Digital Library


Search: "[ keyword: Authentication ]" (100)
    Integrity Authentication Algorithm of JPEG Compressed Images through Reversible Watermarking
    Hyun Wu Jo , Dong Gyu Yeo , Hae Yeoun Lee KIPS Transactions on Computer and Communication Systems, Vol. 19, No. 2, pp. 83-92, Feb. 2012
    10.3745/KIPSTB.2012.19.2.83

    Interval-based Audio Integrity Authentication Algorithm using Reversible Watermarking
    Dong Gyu Yeo , Hae Yeoun Lee KIPS Transactions on Computer and Communication Systems, Vol. 19, No. 1, pp. 9-18, Jan. 2012
    10.3745/KIPSTB.2012.19.1.9

    Block-based Image Authentication Algorithm using Differential Histogram-based Reversible Watermarking
    Dong Gyu Yeo , Hae Yeoun Lee KIPS Transactions on Computer and Communication Systems, Vol. 18, No. 6, pp. 355-364, Jun. 2011
    10.3745/KIPSTB.2011.18.6.355

    Semi-Fragile Image Watermarking for Authentication Using Wavelet Packet Transform Based on The Subband Energy
    Sang Ju Park , Tae Hyeon Kwon KIPS Transactions on Computer and Communication Systems, Vol. 12, No. 4, pp. 421-428, Apr. 2005
    10.3745/KIPSTB.2005.12.4.421

    Study On The Robustness Of Face Authentication Methods Under Illumination Changes
    Dae Young Ko , Jin Young Kim , Seung You Na KIPS Transactions on Computer and Communication Systems, Vol. 12, No. 1, pp. 9-16, Jan. 2005
    10.3745/KIPSTB.2005.12.1.9

    An Authentication Interworking Mechanism between Multiple Wireless LANs for Sharing the Network Infrastructure
    Wan Yeon Lee KIPS Transactions on Computer and Communication Systems, Vol. 11, No. 6, pp. 451-458, Jun. 2004
    10.3745/KIPSTA.2004.11.6.451

    Digital Watermark Generation Algorithm Embedding Hangul Text
    Jo Dae Je , Kim Hyeon Gi KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 5, pp. 485-490, May. 2003
    10.3745/KIPSTB.2003.10.5.485

    Robust watermarking technique in geometric distortion and authentication of digital images
    Lee Na Yeong , Kim Won , Kim Gye Yeong , Choe Hyeong Il KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 4, pp. 367-372, Apr. 2003
    10.3745/KIPSTB.2003.10.4.367

    CORBA Based Mutual Authentication Mechanism using CCCA
    Yong Ju Yi, Jong Hyeun Jang, Dong Gil Lee KIPS Transactions on Computer and Communication Systems, Vol. 8, No. 3, pp. 245-252, Mar. 2001
    10.3745/KIPSTC.2001.8.3.245

    A Study of User Behavior Recognition-Based PIN Entry Using Machine Learning Technique
    Changhun Jung, Zayabaatar Dagvatur, RhongHo Jang, DaeHun Nyang, KyungHee Lee KIPS Transactions on Computer and Communication Systems, Vol. 7, No. 5, pp. 127-136, May. 2018
    10.3745/KTCCS.2018.7.5.127
    Keywords: Smartphone, Authentication Protocol, User Behavior Recognition, Machine Learning, Pin