dblp.uni-trier.dewww.uni-trier.de

Hiroshi Yoshiura

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
23EETsukasa Endo, Isao Echizen, Hiroshi Yoshiura: Electronic Voting Scheme to Maintain Anonymity in Small-scale Election by Hiding the Number of Votes. ARES 2008: 1287-1293
22EETakaaki Yamada, Yoshiyasu Takahashi, Hiroshi Yoshiura, Isao Echizen: Evaluation of PC-Based Real-Time Watermark Embedding System for Standard-Definition Video Stream. New Directions in Intelligent Interactive Multimedia 2008: 331-340
21EETakaaki Yamada, Yoshiyasu Takahashi, Yasuhiro Fujii, Ryu Ebisawa, Hiroshi Yoshiura, Isao Echizen: Evaluation of Integrity Verification System for Video Content Using Digital Watermarking. New Directions in Intelligent Interactive Multimedia 2008: 363-372
2007
20EEIsao Echizen, Yasuhiro Fujii, Takaaki Yamada, Satoru Tezuka, Hiroshi Yoshiura: Adaptive Embedding and Detection for Improved Video Watermarking. Intelligent Multimedia Data Hiding: New Directions 2007: 157-187
2006
19 Hiroshi Yoshiura, Kouichi Sakurai, Kai Rannenberg, Yuko Murayama, Shin-ichi Kawamura: Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings Springer 2006
18EEIsao Echizen, Takaaki Yamada, Satoru Tezuka, Stephan Singh, Hiroshi Yoshiura: Improved Video Verification Method Using Digital Watermarking. IIH-MSP 2006: 445-448
17EEMasanori Dainaka, Shinta Nakayama, Isao Echizen, Hiroshi Yoshiura: Dual-Plane Watermarking for Color Pictures Immune to Rotation, Scale, Translation, and Random Bending. IIH-MSP 2006: 93-96
16EEHiroshi Yoshiura, Isao Echizen: Maintaining Picture Quality and Improving Robustness of Color Watermarking by Using Human Vision Models. IEICE Transactions 89-D(1): 256-270 (2006)
2005
15 Ryôichi Sasaki, Sihan Qing, Eiji Okamoto, Hiroshi Yoshiura: Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30 - June 1, 2005, Chiba, Japan Springer 2005
14EEIsao Echizen, Yasuhiro Fujii, Takaaki Yamada, Satoru Tezuka, Hiroshi Yoshiura: Correlation-based model of color picture watermarking against random geometric distortion. ICME 2005: 213-216
13EEIsao Echizen, Yasuhiro Fujii, Takaaki Yamada, Satoru Tezuka, Hiroshi Yoshiura: Improved Video Watermark Detection Using Statistically-Adaptive Accumulation. KES (4) 2005: 300-308
12 Isao Echizen, Hiroshi Yoshiura, Yasuhiro Fujii, Takaaki Yamada, Satoru Tezuka: Use of inferential statistics to estimate error probability of video watermarks. Security, Steganography, and Watermarking of Multimedia Contents 2005: 391-399
11EEKunihiko Miyazaki, Mitsuru Iwamura, Tsutomu Matsumoto, Ryôichi Sasaki, Hiroshi Yoshiura, Satoru Tezuka, Hideki Imai: Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control. IEICE Transactions 88-A(1): 239-246 (2005)
10EEIsao Echizen, Yasuhiro Fujii, Takaaki Yamada, Satoru Tezuka, Hiroshi Yoshiura: Perceptually Adaptive Video Watermarking Using Motion Estimation. Int. J. Image Graphics 5(1): 89-110 (2005)
2003
9EEIsao Echizen, Hiroshi Yoshiura, Yasuhiro Fujii, Satoru Tezuka: Use of Motion Estimation to Improve Video Watermarking for MPEG Encoders. IWDW 2003: 184-199
2002
8EERyôichi Sasaki, Hiroshi Yoshiura, Shinji Itoh: Combinatorial Optimization of Countermeasures against Illegal Copying. Security Protocols Workshop 2002: 128-144
7EEHiroshi Yoshiura, Kunihiko Miyazaki, Shinji Itoh, Kazuo Takaragi, Ryôichi Sasaki: Legally Authorized and Unauthorized Digital Evidence. Security Protocols Workshop 2002: 67-73
2001
6EEHiroshi Yoshiura, Kunihiko Miyazaki, Shinji Itoh, Kazuo Takaragi, Ryôichi Sasaki: A Multi-OS Approach to Trusted Computer Systems. Security Protocols Workshop 2001: 107-114
5EEHiroshi Yoshiura: A Multi-OS Approach to Trusted Computer Systems (Transcript of Discussion). Security Protocols Workshop 2001: 115-118
2000
4EEHiroshi Yoshiura, Takaaki Shigematsu, Seiichi Susaki, Tsukasa Saitoh, Hisashi Toyoshima, Chikako Kurita, Satoru Tezuka, Ryôichi Sasaki: Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks - A Practical Analysis. Security Protocols Workshop 2000: 238-248
3EEHiroshi Yoshiura: Authentication Web-Based Virtual Shops Using Signature-Embedded Marks - A Practical Analysis (Transcript of Discussion). Security Protocols Workshop 2000: 249-252
1999
2 Hiroshi Yoshiura, Seiichi Susaki, Yasuhiko Nagai, Tsukasa Saitoh, Hisashi Toyoshima, Ryôichi Sasaki, Satoru Tezuka: INTERNET-MARKs: Clear, Secure, and Portable Visual Marks for the Cyber Worlds. Security Protocols Workshop 1999: 195-207
1998
1EEHiroshi Yoshiura, Ryôichi Sasaki, Kazuo Takaragi: Secure Fingerprinting Using Public-Key Cryptography (Position Paper). Security Protocols Workshop 1998: 83-89

Coauthor Index

1Masanori Dainaka [17]
2Ryu Ebisawa [21]
3Isao Echizen [9] [10] [12] [13] [14] [16] [17] [18] [20] [21] [22] [23]
4Tsukasa Endo [23]
5Yasuhiro Fujii [9] [10] [12] [13] [14] [20] [21]
6Hideki Imai [11]
7Shinji Itoh [6] [7] [8]
8Mitsuru Iwamura [11]
9Shin-ichi Kawamura [19]
10Chikako Kurita [4]
11Tsutomu Matsumoto [11]
12Kunihiko Miyazaki [6] [7] [11]
13Yuko Murayama [19]
14Yasuhiko Nagai [2]
15Shinta Nakayama [17]
16Eiji Okamoto [15]
17Sihan Qing [15]
18Kai Rannenberg [19]
19Tsukasa Saitoh [2] [4]
20Kouichi Sakurai [19]
21Ryôichi Sasaki [1] [2] [4] [6] [7] [8] [11] [15]
22Takaaki Shigematsu [4]
23Stephan Singh [18]
24Seiichi Susaki [2] [4]
25Yoshiyasu Takahashi [21] [22]
26Kazuo Takaragi [1] [6] [7]
27Satoru Tezuka [2] [4] [9] [10] [11] [12] [13] [14] [18] [20]
28Hisashi Toyoshima [2] [4]
29Takaaki Yamada [10] [12] [13] [14] [18] [20] [21] [22]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)