Jeongnyeo Kim

Learn More
Face image retrieval is an important issue in the practical applications such as mug shot searching and surveillance systems. However, it is still a challenging problem because face images are fairly similar due to the same geometrical configuration of facial features. In this paper, we present a face image retrieval method which is robust to the variations(More)
While users increasingly use such large multimedia data, more people use the cloud computing technology. It is necessary to manage large data in an efficient way, and to consider transmission efficiency for multimedia data of different quality. To this end, an important thing is to ensure efficient distribution of important resources (CPU, network and(More)
Recently, smart home appliances and wearable devices have been developed through many companies. Most devices can be interacted with various sensors, have communication function to connect the Internet by themselves. Those devices will provide a wide range of services to users through a mutual exchange of information. However, due to the nature of the IoT(More)
Repackaging is the one of the most common techniques used by Android malwares. Recently, as one approach to prevent the repackaged malwares, it is considered to use the trust agency that guarantees the app developer. However, these approaches have no or limited secure channel to deploy the guaranteed apps. No secure channel poses another security issue of(More)
In various computing environments, hardware security modules are needed for protecting cryptographic keys and security services from threats of information leakage. For that protection, the modules normally have the methods of password-based access control and message encryption. Nowadays, a password itself can be easily exposed by a variety of password(More)
The number of smartphone users has increased rapidly. The interests of many people have grown how to prevent the leakage of security data of their enterprises. There are the technologies for using smartphone devices safely by separating the personal area and the business area. The technologies to assure security when using smartphone devices with(More)
Recently emerging mobile devices have powerful capabilities and access personal and private data ever than before. Whenever we want to use various services, we would encounter unexpected security problems unless we carefully approve and manage app's permissions. To make secure execution environment for users or apps, we propose strict and light-weight(More)