Остановите войну!
for scientists:
default search action
Hitoshi Kiya
- > Home > Persons > Hitoshi Kiya
Publications
- 2023
- [j103]Genki Hamano, Shoko Imaizumi, Hitoshi Kiya:
Effects of JPEG Compression on Vision Transformer Image Classification for Encryption-then-Compression Images. Sensors 23(7): 3400 (2023) - [c259]Kosuke Abe, Shoko Imaizumi, Hitoshi Kiya:
Effects of Data Hiding on Vision Transformer Classification for Encryption-then-Compression Images. GCCE 2023: 787-789 - 2022
- [j98]Hitoshi Kiya, Teru Nagamori, Shoko Imaizumi, Sayaka Shiota:
Privacy-Preserving Semantic Segmentation Using Vision Transformer. J. Imaging 8(9): 233 (2022) - [i87]Hitoshi Kiya, AprilPyone MaungMaung, Yuma Kinoshita, Shoko Imaizumi, Sayaka Shiota:
An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications. CoRR abs/2201.11006 (2022) - 2021
- [j93]Ryota Motomura, Shoko Imaizumi, Hitoshi Kiya:
A Reversible Data Hiding Method in Encrypted Images for Controlling Trade-Off between Hiding Capacity and Compression Efficiency. J. Imaging 7(12): 268 (2021) - [c239]Ryota Motomura, Shoko Imaizumi, Hitoshi Kiya:
A Flexible Reversible Data Hiding Method in Compressible Encrypted Images. APSIPA ASC 2021: 1794-1799 - [c222]Ryoichi Hirasawa, Shoko Imaizumi, Hitoshi Kiya:
An MSB Prediction-Based Method with Marker Bits for Reversible Data Hiding in Encrypted Images. LifeTech 2021: 48-50 - 2020
- [j82]Shoko Imaizumi, Yusuke Izawa, Ryoichi Hirasawa, Hitoshi Kiya:
A Reversible Data Hiding Method in Compressible Encrypted Images. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(12): 1579-1588 (2020) - [c217]Ryoichi Hirasawa, Shoko Imaizumi, Hitoshi Kiya:
Flexible Data Hiding and Extraction in EtC Images. APSIPA 2020: 1347-1351 - [i38]Shoko Imaizumi, Hitoshi Kiya:
A Block-Permutation-Based Encryption Scheme with Independent Processing of RGB Components. CoRR abs/2011.08964 (2020) - [i37]Shoko Imaizumi, Yusuke Izawa, Ryoichi Hirasawa, Hitoshi Kiya:
A Reversible Data Hiding Method in Compressible Encrypted Images. CoRR abs/2011.08969 (2020) - 2018
- [j61]Shoko Imaizumi, Hitoshi Kiya:
A Block-Permutation-Based Encryption Scheme with Independent Processing of RGB Components. IEICE Trans. Inf. Syst. 101-D(12): 3150-3157 (2018) - [j60]Anu Aryal, Shoko Imaizumi, Takahiko Horiuchi, Hitoshi Kiya:
Integrated Model of Image Protection Techniques. J. Imaging 4(1): 1 (2018) - [c175]Yusuke Izawa, Shoko Imaizumi, Hitoshi Kiya:
A Block-Permutation-Based Image Encryption Allowing Hierarchical Decryption. APSIPA 2018: 1106-1112 - [c165]Warit Sirichotedumrong, Tatsuya Chuman, Shoko Imaizumi, Hitoshi Kiya:
Grayscale-Based Block Scrambling Image Encryption for Social Networking Services. ICME 2018: 1-6 - [i15]Warit Sirichotedumrong, Tatsuya Chuman, Shoko Imaizumi, Hitoshi Kiya:
Grayscale-based Block Scrambling Image Encryption for Social Networking Services. CoRR abs/1806.03787 (2018) - 2017
- [j59]Kenta Kurihara, Shoko Imaizumi, Sayaka Shiota, Hitoshi Kiya:
An Encryption-then-Compression System for Lossless Image Compression Standards. IEICE Trans. Inf. Syst. 100-D(1): 52-56 (2017) - [c159]Anu Aryal, Shoko Imaizumi, Takahiko Horiuchi, Hitoshi Kiya:
Integrated algorithm for block-permutation-based encryption with reversible data hiding. APSIPA 2017: 203-208 - [c141]Shoko Imaizumi, Takeshi Ogasawara, Hitoshi Kiya:
Block-Permutation-Based Encryption Scheme with Enhanced Color Scrambling. SCIA (1) 2017: 562-573 - 2015
- [j50]Kenta Kurihara, Masanori Kikuchi, Shoko Imaizumi, Sayaka Shiota, Hitoshi Kiya:
An Encryption-then-Compression System for JPEG/Motion JPEG Standard. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(11): 2238-2245 (2015) - [c117]Hiroyuki Kobayashi, Shoko Imaizumi, Hitoshi Kiya:
A Robust Identification Scheme for JPEG XR Images with Various Compression Ratios. PSIVT 2015: 38-50 - 2012
- [c86]Shoko Imaizumi, Naokazu Aoki, Hiroyuki Kobayashi, Hitoshi Kiya:
Hierarchical Key Assignment Scheme for Multimedia Access Control with Modified Hash Chain. IIH-MSP 2012: 293-296 - 2011
- [c76]Shoko Imaizumi, Masaaki Fujiyoshi, Hitoshi Kiya, Naokazu Aoki, Hiroyuki Kobayashi:
A Key Derivation Scheme for Hierarchical Access Control to JPEG 2000 Coded Images. PSIVT (2) 2011: 180-191 - 2010
- [j38]Shoko Imaizumi, Masaaki Fujiyoshi, Hitoshi Kiya:
An efficient access control method for composite multimedia content. IEICE Electron. Express 7(20): 1534-1538 (2010) - 2009
- [c58]Shoko Imaizumi, Masaaki Fujiyoshi, Hitoshi Kiya:
Efficient Collusion Attack-free Access Control for Multidimensionally Hierarchical Scalability Content. ISCAS 2009: 505-508 - 2008
- [c52]Noriaki Hashimoto, Shoko Imaizumi, Masaaki Fujiyoshi, Hitoshi Kiya:
Hierarchical encryption using short encryption keys for scalable access control of JPEG 2000 coded images. ICIP 2008: 3116-3119 - 2007
- [j23]Masaaki Fujiyoshi, Shoko Imaizumi, Hitoshi Kiya:
Encryption of Composite Multimedia Contents for Access Control. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(3): 590-596 (2007) - [c47]Shoko Imaizumi, Masaaki Fujiyoshi, Yoshito Abe, Hitoshi Kiya:
Collusion Attack-Resilient Hierarchical Encryption of JPEG 2000 Codestreams with Scalable Access Control. ICIP (2) 2007: 137-140 - 2005
- [c38]Shoko Imaizumi, Osamu Watanabe, Masaaki Fujiyoshi, Hitoshi Kiya:
Generalized hierarchical encryption of JPEG 2000 codestreams for access control. ICIP (2) 2005: 1094-1097 - 2003
- [c32]Hitoshi Kiya, Shoko Imaizumi, Osamu Watanabe:
Partial-scrambling of images encoded using JPEG2000 without generating marker codes. ICIP (3) 2003: 205-208
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 02:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint