Isao Echizen
Orcid: 0000-0003-4908-1860
According to our database1,
Isao Echizen
authored at least 271 papers
between 1999 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Knowl. Based Syst., 2025
2024
EURASIP J. Inf. Secur., December, 2024
Proc. ACM Hum. Comput. Interact., 2024
Psychometrics for Hypnopaedia-Aware Machinery via Chaotic Projection of Artificial Mental Imagery.
CoRR, 2024
Purification-Agnostic Proxy Learning for Agentic Copyright Watermarking against Adversarial Evidence Forgery.
CoRR, 2024
LookupForensics: A Large-Scale Multi-Task Dataset for Multi-Phase Image-Based Fact Verification.
CoRR, 2024
NewsUnfold: Creating a News-Reading Application That Indicates Linguistic Media Bias and Collects Feedback.
CoRR, 2024
Rethinking Invariance Regularization in Adversarial Training to Improve Robustness-Accuracy Trade-off.
CoRR, 2024
Fine-Tuning Text-To-Image Diffusion Models for Class-Wise Spurious Feature Generation.
CoRR, 2024
CoRR, 2024
Analysis of Fine-Grained Counting Methods for Masked Face Counting: A Comparative Study.
IEEE Access, 2024
IEEE Access, 2024
IEEE Access, 2024
Generalized Deepfakes Detection with Reconstructed-Blended Images and Multi-scale Feature Reconstruction Network.
Proceedings of the IEEE International Joint Conference on Biometrics, 2024
Proceedings of the IEEE International Joint Conference on Biometrics, 2024
Exploring Self-Supervised Vision Transformers for Deepfake Detection: A Comparative Analysis.
Proceedings of the IEEE International Joint Conference on Biometrics, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
Exploring Active Data Selection Strategies for Continuous Training in Deepfake Detection.
Proceedings of the International Conference of the Biometrics Special Interest Group, 2024
Leveraging Chat-Based Large Vision Language Models for Multimodal Out-of-Context Detection.
Proceedings of the Advanced Information Networking and Applications, 2024
Proceedings of the Advanced Information Networking and Applications, 2024
Enhancing Robustness of LLM-Synthetic Text Detectors for Academic Writing: A Comprehensive Analysis.
Proceedings of the Advanced Information Networking and Applications, 2024
2023
CoRR, 2023
CoRR, 2023
IEEE Access, 2023
Closer Look at the Transferability of Adversarial Examples: How They Fool Different Models Differently.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2023
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision Workshops, 2023
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2023
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023
Physics-Based Adversarial Attack on Near-Infrared Human Detector for Nighttime Surveillance Camera Systems.
Proceedings of the 31st ACM International Conference on Multimedia, 2023
From Deconstruction to Reconstruction: A Plug-In Module for Diffusion-Based Purification of Adversarial Examples.
Proceedings of the Digital Forensics and Watermarking - 22nd International Workshop, 2023
Proceedings of the IEEE International Joint Conference on Biometrics, 2023
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023
Quality Assurance of A GPT-Based Sentiment Analysis System: Adversarial Review Data Generation and Detection.
Proceedings of the 30th Asia-Pacific Software Engineering Conference, 2023
A Novel Statistical Measure for Out-of-Distribution Detection in Data Quality Assurance.
Proceedings of the 30th Asia-Pacific Software Engineering Conference, 2023
Proceedings of the Advanced Information Networking and Applications, 2023
VoteTRANS: Detecting Adversarial Text without Training by Voting on Hard Labels of Transformations.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023
2022
IEEE Trans. Biom. Behav. Identity Sci., 2022
Effects of Image Processing Operations on Adversarial Noise and Their Use in Detecting and Correcting Adversarial Images.
IEICE Trans. Inf. Syst., 2022
EURASIP J. Wirel. Commun. Netw., 2022
CoRR, 2022
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022
Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2022
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2022
Round Color 2D Symbol with Display Area and Secret Data Area for Business-to-Consumer Applications.
Proceedings of the 11th IEEE Global Conference on Consumer Electronics, 2022
A Multilingual Bag-of-Entities Model for Zero-Shot Cross-Lingual Text Classification.
Proceedings of the 26th Conference on Computational Natural Language Learning, 2022
Proceedings of the Handbook of Digital Face Manipulation and Detection, 2022
Proceedings of the Handbook of Digital Face Manipulation and Detection, 2022
2021
IEEE Trans. Inf. Theory, 2021
IEICE Trans. Inf. Syst., 2021
Effectiveness of Detection-based and Regression-based Approaches for Estimating Mask-Wearing Ratio.
CoRR, 2021
Steganographic Secret Sharing With GAN-Based Face Synthesis and Morphing for Trustworthy Authentication in IoT.
IEEE Access, 2021
OpenForensics: Large-Scale Challenging Dataset For Multi-Face Forgery Detection And Segmentation In-The-Wild.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021
Effectiveness of Detection-based and Regression-based Approaches for Estimating Mask-Wearing Ratio.
Proceedings of the 16th IEEE International Conference on Automatic Face and Gesture Recognition, 2021
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2021
Feature Extraction Based on Denoising Auto Encoder for Classification of Adversarial Examples.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2021
Proceedings of the Advanced Information Networking and Applications, 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
CoRR, 2020
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020
Implementation of Digital Signature on QR Symbol by Area Division Using Rhombic Sub-cells.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020
Proceedings of the IEEE International Conference on Image Processing, 2020
Generating Master Faces for Use in Performing Wolf Attacks on Face Recognition Systems.
Proceedings of the 2020 IEEE International Joint Conference on Biometrics, 2020
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020
A Method for Identifying Origin of Digital Images Using a Convolutional Neural Network.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020
Generating Sentiment-Preserving Fake Online Reviews Using Neural Language Models and Their Human- and Machine-Based Detection.
Proceedings of the Advanced Information Networking and Applications, 2020
2019
IEEE Trans. Inf. Theory, 2019
J. Inf. Process., 2019
J. Inf. Secur. Appl., 2019
CoRR, 2019
A Method for Identifying Origin of Digital Images Using a Convolution Neural Network.
CoRR, 2019
Efficient and error-tolerant schemes for non-adaptive complex group testing and its application in complex disease genetics.
CoRR, 2019
Proceedings of the Theory and Applications of Models of Computation, 2019
Proceedings of the 10th ISCA Speech Synthesis Workshop, 2019
Implementation of a Digital Signature in Backward-Compatible QR Codes Using Subcell Division and Double Encoding.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019
Proceedings of the IEEE International Conference on Acoustics, 2019
Audiovisual Speaker Conversion: Jointly and Simultaneously Transforming Facial Expression and Acoustic Characteristics.
Proceedings of the IEEE International Conference on Acoustics, 2019
Multi-task Learning for Detecting and Segmenting Manipulated Facial Images and Videos.
Proceedings of the 10th IEEE International Conference on Biometrics Theory, 2019
Proceedings of the 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2019
2018
Editor's Message to Special Issue of Computer Security Technologies for a Super Smart Society.
J. Inf. Process., 2018
BiometricJammer: Method to Prevent Acquisition of Biometric Information by Surreptitious Photography on Fingerprints.
IEICE Trans. Inf. Syst., 2018
A framework for generalized group testing with inhibitors and its potential application in neuroscience.
CoRR, 2018
Efficient Decoding Schemes for Noisy Non-Adaptive Group Testing when Noise Depends on Number of Items in Test.
CoRR, 2018
Transforming acoustic characteristics to deceive playback spoofing countermeasures of speaker verification systems.
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018
Lightweight Collaborative Semantic Scheme for Generating an Obfuscated Region to Ensure Location Privacy.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018
BiometricJammer: Use of Pseudo Fingerprint to Prevent Fingerprint Extraction from Camera Images without Inconveniencing Users.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018
Proceedings of the 32nd Pacific Asia Conference on Language, Information and Computation, 2018
Can we steal your vocal identity from the Internet?: Initial investigation of cloning Obama's voice using GAN, WaveNet and low-quality found data.
Proceedings of the Odyssey 2018: The Speaker and Language Recognition Workshop, 2018
Transformation on Computer-Generated Facial Image to Avoid Detection by Spoofing Detector.
Proceedings of the 2018 IEEE International Conference on Multimedia and Expo, 2018
High-Quality Nonparallel Voice Conversion Based on Cycle-Consistent Adversarial Network.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018
Proceedings of the IEEE 7th Global Conference on Consumer Electronics, 2018
Vietnamese Paraphrase Identification Using Matching Duplicate Phrases and Similar Words.
Proceedings of the Future Data and Security Engineering - 5th International Conference, 2018
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018
Modular Convolutional Neural Network for Discriminating between Computer-Generated Images and Photographic Images.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Provable Identity Based User Authentication Scheme on ECC in Multi-server Environment.
Wirel. Pers. Commun., 2017
Reversible Audio Information Hiding for Tampering Detection and Localization Using Sample Scanning Method.
J. Inf. Process., 2017
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017
Distinguishing computer graphics from natural images using convolution neural networks.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017
Proceedings of the Computational Linguistics, 2017
Digital Watermarking Scheme Based on Machine Learning for the IHC Evaluation Criteria.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017
Biometric Jammer: Preventing surreptitious fingerprint photography without inconveniencing users.
Proceedings of the 2017 IEEE International Joint Conference on Biometrics, 2017
PrivacyTag: A Community-Based Method for Protecting Privacy of Photographed Subjects in Online Social Networks.
Proceedings of the Digital Nations - Smart Cities, Innovation, and Sustainability, 2017
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017
Security Oriented Malicious Activity Diagrams to Support Information Systems Security.
Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, 2017
2016
Voice Liveness Detection for Speaker Verification based on a Tandem Single/Double-channel Pop Noise Detector.
Proceedings of the Odyssey 2016: The Speaker and Language Recognition Workshop, 2016
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016
Breaking Anonymity of Social Network Accounts by Using Coordinated and Extensible Classifiers Based on Machine Learning.
Proceedings of the Social Media: The Good, the Bad, and the Ugly, 2016
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016
Privacy-protected video surveillance in crowded environments using robust watermarking.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016
Provable User Authentication Scheme in Telecare Medicine Information System Using Elliptic Curve Cryptosystem.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
IR Hiding: Use of Specular Reflection for Short-Wavelength-Pass-Filter Detection to Prevent Re-recording of Screen Images.
Trans. Data Hiding Multim. Secur., 2015
An educational system to help students assess website features and identify high-risk websites.
Interact. Technol. Smart Educ., 2015
Int. J. Big Data Intell., 2015
Anonymizing Personal Text Messages Posted in Online Social Networks and Detecting Disclosures of Personal Information.
IEICE Trans. Inf. Syst., 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015
Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment.
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Proceedings of the 29th Pacific Asia Conference on Language, Information and Computation, 2015
Discriminating Between Computer-Generated Facial Images and Natural Ones Using Smoothness Property and Local Entropy.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015
Voice liveness detection algorithms based on pop noise caused by human breath for automatic speaker verification.
Proceedings of the 16th Annual Conference of the International Speech Communication Association, 2015
Surveillance Camera System Balancing Privacy Protection and Effective Surveillance Image Use.
Proceedings of the ICE-B 2015, 2015
Tradeoff Between the Price of Distributing a Database and Its Collusion Resistance Based on Concatenated Codes.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Evaluation of Matching Accuracy of Template Matching Using a Steganography Algorithm.
Proceedings of the Third International Symposium on Computing and Networking, 2015
Proceedings of the Business Information Systems Workshops, 2015
Proceedings of the Business Information Systems Workshops, 2015
Proceedings of the Business Information Systems Workshops, 2015
Efficient Authentication, Traitor Detection, and Privacy-Preserving for the Most Common Queries in Two-Tiered Wireless Sensor Networks.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
2014
An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata.
Electron. Mark., 2014
EURASIP J. Image Video Process., 2014
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
A Study of Equipment Dependence of a Single-Dot Pattern Method for an Information-Hiding by Applying an Error-Correcting Code.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Novel Proposal and Evaluation of Information Extraction Method from Artificial Fiber Pattern Using a Camera.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
A System for Anonymizing Temporal Phrases of Message Posted in Online Social Networks and for Detecting Disclosure.
Proceedings of the Ninth International Conference on Availability, 2014
Effects of External Information on Anonymity and Role of Transparency with Example of Social Network De-anonymisation.
Proceedings of the Ninth International Conference on Availability, 2014
2013
A Fast and Low-Distortion Capacity Adaptive Synchronized Acoustic-to-Acoustic Steganography Scheme.
Proceedings of the Recent Advances in Information Hiding and Applications, 2013
Reclaiming Location Privacy in Mobile Telephony Networks - Effects and Consequences for Providers and Subscribers.
IEEE Syst. J., 2013
NII Shonan Meet. Rep., 2013
Privacy Visor: Method Based on Light Absorbing and Reflecting Properties for Preventing Face Image Detection.
Proceedings of the IEEE International Conference on Systems, 2013
Framework Based on Privacy Policy Hiding for Preventing Unauthorized Face Image Processing.
Proceedings of the IEEE International Conference on Systems, 2013
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013
Limitations of Super Resolution Image Reconstruction and How to Overcome them for a Single Image.
Proceedings of the SIGMAP and WINSYS 2013, 2013
Ineluctable background checking on social networks: Linking job seeker's résumé and posts.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013
How Can We Acquire the Most Common Query Types in Two-Tiered Wireless Sensor Networks?
Proceedings of the Seventh International Conference on Next Generation Mobile Apps, 2013
A Color Extraction Method from Text for Use in Creating a Book Cover Image that Reflects Reader Impressions.
Proceedings of the Knowledge, Information and Creativity Support Systems: Recent Trends, Advances and Solutions - Selected Papers from KICSS'2013, 2013
Anonymizing Temporal Phrases in Natural Language Text to be Posted on Social Networking Services.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013
Reversible Audio Information Hiding Based on Integer DCT Coefficients with Adaptive Hiding Locations.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013
Proceedings of the Algorithms and Architectures for Parallel Processing, 2013
A User Privacy Protection Technique for Executing SQL over Encrypted Data in Database Outsourcing Service.
Proceedings of the Collaborative, Trusted and Privacy-Aware e/m-Services, 2013
Proceedings of the Collaborative, Trusted and Privacy-Aware e/m-Services, 2013
Securing Access to Complex Digital Artifacts - Towards a Controlled Processing Environment for Digital Research Data.
Proceedings of the Research and Advanced Technology for Digital Libraries, 2013
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013
Privacy Visor: Method for Preventing Face Image Detection by Using Differences in Human and Device Sensitivity.
Proceedings of the Communications and Multimedia Security, 2013
Experiment of Geometrically Invariant and Unneeded Synchronism Watermarking Using Winding Number.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
PC-Based Real-Time Video Watermark Embedding System Independent of Platform for Parallel Computing.
Trans. Data Hiding Multim. Secur., 2012
IR Hiding: Method for Preventing Illegal Recording of Videos Based on Differences in Sensory Perception between Humans and Devices.
Trans. Data Hiding Multim. Secur., 2012
Preventing unauthorized copying of displayed information by utilizing differences in spectral sensitivity between humans and imaging devices.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012
A Method for Resisting Averaging Attacks on Digital Watermarks and Use of This Method with Digital Watermarks.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012
Use of invisible noise signals to prevent privacy invasion through face recognition from camera images.
Proceedings of the 20th ACM Multimedia Conference, MM '12, Nara, Japan, October 29, 2012
Enhancement of Method for Preventing Unauthorized Copying of Displayed Information Using Object Surface Reflection.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012
Enhancement of method for preventing illegal recording of movies to enable it to detect cameras with attached infrared-cut filter.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
Automatic Anonymization of Natural Languages Texts Posted on Social Networking Services and Automatic Detection of Disclosure.
Proceedings of the Seventh International Conference on Availability, 2012
Evaluation of an Improved Visualization System for Helping Children Identify Risky Websites.
Proceedings of the Seventh International Conference on Availability, 2012
A Private Information Detector for Controlling Circulation of Private Information through Social Networks.
Proceedings of the Seventh International Conference on Availability, 2012
2011
Isolation im Cloud-Computing und Mechanismen zum Schutz der Privatsphäre - Eignung von Mechanismen zum Schutz der Privatsphäre für die Trennung der Datenverarbeitung in Geschäftsprozessen.
Wirtschaftsinf., 2011
J. Supercomput., 2011
On Privacy-compliant Disclosure of Personal Data to Third Parties using Digital Watermarking.
J. Inf. Hiding Multim. Signal Process., 2011
Isolation in Cloud Computing and Privacy-Enhancing Technologies - Suitability of Privacy-Enhancing Technologies for Separating Data Usage in Business Processes.
Bus. Inf. Syst. Eng., 2011
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011
iCabinet: stand-alone implementation of a method for preventing illegal recording of displayed content by adding invisible noise signals.
Proceedings of the 19th International Conference on Multimedia 2011, Scottsdale, AZ, USA, November 28, 2011
IR Hiding: Method to Prevent Re-recording Screen Image Built in Short Wavelength Pass Filter Detection Method Using Specular Reflection.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
Countermeasure of re-recording prevention against attack with short wavelength pass filter.
Proceedings of the 18th IEEE International Conference on Image Processing, 2011
A Mutual and Pseudo Inverse Matrix - Based Authentication Mechanism for Outsourcing Service.
Proceedings of the Intelligent Information and Database Systems, 2011
Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of Disasters.
Proceedings of the Sixth International Conference on Availability, 2011
2010
J. Inf. Hiding Multim. Signal Process., 2010
Privacy-compliant Disclosure of Personal Data to Third Parties (Schutz der Privatsphäre bei der Weitergabe persönlicher Daten an Dritte).
it Inf. Technol., 2010
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010
IR Hiding: A Method to Prevent Video Re-shooting by Exploiting Differences between Human Perceptions and Recording Device Characteristics.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010
Proceedings of the Digital Watermarking - 9th International Workshop, 2010
Privacy by Data Provenance with Digital Watermarking - A Proof-of-Concept Implementation for Medical Services with Electronic Health Records.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010
Unified Metric for Measuring Anonymity and Privacy with Application to Online Social Network.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010
Proceedings of the Advances in Digital Forensics VI, 2010
Preventing re-recording based on difference between sensory perceptions of humans and devices.
Proceedings of the International Conference on Image Processing, 2010
Proceedings of the Software Services for e-World, 2010
Proceedings of the U- and E-Service, Science and Technology, 2010
Approach to Privacy-Preserve Data in Two-Tiered Wireless Sensor Network Based on Linear System and Histogram.
Proceedings of the U- and E-Service, Science and Technology, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
Binomial-Mix-Based Location Anonymizer System with Global Dummy Generation to Preserve User Location Privacy in Location-Based Services.
Proceedings of the ARES 2010, 2010
2009
Int. J. Knowl. Based Intell. Eng. Syst., 2009
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
On Privacy in Business Processes - Observing Delegation of Personal Data by using Digital Watermarking.
Proceedings of the ICE-B 2009, 2009
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
2008
Evaluation of PC-Based Real-Time Watermark Embedding System for Standard-Definition Video Stream.
Proceedings of the New Directions in Intelligent Interactive Multimedia, 2008
Evaluation of Integrity Verification System for Video Content Using Digital Watermarking.
Proceedings of the New Directions in Intelligent Interactive Multimedia, 2008
Robust Video Watermarking based on Dual-plane Correlation for Immunity to Rotation, Scale, Translation, and Random Distortion.
J. Digit. Inf. Manag., 2008
Evaluation and Improvement of Digital Watermarking Algorithm Based on Cryptographic Security Models.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Pool-Based APROB Channel to Provide Resistance against Global Active Adversary under Probabilistic Real-Time Condition.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
Electronic Voting Scheme to Maintain Anonymity in Small-scale Election by Hiding the Number of Votes.
Proceedings of the The Third International Conference on Availability, 2008
2007
Proceedings of the Intelligent Multimedia Data Hiding: New Directions, 2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
2006
Inf. Media Technol., 2006
Maintaining Picture Quality and Improving Robustness of Color Watermarking by Using Human Vision Models.
IEICE Trans. Inf. Syst., 2006
Proceedings of the IEEE International Conference on Systems, 2006
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006
Dual-Plane Watermarking for Color Pictures Immune to Rotation, Scale, Translation, and Random Bending.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006
2005
Int. J. Image Graph., 2005
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Proceedings of the IEEE International Conference on Systems, 2005
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Correlation-based model of color picture watermarking against random geometric distortion.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005
2004
Color Picture Watermarking Correlating Two Constituent Planes for Immunity to Random Geometric Distortion.
IEICE Trans. Inf. Syst., 2004
Proceedings of the IEEE International Conference on Systems, 2004
2003
Proceedings of the Digital Watermarking, Second International Workshop, 2003
1999
IEEE Trans. Consumer Electron., 1999