Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kyu-Bo Cho is active.

Publication


Featured researches published by Kyu-Bo Cho.


conference on lasers and electro optics | 2003

Multilevel image encryption by binary phase XOR operations

Chang-Mok Shin; Dong-Hoan Seo; Kyu-Bo Cho; Ha-Woon Lee; Soo-Joong Kim

We propose a multilevel image encryption by using binary phase exclusive-OR(XOR) operations and image dividing technique. The multilevel image can be divided to binary images that have same gray levels. We convert each binary image to binary phase image by phase encoding and encrypt these images with binary random phase images by binary phase XOR operation. We make encrypted gray image by combining each binary encrypted images. We implement the decryption process with joint transform correlator (JTC) and verify the proposed method by computer simulation.


Optical Review | 2007

Practical image hiding method using a phase wrapping rule and real-valued decoding key

Dong-Hoan Seo; Kyu-Bo Cho; Soo-Joong Kim

We propose a practical image hiding method using phase wrapping and real-valued decoding key. A zero-padded original image, multiplied with a random-phase pattern, is Fourier transformed and its real-valued data denotes an encoded image in the embedding process. The encoded image is divided into two phase-encoded random patterns which are generated based on the phase wrapping rule. The imaginary part and the real part of these phase-encoded random patterns are used as a hidden image and a decoding key, respectively. A host image is then made from the linear superposition of the weighted hidden image and a cover image. The original image is simply obtained by the inverse-Fourier transform of the product of the host image and the decoding key in the reconstruction process. The embedding process and the reconstruction process are performed digitally and optically, respectively. Computer simulation and an optical experiment are shown in support of the proposed method.


Korean Journal of Optics and Photonics | 2006

Digital watermarking technique using Computer-Generated Hologram and optoelectrical extraction algorithm

Kyu-Bo Cho; Chang-Mok Shin; Soo-Joong Kim

We propose a digital watermarking technique using a computer generated hologram. The proposed method uses two random patterns separated from the computer generated hologram (CGH). One of those is embedded into the original image as hidden watermark information and then the reconstructed image can be obtained by an optical decoding algorithm with the other one as a decoding key. We analyze an occlusion of the watermarked image that is the original image containing the hidden pattern. The embedding process is performed digitally and reconstruction optically Computer simulation and an optical experiment are shown in support of the proposed technique.


conference on lasers and electro optics | 2003

Optical encryption system based on circular polarization and interferometer

Kyu-Bo Cho; Chang-Mok Shin; Dong-Hoan Seo; Sang-Gug Park; Yang Hoi Doh; Soo-Joong Kim

We propose an optical encryption system using circular polarization based on interferometer architecture. The phase-modulated input image, represented as orthogonal linearly polarized states by interferometer, is encrypted into circularly polarized states whose direction of the rotation is random. In the decryption we use the inverse matrix of polarization-modulation key and can recover the original polarization states.


Korean Journal of Optics and Photonics | 2008

Image Watermark Method Using Multiple Decoding Keys

Hyung-Seok Lee; Dong-Hoan Seo; Kyu-Bo Cho

In this paper, we propose an image watermark method using multiple decoding keys. The advantages of this method are that the multiple original images are reconstructed by using multiple decoding keys in the same watermark image, and that the quality of reconstructed images is clearly enhanced based on the idea of Walsh code without any side lobe components in the decoding process. The zero-padded original images, multiplied with random-phase pattern to each other, are Fourier transformed. Encoded images are then obtained by taking the real-valued data from these Fourier transformed images. The embedding images are obtained by the product of independent Walsh codes, and these spreaded phase-encoded images which are multiplied with new random-phase images. Also we obtain the decoding keys by multiplying these random-phase images with the same Walsh code images used in the embedding images. A watermark image is then made from the linear superposition of the weighted embedding images and a cover image, which is multiplied with a new independent Walsh code. The original image is simply reconstructed by the inverse-Fourier transform of the despreaded image of the multiplication between the watermark image and the decoding key. Computer simulations demonstrate the efficiency of the proposed watermark method with multiple decoding keys and a good robustness to the external attacks such as cropping and compression.


Korean Journal of Optics and Photonics | 2006

Optical Encryption using a Random Phase Image and Shift Position in Joint Transform Correlation Plane

Chang-Mok Shin; Woo-Hyuk Lee; Kyu-Bo Cho; Soo-Joong Kim; Dong-Hoan Seo; Sung-Geun Lee

Most optical security systems use a 4-f correlator, Mach-Zehnder interferometer, or a joint transform correlator(JTC). Of them, the JTC does not require an accurate optical alignment and has a good potential for real-time processing. In this paper, we propose an image encryption system using a position shift property of the JTC in the Fourier domain and a random phase image. Our encryption system uses two keys: one key is a random phase mask and the other key is a position shift factor. By using two keys, the proposed method can increase the security level of the encryption system. An encrypted image is produced by the Fourier transform for the multiplication image, which resulted from adding position shift functions to an original image, with a random phase mask. The random phase mask and position shift value are used as keys in decryption, simultaneously. For the decryption, both the encrypted image and the key image should be correctly located on the JTC. If the incorrect position shift value or the incorrect key image is used in decryption, the original information can not be obtained. To demonstrate the efficiency of the proposed system, computer simulation is performed. By analyzing the simulation results in the case of blocking of the encrypted image and affecting of the phase noise, we confirmed that the proposed method has a good tolerance to data loss. These results show that our system is very useful for the optical certification system.


Korean Journal of Optics and Photonics | 2006

Hierarchical Image Encryption System Using Orthogonal Method

Nam-Jin Kim; Dong-Hoan Seo; Sung-Geun Lee; Chang-Mok Shin; Kyu-Bo Cho; Soo-Joong Kim

In recent years, a hierarchical security architecture has been widely studied because it can efficiently protect information by allowing an authorized user access to the level of information. However, the conventional hierarchical decryption methods require several decryption keys for the high level information. In this paper, we propose a hierarchical image encryption using random phase masks and Walsh code having orthogonal characteristics. To decrypt the hierarchical level images by only one decryption key, we combine Walsh code into the hierarchical level system. For encryption process, we first perform a Fourier transform for the multiplication results of the original image and the random phase mask, and then expand the transformed pattern to be the same size and shape of Walsh code. The expanded pattern is finally encrypted by multiplying with the Walsh code image and the binary phase mask. We generate several encryption images as the same encryption process. The reconstruction image is detected on a CCD plane by a despread process and Fourier transform for the multiplication result of encryption image and hierarchical decryption keys which are generated by Walsh code and binary random phase image. Computer simulations demonstrate that the proposed technique can decrypt hierarchical information by using only one level decryption key image and it has a good robustness to the data loss such as random cropping.


Korean Journal of Optics and Photonics | 2005

Single Path Phase-only Security System using Phase-encoded XOR Operations in Fourier Plane

Chang-Mok Shin; Kyu-Bo Cho; Soo-Joong Kim; Duck-Soo Noh

Phase-only encryption scheme using exclusive-OR rules in Fourier plane and a single path decryption system are presented. A zero-padded original image, multiplied by a random phase image, is Fourier transformed and its real-valued data is encrypted with key data by using XOR rules. A decryption is simply performed based on 2-1 setup with spatial filter by Fourier transform for multiplying phase-only encrypted data by phase-only key data, which are obtained by phase-encoding process, and spatial filtering for zero-order elimination in inverse-Fourier plane. Since the encryption process is peformed in Fourier plane, proposed encryption scheme is more tolerant to loss of key information by scratching or cutting than previous XOR encryption method in space domain. Compare with previous phase-visualization systems, due to the simple architecture without a reference wave, our system is basically robust to mechanical vibrations and fluctuations. Numerical simulations have confirmed the proposed technique as high-level encryption and simple decryption architecture.


Korean Journal of Optics and Photonics | 2005

Improvement of the efficiency from Computer-Generated Holograms by using TS algorithm and SA algorithm

Chang-Sub Cho; Chang-Mok Shin; Kyu-Bo Cho; Soo-Joong Kim; Cheol-Su Kim

In this paper, we propose a method for optimizing a computer-generated hologram(CGH) by combining the Tabu Search(TS) algorithm with the Simulated Annealing(SA) algorithm. By replacing an initial random pattern of the SA algorithm with an approximately ideal hologram pattern of the TS algorithm, we design a CGH which has high diffraction efficiency(DE). We compared the performance of the proposed algorithm with the SA algorithm using computer simulation and an optical experiment. As a result, we confirmed diffraction efficiency and uniformity to be enhanced in the proposed algorithm.


ITC-CSCC :International Technical Conference on Circuits Systems, Computers and Communications | 2004

Identification and Decryption of Fully phase-encrypted image Using Joint Transform Correlator Structure

Dong-Hoan Seo; Chang-Mok Shin; Kyu-Bo Cho; Jong-Yun Kim; Soo-Joong Kim

Collaboration


Dive into the Kyu-Bo Cho's collaboration.

Top Co-Authors

Avatar

Soo-Joong Kim

Kyungpook National University

View shared research outputs
Top Co-Authors

Avatar

Chang-Mok Shin

Kyungpook National University

View shared research outputs
Top Co-Authors

Avatar

Dong-Hoan Seo

Kyungpook National University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jeong-Woo Kim

Kyungpook National University

View shared research outputs
Top Co-Authors

Avatar

Jong-Yun Kim

Kyungpook National University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Se-Joon Park

Kyungpook National University

View shared research outputs
Top Co-Authors

Avatar

Yang Hoi Doh

Jeju National University

View shared research outputs
Researchain Logo
Decentralizing Knowledge