Sang Uk Shin

ORCID: 0000-0002-7048-582X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Advanced Steganography and Watermarking Techniques
  • Chaos-based Image/Signal Encryption
  • Privacy-Preserving Technologies in Data
  • Digital Rights Management and Security
  • Cloud Data Security Solutions
  • Blockchain Technology Applications and Security
  • Innovation in Digital Healthcare Systems
  • Digital and Cyber Forensics
  • Access Control and Trust
  • Digital Media Forensic Detection
  • Cryptographic Implementations and Security
  • Video Coding and Compression Technologies
  • Coding theory and cryptography
  • Data Quality and Management
  • Data Mining Algorithms and Applications
  • Artificial Intelligence in Law
  • Advanced Malware Detection Techniques
  • Wireless Body Area Networks
  • Privacy, Security, and Data Protection
  • Sesame and Sesamin Research
  • IoT-based Smart Home Systems
  • Technology and Data Analysis
  • Imbalanced Data Classification Techniques
  • User Authentication and Security Systems

Pukyong National University
2014-2025

Convergence
2021

Electronics and Telecommunications Research Institute
2008-2018

Korea Advanced Institute of Science and Technology
2018

Internet of Things (IoT)-based devices, especially those used for home automation, consist their own sensors and generate many logs during a process. Enterprises producing IoT devices convert these log data into more useful through secondary processing; thus, they require from the device users. Recently, platform sharing has been developed because demand increases. Several marketplaces are based on peer-to-peer (P2P) networks, in this type marketplace, it is difficult an enterprise to trust...

10.3390/s18103577 article EN cc-by Sensors 2018-10-22

Currently, “connected cars” are being actively designed over smart cars and autonomous cars, to establish a two-way communication network between the vehicle all infrastructure. Additionally, because black boxes becoming more common, specific processes for secure efficient data sharing transaction via networks must be developed. In this paper, we propose Blockchain-based marketplace platform model, along with scheme, using data-owner-based attribute-based encryption (DO-ABE). The proposed...

10.3390/s20113141 article EN cc-by Sensors 2020-06-02

At present, there is a considerable increase in the amount of data stored storage services, along with dramatic evolution networking techniques. In services huge data, servers may want to reduce volume and clients monitor integrity their low cost, since cost functions related proportion size data. To achieve these goals, secure deduplication auditing delegation techniques have been studied, which can by eliminating duplicated copies permit efficiently verify files delegating costly...

10.1109/access.2018.2836328 article EN cc-by-nc-nd IEEE Access 2018-01-01

Recently cloud computing paradigm has increasingly become a new model in which shared pool of configurable resources is provided as services over the Internet. Specially, this encourages an efficient for data sharing among users since owners are able to outsource their public storage can provide access service. Considering useful cloud, however, it brings security challenges that make apprehensive about confidentiality sensitive on storage. In paper, we introduce notion certificate-based...

10.1109/imis.2013.35 article EN 2013-07-01

This paper describes the efficient selective encryption scheme for H.264/SVC. The proposed encrypts with three domains in hierarchical layers using different keys: intra prediction modes, motion vector difference values and sign bits of texture data. features are as follow. offers 1) computational efficiency by encrypting selectively according to each layer type, 2) time through light-weight encryption, 3) security use mutually keys, 4) format compliance utilizing H.264/SVC structure method.

10.1109/ncm.2008.259 article EN 2008-09-01

Sharing of medical records among institutions can present certain risks to patient'sprivacy.An exposure personal causes damage the finance, etc. Sometimes, it could put patient's life in danger.To achieve secure data sharing between institutions, many studies use cloud storage store records.However, suppose that service providers were trustworthy.These systems required a key establishment with and all access logs are governed by providers.Patients should ask check these logs.However, be...

10.14257/ijca.2017.10.11.12 article EN International Journal of Control and Automation 2017-11-30

This paper proposes a new selective encryption scheme and key management for layered access control of H.264/SVC. encrypts three domains in hierarchical layers using different keys: intra prediction modes, motion vector difference values sign bits texture data. The proposed offers low computational complexity, bit-overhead, format compliance by utilizing the H.264/SVC structure. It provides high efficiency encrypting selectively, according to each layer type enhancement-layer. also...

10.1587/transinf.e92.d.851 article EN IEICE Transactions on Information and Systems 2009-01-01

These days, data is regarded as a valuable asset in the era of economy, which demands trading platform for buying and selling data. However, online poses challenges terms security fairness because seller buyer may not fully trust each other. Therefore, this paper, blockchain-based secure fair system proposed by taking advantage smart contract matchmaking encryption. The enables bilateral authorization, where between accomplished only if their policies, required other, are satisfied...

10.32604/cmc.2023.039462 article EN Computers, materials & continua/Computers, materials & continua (Print) 2023-01-01

Since deduplication inevitably implies data sharing, control over access permissions in an encrypted storage is more important than a traditional storage. Therefore, terms of flexibility, should be combined with techniques. In this paper, we propose authorized scheme using CP-ABE to solve problem. The proposed provides client-side while providing confidentiality through encryption prevent exposure users’ sensitive on untrusted cloud servers. Also, unlike existing convergent schemes, it by...

10.1155/2019/7840917 article EN Wireless Communications and Mobile Computing 2019-05-15

As computing technology becomes more pervasive and mobile services are deployed, ubiquitous applications will need flexible access control mechanisms suitable decisions. Despite the recent advances in approaches applicable to applications, there remain issues that impede development of effective for applications. Amongst them lack context-based models control, reliance on identity or capability-based schemes. In this paper, we propose intelligent system using a neural network algorithm which...

10.1109/icis.2007.120 article EN 2007-01-01

The continuous development of the mobile computing environment has led to emergence fintech enable convenient financial transactions in this environment. Previously proposed identity services mostly adopted centralized servers that are prone single-point-of-failure problems and performance bottlenecks. Blockchain-based self-sovereign (SSI), which emerged address problem, is a technology solves allows decentralized identification. However, verifiable credential (VC), unit SSI data...

10.1587/transinf.2021ngp0006 article EN IEICE Transactions on Information and Systems 2021-10-31

Video surveillance users are expecting the efficient service that provide dynamic re-sizing video stream to each user device, while existing techniques generate a fixed quality and sized stream. To solve problem, we propose secure mechanism of system using H.264/SVC domain. It help who can monitor IP-cameras freely securely within devices belonging single owner. Also it adaptively provides streaming data which have different display sizes computing capabilities.

10.1109/icimu.2011.6122767 article EN 2011-11-01

In this paper, we describe a new forensic image format which can handle high capacity computer disk storages like IDE, SAT A, USB, or etc. And also, it supports metadata that be defined and extended by users. Especially, has flag field in users set the encryption digital signature algorithms.

10.1109/isa.2008.109 article EN 2008-04-01

This research is concerned with the watermarking technique which embeds image data invisibly into a colored based on wavelet transform (FT) and discrete cosine (DCT) so that watermark be not impaired in compression, filtering, cropping, rescaling, re-sampling, other digital manipulations. The suggested method comprises steps of transforming target using WT, an DCT, integrating transformed DCT-transformed to embed fingerprint intellectual property, generating watermarked inverse transform. In...

10.1109/itcc.2000.844274 article EN 2002-11-07
Coming Soon ...