Follow
Hyunho Kang
Hyunho Kang
National Institute of Technology, Tokyo College
Verified email at tokyo-ct.ac.jp
Title
Cited by
Cited by
Year
Cryptographie key generation from PUF data using efficient fuzzy extractors
H Kang, Y Hori, T Katashita, M Hagiwara, K Iwamura
16th International conference on advanced communication technology, 23-26, 2014
1002014
Evaluation of physical unclonable functions for 28-nm process field-programmable gate arrays
Y Hori, H Kang, T Katashita, A Satoh, S Kawamura, K Kobara
Journal of Information Processing 22 (2), 344-356, 2014
562014
Pseudo-LFSR PUF: A compact, efficient and reliable physical unclonable function
Y Hori, H Kang, T Katashita, A Satoh
2011 International Conference on Reconfigurable Computing and FPGAs, 223-228, 2011
472011
An image steganography using pixel characteristics
YR Park, HH Kang, SU Shin, KR Kwon
Computational Intelligence and Security: International Conference, CIS 2005 …, 2005
472005
Full-index-embedding patchwork algorithm for audio watermarking
H Kang, K Yamaguchi, B Kurkoski, K Yamaguchi, K Kobayashi
IEICE transactions on information and systems 91 (11), 2731-2734, 2008
462008
A steganographic scheme in digital images using information of neighboring pixels
YR Park, HH Kang, SU Shin, KR Kwon
Advances in Natural Computation: First International Conference, ICNC 2005 …, 2005
342005
Performance evaluation of the first commercial PUF-embedded RFID
H Kang, Y Hori, A Satoh
The 1st IEEE Global Conference on Consumer Electronics 2012, 5-8, 2012
252012
Integrity verification of secret information in image steganography
Y Park, H Kang, K Yamaguchi, K Kobayashi
Symposium on Information Theory and its Applications, Hakodate, Hokkaido …, 2006
222006
Performance analysis for puf data using fuzzy extractor
H Kang, Y Hori, T Katashita, M Hagiwara, K Iwamura
Ubiquitous Information Technologies and Applications: CUTE 2013, 277-284, 2014
212014
The Implementation of Fuzzy Extractor is Not Hard to Do: An Approach Using PUF Data
H Kang, Y Hori, T Katashita, M Hagiwara
The 30th Symposium on Cryptography and Information Security (SCIS2013), 2013
192013
Watermarking for tamper detection and recovery
Y Park, H Kang, K Yamaguchi, K Kobayashi
IEICE Electronics Express 5 (17), 689-696, 2008
192008
A semi-fragile watermarking using JND
H Kang, J Park
Proceedings of STEG, 127-131, 2003
192003
Searchable encryption of image based on secret sharing scheme
AAAM Kamal, K Iwamura, H Kang
2017 Asia-Pacific Signal and Information Processing Association Annual …, 2017
142017
Data augmentation for deep learning using generative adversarial networks
D Yorioka, H Kang, K Iwamura
2020 IEEE 9th Global Conference on Consumer Electronics (GCCE), 516-518, 2020
132020
Information hiding method using best DCT and wavelet coefficients and its watermark competition
H Kang, K Iwamura
Entropy 17 (3), 1218-1235, 2015
112015
Asymmetric Secret Sharing Scheme Suitable for Cloud Systems
S Takahashi, H Kang, K Iwamura
The 11th Annual IEEE Consumer Communications and Networking Conference (CCNC …, 2014
92014
Video fingerprinting system using wavelet and error correcting code
H Kang, B Kurkoski, Y Park, H Lee, S Shin, K Yamaguchi, K Kobayashi
Information Security Applications: 6th International Workshop, WISA 2005 …, 2006
92006
Direct challenge ring oscillator PUF (DC-ROPUF) with novel response selection
M Ikeda, H Kang, K Iwamura
2017 IEEE 6th Global Conference on Consumer Electronics (GCCE), 1-2, 2017
82017
Watermarking based on the difference of discrete cosine transform coefficients and an error-correcting code
H Kang, K Iwamura
Proceedings of the 1st international workshop on Information hiding and its …, 2014
82014
Information hiding and its criteria for evaluation
K Iwamura, M Kawamura, M Kuribayashi, M Iwata, H Kang, S Gohshi, ...
IEICE TRANSACTIONS on Information and Systems 100 (1), 2-12, 2017
72017
The system can't perform the operation now. Try again later.
Articles 1–20