default search action
Kenta Iida
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c15]Kenta Iida, Hitoshi Kiya:
A Privacy-Preserving Image Retrieval Scheme with a Mixture of Plain and EtC Images. LifeTech 2022: 183-186 - [i5]Kenta Iida, Hitoshi Kiya:
A Privacy-Preserving Image Retrieval Scheme with a Mixture of Plain and EtC Images. CoRR abs/2202.00382 (2022) - 2021
- [c14]Kenta Iida, Hitoshi Kiya:
A Privacy-Preserving Image Retrieval Scheme Using A Codebook Generated from Independent Plain-Image Dataset. APSIPA ASC 2021: 1846-1850 - [c13]Kenta Iida, Hitoshi Kiya:
Privacy-preserving Image Retrieval Scheme Allowing Mixed Use of Lossless and JPEG Compressed Images. LifeTech 2021: 37-39 - [i4]Kenta Iida, Hitoshi Kiya:
A Privacy-Preserving Image Retrieval Scheme Using A Codebook Generated From Independent Plain-Image Dataset. CoRR abs/2109.01841 (2021) - 2020
- [j6]Kenta Iida, Hitoshi Kiya:
Privacy-Preserving Content-Based Image Retrieval Using Compressible Encrypted Images. IEEE Access 8: 200038-200050 (2020) - [j5]Kenta Iida, Hitoshi Kiya:
Image Identification of Encrypted JPEG Images for Privacy-Preserving Photo Sharing Services. IEICE Trans. Inf. Syst. 103-D(1): 25-32 (2020) - [c12]Kenta Iida, Hitoshi Kiya:
A Privacy-Preserving Content-Based Image Retrieval Scheme Allowing Mixed Use Of Encrypted And Plain Images. APSIPA 2020: 1436-1441 - [c11]Kenta Iida, Hitoshi Kiya:
A Content-based Image Retrieval Scheme Using Compressible Encrypted Images. EUSIPCO 2020: 730-734 - [i3]Kenta Iida, Hitoshi Kiya:
A Privacy-Preserving Content-Based Image Retrieval Scheme Allowing Mixed Use Of Encrypted And Plain Images. CoRR abs/2011.00270 (2020)
2010 – 2019
- 2019
- [j4]Kenta Iida, Hitoshi Kiya:
Robust Image Identification with DC Coefficients for Double-Compressed JPEG Images. IEICE Trans. Inf. Syst. 102-D(1): 2-10 (2019) - [j3]Tatsuya Chuman, Kenta Iida, Warit Sirichotedumrong, Hitoshi Kiya:
Image Manipulation Specifications on Social Networking Services for Encryption-then-Compression Systems. IEICE Trans. Inf. Syst. 102-D(1): 11-18 (2019) - [c10]Kenta Iida, Hitoshi Kiya:
Image Identification of Grayscale-Based JPEG Images for Privacy-Preserving Photo Sharing Services. APSIPA 2019: 1750-1755 - [c9]Kenta Iida, Hitoshi Kiya:
An Image Identification Scheme Of Encrypted Jpeg Images For Privacy-Preserving Photo Sharing Services. ICIP 2019: 4564-4568 - 2018
- [j2]Kenta Iida, Hitoshi Kiya:
Robust Image Identification without Visible Information for JPEG Images. IEICE Trans. Inf. Syst. 101-D(1): 13-19 (2018) - [c8]Kenta Iida, Hitoshi Kiya:
Robust Image Identification for Double-Compressed and Resized JPEG Images. APSIPA 2018: 1968-1974 - [i2]Kenta Iida, Hitoshi Kiya:
Robust Image Identification for Double-Compressed JPEG Images. CoRR abs/1807.06928 (2018) - [i1]Tatsuya Chuman, Kenta Iida, Warit Sirichotedumrong, Hitoshi Kiya:
Image Manipulation Specifications on Social Networking Services for Encryption-then-Compression Systems. CoRR abs/1810.02062 (2018) - 2017
- [c7]Kenta Iida, Hitoshi Kiya:
Robust image identification without any visible information for double-compressed JPEG images. APSIPA 2017: 852-857 - [c6]Tatsuya Chuman, Kenta Iida, Hitoshi Kiya:
Image manipulation on social media for encryption-then-compression systems. APSIPA 2017: 858-863 - [c5]Kenta Iida, Hitoshi Kiya:
Robust image identification with secure features for JPEG images. ICIP 2017: 4342-4346 - [c4]Kenta Iida, Hitoshi Kiya:
Speeding up image identification with visually protected features for JPEG image. IWSDA 2017: 54-58 - 2016
- [j1]Kenta Iida, Hitoshi Kiya:
Fuzzy Commitment Scheme-Based Secure Identification for JPEG Images with Various Compression Ratios. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(11): 1962-1970 (2016) - [c3]Kenta Iida, Hitoshi Kiya:
Codestream level secure identification for JPEG 2000 images under various compression ratios. APSIPA 2016: 1-6 - [c2]Kenta Iida, Hitoshi Kiya:
Secure and robust identification based on fuzzy commitment scheme for JPEG images. BMSB 2016: 1-5 - [c1]Kenta Iida, Hiroyuki Kobayashi, Hitoshi Kiya:
Secure identification based on fuzzy commitment scheme for JPEG XR images. EUSIPCO 2016: 968-972
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:46 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint