Hitoshi Kiya

Orcid: 0000-0001-8061-3090

According to our database1, Hitoshi Kiya authored at least 411 papers between 1992 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Awards

IEEE Fellow

IEEE Fellow 2016, "For contributions to filter structure, data hiding, and multimedia security".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Scene-Segmentation-Based Exposure Compensation for Tone Mapping of High Dynamic Range Scenes.
CoRR, 2024

On the Security of Bitstream-level JPEG Encryption with Restart Markers.
CoRR, 2024

Enhancing Security Using Random Binary Weights in Privacy-Preserving Federated Learning.
CoRR, 2024

Disposable-key-based image encryption for collaborative learning of Vision Transformer.
CoRR, 2024

Speech privacy-preserving methods using secret key for convolutional neural network models and their robustness evaluation.
CoRR, 2024

Fine-Tuning Text-To-Image Diffusion Models for Class-Wise Spurious Feature Generation.
CoRR, 2024

Efficient Fine-Tuning with Domain Adaptation for Privacy-Preserving Vision Transformer.
CoRR, 2024

A Random Ensemble of Encrypted models for Enhancing Robustness against Adversarial Examples.
CoRR, 2024

On the Security of Learnable Image Encryption for Privacy-Preserving Deep Learning.
IEEE Access, 2024

A Random Ensemble of Encrypted Vision Transformers for Adversarially Robust Defense.
IEEE Access, 2024

Privacy-Preserving Vision Transformer Using Images Encrypted with Restricted Random Permutation Matrices.
Proceedings of the 13th IEEE Global Conference on Consumer Electronics, 2024

2023
Effects of JPEG Compression on Vision Transformer Image Classification for Encryption-then-Compression Images.
Sensors, April, 2023

On the predictability in reversible steganography.
Telecommun. Syst., February, 2023

Privacy-Preserving Image Classification Using ConvMixer with Adaptative Permutation Matrix and Block-Wise Scrambled Image Encryption.
J. Imaging, 2023

A Jigsaw Puzzle Solver-Based Attack on Image Encryption Using Vision Transformer for Privacy-Preserving DNNs.
Inf., 2023

Access Control with Encrypted Feature Maps for Object Detection Models.
IEICE Trans. Inf. Syst., 2023

Image and Model Transformation with Secret Key for Vision Transformer.
IEICE Trans. Inf. Syst., 2023

Efficient Key-Based Adversarial Defense for ImageNet by Using Pre-trained Model.
CoRR, 2023

Block-Wise Encryption for Reliable Vision Transformer models.
CoRR, 2023

Generative Model-Based Attack on Learnable Image Encryption for Privacy-Preserving Deep Learning.
CoRR, 2023

Combined Use of Federated Learning and Image Encryption for Privacy-Preserving Image Classification with Vision Transformer.
CoRR, 2023

Color-NeuraCrypt: Privacy-Preserving Color-Image Classification Using Extended Random Neural Networks.
CoRR, 2023

A Privacy Preserving Method with a Random Orthogonal Matrix for ConvMixer Models.
CoRR, 2023

Enhanced Security against Adversarial Examples Using a Random Ensemble of Encrypted Vision Transformer Models.
Proceedings of the 12th IEEE Global Conference on Consumer Electronics, 2023

Security Evaluation of Compressible and Learnable Image Encryption against Jigsaw Puzzle Solver Attacks.
Proceedings of the 12th IEEE Global Conference on Consumer Electronics, 2023

Enhanced Security with Encrypted Vision Transformer in Federated Learning.
Proceedings of the 12th IEEE Global Conference on Consumer Electronics, 2023

Effects of Data Hiding on Vision Transformer Classification for Encryption-then-Compression Images.
Proceedings of the 12th IEEE Global Conference on Consumer Electronics, 2023

A Privacy-Preserving Method Using Secret Key for Convolutional Neural Network-Based Speech Classification.
Proceedings of the 31st European Signal Processing Conference, 2023

Vocal Tract Length Perturbation-based Pseudo-Speaker Augmentation for Speaker Embedding Learning.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

Domain Adaptation for Efficiently Fine-tuning Vision Transformer with Encrypted Images.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

Hindering Adversarial Attacks with Multiple Encrypted Patch Embeddings.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

Maximization of 2D Cross-Correlation Based on Auxiliary Function Method for Image Alignment.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

2022
Privacy-Preserving Semantic Segmentation Using Vision Transformer.
J. Imaging, 2022

Privacy-Preserving Image Classification Using an Isotropic Network.
IEEE Multim., 2022

Lightweight and irreversible speech pseudonymization based on data-driven optimization of cascaded voice modification modules.
Comput. Speech Lang., 2022

A Jigsaw Puzzle Solver-based Attack on Block-wise Image Encryption for Privacy-preserving DNNs.
CoRR, 2022

On the Adversarial Transferability of ConvMixer Models.
CoRR, 2022

StyleGAN Encoder-Based Attack for Block Scrambled Face Images.
CoRR, 2022

Access Control of Semantic Segmentation Models Using Encrypted Feature Maps.
CoRR, 2022

Privacy-Preserving Image Classification Using Isotropic Network.
CoRR, 2022

An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications.
CoRR, 2022

Proxy System with JPEG Bitstream-Based File-Size Preserving Encryption for Cloud Photo Streams.
CoRR, 2022

N-White Balancing: White Balancing for Multiple Illuminants Including Non-Uniform Illumination.
IEEE Access, 2022

Robustness of Signal Processing-Based Pseudonymization Method Against Decryption Attack.
Proceedings of the Odyssey 2022: The Speaker and Language Recognition Workshop, 28 June, 2022

Adversarial Detector with Robust Classifier.
Proceedings of the 4th IEEE Global Conference on Life Sciences and Technologies, 2022

Access Control of Object Detection Models Using Encrypted Feature Maps.
Proceedings of the 4th IEEE Global Conference on Life Sciences and Technologies, 2022

A Privacy-Preserving Image Retrieval Scheme with a Mixture of Plain and EtC Images.
Proceedings of the 4th IEEE Global Conference on Life Sciences and Technologies, 2022

Security Evaluation of Block-based Image Encryption for Vision Transformer against Jigsaw Puzzle Solver Attack.
Proceedings of the 4th IEEE Global Conference on Life Sciences and Technologies, 2022

On the Transferability of Adversarial Examples between Encrypted Models.
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2022

An Access Control Method with Secret Key for Semantic Segmentation Models.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2022

An Encryption Method of Convmixer Models without Performance Degradation.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2022

Security Evaluation of Compressible Image Encryption for Privacy-Preserving Image Classification Against Ciphertext-Only Attacks.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2022

Privacy-Preserving Image Classification Using ConvMixer with Adaptive Permutation Matrix.
Proceedings of the 11th IEEE Global Conference on Consumer Electronics, 2022

A Detection Method of Temporally Operated Videos Using Robust Hashing.
Proceedings of the 11th IEEE Global Conference on Consumer Electronics, 2022

Template matching with white balance adjustment under multiple illuminants.
Proceedings of the 11th IEEE Global Conference on Consumer Electronics, 2022

Missing data recovery using autoencoder for multi-channel acoustic scene classification.
Proceedings of the 30th European Signal Processing Conference, 2022

Privacy-Preserving Image Classification Using Vision Transformer.
Proceedings of the 30th European Signal Processing Conference, 2022

2021
Block-Wise Image Transformation With Secret Key for Adversarially Robust Defense.
IEEE Trans. Inf. Forensics Secur., 2021

Replay Attack Detection Based on Spatial and Spectral Features of Stereo Signal.
J. Inf. Process., 2021

A Detection Method of Operated Fake-Images Using Robust Hashing.
J. Imaging, 2021

A Reversible Data Hiding Method in Encrypted Images for Controlling Trade-Off between Hiding Capacity and Compression Efficiency.
J. Imaging, 2021

Three-Color Balancing for Color Constancy Correction.
J. Imaging, 2021

A Scheme of Reversible Data Hiding for the Encryption-Then-Compression System.
IEICE Trans. Inf. Syst., 2021

Protection of SVM Model with Secret Key from Unauthorized Access.
CoRR, 2021

Self-Supervised Intrinsic Image Decomposition Network Considering Reflectance Consistency.
CoRR, 2021

Protecting Semantic Segmentation Models by Using Block-wise Image Encryption with Secret Key from Unauthorized Access.
CoRR, 2021

A Protection Method of Trained CNN Model with Secret Key from Unauthorized Access.
CoRR, 2021

Image to Perturbation: An Image Transformation Network for Generating Visually Protected Images for Privacy-Preserving Deep Neural Networks.
IEEE Access, 2021

Lightweight Voice Anonymization Based on Data-Driven Optimization of Cascaded Voice Modification Modules.
Proceedings of the IEEE Spoken Language Technology Workshop, 2021

Fake-image detection with Robust Hashing.
Proceedings of the 3rd IEEE Global Conference on Life Sciences and Technologies, 2021

Deep Retinex Network for Estimating Illumination Colors with Self-Supervised Learning.
Proceedings of the 3rd IEEE Global Conference on Life Sciences and Technologies, 2021

Privacy-preserving Image Retrieval Scheme Allowing Mixed Use of Lossless and JPEG Compressed Images.
Proceedings of the 3rd IEEE Global Conference on Life Sciences and Technologies, 2021

An MSB Prediction-Based Method with Marker Bits for Reversible Data Hiding in Encrypted Images.
Proceedings of the 3rd IEEE Global Conference on Life Sciences and Technologies, 2021

Multi-color balancing for correctly adjusting the intensity of target colors.
Proceedings of the 3rd IEEE Global Conference on Life Sciences and Technologies, 2021

Piracy-Resistant DNN Watermarking by Block-Wise Image Transformation with Secret Key.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

Separated-Spectral-Distribution Estimation Based on Bayesian Inference with Single RGB Camera.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021

Transfer Learning-Based Model Protection With Secret Key.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021

Multi-Color Balance For Color Constancy.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021

Generation of Gradient-Preserving Images allowing HOG Feature Extraction.
Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2021

Block Scrambling Image Encryption Used in Combination with Data Augmentation for Privacy-Preserving DNNs.
Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2021

A universal detector of CNN-generated images using properties of checkerboard artifacts in the frequency domain.
Proceedings of the 10th IEEE Global Conference on Consumer Electronics, 2021

Phase representation based on HSV color model for acoustic classification with convolutional neural networks.
Proceedings of the 10th IEEE Global Conference on Consumer Electronics, 2021

Ensemble of Key-Based Models: Defense Against Black-Box Adversarial Attacks.
Proceedings of the 10th IEEE Global Conference on Consumer Electronics, 2021

Investigation on Spatial and Frequency-Based Features for Asynchronous Acoustic Scene Analysis.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2021

A Flexible Reversible Data Hiding Method in Compressible Encrypted Images.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2021

Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2021

A Privacy-Preserving Image Retrieval Scheme Using A Codebook Generated from Independent Plain-Image Dataset.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2021

A Protection Method of Trained CNN Model Using Feature Maps Transformed With Secret Key From Unauthorized Access.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2021

Spatially varying white balancing for mixed and non-uniform illuminants.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2021

2020
Secure OMP Computation Maintaining Sparse Representations and Its Application to EtC Systems.
IEICE Trans. Inf. Syst., 2020

Hue-Correction Scheme Considering Non-Linear Camera Response for Multi-Exposure Image Fusion.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

L0 Norm Optimization in Scrambled Sparse Representation Domain and Its Application to EtC System.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

A Privacy-Preserving Machine Learning Scheme Using EtC Images.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

A Reversible Data Hiding Method in Compressible Encrypted Images.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Secure Overcomplete Dictionary Learning for Sparse Representation.
IEICE Trans. Inf. Syst., 2020

Blind Bandwidth Extension with a Non-Linear Function and Its Evaluation on Automatic Speaker Verification.
IEICE Trans. Inf. Syst., 2020

Image Identification of Encrypted JPEG Images for Privacy-Preserving Photo Sharing Services.
IEICE Trans. Inf. Syst., 2020

Difficulty in estimating visual information from randomly sampled images.
CoRR, 2020

CycleGAN without checkerboard artifacts for counter-forensics of fake-image detection.
CoRR, 2020

Ensemble of Models Trained by Key-based Transformed Images for Adversarially Robust Defense Against Black-box Attacks.
CoRR, 2020

Hue-Correction Scheme Based on Constant-Hue Plane for Deep-Learning-Based Color-Image Enhancement.
IEEE Access, 2020

Privacy-Preserving Content-Based Image Retrieval Using Compressible Encrypted Images.
IEEE Access, 2020

Distributed Secure Sparse Modeling Based on Random Unitary Transform.
IEEE Access, 2020

Application of Bandwidth Extension with No Learning to Data Augmentation for Speaker Verification.
Proceedings of the Odyssey 2020: The Speaker and Language Recognition Workshop, 2020

Encryption Inspired Adversarial Defense For Visual Classification.
Proceedings of the IEEE International Conference on Image Processing, 2020

Image-Enhancement-Based Data Augmentation for Improving Deep Learning in Image Classification Problem.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2020

Hue Correction Scheme for Multi-Exposure Image Fusion Considering Hue Distortion in Input Images.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2020

Privacy-Preserving Pattern Recognition Using Encrypted Sparse Representations in L0 Norm Minimization.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Fixed Smooth Convolutional Layer for Avoiding Checkerboard Artifacts in CNNS.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Sparse Modeling on Distributed Encryption Data.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Training DNN Model with Secret Key for Model Protection.
Proceedings of the 9th IEEE Global Conference on Consumer Electronics, 2020

On the influence of using quantized images on machine learning algorithms.
Proceedings of the 9th IEEE Global Conference on Consumer Electronics, 2020

Extension of JPEG XS for Two-Layer Lossless Coding.
Proceedings of the 9th IEEE Global Conference on Consumer Electronics, 2020

Difficulty in estimating visual information from randomly sampled images.
Proceedings of the 9th IEEE Global Conference on Consumer Electronics, 2020

Image Transformation Network for Privacy-Preserving Deep Neural Networks and Its Security Evaluation.
Proceedings of the 9th IEEE Global Conference on Consumer Electronics, 2020

Sequence-To-One Neural Networks for Japanese Dialect Speech Classification.
Proceedings of the 9th IEEE Global Conference on Consumer Electronics, 2020

A GAN-Based Image Transformation Scheme for Privacy-Preserving Deep Neural Networks.
Proceedings of the 28th European Signal Processing Conference, 2020

A Content-based Image Retrieval Scheme Using Compressible Encrypted Images.
Proceedings of the 28th European Signal Processing Conference, 2020

Visual Security Evaluation of Learnable Image Encryption Methods against Ciphertext-only Attacks.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020

Checkerboard-Artifact-Free Image-Enhancement Network Considering Local and Global Features.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020

A Framework for Transformation Network Training in Coordination with Semi-trusted Cloud Provider for Privacy-Preserving Deep Neural Networks.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020

Dialect-Aware Modeling for End-to-End Japanese Dialect Speech Recognition.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020

A Privacy-Preserving Content-Based Image Retrieval Scheme Allowing Mixed Use Of Encrypted And Plain Images.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020

Flexible Data Hiding and Extraction in EtC Images.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020

An Extension of Encryption-Inspired Adversarial Defense with Secret Keys against Adversarial Examples.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020

2019
Scene Segmentation-Based Luminance Adjustment for Multi-Exposure Image Fusion.
IEEE Trans. Image Process., 2019

Encryption-Then-Compression Systems Using Grayscale-Based Image Encryption for JPEG Images.
IEEE Trans. Inf. Forensics Secur., 2019

Near lossless coding of sparse histogram images based on zero-skip quantization.
Multim. Tools Appl., 2019

Privacy-Preserving Support Vector Machine Computing Using Random Unitary Transformation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Two-Layer Near-Lossless HDR Coding Using Zero-Skip Quantization with Backward Compatibility to JPEG.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

A Hue-Preserving Tone Mapping Scheme Based on Constant-Hue Plane Without Gamut Problem.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Robust Image Identification with DC Coefficients for Double-Compressed JPEG Images.
IEICE Trans. Inf. Syst., 2019

An Image Fusion Scheme for Single-Shot High Dynamic Range Imaging with Spatially Varying Exposures.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Image Manipulation Specifications on Social Networking Services for Encryption-then-Compression Systems.
IEICE Trans. Inf. Syst., 2019

Privacy-Preserving Machine Learning Using EtC Images.
CoRR, 2019

HOG feature extraction from encrypted images for privacy-preserving machine learning.
CoRR, 2019

JPEG XT Image Compression with Hue Compensation for Two-Layer HDR Coding.
CoRR, 2019

A Noise-aware Enhancement Method for Underexposed Images.
CoRR, 2019

Deep Inverse Tone Mapping Using LDR Based Learning for Estimating HDR Images with Absolute Luminance.
CoRR, 2019

Image Enhancement Network Trained by Using HDR images.
CoRR, 2019

Pixel-Based Image Encryption Without Key Management for Privacy-Preserving Deep Neural Networks.
IEEE Access, 2019

iTM-Net: Deep Inverse Tone Mapping Using Novel Loss Function Considering Tone Mapping Operator.
IEEE Access, 2019

Adversarial Robustness by One Bit Double Quantization for Visual Classification.
IEEE Access, 2019

Investigation on Blind Bandwidth Extension with a Non-Linear Function and its Evaluation of x-Vector-Based Speaker Verification.
Proceedings of the 20th Annual Conference of the International Speech Communication Association, 2019

Secure Sparse Representations in L0 Norm Minimization and Its Application to EtC Systems.
Proceedings of the 13th International Conference on Signal Processing and Communication Systems, 2019

Privacy-Preserving Deep Neural Networks with Pixel-Based Image Encryption Considering Data Augmentation in the Encrypted Domain.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

Two-Layer Near-Lossless HDR Coding with Backward Compatibility to JPEG.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

Convolutional Neural Networks Considering Local and Global Features for Image Enhancement.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

An Image Identification Scheme Of Encrypted Jpeg Images For Privacy-Preserving Photo Sharing Services.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

A Color Compensation Method Using Inverse Camera Response Function for Multi-exposure Image Fusion.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019

On the Security of Pixel-Based Image Encryption for Privacy-Preserving Deep Neural Networks.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019

Investigation on latency issues and objective measurements of non-linear blind bandwidth extension.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019

Performance Evaluation of Two-layer lossless HDR Coding using Histogram Packing Technique under Various Tone-mapping Operators.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019

Single-Shot High Dynamic Range Imaging with Spatially Varying Exposures Considering Hue Distortion.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019

Adversarial Test on Learnable Image Encryption.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019

Replay Attack Detection Using Generalized Cross-Correlation of Stereo Signal.
Proceedings of the 27th European Signal Processing Conference, 2019

Secure Dictionary Learning for Sparse Representation.
Proceedings of the 27th European Signal Processing Conference, 2019

iTM-Net: Deep Inverse Tone Mapping Using Novel Loss Function Based on Tone Mapping Operator.
Proceedings of the 27th European Signal Processing Conference, 2019

Improving replay attack detection by combination of spatial and spectral features.
Proceedings of the 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2019

Privacy-Preserving Deep Neural Networks Using Pixel-Based Image Encryption Without Common Security Keys.
Proceedings of the 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2019

A Hue Correction Scheme Based on Constant-Hue Plane for Color Image Enhancement.
Proceedings of the 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2019

Image Identification of Grayscale-Based JPEG Images for Privacy-Preserving Photo Sharing Services.
Proceedings of the 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2019

Filtering Adversarial Noise with Double Quantization.
Proceedings of the 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2019

2018
Integrated Model of Image Protection Techniques.
J. Imaging, 2018

Two-Layer Lossless Coding for High Dynamic Range Images Based on Range Compression and Adaptive Inverse Tone-Mapping.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Two-Layer Lossless HDR Coding Using Histogram Packing Technique with Backward Compatibility to JPEG.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

A Pseudo Multi-Exposure Fusion Method Using Single Image.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

A Block-Permutation-Based Encryption Scheme with Independent Processing of RGB Components.
IEICE Trans. Inf. Syst., 2018

Robust Image Identification without Visible Information for JPEG Images.
IEICE Trans. Inf. Syst., 2018

On the Security of Block Scrambling-Based EtC Systems against Extended Jigsaw Puzzle Solver Attacks.
IEICE Trans. Inf. Syst., 2018

Security Evaluation for Block Scrambling-Based Image Encryption Including JPEG Distortion against Jigsaw Puzzle Solver Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Compressible and Learnable Encryption for Untrusted Cloud Environments.
CoRR, 2018

A Retinex-based Image Enhancement Scheme with Noise Aware Shadow-up Function.
CoRR, 2018

Compression Performance of Grayscale-based Image Encryption for Encryption-then-Compression Systems.
CoRR, 2018

Robust Image Identification for Double-Compressed JPEG Images.
CoRR, 2018

Two-layer Lossless HDR Coding considering Histogram Sparseness with Backward Compatibility to JPEG.
Proceedings of the 2018 Picture Coding Symposium, 2018

Voice liveness detection using phoneme-based pop-noise detector for speaker verification.
Proceedings of the Odyssey 2018: The Speaker and Language Recognition Workshop, 2018

Privacy-Preserving SVM Computing by Using Random Unitary Transformation.
Proceedings of the 2018 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS), 2018

Lossless Two-Layer Coding using Histogram Packing Technique for HDR Images.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2018

Privacy-Preserving Network BMI Decoding of Covert Spatial Attention.
Proceedings of the 12th International Conference on Signal Processing and Communication Systems, 2018

Grayscale-Based Block Scrambling Image Encryption for Social Networking Services.
Proceedings of the 2018 IEEE International Conference on Multimedia and Expo, 2018

Super-Resolution Using Convolutional Neural Networks Without Any Checkerboard Artifacts.
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018

Automatic Exposure Compensation for Multi-Exposure Image Fusion.
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018

Multi-Exposure Image Fusion Based on Exposure Compensation.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Grayscale-Based Image Encryption Considering Color Sub-sampling Operation for Encryption-then-Compression Systems.
Proceedings of the IEEE 7th Global Conference on Consumer Electronics, 2018

Histogram-Based Image Pre-processing for Machine Learning.
Proceedings of the IEEE 7th Global Conference on Consumer Electronics, 2018

Bitstream-Based JPEG Image Encryption with File-Size Preserving.
Proceedings of the IEEE 7th Global Conference on Consumer Electronics, 2018

Convolutional Neural Networks Without Any Checkerboard Artifacts.
Proceedings of the 26th European Signal Processing Conference, 2018

Non-linear harmonic generation based blind bandwidth extension considering aliasing artifacts.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

Privacy-Preserving SVM Computing in the Encrypted Domain.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

An Image Segmentation Method Based on Luminance Distribution and Its Application to Image Enhancement.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

A Block-Permutation-Based Image Encryption Allowing Hierarchical Decryption.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

Robust Image Identification for Double-Compressed and Resized JPEG Images.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

Image Fusion for Single-Shot High Dynamic Range Imaging with Spatially Varying Exposures.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
An Encryption-then-Compression System for Lossless Image Compression Standards.
IEICE Trans. Inf. Syst., 2017

Fast Inverse Tone Mapping Based on Reinhard's Global Operator with Estimated Parameters.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Block-Permutation-Based Encryption Scheme with Enhanced Color Scrambling.
Proceedings of the Image Analysis - 20th Scandinavian Conference, 2017

Reinhard's global operator based inverse tone mapping with one parameter.
Proceedings of the Eighth International Workshop on Signal Design and Its Applications in Communications, 2017

Speeding up image identification with visually protected features for JPEG image.
Proceedings of the Eighth International Workshop on Signal Design and Its Applications in Communications, 2017

On the security of block scrambling-based image encryption including JPEG distorsion against jigsaw puzzle solver attacks.
Proceedings of the Eighth International Workshop on Signal Design and Its Applications in Communications, 2017

A Blind Reversible Data Hiding Method for High Dynamic Range Images Taking Advantage of Sparse Histogram.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

An inverse tone mapping operation with two integer data for HDR images.
Proceedings of the 2017 International Symposium on Intelligent Signal Processing and Communication Systems, 2017

Security evaluation for block scrambling-based ETC systems against extended jigsaw puzzle solver attacks.
Proceedings of the 2017 IEEE International Conference on Multimedia and Expo, 2017

Robust image identification with secure features for JPEG images.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

Fast inverse tone mapping with Reinhard's global operator.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

On the security of block scrambling-based ETC systems against jigsaw puzzle solver attacks.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

A Generation of Meaningfully Secured Images for Copyright- and Privacy-Protected Image Trading Systems Using Singular Component Interchange.
Proceedings of the International Conference on Advances in Image Processing, 2017

Encryption-then-Compression-Based Copyright- and Privacy-Protected Image Trading System.
Proceedings of the International Conference on Advances in Image Processing, 2017

Compression performance of extended JPEG XT under various TMOs.
Proceedings of the IEEE 6th Global Conference on Consumer Electronics, 2017

Reversible data hiding for compression-friendly image encryption method.
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017

A parallel computation algorithm for super-resolution methods using convolutional neural networks.
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017

Pseudo multi-exposure fusion using a single image.
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017

Robust image identification without any visible information for double-compressed JPEG images.
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017

Image manipulation on social media for encryption-then-compression systems.
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017

Integrated algorithm for block-permutation-based encryption with reversible data hiding.
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017

2016
Channel Scaling for Integer Implementation of Minimum Lifting 2D Wavelet Transform.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Unitary Transform-Based Template Protection and Its Application to <i>l</i><sup>2</sup>-norm Minimization Problems.
IEICE Trans. Inf. Syst., 2016

An Remapping Operation without Tone Mapping Parameters for HDR Images.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Fuzzy Commitment Scheme-Based Secure Identification for JPEG Images with Various Compression Ratios.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Adaptive Directional Lifting Structure of Three Dimensional Non-Separable Discrete Wavelet Transform for High Resolution Volumetric Data Compression.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

A Unified Tone Mapping Operation for HDR Images Expressed in Integer Data.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

An Efficient Random Unitary Matrix for Biometric Template Protection.
Proceedings of the 2016 Joint 8th International Conference on Soft Computing and Intelligent Systems (SCIS) and 17th International Symposium on Advanced Intelligent Systems (ISIS), 2016

Quality improvement of tone mapped images by TMQI-II based optimization for the JPEG XT standard.
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2016

An inverse tone mapping operator based on Reinhard's global operator.
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2016

Optimum SPT allocation for multipliers of minimum lifting 2D wavelet transform.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2016

Subset noise bias compensation for tone-mapping and up-scaling of JPEG images.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2016

A structure of JPEG XT encoder considering effect of quantization error.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2016

Secure identification based on fuzzy commitment scheme for JPEG XR images.
Proceedings of the 24th European Signal Processing Conference, 2016

A fixed-point local tone mapping operation for HDR images.
Proceedings of the 24th European Signal Processing Conference, 2016

An encryption-then-compression system for JPEG XR standard.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2016

Secure and robust identification based on fuzzy commitment scheme for JPEG images.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2016

Ensemble based speaker verification using adapted score fusion in noisy reverberant environments.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2016

Codestream level secure identification for JPEG 2000 images under various compression ratios.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2016

2015
An Encryption-then-Compression System for JPEG/Motion JPEG Standard.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Bit-depth scalable lossless coding for high dynamic range images.
EURASIP J. Adv. Signal Process., 2015

A Robust Identification Scheme for JPEG XR Images with Various Compression Ratios.
Proceedings of the Image and Video Technology - 7th Pacific-Rim Symposium, 2015

An encryption-then-compression system for JPEG standard.
Proceedings of the 2015 Picture Coding Symposium, 2015

Histogram-Based Near-Lossless Data Hiding and Its Application to Image Compression.
Proceedings of the Advances in Multimedia Information Processing - PCM 2015, 2015

A Unified Tone Mapping Operation for HDR Images Including Both Floating-Point and Integer Data.
Proceedings of the Advances in Multimedia Information Processing - PCM 2015, 2015

A new class of near-lossless coding allowing estimation of ℓ∞ bound.
Proceedings of the 15th International Symposium on Communications and Information Technologies, 2015

A perceptual encryption scheme for Motion JPEG 2000 standard.
Proceedings of the 15th International Symposium on Communications and Information Technologies, 2015

An Encryption-then-Compression system for JPEG 2000 standard.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

Unitary transform-based template protection and its properties.
Proceedings of the 23rd European Signal Processing Conference, 2015

Noise bias compensation based on Bayesian inference for tone mapped noisy image.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2015

Two layer coding of HDR images with noise bias compensation.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2015

Channel scaling for rounding noise reduction in minimum lifting 3D wavelet transform.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2015

A near-lossless image compression system with data hiding capability.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2015

2014
A Copyright- and Privacy-Protected Image Trading System Using Fingerprinting in Discrete Wavelet Domain with JPEG 2000.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

Reduction of Lifting Steps of Non Separable 2D Quadruple Lifting DWT Compatible with Separable 2D DWT.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

An Efficient Lossless Compression Method Using Histogram Packing for HDR Images in OpenEXR Format.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

An Efficient Compression of Amplitude-Only Images for the Image Trading System.
IEICE Trans. Inf. Syst., 2014

A Fixed-Point Global Tone Mapping Operation for HDR Images in the RGBE Format.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

Image invisibility assessment for visually encrypted images.
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2014

Efficient data hiding in encrypted JPEG 2000 codestreams.
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2014

Effects of Random Sign Encryption in JPEG 2000-Based Data Hiding.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

An integer tone mapping operation for HDR images in OpenEXR with denormalized numbers.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

A cheat preventing method with efficient pixel expansion for Naor-Shamir's visual cryptography.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

Noise bias compensation of tone mapped noisy image.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

A compressible template protection scheme for face recognition based on sparse representation.
Proceedings of the 22nd European Signal Processing Conference, 2014

L2 norm optimization of tone mapping for two layer lossless coding of HDR images.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2014

Range reduction of HDR images for backward compatibility with LDR image processing.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2014

Non-separable three dimensional discrete wavelet transform with adaptive directional prediction.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2014

An image estimation method by header information in JPEG 2000 codestreams and its application to image identification.
Proceedings of the 2014 IEEE Asia Pacific Conference on Circuits and Systems, 2014

2013
A Generation Method of Amplitude-Only Images with Low Intensity Ranges.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

A Cheat-Prevention Visual Secret Sharing Scheme with Efficient Pixel Expansion.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

An Image Trading System Using Amplitude-Only Images for Privacy- and Copyright-Protection.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

A Cheat-Prevention Visual Secret Sharing Scheme with Minimum Pixel Expansion.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

An image trading system with JPEG 2000 using fingerprinting in visually protected domain.
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2013

A new color QR code forward compatible with the standard QR code decoder.
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2013

Secure online image trading scheme using DCT coefficients and moment invariants feature.
Proceedings of the IEEE International Symposium on Consumer Electronics, 2013

Improved Iris matching technique using reduced sized of ordinal measure of DCT coefficients.
Proceedings of the IEEE International Symposium on Consumer Electronics, 2013

Three dimensional discrete wavelet transform with deduced number of lifting steps.
Proceedings of the IEEE International Conference on Image Processing, 2013

An integer tone mapping operation for hdr images expressed in floating point data.
Proceedings of the IEEE International Conference on Acoustics, 2013

Two layer lossless coding of HDR images.
Proceedings of the IEEE International Conference on Acoustics, 2013

A parallel implementation method of FFT-based full-search block matching algorithms.
Proceedings of the IEEE International Conference on Acoustics, 2013

Lossless transform with functionality of thumbnail previewing.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2013

Non separable 3D lifting structure compatible with separable quadruple lifting DWT.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2013

Error equalization for high quality LDR images in backward compatible HDR image coding.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2013

A secure face recognition scheme using noisy images based on kernel sparse representation.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2013

A fixed-point tone mapping operation for HDR images in the RGBE format.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2013

2012
Avoidance of Singular Point in Integer Orthonormal Transform for Lossless Coding.
IEEE Trans. Signal Process., 2012

Codestream-Based Identification of JPEG 2000 Images with Different Coding Parameters.
IEICE Trans. Inf. Syst., 2012

Fine rate control and high SNR coding for sparse histogram images.
Proceedings of the 2012 Picture Coding Symposium, 2012

Non-separable weighted median-cut quantization for images with sparse color histogram.
Proceedings of the International Symposium on Intelligent Signal Processing and Communications Systems, 2012

Weighted median cut quantization and its applications.
Proceedings of the International Symposium on Intelligent Signal Processing and Communications Systems, 2012

Hash-based identification of JPEG 2000 images in encrypted domain.
Proceedings of the International Symposium on Intelligent Signal Processing and Communications Systems, 2012

A visually-lossless data hiding method based on histogram modification.
Proceedings of the 2012 IEEE International Symposium on Circuits and Systems, 2012

Hierarchical Key Assignment Scheme for Multimedia Access Control with Modified Hash Chain.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

Hash based identification of JPEG 2000 images with different coding parameters.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

Lossy compression of sparse histogram image.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

A new technique of non-iterative super-resolution without boundary distortion.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

Efficient lossless bit depth scalable coding for HDR images.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2012

Generalized histogram shifting-based reversible data hiding with an adaptive binary-to-q-ary converter.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2012

2011
Reversible 2D 9-7 DWT Based on Non-separable 2D Lifting Structure Compatible with Irreversible DWT.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Lossless integer color transform for four color components.
Proceedings of the 2011 IEEE Visual Communications and Image Processing, 2011

A Key Derivation Scheme for Hierarchical Access Control to JPEG 2000 Coded Images.
Proceedings of the Advances in Image and Video Technology - 5th Pacific Rim Symposium, 2011

A leakage suppressed two-level security visual secret sharing scheme.
Proceedings of the International Symposium on Intelligent Signal Processing and Communications Systems, 2011

Low-Density Generator Matrix Codes for IP Packet Video Streaming with Backward Compatibility.
Proceedings of IEEE International Conference on Communications, 2011

Fast identification of JPEG 2000 images for digital cinema profiles.
Proceedings of the IEEE International Conference on Acoustics, 2011

A computing method for linear convolution in the DCT domain.
Proceedings of the 19th European Signal Processing Conference, 2011

2010
Phase-Only Correlation Based Matching in Scrambled Domain for Preventing Illegal Matching.
Trans. Data Hiding Multim. Secur., 2010

An FFT-Based Full-Search Block Matching Algorithm with Sum of Squared Differences Criterion.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Reversible Data Hiding Based on Adaptive Modulation of Statistics Invertibility.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Methods for Avoiding the Checkerboard Distortion Caused by Finite Word Length Error in Multirate System.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

An efficient access control method for composite multimedia content.
IEICE Electron. Express, 2010

A parameter memorization-free lossless data hiding method with flexible payload size.
IEICE Electron. Express, 2010

FFT-based full-search block matching using overlap-add method.
Proceedings of the Picture Coding Symposium, 2010

Avoidance of singular point in reversible KLT.
Proceedings of the Picture Coding Symposium, 2010

A Moving Object Detection Scheme in Codestream Domain for Motion JPEG Encoded Movies.
Proceedings of the Advances in Multimedia Information Processing - PCM 2010, 2010

Color-component bit allocation scheme for JPEG 2000 parallel codec.
Proceedings of the International Conference on Image Processing, 2010

Reversible color transform with compatiblity to irreversible transform.
Proceedings of the International Conference on Image Processing, 2010

Optimumization of lifting structure of reversible KLT based on permutation of signal's order and sign.
Proceedings of the International Conference on Image Processing, 2010

Double-search-window block matching using the fast fourier transform.
Proceedings of the IEEE International Conference on Acoustics, 2010

A lossless condition of lifting DWT for specific DC values.
Proceedings of the IEEE International Conference on Acoustics, 2010

A new lifting structure of non separable 2D DWT with compatibility to JPEG 2000.
Proceedings of the IEEE International Conference on Acoustics, 2010

Symmetric correlation and its properties.
Proceedings of the 18th European Signal Processing Conference, 2010

2009
Layered Low-Density Generator Matrix Codes for Super High Definition Scalable Video Coding System.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Parallel Processing of Distributed Video Coding to Reduce Decoding Time.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Foreword.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

A Reversible Image Authentication Method without Memorization of Hiding Parameters.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

A location map-free reversible data hiding method for specific area embedding.
IEICE Electron. Express, 2009

One-Time Key Based Phase Scrambling for Phase-Only Correlation between Visually Protected Images.
EURASIP J. Inf. Secur., 2009

Efficient Collusion Attack-free Access Control for Multidimensionally Hierarchical Scalability Content.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009

Identification of JPEG 2000 images in encrypted domain for digital cinema.
Proceedings of the International Conference on Image Processing, 2009

Non separable 2D factorization of separable 2D DWT for lossless image coding.
Proceedings of the International Conference on Image Processing, 2009

Phase scrambling for blind image matching.
Proceedings of the IEEE International Conference on Acoustics, 2009

Multiple-peak model fitting function for DCT sign phase correlation with non-integer shift precision.
Proceedings of the IEEE International Conference on Acoustics, 2009

Image matching between visually protected images with one-time key based phase scrambling.
Proceedings of the 17th European Signal Processing Conference, 2009

Reversible Information Hiding Considering Hierarchical Access Control.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
No-Reference PSNR Estimation for Quality Monitoring of Motion JPEG2000 Video Over Lossy Packet Networks.
IEEE Trans. Multim., 2008

An Efficient Reversible Image Authentication Method.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Accurate Identifying Method of JPEG2000 Images for Digital Cinema.
Proceedings of the Advances in Multimedia Modeling, 2008

A new structure of lifting wavelet for reducing rounding error.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008

A new class of image registration for guaranteeing secure data management.
Proceedings of the International Conference on Image Processing, 2008

Hierarchical encryption using short encryption keys for scalable access control of JPEG 2000 coded images.
Proceedings of the International Conference on Image Processing, 2008

A scrambling method for Motion JPEG videos enabling moving objects detection from scrambled videos.
Proceedings of the International Conference on Image Processing, 2008

A new class of lifting wavelet transform for guaranteeing losslessness of specific signals.
Proceedings of the IEEE International Conference on Acoustics, 2008

Image matching between scrambled images for secure data management.
Proceedings of the 2008 16th European Signal Processing Conference, 2008

A location map-free visible and reversible watermarking method with authentication ability.
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems, 2008

2007
Codeblock-Based Error Concealment for JPEG2000 Coded Image Transmission over RTP.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Special Section on Papers Selected from the 21st Symposium on Signal Processing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Lossless Data Hiding in the Spatial Domain for High Quality Images.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Encryption of Composite Multimedia Contents for Access Control.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

DCT Sign-Based Similarity Measure for JPEG Image Retrieval.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Codestream Domain Scrambling of Moving Objects Based on DCT Sign-only Correlation for Motion JPEG Movies.
Proceedings of the International Conference on Image Processing, 2007

Image Tamper Detection using Mathematical Morphology.
Proceedings of the International Conference on Image Processing, 2007

Collusion Attack-Resilient Hierarchical Encryption of JPEG 2000 Codestreams with Scalable Access Control.
Proceedings of the International Conference on Image Processing, 2007

A Location-Map Free Reversible Data Hiding Method using Block-Based Single Parameter.
Proceedings of the International Conference on Image Processing, 2007

Fast Method for Joint Retrieval and Identification of JPEG Coded Images Based on DCT Sign.
Proceedings of the International Conference on Image Processing, 2007

DCT Sign-Only Correlation with Application to Image Matching and the Relationship with Phase-Only Correlation.
Proceedings of the IEEE International Conference on Acoustics, 2007

2006
A digital watermarking scheme that preserves image quality and is applicable to watermark sequences from a variety of distributions.
Syst. Comput. Jpn., 2006

QoS Estimation Method for JPEG 2000 Coded Image at RTP Layer.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Special Section on Papers Selected from 2005 International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC2005).
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Fast Image Identification Methods for JPEG Images with Different Compression Ratios.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Hierarchical Encryption of Multimedia Contents for Access Control.
Proceedings of the International Conference on Image Processing, 2006

Fast and Robust Identification Methods for JPEG Images with Various Compression Ratios.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006

Codeblock-Based Concealment Scheme for JPEG2000 Images in Lossy Packet Networks.
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems 2006, 2006

DCT Sign Only Correlation and Its Application to Image Registration.
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems 2006, 2006

2005
A Method of Guaranteeing Image-Quality for Quantization-Based Watermarking Using a Nonorthogonal Transformation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

A scalable encryption method allowing backward compatibility with JPEG2000 images.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

Quantization-based image steganography without data hiding position memorization.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

Generalized hierarchical encryption of JPEG 2000 codestreams for access control.
Proceedings of the 2005 International Conference on Image Processing, 2005

Modulo arithmetic-based image watermarking and its theoretical analysis of image-quality.
Proceedings of the 2005 International Conference on Image Processing, 2005

2004
A fast image-scramble method using public-key encryption allowing backward compatibility with jpeg2000.
Proceedings of the 2004 International Conference on Image Processing, 2004

Efficient packet loss protection for JPEG2000 images enabling backward compatibility with a standard decoder.
Proceedings of the 2004 International Conference on Image Processing, 2004

An image-quality guaranteed method for quantization-based watermarking using a dwt.
Proceedings of the 2004 International Conference on Image Processing, 2004

2003
An Extension of ROI-Based Scalability for Progressive Transmission in JPEG2000 Coding.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

Lossless Video Coding Using Interleaved Multiple Frames.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

Error Protection for JPEG2000-Coded Images and Its Evaluation over OFDM Channel.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

Error Concealment Using Layer Structure for JPEG2000 Images.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

ROI-based scalability for progressive transmission in JPEG2000 coding.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

Error protection for JPEG2000 encoded images and its evaluation over OFDM channel.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

Error correction using data hiding technique for JPEG2000 images.
Proceedings of the 2003 International Conference on Image Processing, 2003

Partial-scrambling of images encoded using JPEG2000 without generating marker codes.
Proceedings of the 2003 International Conference on Image Processing, 2003

2002
A Method of Embedding Binary Data into JPEG Bitstreams.
Syst. Comput. Jpn., 2002

QCIF Video Coding Based on JPEG2000 Using Symmetry of Images.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

Multirate Repeating Method for Alias Free Subband Adaptive Filters.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

Error Concealment Using a Data Hiding Technique for MPEG Video.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

A Data Embedding Method Considering the Finite Word-Length for High Quality Images.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

Lossless JPEG2000 coding for lossy images and its applications.
Proceedings of the 11th European Signal Processing Conference, 2002

A method for embedding binary data into JPEG2000 bit streams based on the layer structure.
Proceedings of the 11th European Signal Processing Conference, 2002

Error concealment using layer structure for JPEG2000 images.
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems 2002, 2002

2001
Low-bit motion estimation with edge enhanced images for lowpower MPEG encoder.
Proceedings of the 2001 International Symposium on Circuits and Systems, 2001

2000
Motion Estimation With Power Scalability and its VHDL Model.
Proceedings of the 2000 International Conference on Image Processing, 2000

A Method of Extracting Embedded Binary Data from JPEG Bitstreams Using Standard JPEG Decoder.
Proceedings of the 2000 International Conference on Image Processing, 2000

Fast implementation technique for improving throughput of RLS adaptive filters.
Proceedings of the IEEE International Conference on Acoustics, 2000

Novel implementation technique of RLS algorithm for improving throughput of adaptive filters.
Proceedings of the 10th European Signal Processing Conference, 2000

1999
A design method of multidimensional linear-phase paraunitary filter banks with a lattice structure.
IEEE Trans. Signal Process., 1999

A method of inserting binary data into MPEG bitstreams.
Proceedings of the 1999 International Symposium on Circuits and Systems, ISCAS 1999, Orlando, Florida, USA, May 30, 1999

A Fast Full Search Block Matching Algorithm for Mpeg-4 Video.
Proceedings of the 1999 International Conference on Image Processing, 1999

A Method of Inserting Binary Data Into Mpeg Bitstreams for Video Index Labeling.
Proceedings of the 1999 International Conference on Image Processing, 1999

1998
Conditions for convergence of a delayless subband adaptive filter and its efficient implementation.
IEEE Trans. Signal Process., 1998

A design method OF 2-D axial-symmetric paraunitary filter banks with a lattice structure.
Proceedings of the 9th European Signal Processing Conference, 1998

A pipelined architecture for DLMS algorithm considering both hardware complexity and output latency.
Proceedings of the 9th European Signal Processing Conference, 1998

Multidimensional multirate filter without checkerboard effects.
Proceedings of the 9th European Signal Processing Conference, 1998

1997
Extended overlap-add and -save methods for multirate signal processing.
IEEE Trans. Signal Process., 1997

A new pipelined architecture of the LMS algorithm without degradation of convergence characteristics.
Proceedings of the 1997 IEEE International Conference on Acoustics, 1997

1996
A super-resolution method based on the discrete cosine transforms.
Proceedings of the 8th European Signal Processing Conference, 1996

A new design method of linear-phase paraunitary filter banks with an odd number of channels.
Proceedings of the 8th European Signal Processing Conference, 1996

A design method for oversampled paraunitary DFT filter banks using householder factorization.
Proceedings of the 8th European Signal Processing Conference, 1996

1995
Multidimensional Parallel Processing Methods for Rational Sampling Lattice Alteration.
Proceedings of the 1995 IEEE International Symposium on Circuits and Systems, ISCAS 1995, Seattle, Washington, USA, April 30, 1995

Improvement of convergence speed for subband adaptive digital filters using the multirate repeating method.
Proceedings of the 1995 International Conference on Acoustics, 1995

1994
A development of symmetric extension method for subband image coding.
IEEE Trans. Image Process., 1994

A subband adaptive filter allowing maximally decimation.
IEEE J. Sel. Areas Commun., 1994

A Technique to Improve Convergence Speed of the LMS Algorithm.
Proceedings of the 1994 IEEE International Symposium on Circuits and Systems, ISCAS 1994, London, England, UK, May 30, 1994

An Extended Overlap-Add Method and -Save Method for Sampling Rate Conversion.
Proceedings of the 1994 IEEE International Symposium on Circuits and Systems, ISCAS 1994, London, England, UK, May 30, 1994

Performance analysis of subband adaptive systems using an equivalent model.
Proceedings of ICASSP '94: IEEE International Conference on Acoustics, 1994

An LS based new gradient type adaptive algorithm-least squares gradient.
Proceedings of ICASSP '94: IEEE International Conference on Acoustics, 1994

1993
A parallel AR spectral estimation using a new class of filter bank.
Proceedings of the IEEE International Conference on Acoustics, 1993

1992
Property of circular convolution for subband image coding.
Proceedings of the 1992 IEEE International Conference on Acoustics, 1992

FSF (frequency sampling filter) bank for adaptive system identification.
Proceedings of the 1992 IEEE International Conference on Acoustics, 1992


  Loading...