2008 |
21 | EE | Noriaki Hashimoto,
Shoko Imaizumi,
Masaaki Fujiyoshi,
Hitoshi Kiya:
Hierarchical encryption using short encryption keys for scalable access control of JPEG 2000 coded images.
ICIP 2008: 3116-3119 |
20 | EE | Masaaki Fujiyoshi,
Keijiro Kuroiwa,
Hitoshi Kiya:
A scrambling method for Motion JPEG videos enabling moving objects detection from scrambled videos.
ICIP 2008: 773-776 |
19 | EE | Seungwu Han,
Masaaki Fujiyoshi,
Hitoshi Kiya:
An Efficient Reversible Image Authentication Method.
IEICE Transactions 91-A(8): 1907-1914 (2008) |
2007 |
18 | EE | Shoko Imaizumi,
Masaaki Fujiyoshi,
Yoshito Abe,
Hitoshi Kiya:
Collusion Attack-Resilient Hierarchical Encryption of JPEG 2000 Codestreams with Scalable Access Control.
ICIP (2) 2007: 137-140 |
17 | EE | Fitri Arnia,
Ikue Iizuka,
Masaaki Fujiyoshi,
Hitoshi Kiya:
Fast Method for Joint Retrieval and Identification of JPEG Coded Images Based on DCT Sign.
ICIP (2) 2007: 229-232 |
16 | EE | Masaaki Fujiyoshi,
Shuji Sato,
Hong Lin Jin,
Hitoshi Kiya:
A Location-Map Free Reversible Data Hiding Method using Block-Based Single Parameter.
ICIP (3) 2007: 257-260 |
15 | EE | Keijiro Kuroiwa,
Masaaki Fujiyoshi,
Hitoshi Kiya:
Codestream Domain Scrambling of Moving Objects Based on DCT Sign-only Correlation for Motion JPEG Movies.
ICIP (5) 2007: 157-160 |
14 | EE | Mirei Kihara,
Masaaki Fujiyoshi,
Qing Tao Wan,
Hitoshi Kiya:
Image Tamper Detection using Mathematical Morphology.
ICIP (6) 2007: 101-104 |
13 | EE | Khairul Munadi,
Masaaki Fujiyoshi,
Kiyoshi Nishikawa,
Hitoshi Kiya:
Codeblock-Based Error Concealment for JPEG2000 Coded Image Transmission over RTP.
IEICE Transactions 90-A(2): 429-438 (2007) |
12 | EE | Masaaki Fujiyoshi,
Shoko Imaizumi,
Hitoshi Kiya:
Encryption of Composite Multimedia Contents for Access Control.
IEICE Transactions 90-A(3): 590-596 (2007) |
11 | EE | Hong Lin Jin,
Masaaki Fujiyoshi,
Hitoshi Kiya:
Lossless Data Hiding in the Spatial Domain for High Quality Images.
IEICE Transactions 90-A(4): 771-777 (2007) |
10 | EE | Fitri Arnia,
Ikue Iizuka,
Masaaki Fujiyoshi,
Hitoshi Kiya:
DCT Sign-Based Similarity Measure for JPEG Image Retrieval.
IEICE Transactions 90-A(9): 1976-1985 (2007) |
2006 |
9 | EE | Khairul Munadi,
Masaaki Fujiyoshi,
Kiyoshi Nishikawa,
Hitoshi Kiya:
Codeblock-Based Concealment Scheme for JPEG2000 Images in Lossy Packet Networks.
APCCAS 2006: 1847-1850 |
8 | EE | Masaaki Fujiyoshi,
Wataru Saitou,
Osamu Watanabe,
Hitoshi Kiya:
Hierarchical Encryption of Multimedia Contents for Access Control.
ICIP 2006: 1977-1980 |
7 | EE | Fitri Arnia,
Ikue Iizuka,
Masaaki Fujiyoshi,
Hitoshi Kiya:
Fast Image Identification Methods for JPEG Images with Different Compression Ratios.
IEICE Transactions 89-A(6): 1585-1593 (2006) |
6 | EE | Takashi Tachibana,
Masaaki Fujiyoshi,
Hitoshi Kiya:
A digital watermarking scheme that preserves image quality and is applicable to watermark sequences from a variety of distributions.
Systems and Computers in Japan 37(8): 90-100 (2006) |
2005 |
5 | EE | Masaaki Fujiyoshi,
Yusuke Seki,
Hiroyuki Kobayashi,
Hitoshi Kiya:
Modulo arithmetic-based image watermarking and its theoretical analysis of image-quality.
ICIP (1) 2005: 969-972 |
4 | EE | Shoko Imaizumi,
Osamu Watanabe,
Masaaki Fujiyoshi,
Hitoshi Kiya:
Generalized hierarchical encryption of JPEG 2000 codestreams for access control.
ICIP (2) 2005: 1094-1097 |
3 | EE | Yusuke Seki,
Hiroyuki Kobayashi,
Masaaki Fujiyoshi,
Hitoshi Kiya:
Quantization-based image steganography without data hiding position memorization.
ISCAS (5) 2005: 4987-4990 |
2 | EE | Masaaki Fujiyoshi,
Osamu Watanabe,
Hitoshi Kiya:
A Method of Guaranteeing Image-Quality for Quantization-Based Watermarking Using a Nonorthogonal Transformation.
IEICE Transactions 88-A(6): 1434-1442 (2005) |
2004 |
1 | EE | Masaaki Fujiyoshi,
Hitoshi Kiya:
An image-quality guaranteed method for quantization-based watermarking using a dwt.
ICIP 2004: 2629-2632 |