Masaaki Fujiyoshi

Orcid: 0000-0003-0294-9466

Affiliations:
  • Tokyo Metropolitan University, Japan


According to our database1, Masaaki Fujiyoshi authored at least 67 papers between 2002 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
A Scheme of Reversible Data Hiding for the Encryption-Then-Compression System.
IEICE Trans. Inf. Syst., 2021

2019
Supporting Creation of FAQ Dataset for E-Learning Chatbot.
Proceedings of the Intelligent Decision Technologies 2019, 2019

2017
A Blind Reversible Data Hiding Method for High Dynamic Range Images Taking Advantage of Sparse Histogram.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

Encryption-then-Compression-Based Copyright- and Privacy-Protected Image Trading System.
Proceedings of the International Conference on Advances in Image Processing, 2017

2015
Histogram-Based Near-Lossless Data Hiding and Its Application to Image Compression.
Proceedings of the Advances in Multimedia Information Processing - PCM 2015, 2015

A near-lossless image compression system with data hiding capability.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2015

2014
A Copyright- and Privacy-Protected Image Trading System Using Fingerprinting in Discrete Wavelet Domain with JPEG 2000.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

An Efficient Lossless Compression Method Using Histogram Packing for HDR Images in OpenEXR Format.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

An Efficient Compression of Amplitude-Only Images for the Image Trading System.
IEICE Trans. Inf. Syst., 2014

Image invisibility assessment for visually encrypted images.
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2014

Efficient data hiding in encrypted JPEG 2000 codestreams.
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2014

A near-lossless data hiding method with an improved quantizer.
Proceedings of the IEEE International Symposium on Circuits and Systemss, 2014

Effects of Random Sign Encryption in JPEG 2000-Based Data Hiding.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A cheat preventing method with efficient pixel expansion for Naor-Shamir's visual cryptography.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

A compressible template protection scheme for face recognition based on sparse representation.
Proceedings of the 22nd European Signal Processing Conference, 2014

2013
A Generation Method of Amplitude-Only Images with Low Intensity Ranges.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

A Cheat-Prevention Visual Secret Sharing Scheme with Efficient Pixel Expansion.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

An Image Trading System Using Amplitude-Only Images for Privacy- and Copyright-Protection.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

A Cheat-Prevention Visual Secret Sharing Scheme with Minimum Pixel Expansion.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Generalized Histogram Shifting-Based Blind Reversible Data Hiding with Balanced and Guarded Double Side Modification.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

An image trading system with JPEG 2000 using fingerprinting in visually protected domain.
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2013

A new color QR code forward compatible with the standard QR code decoder.
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2013

Secure online image trading scheme using DCT coefficients and moment invariants feature.
Proceedings of the IEEE International Symposium on Consumer Electronics, 2013

A dual permutation-based separable reversible information hiding scheme in encrypted images.
Proceedings of the IEEE International Symposium on Consumer Electronics, 2013

Improved Iris matching technique using reduced sized of ordinal measure of DCT coefficients.
Proceedings of the IEEE International Symposium on Consumer Electronics, 2013

Separable reversible data hiding in encrypted images with histogram permutation.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo Workshops, 2013

A separable lossless data embedding scheme in encrypted images considering hierarchical privilege.
Proceedings of the 21st European Signal Processing Conference, 2013

A secure face recognition scheme using noisy images based on kernel sparse representation.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2013

A blind lossless information embedding scheme based on generalized histogram shifting.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2013

2012
Non-separable weighted median-cut quantization for images with sparse color histogram.
Proceedings of the International Symposium on Intelligent Signal Processing and Communications Systems, 2012

A Histogram shifting-based blind reversible data hiding method with a histogram peak estimator.
Proceedings of the International Symposium on Communications and Information Technologies, 2012

A visually-lossless data hiding method based on histogram modification.
Proceedings of the 2012 IEEE International Symposium on Circuits and Systems, 2012

Generalized histogram shifting-based reversible data hiding with an adaptive binary-to-q-ary converter.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2012

2011
A Key Derivation Scheme for Hierarchical Access Control to JPEG 2000 Coded Images.
Proceedings of the Advances in Image and Video Technology - 5th Pacific Rim Symposium, 2011

A leakage suppressed two-level security visual secret sharing scheme.
Proceedings of the International Symposium on Intelligent Signal Processing and Communications Systems, 2011

2010
An efficient access control method for composite multimedia content.
IEICE Electron. Express, 2010

A parameter memorization-free lossless data hiding method with flexible payload size.
IEICE Electron. Express, 2010

A Moving Object Detection Scheme in Codestream Domain for Motion JPEG Encoded Movies.
Proceedings of the Advances in Multimedia Information Processing - PCM 2010, 2010

2009
A Reversible Image Authentication Method without Memorization of Hiding Parameters.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

A location map-free reversible data hiding method for specific area embedding.
IEICE Electron. Express, 2009

Efficient Collusion Attack-free Access Control for Multidimensionally Hierarchical Scalability Content.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009

Reversible Information Hiding Considering Hierarchical Access Control.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
An Efficient Reversible Image Authentication Method.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Hierarchical encryption using short encryption keys for scalable access control of JPEG 2000 coded images.
Proceedings of the International Conference on Image Processing, 2008

A scrambling method for Motion JPEG videos enabling moving objects detection from scrambled videos.
Proceedings of the International Conference on Image Processing, 2008

A location map-free visible and reversible watermarking method with authentication ability.
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems, 2008

2007
Codeblock-Based Error Concealment for JPEG2000 Coded Image Transmission over RTP.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Lossless Data Hiding in the Spatial Domain for High Quality Images.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Encryption of Composite Multimedia Contents for Access Control.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

DCT Sign-Based Similarity Measure for JPEG Image Retrieval.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Codestream Domain Scrambling of Moving Objects Based on DCT Sign-only Correlation for Motion JPEG Movies.
Proceedings of the International Conference on Image Processing, 2007

Image Tamper Detection using Mathematical Morphology.
Proceedings of the International Conference on Image Processing, 2007

Collusion Attack-Resilient Hierarchical Encryption of JPEG 2000 Codestreams with Scalable Access Control.
Proceedings of the International Conference on Image Processing, 2007

A Location-Map Free Reversible Data Hiding Method using Block-Based Single Parameter.
Proceedings of the International Conference on Image Processing, 2007

Fast Method for Joint Retrieval and Identification of JPEG Coded Images Based on DCT Sign.
Proceedings of the International Conference on Image Processing, 2007

2006
A digital watermarking scheme that preserves image quality and is applicable to watermark sequences from a variety of distributions.
Syst. Comput. Jpn., 2006

Fast Image Identification Methods for JPEG Images with Different Compression Ratios.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Hierarchical Encryption of Multimedia Contents for Access Control.
Proceedings of the International Conference on Image Processing, 2006

Fast and Robust Identification Methods for JPEG Images with Various Compression Ratios.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006

Codeblock-Based Concealment Scheme for JPEG2000 Images in Lossy Packet Networks.
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems 2006, 2006

DCT Sign Only Correlation and Its Application to Image Registration.
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems 2006, 2006

2005
A Method of Guaranteeing Image-Quality for Quantization-Based Watermarking Using a Nonorthogonal Transformation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Quantization-based image steganography without data hiding position memorization.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

Generalized hierarchical encryption of JPEG 2000 codestreams for access control.
Proceedings of the 2005 International Conference on Image Processing, 2005

Modulo arithmetic-based image watermarking and its theoretical analysis of image-quality.
Proceedings of the 2005 International Conference on Image Processing, 2005

2004
An image-quality guaranteed method for quantization-based watermarking using a dwt.
Proceedings of the 2004 International Conference on Image Processing, 2004

2002
A Data Embedding Method Considering the Finite Word-Length for High Quality Images.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002


  Loading...