer Electronics (GCCE2021), Kyoto, IEEE Xplore, pp. 426-429, Oct. 12-15, 2021.(KAKEN 19K11977)

156. 柿倉砂洋子, 姜玄浩, 岩村惠市, 河村尚登, "周波数領域への電子透かし埋め込みに対する深層学習を用いた埋込位置の検出," 電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント研究会(EMM),2021年5月.

155. 曽我諒太,姜玄浩, "ハートレー発振器を用いた物理的クローン不可関数に関する研究," 電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント研究会(EMM),2021年3月.(KAKEN 19K11977)

154. 大村 秀,姜玄浩, 小嶋徹也, "敵対的生成ネットワークを用いた画像電子透かしに対する攻撃手法の提案," 電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント研究会(EMM),2021年3月.(KAKEN 18K11609)

153. 今田博之, 河村尚登, 姜玄浩, 岩村恵市, "機械学習を用いたグリーンノイズ拡散法による埋め込み情報量と印刷/スキャン耐性を向上させた電子透かし法の検討," The 38th Symposium on Cryptography and Information Security (SCIS2021), Jan. 19-22, 2021.

 

<2020>

152. Sayoko Kakikura, Hyunho Kang, Naoto Kawamura, Keiichi Iwamura, "Detecting Descrete Cosine Transform-Based Digital Watermarking Insertion Area Using Deep Learning," In 2020 3rd Artificial Intelligence and Cloud Computing Conference (AICCC 2020), ACM, Dec. 2020.

151. Hiroki Ueda, Hyunho Kang, Keiichi Iwamura, "Video Tampering Detection based on High-Frequency Features using Machine Learning," In 2020 3rd Artificial Intelligence and Cloud Computing Conference (AICCC 2020), ACM, Dec. 2020.

150. 今田博之, 河村尚登, 姜玄浩, 岩村恵市, "グリーンノイズ拡散電子透かし法の機械学習による精度向上," 画像電子学会 年次大会予稿集, 2020年12月.

149. Ryota Soga, Hyunho Kang, "Physical Unclonable Function Using Carbon Resistor," 2020 IEEE 9th Global Conference on Consumer Electronics (GCCE2020), IEEE Xplore, pp. 828-830, Oct. 2020.(KAKEN 19K11977)(GCCE 2020 Excellent Poster Paper Award Gold Prize )

148. Daiki Yorioka, Hyunho Kang, Keiichi Iwamura, "Data Augmentation for Deep Learning Using Generative Adversarial Networks," 2020 IEEE 9th Global Conference on Consumer Electronics (GCCE2020), IEEE Xplore, pp. 690-692, Oct. 2020.

147. 河村尚登,姜玄浩,岩村恵市,"安全性の高い印刷耐性を有する多値グリーンノイズ拡散電子透かし法," 画像電子学会誌(The Journal of the Institute of Image Electronics Engineers of Japan),Vo.49, No.2, pp.110-118, 2020.

146. 上田大暉,姜玄浩, 岩村惠市, "映像信号の高周波成分を用いた機械学習による改ざん検出能力の向上," 電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント研究会(EMM),2020年3月.

145. 大村 秀,姜玄浩, "画像処理を用いた自律走行システムに向けたGAN応用の検討," 電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント研究会(EMM),2020年3月.(KAKEN 19K11977)

144. 工藤玲央,姜玄浩, "頬を用いた3Dマスクの顔認証なりすまし防止に関する研究," 電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント研究会(EMM),2020年3月.(KAKEN 19K11977)

143. 田島リオ,姜玄浩, "機械学習を用いた危険物検出に関する研究," 電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント研究会(EMM),2020年3月.(KAKEN 19K11977)

142. 曽我諒太,姜玄浩, "カーボン抵抗を用いた物理的クローン不可関数に関する研究," 電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント研究会(EMM),2020年3月.(KAKEN 19K11977)

 

 

<2019>

141. 河村 尚登,姜玄浩, 岩村惠市, "多値グリーンノイズ拡散電子透かしによる印刷/表示画像からの正確な情報抽出," 画像関連学会連合会第6回秋季大会(FMFIS2019), 2019.10.31-11/1.

140. 菅原貫太,姜玄浩, "機械学習を用いた乳癌画像分類に関する研究," 電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント研究会(EMM),2019年3月.

139. 藤巻匠平,姜玄浩, "オプティカルフローを用いた顔認証なりすまし防止に関する研究," 電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント研究会(EMM),2019年3月.

138. 田中陽太,姜玄浩, "深層学習を用いた透かし情報の抽出," 電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント研究会(EMM),2019年3月.

137. 髙手山雄亮,姜玄浩, "文字輪郭線の濃度特徴を用いたプリンタ識別," 電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント研究会(EMM),2019年3月.

136. 冨塚和真,藤巻匠平,姜玄浩, "機械学習によるアナログ部品の認証に関する研究," 電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント研究会(EMM),2019年3月.

 

<2018>

135. 新内涼平, 姜玄浩, 岩村惠市, "日常動作に無い特徴を用いた動作認識応用に関する考察," 第41回情報理論とその応用シンポジウム (SITA2018), Iwaki, Fukushima, Japan, Dec. 18-21, 2018.(Ryohei Niiuchi, Hyunho Kang, Keiichi Iwamura,"Motion Recognition Application Using Motion Characteristics Not Found in Everyday Life," The 41st Symposium on Information Theory and its Applications (SITA2018), Iwaki, Fukushima, Japan, Dec. 18-21, 2018.)

134. 佐久間 稜, 姜玄浩, 岩村惠市, "画像電子透かしの切り抜き攻撃耐性を持つ機械学習モデル形成方法の考察," 第41回情報理論とその応用シンポジウム (SITA2018), Iwaki, Fukushima, Japan, Dec. 18-21, 2018.(Ryo Sakuma, Hyunho Kang, Keiichi Iwamura, "Machine Learning Model for Image Watermarking Resistant to Cropping Attack," The 41st Symposium on Information Theory and its Applications (SITA2018), Iwaki, Fukushima, Japan, Dec. 18-21, 2018.)

133. Ryohei Niiuchi, Hyunho Kang, Keiichi Iwamura, "Detection of human motion gestures using machine learning for actual emergency situations," 2018 IEEE 7th Global Conference on Consumer Electronics (GCCE 2018), IEEE Xplore, pp.332-336, Oct. 2018.

132. 竹内優哉,姜玄浩, "ウェーブレット変換を用いた撮影カメラ識別," 電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント研究会(EMM),2018年3月.

131. 田島リオ,姜玄浩, "加速度センサと機械学習による個人認証システムの研究," 電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント研究会(EMM),2018年3月.

130. 野本和義,姜玄浩, "顔認証のなりすまし防止に関する研究," 電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント研究会(EMM),2018年3月.

129. Yufeng Yan, Hyunho Kang, Keiichi Iwamura, Isao Echizen, "Efficient Image Watermarking Using the Difference Value of Two Wavelet Filters," RISP International Workshop on Nonlinear Circuits, Communications and Signal Processing 2018 (NCSP2018), pp.1-3, March 2018.

 

<2017>

128. Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura, Hyunho Kang, "Searchable Encryption of Image based on Secret Sharing Scheme," The 9th APSIPA ASC (Asia-Pacific Signal and Information Processing Association) 2017, KUALA LUMPUR, MALAYSIA, Dec. 2017.

127. 佐久間 稜, 姜 玄浩, 岩村 惠市, 越前 功, "画像電子透かしに対する機械学習アルゴリズムの性能評価" コンピュータセキュリティシンポジウム 2017 (CSS2017), 2017年10月23日~25日.

126. Masataka Ikeda, Hyunho Kang, Keiichi Iwamura,“Direct Challenge Ring Oscillator PUF (DC-ROPUF) with Novel Response Selection,”2017 IEEE 6th Global Conference on Consumer Electronics (GCCE), IEEE Xplore, Oct. 2017.

125. Ryo Sakuma, Hyunho Kang, Keiichi Iwamura, Isao Echizen,“Digital Watermarking Scheme Based on Machine Learning for the IHC Evaluation Criteria,”Advances in Intelligent Information Hiding and Multimedia Signal Processing. IIH-MSP 2017. Smart Innovation, Systems and Technologies, vol 81. Springer, Aug. 2017.

124. 池田匡孝, 姜玄浩, 岩村惠市, "新しいレスポンス取得法を利用したダイレクトチャレンジ型ROPUF," 2017年暗号と情報セキュリティシンポジウム,沖縄,Jan. 24-27, 2017.(Masataka Ikeda, Hyunho Kang, Keiichi Iwamura, "Direct Challenge Ring Oscillator PUF (DC-ROPUF) with Novel Response Selection, 2017 Symposium on Cryptography and Information Security (SCIS2017),Okinawa, Jan. 24-27, 2017.)

123. 新内涼平, 姜玄浩, 岩村惠市, "緊急監視システムのための機械学習を用いた動作認識:ひらがなにおける事例," 2017年暗号と情報セキュリティシンポジウム,沖縄,Jan. 24-27, 2017.(Ryohei Niiuchi, Hyunho Kang, Keiichi Iwamura, "Emergency Monitoring System Using Machine Learning: A Case Study in Hiragana data," 2017 Symposium on Cryptography and Information Security (SCIS2017),Okinawa, Jan. 24-27, 2017.)

122. Keiichi Iwamura, Masaki Kawamura, Minoru Kuribayashi, Motoi Iwata, Hyunho Kang, Seiichi Gohshi, Akira Nishimura, “Information Hiding and its Criteria for Evaluation,” IEICE TRANS. INF. & SYST., Vol.E100-D, No.01, pp.2-12, Jan. 2017.

 

<2016>

121. YuFeng Yan, Hyunho Kang, Keiichi Iwamura, Isao Echizen, "Image Watermarking Using the Differences Between Two Wavelet Filters," 2016 IEEE 5th Global Conference on Consumer Electronics, Kyoto, Japan, Oct 11-14, 2016.

120. Natsuki Kokui, Hyunho Kang, Keiichi Iwamura, Isao Echizen, "Best Embedding Direction for Spread Spectrum-Based Video Watermarking," 2016 IEEE 5th Global Conference on Consumer Electronics, Kyoto, Japan, Oct 11-14, 2016.

119. Yuichi Kusama, Hyunho Kang, Keiichi Iwamura, Isao Echizen, "Privacy-protected Video Surveillance in Crowded Environments Using Robust Watermarking," 2016 IEEE 5th Global Conference on Consumer Electronics, Kyoto, Japan, Oct 11-14, 2016.

118. 伊藤世紀, 姜玄浩, 岩村惠市, 金田北洋, 越前功, "時間領域へのウェーブレットフィルタの加減算による音響電子透かしの提案," 情報処理学会論文誌,57(9),1911-1920, Sep. 2016.(Toshiki Ito, Hyunho Kang, Keiichi Iwamura, Kitahiro Kaneda, Isao Echizen, "Proposing Audio Watermarking by Addition-subtraction Wavelet Filters to Time Domain Signal," IPSJ Journal, Vol57, No.9, pp.1911-1920, Sep. 2016.)

117. Hyunho Kang, Isamu Wakabayashi, Keiichi Iwamura, "Face Anti-spoofing Using Histogram of Oriented Gradients," RISP International Workshop on Nonlinear Circuits, Communications and Signal Processing 2016 (NCSP2016), Honolulu, Hawaii, USA, March 6-9, 2016.

116. 板橋宏樹, 姜玄浩, 岩村惠市, "オプティカルフローを用いた顔認証の生体検知方式," 情報処理学会 第78回全国大会, 1w-02, 3月10日~12日, 2016. (Hiroki Itabashi, Hyunho Kang, Keiichi Iwamura, "Optical Flow Based Countermeasure against Video Attack in Face Recognition," The 78th National Convention of IPSJ, 1w-02, March 10-12, 2016.)

115. 徳丸翔也, 姜玄浩, 岩村惠市, "小模様によるデザイン類似度を利用したロゴの著作権保護," 2016年 暗号と情報セキュリティシンポジウム, 熊本, Jan. 19-22, 2016.(Shoya Tokumaru, Hyunho Kang, Keiichi Iwamura, "Logo Copyright Protection Using Design Similarity with Small Pattern," 2016 Symposium on Cryptography and Information Security (SCIS2016), Kumamoto, Japan, Jan. 19-22, 2016.)

 

<2015>

114. Hyunho Kang, Keiichi Iwamura, "Anti-counterfeiting Using Irregularities of Magnetic Flux Density," 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), IEEE Computer Society press, pp.1325-1329, Liverpool, England, UK, October, 2015.

113. 伊藤世紀, 姜 玄浩, 岩村惠市, "Coiflets と Symlets フィルタによる音響電子透かし" コンピュータセキュリティシンポジウム 2015 (CSS2015), 2015年10月21日~23日.(Toshiki Ito, Hyunho Kang, Keiichi Iwamura, "Audio Watermarking Using Relation of Coiflets and Symlets Filter," Computer Security Symposium 2015 (CSS2015), 2015.10.21-23.)

112. Toshiki Ito, Hyunho Kang, Keiichi Iwamura, Kitahiro Kaneda, Isao Echizen, " Audio Watermarking Using Different Wavelet Filters," 14th International Workshop on Digital-forensics and Watermarking (IWDW2015), Lecture Notes in Computer Science (LNCS) 9569, Springer International Publishing, pp.312-320, October 7-10, 2015. (Revised Selected Papers, 31 March 2016)

111. Hyunho Kang, "Face Anti-spoofing Based on Image Block Difference and Logistic Regression Analysis," 2015 IEEE 5th International Conference on Consumer Electronics - Berlin (ICCE-Berlin), IEEE Xplore, pp.493-495, Berlin, Sept. 2015.

110. Yuichi Kusama, Hyunho Kang, Keiichi Iwamura, "Mosaic-based Privacy-protection with ReversibleWatermarking," In Proceedings of the 12th International Conference on Signal Processing and Multimedia Applications, ISBN 978-989-758-118-2, pages 98-103, Colmar, Alsace, France, July, 2015.

109. 國井夏樹, 姜玄浩, 岩村 惠市, "評価用RAW動画の撮影と新たな動画電子透かしシステムの提案," 電子情報通信学会技術研究報告, 2015年7月2日~3日. (Natsuki Kokui, Hyunho Kang, Keiichi Iwamura, "Making RAW Video and Novel Video Watermarking System," IEICE Technical Report, July 2015.)

108. Hyunho Kang, Keiichi Iwamura, "Information Hiding Method Using Best DCT and Wavelet Coefficients and Its Watermark Competition," Entropy 17, no.3, pp.1218-1235, 2015.(Open Access, 5-Year Impact Factor: 1.780 (2015))

107. Hyunho Kang, "Physical Unclonable Functions and its Evaluation," NCTU-TUS Data Science and Optimization Joint Symposium, Taiwan, March 23-24, 2015.

106. 草間雄一, 姜玄浩, 岩村惠市, "原動画が復元可能なモザイクシステム," 電子情報通信学会技術研究報告, Vol.114, No.511, EMM2014-85, 2015年3月12日~13日. (Yuichi Kusama, Hyunho Kang, Keiichi Iwamura, "Recoverable original video for mosaic system," IEICE Technical Report, EMM2014-85, March 2015.)

105. Toshiki Ito, Ryo Sugimura, Hyunho Kang, Kitahiro Kaneda, Isao Echizen, Keiichi Iwamura, "High Capacity Information Hiding Using Continuous Reversible Watermarking," Computer Science and Applications, Vol.2, No.2, pp.58-63, 2015.

104. 石丸大輔, 姜玄浩, 岩村惠市, "キネクトの骨格情報による非日常ポーズ認証," 2015年 暗号と情報セキュリティシンポジウム,北九州市小倉, Japan, Jan. 20-23, 2015.(Daisuke Ishimaru, Hyunho Kang, Keiichi Iwamura, "Unusual Pose Authentication Using Kinect Skeletal Data," The 32nd Symposium on Cryptography and Information Security (SCIS2015), Kokura, Japan, Ja. 20-23, 2015.)

103. 片平健太郎, 姜玄浩, 岩村惠市, "磁束密度のばらつきの抽出による真贋判定の可能性について," 2015年 暗号と情報セキュリティシンポジウム,北九州市小倉, Japan, Jan. 20-23, 2015.(Kentaro Katahira, Hyunho Kang, Keiichi Iwamura, "Anti-counterfeiting Using Irregularity Extraction of Magnetic Density," The 32nd Symposium on Cryptography and Information Security (SCIS2015), Kokura, Japan, Ja. 20-23, 2015.)

 

<2014>

102. Shinichi Goto, Soma Saito, Hyunho Kang, Keiichi Iwamura, "New Secure LEACH Protocol Using Hierarchy-Based Preshared Key Scheme," Computer Science and its Applications, Lecture Notes in Electrical Engineering, Springer-Verlag, Vol.330, pp.99-106, 2015.

101. Hyunho Kang, Keiichi Iwamura, "BCH Code based Image Watermarking for Cropping Tolerance," The 8th International Symposium on Digital Forensics and Information Security (DFIS 2014), Dec. 17-19, 2014.

100. 伊藤世紀, 姜玄浩, 岩村惠市, "音響電子透かしに対するウェーブレットフィルタの影響," コンピュータセキュリティシンポジウム 2014 (CSS2014), 2014年10月22日~24日.(Toshiki Ito, Hyunho Kang, Keiichi Iwamura, "Performance Analysis of Wavelet Filters for Audio Watermarking," Computer Security Symposium 2014 (CSS2014), 2014.10.22-24.)

99. Hyunho Kang, Keiichi Iwamura, "Image Protection System with Steganography and Authentication," The Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2014), IEEE Xplore, pp.467-470, Kitakyushu, Japan, August 27-29, 2014.

98. Toshiki Ito, Ryo Sugimura, Hyunho Kang, Keiichi Iwamura, Kitahiro Kaneda, Isao Echizen, "A New Approach to Reversible Watermarking," The Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2014), IEEE Xplore, pp.455-458, Kitakyushu, Japan, August 27-29, 2014.

97. Hyunho Kang, Keiichi Iwamura, "Watermarking Based on the Difference of Discrete Cosine Transform Coefficients and Error-Correcting Code," The First International Workshop on Information Hiding and its Criteria for evaluation (IWIHC2014), ACM Press, pp. 9-17, June 2014.

96. Yohei Hori, Hyunho Kang,Toshihiro Katashita, Akashi Satoh, Shinichi Kawamura, Kazukuni Kobara, "Evaluation of Physical Unclonable Functions for 28-nm Process Field-Programmable Gate Arrays," Journal of Information Processing, Vol.22, No.2, pp.344-356, Apr. 2014. (Specially Selected Paper)

95. Hyunho Kang, Keiichi Iwamura, "Digital Image Watermarking with Robust, Semifragile, and Fragile Properties," Josai Mathematical Monographs, Vol.7, pp.41-54, March 2014.

94. 田中佳吾,姜 玄浩,岩村惠市, "量子化幅の調整によるRing Oscillator PUFの性能評価," 情報処理学会第76回全国大会, 1Z-4,3月11日~13日,2014. (Keigo Tanaka, Hyunho Kang, Keiichi Iwamura, "Performance Evaluation for Ring Oscillator PUF Using Quantization Level," The 76th National Convention of IPSJ, 1Z-4, March 11-13, 2014.)

93. Hyunho Kang, Yohei Hori, Toshihiro Katashita, Manabu Hagiwara, Keiichi Iwamura, "Cryptographic Key Generation from PUF Data Using Efficient Fuzzy Extractors," The 16th International Conference on Advanced Communications Technology (ICACT2014), IEEE Xplore, Phoenix Park, Korea, pp.23-26, Feb. 16-19. 2014. (ICACT 2014 Outstanding Paper Award )

92. 西川弘毅, 姜 玄浩, 岩村 恵市, 越前 功, "複数画像のSIFT特徴点を利用する電子透かし方法の一考察," 2014年 暗号と情報セキュリティシンポジウム,鹿児島,Japan, Jan. 21-24, 2014.(Hiroki Nishikawa, Hyunho Kang, Keiichi Iwamura, Isao Echizen,"Digital Watermarking Using SIFT Features of Multiple Images," The 31st Symposium on Cryptography and Information Security (SCIS2014), Kagoshima, Japan, Jan. 21-24, 2014.)

91. 渋谷 律, 姜 玄浩, 岩村 恵市, 越前 功, "スマートフォン画面によるなりすましを想定した顔認証における生体検知技術の検討," 2014年 暗号と情報セキュリティシンポジウム,鹿児島,Japan, Jan. 21-24, 2014.(Ritsu Shibutani, Hyunho Kang, Keiichi Iwamura, Isao Echizen, "Face Liveness Detection against Smartphone Screen," The 31st Symposium on Cryptography and Information Security (SCIS2014), Kagoshima, Japan, Jan. 21-24, 2014.)

90. Satoshi Takahashi, Hyunho Kang, Keiichi Iwamura, "Asymmetric Secret Sharing Scheme Suitable for Cloud Systems," The 11th Annual IEEE Consumer Communications and Networking Conference (CCNC 2014), Las Vegas, Nevada USA,  pp.798-804, Jan. 10-13, 2014.

 

<2013>

89. Hyunho Kang, Keiichi Iwamura, "Collusion-Resistant Watermarking Using Modified Barni Method," Ubiquitous Information Technologies and Applications, Lecture Notes in Electrical Engineering, Springer-Verlag, Vol.280, pp.627-634, 2014.

88. Hyunho Kang, Yohei Hori, Toshihiro Katashita, Manabu Hagiwara, Keiichi Iwamura, "Performance Analysis for PUF Data Using Fuzzy Extractor," Ubiquitous Information Technologies and Applications, Lecture Notes in Electrical Engineering, Springer-Verlag, Vol.280, pp.277-284, 2014.

87, Yoshihide Nagai, Hyunho Kang, Keiichi Iwamura, "A Key Management System with a Storage-saving Secret Sharing Scheme in a Sensor Network," The International Conference on Electrical and Electronics Engineering, Clean Energy and Green Computing (EEECEGC2013), pp.35-39, Dec. 2013.

86. Satoshi Takahashi, Hyunho Kang, Keiichi Iwamura, "Comparison and Implementation of Secret Sharing Suitable for Life Log System," The International Conference on Electrical and Electronics Engineering, Clean Energy and Green Computing (EEECEGC2013), pp.16-29, Dec. 2013.

85. Satoshi Takahashi, Shiro Kobayashi, Hyunho Kang, Keiichi Iwamura, "Secret Sharing Scheme for Cloud Computing using IDs," The 2nd IEEE Global Conference on Consumer Electronics (GCCE2013), Tokyo, Japan, Oct 1-4, 2013.

84. Yoshihide Nagai, Hyunho Kang, Keiichi Iwamura, "A storage-saving secret sharing scheme suitable for sensor networks," The 2nd IEEE Global Conference on Consumer Electronics (GCCE2013), Tokyo, Japan, Oct 1-4, 2013. 

83. Hyunho Kang, Yohei Hori, Toshihiro Katashita, Akashi Satoh, Keiichi Iwamura, "PUF Evaluation with Post-processing and Modified Modeling Attack," International Journal of Security and Its Applications, Vol.7, No.4, July, 2013.

82. Hyunho Kang, Yohei Hori, Toshihiro Katashita, Manabu Hagiwara, "The Implementation of Fuzzy Extractor is Not Hard to Do: An Approach Using PUF Data," The 30th Symposium on Cryptography and Information Security (SCIS2013), kyoto, Japan, Jan. 22-25, 2013.

 

<2012>

81. Hyunho Kang, Yohei Hori, Toshihiro Katashita, Akashi Satoh, "Performance of Physical Unclonable Functions with Shift-Register-Based Post-processing," SecTech/CA/CES^3 2012, CCIS 339,  Springer-Verlag, pp.14-21, 2012.11.

80. Hyunho Kang, Yohei Hori, Akashi Satoh, "Performance Evaluation of the First Commercial PUF-embedded RFID," IEEE Global Conference on Consumer Electronics (GCCE2012), Makuhari Messe, Tokyo, Japan, Oct. 2-5, 2012.(GCCE 2012 Excellent Paper Award )

79. Hyunho Kang, Yohei Hori, Toshihiro Katashita, Akashi Satoh, "PUF Evaluation against Linear Programming Model on SASEBO-GII," Multimedia, Distributed, Cooperative, and Mobile Symposium (DICOMO2012), Yamashiro-onsen, Ishikawa, July 4-6, 2012.

78. 堀 洋平, 片下 敏宏, 姜 玄浩, 佐藤 証, "45nm プロセス FPGA 上の Physical Unclonable Function の特性評価," Multimedia, Distributed, Cooperative, and Mobile Symposium (DICOMO2012), Yamashiro-onsen, Ishikawa, July 4-6, 2012.(優秀論文賞) [Japanese]

 

<2011>

77. Yohei Hori, Hyunho Kang, Toshihiro Katashita, Akashi Satoh, "Pseudo-LFSR PUF: A Compact, Efficient and Reliable Physical Unclonable Function," 2011 International Conference on ReConFigurable Computing and FPGAs (ReConFig 2011), Cancun, Mexico, Nov. 30 - Dec. 2, 2011.

76. Hyunho Kang, Yohei Hori, Toshihiro Katashita, Akashi Satoh, "PUF evaluation using SASEBO-GII," Workshop on Cryptographic Hardware and Embedded Systems 2011 (CHES2011), Nara, Japan, Sep. 28 -Oct. 1, 2011. (Poster)

75. 堀 洋平, 片下 敏宏, 姜 玄浩, 佐藤 証, "物理特性を 用いたLSIの 真贋判定法," Multimedia, Distributed, Cooperative, and Mobile Symposium (DICOMO2011), Miyazu, Kyoto, July 6-8, 2011. (Yohei Hori, Toshihiro Katashita, Hyunho Kang, Akashi Satoh, "Counterfeit LSI Detection Based on Physical Property," Multimedia, Distributed, Cooperative, and Mobile Symposium (DICOMO2011), Miyazu, Kyoto, July 6-8, 2011. [Japanese])

74. Hyunho Kang, Yohei Hori, Toshihiro Katashita, Akashi Satoh, "Performance Evaluation for PUF-based Authentication Systems with Shift Post-processing: Additional Experimental Results," The 2011 Symposium on Cryptography and Information Security (SCIS2011),Kitakyushu, Japan, Jan. 25-28, 2011. 

 

<2010>

73. Hyunho Kang, Yohei Hori, Toshihiro Katashita, Akashi Satoh, "Performance Evaluation for PUF-based Authentication Systems with Shift Post-processing," IEICE Technical Report, リコンフィギャラブルシステム研究会(RECONF),11月29日~12月1日,2010.

72. Hyunho Kang, Shoko Yonezawa, Manabu Inuma, Akira Otsuka, Hideki Imai, "Wolf Fingerprints against Minutiae Count Matching Systems," IEICE Electronics Express, Vol. 7, No. 10, pp.738-744, 2010.

71. 中川拓哉,姜玄浩, 米澤祥子, 井沼学,大塚玲, 今井秀樹, "指紋の統計情報を利用した合成ウルフ指紋の構成と理論的評価," 電子情報通信学会 信学技報 情報セキュリティ研究会(ISEC), 3月4日~5日,2010. (Takuya Nakagawa, Hyunho Kang, Shoko Yonezawa, Manabu Inuma, Akira Otsuka, Hideki Imai, "Experimental and Theoretical Evaluation of Wolf Fingerprint Using Statistical Information," IEICE Technical Report, ISEC, Mar. 4-5, 2010.[Japanese])

70. Hyunho Kang, Shoko Yonezawa, Manabu Inuma, Akira Otsuka, Hideki Imai, "Wolf Fingerprints against Simple Count Matching Systems : Additional Experimental Results," The 2010 Symposium on Cryptography and Information Security (SCIS2010), Takamatsu, Japan, Jan. 19-22, 2010.

69.  武藤祐貴,姜玄浩, 井沼学,今井秀樹, "Fuzzy Commitment Vault Fusion Scheme の提案と安全性の評価," The 2010 Symposium on Cryptography and Information Security (SCIS2010), Takamatsu, Japan, Jan. 19-22, 2010.(Yuki Muto, Hyunho Kang, Manabu Inuma, Hideki Imai, "Fuzzy Commitment Vault Fusion Scheme and the Security Evaluation," The 2010 Symposium on Cryptography and Information Security (SCIS2010), Takamatsu, Japan, Jan. 19-22, 2010.[Japanese])

 

<2009>

68. Hyunho Kang, Shoko Yonezawa, Manabu Inuma, Akira Otsuka, Hideki Imai, "Wolf Fingerprints against Simple Count Matching Systems : An Approach Using Minutia Patterns," The 32nd Symposium on Information Theory and its Applications (SITA 2009), Yuda-Onsen, Yamaguchi, Japan, Dec. 1-4, 2009. 

67.米澤 祥子, 姜玄浩, 大塚玲, 今井秀樹,"合成ウルフを用いた安全性評価に関する一考察," Computer Security Symposium 2009 (CSS2009), Toyama, Japan, October 26-28, 2009.(Shoko Yonezawa, Hyunho Kang, Akira Otsuka, Hideki Imai, "A Study on Security Evaluation Using Synthesized Wolf Samples," Computer Security Symposium 2009 (CSS2009), Toyama, Japan, October 26-28, 2009.[Japanese] )

66. 武藤祐貴,姜玄浩,井沼学,今井秀樹,"Fuzzy Commitment Scheme を指紋マニューシャマッチングに適用した実験と評価," Computer Security Symposium 2009 (CSS2009), Toyama, Japan, October 26-28, 2009. (Yuki Muto, Hyunho Kang, Manabu Inuma, Hideki Imai, "An Experiment and Evaluation of Fuzzy Commitment Scheme for Fingerprint Minutiae Matching Algorithm," Computer Security Symposium 2009 (CSS2009), Toyama, Japan, October 26-28, 2009.[Japanese] )

65. 清水智行, 井沼学, 姜玄浩, 今井秀樹, "顔認証における非日常顔を用いた固有顔法の精度と安全性の評価," 電子情報通信学会総合大会,松山市,SS-89, March 17-20, 2009.

64. 清 水智行, 井沼学, 姜玄浩, 今井秀樹, "顔認証における非日常顔を用いた固有顔法の安全性評価," The 2009 Symposium on Cryptography and Information Security (SCIS2009), Otsu, Japan, Jan. 20-23, 2009.(Tomoyuki Shimizu, Manabu Inuma, Hyunho Kang, Hideki Imai, "An Evaluation of the Security of the Eigenface Method using Unusual Expressions in the Face Recognition," The 2009 Symposium on Cryptography and Information Security (SCIS2009), Otsu, Japan, Jan. 20-23, 2009.[Japanese])

63.  道 満康裕,  ナッ タポンアッタラパドゥン, 姜玄浩, 今井秀樹, "一定サイズの公開鍵と暗号文でCCA安全性をもったTraitor-Tracingシステム," The 2009 Symposium on Cryptography and Information Security (SCIS2009), Otsu, Japan, Jan. 20-23, 2009.(Yasuhiro Doman, Nuttapong Attrapadung, Hyunho Kang, Hideki Imai, "Chosen-Ciphertext Secure Traitor Tracing with Constant-Size Public-key and Ciphertext," The 2009 Symposium on Cryptography and Information Security (SCIS2009), Otsu, Japan, Jan. 20-23, 2009.[Japanese])

 

<2008>

62.  Hyunho Kang, Koutarou Yamaguchi, Brian Kurkoski, Kazuhiko Yamaguchi, and Kingo Kobayashi, “Full-Index-Embedding Patchwork Algorithm for Audio Watermarking,” IEICE Trans. Inf. & Syst., Vol.E91-D, No.11, pp.2731-2734, Nov. 2008.

61. Youngran Park, Hyunho Kang, Kazuhiko Yamaguchi, Kingo Kobayashi, “Improved Authentication Steganography Using the Variance of Adjacent Pixels,” The 31st Symposium on Information Theory and its Applications (SITA2008), pp.644-649, Kinugawa, Tochigi, Japan, Oct. 7-10, 2008.

60. Youngran Park, Hyunho Kang, Kazuhiko Yamaguchi, Kingo Kobayashi, “Watermarking for Tamper Detection and Recovery,” IEICE Electronics Express, Vol.5, No.17, pp.689-696, 2008.

59.  阿部 功, マルチネス ノリエガ ラウル,  姜玄浩, ブライアン クルカスキー, 山口和彦, “クリッピング耐性のある,LDPC符号を用いた電子透かしとその新しい復号法 : 巡回LDPC符号の適用と詳細な信頼度情報を用いた復号,” 電子情報通信学会技術研究報告, Volume 107, Number 501, 2008.02.

58. Hyunho Kang, Youngran Park, Brian Kurkoski, Kazuhiko Yamaguchi, Kingo Kobayashi, “Negative Correlation-Based Collusion-Resistant Watermarking,” The 2008 Symposium on Cryptography and Information Security (SCIS2008), Miyazaki, Japan, Jan. 22-25, 2008.

57. 山 口恒太郎姜 玄浩山 口和彦小 林欣吾, “結 託耐性を有する音楽電子透かし法,” The 2008 Symposium on Cryptography and Information Security (SCIS2008), Miyazaki, Japan, Jan. 22-25, 2008.(Koutarou Yamaguchi, Hyunho Kang, Kazuhiko Yamaguchi, Kingo Kobayashi, "Audio Watermarking with Collusion Tolerance," The 2008 Symposium on Cryptography and Information Security (SCIS2008), Miyazaki, Japan, Jan. 22-25, 2008.[Japanese])

56. Youngran Park, Hyunho Kang, Kazuhiko Yamaguchi and Kingo Kobayashi, “Block-based Fragile Watermarking Scheme for Tamper Detection and Recovery,” The 2008 Symposium on Cryptography and Information Security (SCIS2008), Miyazaki, Japan, Jan. 22-25, 2008.

 

<2007>

55. Youngran Park, Hyunho Kang, Kazuhiko Yamaguchi and Kingo Kobayashi, “A Novel Steganographic System with Information Integrity,” IEICE Electronics Express, Vol. 4, No. 12, pp.393-399, 2007.

54. Hyunho Kang, Brian Kurkoski, Kazuhiko Yamaguchi and Kingo Kobayashi, “Tracing Illegal Users of Video : Reconsideration of Tree-Specific and Endbuyer-Specific Methods,” ICCSA 2007, Lecture Notes in Computer Science 4707, Part III, pp.1046-1055, Springer-Verlag, 2007.

53. Hyunho Kang, Koutarou Yamaguchi, Brian Kurkoski and Kazuhiko Yamaguchi, “Psychoacoustically-Adapted Patchwork Algorithm for Watermarking,” The Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP07, Kaohsiung City, Taiwan, November 26-28, 2007.

52. Hyunho Kang, Youngran Park, Brian Kurkoski and Kazuhiko Yamaguchi, “Multipurpose Watermarking: Fragile, Semifragile and Robust Watermarks”, ICT Triangle Forum 2007, Beijing University of Posts and Telecommunications, China, Sept. 17-19, 2007.

51. Bingfei Wang, Hyunho Kang, Brian Kurkoski, Kazuhiko Yamaguchi and Kingo Kobayashi, "An Improved Image Watermarking Scheme Based on Multiresolution Wavelet Transform," ICT Triangle Forum 2007, Beijing University of Posts and Telecommunications, China, Sept. 17-19, 2007.

50. Raul Martinez-Noriega, Hyunho Kang, Brian Kurkoski, Kazuhiko Yamaguchi and Mariko Nakano, “Audio Watermarking Based on Wavelet Transform and Quantization Index Modulation,” The 22nd International Technical Conference on Circuits/Systems, Computers and Communications, ITC-CSCC 2007, pp. 133-134, Busan, Korea, July 8-11, 2007.

49. Hyunho Kang, Youngran Park, Brian Kurkoski, Kazuhiko Yamaguchi and Kingo Kobayashi, “Multiple watermarking with semifragile property,” 2007 Hawaii and SITA Joint Conference on Information Theory, HISC2007, Hawaii, USA, May 29-31, 2007.

48. 阿部功,塗田誠姜 玄浩ブ ライアンクルカスキー山 口和彦, “LDPC符 号を用いたクリッピング耐性をもつ電子透かし,” The 30th Symposium on Information Theory and Its Applications (SITA2007), Kashikojima, Mie, Japan, Nov. 27-30, 2007. (Isao Abe, Makoto Nurita, Hyunho Kang, Brian Kurkoski, Kazuhiko Yamaguchi, "Digital Watermarking with Clipping attack Tolerance Using LDPC," The 30th Symposium on Information Theory and Its Applications (SITA2007), Kashikojima, Mie, Japan, Nov. 27-30, 2007.[Japanese])

47. 辰 巳輝洋姜 玄浩ラ ウル マルチネス ノリエガ,  山口和彦小 林欣吾, “改 ざん復元可能な電子透かしに関する検討,” 2回マルチメディア情報 ハイディング研究会, pp.7-12, 2007. 11. 9-10. (Teruhiro Tatsumi, Hyunho Kang, R. Martinez-Noriega, Kazuhiko Yamaguchi, Kingo Kobayashi, "Restorable Watermarking Using Error Correcting Code," IEICE, MIH, pp.7-12, Nov. 9-10, 2007.[Japanese])

46. 山 口和彦,久保田淳哉,マルチネス-ノリエガ ラウル,姜玄浩ブライアン クルカスキー,振幅変調電子透かし方 式における誤り訂正符号とターボ等価を用いた抽出法,” 信 学技報, Vol. 106, No. 594, pp. 135-140, 2007.3.15.(Kazuhiko Yamaguchi, Junya Kubota, R. Martinez-Noriega, Hyunho Kang, Brian Kurkoski, "Extracting Scheme using Coding and Turbo Equalization in Amplitude moderation Digital Watermarking Systems," IEICE technical report, Vol.106, No. 594, pp. 135-140, Mar. 15, 2007.[Japanese])

45. Hyunho Kang, Youngran Park, Brian Kurkoski, Kazuhiko Yamaguchi, Kingo Kobayashi, “Watermarking with permissible alterations,” The 2007 Symposium on Cryptography and Information Security (SCIS2007), Sasebo, Japan, Jan. 23-26, 2007.

44. 久 保田淳哉ラ ウル マルチネス ノリエガ姜玄浩ブ ライアン クルカスキー,  山 口和彦, “攻 撃に応じた復号を行う振幅変調型電子透かし法の提案,” The 2007 Symposium on Cryptography and Information Security (SCIS2007), Sasebo, Japan, 2007. 1. (Junya Kubota, Raul Martinez-Noriega,Hyunho Kang, Brian Kurkoski, Kazuhiko Yamaguchi, "A Proposal for an AM-Based Watermarking System using an Attack-Adapted Decoder," The 2007 Symposium on Cryptography and Information Security (SCIS2007), Sasebo, Japan, Jan., 2007.[Japanese])

43. 山 口恒太郎姜 玄浩山 口和彦小 林欣吾, “心 理聴覚モデルとパッチワークアルゴリズムを用いた音楽電子すかし,” The 2007 Symposium on Cryptography and Information Security (SCIS2007), Sasebo, Japan, 2007. 1.(Koutarou Yamaguchi, Hyunho Kang, Kazuhiko Yamaguchi, Kingo Kobayashi, "Robust Audio Watermarking using Psychoacoustic Model and the Patchwork Algorithm," The 2007 Symposium on Cryptography and Information Security (SCIS2007), Sasebo, Japan, Jan., 2007.[Japanese])

42. 辰 巳輝洋姜 玄浩山 口和彦小 林欣吾, “ウェー ブレット変換に基づく誤り訂正符号を用いた改ざん復元可能な電子透かし,” The 2007 Symposium on Cryptography and Information Security (SCIS2007), Sasebo, Japan, 2007. 1.(Teruhiro Tatsumi, Hyunho Kang, Kazuhiko Yamaguchi, Kingo Kobayashi, "Restorable Watermarking Using Wavelets and Error Correcting Code,"The 2007 Symposium on Cryptography and Information Security (SCIS2007), Sasebo, Japan, Jan., 2007.[Japanese])

41. R. Martinez-Noriega, H. Kang, B. Kurkoski, K. Yamaguchi, M. Nakano, “QIM Audio Watermarking with Distortion Compensated Property,” The 2007 Symposium on Cryptography and Information Security (SCIS2007), Sasebo, Japan, 2007. 1.

40. Youngran Park, Hyunho Kang, Kazuhiko Yamaguchi, Kingo Kobayashi, “Pixel Based Steganography with Integrity,” The 2007 Symposium on Cryptography and Information Security (SCIS2007), Sasebo, Japan, 2007. 1.

 

<2006>

39. Hyunho Kang, Brian Kurkoski, Youngran Park, Sanguk Shin, Kazuhiko Yamaguchi, Kingo Kobayashi, “A viable system for tracing illegal users of video,” WISI 2006, Lecture Notes in Computer Science 3917, pp. 156-158, Springer-Verlag, 2006.

38. Hyunho Kang, Brian Kurkoski, Youngran Park, Hyejoo Lee, Sanguk Shin, Kazuhiko Yamaguchi, Kingo Kobayashi, “Video Fingerprinting System using Wavelet and Error Correcting Code,” WISA 2005, Lecture Notes in Computer Science 3786, pp. 150-164, Springer-Verlag, 2006.

37. Youngran Park, Jihye Sung, Hyunho Kang,  Sanguk Shin,  “A Study on Digital Watermarking for Copyright Notification and Protection,” Journal of Korea Multimedia Society, Vol. 9, No. 4, pp.505-514, 2006. 4. [Korean]

36. Youngran Park, Soonhye Ha, Hyunho Kang, Hyejoo Lee, Sanguk Shin, “A Study on Steganographic Method for Binary Images,” Journal of Korea Multimedia Society, Vol. 9, No. 2, pp.215-225, 2006. 2. [Korean]

35. Hyunho Kang, Brian Kurkoski, Kazuhiko Yamaguchi, Kingo Kobayashi, “Detecting malicious attacks using semi-fragile watermark based on visual model,” Mexican Conference on Informatics Security(MCIS2006)-Conference in technical cooperation with the IEEE and IEEE Computer Society, Oaxaca, Mexico, November 2006.

34. R.Martinez-Noriega, Hyunho Kang, Brian Kurkoski, Kazuhiko Yamaguchi, Kingo Kobayashi, M. Nakano, “Increasing Robustness of Audio Watermarking DM using ATHC Codes,” Mexican Conference on Informatics Security(MCIS2006)-Conference in technical cooperation with the IEEE and IEEE Computer Society, Oaxaca, Mexico, November 2006.

33. Hyunho Kang, Brian Kurkoski, Kazuhiko Yamaguchi, Kingo Kobayashi, “Specifying the Subtree Number of A Content Distribution Tree Using Visual Cryptography,” International Symposium on Information Theory and its Applications(ISITA2006), Seoul, Korea, October 2006.

32. Hyunho Kang, Brian Kurkoski, Kazuhiko Yamaguchi, Kingo Kobayashi, “Tracing Illegal Users of Video: Practical Use of Content Distribution Tree,” International Symposium on Advanced ICT(AICT2006), Tokyo, Japan, August 2006.

31. 姜 玄浩山 口和彦,小林欣吾, “魔 方陣を利用するビデオの違法配信の探知,” The 29th Symposium on Information Theory and Its Applications (SITA2006), Hakodate, Hokkaido, Japan, 2006. 11.(Hyunho Kang, Kazuhiko Yamaguchi, Kingo Kobayashi, "On the detection of illegal video distribution using magic square," The 29th Symposium on Information Theory and Its Applications (SITA2006), Hakodate, Hokkaido, Japan, Nov., 2006.[Japanese])

30. Youngran Park, Hyunho Kang, Kazuhiko Yamaguchi, Kingo Kobayashi, “Integrity Verification of Secret Information in Image Steganography,” The 29th Symposium on Information Theory and Its Applications (SITA2006), Hakodate, Hokkaido, Japan, 2006. 11.

29. Hyunho Kang, Brian Kurkoski, Kazuhiko Yamaguchi, Kingo Kobayashi, “Tracing Illegal Users of Video Content: Reconsideration of Tree-Specific and Endbuyer-Specific Methods,” The 2006 Symposium on Cryptography and Information Security (SCIS2006), Hiroshima, Japan, 2006. 1.

 

<2005>

28. Youngran Park, Hyunho Kang, Sanguk Shin, Kiryong Kwon, “An Image Steganograpy Using Pixel Characteristics,” CIS 2005, Part II, Lecture Notes in Artificial Intelligence 3802, pp. 581-588, Springer-Verlag, 2005.

27. Youngran Park, Hyunho Kang, Sanguk Shin, Kiryong Kwon, “A Steganographic Scheme in Digital Images Using Information of Neighboring Pixels,” ICNC 2005, Lecture Notes in Computer Science 3612, pp. 962-967, Springer-Verlag, 2005.

26. Seungwu Han, Hyunho Kang, Sanguk Shin, “A Novel Blind Watermarking Scheme Using Block Indexing,” Journal of Korea Contents Association, Vol. 5, No. 6, pp.331-342, 2005. [Korean]

25. My-Sun Go, Young-Ran Park, Hyunho Kang, Sang-Uk Shin, “Robust Blind Wavelet Watermarking against JPEG,” International Symposium on Advanced Engineering (ISAE2005), Busan, Korea, December 2005.

24. Hyunho Kang, Brian Kurkoski, Kazuhiko Yamaguchi, Kingo Kobayashi, “Tracing Illegal Users of Video Content Using Watermarking and Fingerprinting,” The 28th Symposium on Information Theory and Its Applications (SITA2005), Onna, Okinawa, Japan, 2005. 11.

23. Youngran Park, Hyunho Kang, Sanguk Shin, Kiryong Kwon, “A Steganography with Integrity Verification of Secret Message”, Conference on Korea Multimedia Society, pp. 94-97, 2005. 5. [Korean]

22. Meesun Go, Hyunho Kang, Sanguk Shin, “A Blind Wavelet Watermarking Based on a Perceptual Model,” Korea Institute of Information Security & Cryptology, 90-97, 2005. 2. [Korean]

21. Youngran Park, Hyunho Kang, Sanguk Shin, Kiryong Kwon, “Image Steganography Using Information of Neighboring Pixels,” Image Processing and Image Understanding Workshop, 2005. 1. [Korean]

 

<2004>

20. Eunkyong Joo, Hyunho Kang, Jihwan Park, “Block Fragile Watermarking based on LUT,” Journal of Korea Multimedia Society, Vol. 7, No.9, pp.1294-1303, 2004. 9. [Korean]

19. Hyunho Kang, Jihwan Park, Hyejoo Lee, Jinwoo Hong, “Blind Video Fingerprinting Using Temporal Wavelet Transform,” Journal of Korea Multimedia Society, Vol. 7, No.9, pp.1263-1272, 2004. 9. [Korean]

18. Seung-Wu Han, Byong-Mahn Seo, Hyunho Kang, Sang-Uk Shin, “A Novel Watermarking Technique Using Indexed Watermark Value,” Proceedings of the Pacific Rim Workshop on Digital Steganography (STEG2004), pp.166-171, Fukuoka, Japan, November 2004.

17. Hyunho Kang, Sanguk Shin, Kiryong Kwon, “Video Fingerprinting Implementation Using 3D Wavelet Transform,” Proceedings of the Pacific Rim Workshop on Digital Steganography (STEG2004), pp.159-165, Fukuoka, Japan, November 2004.

16. Hyunho Kang, Jihwan Park, Hyejoo Lee, Jinwoo Hong, “Video Fingerprinting Implementation using Temporal Wavelet Transform,” The 2004 Symposium on Cryptography and Information Security (SCIS 2004), Sendai, Japan, Vol. 2, pp.1221-1226, 2004. 1.

15. Seungwu Han, Hyunho Kang, Jihwan Park, “Watermarking Using Indexed Watermark Value,” Conference on Information Security and Cryptology - Summer, 2004. 6. [Korean]

 

<2003>

14. Hyunho Kang, Ji-Hwan Park, “A Semi-fragile Watermarking using JND,” Proceedings of the Pacific Rim Workshop on Digital Steganography (STEG2003), Kitakyushu, Japan, July 2003.

13. Seungwu Han, Hyunho Kang, Jinheung Lee, Jihwan Park, “Blind Watermarking Algorithm Applicable to Fingerprinting Codes,” Proceedings of the 11th KISS Youngnam Branch Conference, Vol.11, No.1, 2003. 12. [Korean]

12. Hyunho Kang, Jihwan Park, Hyejoo Lee, Jinwoo Hong, “Video Fingerprinting based on the Temporal Wavelet Transform,” Conference on Korea Multimedia Society, Vol.6, No.2, pp.36-39, 2003. 11. [Korean]

11. Hyunho Kang, Jihwan Park, “Semi-fragile Watermarking techniques to use JND,” The Workshop on Information Security for Multimedia Contents (ISMC2003), 2003. 5. [Korean]

 

<2002>

10. Hyunho Kang, Ssanghak Ihm, Jihwan Park, “A Study on Digital Watermarking Evaluation Using Checkmark,” Conference on Korea Multimedia Society, Vol.5, No.2, 2002. 11. [Korean]

9. Hyunho Kang, Youngran Park, Jihwan Park, “Blind Watermarking based on the Spatial Domain,” Conference on Korea Multimedia Society, Vol.5, No.1, 2002. 5. [Korean]

8. Yunkyung Son, Hyunho Kang, Jihwan Park, “A Study on DCT-based Digital Watermarking Robust Against Stirmark Attack,” Conference on Korea Multimedia Society, Vol.5, No.1, 2002. 5. [Korean]

7. Hyunho Kang, Jihwan Park, Hyejoo Lee, Jinwoo Hong, “Video Watermarking based on the Temporal Wavelet Transform,” Korea Institute of Information Security & Cryptology, 2002. 2. [Korean]

 

<2001>

6. Yunhee Oh, Hyunho Kang, Jihwan Park, “Multiple Watermarking Using Gram-Schmidt Orthogonal Processing,” Journal of Korea Information Processing Society, Vol.8-C, No.6, 703-710, 2001.12. [Korean]

5. Hyunho Kang, Jihwan Park, “Image Fusion Watermarking Based on the discrete Wavelet Transform,” Proc. of International symposium on Advanced Engineering, pp.377-386, Busan, Korea, October 2001.

4. Hyunho Kang, Jihwan Park, Young Huh, “Image-Fusion Watermarking based on the Discrete Wavelet Transform,” Korea Institute of Information Security & Cryptology, pp.67-80, 2001. 2. [Korean]

3.Hyunho Kang, Jihwan Park, Ryuji Kohno, “Digital Watermarking based on the Discrete Wavelet Transform,” The 2001 Symposium on Cryptography and Information Security (SCIS2001), Oiso, Japan, Vol. 1, pp.109-114, 2001. 1.

 

<2000>

2. Hyunho Kang, Jihwan Park, Young Huh, “A Decision Method of Context Integer on JPEG-LS Using 3D Coordinate Mapping,” Conference on Korea Multimedia Society, Vol. 3, No.2, 2000. 11. [Korean]

1. Hyunho Kang, Jihwan Park, Ryuji Kohno, “A Decision Method of Context Integer on JPEG-LS Using 3D Coordinate Mapping,” The 23rd Symposium on Information Theory and Its Applications (SITA2000), Aso, Kumamoto, Japan, pp.407-410, 2000.10.

 

 

アクセスカウンター
GoodsFun-グッズファンモテコン婚約指輪サーチ浄水器・整水器通販

 

Go to Top