2008 |
23 | EE | Tsukasa Endo,
Isao Echizen,
Hiroshi Yoshiura:
Electronic Voting Scheme to Maintain Anonymity in Small-scale Election by Hiding the Number of Votes.
ARES 2008: 1287-1293 |
22 | EE | Takaaki Yamada,
Yoshiyasu Takahashi,
Hiroshi Yoshiura,
Isao Echizen:
Evaluation of PC-Based Real-Time Watermark Embedding System for Standard-Definition Video Stream.
New Directions in Intelligent Interactive Multimedia 2008: 331-340 |
21 | EE | Takaaki Yamada,
Yoshiyasu Takahashi,
Yasuhiro Fujii,
Ryu Ebisawa,
Hiroshi Yoshiura,
Isao Echizen:
Evaluation of Integrity Verification System for Video Content Using Digital Watermarking.
New Directions in Intelligent Interactive Multimedia 2008: 363-372 |
2007 |
20 | EE | Isao Echizen,
Yasuhiro Fujii,
Takaaki Yamada,
Satoru Tezuka,
Hiroshi Yoshiura:
Adaptive Embedding and Detection for Improved Video Watermarking.
Intelligent Multimedia Data Hiding: New Directions 2007: 157-187 |
2006 |
19 | | Hiroshi Yoshiura,
Kouichi Sakurai,
Kai Rannenberg,
Yuko Murayama,
Shin-ichi Kawamura:
Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings
Springer 2006 |
18 | EE | Isao Echizen,
Takaaki Yamada,
Satoru Tezuka,
Stephan Singh,
Hiroshi Yoshiura:
Improved Video Verification Method Using Digital Watermarking.
IIH-MSP 2006: 445-448 |
17 | EE | Masanori Dainaka,
Shinta Nakayama,
Isao Echizen,
Hiroshi Yoshiura:
Dual-Plane Watermarking for Color Pictures Immune to Rotation, Scale, Translation, and Random Bending.
IIH-MSP 2006: 93-96 |
16 | EE | Hiroshi Yoshiura,
Isao Echizen:
Maintaining Picture Quality and Improving Robustness of Color Watermarking by Using Human Vision Models.
IEICE Transactions 89-D(1): 256-270 (2006) |
2005 |
15 | | Ryôichi Sasaki,
Sihan Qing,
Eiji Okamoto,
Hiroshi Yoshiura:
Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30 - June 1, 2005, Chiba, Japan
Springer 2005 |
14 | EE | Isao Echizen,
Yasuhiro Fujii,
Takaaki Yamada,
Satoru Tezuka,
Hiroshi Yoshiura:
Correlation-based model of color picture watermarking against random geometric distortion.
ICME 2005: 213-216 |
13 | EE | Isao Echizen,
Yasuhiro Fujii,
Takaaki Yamada,
Satoru Tezuka,
Hiroshi Yoshiura:
Improved Video Watermark Detection Using Statistically-Adaptive Accumulation.
KES (4) 2005: 300-308 |
12 | | Isao Echizen,
Hiroshi Yoshiura,
Yasuhiro Fujii,
Takaaki Yamada,
Satoru Tezuka:
Use of inferential statistics to estimate error probability of video watermarks.
Security, Steganography, and Watermarking of Multimedia Contents 2005: 391-399 |
11 | EE | Kunihiko Miyazaki,
Mitsuru Iwamura,
Tsutomu Matsumoto,
Ryôichi Sasaki,
Hiroshi Yoshiura,
Satoru Tezuka,
Hideki Imai:
Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control.
IEICE Transactions 88-A(1): 239-246 (2005) |
10 | EE | Isao Echizen,
Yasuhiro Fujii,
Takaaki Yamada,
Satoru Tezuka,
Hiroshi Yoshiura:
Perceptually Adaptive Video Watermarking Using Motion Estimation.
Int. J. Image Graphics 5(1): 89-110 (2005) |
2003 |
9 | EE | Isao Echizen,
Hiroshi Yoshiura,
Yasuhiro Fujii,
Satoru Tezuka:
Use of Motion Estimation to Improve Video Watermarking for MPEG Encoders.
IWDW 2003: 184-199 |
2002 |
8 | EE | Ryôichi Sasaki,
Hiroshi Yoshiura,
Shinji Itoh:
Combinatorial Optimization of Countermeasures against Illegal Copying.
Security Protocols Workshop 2002: 128-144 |
7 | EE | Hiroshi Yoshiura,
Kunihiko Miyazaki,
Shinji Itoh,
Kazuo Takaragi,
Ryôichi Sasaki:
Legally Authorized and Unauthorized Digital Evidence.
Security Protocols Workshop 2002: 67-73 |
2001 |
6 | EE | Hiroshi Yoshiura,
Kunihiko Miyazaki,
Shinji Itoh,
Kazuo Takaragi,
Ryôichi Sasaki:
A Multi-OS Approach to Trusted Computer Systems.
Security Protocols Workshop 2001: 107-114 |
5 | EE | Hiroshi Yoshiura:
A Multi-OS Approach to Trusted Computer Systems (Transcript of Discussion).
Security Protocols Workshop 2001: 115-118 |
2000 |
4 | EE | Hiroshi Yoshiura,
Takaaki Shigematsu,
Seiichi Susaki,
Tsukasa Saitoh,
Hisashi Toyoshima,
Chikako Kurita,
Satoru Tezuka,
Ryôichi Sasaki:
Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks - A Practical Analysis.
Security Protocols Workshop 2000: 238-248 |
3 | EE | Hiroshi Yoshiura:
Authentication Web-Based Virtual Shops Using Signature-Embedded Marks - A Practical Analysis (Transcript of Discussion).
Security Protocols Workshop 2000: 249-252 |
1999 |
2 | | Hiroshi Yoshiura,
Seiichi Susaki,
Yasuhiko Nagai,
Tsukasa Saitoh,
Hisashi Toyoshima,
Ryôichi Sasaki,
Satoru Tezuka:
INTERNET-MARKs: Clear, Secure, and Portable Visual Marks for the Cyber Worlds.
Security Protocols Workshop 1999: 195-207 |
1998 |
1 | EE | Hiroshi Yoshiura,
Ryôichi Sasaki,
Kazuo Takaragi:
Secure Fingerprinting Using Public-Key Cryptography (Position Paper).
Security Protocols Workshop 1998: 83-89 |