Isao Echizen

Orcid: 0000-0003-4908-1860

According to our database1, Isao Echizen authored at least 254 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Rethinking Invariance Regularization in Adversarial Training to Improve Robustness-Accuracy Trade-off.
CoRR, 2024

Fine-Tuning Text-To-Image Diffusion Models for Class-Wise Spurious Feature Generation.
CoRR, 2024

Stability Analysis of ChatGPT-based Sentiment Analysis in AI Quality Assurance.
CoRR, 2024

Cross-Attention Watermarking of Large Language Models.
CoRR, 2024

Surface Normal Estimation with Transformers.
CoRR, 2024

Analysis of Fine-Grained Counting Methods for Masked Face Counting: A Comparative Study.
IEEE Access, 2024

Leveraging Chat-Based Large Vision Language Models for Multimodal Out-of-Context Detection.
Proceedings of the Advanced Information Networking and Applications, 2024

Privacy-Preserving Location-Based Services: A DQN Algorithmic Perspective.
Proceedings of the Advanced Information Networking and Applications, 2024

Enhancing Robustness of LLM-Synthetic Text Detectors for Academic Writing: A Comprehensive Analysis.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
Activities of National Institute of Informatics in Japan.
Commun. ACM, July, 2023

On the predictability in reversible steganography.
Telecommun. Syst., February, 2023

Generalized Deepfakes Detection with Reconstructed-Blended Images and Multi-scale Feature Reconstruction Network.
CoRR, 2023

Efficient Key-Based Adversarial Defense for ImageNet by Using Pre-trained Model.
CoRR, 2023

Defending Against Physical Adversarial Patch Attacks on Infrared Human Detection.
CoRR, 2023

Deep Learning for Predictive Analytics in Reversible Steganography.
IEEE Access, 2023

Cyber Vaccine for Deepfake Immunity.
IEEE Access, 2023

Closer Look at the Transferability of Adversarial Examples: How They Fool Different Models Differently.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2023

Face Forgery Detection Based on Facial Region Displacement Trajectory Series.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision Workshops, 2023

Analysis of Master Vein Attacks on Finger Vein Recognition Systems.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2023

Fingerprint Digital Twin for Secure and Privacy Preserving Biometric Authentication.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023

Physics-Based Adversarial Attack on Near-Infrared Human Detector for Nighttime Surveillance Camera Systems.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

How Close Are Other Computer Vision Tasks to Deepfake Detection?
Proceedings of the IEEE International Joint Conference on Biometrics, 2023

Image-Text Out-Of-Context Detection Using Synthetic Multimodal Misinformation.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

Hindering Adversarial Attacks with Multiple Encrypted Patch Embeddings.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

Quality Assurance of A GPT-Based Sentiment Analysis System: Adversarial Review Data Generation and Detection.
Proceedings of the 30th Asia-Pacific Software Engineering Conference, 2023

A Novel Statistical Measure for Out-of-Distribution Detection in Data Quality Assurance.
Proceedings of the 30th Asia-Pacific Software Engineering Conference, 2023

Secure and Privacy Preserving Proxy Biometric Identities.
Proceedings of the Advanced Information Networking and Applications, 2023

VoteTRANS: Detecting Adversarial Text without Training by Voting on Hard Labels of Transformations.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023

2022
Master Face Attacks on Face Recognition Systems.
IEEE Trans. Biom. Behav. Identity Sci., 2022

Effects of Image Processing Operations on Adversarial Noise and Their Use in Detecting and Correcting Adversarial Images.
IEICE Trans. Inf. Syst., 2022

Group Testing with Blocks of Positives and Inhibitors.
Entropy, 2022

Steganographic secret sharing via AI-generated photorealistic images.
EURASIP J. Wirel. Commun. Netw., 2022

Secure and Privacy Preserving Proxy Biometrics Identities.
CoRR, 2022

On the Adversarial Transferability of ConvMixer Models.
CoRR, 2022

Robust Deepfake On Unrestricted Media: Generation And Detection.
CoRR, 2022

Less is More: Reversible Steganography with Uncertainty-Aware Predictive Analytics.
CoRR, 2022

Rethinking Adversarial Examples for Location Privacy Protection.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022

EASE: Entity-Aware Contrastive Learning of Sentence Embedding.
Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2022

On the Transferability of Adversarial Examples between Encrypted Models.
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2022

Round Color 2D Symbol with Display Area and Secret Data Area for Business-to-Consumer Applications.
Proceedings of the 11th IEEE Global Conference on Consumer Electronics, 2022

A Multilingual Bag-of-Entities Model for Zero-Shot Cross-Lingual Text Classification.
Proceedings of the 26th Conference on Computational Natural Language Learning, 2022


Capsule-Forensics Networks for Deepfake Detection.
Proceedings of the Handbook of Digital Face Manipulation and Detection, 2022

2021
Improved Non-Adaptive Algorithms for Threshold Group Testing With a Gap.
IEEE Trans. Inf. Theory, 2021

Generation and Detection of Media Clones.
IEICE Trans. Inf. Syst., 2021

Preventing Fake Information Generation Against Media Clone Attacks.
IEICE Trans. Inf. Syst., 2021

Multimodal-based Scene-Aware Framework for Aquatic Animal Segmentation.
CoRR, 2021

Effectiveness of Detection-based and Regression-based Approaches for Estimating Mask-Wearing Ratio.
CoRR, 2021

Deep Learning for Reversible Steganography: Principles and Insights.
CoRR, 2021

Steganographic Secret Sharing With GAN-Based Face Synthesis and Morphing for Trustworthy Authentication in IoT.
IEEE Access, 2021

OpenForensics: Large-Scale Challenging Dataset For Multi-Face Forgery Detection And Segmentation In-The-Wild.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

Effectiveness of Detection-based and Regression-based Approaches for Estimating Mask-Wearing Ratio.
Proceedings of the 16th IEEE International Conference on Automatic Face and Gesture Recognition, 2021

Fashion-Guided Adversarial Attack on Person Segmentation.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2021

Feature Extraction Based on Denoising Auto Encoder for Classification of Adversarial Examples.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2021

Reinforcement Learning Based Smart Data Agent for Location Privacy.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
Near-Optimal Detection for Binary Tardos Code by Estimating Collusion Strategy.
IEEE Trans. Inf. Forensics Secur., 2020

Viable Threat on News Reading: Generating Biased News Using Natural Language Models.
CoRR, 2020

Smart Data Agent for Preserving Location Privacy.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020

Implementation of Digital Signature on QR Symbol by Area Division Using Rhombic Sub-cells.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020

Security of Facial Forensics Models Against Adversarial Attacks.
Proceedings of the IEEE International Conference on Image Processing, 2020

Generating Master Faces for Use in Performing Wolf Attacks on Face Recognition Systems.
Proceedings of the 2020 IEEE International Joint Conference on Biometrics, 2020

Color Transfer to Anonymized Gait Images While Maintaining Anonymization.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020

A QR Symbol with ECDSA for Both Public and Secret Areas using Rhombic Sub-cells.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020

A Method for Identifying Origin of Digital Images Using a Convolutional Neural Network.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020

Detection of Adversarial Examples Based on Sensitivities to Noise Removal Filter.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020

Generating Sentiment-Preserving Fake Online Reviews Using Neural Language Models and Their Human- and Machine-Based Detection.
Proceedings of the Advanced Information Networking and Applications, 2020

2019
Efficiently Decodable Non-Adaptive Threshold Group Testing.
IEEE Trans. Inf. Theory, 2019

Efficient (nonrandom) Construction and Decoding for Non-adaptive Group Testing.
J. Inf. Process., 2019

Spatio-temporal generative adversarial network for gait anonymization.
J. Inf. Secur. Appl., 2019

Detecting and Correcting Adversarial Images Using Image Processing Operations.
CoRR, 2019

A Method for Identifying Origin of Digital Images Using a Convolution Neural Network.
CoRR, 2019

Use of a Capsule Network to Detect Fake Images and Videos.
CoRR, 2019

Speaker Anonymization Using X-vector and Neural Waveform Models.
CoRR, 2019

Efficient and error-tolerant schemes for non-adaptive complex group testing and its application in complex disease genetics.
CoRR, 2019

Improved encoding and decoding for non-adaptive threshold group testing.
CoRR, 2019

Sublinear Decoding Schemes for Non-adaptive Group Testing with Inhibitors.
Proceedings of the Theory and Applications of Models of Computation, 2019

Implementation of a Digital Signature in Backward-Compatible QR Codes Using Subcell Division and Double Encoding.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

Capsule-forensics: Using Capsule Networks to Detect Forged Images and Videos.
Proceedings of the IEEE International Conference on Acoustics, 2019

Audiovisual Speaker Conversion: Jointly and Simultaneously Transforming Facial Expression and Acoustic Characteristics.
Proceedings of the IEEE International Conference on Acoustics, 2019

Multi-task Learning for Detecting and Segmenting Manipulated Facial Images and Videos.
Proceedings of the 10th IEEE International Conference on Biometrics Theory, 2019

An RGB Gait Anonymization Model for Low-Quality Silhouettes.
Proceedings of the 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2019

2018
Editor's Message to Special Issue of Computer Security Technologies for a Super Smart Society.
J. Inf. Process., 2018

BiometricJammer: Method to Prevent Acquisition of Biometric Information by Surreptitious Photography on Fingerprints.
IEICE Trans. Inf. Syst., 2018

A framework for generalized group testing with inhibitors and its potential application in neuroscience.
CoRR, 2018

Efficient Decoding Schemes for Noisy Non-Adaptive Group Testing when Noise Depends on Number of Items in Test.
CoRR, 2018

Transforming acoustic characteristics to deceive playback spoofing countermeasures of speaker verification systems.
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018

MesoNet: a Compact Facial Video Forgery Detection Network.
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018

Lightweight Collaborative Semantic Scheme for Generating an Obfuscated Region to Ensure Location Privacy.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018

BiometricJammer: Use of Pseudo Fingerprint to Prevent Fingerprint Extraction from Camera Images without Inconveniencing Users.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018

Identifying Computer-Translated Paragraphs using Coherence Features.
Proceedings of the 32nd Pacific Asia Conference on Language, Information and Computation, 2018

Can we steal your vocal identity from the Internet?: Initial investigation of cloning Obama's voice using GAN, WaveNet and low-quality found data.
Proceedings of the Odyssey 2018: The Speaker and Language Recognition Workshop, 2018

Transformation on Computer-Generated Facial Image to Avoid Detection by Spoofing Detector.
Proceedings of the 2018 IEEE International Conference on Multimedia and Expo, 2018

High-Quality Nonparallel Voice Conversion Based on Cycle-Consistent Adversarial Network.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

New Approach for Embedding Secret Information into Fiber Materials.
Proceedings of the IEEE 7th Global Conference on Consumer Electronics, 2018

Vietnamese Paraphrase Identification Using Matching Duplicate Phrases and Similar Words.
Proceedings of the Future Data and Security Engineering - 5th International Conference, 2018

Estimation of Collusion Attack in Bias-based Binary Fingerprinting Code.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

Modular Convolutional Neural Network for Discriminating between Computer-Generated Images and Photographic Images.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Provable Identity Based User Authentication Scheme on ECC in Multi-server Environment.
Wirel. Pers. Commun., 2017

Reversible Audio Information Hiding for Tampering Detection and Localization Using Sample Scanning Method.
J. Inf. Process., 2017

Mix-ORAM: Using delegate shuffles.
CoRR, 2017

Mix-ORAM: Using Delegated Shuffles.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

An approach for gait anonymization using deep learning.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

Distinguishing computer graphics from natural images using convolution neural networks.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

Detecting Computer-Generated Text Using Fluency and Noise Features.
Proceedings of the Computational Linguistics, 2017

Digital Watermarking Scheme Based on Machine Learning for the IHC Evaluation Criteria.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017

Biometric Jammer: Preventing surreptitious fingerprint photography without inconveniencing users.
Proceedings of the 2017 IEEE International Joint Conference on Biometrics, 2017

PrivacyTag: A Community-Based Method for Protecting Privacy of Photographed Subjects in Online Social Networks.
Proceedings of the Digital Nations - Smart Cities, Innovation, and Sustainability, 2017

Modelling Traffic Analysis in Home Automation Systems.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

Identifying computer-generated text using statistical analysis.
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017

Security Oriented Malicious Activity Diagrams to Support Information Systems Security.
Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, 2017

2016
Innovations in Communications Security.
J. Electr. Comput. Eng., 2016

Voice Liveness Detection for Speaker Verification based on a Tandem Single/Double-channel Pop Noise Detector.
Proceedings of the Odyssey 2016: The Speaker and Language Recognition Workshop, 2016

Efficiently decodable defective items detected by new model of noisy group testing.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

Privacy-preserving sound to degrade automatic speaker verification performance.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

Breaking Anonymity of Social Network Accounts by Using Coordinated and Extensible Classifiers Based on Machine Learning.
Proceedings of the Social Media: The Good, the Bad, and the Ugly, 2016

Image watermarking using the differences between two wavelet filters.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

Privacy-protected video surveillance in crowded environments using robust watermarking.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

Best embedding direction for spread spectrum-based video watermarking.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

Provable User Authentication Scheme in Telecare Medicine Information System Using Elliptic Curve Cryptosystem.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
IR Hiding: Use of Specular Reflection for Short-Wavelength-Pass-Filter Detection to Prevent Re-recording of Screen Images.
Trans. Data Hiding Multim. Secur., 2015

An educational system to help students assess website features and identify high-risk websites.
Interact. Technol. Smart Educ., 2015

Robust fingerprinting codes for database using non-adaptive group testing.
Int. J. Big Data Intell., 2015

Anonymizing Personal Text Messages Posted in Online Social Networks and Detecting Disclosures of Personal Information.
IEICE Trans. Inf. Syst., 2015

Foreword.
IEICE Trans. Inf. Syst., 2015

Error-Correcting Codes as Source for Decoding Ambiguity.
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015

Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Paraphrase Detection Based on Identical Phrase and Similar Word Matching.
Proceedings of the 29th Pacific Asia Conference on Language, Information and Computation, 2015

Discriminating Between Computer-Generated Facial Images and Natural Ones Using Smoothness Property and Local Entropy.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

Audio Watermarking Using Different Wavelet Filters.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

Voice liveness detection algorithms based on pop noise caused by human breath for automatic speaker verification.
Proceedings of the INTERSPEECH 2015, 2015

Surveillance Camera System Balancing Privacy Protection and Effective Surveillance Image Use.
Proceedings of the ICE-B 2015, 2015

Tradeoff Between the Price of Distributing a Database and Its Collusion Resistance Based on Concatenated Codes.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Evaluation of Matching Accuracy of Template Matching Using a Steganography Algorithm.
Proceedings of the Third International Symposium on Computing and Networking, 2015

De-anonymising Social Network Posts by Linking with Résumé.
Proceedings of the Business Information Systems Workshops, 2015

A Rule-Based Approach for Detecting Location Leaks of Short Text Messages.
Proceedings of the Business Information Systems Workshops, 2015

Smart Privacy Visor: Bridging the Privacy Gap.
Proceedings of the Business Information Systems Workshops, 2015

Efficient Authentication, Traitor Detection, and Privacy-Preserving for the Most Common Queries in Two-Tiered Wireless Sensor Networks.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata.
Electron. Mark., 2014

Subjective assessment of HDTV with superresolution function.
EURASIP J. Image Video Process., 2014

Tag Detection for Preventing Unauthorized Face Image Processing.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Evaluation of a Zero-Watermarking-Type Steganography.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Definition of Private Information for Image Sharing in Social Networking Services.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Analysis of Facebook Friends Using Disclosure Level.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Surveillance Camera System to Achieve Privacy Protection and Crime Prevention.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Mathematical Simulation Model and Its Evaluation for Artificial Fiber Patterns.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A Study of Equipment Dependence of a Single-Dot Pattern Method for an Information-Hiding by Applying an Error-Correcting Code.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Novel Proposal and Evaluation of Information Extraction Method from Artificial Fiber Pattern Using a Camera.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A New Approach to Reversible Watermarking.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A Zero-Watermarking-Like Steganography and Potential Applications.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Robust Message Hiding for QR Code.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A System for Anonymizing Temporal Phrases of Message Posted in Online Social Networks and for Detecting Disclosure.
Proceedings of the Ninth International Conference on Availability, 2014

Effects of External Information on Anonymity and Role of Transparency with Example of Social Network De-anonymisation.
Proceedings of the Ninth International Conference on Availability, 2014

2013
A Fast and Low-Distortion Capacity Adaptive Synchronized Acoustic-to-Acoustic Steganography Scheme.
Proceedings of the Recent Advances in Information Hiding and Applications, 2013

Reclaiming Location Privacy in Mobile Telephony Networks - Effects and Consequences for Providers and Subscribers.
IEEE Syst. J., 2013

Privacy by Transparency for Data-Centric Services (NII Shonan Meeting 2013-5).
NII Shonan Meet. Rep., 2013

Privacy Visor: Method Based on Light Absorbing and Reflecting Properties for Preventing Face Image Detection.
Proceedings of the IEEE International Conference on Systems, 2013

Framework Based on Privacy Policy Hiding for Preventing Unauthorized Face Image Processing.
Proceedings of the IEEE International Conference on Systems, 2013

Settings of Access Control by Detecting Privacy Leaks in SNS.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013

Effective Fingerprinting Codes for Database.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013

Limitations of Super Resolution Image Reconstruction and How to Overcome them for a Single Image.
Proceedings of the SIGMAP and WINSYS 2013, 2013

Ineluctable background checking on social networks: Linking job seeker's résumé and posts.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

How Can We Acquire the Most Common Query Types in Two-Tiered Wireless Sensor Networks?
Proceedings of the Seventh International Conference on Next Generation Mobile Apps, 2013

A Color Extraction Method from Text for Use in Creating a Book Cover Image that Reflects Reader Impressions.
Proceedings of the Knowledge, Information and Creativity Support Systems: Recent Trends, Advances and Solutions - Selected Papers from KICSS'2013, 2013

Anonymizing Temporal Phrases in Natural Language Text to be Posted on Social Networking Services.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Reversible Audio Information Hiding Based on Integer DCT Coefficients with Adaptive Hiding Locations.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Detecting Traitors in Re-publishing Updated Datasets.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Robust Fingerprinting Codes for Database.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2013

A User Privacy Protection Technique for Executing SQL over Encrypted Data in Database Outsourcing Service.
Proceedings of the Collaborative, Trusted and Privacy-Aware e/m-Services, 2013

Coupons as Monetary Incentives in Participatory Sensing.
Proceedings of the Collaborative, Trusted and Privacy-Aware e/m-Services, 2013

Securing Access to Complex Digital Artifacts - Towards a Controlled Processing Environment for Digital Research Data.
Proceedings of the Research and Advanced Technology for Digital Libraries, 2013

Predictive Notification Service of Privacy Invasion on Posting Pictures to SNS.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

Privacy Visor: Method for Preventing Face Image Detection by Using Differences in Human and Device Sensitivity.
Proceedings of the Communications and Multimedia Security, 2013

Experiment of Geometrically Invariant and Unneeded Synchronism Watermarking Using Winding Number.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

Protecting Access Pattern Privacy in Database Outsourcing Service.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

Anonymizing Face Images by Using Similarity-Based Metric.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
PC-Based Real-Time Video Watermark Embedding System Independent of Platform for Parallel Computing.
Trans. Data Hiding Multim. Secur., 2012

IR Hiding: Method for Preventing Illegal Recording of Videos Based on Differences in Sensory Perception between Humans and Devices.
Trans. Data Hiding Multim. Secur., 2012

Preventing unauthorized copying of displayed information by utilizing differences in spectral sensitivity between humans and imaging devices.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Insuring Sensitive Processes through Process Mining.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

A Method for Resisting Averaging Attacks on Digital Watermarks and Use of This Method with Digital Watermarks.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

Use of invisible noise signals to prevent privacy invasion through face recognition from camera images.
Proceedings of the 20th ACM Multimedia Conference, MM '12, Nara, Japan, October 29, 2012

Enhancement of Method for Preventing Unauthorized Copying of Displayed Information Using Object Surface Reflection.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

Automatic Anonymous Fingerprinting of Text Posted on Social Networking Services.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

Enhancement of method for preventing illegal recording of movies to enable it to detect cameras with attached infrared-cut filter.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

An Indexed Bottom-up Approach for Publishing Anonymized Data.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

Preventing Surreptitious Filming by Saturation Irradiation of Infrared Rays.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

Automatic Anonymization of Natural Languages Texts Posted on Social Networking Services and Automatic Detection of Disclosure.
Proceedings of the Seventh International Conference on Availability, 2012

Evaluation of an Improved Visualization System for Helping Children Identify Risky Websites.
Proceedings of the Seventh International Conference on Availability, 2012

A Private Information Detector for Controlling Circulation of Private Information through Social Networks.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Isolation im Cloud-Computing und Mechanismen zum Schutz der Privatsphäre - Eignung von Mechanismen zum Schutz der Privatsphäre für die Trennung der Datenverarbeitung in Geschäftsprozessen.
Wirtschaftsinf., 2011

Nachhaltiges Computing in Clouds.
Wirtschaftsinf., 2011

Pool-based anonymous communication framework for high-performance computing.
J. Supercomput., 2011

On Privacy-compliant Disclosure of Personal Data to Third Parties using Digital Watermarking.
J. Inf. Hiding Multim. Signal Process., 2011

Aspects of privacy for electronic health records.
Int. J. Medical Informatics, 2011

Isolation in Cloud Computing and Privacy-Enhancing Technologies - Suitability of Privacy-Enhancing Technologies for Separating Data Usage in Business Processes.
Bus. Inf. Syst. Eng., 2011

Sustainable Cloud Computing.
Bus. Inf. Syst. Eng., 2011

User Centric Privacy in Mobile Communication Scenarios.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

iCabinet: stand-alone implementation of a method for preventing illegal recording of displayed content by adding invisible noise signals.
Proceedings of the 19th International Conference on Multimedia 2011, Scottsdale, AZ, USA, November 28, 2011

IR Hiding: Method to Prevent Re-recording Screen Image Built in Short Wavelength Pass Filter Detection Method Using Specular Reflection.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

An Algorithm for k-Anonymity-Based Fingerprinting.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

Data Provenance with Watermarks for Usage Control Monitors at Disaster Recovery.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

Robust FFT Based Watermarking Scheme for Copyright Protection of Digital Audio Data.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

Countermeasure of re-recording prevention against attack with short wavelength pass filter.
Proceedings of the 18th IEEE International Conference on Image Processing, 2011

A Mutual and Pseudo Inverse Matrix - Based Authentication Mechanism for Outsourcing Service.
Proceedings of the Intelligent Information and Database Systems, 2011

Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of Disasters.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Capacity Adaptive Synchronized Acoustic Steganography Scheme.
J. Inf. Hiding Multim. Signal Process., 2010

Privacy-compliant Disclosure of Personal Data to Third Parties (Schutz der Privatsphäre bei der Weitergabe persönlicher Daten an Dritte).
it Inf. Technol., 2010

Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

IR Hiding: A Method to Prevent Video Re-shooting by Exploiting Differences between Human Perceptions and Recording Device Characteristics.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

A Reversible Acoustic Steganography for Integrity Verification.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

Privacy by Data Provenance with Digital Watermarking - A Proof-of-Concept Implementation for Medical Services with Electronic Health Records.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Unified Metric for Measuring Anonymity and Privacy with Application to Online Social Network.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

A New Approach of Reversible Acoustic Steganography for Tampering Detection.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Uncertainty in Live Forensics.
Proceedings of the Advances in Digital Forensics VI, 2010

Preventing re-recording based on difference between sensory perceptions of humans and devices.
Proceedings of the International Conference on Image Processing, 2010

Measuring Accumulated Revelations of Private Information by Multiple Media.
Proceedings of the Software Services for e-World, 2010

Fine-Grained Access Control for Electronic Health Record Systems.
Proceedings of the U- and E-Service, Science and Technology, 2010

Approach to Privacy-Preserve Data in Two-Tiered Wireless Sensor Network Based on Linear System and Histogram.
Proceedings of the U- and E-Service, Science and Technology, 2010

New Approach to Quantification of Privacy on Social Network Sites.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

Bi-directional RPROB-based Location Anonymizer System for Location-Based Services.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

Binomial-Mix-Based Location Anonymizer System with Global Dummy Generation to Preserve User Location Privacy in Location-Based Services.
Proceedings of the ARES 2010, 2010

2009
Integrity verification method for video content using robust watermarking.
Int. J. Knowl. Based Intell. Eng. Syst., 2009

How to Deal with Blurriness in Live Forensics: A Case of Study.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

RPROB - A Family of Binomial-Mix-based Anonymous Communication Systems.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

On Privacy-aware Delegation of Personal Data using Digital Watermarking.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

XPROB - A Generalized Pool-Based Anonymous Communication Framework.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

A Comparison between Windows Mobile and Symbian S60 Embedded Forensics.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Preventing False Positives in Content-Based Phishing Detection.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

On Privacy in Business Processes - Observing Delegation of Personal Data by using Digital Watermarking.
Proceedings of the ICE-B 2009, 2009

On Observable Delegation of Personal Data by Watermarking.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
Evaluation of PC-Based Real-Time Watermark Embedding System for Standard-Definition Video Stream.
Proceedings of the New Directions in Intelligent Interactive Multimedia, 2008

Evaluation of Integrity Verification System for Video Content Using Digital Watermarking.
Proceedings of the New Directions in Intelligent Interactive Multimedia, 2008

Robust Video Watermarking based on Dual-plane Correlation for Immunity to Rotation, Scale, Translation, and Random Distortion.
J. Digit. Inf. Manag., 2008

Evaluation and Improvement of Digital Watermarking Algorithm Based on Cryptographic Security Models.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

Picture Watermarks Surviving General Affine Transformation and Random Distortion.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Pool-Based APROB Channel to Provide Resistance against Global Active Adversary under Probabilistic Real-Time Condition.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Electronic Voting Scheme to Maintain Anonymity in Small-scale Election by Hiding the Number of Votes.
Proceedings of the The Third International Conference on Availability, 2008

2007
Adaptive Embedding and Detection for Improved Video Watermarking.
Proceedings of the Intelligent Multimedia Data Hiding: New Directions, 2007

Secure Generation of Digital Signature on Compromised Computer.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

HVS-Based Robust Video Watermarking with Dual-plane Correlation.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Use of Gap-Filling Operation to Enhance Image Quality of Binary Image Watermarking.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
Maintaining Picture Quality and Improving Robustness of Color Watermarking by Using Human Vision Models.
IEICE Trans. Inf. Syst., 2006

PC-based real-time watermark embedding system with standard video interface.
Proceedings of the IEEE International Conference on Systems, 2006

Improved Video Verification Method Using Digital Watermarking.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Dual-Plane Watermarking for Color Pictures Immune to Rotation, Scale, Translation, and Random Bending.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

2005
Perceptually Adaptive Video Watermarking Using Motion Estimation.
Int. J. Image Graph., 2005

Use of inferential statistics to estimate error probability of video watermarks.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Real-time video watermark embedding system using software on personal computer.
Proceedings of the IEEE International Conference on Systems, 2005

Improved Video Watermark Detection Using Statistically-Adaptive Accumulation.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Correlation-based model of color picture watermarking against random geometric distortion.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

2004
Color Picture Watermarking Correlating Two Constituent Planes for Immunity to Random Geometric Distortion.
IEICE Trans. Inf. Syst., 2004

Print traceability systems framework using digital watermarks for binary images.
Proceedings of the IEEE International Conference on Systems, 2004

2003
Use of Motion Estimation to Improve Video Watermarking for MPEG Encoders.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

1999
General quality maintenance module for motion picture watermarking.
IEEE Trans. Consumer Electron., 1999


  Loading...