Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hyoung-Joong Kim is active.

Publication


Featured researches published by Hyoung-Joong Kim.


Archive | 2017

Digital-Forensics and Watermarking

Yun Q. Shi; Hyoung-Joong Kim; Fernando Pérez-González

Statistical feature-based pattern recognition approach has been proved to be useful in digital image forgery detection. In this paper, we first present this approach adopted in Phase 1 of the first IEEE IFS-TC Image Forensics Challenge, in which the task is to classify the tampered images from the original ones, together with the experimental results. Several different kinds of statistical features and their combinations have been tested. Finally, we have chosen to use co-occurrence matrices calculated from the rich model of noise residual images. Furthermore we have selected a subset of the rich model to further enhance the testing accuracy by about 2 % so as to reach a high detection accuracy of 93.7 %. In Phase 2 of the competition, the task is to localize the tampered regions by identifying the tampered pixels. For this purpose, we have introduced the Hamming distance of Local Binary Patterns as similarity measure to tackle the tampering without post-processing on copy-moved regions. The PatchMatch algorithm has been adopted as an efficient search algorithm for block-matching. We have also applied a simple usage of the scale-invariant feature transform (SIFT) when other kinds of processing such as rotation and scaling have been performed on the copy-moved region. The achieved f-score in identifying tampered pixels is 0.267. In summary, some success has been achieved apparently. However, much more efforts are called for to move image tampering detection ahead.


Archive | 2013

Digital Forensics and Watermaking

Yun Q. Shi; Hyoung-Joong Kim; Fernando Pérez-González

In this paper, we propose a new channel selection criterion for spatial domain steganography. Via choosing those pixels in edge regions that may introduce minimal detectable distortion for modification, the proposed channel selection criterion can improve the security performance of the widespread block codes based matrix embedding schemes. Various experimental results tested on 5,000 grayscale images demonstrate the efficiency of our new channel selection criterion.Steganography and steganalysis.- Watermarking and copyright protection.- Forensics and anti-forensics.- Reversible data hiding fingerprinting and authentication.- Visual cryptography.


international workshop on digital watermarking | 2010

Ternary data hiding technique for JPEG steganography

Vasiliy Sachnev; Hyoung-Joong Kim

In this paper we present JPEG steganography method based on hiding data to the stream of ternary coefficients. In the proposed method each nonzero DCT coefficient is converted to the corresponding ternary coefficient. The block of 3m - 1 ternary coefficients is used for hiding m ternary messages by modifying one or two coefficients. Due to higher information density of the ternary coefficients, the proposed method has many solutions for hiding necessary data. Such a big choice enables to choose coefficients with lowest distortion impact. As a result, the proposed methods have better data hiding performance compared to the existing steganographic methods based on hiding data to stream of binary coefficients like matrix encoding (F5) and modified matrix encoding (MME). The proposed methods were tested with steganalysis method proposed by T. Pevny and J. Fridrich. The experimental results show that the proposed method has less detectability compared to MME (modified matrix encoding).


Fifth International Conference on Graphic and Image Processing (ICGIP 2013) | 2014

Reversible watermarking using edge based difference modification

Xiaochao Qu; Suah Kim; Hyoung-Joong Kim

Reversible watermarking can embed data into the cover image and extract data from stego image, where the original cover image can be recovered perfectly after the extraction of data. Difference expansion (DE) and prediction error expansion (PEE) are two popular reversible watermarking methods. DE has the advantage of small distortion while PEE has the advantage of large embedding capacity and smaller prediction error compared with pixel difference. In this paper, we proposed a novel method that combines the advantages of DE and PEE, where the difference calculated between two pixels is combined with the edge information near this pixel pair. The proposed difference calculation can produce smaller pixel difference compared with the original simple pixel difference calculation. Overlapping embedding is then used to increase the embedding capacity. Our proposed method gives excellent results which is shown by several experiments.


international workshop on digital watermarking | 2012

Erratum to: The International Workshop on Digital Forensics and Watermarking 2012

Yun Q. Shi; Hyoung-Joong Kim; Fernando Pérez-González


international conference on digital forensics | 2011

Proceedings of the 10th international conference on Digital-Forensics and Watermarking

Yun Q. Shi; Hyoung-Joong Kim; Fernando Pérez-González


Archive | 2011

Digital watermarking : 9th international workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010 : revised selected papers

Hyoung-Joong Kim; Yun-Qing Shi; Mauro Barni


international workshop on digital watermarking | 2009

Digital Watermarking, 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009. Proceedings

Anthony T. S. Ho; Yun-Qing Shi; Hyoung-Joong Kim; Mauro Barni


international workshop on digital watermarking | 2009

Digital Watermarking: 7th International Workshop, IWDW 2008, Busan, Korea, November 10-12, 2008. Selected Papers

Hyoung-Joong Kim; Stefan Katzenbeisser; Anthony T. S. Ho


Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2009

Digital watermarking : 8th international workshop, IWDW 2009, Guildford, UK, August 24-26, 2009 : proceedings

Anthony T. S. Ho; Yun Q. Shi; Hyoung-Joong Kim; Mauro Barni

Collaboration


Dive into the Hyoung-Joong Kim's collaboration.

Top Co-Authors

Avatar

Yun Q. Shi

New Jersey Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Stefan Katzenbeisser

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar

Yun-Qing Shi

New Jersey Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge