Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 4 results:
RTF
EndNote XML
Filters:
Author
is
Cheonshik Kim
[Clear All Filters]
2012
Kim, Cheonshik
,
Dongkyoo Shin
,
Dongil Shin
, and
Ching-Nung Yang
.
A (2, 2) Secret Sharing Scheme Based on Hamming Code and AMBTC
In
Intelligent Information and Database Systems. ACIIDS 2012. Lecture Notes in Computer Science
. Vol. 7197. Berlin, Heidelberg: Springer, 2012.
Google Scholar
RTF
EndNote XML
2011
Kim, Cheonshik
,
Dongkyoo Shin
, and
Dongil Shin
.
Data Hiding in a Halftone Image Using Hamming Code (15, 11)
In
Intelligent Information and Database Systems. ACIIDS 2011. Lecture Notes in Computer Science
. Vol. 6592. Berlin, Heidelberg: Springer, 2011.
Google Scholar
RTF
EndNote XML
2010
Kim, Cheonshik
.
Data Hiding Based on Compressed Dithering Images
In
Advances in Intelligent Information and Database Systems. Studies in Computational Intelligence
. Vol. 283. Berlin, Heidelberg: Springer, 2010.
Google Scholar
RTF
EndNote XML
2009
Kim, Cheonshik
,
Minho Jo
,
You-Sik Hong
, and
Hyun-Sook Park
.
"
Data Hiding Based on EMD for Ordered Block Truncation Coding (ODBTC를 위한 EMD 기법에 기반한 데이터 은닉 )
."
The Institute of Electronics Engineers of Korea - Computer and Information
46, no. 6 (2009): 27-34.
Google Scholar
RTF
EndNote XML
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance