Isao Echizen

According to our database1, Isao Echizen authored at least 192 papers between 1999 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Efficiently Decodable Non-Adaptive Threshold Group Testing.
IEEE Trans. Information Theory, 2019

Efficient (nonrandom) Construction and Decoding for Non-adaptive Group Testing.
JIP, 2019

Spatio-temporal generative adversarial network for gait anonymization.
J. Inf. Sec. Appl., 2019

Generating Sentiment-Preserving Fake Online Reviews Using Neural Language Models and Their Human- and Machine-based Detection.
CoRR, 2019

Multi-task Learning For Detecting and Segmenting Manipulated Facial Images and Videos.
CoRR, 2019

Speaker Anonymization Using X-vector and Neural Waveform Models.
CoRR, 2019

Efficient and error-tolerant schemes for non-adaptive complex group testing and its application in complex disease genetics.
CoRR, 2019

Improved encoding and decoding for non-adaptive threshold group testing.
CoRR, 2019

Sublinear Decoding Schemes for Non-adaptive Group Testing with Inhibitors.
Proceedings of the Theory and Applications of Models of Computation, 2019

Implementation of a Digital Signature in Backward-Compatible QR Codes Using Subcell Division and Double Encoding.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

Capsule-forensics: Using Capsule Networks to Detect Forged Images and Videos.
Proceedings of the IEEE International Conference on Acoustics, 2019

Audiovisual Speaker Conversion: Jointly and Simultaneously Transforming Facial Expression and Acoustic Characteristics.
Proceedings of the IEEE International Conference on Acoustics, 2019

2018
Editor's Message to Special Issue of Computer Security Technologies for a Super Smart Society.
JIP, 2018

BiometricJammer: Method to Prevent Acquisition of Biometric Information by Surreptitious Photography on Fingerprints.
IEICE Transactions, 2018

Identifying Computer-Translated Paragraphs using Coherence Features.
CoRR, 2018

Audiovisual speaker conversion: jointly and simultaneously transforming facial expression and acoustic characteristics.
CoRR, 2018

Capsule-Forensics: Using Capsule Networks to Detect Forged Images and Videos.
CoRR, 2018

A framework for generalized group testing with inhibitors and its potential application in neuroscience.
CoRR, 2018

Transforming acoustic characteristics to deceive playback spoofing countermeasures of speaker verification systems.
CoRR, 2018

MesoNet: a Compact Facial Video Forgery Detection Network.
CoRR, 2018

Sublinear decoding schemes for non-adaptive group testing with inhibitors.
CoRR, 2018

Transformation on Computer-Generated Facial Image to Avoid Detection by Spoofing Detector.
CoRR, 2018

Efficient (nonrandom) construction and decoding of non-adaptive group testing.
CoRR, 2018

High-quality nonparallel voice conversion based on cycle-consistent adversarial network.
CoRR, 2018

Efficient Decoding Schemes for Noisy Non-Adaptive Group Testing when Noise Depends on Number of Items in Test.
CoRR, 2018

Can we steal your vocal identity from the Internet?: Initial investigation of cloning Obama's voice using GAN, WaveNet and low-quality found data.
CoRR, 2018

Transforming acoustic characteristics to deceive playback spoofing countermeasures of speaker verification systems.
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018

MesoNet: a Compact Facial Video Forgery Detection Network.
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018

Lightweight Collaborative Semantic Scheme for Generating an Obfuscated Region to Ensure Location Privacy.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018

BiometricJammer: Use of Pseudo Fingerprint to Prevent Fingerprint Extraction from Camera Images without Inconveniencing Users.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018

Can we steal your vocal identity from the Internet?: Initial investigation of cloning Obama's voice using GAN, WaveNet and low-quality found data.
Proceedings of the Odyssey 2018: The Speaker and Language Recognition Workshop, 2018

Efficiently Decodable Non-Adaptive Threshold Group Testing.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Transformation on Computer-Generated Facial Image to Avoid Detection by Spoofing Detector.
Proceedings of the 2018 IEEE International Conference on Multimedia and Expo, 2018

High-Quality Nonparallel Voice Conversion Based on Cycle-Consistent Adversarial Network.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

New Approach for Embedding Secret Information into Fiber Materials.
Proceedings of the IEEE 7th Global Conference on Consumer Electronics, 2018

Vietnamese Paraphrase Identification Using Matching Duplicate Phrases and Similar Words.
Proceedings of the Future Data and Security Engineering - 5th International Conference, 2018

Estimation of Collusion Attack in Bias-based Binary Fingerprinting Code.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

Modular Convolutional Neural Network for Discriminating between Computer-Generated Images and Photographic Images.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Provable Identity Based User Authentication Scheme on ECC in Multi-server Environment.
Wireless Personal Communications, 2017

Reversible Audio Information Hiding for Tampering Detection and Localization Using Sample Scanning Method.
JIP, 2017

Efficiently Decodable Non-Adaptive Threshold Group Testing.
CoRR, 2017

Mix-ORAM: Using delegate shuffles.
CoRR, 2017

Mix-ORAM: Using Delegated Shuffles.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

An approach for gait anonymization using deep learning.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

Distinguishing computer graphics from natural images using convolution neural networks.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

Detecting Computer-Generated Text Using Fluency and Noise Features.
Proceedings of the Computational Linguistics, 2017

Biometric Jammer: Preventing surreptitious fingerprint photography without inconveniencing users.
Proceedings of the 2017 IEEE International Joint Conference on Biometrics, 2017

PrivacyTag: A Community-Based Method for Protecting Privacy of Photographed Subjects in Online Social Networks.
Proceedings of the Digital Nations - Smart Cities, Innovation, and Sustainability, 2017

Modelling Traffic Analysis in Home Automation Systems.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

Identifying computer-generated text using statistical analysis.
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017

Security Oriented Malicious Activity Diagrams to Support Information Systems Security.
Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, 2017

2016
Innovations in Communications Security.
J. Electrical and Computer Engineering, 2016

Foreword.
IEICE Transactions, 2016

Voice Liveness Detection for Speaker Verification based on a Tandem Single/Double-channel Pop Noise Detector.
Proceedings of the Odyssey 2016: The Speaker and Language Recognition Workshop, 2016

Efficiently decodable defective items detected by new model of noisy group testing.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

Privacy-preserving sound to degrade automatic speaker verification performance.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

Breaking Anonymity of Social Network Accounts by Using Coordinated and Extensible Classifiers Based on Machine Learning.
Proceedings of the Social Media: The Good, the Bad, and the Ugly, 2016

Image watermarking using the differences between two wavelet filters.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

Privacy-protected video surveillance in crowded environments using robust watermarking.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

Best embedding direction for spread spectrum-based video watermarking.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

Provable User Authentication Scheme in Telecare Medicine Information System Using Elliptic Curve Cryptosystem.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
IR Hiding: Use of Specular Reflection for Short-Wavelength-Pass-Filter Detection to Prevent Re-recording of Screen Images.
Trans. Data Hiding and Multimedia Security, 2015

An educational system to help students assess website features and identify high-risk websites.
Interact. Techn. Smart Edu., 2015

Robust fingerprinting codes for database using non-adaptive group testing.
IJBDI, 2015

Anonymizing Personal Text Messages Posted in Online Social Networks and Detecting Disclosures of Personal Information.
IEICE Transactions, 2015

Error-Correcting Codes as Source for Decoding Ambiguity.
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015

Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Paraphrase Detection Based on Identical Phrase and Similar Word Matching.
Proceedings of the 29th Pacific Asia Conference on Language, Information and Computation, 2015

Discriminating Between Computer-Generated Facial Images and Natural Ones Using Smoothness Property and Local Entropy.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

Audio Watermarking Using Different Wavelet Filters.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

Voice liveness detection algorithms based on pop noise caused by human breath for automatic speaker verification.
Proceedings of the INTERSPEECH 2015, 2015

Surveillance Camera System Balancing Privacy Protection and Effective Surveillance Image Use.
Proceedings of the ICE-B 2015, 2015

Tradeoff Between the Price of Distributing a Database and Its Collusion Resistance Based on Concatenated Codes.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Evaluation of Matching Accuracy of Template Matching Using a Steganography Algorithm.
Proceedings of the Third International Symposium on Computing and Networking, 2015

De-anonymising Social Network Posts by Linking with Résumé.
Proceedings of the Business Information Systems Workshops, 2015

A Rule-Based Approach for Detecting Location Leaks of Short Text Messages.
Proceedings of the Business Information Systems Workshops, 2015

Smart Privacy Visor: Bridging the Privacy Gap.
Proceedings of the Business Information Systems Workshops, 2015

Efficient Authentication, Traitor Detection, and Privacy-Preserving for the Most Common Queries in Two-Tiered Wireless Sensor Networks.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata.
Electronic Markets, 2014

Subjective assessment of HDTV with superresolution function.
EURASIP J. Image and Video Processing, 2014

Tag Detection for Preventing Unauthorized Face Image Processing.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Evaluation of a Zero-Watermarking-Type Steganography.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Definition of Private Information for Image Sharing in Social Networking Services.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Analysis of Facebook Friends Using Disclosure Level.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Surveillance Camera System to Achieve Privacy Protection and Crime Prevention.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Mathematical Simulation Model and Its Evaluation for Artificial Fiber Patterns.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A Study of Equipment Dependence of a Single-Dot Pattern Method for an Information-Hiding by Applying an Error-Correcting Code.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Novel Proposal and Evaluation of Information Extraction Method from Artificial Fiber Pattern Using a Camera.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A New Approach to Reversible Watermarking.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A Zero-Watermarking-Like Steganography and Potential Applications.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Robust Message Hiding for QR Code.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A System for Anonymizing Temporal Phrases of Message Posted in Online Social Networks and for Detecting Disclosure.
Proceedings of the Ninth International Conference on Availability, 2014

Effects of External Information on Anonymity and Role of Transparency with Example of Social Network De-anonymisation.
Proceedings of the Ninth International Conference on Availability, 2014

2013
A Fast and Low-Distortion Capacity Adaptive Synchronized Acoustic-to-Acoustic Steganography Scheme.
Proceedings of the Recent Advances in Information Hiding and Applications, 2013

Reclaiming Location Privacy in Mobile Telephony Networks - Effects and Consequences for Providers and Subscribers.
IEEE Systems Journal, 2013

Privacy by Transparency for Data-Centric Services (NII Shonan Meeting 2013-5).
NII Shonan Meet. Rep., 2013

Privacy Visor: Method Based on Light Absorbing and Reflecting Properties for Preventing Face Image Detection.
Proceedings of the IEEE International Conference on Systems, 2013

Framework Based on Privacy Policy Hiding for Preventing Unauthorized Face Image Processing.
Proceedings of the IEEE International Conference on Systems, 2013

Settings of Access Control by Detecting Privacy Leaks in SNS.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013

Effective Fingerprinting Codes for Database.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013

Limitations of Super Resolution Image Reconstruction and How to Overcome them for a Single Image.
Proceedings of the SIGMAP and WINSYS 2013, 2013

Ineluctable background checking on social networks: Linking job seeker's résumé and posts.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

How Can We Acquire the Most Common Query Types in Two-Tiered Wireless Sensor Networks?
Proceedings of the Seventh International Conference on Next Generation Mobile Apps, 2013

A Color Extraction Method from Text for Use in Creating a Book Cover Image that Reflects Reader Impressions.
Proceedings of the Knowledge, Information and Creativity Support Systems: Recent Trends, Advances and Solutions - Selected Papers from KICSS'2013, 2013

Anonymizing Temporal Phrases in Natural Language Text to be Posted on Social Networking Services.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Reversible Audio Information Hiding Based on Integer DCT Coefficients with Adaptive Hiding Locations.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Detecting Traitors in Re-publishing Updated Datasets.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Robust Fingerprinting Codes for Database.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2013

A User Privacy Protection Technique for Executing SQL over Encrypted Data in Database Outsourcing Service.
Proceedings of the Collaborative, Trusted and Privacy-Aware e/m-Services, 2013

Coupons as Monetary Incentives in Participatory Sensing.
Proceedings of the Collaborative, Trusted and Privacy-Aware e/m-Services, 2013

Securing Access to Complex Digital Artifacts - Towards a Controlled Processing Environment for Digital Research Data.
Proceedings of the Research and Advanced Technology for Digital Libraries, 2013

Predictive Notification Service of Privacy Invasion on Posting Pictures to SNS.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

Privacy Visor: Method for Preventing Face Image Detection by Using Differences in Human and Device Sensitivity.
Proceedings of the Communications and Multimedia Security, 2013

Experiment of Geometrically Invariant and Unneeded Synchronism Watermarking Using Winding Number.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

Protecting Access Pattern Privacy in Database Outsourcing Service.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

Anonymizing Face Images by Using Similarity-Based Metric.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
PC-Based Real-Time Video Watermark Embedding System Independent of Platform for Parallel Computing.
Trans. Data Hiding and Multimedia Security, 2012

IR Hiding: Method for Preventing Illegal Recording of Videos Based on Differences in Sensory Perception between Humans and Devices.
Trans. Data Hiding and Multimedia Security, 2012

Preventing unauthorized copying of displayed information by utilizing differences in spectral sensitivity between humans and imaging devices.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Insuring Sensitive Processes through Process Mining.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

A Method for Resisting Averaging Attacks on Digital Watermarks and Use of This Method with Digital Watermarks.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

Use of invisible noise signals to prevent privacy invasion through face recognition from camera images.
Proceedings of the 20th ACM Multimedia Conference, MM '12, Nara, Japan, October 29, 2012

Enhancement of Method for Preventing Unauthorized Copying of Displayed Information Using Object Surface Reflection.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

Automatic Anonymous Fingerprinting of Text Posted on Social Networking Services.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

Enhancement of method for preventing illegal recording of movies to enable it to detect cameras with attached infrared-cut filter.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

An Indexed Bottom-up Approach for Publishing Anonymized Data.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

Preventing Surreptitious Filming by Saturation Irradiation of Infrared Rays.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

Automatic Anonymization of Natural Languages Texts Posted on Social Networking Services and Automatic Detection of Disclosure.
Proceedings of the Seventh International Conference on Availability, 2012

Evaluation of an Improved Visualization System for Helping Children Identify Risky Websites.
Proceedings of the Seventh International Conference on Availability, 2012

A Private Information Detector for Controlling Circulation of Private Information through Social Networks.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Isolation im Cloud-Computing und Mechanismen zum Schutz der Privatsphäre - Eignung von Mechanismen zum Schutz der Privatsphäre für die Trennung der Datenverarbeitung in Geschäftsprozessen.
Wirtschaftsinformatik, 2011

Nachhaltiges Computing in Clouds.
Wirtschaftsinformatik, 2011

Pool-based anonymous communication framework for high-performance computing.
The Journal of Supercomputing, 2011

Aspects of privacy for electronic health records.
I. J. Medical Informatics, 2011

Isolation in Cloud Computing and Privacy-Enhancing Technologies - Suitability of Privacy-Enhancing Technologies for Separating Data Usage in Business Processes.
Business & Information Systems Engineering, 2011

Sustainable Cloud Computing.
Business & Information Systems Engineering, 2011

User Centric Privacy in Mobile Communication Scenarios.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

iCabinet: stand-alone implementation of a method for preventing illegal recording of displayed content by adding invisible noise signals.
Proceedings of the 19th International Conference on Multimedia 2011, Scottsdale, AZ, USA, November 28, 2011

IR Hiding: Method to Prevent Re-recording Screen Image Built in Short Wavelength Pass Filter Detection Method Using Specular Reflection.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

An Algorithm for k-Anonymity-Based Fingerprinting.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

Data Provenance with Watermarks for Usage Control Monitors at Disaster Recovery.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

Robust FFT Based Watermarking Scheme for Copyright Protection of Digital Audio Data.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

Countermeasure of re-recording prevention against attack with short wavelength pass filter.
Proceedings of the 18th IEEE International Conference on Image Processing, 2011

A Mutual and Pseudo Inverse Matrix - Based Authentication Mechanism for Outsourcing Service.
Proceedings of the Intelligent Information and Database Systems, 2011

Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of Disasters.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Privacy-compliant Disclosure of Personal Data to Third Parties (Schutz der Privatsphäre bei der Weitergabe persönlicher Daten an Dritte).
it - Information Technology, 2010

Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

IR Hiding: A Method to Prevent Video Re-shooting by Exploiting Differences between Human Perceptions and Recording Device Characteristics.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

A Reversible Acoustic Steganography for Integrity Verification.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

Privacy by Data Provenance with Digital Watermarking - A Proof-of-Concept Implementation for Medical Services with Electronic Health Records.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Unified Metric for Measuring Anonymity and Privacy with Application to Online Social Network.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

A New Approach of Reversible Acoustic Steganography for Tampering Detection.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Uncertainty in Live Forensics.
Proceedings of the Advances in Digital Forensics VI, 2010

Preventing re-recording based on difference between sensory perceptions of humans and devices.
Proceedings of the International Conference on Image Processing, 2010

Measuring Accumulated Revelations of Private Information by Multiple Media.
Proceedings of the Software Services for e-World, 2010

Fine-Grained Access Control for Electronic Health Record Systems.
Proceedings of the U- and E-Service, Science and Technology, 2010

Approach to Privacy-Preserve Data in Two-Tiered Wireless Sensor Network Based on Linear System and Histogram.
Proceedings of the U- and E-Service, Science and Technology, 2010

New Approach to Quantification of Privacy on Social Network Sites.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

Bi-directional RPROB-based Location Anonymizer System for Location-Based Services.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

Binomial-Mix-Based Location Anonymizer System with Global Dummy Generation to Preserve User Location Privacy in Location-Based Services.
Proceedings of the ARES 2010, 2010

2009
Integrity verification method for video content using robust watermarking.
KES Journal, 2009

How to Deal with Blurriness in Live Forensics: A Case of Study.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

RPROB - A Family of Binomial-Mix-based Anonymous Communication Systems.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

On Privacy-aware Delegation of Personal Data using Digital Watermarking.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

XPROB - A Generalized Pool-Based Anonymous Communication Framework.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

A Comparison between Windows Mobile and Symbian S60 Embedded Forensics.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Preventing False Positives in Content-Based Phishing Detection.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

On Privacy in Business Processes - Observing Delegation of Personal Data by using Digital Watermarking.
Proceedings of the ICE-B 2009, 2009

2008
Evaluation of PC-Based Real-Time Watermark Embedding System for Standard-Definition Video Stream.
Proceedings of the New Directions in Intelligent Interactive Multimedia, 2008

Evaluation of Integrity Verification System for Video Content Using Digital Watermarking.
Proceedings of the New Directions in Intelligent Interactive Multimedia, 2008

Robust Video Watermarking based on Dual-plane Correlation for Immunity to Rotation, Scale, Translation, and Random Distortion.
JDIM, 2008

Evaluation and Improvement of Digital Watermarking Algorithm Based on Cryptographic Security Models.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

Picture Watermarks Surviving General Affine Transformation and Random Distortion.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Pool-Based APROB Channel to Provide Resistance against Global Active Adversary under Probabilistic Real-Time Condition.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Electronic Voting Scheme to Maintain Anonymity in Small-scale Election by Hiding the Number of Votes.
Proceedings of the The Third International Conference on Availability, 2008

2007
Adaptive Embedding and Detection for Improved Video Watermarking.
Proceedings of the Intelligent Multimedia Data Hiding: New Directions, 2007

Secure Generation of Digital Signature on Compromised Computer.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

HVS-Based Robust Video Watermarking with Dual-plane Correlation.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Use of Gap-Filling Operation to Enhance Image Quality of Binary Image Watermarking.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
Maintaining Picture Quality and Improving Robustness of Color Watermarking by Using Human Vision Models.
IEICE Transactions, 2006

PC-based real-time watermark embedding system with standard video interface.
Proceedings of the IEEE International Conference on Systems, 2006

Improved Video Verification Method Using Digital Watermarking.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Dual-Plane Watermarking for Color Pictures Immune to Rotation, Scale, Translation, and Random Bending.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

2005
Perceptually Adaptive Video Watermarking Using Motion Estimation.
Int. J. Image Graphics, 2005

Use of inferential statistics to estimate error probability of video watermarks.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Real-time video watermark embedding system using software on personal computer.
Proceedings of the IEEE International Conference on Systems, 2005

Improved Video Watermark Detection Using Statistically-Adaptive Accumulation.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Correlation-based model of color picture watermarking against random geometric distortion.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

2004
Color Picture Watermarking Correlating Two Constituent Planes for Immunity to Random Geometric Distortion.
IEICE Transactions, 2004

Print traceability systems framework using digital watermarks for binary images.
Proceedings of the IEEE International Conference on Systems, 2004

2003
Use of Motion Estimation to Improve Video Watermarking for MPEG Encoders.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

1999
General quality maintenance module for motion picture watermarking.
IEEE Trans. Consumer Electronics, 1999


  Loading...