Hatsukazu Tanaka

According to our database1, Hatsukazu Tanaka authored at least 31 papers between 1979 and 2008.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Awards

IEEE Fellow

IEEE Fellow 2001, "For contributions to the theory of source and channel coding and its applications, as well as for contributions to education in engineering.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2008
Reversible Watermark with Large Capacity Based on the Prediction Error Expansion.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

2006
How to Generate Cyclically Permutable Codes From Cyclic Codes.
IEEE Trans. Inf. Theory, 2006

Collusion-Attack Free ID-Based Non-interactive Key Sharing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Fingerprinting Protocol Based on Distributed Providers Using Oblivious Transfer.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Fingerprinting Protocol for On-Line Trade Using Information Gap between Buyer and Merchant.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

2005
Fingerprinting protocol for images based on additive homomorphic property.
IEEE Trans. Image Process., 2005

Visual Cryptographic Protocols Using the Trusted Initializer.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Reversible Watermark with Large Capacity Using the Predictive Coding.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

2003
Transitive Signature Scheme for Directed Trees.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

Video Watermarking of Which Embedded Information Depends on the Distance between Two Signal Positions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

Efficient Relative Time-Stamping Scheme Based on the Ternary Link.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

A Watermarking Scheme Applicable for Fingerprinting Protocol.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

2002
Foreword.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

Polynomial Representation of a Visual Secret Sharing Scheme and Its Application.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

All-or-Nothing Transform Based on a Linear Code.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

Message Authentication for Stream.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

2001
A New Anonymous Fingerprinting Scheme with High Enciphering Rate.
Proceedings of the Progress in Cryptology, 2001

2000
A Watermarking Scheme Based on the Characteristic of Addition among DCT Coefficients.
Proceedings of the Information Security, Third International Workshop, 2000

1997
Fast Algorithm for Finding a Small Root of a Quadratic Modular Equation.
Proceedings of the Information Security, First International Workshop, 1997

1996
A scheme for constructing directional filters and its application to two-channel coding of images.
Syst. Comput. Jpn., 1996

1994
Formulation of the modified akaike information criterion (AIC) for a one-dimensional multipulse model and its application to image coding.
Syst. Comput. Jpn., 1994

1989
An approximate encoding scheme for line-drawings using the concept of vector quantization.
Syst. Comput. Jpn., 1989

1987
Data structure of Huffman codes and its application to efficient encoding and decoding.
IEEE Trans. Inf. Theory, 1987

A Realization Scheme for the Identity-Based Cryptosystem.
Proceedings of the Advances in Cryptology, 1987

1985
A unique ranking of multilevel sequences and its application to source coding.
IEEE Trans. Inf. Theory, 1985

1984
Noiseless coding of binary finite-order Markov sources.
IEEE Trans. Inf. Theory, 1984

1983
Simplified correlation decoding by selecting possible codewords using erasure information.
IEEE Trans. Inf. Theory, 1983

1982
Efficient run-length encodings.
IEEE Trans. Inf. Theory, 1982

Recognition of Distorted Patterns Using the Viterbi Algorithm.
IEEE Trans. Pattern Anal. Mach. Intell., 1982

1980
A novel approach to soft decision decoding of threshold decodable codes (Corresp.).
IEEE Trans. Inf. Theory, 1980

1979
Efficient encoding of sources with memory (Corresp.).
IEEE Trans. Inf. Theory, 1979


  Loading...