This page has only limited features, please log in for full access.

Unclaimed
Hyunho Kang
National Institute of Technology, Tokyo College, Tokyo, Japan

Basic Info

Basic Info is private.

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

The user biography is not available.
Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Conference paper
Published: 18 July 2017 in Blockchain Technology and Innovations in Business Processes
Reads 0
Downloads 0

Digital watermarking is a technique used for embedding information in digital content and protecting its copyright. The important issues to be considered are robustness, quality and capacity. Our goal is to satisfy these requirements according to the Information Hiding and its Criteria for evaluation (IHC) criteria. In this study, we evaluate our watermarking scheme along the IHC criteria Ver.3 as the primary step. Although image watermarking techniques based on machine learning already exist, their robustness against desynchronization attacks such as cropping, rotation, and scaling is still one of the most challenging issues. We propose a watermarking scheme based on machine learning which also has cropping tolerance. First, the luminance space of the image is decomposed by one level through wavelet transform. Then, a bit of the watermark and the marker for synchronization are embedded or extracted by adjusting or comparing the relation between the embedded coefficients value of the LL space and the output coefficients value of the trained machine learning model. This model can well memorize the relationship between its selected coefficients and the neighboring coefficients. The marker for synchronization is embedded in a latticed format in the LL space. Binarization processing is performed on the watermarked image to find the lattice-shaped marker and synchronize it against cropping. Our experimental results showed that there were no errors in 10HDTV-size areas after the second decompression.

ACS Style

Ryo Sakuma; Hyunho Kang; Keiichi Iwamura; Isao Echizen. Digital Watermarking Scheme Based on Machine Learning for the IHC Evaluation Criteria. Blockchain Technology and Innovations in Business Processes 2017, 81, 370 -380.

AMA Style

Ryo Sakuma, Hyunho Kang, Keiichi Iwamura, Isao Echizen. Digital Watermarking Scheme Based on Machine Learning for the IHC Evaluation Criteria. Blockchain Technology and Innovations in Business Processes. 2017; 81 ():370-380.

Chicago/Turabian Style

Ryo Sakuma; Hyunho Kang; Keiichi Iwamura; Isao Echizen. 2017. "Digital Watermarking Scheme Based on Machine Learning for the IHC Evaluation Criteria." Blockchain Technology and Innovations in Business Processes 81, no. : 370-380.

Journal article
Published: 01 January 2017 in IEICE Transactions on Information and Systems
Reads 0
Downloads 0
ACS Style

Keiichi Iwamura; Masaki Kawamura; Minoru Kuribayashi; Motoi Iwata; Hyunho Kang; Seiichi Gohshi; Akira Nishimura. Information Hiding and Its Criteria for Evaluation. IEICE Transactions on Information and Systems 2017, E100.D, 2 -12.

AMA Style

Keiichi Iwamura, Masaki Kawamura, Minoru Kuribayashi, Motoi Iwata, Hyunho Kang, Seiichi Gohshi, Akira Nishimura. Information Hiding and Its Criteria for Evaluation. IEICE Transactions on Information and Systems. 2017; E100.D (1):2-12.

Chicago/Turabian Style

Keiichi Iwamura; Masaki Kawamura; Minoru Kuribayashi; Motoi Iwata; Hyunho Kang; Seiichi Gohshi; Akira Nishimura. 2017. "Information Hiding and Its Criteria for Evaluation." IEICE Transactions on Information and Systems E100.D, no. 1: 2-12.

Conference paper
Published: 31 March 2016 in Transactions on Petri Nets and Other Models of Concurrency XV
Reads 0
Downloads 0

Various digital watermarking methods have recently been developed. Among them, the frequency component is often used in watermark embedding. The discrete wavelet transform is a general frequency conversion technique that has been adopted in some watermarking methods. We found that different wavelet filters provide different watermarking performances based on the wavelet transform. In recent years, the Information Hiding and its Criteria for evaluation (IHC) Committee of Japan has developed evaluation criteria for information hiding. In this study, we developed a new audio watermarking method that satisfies the IHC evaluation criteria.

ACS Style

Toshiki Ito; Hyunho Kang; Keiichi Iwamura; Kitahiro Kaneda; Isao Echizen. Audio Watermarking Using Different Wavelet Filters. Transactions on Petri Nets and Other Models of Concurrency XV 2016, 312 -320.

AMA Style

Toshiki Ito, Hyunho Kang, Keiichi Iwamura, Kitahiro Kaneda, Isao Echizen. Audio Watermarking Using Different Wavelet Filters. Transactions on Petri Nets and Other Models of Concurrency XV. 2016; ():312-320.

Chicago/Turabian Style

Toshiki Ito; Hyunho Kang; Keiichi Iwamura; Kitahiro Kaneda; Isao Echizen. 2016. "Audio Watermarking Using Different Wavelet Filters." Transactions on Petri Nets and Other Models of Concurrency XV , no. : 312-320.

Journal article
Published: 12 March 2015 in Entropy
Reads 0
Downloads 0

In recent years, information hiding and its evaluation criteria have been developed by the IHC (Information Hiding and its Criteria) Committee of Japan. This committee was established in 2011 with the aim of establishing standard evaluation criteria for robust watermarks. In this study, we developed an information hiding method that satisfies the IHC evaluation criteria. The proposed method uses the difference of the frequency coefficients derived from a discrete cosine transform or a discrete wavelet transform. The algorithm employs a statistical analysis to find the best positions in the frequency domains for watermark insertion. In particular, we use the BCH (Bose-Chaudhuri-Hocquenghem) (511,31,109) code to error correct the watermark bits and the BCH (63,16,11) code as the sync signal to withstand JPEG (Joint Photographic Experts Group) compression and cropping attacks. Our experimental results showed that there were no errors in 10 HDTV-size areas after the second decompression. It should be noted that after the second compression, the file size should be less than 1 25 of the original size to satisfy the IHC evaluation criteria.

ACS Style

Hyunho Kang; Keiichi Iwamura. Information Hiding Method Using Best DCT and Wavelet Coefficients and Its Watermark Competition. Entropy 2015, 17, 1218 -1235.

AMA Style

Hyunho Kang, Keiichi Iwamura. Information Hiding Method Using Best DCT and Wavelet Coefficients and Its Watermark Competition. Entropy. 2015; 17 (3):1218-1235.

Chicago/Turabian Style

Hyunho Kang; Keiichi Iwamura. 2015. "Information Hiding Method Using Best DCT and Wavelet Coefficients and Its Watermark Competition." Entropy 17, no. 3: 1218-1235.

Book chapter
Published: 01 January 2015 in Lecture Notes in Electrical Engineering
Reads 0
Downloads 0

Sensor nodes used for constructing a wireless sensor network consume a small amount of electrical power and resources, and should be used efficiently in terms of energy consumption. LEACH (low energy adaptive clustering hierarchy), a protocol that periodically changes the cluster head, averages the power consumption of all nodes. Some researchers have suggested the use of a security system for LEACH, but such systems create a possibility in which certain nodes no longer connect with other nodes in the network. In this paper, we propose a new LEACH protocol that improves on these problems using a hierarchical-structured key-sharing scheme. Our method offers greater security than other related methods.

ACS Style

Shinichi Goto; Soma Saito; Hyunho Kang; Keiichi Iwamura. New Secure LEACH Protocol Using Hierarchy-Based Preshared Key Scheme. Lecture Notes in Electrical Engineering 2015, 330, 99 -106.

AMA Style

Shinichi Goto, Soma Saito, Hyunho Kang, Keiichi Iwamura. New Secure LEACH Protocol Using Hierarchy-Based Preshared Key Scheme. Lecture Notes in Electrical Engineering. 2015; 330 ():99-106.

Chicago/Turabian Style

Shinichi Goto; Soma Saito; Hyunho Kang; Keiichi Iwamura. 2015. "New Secure LEACH Protocol Using Hierarchy-Based Preshared Key Scheme." Lecture Notes in Electrical Engineering 330, no. : 99-106.

Book chapter
Published: 01 January 2014 in Lecture Notes in Electrical Engineering
Reads 0
Downloads 0

Collusion attacks are effective against fingerprinting schemes. When a watermark is embedded as part of a fingerprinting schemes, it should be resistant to collusion by multiple users who each have a different version of the watermark. However, there is a limitation to detecting the watermark when classical spread spectrum watermarking is used. In this paper, we propose a negative correlation watermarking scheme to resolve this limitation using a modified Barni’s watermarking scheme, which is a method that can be used in many application areas. In particular, the difference between the frequency coefficients and uniformly distributed real numbers is used as the embedded watermark. This method can also be applied to our previously proposed wavelet-based video fingerprinting system.

ACS Style

Hyunho Kang; Keiichi Iwamura. Collusion-Resistant Watermarking Using Modified Barni Method. Lecture Notes in Electrical Engineering 2014, 627 -634.

AMA Style

Hyunho Kang, Keiichi Iwamura. Collusion-Resistant Watermarking Using Modified Barni Method. Lecture Notes in Electrical Engineering. 2014; ():627-634.

Chicago/Turabian Style

Hyunho Kang; Keiichi Iwamura. 2014. "Collusion-Resistant Watermarking Using Modified Barni Method." Lecture Notes in Electrical Engineering , no. : 627-634.

Book chapter
Published: 01 January 2014 in Lecture Notes in Electrical Engineering
Reads 0
Downloads 0

The extraction of a stable signal from noisy data is very useful in applications that aim to combine it with a cryptographic key. An approach based on an error correcting code was proposed by Dodis et al., which is known as a fuzzy extractor. Physical unclonable functions (PUFs) generate device-specific data streams, although PUFs are noisy functions. In this paper, we describe a method for preparing a PUF key during fuzzy extractor implementation. The experimental results showed that all possible combinations of input message length and the number of correctable errors were tested for a BCH code with codeword length N, which was the length of the PUF responses.

ACS Style

Hyunho Kang; Yohei Hori; Toshihiro Katashita; Manabu Hagiwara; Keiichi Iwamura. Performance Analysis for PUF Data Using Fuzzy Extractor. Lecture Notes in Electrical Engineering 2014, 277 -284.

AMA Style

Hyunho Kang, Yohei Hori, Toshihiro Katashita, Manabu Hagiwara, Keiichi Iwamura. Performance Analysis for PUF Data Using Fuzzy Extractor. Lecture Notes in Electrical Engineering. 2014; ():277-284.

Chicago/Turabian Style

Hyunho Kang; Yohei Hori; Toshihiro Katashita; Manabu Hagiwara; Keiichi Iwamura. 2014. "Performance Analysis for PUF Data Using Fuzzy Extractor." Lecture Notes in Electrical Engineering , no. : 277-284.