Search Results - "Cha, Byung Ho"
-
1
Robust MC-CDMA-Based Fingerprinting Against Time-Varying Collusion Attacks
Published in IEEE transactions on information forensics and security (01-09-2009)“…The design of robust fingerprinting systems for traitor tracing against time-varying collusion attacks in protecting continuous media, such as audio and video,…”
Get full text
Journal Article -
2
Long‐term Effects of Status Epilepticus in the Immature Brain Are Specific for Age and Model
Published in Epilepsia (Copenhagen) (01-04-2003)“…Purpose: Status epilepticus (SE) is more common in children than adults and has a high mortality and morbidity rate. SE in adult rats results in long‐term…”
Get full text
Journal Article -
3
Spontaneous recurrent seizure following status epilepticus enhances dentate gyrus neurogenesis
Published in Brain & development (Tokyo. 1979) (01-09-2004)“…It is known that evoked seizures can increase neurogenesis in the dentate gyrus in adult rats. Whether spontaneous seizures occurring after status epilepticus…”
Get full text
Journal Article -
4
The Effects on Cognitive Function and Behavioral Problems of Topiramate Compared to Carbamazepine as Monotherapy for Children with Benign Rolandic Epilepsy
Published in Epilepsia (Copenhagen) (01-09-2007)“…Methods: A multicenter, randomized, open‐label, observer‐blinded, parallel‐group clinical trial was conducted. TPM was introduced at a dose of 12.5 mg/day with…”
Get full text
Journal Article -
5
Block-based image steganalysis: Algorithm and performance evaluation
Published in 2010 IEEE International Symposium on Circuits and Systems (ISCAS) (01-05-2010)“…Traditional image steganalysis techniques are conducted with respect to the entire image. In this work, we aim to differentiate a stego image from its cover…”
Get full text
Conference Proceeding -
6
Continuous media fingerprinting against time-varying collusion attacks
Published in Information sciences (20-03-2015)“…We analyze time-varying collusion attacks over continuous media such as music and movies. Inspired by communication systems, we propose countermeasures for…”
Get full text
Journal Article -
7
Performance study on block-based image steganalysis
Published in 2011 IEEE International Symposium of Circuits and Systems (ISCAS) (01-05-2011)“…Block-based image steganalysis, which uses smaller homogenous blocks from a given test image, was previously proposed to improve the steganalysis performance…”
Get full text
Conference Proceeding -
8
Sleep disorders in childhood
Published in Korean journal of pediatrics (2007)Get full text
Journal Article -
9
Effectiveness of Muscimol‐containing Microparticles against Pilocarpine‐induced Focal Seizures
Published in Epilepsia (Copenhagen) (01-12-2002)“…Purpose: To investigate the efficacy of in situ lipid–protein–sugar particles (LPSPs) in mitigating the epileptogenic and histologic effects of…”
Get full text
Journal Article -
10
The Risk Factors and Clinical Features of Posttraumatic Seizure in Preschool-Aged Children
Published in Annals of child neurology (31-03-2019)“…Purpose This study aimed to identify the clinical characteristics and risk factors of post-traumatic seizure (PTS) in preschool-aged children. Methods This…”
Get full text
Journal Article -
11
Analysis of time-varying collusion attacks in fingerprinting systems: Capacity and throughput
Published in 2009 IEEE International Symposium on Circuits and Systems (ISCAS) (01-05-2009)“…We analyze time-varying collusion attacks for a fingerprinting system using concepts of capacity and throughput in this work. Continuous media provide a…”
Get full text
Conference Proceeding -
12
소아기 수면 장애
Published in Korean journal of pediatrics (2007)“…Sleep disorders are very common among pediatric patients. Its prevalence is between 10% and 45% in preschool- and school-aged children. However parents…”
Get full text
Journal Article -
13
Anti-collusion fingerprinting with scalar Costa scheme (SCS) and colluder weight recovery
Published in 2009 IEEE International Conference on Acoustics, Speech and Signal Processing (01-04-2009)“…An anti-collusion fingerprinting system is developed to protect media files against time-varying collusion attacks based on the scalar Costa scheme (SCS) and…”
Get full text
Conference Proceeding -
14
Design of Collusion-Free Hiding Codes using MAI-Free Principle
Published in 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07 (01-04-2007)“…A new methodology to design collusion-free hiding codes using the multi-access-interference-free (MAI-free) principle is proposed. A precoding technique was…”
Get full text
Conference Proceeding -
15
Block-based image steganalysis: Algorithm and performance evaluation
Published in Journal of visual communication and image representation (01-10-2013)“…•First, a block-based approach for steganalysis which exploits the characteristics of image blocks.•Second, performance study on block-based image steganalysis…”
Get full text
Journal Article -
16
Advanced colluder detection techniques for OSIFT-based hiding codes
Published in 2008 IEEE International Symposium on Circuits and Systems (01-01-2008)“…In this work, we examine a family of anti-collusion codes using the principle of "Orthogonal Spreading followed by the Inverse Fourier Transform (OSIFT)" as…”
Get full text
Conference Proceeding Journal Article -
17
A Tapping the usefulness of Whole Blood Interferon-γ Assay for Diagnosing Tuberculosis Infection in Children
Published in Tuberculosis and respiratory diseases (01-05-2010)Get full text
Journal Article -
18
소아 결핵 감염 진단에 있어서 결핵 특이항원 자극 Interferon-${\gamma}$ 분비능 측정의 진단적 유용성
Published in Tuberculosis and respiratory diseases (2010)“…Background: $QuantiFERON^{(R)}$-TB Gold In Tube (QFT-G IT) has been used for diagnosing latent tuberculosis infection and active tuberculosis (TB) since 2007…”
Get full text
Journal Article -
19
Design and Analysis of High-Capacity Anti-Collusion Hiding Codes
Published in Circuits, systems, and signal processing (01-04-2008)“…A new methodology for the design of high-capacity anti-collusion hiding codes in a large-scale fingerprint-based traitor tracing system is proposed in this…”
Get full text
Journal Article -
20
Block-based image steganalysis for a multi-classifier
Published in 2010 IEEE International Conference on Multimedia and Expo (01-07-2010)“…Traditional image steganalysis techniques for classification of steganograhic algorithms are conducted with respect to the entire image. In this work, we aim…”
Get full text
Conference Proceeding