
Isao Echizen
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2021
- [j37]Noboru Babaguchi, Isao Echizen, Junichi Yamagishi, Naoko Nitta, Yuta Nakashima, Kazuaki Nakamura, Kazuhiro Kono, Fuming Fang, Seiko Myojin, Zhenzhong Kuang, Huy H. Nguyen, Ngoc-Dung T. Tieu:
Preventing Fake Information Generation Against Media Clone Attacks. IEICE Trans. Inf. Syst. 104-D(1): 2-11 (2021) - [j36]Isao Echizen, Noboru Babaguchi, Junichi Yamagishi, Naoko Nitta, Yuta Nakashima, Kazuaki Nakamura, Kazuhiro Kono, Fuming Fang, Seiko Myojin, Zhenzhong Kuang, Huy H. Nguyen, Ngoc-Dung T. Tieu:
Generation and Detection of Media Clones. IEICE Trans. Inf. Syst. 104-D(1): 12-23 (2021) - 2020
- [j35]Tatsuya Yasui
, Minoru Kuribayashi
, Nobuo Funabiki, Isao Echizen:
Near-Optimal Detection for Binary Tardos Code by Estimating Collusion Strategy. IEEE Trans. Inf. Forensics Secur. 15: 2069-2080 (2020) - [c152]David Ifeoluwa Adelani, Haotian Mai, Fuming Fang, Huy H. Nguyen, Junichi Yamagishi, Isao Echizen:
Generating Sentiment-Preserving Fake Online Reviews Using Neural Language Models and Their Human- and Machine-Based Detection. AINA 2020: 1341-1354 - [c151]Rong Huang, Fuming Fang, Huy H. Nguyen, Junichi Yamagishi, Isao Echizen:
A Method for Identifying Origin of Digital Images Using a Convolutional Neural Network. APSIPA 2020: 1293-1299 - [c150]Akinori Higashi, Minoru Kuribayashi, Nobuo Funabiki, Huy H. Nguyen, Isao Echizen:
Detection of Adversarial Examples Based on Sensitivities to Noise Removal Filter. APSIPA 2020: 1386-1391 - [c149]Nobuyuki Teraura, Isao Echizen, Keiichi Iwamura:
A QR Symbol with ECDSA for Both Public and Secret Areas using Rhombic Sub-cells. APSIPA 2020: 1392-1399 - [c148]Ngoc-Dung T. Tieu, Junichi Yamagishi, Isao Echizen:
Color Transfer to Anonymized Gait Images While Maintaining Anonymization. APSIPA 2020: 1406-1413 - [c147]Huy H. Nguyen, Junichi Yamagishi, Isao Echizen, Sébastien Marcel:
Generating Master Faces for Use in Performing Wolf Attacks on Face Recognition Systems. IJCB 2020: 1-10 - [c146]Rong Huang, Fuming Fang, Huy H. Nguyen, Junichi Yamagishi, Isao Echizen:
Security of Facial Forensics Models Against Adversarial Attacks. ICIP 2020: 2236-2240 - [c145]Nobuyuki Teraura, Isao Echizen, Keiichi Iwamura:
Implementation of Digital Signature on QR Symbol by Area Division Using Rhombic Sub-cells. IMIS 2020: 624-638 - [c144]Thach V. Bui, Mahdi Cheraghchi, Isao Echizen:
Improved non-adaptive algorithms for threshold group testing with a gap. ISIT 2020: 1414-1419 - [c143]Harkeerat Kaur, Isao Echizen, Rohit Kumar:
Smart Data Agent for Preserving Location Privacy. SSCI 2020: 2567-2575 - [i27]Thach V. Bui, Mahdi Cheraghchi, Isao Echizen:
Improved non-adaptive algorithms for threshold group testing with a gap. CoRR abs/2001.01008 (2020) - [i26]Huy H. Nguyen, Junichi Yamagishi, Isao Echizen, Sébastien Marcel:
Generating Master Faces for Use in Performing Wolf Attacks on Face Recognition Systems. CoRR abs/2006.08376 (2020) - [i25]Saurabh Gupta, Huy H. Nguyen, Junichi Yamagishi, Isao Echizen:
Viable Threat on News Reading: Generating Biased News Using Natural Language Models. CoRR abs/2010.02150 (2020)
2010 – 2019
- 2019
- [j34]Ngoc-Dung T. Tieu, Huy H. Nguyen
, Hoang-Quoc Nguyen-Son, Junichi Yamagishi, Isao Echizen:
Spatio-temporal generative adversarial network for gait anonymization. J. Inf. Secur. Appl. 46: 307-319 (2019) - [j33]Thach V. Bui, Minoru Kuribayashi
, Tetsuya Kojima, Roghayyeh Haghvirdinezhad, Isao Echizen:
Efficient (nonrandom) Construction and Decoding for Non-adaptive Group Testing. J. Inf. Process. 27: 245-256 (2019) - [j32]Thach V. Bui
, Minoru Kuribayashi
, Mahdi Cheraghchi
, Isao Echizen:
Efficiently Decodable Non-Adaptive Threshold Group Testing. IEEE Trans. Inf. Theory 65(9): 5519-5528 (2019) - [c142]Ngoc-Dung T. Tieu, Huy H. Nguyen, Fuming Fang, Junichi Yamagishi, Isao Echizen:
An RGB Gait Anonymization Model for Low-Quality Silhouettes. APSIPA 2019: 1686-1693 - [c141]Huy H. Nguyen, Fuming Fang, Junichi Yamagishi, Isao Echizen:
Multi-task Learning for Detecting and Segmenting Manipulated Facial Images and Videos. BTAS 2019: 1-8 - [c140]Huy H. Nguyen, Junichi Yamagishi, Isao Echizen:
Capsule-forensics: Using Capsule Networks to Detect Forged Images and Videos. ICASSP 2019: 2307-2311 - [c139]Fuming Fang, Xin Wang, Junichi Yamagishi, Isao Echizen:
Audiovisual Speaker Conversion: Jointly and Simultaneously Transforming Facial Expression and Acoustic Characteristics. ICASSP 2019: 6795-6799 - [c138]Nobuyuki Teraura, Isao Echizen, Keiichi Iwamura:
Implementation of a Digital Signature in Backward-Compatible QR Codes Using Subcell Division and Double Encoding. IMIS 2019: 466-476 - [c137]Thach V. Bui, Minoru Kuribayashi
, Tetsuya Kojima, Isao Echizen:
Sublinear Decoding Schemes for Non-adaptive Group Testing with Inhibitors. TAMC 2019: 93-113 - [i24]Thach V. Bui, Minoru Kuribayashi, Mahdi Cheraghchi, Isao Echizen:
Improved encoding and decoding for non-adaptive threshold group testing. CoRR abs/1901.02283 (2019) - [i23]Thach V. Bui, Minoru Kuribayashi, Mahdi Cheraghchi, Isao Echizen:
Efficient and error-tolerant schemes for non-adaptive complex group testing and its application in complex disease genetics. CoRR abs/1904.00349 (2019) - [i22]Fuming Fang, Xin Wang, Junichi Yamagishi, Isao Echizen, Massimiliano Todisco, Nicholas W. D. Evans, Jean-François Bonastre:
Speaker Anonymization Using X-vector and Neural Waveform Models. CoRR abs/1905.13561 (2019) - [i21]Huy H. Nguyen, Fuming Fang, Junichi Yamagishi, Isao Echizen:
Multi-task Learning For Detecting and Segmenting Manipulated Facial Images and Videos. CoRR abs/1906.06876 (2019) - [i20]David Ifeoluwa Adelani, Haotian Mai, Fuming Fang, Huy H. Nguyen, Junichi Yamagishi, Isao Echizen:
Generating Sentiment-Preserving Fake Online Reviews Using Neural Language Models and Their Human- and Machine-based Detection. CoRR abs/1907.09177 (2019) - [i19]Huy H. Nguyen, Junichi Yamagishi, Isao Echizen:
Use of a Capsule Network to Detect Fake Images and Videos. CoRR abs/1910.12467 (2019) - [i18]Rong Huang, Fuming Fang, Huy H. Nguyen, Junichi Yamagishi, Isao Echizen:
A Method for Identifying Origin of Digital Images Using a Convolution Neural Network. CoRR abs/1911.00655 (2019) - [i17]Rong Huang, Fuming Fang, Huy H. Nguyen, Junichi Yamagishi, Isao Echizen:
Security of Facial Forensics Models Against Adversarial Attacks. CoRR abs/1911.00660 (2019) - [i16]Huy H. Nguyen, Minoru Kuribayashi, Junichi Yamagishi, Isao Echizen:
Detecting and Correcting Adversarial Images Using Image Processing Operations. CoRR abs/1912.05391 (2019) - 2018
- [j31]Isao Echizen, Tateo Ogane:
BiometricJammer: Method to Prevent Acquisition of Biometric Information by Surreptitious Photography on Fingerprints. IEICE Trans. Inf. Syst. 101-D(1): 2-12 (2018) - [j30]Isao Echizen:
Editor's Message to Special Issue of Computer Security Technologies for a Super Smart Society. J. Inf. Process. 26: 637 (2018) - [c136]Huy H. Nguyen, Ngoc-Dung T. Tieu, Hoang-Quoc Nguyen-Son, Vincent Nozick, Junichi Yamagishi, Isao Echizen:
Modular Convolutional Neural Network for Discriminating between Computer-Generated Images and Photographic Images. ARES 2018: 1:1-1:10 - [c135]Tatsuya Yasui, Minoru Kuribayashi
, Nobuo Funabiki, Isao Echizen:
Estimation of Collusion Attack in Bias-based Binary Fingerprinting Code. APSIPA 2018: 1550-1555 - [c134]Hoang-Quoc Nguyen-Son, Nam-Phong Tran, Ngoc-Vien Pham, Minh-Triet Tran, Isao Echizen:
Vietnamese Paraphrase Identification Using Matching Duplicate Phrases and Similar Words. FDSE 2018: 172-182 - [c133]Naoya Noguchi, Kitahiro Kaneda, Keiichi Iwamura, Isao Echizen:
New Approach for Embedding Secret Information into Fiber Materials. GCCE 2018: 658-660 - [c132]Fuming Fang, Junichi Yamagishi, Isao Echizen, Jaime Lorenzo-Trueba:
High-Quality Nonparallel Voice Conversion Based on Cycle-Consistent Adversarial Network. ICASSP 2018: 5279-5283 - [c131]Huy H. Nguyen, Ngoc-Dung T. Tieu, Hoang-Quoc Nguyen-Son, Junichi Yamagishi, Isao Echizen:
Transformation on Computer-Generated Facial Image to Avoid Detection by Spoofing Detector. ICME 2018: 1-6 - [c130]Thach V. Bui, Minoru Kuribayashi, Mahdi Cheraghchi
, Isao Echizen:
Efficiently Decodable Non-Adaptive Threshold Group Testing. ISIT 2018: 2584-2588 - [c129]Jaime Lorenzo-Trueba, Fuming Fang, Xin Wang, Isao Echizen, Junichi Yamagishi, Tomi Kinnunen:
Can we steal your vocal identity from the Internet?: Initial investigation of cloning Obama's voice using GAN, WaveNet and low-quality found data. Odyssey 2018: 240-247 - [c128]Hoang-Quoc Nguyen-Son, Huy H. Nguyen, Ngoc-Dung T. Tieu, Junichi Yamagishi, Isao Echizen:
Identifying Computer-Translated Paragraphs using Coherence Features. PACLIC 2018 - [c127]Isao Echizen, Tateo Ogane:
BiometricJammer: Use of Pseudo Fingerprint to Prevent Fingerprint Extraction from Camera Images without Inconveniencing Users. SMC 2018: 2825-2831 - [c126]Thu Le, Isao Echizen:
Lightweight Collaborative Semantic Scheme for Generating an Obfuscated Region to Ensure Location Privacy. SMC 2018: 2844-2849 - [c125]Darius Afchar, Vincent Nozick, Junichi Yamagishi, Isao Echizen:
MesoNet: a Compact Facial Video Forgery Detection Network. WIFS 2018: 1-7 - [c124]Fuming Fang, Junichi Yamagishi, Isao Echizen, Md. Sahidullah, Tomi Kinnunen:
Transforming acoustic characteristics to deceive playback spoofing countermeasures of speaker verification systems. WIFS 2018: 1-9 - [i15]Jaime Lorenzo-Trueba, Fuming Fang, Xin Wang, Isao Echizen, Junichi Yamagishi, Tomi Kinnunen:
Can we steal your vocal identity from the Internet?: Initial investigation of cloning Obama's voice using GAN, WaveNet and low-quality found data. CoRR abs/1803.00860 (2018) - [i14]Thach V. Bui, Tetsuya Kojima, Minoru Kuribayashi, Isao Echizen:
Efficient Decoding Schemes for Noisy Non-Adaptive Group Testing when Noise Depends on Number of Items in Test. CoRR abs/1803.06105 (2018) - [i13]Fuming Fang, Junichi Yamagishi, Isao Echizen, Jaime Lorenzo-Trueba:
High-quality nonparallel voice conversion based on cycle-consistent adversarial network. CoRR abs/1804.00425 (2018) - [i12]Thach V. Bui, Minoru Kuribayashi, Tetsuya Kojima, Roghayyeh Haghvirdinezhad, Isao Echizen:
Efficient (nonrandom) construction and decoding of non-adaptive group testing. CoRR abs/1804.03819 (2018) - [i11]Huy H. Nguyen, Ngoc-Dung T. Tieu, Hoang-Quoc Nguyen-Son, Junichi Yamagishi, Isao Echizen:
Transformation on Computer-Generated Facial Image to Avoid Detection by Spoofing Detector. CoRR abs/1804.04418 (2018) - [i10]Thach V. Bui, Minoru Kuribayashi, Tetsuya Kojima, Isao Echizen:
Sublinear decoding schemes for non-adaptive group testing with inhibitors. CoRR abs/1805.11748 (2018) - [i9]Darius Afchar
, Vincent Nozick, Junichi Yamagishi, Isao Echizen:
MesoNet: a Compact Facial Video Forgery Detection Network. CoRR abs/1809.00888 (2018) - [i8]Fuming Fang, Junichi Yamagishi, Isao Echizen, Md. Sahidullah, Tomi Kinnunen:
Transforming acoustic characteristics to deceive playback spoofing countermeasures of speaker verification systems. CoRR abs/1809.04274 (2018) - [i7]Thach V. Bui, Minoru Kuribayashi, Mahdi Cheraghchi, Isao Echizen:
A framework for generalized group testing with inhibitors and its potential application in neuroscience. CoRR abs/1810.01086 (2018) - [i6]Huy H. Nguyen, Junichi Yamagishi, Isao Echizen:
Capsule-Forensics: Using Capsule Networks to Detect Forged Images and Videos. CoRR abs/1810.11215 (2018) - [i5]Fuming Fang, Xin Wang, Junichi Yamagishi, Isao Echizen:
Audiovisual speaker conversion: jointly and simultaneously transforming facial expression and acoustic characteristics. CoRR abs/1810.12730 (2018) - [i4]Hoang-Quoc Nguyen-Son, Ngoc-Dung T. Tieu, Huy H. Nguyen, Junichi Yamagishi, Isao Echizen:
Identifying Computer-Translated Paragraphs using Coherence Features. CoRR abs/1812.10896 (2018) - 2017
- [j29]Xuping Huang, Nobutaka Ono
, Akira Nishimura, Isao Echizen:
Reversible Audio Information Hiding for Tampering Detection and Localization Using Sample Scanning Method. J. Inf. Process. 25: 469-476 (2017) - [j28]Toan-Thinh Truong, Minh-Triet Tran, Anh Duc Duong, Isao Echizen:
Provable Identity Based User Authentication Scheme on ECC in Multi-server Environment. Wirel. Pers. Commun. 95(3): 2785-2801 (2017) - [c123]Othmar O. Mwambe
, Isao Echizen:
Security Oriented Malicious Activity Diagrams to Support Information Systems Security. AINA Workshops 2017: 74-81 - [c122]Hoang-Quoc Nguyen-Son, Ngoc-Dung T. Tieu, Huy H. Nguyen, Junichi Yamagishi, Isao Echizen:
Identifying computer-generated text using statistical analysis. APSIPA 2017: 1504-1511 - [c121]Frederik Möllers, Stephanie Vogelgesang, Jochen Krüger, Isao Echizen, Christoph Sorge:
Modelling Traffic Analysis in Home Automation Systems. CANS 2017: 526-536 - [c120]Shimon Machida, Adrian Dabrowski, Edgar R. Weippl, Isao Echizen:
PrivacyTag: A Community-Based Method for Protecting Privacy of Photographed Subjects in Online Social Networks. I3E 2017: 261-275 - [c119]Tateo Ogane, Isao Echizen:
Biometric Jammer: Preventing surreptitious fingerprint photography without inconveniencing users. IJCB 2017: 253-260 - [c118]Ryo Sakuma, Hyunho Kang, Keiichi Iwamura, Isao Echizen:
Digital Watermarking Scheme Based on Machine Learning for the IHC Evaluation Criteria. IIH-MSP (1) 2017: 370-380 - [c117]Hoang-Quoc Nguyen-Son
, Isao Echizen:
Detecting Computer-Generated Text Using Fluency and Noise Features. PACLING 2017: 288-300 - [c116]Nicolas Rahmouni, Vincent Nozick, Junichi Yamagishi, Isao Echizen:
Distinguishing computer graphics from natural images using convolution neural networks. WIFS 2017: 1-6 - [c115]Ngoc-Dung T. Tieu, Huy H. Nguyen, Hoang-Quoc Nguyen-Son, Junichi Yamagishi, Isao Echizen:
An approach for gait anonymization using deep learning. WIFS 2017: 1-6 - [c114]Raphael R. Toledo, George Danezis, Isao Echizen:
Mix-ORAM: Using Delegated Shuffles. WPES@CCS 2017: 51-61 - [i3]Raphael R. Toledo, George Danezis, Isao Echizen:
Mix-ORAM: Using delegate shuffles. CoRR abs/1709.01008 (2017) - [i2]Thach V. Bui, Minoru Kuribayashi, Mahdi Cheraghchi, Isao Echizen:
Efficiently Decodable Non-Adaptive Threshold Group Testing. CoRR abs/1712.07509 (2017) - 2016
- [j27]Isao Echizen:
Foreword. IEICE Trans. Inf. Syst. 99-D(1): 40 (2016) - [j26]Mazdak Zamani
, Isao Echizen, Arash Habibi Lashkari:
Innovations in Communications Security. J. Electr. Comput. Eng. 2016: 4743084:1 (2016) - [c113]Toan-Thinh Truong, Duong-Tien Phan, Minh-Triet Tran, Anh Duc Duong, Isao Echizen:
Provable User Authentication Scheme in Telecare Medicine Information System Using Elliptic Curve Cryptosystem. ARES 2016: 253-259 - [c112]Natsuki Kokui, Hyunho Kang, Keiichi Iwamura, Isao Echizen:
Best embedding direction for spread spectrum-based video watermarking. GCCE 2016: 1-3 - [c111]Yuichi Kusama, Hyunho Kang, Keiichi Iwamura, Isao Echizen:
Privacy-protected video surveillance in crowded environments using robust watermarking. GCCE 2016: 1-2 - [c110]YuFeng Yan, Hyunho Kang, Keiichi Iwamura, Isao Echizen:
Image watermarking using the differences between two wavelet filters. GCCE 2016: 1-3 - [c109]Eina Hashimoto, Masatsugu Ichino, Tetsuji Kuboyama, Isao Echizen, Hiroshi Yoshiura:
Breaking Anonymity of Social Network Accounts by Using Coordinated and Extensible Classifiers Based on Machine Learning. I3E 2016: 455-470 - [c108]Kei Hashimoto, Junichi Yamagishi, Isao Echizen:
Privacy-preserving sound to degrade automatic speaker verification performance. ICASSP 2016: 5500-5504 - [c107]Thach V. Bui, Tetsuya Kojima, Isao Echizen:
Efficiently decodable defective items detected by new model of noisy group testing. ISITA 2016: 265-269 - [c106]Sayaka Shiota, Fernando Villavicencio, Junichi Yamagishi, Nobutaka Ono
, Isao Echizen, Tomoko Matsui:
Voice Liveness Detection for Speaker Verification based on a Tandem Single/Double-channel Pop Noise Detector. Odyssey 2016: 259-263 - [e4]Yun-Qing Shi, Hyoung-Joong Kim, Fernando Pérez-González
, Isao Echizen:
Digital-Forensics and Watermarking - 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9569, Springer 2016, ISBN 978-3-319-31959-9 [contents] - 2015
- [j25]Isao Echizen:
Foreword. IEICE Trans. Inf. Syst. 98-D(1): 1 (2015) - [j24]Hoang-Quoc Nguyen-Son, Minh-Triet Tran, Hiroshi Yoshiura, Noboru Sonehara, Isao Echizen:
Anonymizing Personal Text Messages Posted in Online Social Networks and Detecting Disclosures of Personal Information. IEICE Trans. Inf. Syst. 98-D(1): 78-88 (2015) - [j23]Thach V. Bui, Binh Q. Nguyen, Thuc Dinh Nguyen, Noboru Sonehara, Isao Echizen:
Robust fingerprinting codes for database using non-adaptive group testing. Int. J. Big Data Intell. 2(2): 81-90 (2015) - [j22]Tomoko Kajiyama, Isao Echizen:
An educational system to help students assess website features and identify high-risk websites. Interact. Technol. Smart Educ. 12(1): 14-30 (2015) - [j21]Isao Echizen, Takayuki Yamada, Seiichi Gohshi:
IR Hiding: Use of Specular Reflection for Short-Wavelength-Pass-Filter Detection to Prevent Re-recording of Screen Images. Trans. Data Hiding Multim. Secur. 10: 38-54 (2015) - [c105]Thach V. Bui, Thuc Dinh Nguyen, Noboru Sonehara, Isao Echizen:
Efficient Authentication, Traitor Detection, and Privacy-Preserving for the Most Common Queries in Two-Tiered Wireless Sensor Networks. AINA 2015: 365-372 - [c104]Hoang-Quoc Nguyen-Son, Minh-Triet Tran, Hiroshi Yoshiura, Noboru Sonehara, Isao Echizen:
A Rule-Based Approach for Detecting Location Leaks of Short Text Messages. BIS (Workshops) 2015: 199-210 - [c103]Adrian Dabrowski, Katharina Krombholz, Edgar R. Weippl, Isao Echizen:
Smart Privacy Visor: Bridging the Privacy Gap. BIS (Workshops) 2015: 235-247 - [c102]Yohei Ogawa, Eina Hashimoto, Masatsugu Ichino, Isao Echizen, Hiroshi Yoshiura:
De-anonymising Social Network Posts by Linking with Résumé. BIS (Workshops) 2015: 248-260 - [c101]Hirokazu Ishizuka, Kouichi Sakurai, Isao Echizen, Keiichi Iwamura:
Evaluation of Matching Accuracy of Template Matching Using a Steganography Algorithm. CANDAR 2015: 457-462 - [c100]Thach V. Bui, Thuc Dinh Nguyen, Noboru Sonehara, Isao Echizen:
Tradeoff Between the Price of Distributing a Database and Its Collusion Resistance Based on Concatenated Codes. ICA3PP (2) 2015: 163-182 - [c99]Kent Kobayashi, Masaki Inamura, Kitahiro Kaneda, Keiichi Iwamura, Isao Echizen:
Surveillance Camera System Balancing Privacy Protection and Effective Surveillance Image Use. ICE-B 2015: 41-48 - [c98]Sayaka Shiota, Fernando Villavicencio, Junichi Yamagishi, Nobutaka Ono, Isao Echizen, Tomoko Matsui:
Voice liveness detection algorithms based on pop noise caused by human breath for automatic speaker verification. INTERSPEECH 2015: 239-243 - [c97]Huy H. Nguyen, Hoang-Quoc Nguyen-Son, Thuc Dinh Nguyen, Isao Echizen:
Discriminating Between Computer-Generated Facial Images and Natural Ones Using Smoothness Property and Local Entropy. IWDW 2015: 39-50 - [c96]Toshiki Ito, Hyunho Kang, Keiichi Iwamura, Kitahiro Kaneda, Isao Echizen:
Audio Watermarking Using Different Wavelet Filters. IWDW 2015: 312-320 - [c95]Hoang-Quoc Nguyen-Son, Yusuke Miyao, Isao Echizen:
Paraphrase Detection Based on Identical Phrase and Similar Word Matching. PACLIC 2015 - [c94]Toan-Thinh Truong, Minh-Triet Tran, Anh Duc Duong, Isao Echizen:
Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment. SEC 2015: 479-494 - [c93]Adrian Dabrowski, Isao Echizen, Edgar R. Weippl:
Error-Correcting Codes as Source for Decoding Ambiguity. IEEE Symposium on Security and Privacy Workshops 2015: 99-105 - 2014
- [j20]Seiichi Gohshi, Takayuki Hiroi, Isao Echizen:
Subjective assessment of HDTV with superresolution function. EURASIP J. Image Video Process. 2014: 11 (2014) - [j19]Peter Kieseberg, Sebastian Schrittwieser, Martin Mulazzani, Isao Echizen, Edgar R. Weippl:
An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata. Electron. Mark. 24(2): 113-124 (2014) - [c92]Hoang-Quoc Nguyen-Son, Minh-Triet Tran, Hiroshi Yoshiura, Noboru Sonehara, Isao Echizen:
A System for Anonymizing Temporal Phrases of Message Posted in Online Social Networks and for Detecting Disclosure. ARES 2014: 455-460 - [c91]Haruno Kataoka, Yohei Ogawa, Isao Echizen, Tetsuji Kuboyama
, Hiroshi Yoshiura:
Effects of External Information on Anonymity and Role of Transparency with Example of Social Network De-anonymisation. ARES 2014: 461-467 - [c90]Toshiki Ito, Ryo Sugimura, Hyunho Kang, Keiichi Iwamura, Kitahiro Kaneda, Isao Echizen:
A New Approach to Reversible Watermarking. IIH-MSP 2014: 455-458 - [c89]Hirokazu Ishizuka, Isao Echizen, Keiichi Iwamura, Kouichi Sakurai:
A Zero-Watermarking-Like Steganography and Potential Applications. IIH-MSP 2014: 459-462 - [c88]Kento Kobayashi, Keiichi Iwamura, Kitahiro Kaneda, Isao Echizen:
Surveillance Camera System to Achieve Privacy Protection and Crime Prevention. IIH-MSP 2014: 463-466 - [c87]Shimon Machida, Tomoko Kajiyama, Shigeru Shimada, Isao Echizen:
Analysis of Facebook Friends Using Disclosure Level. IIH-MSP 2014: 471-474 - [c86]Kitahiro Kaneda, Hiroyasu Kitazawa, Keiichi Iwamura, Isao Echizen:
A Study of Equipment Dependence of a Single-Dot Pattern Method for an Information-Hiding by Applying an Error-Correcting Code. IIH-MSP 2014: 497-501 - [c85]Kitahiro Kaneda, Tomoki Inui, Keiichi Iwamura, Isao Echizen:
Novel Proposal and Evaluation of Information Extraction Method from Artificial Fiber Pattern Using a Camera. IIH-MSP 2014: 502-506 - [c84]Kitahiro Kaneda, Kenta Kawabata, Keiichi Iwamura, Isao Echizen:
Mathematical Simulation Model and Its Evaluation for Artificial Fiber Patterns. IIH-MSP 2014: 507-511 - [c83]Thach V. Bui, Nguyen K. Vu, Thong T. P. Nguyen, Isao Echizen, Thuc Dinh Nguyen:
Robust Message Hiding for QR Code. IIH-MSP 2014: 520-523 - [c82]Alberto Escalada Jimenez, Adrian Dabrowski, Noboru Sonehara, Juan Manuel Montero-Martínez
, Isao Echizen:
Tag Detection for Preventing Unauthorized Face Image Processing. IWDW 2014: 513-524 - [c81]Erwan Chaussy, Shimon Machida, Noboru Sonehara, Isao Echizen:
Definition of Private Information for Image Sharing in Social Networking Services. IWDW 2014: 544-556 - [c80]Hirokazu Ishizuka, Isao Echizen, Keiichi Iwamura, Kouichi Sakurai:
Evaluation of a Zero-Watermarking-Type Steganography. IWDW 2014: 613-624 - 2013
- [j18]Klaus Rechert, Konrad Meier, Richard M. Zahoransky, Dennis Wehrle, Dirk von Suchodoletz, Benjamin Greschbach, Sven Wohlgemuth, Isao Echizen:
Reclaiming Location Privacy in Mobile Telephony Networks - Effects and Consequences for Providers and Subscribers. IEEE Syst. J. 7(2): 211-222 (2013) - [c79]Tomoya Muraki, Shintaro Oishi, Masatsugu Ichino, Isao Echizen, Hiroshi Yoshiura:
Anonymizing Face Images by Using Similarity-Based Metric. ARES 2013: 517-524 - [c78]Hiroki Nishikawa, Yoshio Kakizaki, Keiichi Iwamura, Isao Echizen:
Experiment of Geometrically Invariant and Unneeded Synchronism Watermarking Using Winding Number. AINA Workshops 2013: 877-882 - [c77]