The SCEAS System
Navigation Menu

Search the dblp DataBase


Young-Ho Suh: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Chung-Seong Hong, Kang-Woo Lee, Young-Ho Suh, Hyoung-Sun Kim, Hyun Kim, Hyun-Chan Lee
    Developing Context-Aware System using the Conceptual Context Model. [Citation Graph (0, 0)][DBLP]
    CIT, 2006, pp:238- [Conf]
  2. Young-Ho Suh, Won Gyum Kim, Jong-Weon Kim, Chi-Jung Hwang
    Image Fingerprinting with Multi-Bits Watermark. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:591-594 [Conf]
  3. Jeong-Joon Yoo, Young-Ho Suh, Dong-Ik Lee, Seung-Woog Jung, Choul-Soo Jang, Joong-Bae Kim
    Casting Mobile Agents to Workflow Systems: On Performance and Scalability Issues. [Citation Graph (0, 0)][DBLP]
    DEXA, 2001, pp:254-263 [Conf]
  4. Chung-Seong Hong, Joonmyun Cho, Kang-Woo Lee, Young-Ho Suh, Hyun Kim, Hyun-Chan Lee
    Developing a Context-Aware System for Providing Intelligent Robot Services. [Citation Graph (0, 0)][DBLP]
    EuroSSC, 2006, pp:174-189 [Conf]
  5. Jae Yeol Lee, Gue Won Rhee, Hyun Kim, Kang-Woo Lee, Young-Ho Suh, Kwangsoo Kim
    Convergence of Context-Awareness and Augmented Reality for Ubiquitous Services and Immersive Interactions. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:466-474 [Conf]
  6. Won-gyum Kim, Youngho Suh
    Short n-secure fingerprinting code for image. [Citation Graph (0, 0)][DBLP]
    ICIP, 2004, pp:2167-2170 [Conf]
  7. Hyung Shin Kim, Yunju Baek, Heung-Kyu Lee, Young-Ho Suh
    Robust Image Watermark Using Radon Transform and Bispectrum Invariants. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:145-159 [Conf]
  8. Hae-Yeoun Lee, In Koo Kang, Heung-Kyu Lee, Young-Ho Suh
    Evaluation of Feature Extraction Techniques for Robust Watermarking. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:418-431 [Conf]
  9. In Koo Kang, Dong-Hyuck Im, Young-Ho Suh, Heung-Kyu Lee
    Real-Time Watermark Embedding for High Resolution Video Watermarking. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:227-238 [Conf]
  10. Young-Ho Suh, Han Namgoong, Jeong-Joon Yoo, Dong-Ik Lee
    Design of a Mobile Agent-Based Workflow Management System. [Citation Graph (0, 0)][DBLP]
    MATA, 2001, pp:93-102 [Conf]
  11. Jiang Du, Choong-Hoon Lee, Heung-Kyu Lee, Young-Ho Suh
    BSS: A New Approach for Watermark Attack. [Citation Graph (0, 0)][DBLP]
    ISMSE, 2002, pp:182-187 [Conf]
  12. Sang-Kwang Lee, Young-Ho Suh, Yo-Sung Ho
    Lossless Data Hiding Based on Histogram Modification of Difference Images. [Citation Graph (0, 0)][DBLP]
    PCM (3), 2004, pp:340-347 [Conf]
  13. Jeong-Joon Yoo, Doheon Lee, Young-Ho Suh, Dong-Ik Lee
    Scalable Workflow System Model Based on Mobile Agents. [Citation Graph (0, 0)][DBLP]
    PRIMA, 2001, pp:222-236 [Conf]
  14. Hae-Yeoun Lee, Jong-Tae Kim, Heung-Kyu Lee, Young-Ho Suh
    Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:122-134 [Conf]
  15. James Won-Ki Hong, Young-Mi Shin, Myung-Sup Kim, Jae-Young Kim, Young-Ho Suh
    Design and implementation of a distributed multimedia collaborative environment. [Citation Graph (0, 0)][DBLP]
    Cluster Computing, 1999, v:2, n:1, pp:45-59 [Journal]
  16. Choong-Hoon Lee, Heung-Kyu Lee, Young-Ho Suh
    Image Watermarking Resistant To Combined Geometric And Removal Attacks. [Citation Graph (0, 0)][DBLP]
    Int. J. Image Graphics, 2005, v:5, n:1, pp:37-66 [Journal]
  17. Sang-Kwang Lee, Young-Ho Suh, Yo-Sung Ho
    Public Key Watermarking for Reversible Image Authentication. [Citation Graph (0, 0)][DBLP]
    ICIP, 2006, pp:1409-1412 [Conf]
  18. Won-gyum Kim, Yong-Seok Seo, Young-Ho Suh
    Hybrid watermarking for improving detector performance. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 2006, pp:161-164 [Conf]
  19. In Koo Kang, Dong-Hyuck Im, Heung-Kyu Lee, Young-Ho Suh
    Implementation of real-time watermarking scheme for high-quality video. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:124-129 [Conf]

  20. Virtual enterprises using the collaboration agency infrastructure. [Citation Graph (, )][DBLP]

  21. Lossless Data Hiding for Medical Images with Patient Information. [Citation Graph (, )][DBLP]

  22. Robust watermark detection against D-A/A-D conversion for digital cinema using local auto-correlation function. [Citation Graph (, )][DBLP]

  23. Improved watermark detection robust to camcorder capture based on quadrangle estimation. [Citation Graph (, )][DBLP]

  24. Reversiblee Image Authentication Based on Watermarking. [Citation Graph (, )][DBLP]

  25. Robust lossless data hiding based on block gravity center for selective authentication. [Citation Graph (, )][DBLP]

  26. Video fingerprinting based on orientation of luminance centroid. [Citation Graph (, )][DBLP]

  27. Reversible Data Hiding Using the Histogram Modification of Block Image. [Citation Graph (, )][DBLP]

  28. A Practical Real-Time Video Watermarking Scheme Robust against Downscaling Attack. [Citation Graph (, )][DBLP]

  29. Histogram-based reversible data hiding technique using subsampling. [Citation Graph (, )][DBLP]

  30. Integration framework for interoperability of distributed and heterogeneous robot middlewares. [Citation Graph (, )][DBLP]

  31. Client/Server Framework for Providing Context-Aware Services to Network Based Robots. [Citation Graph (, )][DBLP]

  32. Connection Framework of RT-Middleware and CAMUS for Maintaining Ubiquity between Two Ubiquitous Robot Spaces. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002