default search action
Isao Echizen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j52]Khanh-Duy Nguyen, Huy H. Nguyen, Trung-Nghia Le, Junichi Yamagishi, Isao Echizen:
Analysis of Fine-Grained Counting Methods for Masked Face Counting: A Comparative Study. IEEE Access 12: 27426-27443 (2024) - [j51]Hichem Felouat, Huy H. Nguyen, Trung-Nghia Le, Junichi Yamagishi, Isao Echizen:
eKYC-DF: A Large-Scale Deepfake Dataset for Developing and Evaluating eKYC Systems. IEEE Access 12: 30876-30892 (2024) - [j50]April Pyone Maung Maung, Isao Echizen, Hitoshi Kiya:
On the Security of Learnable Image Encryption for Privacy-Preserving Deep Learning. IEEE Access 12: 126415-126425 (2024) - [j49]Shuying Xu, Ching-Chun Chang, Huy H. Nguyen, Isao Echizen:
Reversible anonymization for privacy of facial biometrics via cyclic learning. EURASIP J. Inf. Secur. 2024(1): 24 (2024) - [c180]Fatma Shalabi, Hichem Felouat, Huy H. Nguyen, Isao Echizen:
Leveraging Chat-Based Large Vision Language Models for Multimodal Out-of-Context Detection. AINA (4) 2024: 86-98 - [c179]Zhicheng Dou, Yuchen Guo, Ching-Chun Chang, Huy H. Nguyen, Isao Echizen:
Enhancing Robustness of LLM-Synthetic Text Detectors for Academic Writing: A Comprehensive Analysis. AINA (4) 2024: 266-277 - [c178]Manish Pandey, Harkeerat Kaur, Sudipta Basak, Isao Echizen:
Privacy-Preserving Location-Based Services: A DQN Algorithmic Perspective. AINA (4) 2024: 384-399 - [c177]Folco Bertini Baldassini, Huy H. Nguyen, Ching-Chung Chang, Isao Echizen:
Cross-Attention watermarking of Large Language Models. ICASSP 2024: 4625-4629 - [i68]Barry Shichen Hu, Siyun Liang, Johannes Paetzold, Huy H. Nguyen, Isao Echizen, Jiapeng Tang:
Surface Normal Estimation with Transformers. CoRR abs/2401.05745 (2024) - [i67]Folco Bertini Baldassini, Huy H. Nguyen, Ching-Chung Chang, Isao Echizen:
Cross-Attention Watermarking of Large Language Models. CoRR abs/2401.06829 (2024) - [i66]Tinghui Ouyang, AprilPyone MaungMaung, Koichi Konishi, Yoshiki Seo, Isao Echizen:
Stability Analysis of ChatGPT-based Sentiment Analysis in AI Quality Assurance. CoRR abs/2401.07441 (2024) - [i65]Zhicheng Dou, Yuchen Guo, Ching-Chun Chang, Huy H. Nguyen, Isao Echizen:
Enhancing Robustness of LLM-Synthetic Text Detectors for Academic Writing: A Comprehensive Analysis. CoRR abs/2401.08046 (2024) - [i64]AprilPyone MaungMaung, Huy H. Nguyen, Hitoshi Kiya, Isao Echizen:
Fine-Tuning Text-To-Image Diffusion Models for Class-Wise Spurious Feature Generation. CoRR abs/2402.08200 (2024) - [i63]Futa Waseda, Isao Echizen:
Rethinking Invariance Regularization in Adversarial Training to Improve Robustness-Accuracy Trade-off. CoRR abs/2402.14648 (2024) - [i62]Fatma Shalabi, Hichem Felouat, Huy H. Nguyen, Isao Echizen:
Leveraging Chat-Based Large Vision Language Models for Multimodal Out-Of-Context Detection. CoRR abs/2403.08776 (2024) - [i61]Fatma Shalabi, Huy H. Nguyen, Hichem Felouat, Ching-Chun Chang, Isao Echizen:
Image-Text Out-Of-Context Detection Using Synthetic Multimodal Misinformation. CoRR abs/2403.08783 (2024) - [i60]Huy H. Nguyen, Junichi Yamagishi, Isao Echizen:
Exploring Self-Supervised Vision Transformers for Deepfake Detection: A Comparative Analysis. CoRR abs/2405.00355 (2024) - [i59]Felix Hsieh, Huy H. Nguyen, AprilPyone MaungMaung, Dmitrii Usynin, Isao Echizen:
Mitigating Backdoor Attacks using Activation-Guided Model Editing. CoRR abs/2407.07662 (2024) - [i58]Hanrui Wang, Ching-Chun Chang, Chun-Shien Lu, Isao Echizen:
Towards Efficient Transferable Preemptive Adversarial Defense. CoRR abs/2407.15524 (2024) - [i57]Smi Hinterreiter, Martin Wessel, Fabian Schliski, Isao Echizen, Marc Erich Latoschik, Timo Spinde:
NewsUnfold: Creating a News-Reading Application That Indicates Linguistic Media Bias and Collects Feedback. CoRR abs/2407.17045 (2024) - [i56]Smi Hinterreiter, Timo Spinde, Sebastian Oberdörfer, Isao Echizen, Marc Erich Latoschik:
News Ninja: Gamified Annotation of Linguistic Bias in Online News. CoRR abs/2407.17111 (2024) - [i55]Shuhan Cui, Huy H. Nguyen, Trung-Nghia Le, Chun-Shien Lu, Isao Echizen:
LookupForensics: A Large-Scale Multi-Task Dataset for Multi-Phase Image-Based Fact Verification. CoRR abs/2407.18614 (2024) - [i54]Erjin Bao, Ching-Chun Chang, Hanrui Wang, Isao Echizen:
Purification-Agnostic Proxy Learning for Agentic Copyright Watermarking against Adversarial Evidence Forgery. CoRR abs/2409.01541 (2024) - 2023
- [j48]Ching-Chun Chang, Xu Wang, Sisheng Chen, Isao Echizen, Victor Sanchez, Chang-Tsun Li:
Deep Learning for Predictive Analytics in Reversible Steganography. IEEE Access 11: 3494-3510 (2023) - [j47]Ching-Chun Chang, Huy H. Nguyen, Junichi Yamagishi, Isao Echizen:
Cyber Vaccine for Deepfake Immunity. IEEE Access 11: 105027-105039 (2023) - [j46]Masaru Kitsuregawa, Shigeo Urushidani, Kazutsuna Yamaji, Hiroki Takakura, Ichiro Hasuo, Imari Sato, Fuyuki Ishikawa, Isao Echizen, Kensaku Mori:
Activities of National Institute of Informatics in Japan. Commun. ACM 66(7): 58-63 (2023) - [j45]Ching-Chun Chang, Xu Wang, Sisheng Chen, Hitoshi Kiya, Isao Echizen:
On the predictability in reversible steganography. Telecommun. Syst. 82(2): 301-313 (2023) - [c176]Hoang-Quoc Nguyen-Son, Seira Hidano, Kazuhide Fukushima, Shinsaku Kiyomoto, Isao Echizen:
VoteTRANS: Detecting Adversarial Text without Training by Voting on Hard Labels of Transformations. ACL (Findings) 2023: 5090-5104 - [c175]Harkeerat Kaur, Rishabh Shukla, Isao Echizen, Pritee Khanna:
Secure and Privacy Preserving Proxy Biometric Identities. AINA (2) 2023: 487-500 - [c174]Tinghui Ouyang, Hoang-Quoc Nguyen-Son, Huy H. Nguyen, Isao Echizen, Yoshiki Seo:
Quality Assurance of A GPT-Based Sentiment Analysis System: Adversarial Review Data Generation and Detection. APSEC 2023: 450-457 - [c173]Tinghui Ouyang, Isao Echizen, Yoshiki Seo:
A Novel Statistical Measure for Out-of-Distribution Detection in Data Quality Assurance. APSEC 2023: 458-464 - [c172]Fatma Shalabi, Huy H. Nguyen, Hichem Felouat, Ching-Chun Chang, Isao Echizen:
Image-Text Out-Of-Context Detection Using Synthetic Multimodal Misinformation. APSIPA ASC 2023: 605-612 - [c171]AprilPyone MaungMaung, Isao Echizen, Hitoshi Kiya:
Hindering Adversarial Attacks with Multiple Encrypted Patch Embeddings. APSIPA ASC 2023: 1398-1404 - [c170]Huy H. Nguyen, Junichi Yamagishi, Isao Echizen:
How Close Are Other Computer Vision Tasks to Deepfake Detection? IJCB 2023: 1-10 - [c169]Erjin Bao, Ching-Chun Chang, Huy H. Nguyen, Isao Echizen:
From Deconstruction to Reconstruction: A Plug-In Module for Diffusion-Based Purification of Adversarial Examples. IWDW 2023: 48-62 - [c168]Muyao Niu, Zhuoxiao Li, Yifan Zhan, Huy H. Nguyen, Isao Echizen, Yinqiang Zheng:
Physics-Based Adversarial Attack on Near-Infrared Human Detector for Nighttime Surveillance Camera Systems. ACM Multimedia 2023: 8799-8807 - [c167]Rishabh Shukla, Harkeerat Kaur, Isao Echizen, Pritee Khanna:
Fingerprint Digital Twin for Secure and Privacy Preserving Biometric Authentication. SMC 2023: 1805-1812 - [c166]Yuyang Sun, Zhiyong Zhang, Isao Echizen, Huy H. Nguyen, Changzhen Qiu, Lu Sun:
Face Forgery Detection Based on Facial Region Displacement Trajectory Series. WACV (Workshops) 2023: 633-642 - [c165]Futa Waseda, Sosuke Nishikawa, Trung-Nghia Le, Huy H. Nguyen, Isao Echizen:
Closer Look at the Transferability of Adversarial Examples: How They Fool Different Models Differently. WACV 2023: 1360-1368 - [c164]Huy H. Nguyen, Trung-Nghia Le, Junichi Yamagishi, Isao Echizen:
Analysis of Master Vein Attacks on Finger Vein Recognition Systems. WACV 2023: 1900-1908 - [i53]Ching-Chun Chang, Huy Hong Nguyen, Junichi Yamagishi, Isao Echizen:
Cyber Vaccine for Deepfake Immunity. CoRR abs/2303.02659 (2023) - [i52]Hoang-Quoc Nguyen-Son, Seira Hidano, Kazuhide Fukushima, Shinsaku Kiyomoto, Isao Echizen:
VoteTRANS: Detecting Adversarial Text without Training by Voting on Hard Labels of Transformations. CoRR abs/2306.01273 (2023) - [i51]AprilPyone MaungMaung, Isao Echizen, Hitoshi Kiya:
Hindering Adversarial Attacks with Multiple Encrypted Patch Embeddings. CoRR abs/2309.01620 (2023) - [i50]Lukas Strack, Futa Waseda, Huy H. Nguyen, Yinqiang Zheng, Isao Echizen:
Defending Against Physical Adversarial Patch Attacks on Infrared Human Detection. CoRR abs/2309.15519 (2023) - [i49]Huy H. Nguyen, Junichi Yamagishi, Isao Echizen:
How Close are Other Computer Vision Tasks to Deepfake Detection? CoRR abs/2310.00922 (2023) - [i48]Tinghui Ouyang, Hoang-Quoc Nguyen-Son, Huy H. Nguyen, Isao Echizen, Yoshiki Seo:
Quality Assurance of A GPT-based Sentiment Analysis System: Adversarial Review Data Generation and Detection. CoRR abs/2310.05312 (2023) - [i47]Tinghui Ouyang, Isao Echizen, Yoshiki Seo:
A Novel Statistical Measure for Out-of-Distribution Detection in Data Quality Assurance. CoRR abs/2310.07998 (2023) - [i46]AprilPyone MaungMaung, Isao Echizen, Hitoshi Kiya:
Efficient Key-Based Adversarial Defense for ImageNet by Using Pre-trained Model. CoRR abs/2311.16577 (2023) - [i45]Yuyang Sun, Huy H. Nguyen, Chun-Shien Lu, Zhiyong Zhang, Lu Sun, Isao Echizen:
Generalized Deepfakes Detection with Reconstructed-Blended Images and Multi-scale Feature Reconstruction Network. CoRR abs/2312.08020 (2023) - 2022
- [j44]Kai Gao, Ching-Chun Chang, Ji-Hwei Horng, Isao Echizen:
Steganographic secret sharing via AI-generated photorealistic images. EURASIP J. Wirel. Commun. Netw. 2022(1): 119 (2022) - [j43]Thach V. Bui, Isao Echizen, Minoru Kuribayashi, Tetsuya Kojima, Thuc Dinh Nguyen:
Group Testing with Blocks of Positives and Inhibitors. Entropy 24(11): 1562 (2022) - [j42]Huy H. Nguyen, Minoru Kuribayashi, Junichi Yamagishi, Isao Echizen:
Effects of Image Processing Operations on Adversarial Noise and Their Use in Detecting and Correcting Adversarial Images. IEICE Trans. Inf. Syst. 105-D(1): 65-77 (2022) - [j41]Huy H. Nguyen, Sébastien Marcel, Junichi Yamagishi, Isao Echizen:
Master Face Attacks on Face Recognition Systems. IEEE Trans. Biom. Behav. Identity Sci. 4(3): 398-411 (2022) - [c163]Sosuke Nishikawa, Ikuya Yamada, Yoshimasa Tsuruoka, Isao Echizen:
A Multilingual Bag-of-Entities Model for Zero-Shot Cross-Lingual Text Classification. CoNLL 2022: 1-12 - [c162]Nobuyuki Teraura, Isao Echizen, Keiichi Iwamura:
Round Color 2D Symbol with Display Area and Secret Data Area for Business-to-Consumer Applications. GCCE 2022: 793-797 - [c161]Miki Tanaka, Isao Echizen, Hitoshi Kiya:
On the Transferability of Adversarial Examples between Encrypted Models. ISPACS 2022: 1-4 - [c160]Sosuke Nishikawa, Ryokan Ri, Ikuya Yamada, Yoshimasa Tsuruoka, Isao Echizen:
EASE: Entity-Aware Contrastive Learning of Sentence Embedding. NAACL-HLT 2022: 3870-3885 - [c159]Trung-Nghia Le, Ta Gu, Huy H. Nguyen, Isao Echizen:
Rethinking Adversarial Examples for Location Privacy Protection. WIFS 2022: 1-6 - [p6]Huy H. Nguyen, Junichi Yamagishi, Isao Echizen:
Capsule-Forensics Networks for Deepfake Detection. Handbook of Digital Face Manipulation and Detection 2022: 275-301 - [p5]Ruben Tolosana, Christian Rathgeb, Rubén Vera-Rodríguez, Christoph Busch, Luisa Verdoliva, Siwei Lyu, Huy H. Nguyen, Junichi Yamagishi, Isao Echizen, Peter Rot, Klemen Grm, Vitomir Struc, Antitza Dantcheva, Zahid Akhtar, Sergio Romero-Tapiador, Julian Fiérrez, Aythami Morales, Javier Ortega-Garcia, Els Kindt, Catherine Jasserand, Tarmo Kalvet, Marek Tiits:
Future Trends in Digital Face Manipulation and Detection. Handbook of Digital Face Manipulation and Detection 2022: 463-482 - [i44]Ching-Chun Chang, Xu Wang, Sisheng Chen, Isao Echizen:
Less is More: Reversible Steganography with Uncertainty-Aware Predictive Analytics. CoRR abs/2202.02518 (2022) - [i43]Trung-Nghia Le, Huy H. Nguyen, Junichi Yamagishi, Isao Echizen:
Robust Deepfake On Unrestricted Media: Generation And Detection. CoRR abs/2202.06228 (2022) - [i42]Sosuke Nishikawa, Ryokan Ri, Ikuya Yamada, Yoshimasa Tsuruoka, Isao Echizen:
EASE: Entity-Aware Contrastive Learning of Sentence Embedding. CoRR abs/2205.04260 (2022) - [i41]Trung-Nghia Le, Ta Gu, Huy H. Nguyen, Isao Echizen:
Rethinking Adversarial Examples for Location Privacy Protection. CoRR abs/2206.14020 (2022) - [i40]Miki Tanaka, Isao Echizen, Hitoshi Kiya:
On the Transferability of Adversarial Examples between Encrypted Models. CoRR abs/2209.02997 (2022) - [i39]Ryota Iijima, Miki Tanaka, Isao Echizen, Hitoshi Kiya:
On the Adversarial Transferability of ConvMixer Models. CoRR abs/2209.08724 (2022) - [i38]Huy H. Nguyen, Trung-Nghia Le, Junichi Yamagishi, Isao Echizen:
Analysis of Master Vein Attacks on Finger Vein Recognition Systems. CoRR abs/2210.10667 (2022) - [i37]Yuyang Sun, Zhiyong Zhang, Isao Echizen, Huy H. Nguyen, Changzhen Qiu, Lu Sun:
Face Forgery Detection Based on Facial Region Displacement Trajectory Series. CoRR abs/2212.03678 (2022) - [i36]Harkeerat Kaur, Rishabh Shukla, Isao Echizen, Pritee Khanna:
Secure and Privacy Preserving Proxy Biometrics Identities. CoRR abs/2212.10812 (2022) - 2021
- [j40]Sisheng Chen, Ching-Chun Chang, Isao Echizen:
Steganographic Secret Sharing With GAN-Based Face Synthesis and Morphing for Trustworthy Authentication in IoT. IEEE Access 9: 116427-116439 (2021) - [j39]Noboru Babaguchi, Isao Echizen, Junichi Yamagishi, Naoko Nitta, Yuta Nakashima, Kazuaki Nakamura, Kazuhiro Kono, Fuming Fang, Seiko Myojin, Zhenzhong Kuang, Huy H. Nguyen, Ngoc-Dung T. Tieu:
Preventing Fake Information Generation Against Media Clone Attacks. IEICE Trans. Inf. Syst. 104-D(1): 2-11 (2021) - [j38]Isao Echizen, Noboru Babaguchi, Junichi Yamagishi, Naoko Nitta, Yuta Nakashima, Kazuaki Nakamura, Kazuhiro Kono, Fuming Fang, Seiko Myojin, Zhenzhong Kuang, Huy H. Nguyen, Ngoc-Dung T. Tieu:
Generation and Detection of Media Clones. IEICE Trans. Inf. Syst. 104-D(1): 12-23 (2021) - [j37]Thach V. Bui, Mahdi Cheraghchi, Isao Echizen:
Improved Non-Adaptive Algorithms for Threshold Group Testing With a Gap. IEEE Trans. Inf. Theory 67(11): 7180-7196 (2021) - [c158]Harkeerat Kaur, Rohit Kumar, Isao Echizen:
Reinforcement Learning Based Smart Data Agent for Location Privacy. AINA (2) 2021: 657-671 - [c157]Yuma Yamasaki, Minoru Kuribayashi, Nobuo Funabiki, Huy H. Nguyen, Isao Echizen:
Feature Extraction Based on Denoising Auto Encoder for Classification of Adversarial Examples. APSIPA ASC 2021: 1815-1820 - [c156]Marc Treu, Trung-Nghia Le, Huy H. Nguyen, Junichi Yamagishi, Isao Echizen:
Fashion-Guided Adversarial Attack on Person Segmentation. CVPR Workshops 2021: 943-952 - [c155]Khanh-Duy Nguyen, Hai-Dang Nguyen, Trung-Nghia Le, Junichi Yamagishi, Isao Echizen:
Effectiveness of Detection-based and Regression-based Approaches for Estimating Mask-Wearing Ratio. FG 2021: 1-8 - [c154]Trung-Nghia Le, Huy H. Nguyen, Junichi Yamagishi, Isao Echizen:
OpenForensics: Large-Scale Challenging Dataset For Multi-Face Forgery Detection And Segmentation In-The-Wild. ICCV 2021: 10097-10107 - [i35]Marc Treu, Trung-Nghia Le, Huy H. Nguyen, Junichi Yamagishi, Isao Echizen:
Fashion-Guided Adversarial Attack on Person Segmentation. CoRR abs/2104.08422 (2021) - [i34]Ching-Chun Chang, Xu Wang, Sisheng Chen, Isao Echizen, Victor Sanchez, Chang-Tsun Li:
Deep Learning for Reversible Steganography: Principles and Insights. CoRR abs/2106.06924 (2021) - [i33]Trung-Nghia Le, Huy H. Nguyen, Junichi Yamagishi, Isao Echizen:
OpenForensics: Large-Scale Challenging Dataset For Multi-Face Forgery Detection And Segmentation In-The-Wild. CoRR abs/2107.14480 (2021) - [i32]Huy H. Nguyen, Sébastien Marcel, Junichi Yamagishi, Isao Echizen:
Master Face Attacks on Face Recognition Systems. CoRR abs/2109.03398 (2021) - [i31]Sosuke Nishikawa, Ikuya Yamada, Yoshimasa Tsuruoka, Isao Echizen:
A Multilingual Bag-of-Entities Model for Zero-Shot Cross-Lingual Text Classification. CoRR abs/2110.07792 (2021) - [i30]Khanh-Duy Nguyen, Huy H. Nguyen, Trung-Nghia Le, Junichi Yamagishi, Isao Echizen:
Effectiveness of Detection-based and Regression-based Approaches for Estimating Mask-Wearing Ratio. CoRR abs/2111.12888 (2021) - [i29]Minh-Quan Le, Trung-Nghia Le, Tam V. Nguyen, Isao Echizen, Minh-Triet Tran:
Multimodal-based Scene-Aware Framework for Aquatic Animal Segmentation. CoRR abs/2112.06193 (2021) - [i28]Futa Waseda, Sosuke Nishikawa, Trung-Nghia Le, Huy H. Nguyen, Isao Echizen:
Closer Look at the Transferability of Adversarial Examples: How They Fool Different Models Differently. CoRR abs/2112.14337 (2021) - 2020
- [j36]Tatsuya Yasui, Minoru Kuribayashi, Nobuo Funabiki, Isao Echizen:
Near-Optimal Detection for Binary Tardos Code by Estimating Collusion Strategy. IEEE Trans. Inf. Forensics Secur. 15: 2069-2080 (2020) - [c153]David Ifeoluwa Adelani, Haotian Mai, Fuming Fang, Huy H. Nguyen, Junichi Yamagishi, Isao Echizen:
Generating Sentiment-Preserving Fake Online Reviews Using Neural Language Models and Their Human- and Machine-Based Detection. AINA 2020: 1341-1354 - [c152]Rong Huang, Fuming Fang, Huy H. Nguyen, Junichi Yamagishi, Isao Echizen:
A Method for Identifying Origin of Digital Images Using a Convolutional Neural Network. APSIPA 2020: 1293-1299 - [c151]Akinori Higashi, Minoru Kuribayashi, Nobuo Funabiki, Huy H. Nguyen, Isao Echizen:
Detection of Adversarial Examples Based on Sensitivities to Noise Removal Filter. APSIPA 2020: 1386-1391 - [c150]Nobuyuki Teraura, Isao Echizen, Keiichi Iwamura:
A QR Symbol with ECDSA for Both Public and Secret Areas using Rhombic Sub-cells. APSIPA 2020: 1392-1399 - [c149]Ngoc-Dung T. Tieu, Junichi Yamagishi, Isao Echizen:
Color Transfer to Anonymized Gait Images While Maintaining Anonymization. APSIPA 2020: 1406-1413 - [c148]Huy H. Nguyen, Junichi Yamagishi, Isao Echizen, Sébastien Marcel:
Generating Master Faces for Use in Performing Wolf Attacks on Face Recognition Systems. IJCB 2020: 1-10 - [c147]Rong Huang, Fuming Fang, Huy H. Nguyen, Junichi Yamagishi, Isao Echizen:
Security of Facial Forensics Models Against Adversarial Attacks. ICIP 2020: 2236-2240 - [c146]Nobuyuki Teraura, Isao Echizen, Keiichi Iwamura:
Implementation of Digital Signature on QR Symbol by Area Division Using Rhombic Sub-cells. IMIS 2020: 624-638 - [c145]Thach V. Bui, Mahdi Cheraghchi, Isao Echizen:
Improved non-adaptive algorithms for threshold group testing with a gap. ISIT 2020: 1414-1419 - [c144]Harkeerat Kaur, Isao Echizen, Rohit Kumar:
Smart Data Agent for Preserving Location Privacy. SSCI 2020: 2567-2575 - [i27]Thach V. Bui, Mahdi Cheraghchi, Isao Echizen:
Improved non-adaptive algorithms for threshold group testing with a gap. CoRR abs/2001.01008 (2020) - [i26]Huy H. Nguyen, Junichi Yamagishi, Isao Echizen, Sébastien Marcel:
Generating Master Faces for Use in Performing Wolf Attacks on Face Recognition Systems. CoRR abs/2006.08376 (2020) - [i25]Saurabh Gupta, Huy H. Nguyen, Junichi Yamagishi, Isao Echizen:
Viable Threat on News Reading: Generating Biased News Using Natural Language Models. CoRR abs/2010.02150 (2020)
2010 – 2019
- 2019
- [j35]Ngoc-Dung T. Tieu, Huy H. Nguyen, Hoang-Quoc Nguyen-Son, Junichi Yamagishi, Isao Echizen:
Spatio-temporal generative adversarial network for gait anonymization. J. Inf. Secur. Appl. 46: 307-319 (2019) - [j34]Thach V. Bui, Minoru Kuribayashi, Tetsuya Kojima, Roghayyeh Haghvirdinezhad, Isao Echizen:
Efficient (nonrandom) Construction and Decoding for Non-adaptive Group Testing. J. Inf. Process. 27: 245-256 (2019) - [j33]Thach V. Bui, Minoru Kuribayashi, Mahdi Cheraghchi, Isao Echizen:
Efficiently Decodable Non-Adaptive Threshold Group Testing. IEEE Trans. Inf. Theory 65(9): 5519-5528 (2019) - [c143]Ngoc-Dung T. Tieu, Huy H. Nguyen, Fuming Fang, Junichi Yamagishi, Isao Echizen:
An RGB Gait Anonymization Model for Low-Quality Silhouettes. APSIPA 2019: 1686-1693 - [c142]Huy H. Nguyen, Fuming Fang, Junichi Yamagishi, Isao Echizen:
Multi-task Learning for Detecting and Segmenting Manipulated Facial Images and Videos. BTAS 2019: 1-8 - [c141]Huy H. Nguyen, Junichi Yamagishi, Isao Echizen:
Capsule-forensics: Using Capsule Networks to Detect Forged Images and Videos. ICASSP 2019: 2307-2311 - [c140]Fuming Fang, Xin Wang, Junichi Yamagishi, Isao Echizen:
Audiovisual Speaker Conversion: Jointly and Simultaneously Transforming Facial Expression and Acoustic Characteristics. ICASSP 2019: 6795-6799 - [c139]Nobuyuki Teraura, Isao Echizen, Keiichi Iwamura:
Implementation of a Digital Signature in Backward-Compatible QR Codes Using Subcell Division and Double Encoding. IMIS 2019: 466-476 - [c138]Fuming Fang, Xin Wang, Junichi Yamagishi, Isao Echizen, Massimiliano Todisco, Nicholas W. D. Evans, Jean-François Bonastre:
Speaker Anonymization Using X-vector and Neural Waveform Models. SSW 2019: 155-160 - [c137]Thach V. Bui, Minoru Kuribayashi, Tetsuya Kojima, Isao Echizen:
Sublinear Decoding Schemes for Non-adaptive Group Testing with Inhibitors. TAMC 2019: 93-113 - [i24]Thach V. Bui, Minoru Kuribayashi, Mahdi Cheraghchi, Isao Echizen:
Improved encoding and decoding for non-adaptive threshold group testing. CoRR abs/1901.02283 (2019) - [i23]Thach V. Bui, Minoru Kuribayashi, Mahdi Cheraghchi, Isao Echizen:
Efficient and error-tolerant schemes for non-adaptive complex group testing and its application in complex disease genetics. CoRR abs/1904.00349 (2019) - [i22]Fuming Fang, Xin Wang, Junichi Yamagishi, Isao Echizen, Massimiliano Todisco, Nicholas W. D. Evans, Jean-François Bonastre:
Speaker Anonymization Using X-vector and Neural Waveform Models. CoRR abs/1905.13561 (2019) - [i21]Huy H. Nguyen, Fuming Fang, Junichi Yamagishi, Isao Echizen:
Multi-task Learning For Detecting and Segmenting Manipulated Facial Images and Videos. CoRR abs/1906.06876 (2019) - [i20]David Ifeoluwa Adelani, Haotian Mai, Fuming Fang, Huy H. Nguyen, Junichi Yamagishi, Isao Echizen:
Generating Sentiment-Preserving Fake Online Reviews Using Neural Language Models and Their Human- and Machine-based Detection. CoRR abs/1907.09177 (2019) - [i19]Huy H. Nguyen, Junichi Yamagishi, Isao Echizen:
Use of a Capsule Network to Detect Fake Images and Videos. CoRR abs/1910.12467 (2019) - [i18]Rong Huang, Fuming Fang, Huy H. Nguyen, Junichi Yamagishi, Isao Echizen:
A Method for Identifying Origin of Digital Images Using a Convolution Neural Network. CoRR abs/1911.00655 (2019) - [i17]Rong Huang, Fuming Fang, Huy H. Nguyen, Junichi Yamagishi, Isao Echizen:
Security of Facial Forensics Models Against Adversarial Attacks. CoRR abs/1911.00660 (2019) - [i16]Huy H. Nguyen, Minoru Kuribayashi, Junichi Yamagishi, Isao Echizen:
Detecting and Correcting Adversarial Images Using Image Processing Operations. CoRR abs/1912.05391 (2019) - 2018
- [j32]Isao Echizen, Tateo Ogane:
BiometricJammer: Method to Prevent Acquisition of Biometric Information by Surreptitious Photography on Fingerprints. IEICE Trans. Inf. Syst. 101-D(1): 2-12 (2018) - [j31]Isao Echizen:
Editor's Message to Special Issue of Computer Security Technologies for a Super Smart Society. J. Inf. Process. 26: 637 (2018) - [c136]Huy H. Nguyen, Ngoc-Dung T. Tieu, Hoang-Quoc Nguyen-Son, Vincent Nozick, Junichi Yamagishi, Isao Echizen:
Modular Convolutional Neural Network for Discriminating between Computer-Generated Images and Photographic Images. ARES 2018: 1:1-1:10 - [c135]Tatsuya Yasui, Minoru Kuribayashi, Nobuo Funabiki, Isao Echizen:
Estimation of Collusion Attack in Bias-based Binary Fingerprinting Code. APSIPA 2018: 1550-1555 - [c134]Hoang-Quoc Nguyen-Son, Nam-Phong Tran, Ngoc-Vien Pham, Minh-Triet Tran, Isao Echizen:
Vietnamese Paraphrase Identification Using Matching Duplicate Phrases and Similar Words. FDSE 2018: 172-182 - [c133]Naoya Noguchi, Kitahiro Kaneda, Keiichi Iwamura, Isao Echizen:
New Approach for Embedding Secret Information into Fiber Materials. GCCE 2018: 658-660 - [c132]Fuming Fang, Junichi Yamagishi, Isao Echizen, Jaime Lorenzo-Trueba:
High-Quality Nonparallel Voice Conversion Based on Cycle-Consistent Adversarial Network. ICASSP 2018: 5279-5283 - [c131]Huy H. Nguyen, Ngoc-Dung T. Tieu, Hoang-Quoc Nguyen-Son, Junichi Yamagishi, Isao Echizen:
Transformation on Computer-Generated Facial Image to Avoid Detection by Spoofing Detector. ICME 2018: 1-6 - [c130]Thach V. Bui, Minoru Kuribayashi, Mahdi Cheraghchi, Isao Echizen:
Efficiently Decodable Non-Adaptive Threshold Group Testing. ISIT 2018: 2584-2588 - [c129]Jaime Lorenzo-Trueba, Fuming Fang, Xin Wang, Isao Echizen, Junichi Yamagishi, Tomi Kinnunen:
Can we steal your vocal identity from the Internet?: Initial investigation of cloning Obama's voice using GAN, WaveNet and low-quality found data. Odyssey 2018: 240-247 - [c128]Hoang-Quoc Nguyen-Son, Huy H. Nguyen, Ngoc-Dung T. Tieu, Junichi Yamagishi, Isao Echizen:
Identifying Computer-Translated Paragraphs using Coherence Features. PACLIC 2018 - [c127]Isao Echizen, Tateo Ogane:
BiometricJammer: Use of Pseudo Fingerprint to Prevent Fingerprint Extraction from Camera Images without Inconveniencing Users. SMC 2018: 2825-2831 - [c126]Thu Le, Isao Echizen:
Lightweight Collaborative Semantic Scheme for Generating an Obfuscated Region to Ensure Location Privacy. SMC 2018: 2844-2849 - [c125]Darius Afchar, Vincent Nozick, Junichi Yamagishi, Isao Echizen:
MesoNet: a Compact Facial Video Forgery Detection Network. WIFS 2018: 1-7 - [c124]Fuming Fang, Junichi Yamagishi, Isao Echizen, Md. Sahidullah, Tomi Kinnunen:
Transforming acoustic characteristics to deceive playback spoofing countermeasures of speaker verification systems. WIFS 2018: 1-9 - [i15]Jaime Lorenzo-Trueba, Fuming Fang, Xin Wang, Isao Echizen, Junichi Yamagishi, Tomi Kinnunen:
Can we steal your vocal identity from the Internet?: Initial investigation of cloning Obama's voice using GAN, WaveNet and low-quality found data. CoRR abs/1803.00860 (2018) - [i14]Thach V. Bui, Tetsuya Kojima, Minoru Kuribayashi, Isao Echizen:
Efficient Decoding Schemes for Noisy Non-Adaptive Group Testing when Noise Depends on Number of Items in Test. CoRR abs/1803.06105 (2018) - [i13]Fuming Fang, Junichi Yamagishi, Isao Echizen, Jaime Lorenzo-Trueba:
High-quality nonparallel voice conversion based on cycle-consistent adversarial network. CoRR abs/1804.00425 (2018) - [i12]Thach V. Bui, Minoru Kuribayashi, Tetsuya Kojima, Roghayyeh Haghvirdinezhad, Isao Echizen:
Efficient (nonrandom) construction and decoding of non-adaptive group testing. CoRR abs/1804.03819 (2018) - [i11]Huy H. Nguyen, Ngoc-Dung T. Tieu, Hoang-Quoc Nguyen-Son, Junichi Yamagishi, Isao Echizen:
Transformation on Computer-Generated Facial Image to Avoid Detection by Spoofing Detector. CoRR abs/1804.04418 (2018) - [i10]Thach V. Bui, Minoru Kuribayashi, Tetsuya Kojima, Isao Echizen:
Sublinear decoding schemes for non-adaptive group testing with inhibitors. CoRR abs/1805.11748 (2018) - [i9]Darius Afchar, Vincent Nozick, Junichi Yamagishi, Isao Echizen:
MesoNet: a Compact Facial Video Forgery Detection Network. CoRR abs/1809.00888 (2018) - [i8]Fuming Fang, Junichi Yamagishi, Isao Echizen, Md. Sahidullah, Tomi Kinnunen:
Transforming acoustic characteristics to deceive playback spoofing countermeasures of speaker verification systems. CoRR abs/1809.04274 (2018) - [i7]Thach V. Bui, Minoru Kuribayashi, Mahdi Cheraghchi, Isao Echizen:
A framework for generalized group testing with inhibitors and its potential application in neuroscience. CoRR abs/1810.01086 (2018) - [i6]Huy H. Nguyen, Junichi Yamagishi, Isao Echizen:
Capsule-Forensics: Using Capsule Networks to Detect Forged Images and Videos. CoRR abs/1810.11215 (2018) - [i5]Fuming Fang, Xin Wang, Junichi Yamagishi, Isao Echizen:
Audiovisual speaker conversion: jointly and simultaneously transforming facial expression and acoustic characteristics. CoRR abs/1810.12730 (2018) - [i4]Hoang-Quoc Nguyen-Son, Ngoc-Dung T. Tieu, Huy H. Nguyen, Junichi Yamagishi, Isao Echizen:
Identifying Computer-Translated Paragraphs using Coherence Features. CoRR abs/1812.10896 (2018) - 2017
- [j30]Xuping Huang, Nobutaka Ono, Akira Nishimura, Isao Echizen:
Reversible Audio Information Hiding for Tampering Detection and Localization Using Sample Scanning Method. J. Inf. Process. 25: 469-476 (2017) - [j29]Toan-Thinh Truong, Minh-Triet Tran, Anh Duc Duong, Isao Echizen:
Provable Identity Based User Authentication Scheme on ECC in Multi-server Environment. Wirel. Pers. Commun. 95(3): 2785-2801 (2017) - [c123]Othmar O. Mwambe, Isao Echizen:
Security Oriented Malicious Activity Diagrams to Support Information Systems Security. AINA Workshops 2017: 74-81 - [c122]Hoang-Quoc Nguyen-Son, Ngoc-Dung T. Tieu, Huy H. Nguyen, Junichi Yamagishi, Isao Echizen:
Identifying computer-generated text using statistical analysis. APSIPA 2017: 1504-1511 - [c121]Frederik Möllers, Stephanie Vogelgesang, Jochen Krüger, Isao Echizen, Christoph Sorge:
Modelling Traffic Analysis in Home Automation Systems. CANS 2017: 526-536 - [c120]Shimon Machida, Adrian Dabrowski, Edgar R. Weippl, Isao Echizen:
PrivacyTag: A Community-Based Method for Protecting Privacy of Photographed Subjects in Online Social Networks. I3E 2017: 261-275 - [c119]Tateo Ogane, Isao Echizen:
Biometric Jammer: Preventing surreptitious fingerprint photography without inconveniencing users. IJCB 2017: 253-260 - [c118]Ryo Sakuma, Hyunho Kang, Keiichi Iwamura, Isao Echizen:
Digital Watermarking Scheme Based on Machine Learning for the IHC Evaluation Criteria. IIH-MSP (1) 2017: 370-380 - [c117]Hoang-Quoc Nguyen-Son, Isao Echizen:
Detecting Computer-Generated Text Using Fluency and Noise Features. PACLING 2017: 288-300 - [c116]Nicolas Rahmouni, Vincent Nozick, Junichi Yamagishi, Isao Echizen:
Distinguishing computer graphics from natural images using convolution neural networks. WIFS 2017: 1-6 - [c115]Ngoc-Dung T. Tieu, Huy H. Nguyen, Hoang-Quoc Nguyen-Son, Junichi Yamagishi, Isao Echizen:
An approach for gait anonymization using deep learning. WIFS 2017: 1-6 - [c114]Raphael R. Toledo, George Danezis, Isao Echizen:
Mix-ORAM: Using Delegated Shuffles. WPES@CCS 2017: 51-61 - [i3]Raphael R. Toledo, George Danezis, Isao Echizen:
Mix-ORAM: Using delegate shuffles. CoRR abs/1709.01008 (2017) - [i2]Thach V. Bui, Minoru Kuribayashi, Mahdi Cheraghchi, Isao Echizen:
Efficiently Decodable Non-Adaptive Threshold Group Testing. CoRR abs/1712.07509 (2017) - 2016
- [j28]Isao Echizen:
Foreword. IEICE Trans. Inf. Syst. 99-D(1): 40 (2016) - [j27]Mazdak Zamani, Isao Echizen, Arash Habibi Lashkari:
Innovations in Communications Security. J. Electr. Comput. Eng. 2016: 4743084:1 (2016) - [c113]Toan-Thinh Truong, Duong-Tien Phan, Minh-Triet Tran, Anh Duc Duong, Isao Echizen:
Provable User Authentication Scheme in Telecare Medicine Information System Using Elliptic Curve Cryptosystem. ARES 2016: 253-259 - [c112]Natsuki Kokui, Hyunho Kang, Keiichi Iwamura, Isao Echizen:
Best embedding direction for spread spectrum-based video watermarking. GCCE 2016: 1-3 - [c111]Yuichi Kusama, Hyunho Kang, Keiichi Iwamura, Isao Echizen:
Privacy-protected video surveillance in crowded environments using robust watermarking. GCCE 2016: 1-2 - [c110]YuFeng Yan, Hyunho Kang, Keiichi Iwamura, Isao Echizen:
Image watermarking using the differences between two wavelet filters. GCCE 2016: 1-3 - [c109]Eina Hashimoto, Masatsugu Ichino, Tetsuji Kuboyama, Isao Echizen, Hiroshi Yoshiura:
Breaking Anonymity of Social Network Accounts by Using Coordinated and Extensible Classifiers Based on Machine Learning. I3E 2016: 455-470 - [c108]Kei Hashimoto, Junichi Yamagishi, Isao Echizen:
Privacy-preserving sound to degrade automatic speaker verification performance. ICASSP 2016: 5500-5504 - [c107]Thach V. Bui, Tetsuya Kojima, Isao Echizen:
Efficiently decodable defective items detected by new model of noisy group testing. ISITA 2016: 265-269 - [c106]Sayaka Shiota, Fernando Villavicencio, Junichi Yamagishi, Nobutaka Ono, Isao Echizen, Tomoko Matsui:
Voice Liveness Detection for Speaker Verification based on a Tandem Single/Double-channel Pop Noise Detector. Odyssey 2016: 259-263 - [e4]Yun-Qing Shi, Hyoung-Joong Kim, Fernando Pérez-González, Isao Echizen:
Digital-Forensics and Watermarking - 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9569, Springer 2016, ISBN 978-3-319-31959-9 [contents] - 2015
- [j26]Isao Echizen:
Foreword. IEICE Trans. Inf. Syst. 98-D(1): 1 (2015) - [j25]Hoang-Quoc Nguyen-Son, Minh-Triet Tran, Hiroshi Yoshiura, Noboru Sonehara, Isao Echizen:
Anonymizing Personal Text Messages Posted in Online Social Networks and Detecting Disclosures of Personal Information. IEICE Trans. Inf. Syst. 98-D(1): 78-88 (2015) - [j24]Thach V. Bui, Binh Q. Nguyen, Thuc Dinh Nguyen, Noboru Sonehara, Isao Echizen:
Robust fingerprinting codes for database using non-adaptive group testing. Int. J. Big Data Intell. 2(2): 81-90 (2015) - [j23]Tomoko Kajiyama, Isao Echizen:
An educational system to help students assess website features and identify high-risk websites. Interact. Technol. Smart Educ. 12(1): 14-30 (2015) - [j22]Isao Echizen, Takayuki Yamada, Seiichi Gohshi:
IR Hiding: Use of Specular Reflection for Short-Wavelength-Pass-Filter Detection to Prevent Re-recording of Screen Images. Trans. Data Hiding Multim. Secur. 10: 38-54 (2015) - [c105]Thach V. Bui, Thuc Dinh Nguyen, Noboru Sonehara, Isao Echizen:
Efficient Authentication, Traitor Detection, and Privacy-Preserving for the Most Common Queries in Two-Tiered Wireless Sensor Networks. AINA 2015: 365-372 - [c104]Hoang-Quoc Nguyen-Son, Minh-Triet Tran, Hiroshi Yoshiura, Noboru Sonehara, Isao Echizen:
A Rule-Based Approach for Detecting Location Leaks of Short Text Messages. BIS (Workshops) 2015: 199-210 - [c103]Adrian Dabrowski, Katharina Krombholz, Edgar R. Weippl, Isao Echizen:
Smart Privacy Visor: Bridging the Privacy Gap. BIS (Workshops) 2015: 235-247 - [c102]Yohei Ogawa, Eina Hashimoto, Masatsugu Ichino, Isao Echizen, Hiroshi Yoshiura:
De-anonymising Social Network Posts by Linking with Résumé. BIS (Workshops) 2015: 248-260 - [c101]Hirokazu Ishizuka, Kouichi Sakurai, Isao Echizen, Keiichi Iwamura:
Evaluation of Matching Accuracy of Template Matching Using a Steganography Algorithm. CANDAR 2015: 457-462 - [c100]Thach V. Bui, Thuc Dinh Nguyen, Noboru Sonehara, Isao Echizen:
Tradeoff Between the Price of Distributing a Database and Its Collusion Resistance Based on Concatenated Codes. ICA3PP (2) 2015: 163-182 - [c99]Kent Kobayashi, Masaki Inamura, Kitahiro Kaneda, Keiichi Iwamura, Isao Echizen:
Surveillance Camera System Balancing Privacy Protection and Effective Surveillance Image Use. ICE-B 2015: 41-48 - [c98]Sayaka Shiota, Fernando Villavicencio, Junichi Yamagishi, Nobutaka Ono, Isao Echizen, Tomoko Matsui:
Voice liveness detection algorithms based on pop noise caused by human breath for automatic speaker verification. INTERSPEECH 2015: 239-243 - [c97]Huy H. Nguyen, Hoang-Quoc Nguyen-Son, Thuc Dinh Nguyen, Isao Echizen:
Discriminating Between Computer-Generated Facial Images and Natural Ones Using Smoothness Property and Local Entropy. IWDW 2015: 39-50 - [c96]Toshiki Ito, Hyunho Kang, Keiichi Iwamura, Kitahiro Kaneda, Isao Echizen:
Audio Watermarking Using Different Wavelet Filters. IWDW 2015: 312-320 - [c95]Hoang-Quoc Nguyen-Son, Yusuke Miyao, Isao Echizen:
Paraphrase Detection Based on Identical Phrase and Similar Word Matching. PACLIC 2015 - [c94]Toan-Thinh Truong, Minh-Triet Tran, Anh Duc Duong, Isao Echizen:
Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment. SEC 2015: 479-494 - [c93]Adrian Dabrowski, Isao Echizen, Edgar R. Weippl:
Error-Correcting Codes as Source for Decoding Ambiguity. IEEE Symposium on Security and Privacy Workshops 2015: 99-105 - 2014
- [j21]Seiichi Gohshi, Takayuki Hiroi, Isao Echizen:
Subjective assessment of HDTV with superresolution function. EURASIP J. Image Video Process. 2014: 11 (2014) - [j20]Peter Kieseberg, Sebastian Schrittwieser, Martin Mulazzani, Isao Echizen, Edgar R. Weippl:
An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata. Electron. Mark. 24(2): 113-124 (2014) - [c92]Hoang-Quoc Nguyen-Son, Minh-Triet Tran, Hiroshi Yoshiura, Noboru Sonehara, Isao Echizen:
A System for Anonymizing Temporal Phrases of Message Posted in Online Social Networks and for Detecting Disclosure. ARES 2014: 455-460 - [c91]Haruno Kataoka, Yohei Ogawa, Isao Echizen, Tetsuji Kuboyama, Hiroshi Yoshiura:
Effects of External Information on Anonymity and Role of Transparency with Example of Social Network De-anonymisation. ARES 2014: 461-467 - [c90]Toshiki Ito, Ryo Sugimura, Hyunho Kang, Keiichi Iwamura, Kitahiro Kaneda, Isao Echizen:
A New Approach to Reversible Watermarking. IIH-MSP 2014: 455-458 - [c89]Hirokazu Ishizuka, Isao Echizen, Keiichi Iwamura, Kouichi Sakurai:
A Zero-Watermarking-Like Steganography and Potential Applications. IIH-MSP 2014: 459-462 - [c88]Kento Kobayashi, Keiichi Iwamura, Kitahiro Kaneda, Isao Echizen:
Surveillance Camera System to Achieve Privacy Protection and Crime Prevention. IIH-MSP 2014: 463-466 - [c87]Shimon Machida, Tomoko Kajiyama, Shigeru Shimada, Isao Echizen:
Analysis of Facebook Friends Using Disclosure Level. IIH-MSP 2014: 471-474 - [c86]Kitahiro Kaneda, Hiroyasu Kitazawa, Keiichi Iwamura, Isao Echizen:
A Study of Equipment Dependence of a Single-Dot Pattern Method for an Information-Hiding by Applying an Error-Correcting Code. IIH-MSP 2014: 497-501 - [c85]Kitahiro Kaneda, Tomoki Inui, Keiichi Iwamura, Isao Echizen:
Novel Proposal and Evaluation of Information Extraction Method from Artificial Fiber Pattern Using a Camera. IIH-MSP 2014: 502-506 - [c84]Kitahiro Kaneda, Kenta Kawabata, Keiichi Iwamura, Isao Echizen:
Mathematical Simulation Model and Its Evaluation for Artificial Fiber Patterns. IIH-MSP 2014: 507-511 - [c83]Thach V. Bui, Nguyen K. Vu, Thong T. P. Nguyen, Isao Echizen, Thuc Dinh Nguyen:
Robust Message Hiding for QR Code. IIH-MSP 2014: 520-523 - [c82]Alberto Escalada Jimenez, Adrian Dabrowski, Noboru Sonehara, Juan Manuel Montero-Martínez, Isao Echizen:
Tag Detection for Preventing Unauthorized Face Image Processing. IWDW 2014: 513-524 - [c81]Erwan Chaussy, Shimon Machida, Noboru Sonehara, Isao Echizen:
Definition of Private Information for Image Sharing in Social Networking Services. IWDW 2014: 544-556 - [c80]Hirokazu Ishizuka, Isao Echizen, Keiichi Iwamura, Kouichi Sakurai:
Evaluation of a Zero-Watermarking-Type Steganography. IWDW 2014: 613-624 - 2013
- [j19]Klaus Rechert, Konrad Meier, Richard M. Zahoransky, Dennis Wehrle, Dirk von Suchodoletz, Benjamin Greschbach, Sven Wohlgemuth, Isao Echizen:
Reclaiming Location Privacy in Mobile Telephony Networks - Effects and Consequences for Providers and Subscribers. IEEE Syst. J. 7(2): 211-222 (2013) - [c79]Tomoya Muraki, Shintaro Oishi, Masatsugu Ichino, Isao Echizen, Hiroshi Yoshiura:
Anonymizing Face Images by Using Similarity-Based Metric. ARES 2013: 517-524 - [c78]Hiroki Nishikawa, Yoshio Kakizaki, Keiichi Iwamura, Isao Echizen:
Experiment of Geometrically Invariant and Unneeded Synchronism Watermarking Using Winding Number. AINA Workshops 2013: 877-882 - [c77]Pham Thi Bach Hue, Nguyen Dinh Thuc, Dong Thi Bich Thuy, Isao Echizen, Sven Wohlgemuth:
Protecting Access Pattern Privacy in Database Outsourcing Service. AINA Workshops 2013: 922-928 - [c76]Takayuki Yamada, Seiichi Gohshi, Isao Echizen:
Privacy Visor: Method for Preventing Face Image Detection by Using Differences in Human and Device Sensitivity. Communications and Multimedia Security 2013: 152-161 - [c75]Shigeru Shimada, Isao Echizen:
Predictive Notification Service of Privacy Invasion on Posting Pictures to SNS. COMPSAC Workshops 2013: 193-199 - [c74]Johann Latocha, Klaus Rechert, Isao Echizen:
Securing Access to Complex Digital Artifacts - Towards a Controlled Processing Environment for Digital Research Data. TPDL 2013: 315-320 - [c73]Pham Thi Bach Hue, Thuc Dinh Nguyen, Dong Thi Bich Thuy, Isao Echizen, Sven Wohlgemuth:
A User Privacy Protection Technique for Executing SQL over Encrypted Data in Database Outsourcing Service. I3E 2013: 25-37 - [c72]Andreas Albers, Ioannis Krontiris, Noboru Sonehara, Isao Echizen:
Coupons as Monetary Incentives in Participatory Sensing. I3E 2013: 226-237 - [c71]Thach V. Bui, Binh Q. Nguyen, Thuc Dinh Nguyen, Noboru Sonehara, Isao Echizen:
Robust Fingerprinting Codes for Database. ICA3PP (2) 2013: 167-176 - [c70]Anh-Tu Hoang, Hoang-Quoc Nguyen-Son, Minh-Triet Tran, Isao Echizen:
Detecting Traitors in Re-publishing Updated Datasets. IWDW 2013: 205-220 - [c69]Xuping Huang, Nobutaka Ono, Isao Echizen, Akira Nishimura:
Reversible Audio Information Hiding Based on Integer DCT Coefficients with Adaptive Hiding Locations. IWDW 2013: 376-389 - [c68]Hoang-Quoc Nguyen-Son, Anh-Tu Hoang, Minh-Triet Tran, Hiroshi Yoshiura, Noboru Sonehara, Isao Echizen:
Anonymizing Temporal Phrases in Natural Language Text to be Posted on Social Networking Services. IWDW 2013: 437-451 - [c67]Takuya Iida, Tomoko Kajiyama, Noritomo Ouchi, Isao Echizen:
A Color Extraction Method from Text for Use in Creating a Book Cover Image that Reflects Reader Impressions. KICSS 2013: 201-211 - [c66]Thach V. Bui, Van H. Dang, Isao Echizen, Thuc Dinh Nguyen:
How Can We Acquire the Most Common Query Types in Two-Tiered Wireless Sensor Networks? NGMAST 2013: 111-115 - [c65]Tomotaka Okuno, Akira Utsumi, Masatsugu Ichino, Hiroshi Yoshiura, Isao Echizen:
Ineluctable background checking on social networks: Linking job seeker's résumé and posts. PerCom Workshops 2013: 273-278 - [c64]Seiichi Gohshi, Isao Echizen:
Limitations of Super Resolution Image Reconstruction and How to Overcome them for a Single Image. SIGMAP 2013: 71-78 - [c63]Thach V. Bui, Binh Q. Nguyen, Thuc Dinh Nguyen, Noboru Sonehara, Isao Echizen:
Effective Fingerprinting Codes for Database. SITIS 2013: 655-659 - [c62]Shimon Machida, Shigeru Shimada, Isao Echizen:
Settings of Access Control by Detecting Privacy Leaks in SNS. SITIS 2013: 660-666 - [c61]Adrian Dabrowski, Edgar R. Weippl, Isao Echizen:
Framework Based on Privacy Policy Hiding for Preventing Unauthorized Face Image Processing. SMC 2013: 455-461 - [c60]Takayuki Yamada, Seiichi Gohshi, Isao Echizen:
Privacy Visor: Method Based on Light Absorbing and Reflecting Properties for Preventing Face Image Detection. SMC 2013: 1572-1577 - [p4]Xuping Huang, Yoshihiko Abe, Isao Echizen:
A Fast and Low-Distortion Capacity Adaptive Synchronized Acoustic-to-Acoustic Steganography Scheme. Recent Advances in Information Hiding and Applications 2013: 181-209 - [i1]Isao Echizen, Günter Müller, Ryôichi Sasaki, A Min Tjoa:
Privacy by Transparency for Data-Centric Services (NII Shonan Meeting 2013-5). NII Shonan Meet. Rep. 2013 (2013) - 2012
- [j18]Takaaki Yamada, Isao Echizen, Hiroshi Yoshiura:
PC-Based Real-Time Video Watermark Embedding System Independent of Platform for Parallel Computing. Trans. Data Hiding Multim. Secur. 7: 15-33 (2012) - [j17]Isao Echizen, Takayuki Yamada, Seiichi Gohshi:
IR Hiding: Method for Preventing Illegal Recording of Videos Based on Differences in Sensory Perception between Humans and Devices. Trans. Data Hiding Multim. Secur. 7: 34-51 (2012) - [c59]Hoang-Quoc Nguyen-Son, Quoc-Binh Nguyen, Minh-Triet Tran, Dinh-Thuc Nguyen, Hiroshi Yoshiura, Isao Echizen:
Automatic Anonymization of Natural Languages Texts Posted on Social Networking Services and Automatic Detection of Disclosure. ARES 2012: 358-364 - [c58]Midori Hirose, Akira Utsumi, Isao Echizen, Hiroshi Yoshiura:
A Private Information Detector for Controlling Circulation of Private Information through Social Networks. ARES 2012: 473-478 - [c57]Tomoko Kajiyama, Isao Echizen:
Evaluation of an Improved Visualization System for Helping Children Identify Risky Websites. ARES 2012: 495-498 - [c56]Fumiaki Murakami, Kenji Komoriya, Ryuya Uda, Seiichi Gohshi, Isao Echizen:
Preventing Surreptitious Filming by Saturation Irradiation of Infrared Rays. AINA Workshops 2012: 232-237 - [c55]Anh-Tu Hoang, Minh-Triet Tran, Anh Duc Duong, Isao Echizen:
An Indexed Bottom-up Approach for Publishing Anonymized Data. CIS 2012: 641-645 - [c54]Takayuki Yamada, Seiichi Gohshi, Isao Echizen:
Enhancement of method for preventing illegal recording of movies to enable it to detect cameras with attached infrared-cut filter. ICASSP 2012: 1825-1828 - [c53]Takayuki Yamada, Seiichi Gohshi, Isao Echizen:
Enhancement of Method for Preventing Unauthorized Copying of Displayed Information Using Object Surface Reflection. IWDW 2012: 184-197 - [c52]Hoang-Quoc Nguyen-Son, Minh-Triet Tran, Tien Dung Tran, Hiroshi Yoshiura, Noboru Sonehara, Isao Echizen:
Automatic Anonymous Fingerprinting of Text Posted on Social Networking Services. IWDW 2012: 410-424 - [c51]Takayuki Yamada, Seiichi Gohshi, Isao Echizen:
Use of invisible noise signals to prevent privacy invasion through face recognition from camera images. ACM Multimedia 2012: 1315-1316 - [c50]Hiroki Nishikawa, Shingo Kuse, Keiichi Iwamura, Isao Echizen:
A Method for Resisting Averaging Attacks on Digital Watermarks and Use of This Method with Digital Watermarks. NBiS 2012: 777-781 - [c49]Jorge Munoz-Gama, Isao Echizen:
Insuring Sensitive Processes through Process Mining. UIC/ATC 2012: 447-454 - [c48]Takayuki Yamada, Seiichi Gohshi, Isao Echizen:
Preventing unauthorized copying of displayed information by utilizing differences in spectral sensitivity between humans and imaging devices. WIFS 2012: 145-150 - 2011
- [j16]Günter Müller, Noboru Sonehara, Isao Echizen, Sven Wohlgemuth:
Sustainable Cloud Computing. Bus. Inf. Syst. Eng. 3(3): 129-131 (2011) - [j15]Noboru Sonehara, Isao Echizen, Sven Wohlgemuth:
Isolation in Cloud Computing and Privacy-Enhancing Technologies - Suitability of Privacy-Enhancing Technologies for Separating Data Usage in Business Processes. Bus. Inf. Syst. Eng. 3(3): 155-162 (2011) - [j14]Sebastian Haas, Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Günter Müller:
Aspects of privacy for electronic health records. Int. J. Medical Informatics 80(2): e26-e31 (2011) - [j13]Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Günter Müller:
On Privacy-compliant Disclosure of Personal Data to Third Parties using Digital Watermarking. J. Inf. Hiding Multim. Signal Process. 2(3): 270-281 (2011) - [j12]Minh-Triet Tran, Trung Thanh Nguyen, Anh Duc Duong, Isao Echizen:
Pool-based anonymous communication framework for high-performance computing. J. Supercomput. 55(2): 246-268 (2011) - [j11]Günter Müller, Noboru Sonehara, Isao Echizen, Sven Wohlgemuth:
Nachhaltiges Computing in Clouds. Wirtschaftsinf. 53(3): 123-125 (2011) - [j10]Noboru Sonehara, Isao Echizen, Sven Wohlgemuth:
Isolation im Cloud-Computing und Mechanismen zum Schutz der Privatsphäre - Eignung von Mechanismen zum Schutz der Privatsphäre für die Trennung der Datenverarbeitung in Geschäftsprozessen. Wirtschaftsinf. 53(3): 151-158 (2011) - [c47]Sebastian Schrittwieser, Peter Kieseberg, Isao Echizen, Sven Wohlgemuth, Noboru Sonehara:
Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of Disasters. ARES 2011: 645-649 - [c46]Pham Thi Bach Hue, Thuc Dinh Nguyen, Van H. Dang, Isao Echizen, Dong Thi Bich Thuy:
A Mutual and Pseudo Inverse Matrix - Based Authentication Mechanism for Outsourcing Service. ACIIDS (1) 2011: 119-128 - [c45]Takayuki Yamada, Seiichi Gohshi, Isao Echizen:
Countermeasure of re-recording prevention against attack with short wavelength pass filter. ICIP 2011: 2753-2756 - [c44]Pranab Kumar Dhar, Isao Echizen:
Robust FFT Based Watermarking Scheme for Copyright Protection of Digital Audio Data. IIH-MSP 2011: 181-184 - [c43]Martin Salfer, Sven Wohlgemuth, Sebastian Schrittwieser, Bernhard Bauer, Isao Echizen:
Data Provenance with Watermarks for Usage Control Monitors at Disaster Recovery. iThings/CPSCom 2011: 514-519 - [c42]Takayuki Yamada, Seiichi Gohshi, Isao Echizen:
IR Hiding: Method to Prevent Re-recording Screen Image Built in Short Wavelength Pass Filter Detection Method Using Specular Reflection. IWDW 2011: 111-125 - [c41]Sebastian Schrittwieser, Peter Kieseberg, Isao Echizen, Sven Wohlgemuth, Noboru Sonehara, Edgar R. Weippl:
An Algorithm for k-Anonymity-Based Fingerprinting. IWDW 2011: 439-452 - [c40]Takayuki Yamada, Seiichi Gohshi, Isao Echizen:
iCabinet: stand-alone implementation of a method for preventing illegal recording of displayed content by adding invisible noise signals. ACM Multimedia 2011: 771-772 - [c39]Klaus Rechert, Sven Wohlgemuth, Isao Echizen, Noboru Sonehara:
User Centric Privacy in Mobile Communication Scenarios. SAINT 2011: 202-207 - 2010
- [j9]Sven Wohlgemuth, Isao Echizen, Günter Müller, Noboru Sonehara:
Privacy-compliant Disclosure of Personal Data to Third Parties (Schutz der Privatsphäre bei der Weitergabe persönlicher Daten an Dritte). it Inf. Technol. 52(6): 350-355 (2010) - [j8]Xuping Huang, Yoshihiko Abe, Isao Echizen:
Capacity Adaptive Synchronized Acoustic Steganography Scheme. J. Inf. Hiding Multim. Signal Process. 1(2): 72-90 (2010) - [c38]Minh-Triet Tran, Isao Echizen, Anh Duc Duong:
Binomial-Mix-Based Location Anonymizer System with Global Dummy Generation to Preserve User Location Privacy in Location-Based Services. ARES 2010: 580-585 - [c37]Minh-Triet Tran, Vi-Minh Luong, Anh Duc Duong, Isao Echizen:
Bi-directional RPROB-based Location Anonymizer System for Location-Based Services. CIT 2010: 971-977 - [c36]Tran Hong Ngoc, Isao Echizen, Komei Kamiyama, Hiroshi Yoshiura:
New Approach to Quantification of Privacy on Social Network Sites. AINA 2010: 556-564 - [c35]Van H. Dang, Sven Wohlgemuth, Hiroshi Yoshiura, Thuc Dinh Nguyen, Isao Echizen:
Approach to Privacy-Preserve Data in Two-Tiered Wireless Sensor Network Based on Linear System and Histogram. FGIT-UNESST 2010: 17-30 - [c34]Pham Thi Bach Hue, Sven Wohlgemuth, Isao Echizen, Dong Thi Bich Thuy, Nguyen Dinh Thuc:
Fine-Grained Access Control for Electronic Health Record Systems. FGIT-UNESST 2010: 31-38 - [c33]Komei Kamiyama, Tran Hong Ngoc, Isao Echizen, Hiroshi Yoshiura:
Measuring Accumulated Revelations of Private Information by Multiple Media. I3E 2010: 70-80 - [c32]Takayuki Yamada, Seiichi Gohshi, Isao Echizen:
Preventing re-recording based on difference between sensory perceptions of humans and devices. ICIP 2010: 993-996 - [c31]Antonio Savoldi, Paolo Gubian, Isao Echizen:
Uncertainty in Live Forensics. IFIP Int. Conf. Digital Forensics 2010: 171-184 - [c30]Komei Kamiyama, Tran Hong Ngoc, Isao Echizen, Hiroshi Yoshiura:
Unified Metric for Measuring Anonymity and Privacy with Application to Online Social Network. IIH-MSP 2010: 506-509 - [c29]Jérémie Tharaud, Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Günter Müller, Pascal Lafourcade:
Privacy by Data Provenance with Digital Watermarking - A Proof-of-Concept Implementation for Medical Services with Electronic Health Records. IIH-MSP 2010: 510-513 - [c28]Xuping Huang, Isao Echizen, Akira Nishimura:
A New Approach of Reversible Acoustic Steganography for Tampering Detection. IIH-MSP 2010: 538-542 - [c27]Takayuki Yamada, Seiichi Gohshi, Isao Echizen:
IR Hiding: A Method to Prevent Video Re-shooting by Exploiting Differences between Human Perceptions and Recording Device Characteristics. IWDW 2010: 280-292 - [c26]Xuping Huang, Akira Nishimura, Isao Echizen:
A Reversible Acoustic Steganography for Integrity Verification. IWDW 2010: 305-316 - [c25]Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Günter Müller:
Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy. SEC 2010: 241-252 - [e3]Isao Echizen, Jeng-Shyang Pan, Dieter W. Fellner, Alexander Nouak, Arjan Kuijper, Lakhmi C. Jain:
Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), Darmstadt, Germany, 15-17 October, 2010, Proceedings. IEEE Computer Society 2010, ISBN 978-1-4244-8378-5 [contents] - [e2]Isao Echizen, Noboru Kunihiro, Ryôichi Sasaki:
Advances in Information and Computer Security - 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings. Lecture Notes in Computer Science 6434, Springer 2010, ISBN 978-3-642-16824-6 [contents] - [e1]Isao Echizen, Noboru Kunihiro, Ryôichi Sasaki:
Advances in Information and Computer Security - 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Short Paper Proceedings. Information Processing Society of Japan (IPSJ) 2010, ISBN 978-4-915256-78-3 [contents]
2000 – 2009
- 2009
- [j7]Takaaki Yamada, Yoshiyasu Takahashi, Yasuhiro Fujii, Ryu Ebisawa, Hiroshi Yoshiura, Isao Echizen:
Integrity verification method for video content using robust watermarking. Int. J. Knowl. Based Intell. Eng. Syst. 13(3-4): 141-153 (2009) - [c24]Sven Wohlgemuth, Günter Müller, Noboru Sonehara, Isao Echizen:
On Observable Delegation of Personal Data by Watermarking. CCNC 2009: 1-5 - [c23]Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Günter Müller:
On Privacy in Business Processes - Observing Delegation of Personal Data by using Digital Watermarking. ICE-B 2009: 27-32 - [c22]Shinta Nakayama, Hiroshi Yoshiura, Isao Echizen:
Preventing False Positives in Content-Based Phishing Detection. IIH-MSP 2009: 48-51 - [c21]Minh-Triet Tran, Anh Duc Duong, Isao Echizen:
XPROB - A Generalized Pool-Based Anonymous Communication Framework. IIH-MSP 2009: 52-55 - [c20]Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Günter Müller:
On Privacy-aware Delegation of Personal Data using Digital Watermarking. IIH-MSP 2009: 56-59 - [c19]Antonio Savoldi, Paolo Gubian, Isao Echizen:
A Comparison between Windows Mobile and Symbian S60 Embedded Forensics. IIH-MSP 2009: 546-550 - [c18]Minh-Triet Tran, Anh Duc Duong, Isao Echizen:
RPROB - A Family of Binomial-Mix-based Anonymous Communication Systems. MASS 2009: 765-770 - [c17]Antonio Savoldi, Paolo Gubian, Isao Echizen:
How to Deal with Blurriness in Live Forensics: A Case of Study. NCM 2009: 1865-1871 - 2008
- [j6]Yusuke Atomori, Isao Echizen, Masanori Dainaka, Shinta Nakayama, Hiroshi Yoshiura:
Robust Video Watermarking based on Dual-plane Correlation for Immunity to Rotation, Scale, Translation, and Random Distortion. J. Digit. Inf. Manag. 6(2): 161-167 (2008) - [c16]Tsukasa Endo, Isao Echizen, Hiroshi Yoshiura:
Electronic Voting Scheme to Maintain Anonymity in Small-scale Election by Hiding the Number of Votes. ARES 2008: 1287-1293 - [c15]Minh-Triet Tran, Trung Thanh Nguyen, Isao Echizen:
Pool-Based APROB Channel to Provide Resistance against Global Active Adversary under Probabilistic Real-Time Condition. EUC (2) 2008: 257-263 - [c14]Yusuke Atomori, Isao Echizen, Hiroshi Yoshiura:
Picture Watermarks Surviving General Affine Transformation and Random Distortion. IIH-MSP 2008: 315-318 - [c13]Satoshi Kaneko, Isao Echizen, Hiroshi Yoshiura:
Evaluation and Improvement of Digital Watermarking Algorithm Based on Cryptographic Security Models. IWDW 2008: 401-418 - [p3]Takaaki Yamada, Yoshiyasu Takahashi, Hiroshi Yoshiura, Isao Echizen:
Evaluation of PC-Based Real-Time Watermark Embedding System for Standard-Definition Video Stream. New Directions in Intelligent Interactive Multimedia 2008: 331-340 - [p2]Takaaki Yamada, Yoshiyasu Takahashi, Yasuhiro Fujii, Ryu Ebisawa, Hiroshi Yoshiura, Isao Echizen:
Evaluation of Integrity Verification System for Video Content Using Digital Watermarking. New Directions in Intelligent Interactive Multimedia 2008: 363-372 - 2007
- [c12]Hideaki Tanaka, Shoichi Sasaki, Isao Echizen, Hiroshi Yoshiura:
Secure Generation of Digital Signature on Compromised Computer. IIH-MSP 2007: 12-15 - [c11]Isao Echizen, Yusuke Atomori, Shinta Nakayama, Hiroshi Yoshiura:
HVS-Based Robust Video Watermarking with Dual-plane Correlation. IIH-MSP 2007: 20-24 - [c10]Ryu Ebisawa, Yasuhiro Fujii, Takaaki Yamada, Satoru Tezuka, Isao Echizen:
Use of Gap-Filling Operation to Enhance Image Quality of Binary Image Watermarking. IIH-MSP 2007: 25-28 - [p1]Isao Echizen, Yasuhiro Fujii, Takaaki Yamada, Satoru Tezuka, Hiroshi Yoshiura:
Adaptive Embedding and Detection for Improved Video Watermarking. Intelligent Multimedia Data Hiding: New Directions 2007: 157-187 - 2006
- [j5]Hiroshi Yoshiura, Isao Echizen:
Maintaining Picture Quality and Improving Robustness of Color Watermarking by Using Human Vision Models. IEICE Trans. Inf. Syst. 89-D(1): 256-270 (2006) - [j4]Isao Echizen, Yasuhiro Fujii, Takaaki Yamada, Satoru Tezuka, Hiroshi Yoshiura:
Use of Statistically Adaptive Accumulation to Improve Video Watermark Detection. Inf. Media Technol. 1(2): 1109-1122 (2006) - [c9]Masanori Dainaka, Shinta Nakayama, Isao Echizen, Hiroshi Yoshiura:
Dual-Plane Watermarking for Color Pictures Immune to Rotation, Scale, Translation, and Random Bending. IIH-MSP 2006: 93-96 - [c8]Isao Echizen, Takaaki Yamada, Satoru Tezuka, Stephan Singh, Hiroshi Yoshiura:
Improved Video Verification Method Using Digital Watermarking. IIH-MSP 2006: 445-448 - [c7]Isao Echizen, Koichi Tanimoto, Takaaki Yamada, Masanori Dainaka, Satoru Tezuka, Hiroshi Yoshiura:
PC-based real-time watermark embedding system with standard video interface. SMC 2006: 267-271 - 2005
- [j3]Isao Echizen, Yasuhiro Fujii, Takaaki Yamada, Satoru Tezuka, Hiroshi Yoshiura:
Perceptually Adaptive Video Watermarking Using Motion Estimation. Int. J. Image Graph. 5(1): 89-110 (2005) - [c6]Isao Echizen, Yasuhiro Fujii, Takaaki Yamada, Satoru Tezuka, Hiroshi Yoshiura:
Correlation-based model of color picture watermarking against random geometric distortion. ICME 2005: 213-216 - [c5]Isao Echizen, Yasuhiro Fujii, Takaaki Yamada, Satoru Tezuka, Hiroshi Yoshiura:
Improved Video Watermark Detection Using Statistically-Adaptive Accumulation. KES (4) 2005: 300-308 - [c4]Isao Echizen, Takaaki Yamada, Yasuhiro Fujii, Satoru Tezuka, Hiroshi Yoshiura:
Real-time video watermark embedding system using software on personal computer. SMC 2005: 3369-3373 - [c3]Isao Echizen, Hiroshi Yoshiura, Yasuhiro Fujii, Takaaki Yamada, Satoru Tezuka:
Use of inferential statistics to estimate error probability of video watermarks. Security, Steganography, and Watermarking of Multimedia Contents 2005: 391-399 - 2004
- [j2]Hiroshi Yoshiura, Isao Echizen:
Color Picture Watermarking Correlating Two Constituent Planes for Immunity to Random Geometric Distortion. IEICE Trans. Inf. Syst. 87-D(9): 2239-2252 (2004) - [c2]Takaaki Yamada, Yasuhiro Fujii, Isao Echizen, Koichi Tanimoto, Satoru Tezuka:
Print traceability systems framework using digital watermarks for binary images. SMC (4) 2004: 3285-3290 - 2003
- [c1]Isao Echizen, Hiroshi Yoshiura, Yasuhiro Fujii, Satoru Tezuka:
Use of Motion Estimation to Improve Video Watermarking for MPEG Encoders. IWDW 2003: 184-199
1990 – 1999
- 1999
- [j1]Isao Echizen, Hiroshi Yoshiura, Takao Arai, Hiroyuki Kimura, Toshifumi Takeuchi:
General quality maintenance module for motion picture watermarking. IEEE Trans. Consumer Electron. 45(4): 1150-1158 (1999)
Coauthor Index
aka: Huy Hong Nguyen
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-11 18:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint