Search Results - "Cha, Byung Ho"

Refine Results
  1. 1

    Robust MC-CDMA-Based Fingerprinting Against Time-Varying Collusion Attacks by Byung-Ho Cha, Kuo, C.-C.J.

    “…The design of robust fingerprinting systems for traitor tracing against time-varying collusion attacks in protecting continuous media, such as audio and video,…”
    Get full text
    Journal Article
  2. 2

    Long‐term Effects of Status Epilepticus in the Immature Brain Are Specific for Age and Model by Cilio, Maria Roberta, Sogawa, Yoshimi, Cha, ByungHo, Liu, Xianzeng, Huang, Li‐Tung, Holmes, Gregory L.

    Published in Epilepsia (Copenhagen) (01-04-2003)
    “…Purpose: Status epilepticus (SE) is more common in children than adults and has a high mortality and morbidity rate. SE in adult rats results in long‐term…”
    Get full text
    Journal Article
  3. 3

    Spontaneous recurrent seizure following status epilepticus enhances dentate gyrus neurogenesis by Cha, Byung Ho, Akman, Cigdem, Silveira, Diosely C., Liu, Xianzeng, Holmes, Gregory L.

    Published in Brain & development (Tokyo. 1979) (01-09-2004)
    “…It is known that evoked seizures can increase neurogenesis in the dentate gyrus in adult rats. Whether spontaneous seizures occurring after status epilepticus…”
    Get full text
    Journal Article
  4. 4
  5. 5

    Block-based image steganalysis: Algorithm and performance evaluation by Seongho Cho, Byung-Ho Cha, Jingwei Wang, Kuo, C.-C J

    “…Traditional image steganalysis techniques are conducted with respect to the entire image. In this work, we aim to differentiate a stego image from its cover…”
    Get full text
    Conference Proceeding
  6. 6

    Continuous media fingerprinting against time-varying collusion attacks by Cha, Byung-Ho, Choi, Sang-Il

    Published in Information sciences (20-03-2015)
    “…We analyze time-varying collusion attacks over continuous media such as music and movies. Inspired by communication systems, we propose countermeasures for…”
    Get full text
    Journal Article
  7. 7

    Performance study on block-based image steganalysis by Seongho Cho, Byung-Ho Cha, Jingwei Wang, Kuo, C.-C Jay

    “…Block-based image steganalysis, which uses smaller homogenous blocks from a given test image, was previously proposed to improve the steganalysis performance…”
    Get full text
    Conference Proceeding
  8. 8
  9. 9

    Effectiveness of Muscimol‐containing Microparticles against Pilocarpine‐induced Focal Seizures by Kohane, Daniel S., Holmes, Gregory L., Chau, Ying, Zurakowski, David, Langer, Robert, Cha, ByungHo

    Published in Epilepsia (Copenhagen) (01-12-2002)
    “…Purpose: To investigate the efficacy of in situ lipid–protein–sugar particles (LPSPs) in mitigating the epileptogenic and histologic effects of…”
    Get full text
    Journal Article
  10. 10

    The Risk Factors and Clinical Features of Posttraumatic Seizure in Preschool-Aged Children by Shin, Taewoo, Oh, Kitaek, Cha, Byung Ho

    Published in Annals of child neurology (31-03-2019)
    “…Purpose This study aimed to identify the clinical characteristics and risk factors of post-traumatic seizure (PTS) in preschool-aged children. Methods This…”
    Get full text
    Journal Article
  11. 11

    Analysis of time-varying collusion attacks in fingerprinting systems: Capacity and throughput by Byung-Ho Cha, Kuo, C.-C.J.

    “…We analyze time-varying collusion attacks for a fingerprinting system using concepts of capacity and throughput in this work. Continuous media provide a…”
    Get full text
    Conference Proceeding
  12. 12

    소아기 수면 장애 by 차병호, Cha, Byung Ho

    Published in Korean journal of pediatrics (2007)
    “…Sleep disorders are very common among pediatric patients. Its prevalence is between 10% and 45% in preschool- and school-aged children. However parents…”
    Get full text
    Journal Article
  13. 13

    Anti-collusion fingerprinting with scalar Costa scheme (SCS) and colluder weight recovery by Byung-Ho Cha, Kuo, C.-C.J.

    “…An anti-collusion fingerprinting system is developed to protect media files against time-varying collusion attacks based on the scalar Costa scheme (SCS) and…”
    Get full text
    Conference Proceeding
  14. 14

    Design of Collusion-Free Hiding Codes using MAI-Free Principle by Byung-Ho Cha, Kuo, C.-C.J.

    “…A new methodology to design collusion-free hiding codes using the multi-access-interference-free (MAI-free) principle is proposed. A precoding technique was…”
    Get full text
    Conference Proceeding
  15. 15

    Block-based image steganalysis: Algorithm and performance evaluation by Cho, Seongho, Cha, Byung-Ho, Gawecki, Martin, Jay Kuo, C.-C.

    “…•First, a block-based approach for steganalysis which exploits the characteristics of image blocks.•Second, performance study on block-based image steganalysis…”
    Get full text
    Journal Article
  16. 16

    Advanced colluder detection techniques for OSIFT-based hiding codes by Byung-Ho Cha, Kuo, C.-C. Jay

    “…In this work, we examine a family of anti-collusion codes using the principle of "Orthogonal Spreading followed by the Inverse Fourier Transform (OSIFT)" as…”
    Get full text
    Conference Proceeding Journal Article
  17. 17
  18. 18

    소아 결핵 감염 진단에 있어서 결핵 특이항원 자극 Interferon-${\gamma}$ 분비능 측정의 진단적 유용성 by 순유진, 임백근, 김황민, 남궁미경, 차병호, 어영, 전진경, Soon, Eu-Gene, Lim, Baek-Keun, Kim, Hwang-Min, NamGoong, Mee-Kyung, Cha, Byung-Ho, Uh, Young, Chun, Jin-Kyong

    “…Background: $QuantiFERON^{(R)}$-TB Gold In Tube (QFT-G IT) has been used for diagnosing latent tuberculosis infection and active tuberculosis (TB) since 2007…”
    Get full text
    Journal Article
  19. 19

    Design and Analysis of High-Capacity Anti-Collusion Hiding Codes by Cha, Byung-Ho, Kuo, C.-C. Jay

    Published in Circuits, systems, and signal processing (01-04-2008)
    “…A new methodology for the design of high-capacity anti-collusion hiding codes in a large-scale fingerprint-based traitor tracing system is proposed in this…”
    Get full text
    Journal Article
  20. 20

    Block-based image steganalysis for a multi-classifier by Seongho Cho, Jingwei Wang, Kuo, C-C J, Byung-Ho Cha

    “…Traditional image steganalysis techniques for classification of steganograhic algorithms are conducted with respect to the entire image. In this work, we aim…”
    Get full text
    Conference Proceeding