default search action
Hitoshi Kiya
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j109]Ryota Iijima
, Sayaka Shiota
, Hitoshi Kiya
:
A Random Ensemble of Encrypted Vision Transformers for Adversarially Robust Defense. IEEE Access 12: 69206-69216 (2024) - [j108]April Pyone Maung Maung
, Isao Echizen
, Hitoshi Kiya
:
On the Security of Learnable Image Encryption for Privacy-Preserving Deep Learning. IEEE Access 12: 126415-126425 (2024) - [c270]Rei Aso, Sakaya Shiota, Hitoshi Kiya:
Disposable-key-based image encryption for collaborative learning of Vision Transformer. APSIPA 2024: 1-6 - [c269]Mare Hirose, Shoko Imaizumi, Hitoshi Kiya:
On the Security of Bitstream-level JPEG Encryption with Restart Markers. APSIPA 2024: 1-6 - [c268]Yuma Kinoshita, Hitoshi Kiya:
Scene-Segmentation-Based Exposure Compensation for Tone Mapping of High Dynamic Range Scenes. APSIPA 2024: 1-6 - [c267]Hiroto Sawada, Shoko Imaizumi, Hitoshi Kiya:
Enhancing Security Using Random Binary Weights in Privacy-Preserving Federated Learning. APSIPA 2024: 1-6 - [c266]Kouki Horio, Kiyoshi Nishikawa, Hitoshi Kiya:
Privacy-Preserving Vision Transformer Using Images Encrypted with Restricted Random Permutation Matrices. GCCE 2024: 1179-1182 - [c265]AprilPyone MaungMaung, Huy H. Nguyen, Hitoshi Kiya, Isao Echizen:
Fine-Tuning Text-To-Image Diffusion Models for Class-Wise Spurious Feature Generation. ICIP 2024: 3910-3916 - [i109]Ryota Iijima, Sayaka Shiota, Hitoshi Kiya:
A Random Ensemble of Encrypted models for Enhancing Robustness against Adversarial Examples. CoRR abs/2401.02633 (2024) - [i108]Teru Nagamori, Sayaka Shiota, Hitoshi Kiya:
Efficient Fine-Tuning with Domain Adaptation for Privacy-Preserving Vision Transformer. CoRR abs/2401.05126 (2024) - [i107]Ryota Iijima, Sayaka Shiota, Hitoshi Kiya:
A Random Ensemble of Encrypted Vision Transformers for Adversarially Robust Defense. CoRR abs/2402.07183 (2024) - [i106]AprilPyone MaungMaung, Huy H. Nguyen, Hitoshi Kiya, Isao Echizen:
Fine-Tuning Text-To-Image Diffusion Models for Class-Wise Spurious Feature Generation. CoRR abs/2402.08200 (2024) - [i105]Shoko Niwa, Sayaka Shiota, Hitoshi Kiya:
Speech privacy-preserving methods using secret key for convolutional neural network models and their robustness evaluation. CoRR abs/2408.03897 (2024) - [i104]Rei Aso, Sayaka Shiota, Hitoshi Kiya:
Disposable-key-based image encryption for collaborative learning of Vision Transformer. CoRR abs/2408.05737 (2024) - [i103]Kouki Horio, Kiyoshi Nishikawa, Hitoshi Kiya:
Privacy-Preserving Vision Transformer Using Images Encrypted with Restricted Random Permutation Matrices. CoRR abs/2408.08529 (2024) - [i102]Hiroto Sawada, Shoko Imaizumi, Hitoshi Kiya:
Enhancing Security Using Random Binary Weights in Privacy-Preserving Federated Learning. CoRR abs/2409.19988 (2024) - [i101]Mare Hirose, Shoko Imaizumi, Hitoshi Kiya:
On the Security of Bitstream-level JPEG Encryption with Restart Markers. CoRR abs/2410.06522 (2024) - [i100]Yuma Kinoshita, Hitoshi Kiya:
Scene-Segmentation-Based Exposure Compensation for Tone Mapping of High Dynamic Range Scenes. CoRR abs/2410.19839 (2024) - 2023
- [j107]Hitoshi Kiya, Ryota Iijima, April Pyone Maung Maung, Yuma Kinoshita:
Image and Model Transformation with Secret Key for Vision Transformer. IEICE Trans. Inf. Syst. 106(1): 2-11 (2023) - [j106]Teru Nagamori, Hiroki Ito, April Pyone Maung Maung, Hitoshi Kiya:
Access Control with Encrypted Feature Maps for Object Detection Models. IEICE Trans. Inf. Syst. 106(1): 12-21 (2023) - [j105]Tatsuya Chuman
, Hitoshi Kiya
:
A Jigsaw Puzzle Solver-Based Attack on Image Encryption Using Vision Transformer for Privacy-Preserving DNNs. Inf. 14(6): 311 (2023) - [j104]Zheng Qi, AprilPyone MaungMaung, Hitoshi Kiya
:
Privacy-Preserving Image Classification Using ConvMixer with Adaptative Permutation Matrix and Block-Wise Scrambled Image Encryption. J. Imaging 9(4): 85 (2023) - [j103]Genki Hamano, Shoko Imaizumi
, Hitoshi Kiya
:
Effects of JPEG Compression on Vision Transformer Image Classification for Encryption-then-Compression Images. Sensors 23(7): 3400 (2023) - [j102]Ching-Chun Chang
, Xu Wang, Sisheng Chen, Hitoshi Kiya, Isao Echizen:
On the predictability in reversible steganography. Telecommun. Syst. 82(2): 301-313 (2023) - [c264]AprilPyone MaungMaung, Isao Echizen, Hitoshi Kiya:
Hindering Adversarial Attacks with Multiple Encrypted Patch Embeddings. APSIPA ASC 2023: 1398-1404 - [c263]Teru Nagamori, Sayaka Shiota, Hitoshi Kiya:
Domain Adaptation for Efficiently Fine-tuning Vision Transformer with Encrypted Images. APSIPA ASC 2023: 1677-1683 - [c262]Yuma Kinoshita, Kouei Yamaoka, Hitoshi Kiya:
Maximization of 2D Cross-Correlation Based on Auxiliary Function Method for Image Alignment. APSIPA ASC 2023: 2043-2047 - [c261]Tomoka Wakamatsu, Sayaka Shiota, Hitoshi Kiya:
Vocal Tract Length Perturbation-based Pseudo-Speaker Augmentation for Speaker Embedding Learning. APSIPA ASC 2023: 2228-2232 - [c260]Shoko Niwa, Sayaka Shiota, Hitoshi Kiya:
A Privacy-Preserving Method Using Secret Key for Convolutional Neural Network-Based Speech Classification. EUSIPCO 2023: 76-80 - [c259]Kosuke Abe, Shoko Imaizumi, Hitoshi Kiya:
Effects of Data Hiding on Vision Transformer Classification for Encryption-then-Compression Images. GCCE 2023: 787-789 - [c258]Rei Aso, Sayaka Shiota, Hitoshi Kiya:
Enhanced Security with Encrypted Vision Transformer in Federated Learning. GCCE 2023: 819-822 - [c257]Tatsuya Chuman, Nobutaka Ono, Hitoshi Kiya:
Security Evaluation of Compressible and Learnable Image Encryption against Jigsaw Puzzle Solver Attacks. GCCE 2023: 823-826 - [c256]Ryota Iijima, Miki Tanaka, Sayaka Shiota, Hitoshi Kiya:
Enhanced Security against Adversarial Examples Using a Random Ensemble of Encrypted Vision Transformer Models. GCCE 2023: 948-951 - [i99]Rei Aso, Tatsuya Chuman, Hitoshi Kiya:
A Privacy Preserving Method with a Random Orthogonal Matrix for ConvMixer Models. CoRR abs/2301.03843 (2023) - [i98]Zheng Qi, AprilPyone MaungMaung, Hitoshi Kiya:
Color-NeuraCrypt: Privacy-Preserving Color-Image Classification Using Extended Random Neural Networks. CoRR abs/2301.04875 (2023) - [i97]Teru Nagamori, Hitoshi Kiya:
Combined Use of Federated Learning and Image Encryption for Privacy-Preserving Image Classification with Vision Transformer. CoRR abs/2301.09255 (2023) - [i96]AprilPyone MaungMaung, Hitoshi Kiya:
Generative Model-Based Attack on Learnable Image Encryption for Privacy-Preserving Deep Learning. CoRR abs/2303.05036 (2023) - [i95]Ryota Iijima, Miki Tanaka, Sayaka Shiota, Hitoshi Kiya:
Enhanced Security against Adversarial Examples Using a Random Ensemble of Encrypted Vision Transformer Models. CoRR abs/2307.13985 (2023) - [i94]Rei Aso, Sayaka Shiota, Hitoshi Kiya:
Enhanced Security with Encrypted Vision Transformer in Federated Learning. CoRR abs/2308.00271 (2023) - [i93]Tatsuya Chuman, Nobutaka Ono, Hitoshi Kiya:
Security Evaluation of Compressible and Learnable Image Encryption Against Jigsaw Puzzle Solver Attacks. CoRR abs/2308.02227 (2023) - [i92]Hitoshi Kiya, Ryota Iijima, Teru Nagamori:
Block-Wise Encryption for Reliable Vision Transformer models. CoRR abs/2308.07612 (2023) - [i91]AprilPyone MaungMaung, Isao Echizen, Hitoshi Kiya:
Hindering Adversarial Attacks with Multiple Encrypted Patch Embeddings. CoRR abs/2309.01620 (2023) - [i90]Teru Nagamori, Sayaka Shiota, Hitoshi Kiya:
Domain Adaptation for Efficiently Fine-tuning Vision Transformer with Encrypted Images. CoRR abs/2309.02556 (2023) - [i89]AprilPyone MaungMaung, Isao Echizen, Hitoshi Kiya:
Efficient Key-Based Adversarial Defense for ImageNet by Using Pre-trained Model. CoRR abs/2311.16577 (2023) - 2022
- [j101]Teruaki Akazawa, Yuma Kinoshita
, Sayaka Shiota, Hitoshi Kiya
:
N-White Balancing: White Balancing for Multiple Illuminants Including Non-Uniform Illumination. IEEE Access 10: 89051-89062 (2022) - [j100]Hiroto Kai, Shinnosuke Takamichi, Sayaka Shiota, Hitoshi Kiya:
Lightweight and irreversible speech pseudonymization based on data-driven optimization of cascaded voice modification modules. Comput. Speech Lang. 72: 101315 (2022) - [j99]MaungMaung AprilPyone
, Hitoshi Kiya
:
Privacy-Preserving Image Classification Using an Isotropic Network. IEEE Multim. 29(2): 23-33 (2022) - [j98]Hitoshi Kiya
, Teru Nagamori
, Shoko Imaizumi
, Sayaka Shiota
:
Privacy-Preserving Semantic Segmentation Using Vision Transformer. J. Imaging 8(9): 233 (2022) - [c255]Zheng Qi, AprilPyone MaungMaung, Yuma Kinoshita, Hitoshi Kiya:
Privacy-Preserving Image Classification Using Vision Transformer. EUSIPCO 2022: 543-547 - [c254]Yuki Shiroma, Yuma Kinoshita, Keisuke Imoto, Sayaka Shiota, Nobutaka Ono, Hitoshi Kiya:
Missing data recovery using autoencoder for multi-channel acoustic scene classification. EUSIPCO 2022: 767-771 - [c253]Shoko Niwa, Miki Tanaka, Hitoshi Kiya:
A Detection Method of Temporally Operated Videos Using Robust Hashing. GCCE 2022: 144-147 - [c252]Zheng Qi, AprilPyone MaungMaung, Hitoshi Kiya:
Privacy-Preserving Image Classification Using ConvMixer with Adaptive Permutation Matrix. GCCE 2022: 148-151 - [c251]Teruaki Akazawa, Yuma Kinoshita, Hitoshi Kiya:
Template matching with white balance adjustment under multiple illuminants. GCCE 2022: 372-376 - [c250]Teru Nagamori, Ryota Iijima, Hitoshi Kiya:
An Access Control Method with Secret Key for Semantic Segmentation Models. ICMLC 2022: 37-42 - [c249]Tatsuya Chuman, Hitoshi Kiya:
Security Evaluation of Compressible Image Encryption for Privacy-Preserving Image Classification Against Ciphertext-Only Attacks. ICMLC 2022: 86-90 - [c248]Ryota Iijima, Hitoshi Kiya:
An Encryption Method of Convmixer Models without Performance Degradation. ICMLC 2022: 159-164 - [c247]Miki Tanaka, Isao Echizen, Hitoshi Kiya:
On the Transferability of Adversarial Examples between Encrypted Models. ISPACS 2022: 1-4 - [c246]Teru Nagamori, Hiroki Ito, MaungMaung AprilPyone, Hitoshi Kiya:
Access Control of Object Detection Models Using Encrypted Feature Maps. LifeTech 2022: 175-178 - [c245]Takayuki Osakabe, AprilPyone MaungMaung, Sayaka Shiota, Hitoshi Kiya:
Adversarial Detector with Robust Classifier. LifeTech 2022: 179-182 - [c244]Kenta Iida, Hitoshi Kiya:
A Privacy-Preserving Image Retrieval Scheme with a Mixture of Plain and EtC Images. LifeTech 2022: 183-186 - [c243]Tatsuya Chuman, Hitoshi Kiya:
Security Evaluation of Block-based Image Encryption for Vision Transformer against Jigsaw Puzzle Solver Attack. LifeTech 2022: 448-451 - [c242]Hiroto Kai, Shinnosuke Takamichi, Sayaka Shiota, Hitoshi Kiya:
Robustness of Signal Processing-Based Pseudonymization Method Against Decryption Attack. Odyssey 2022: 287-293 - [i88]Hiroyuki Kobayashi, Hitoshi Kiya:
Proxy System with JPEG Bitstream-Based File-Size Preserving Encryption for Cloud Photo Streams. CoRR abs/2201.03469 (2022) - [i87]Hitoshi Kiya, AprilPyone MaungMaung, Yuma Kinoshita, Shoko Imaizumi, Sayaka Shiota:
An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications. CoRR abs/2201.11006 (2022) - [i86]Teru Nagamori, Hiroki Ito, April Pyone Maung Maung, Hitoshi Kiya:
Access Control of Object Detection Models Using Encrypted Feature Maps. CoRR abs/2202.00265 (2022) - [i85]Kenta Iida, Hitoshi Kiya:
A Privacy-Preserving Image Retrieval Scheme with a Mixture of Plain and EtC Images. CoRR abs/2202.00382 (2022) - [i84]Tatsuya Chuman, Hitoshi Kiya:
Security Evaluation of Block-based Image Encryption for Vision Transformer against Jigsaw Puzzle Solver Attack. CoRR abs/2202.00806 (2022) - [i83]Takayuki Osakabe, MaungMaung AprilPyone, Sayaka Shiota, Hitoshi Kiya:
Adversarial Detector with Robust Classifier. CoRR abs/2202.02503 (2022) - [i82]AprilPyone MaungMaung, Hitoshi Kiya:
Privacy-Preserving Image Classification Using Isotropic Network. CoRR abs/2204.07707 (2022) - [i81]Zheng Qi, AprilPyone MaungMaung, Yuma Kinoshita, Hitoshi Kiya:
Privacy-Preserving Image Classification Using Vision Transformer. CoRR abs/2205.12041 (2022) - [i80]Hiroki Ito, AprilPyone MaungMaung, Sayaka Shiota, Hitoshi Kiya:
Access Control of Semantic Segmentation Models Using Encrypted Feature Maps. CoRR abs/2206.05422 (2022) - [i79]Hitoshi Kiya, Ryota Iijima, MaungMaung AprilPyone, Yuma Kinoshita:
Image and Model Transformation with Secret Key for Vision Transformer. CoRR abs/2207.05366 (2022) - [i78]Tatsuya Chuman, Hitoshi Kiya:
Security Evaluation of Compressible Image Encryption for Privacy-Preserving Image Classification against Ciphertext-only Attacks. CoRR abs/2207.08109 (2022) - [i77]Ryota Iijima, Hitoshi Kiya:
An Encryption Method of ConvMixer Models without Performance Degradation. CoRR abs/2207.11939 (2022) - [i76]Teruaki Akazawa, Yuma Kinoshita, Hitoshi Kiya:
Template matching with white balance adjustment under multiple illuminants. CoRR abs/2208.02035 (2022) - [i75]Zheng Qi, AprilPyone MaungMaung, Hitoshi Kiya:
Privacy-Preserving Image Classification Using ConvMixer with Adaptive Permutation Matrix. CoRR abs/2208.02556 (2022) - [i74]Shoko Niwa, Miki Tanaka, Hitoshi Kiya:
A Detection Method of Temporally Operated Videos Using Robust Hashing. CoRR abs/2208.05198 (2022) - [i73]Teru Nagamori, Ryota Iijima, Hitoshi Kiya:
An Access Control Method with Secret Key for Semantic Segmentation Models. CoRR abs/2208.13135 (2022) - [i72]Miki Tanaka, Isao Echizen, Hitoshi Kiya:
On the Transferability of Adversarial Examples between Encrypted Models. CoRR abs/2209.02997 (2022) - [i71]AprilPyone MaungMaung, Hitoshi Kiya:
StyleGAN Encoder-Based Attack for Block Scrambled Face Images. CoRR abs/2209.07953 (2022) - [i70]Ryota Iijima, Miki Tanaka, Isao Echizen, Hitoshi Kiya:
On the Adversarial Transferability of ConvMixer Models. CoRR abs/2209.08724 (2022) - [i69]Teru Nagamori, Hiroki Ito, AprilPyone MaungMaung, Hitoshi Kiya:
Access Control with Encrypted Feature Maps for Object Detection Models. CoRR abs/2209.14831 (2022) - [i68]Tatsuya Chuman, Hitoshi Kiya:
A Jigsaw Puzzle Solver-based Attack on Block-wise Image Encryption for Privacy-preserving DNNs. CoRR abs/2211.02369 (2022) - 2021
- [j97]Hiroki Ito
, Yuma Kinoshita
, MaungMaung AprilPyone
, Hitoshi Kiya
:
Image to Perturbation: An Image Transformation Network for Generating Visually Protected Images for Privacy-Preserving Deep Neural Networks. IEEE Access 9: 64629-64638 (2021) - [j96]Masaaki Fujiyoshi, Ruifeng Li, Hitoshi Kiya:
A Scheme of Reversible Data Hiding for the Encryption-Then-Compression System. IEICE Trans. Inf. Syst. 104-D(1): 43-50 (2021) - [j95]Miki Tanaka, Sayaka Shiota, Hitoshi Kiya:
A Detection Method of Operated Fake-Images Using Robust Hashing. J. Imaging 7(8): 134 (2021) - [j94]Teruaki Akazawa, Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya:
Three-Color Balancing for Color Constancy Correction. J. Imaging 7(10): 207 (2021) - [j93]Ryota Motomura, Shoko Imaizumi
, Hitoshi Kiya:
A Reversible Data Hiding Method in Encrypted Images for Controlling Trade-Off between Hiding Capacity and Compression Efficiency. J. Imaging 7(12): 268 (2021) - [j92]Ryoya Yaguchi, Sayaka Shiota, Nobutaka Ono, Hitoshi Kiya:
Replay Attack Detection Based on Spatial and Spectral Features of Stereo Signal. J. Inf. Process. 29: 275-282 (2021) - [j91]MaungMaung AprilPyone
, Hitoshi Kiya
:
Block-Wise Image Transformation With Secret Key for Adversarially Robust Defense. IEEE Trans. Inf. Forensics Secur. 16: 2709-2723 (2021) - [c241]Yuki Shiroma, Keisuke Imoto, Sayaka Shiota, Nobutaka Ono, Hitoshi Kiya:
Investigation on Spatial and Frequency-Based Features for Asynchronous Acoustic Scene Analysis. APSIPA ASC 2021: 1161-1166 - [c240]Teruaki Akazawa, Yuma Kinoshita, Hitoshi Kiya:
Spatially varying white balancing for mixed and non-uniform illuminants. APSIPA ASC 2021: 1571-1575 - [c239]Ryota Motomura, Shoko Imaizumi, Hitoshi Kiya:
A Flexible Reversible Data Hiding Method in Compressible Encrypted Images. APSIPA ASC 2021: 1794-1799 - [c238]Hiroki Ito, MaungMaung AprilPyone, Hitoshi Kiya:
Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models. APSIPA ASC 2021: 1833-1838 - [c237]Kenta Iida, Hitoshi Kiya:
A Privacy-Preserving Image Retrieval Scheme Using A Codebook Generated from Independent Plain-Image Dataset. APSIPA ASC 2021: 1846-1850 - [c236]MaungMaung AprilPyone, Hitoshi Kiya:
A Protection Method of Trained CNN Model Using Feature Maps Transformed With Secret Key From Unauthorized Access. APSIPA ASC 2021: 1851-1857 - [c235]AprilPyone MaungMaung, Hitoshi Kiya:
Ensemble of Key-Based Models: Defense Against Black-Box Adversarial Attacks. GCCE 2021: 95-98 - [c234]Miki Tanaka, Sayaka Shiota, Hitoshi Kiya:
A universal detector of CNN-generated images using properties of checkerboard artifacts in the frequency domain. GCCE 2021: 103-106 - [c233]Yuki Shiroma, Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya:
Phase representation based on HSV color model for acoustic classification with convolutional neural networks. GCCE 2021: 427-429 - [c232]Tatsuya Chuman, Hitoshi Kiya:
Block Scrambling Image Encryption Used in Combination with Data Augmentation for Privacy-Preserving DNNs. ICCE-TW 2021: 1-2 - [c231]Masaki Kitayama, Hitoshi Kiya:
Generation of Gradient-Preserving Images allowing HOG Feature Extraction. ICCE-TW 2021: 1-2 - [c230]Teruaki Akazawa, Yuma Kinoshita, Hitoshi Kiya:
Multi-Color Balance For Color Constancy. ICIP 2021: 1369-1373 - [c229]Yuma Kinoshita, Hitoshi Kiya:
Separated-Spectral-Distribution Estimation Based on Bayesian Inference with Single RGB Camera. ICIP 2021: 1379-1383 - [c228]MaungMaung AprilPyone, Hitoshi Kiya:
Transfer Learning-Based Model Protection With Secret Key. ICIP 2021: 3877-3881 - [c227]April Pyone Maung Maung, Hitoshi Kiya:
Piracy-Resistant DNN Watermarking by Block-Wise Image Transformation with Secret Key. IH&MMSec 2021: 159-164 - [c226]Kouki Seo, Yuma Kinoshita, Hitoshi Kiya:
Deep Retinex Network for Estimating Illumination Colors with Self-Supervised Learning. LifeTech 2021: 1-5 - [c225]Teruaki Akazawa, Yuma Kinoshita, Hitoshi Kiya:
Multi-color balancing for correctly adjusting the intensity of target colors. LifeTech 2021: 8-12 - [c224]Kenta Iida, Hitoshi Kiya:
Privacy-preserving Image Retrieval Scheme Allowing Mixed Use of Lossless and JPEG Compressed Images. LifeTech 2021: 37-39 - [c223]Miki Tanaka, Hitoshi Kiya:
Fake-image detection with Robust Hashing. LifeTech 2021: 40-43 - [c222]Ryoichi Hirasawa, Shoko Imaizumi
, Hitoshi Kiya:
An MSB Prediction-Based Method with Marker Bits for Reversible Data Hiding in Encrypted Images. LifeTech 2021: 48-50 - [c221]Hiroto Kai, Shinnosuke Takamichi, Sayaka Shiota, Hitoshi Kiya:
Lightweight Voice Anonymization Based on Data-Driven Optimization of Cascaded Voice Modification Modules. SLT 2021: 560-566 - [i67]Miki Tanaka, Hitoshi Kiya:
Fake-image detection with Robust Hashing. CoRR abs/2102.01313 (2021) - [i66]Teruaki Akazawa, Yuma Kinoshita, Hitoshi Kiya:
Multi-color balancing for correctly adjusting the intensity of target colors. CoRR abs/2102.01893 (2021) - [i65]MaungMaung AprilPyone, Hitoshi Kiya:
Transfer Learning-Based Model Protection With Secret Key. CoRR abs/2103.03525 (2021) - [i64]Masaki Kitayama, Hitoshi Kiya:
Generation of Gradient-Preserving Images allowing HOG Feature Extraction. CoRR abs/2104.01350 (2021) - [i63]Tatsuya Chuman, Hitoshi Kiya:
Block Scrambling Image Encryption Used in Combination with Data Augmentation for Privacy-Preserving DNNs. CoRR abs/2104.01398 (2021) - [i62]MaungMaung AprilPyone, Hitoshi Kiya:
Piracy-Resistant DNN Watermarking by Block-Wise Image Transformation with Secret Key. CoRR abs/2104.04241 (2021) - [i61]Teruaki Akazawa, Yuma Kinoshita, Hitoshi Kiya:
Multi-color balance for color constancy. CoRR abs/2105.10228 (2021) - [i60]MaungMaung AprilPyone, Hitoshi Kiya:
A Protection Method of Trained CNN Model with Secret Key from Unauthorized Access. CoRR abs/2105.14756 (2021) - [i59]Yuma Kinoshita, Hitoshi Kiya:
Separated-Spectral-Distribution Estimation Based on Bayesian Inference with Single RGB Camera. CoRR abs/2106.01861 (2021) - [i58]Hiroki Ito, MaungMaung AprilPyone, Hitoshi Kiya:
Protecting Semantic Segmentation Models by Using Block-wise Image Encryption with Secret Key from Unauthorized Access. CoRR abs/2107.09362 (2021) - [i57]Miki Tanaka, Sayaka Shiota, Hitoshi Kiya:
A universal detector of CNN-generated images using properties of checkerboard artifacts in the frequency domain. CoRR abs/2108.01892 (2021) - [i56]MaungMaung AprilPyone, Hitoshi Kiya:
A Protection Method of Trained CNN Model Using Feature Maps Transformed With Secret Key From Unauthorized Access. CoRR abs/2109.00224 (2021) - [i55]Hiroki Ito, MaungMaung AprilPyone, Hitoshi Kiya:
Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models. CoRR abs/2109.01332 (2021) - [i54]Teruaki Akazawa, Yuma Kinoshita, Hitoshi Kiya:
Spatially varying white balancing for mixed and non-uniform illuminants. CoRR abs/2109.01350 (2021) - [i53]Kenta Iida, Hitoshi Kiya:
A Privacy-Preserving Image Retrieval Scheme Using A Codebook Generated From Independent Plain-Image Dataset. CoRR abs/2109.01841 (2021) - [i52]Yuma Kinoshita, Hitoshi Kiya:
Self-Supervised Intrinsic Image Decomposition Network Considering Reflectance Consistency. CoRR abs/2111.04506 (2021) - [i51]Ryota Iijima, AprilPyone MaungMaung, Hitoshi Kiya:
Protection of SVM Model with Secret Key from Unauthorized Access. CoRR abs/2111.08927 (2021) - 2020
- [j90]Yuma Kinoshita
, Hitoshi Kiya
:
Hue-Correction Scheme Based on Constant-Hue Plane for Deep-Learning-Based Color-Image Enhancement. IEEE Access 8: 9540-9550 (2020) - [j89]Kenta Iida
, Hitoshi Kiya
:
Privacy-Preserving Content-Based Image Retrieval Using Compressible Encrypted Images. IEEE Access 8: 200038-200050 (2020) - [j88]Yukihiro Bandoh
, Takayuki Nakachi
, Hitoshi Kiya
:
Distributed Secure Sparse Modeling Based on Random Unitary Transform. IEEE Access 8: 211762-211772 (2020) - [j87]Kenta Iida, Hitoshi Kiya:
Image Identification of Encrypted JPEG Images for Privacy-Preserving Photo Sharing Services. IEICE Trans. Inf. Syst. 103-D(1): 25-32 (2020) - [j86]Ryota Kaminishi, Haruna Miyamoto, Sayaka Shiota, Hitoshi Kiya:
Blind Bandwidth Extension with a Non-Linear Function and Its Evaluation on Automatic Speaker Verification. IEICE Trans. Inf. Syst. 103-D(1): 42-49 (2020) - [j85]Takayuki Nakachi, Yukihiro Bandoh, Hitoshi Kiya:
Secure Overcomplete Dictionary Learning for Sparse Representation. IEICE Trans. Inf. Syst. 103-D(1): 50-58 (2020) - [j84]Kouki Seo, Chihiro Go, Yuma Kinoshita, Hitoshi Kiya:
Hue-Correction Scheme Considering Non-Linear Camera Response for Multi-Exposure Image Fusion. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(12): 1562-1570 (2020) - [j83]Ayana Kawamura, Yuma Kinoshita, Takayuki Nakachi, Sayaka Shiota, Hitoshi Kiya:
A Privacy-Preserving Machine Learning Scheme Using EtC Images. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(12): 1571-1578 (2020) - [j82]Shoko Imaizumi
, Yusuke Izawa, Ryoichi Hirasawa, Hitoshi Kiya:
A Reversible Data Hiding Method in Compressible Encrypted Images. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(12): 1579-1588 (2020) - [j81]Takayuki Nakachi, Hitoshi Kiya:
L0 Norm Optimization in Scrambled Sparse Representation Domain and Its Application to EtC System. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(12): 1589-1598 (2020) - [j80]Takayuki Nakachi, Hitoshi Kiya:
Secure OMP Computation Maintaining Sparse Representations and Its Application to EtC Systems. IEICE Trans. Inf. Syst. 103-D(9): 1988-1997 (2020) - [c220]Ryo Imaizumi, Ryo Masumura, Sayaka Shiota, Hitoshi Kiya:
Dialect-Aware Modeling for End-to-End Japanese Dialect Speech Recognition. APSIPA 2020: 297-301 - [c219]Yuma Kinoshita, Hitoshi Kiya:
Checkerboard-Artifact-Free Image-Enhancement Network Considering Local and Global Features. APSIPA 2020: 1139-1144 - [c218]Warit Sirichotedumrong, Hitoshi Kiya:
Visual Security Evaluation of Learnable Image Encryption Methods against Ciphertext-only Attacks. APSIPA 2020: 1304-1309 - [c217]Ryoichi Hirasawa, Shoko Imaizumi, Hitoshi Kiya:
Flexible Data Hiding and Extraction in EtC Images. APSIPA 2020: 1347-1351 - [c216]MaungMaung AprilPyone, Hitoshi Kiya:
An Extension of Encryption-Inspired Adversarial Defense with Secret Keys against Adversarial Examples. APSIPA 2020: 1369-1374 - [c215]Hiroki Ito, Yuma Kinoshita, Hitoshi Kiya:
A Framework for Transformation Network Training in Coordination with Semi-trusted Cloud Provider for Privacy-Preserving Deep Neural Networks. APSIPA 2020: 1420-1424 - [c214]Kenta Iida, Hitoshi Kiya:
A Privacy-Preserving Content-Based Image Retrieval Scheme Allowing Mixed Use Of Encrypted And Plain Images. APSIPA 2020: 1436-1441 - [c213]Kenta Iida, Hitoshi Kiya:
A Content-based Image Retrieval Scheme Using Compressible Encrypted Images. EUSIPCO 2020: 730-734 - [c212]Warit Sirichotedumrong, Hitoshi Kiya:
A GAN-Based Image Transformation Scheme for Privacy-Preserving Deep Neural Networks. EUSIPCO 2020: 745-749 - [c211]Hiroyuki Kobayashi, Hitoshi Kiya:
Extension of JPEG XS for Two-Layer Lossless Coding. GCCE 2020: 94-97 - [c210]Takayuki Osakabe, Yuma Kinoshita, Hitoshi Kiya:
On the influence of using quantized images on machine learning algorithms. GCCE 2020: 100-103 - [c209]Masaki Kitayama, Nobutaka Ono, Hitoshi Kiya:
Difficulty in estimating visual information from randomly sampled images. GCCE 2020: 222-226 - [c208]April Pyone Maung Maung, Hitoshi Kiya:
Training DNN Model with Secret Key for Model Protection. GCCE 2020: 818-821 - [c207]Hiroki Ito, Yuma Kinoshita, Hitoshi Kiya:
Image Transformation Network for Privacy-Preserving Deep Neural Networks and Its Security Evaluation. GCCE 2020: 822-825 - [c206]Ryo Imaizumi, Ryo Masumura, Sayaka Shiota, Hitoshi Kiya:
Sequence-To-One Neural Networks for Japanese Dialect Speech Classification. GCCE 2020: 933-935 - [c205]Yukihiro Bandoh, Takayuki Nakachi, Hitoshi Kiya:
Sparse Modeling on Distributed Encryption Data. ICASSP 2020: 2123-2127 - [c204]Takayuki Nakachi, Yitu Wang
, Hitoshi Kiya:
Privacy-Preserving Pattern Recognition Using Encrypted Sparse Representations in L0 Norm Minimization. ICASSP 2020: 2697-2701 - [c203]Yuma Kinoshita, Hitoshi Kiya:
Fixed Smooth Convolutional Layer for Avoiding Checkerboard Artifacts in CNNS. ICASSP 2020: 3712-3716 - [c202]Kouki Seo, Chihiro Go, Yuma Kinoshita, Hitoshi Kiya:
Hue Correction Scheme for Multi-Exposure Image Fusion Considering Hue Distortion in Input Images. ICCE-TW 2020: 1-2 - [c201]Weihang Zhang, Yuma Kinoshita, Hitoshi Kiya:
Image-Enhancement-Based Data Augmentation for Improving Deep Learning in Image Classification Problem. ICCE-TW 2020: 1-2 - [c200]April Pyone Maung Maung, Hitoshi Kiya:
Encryption Inspired Adversarial Defense For Visual Classification. ICIP 2020: 1681-1685 - [c199]Haruna Miyamoto, Sayaka Shiota, Hitoshi Kiya:
Application of Bandwidth Extension with No Learning to Data Augmentation for Speaker Verification. Odyssey 2020: 446-450 - [i50]Yuma Kinoshita, Hitoshi Kiya:
Fixed smooth convolutional layer for avoiding checkerboard artifacts in CNNs. CoRR abs/2002.02117 (2020) - [i49]MaungMaung AprilPyone, Hitoshi Kiya:
Encryption Inspired Adversarial Defense for Visual Classification. CoRR abs/2005.07998 (2020) - [i48]Warit Sirichotedumrong, Hitoshi Kiya:
A GAN-Based Image Transformation Scheme for Privacy-Preserving Deep Neural Networks. CoRR abs/2006.01342 (2020) - [i47]Ayana Kawamura, Yuma Kinoshita, Takayuki Nakachi, Sayaka Shiota, Hitoshi Kiya:
A Privacy-Preserving Machine Learning Scheme Using EtC Images. CoRR abs/2007.08775 (2020) - [i46]April Pyone Maung Maung, Hitoshi Kiya:
Training DNN Model with Secret Key for Model Protection. CoRR abs/2008.02450 (2020) - [i45]Hiroki Ito, Yuma Kinoshita, Hitoshi Kiya:
Image Transformation Network for Privacy-Preserving Deep Neural Networks and Its Security Evaluation. CoRR abs/2008.03143 (2020) - [i44]Hiroyuki Kobayashi, Hitoshi Kiya:
Extension of JPEG XS for Two-Layer Lossless Coding. CoRR abs/2008.04558 (2020) - [i43]MaungMaung AprilPyone, Hitoshi Kiya:
Block-wise Image Transformation with Secret Key for Adversarially Robust Defense. CoRR abs/2010.00801 (2020) - [i42]Warit Sirichotedumrong, Hitoshi Kiya:
Visual Security Evaluation of Learnable Image Encryption Methods against Ciphertext-only Attacks. CoRR abs/2010.06198 (2020) - [i41]Yuma Kinoshita, Hitoshi Kiya:
Checkerboard-Artifact-Free Image-Enhancement Network Considering Local and Global Features. CoRR abs/2010.12347 (2020) - [i40]Kenta Iida, Hitoshi Kiya:
A Privacy-Preserving Content-Based Image Retrieval Scheme Allowing Mixed Use Of Encrypted And Plain Images. CoRR abs/2011.00270 (2020) - [i39]MaungMaung AprilPyone, Hitoshi Kiya:
Ensemble of Models Trained by Key-based Transformed Images for Adversarially Robust Defense Against Black-box Attacks. CoRR abs/2011.07697 (2020) - [i38]Shoko Imaizumi, Hitoshi Kiya:
A Block-Permutation-Based Encryption Scheme with Independent Processing of RGB Components. CoRR abs/2011.08964 (2020) - [i37]Shoko Imaizumi, Yusuke Izawa, Ryoichi Hirasawa, Hitoshi Kiya:
A Reversible Data Hiding Method in Compressible Encrypted Images. CoRR abs/2011.08969 (2020) - [i36]Takayuki Osakabe, Miki Tanaka, Yuma Kinoshita, Hitoshi Kiya:
CycleGAN without checkerboard artifacts for counter-forensics of fake-image detection. CoRR abs/2012.00287 (2020) - [i35]Masaki Kitayama, Hitoshi Kiya:
Difficulty in estimating visual information from randomly sampled images. CoRR abs/2012.08751 (2020)
2010 – 2019
- 2019
- [j79]Yuma Kinoshita
, Hitoshi Kiya:
iTM-Net: Deep Inverse Tone Mapping Using Novel Loss Function Considering Tone Mapping Operator. IEEE Access 7: 73555-73563 (2019) - [j78]Warit Sirichotedumrong
, Yuma Kinoshita
, Hitoshi Kiya
:
Pixel-Based Image Encryption Without Key Management for Privacy-Preserving Deep Neural Networks. IEEE Access 7: 177844-177855 (2019) - [j77]MaungMaung AprilPyone
, Yuma Kinoshita
, Hitoshi Kiya
:
Adversarial Robustness by One Bit Double Quantization for Visual Classification. IEEE Access 7: 177932-177943 (2019) - [j76]Kenta Iida, Hitoshi Kiya:
Robust Image Identification with DC Coefficients for Double-Compressed JPEG Images. IEICE Trans. Inf. Syst. 102-D(1): 2-10 (2019) - [j75]Tatsuya Chuman, Kenta Iida, Warit Sirichotedumrong, Hitoshi Kiya:
Image Manipulation Specifications on Social Networking Services for Encryption-then-Compression Systems. IEICE Trans. Inf. Syst. 102-D(1): 11-18 (2019) - [j74]Hiroyuki Kobayashi, Osamu Watanabe, Hitoshi Kiya:
Two-Layer Near-Lossless HDR Coding Using Zero-Skip Quantization with Backward Compatibility to JPEG. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(12): 1842-1848 (2019) - [j73]Takahiro Maekawa, Ayana Kawamura, Takayuki Nakachi, Hitoshi Kiya:
Privacy-Preserving Support Vector Machine Computing Using Random Unitary Transformation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(12): 1849-1855 (2019) - [j72]Chihiro Go, Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya:
An Image Fusion Scheme for Single-Shot High Dynamic Range Imaging with Spatially Varying Exposures. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(12): 1856-1864 (2019) - [j71]Yuma Kinoshita, Kouki Seo, Artit Visavakitcharoen, Hitoshi Kiya:
A Hue-Preserving Tone Mapping Scheme Based on Constant-Hue Plane Without Gamut Problem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(12): 1865-1871 (2019) - [j70]Sayaka Minewaki, Masahiro Iwahashi
, Hiroyuki Kobayashi, Taichi Yoshida, Hitoshi Kiya:
Near lossless coding of sparse histogram images based on zero-skip quantization. Multim. Tools Appl. 78(1): 27-45 (2019) - [j69]Tatsuya Chuman
, Warit Sirichotedumrong
, Hitoshi Kiya
:
Encryption-Then-Compression Systems Using Grayscale-Based Image Encryption for JPEG Images. IEEE Trans. Inf. Forensics Secur. 14(6): 1515-1525 (2019) - [j68]Yuma Kinoshita
, Hitoshi Kiya
:
Scene Segmentation-Based Luminance Adjustment for Multi-Exposure Image Fusion. IEEE Trans. Image Process. 28(8): 4101-4116 (2019) - [c198]Yuma Kinoshita, Kouki Seo, Hitoshi Kiya:
A Hue Correction Scheme Based on Constant-Hue Plane for Color Image Enhancement. APSIPA 2019: 802-806 - [c197]Ryoya Yaguchi, Sayaka Shiota, Nobutaka Ono, Hitoshi Kiya:
Improving replay attack detection by combination of spatial and spectral features. APSIPA 2019: 833-837 - [c196]MaungMaung AprilPyone, Yuma Kinoshita, Hitoshi Kiya:
Filtering Adversarial Noise with Double Quantization. APSIPA 2019: 1745-1749 - [c195]Kenta Iida, Hitoshi Kiya:
Image Identification of Grayscale-Based JPEG Images for Privacy-Preserving Photo Sharing Services. APSIPA 2019: 1750-1755 - [c194]Warit Sirichotedumrong, Yuma Kinoshita, Hitoshi Kiya:
Privacy-Preserving Deep Neural Networks Using Pixel-Based Image Encryption Without Common Security Keys. APSIPA 2019: 1756-1761 - [c193]Yuma Kinoshita, Hitoshi Kiya:
iTM-Net: Deep Inverse Tone Mapping Using Novel Loss Function Based on Tone Mapping Operator. EUSIPCO 2019: 1-5 - [c192]Takayuki Nakachi, Yukihiro Bandoh, Hitoshi Kiya:
Secure Dictionary Learning for Sparse Representation. EUSIPCO 2019: 1-5 - [c191]Ryoya Yaguchi, Sayaka Shiota, Nobutaka Ono
, Hitoshi Kiya:
Replay Attack Detection Using Generalized Cross-Correlation of Stereo Signal. EUSIPCO 2019: 1-5 - [c190]Warit Sirichotedumrong, Yuma Kinoshita, Hitoshi Kiya:
On the Security of Pixel-Based Image Encryption for Privacy-Preserving Deep Neural Networks. GCCE 2019: 121-124 - [c189]Hiroyuki Kobayashi, Hitoshi Kiya:
Performance Evaluation of Two-layer lossless HDR Coding using Histogram Packing Technique under Various Tone-mapping Operators. GCCE 2019: 359-360 - [c188]Artit Visavakitcharoen, Yuma Kinoshita, Hitoshi Kiya:
A Color Compensation Method Using Inverse Camera Response Function for Multi-exposure Image Fusion. GCCE 2019: 468-470 - [c187]MaungMaung AprilPyone, Warit Sirichotedumrong, Hitoshi Kiya:
Adversarial Test on Learnable Image Encryption. GCCE 2019: 667-669 - [c186]Haruna Miyamoto, Sayaka Shiota, Hitoshi Kiya:
Investigation on latency issues and objective measurements of non-linear blind bandwidth extension. GCCE 2019: 686-688 - [c185]Chihiro Go, Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya:
Single-Shot High Dynamic Range Imaging with Spatially Varying Exposures Considering Hue Distortion. GCCE 2019: 833-835 - [c184]Warit Sirichotedumrong, Takahiro Maekawa, Yuma Kinoshita, Hitoshi Kiya:
Privacy-Preserving Deep Neural Networks with Pixel-Based Image Encryption Considering Data Augmentation in the Encrypted Domain. ICIP 2019: 674-678 - [c183]Yuma Kinoshita, Hitoshi Kiya:
Convolutional Neural Networks Considering Local and Global Features for Image Enhancement. ICIP 2019: 2110-2114 - [c182]Hiroyuki Kobayashi, Osamu Watanabe, Hitoshi Kiya:
Two-Layer Near-Lossless HDR Coding with Backward Compatibility to JPEG. ICIP 2019: 3547-3551 - [c181]Kenta Iida, Hitoshi Kiya:
An Image Identification Scheme Of Encrypted Jpeg Images For Privacy-Preserving Photo Sharing Services. ICIP 2019: 4564-4568 - [c180]Takayuki Nakachi, Hitoshi Kiya:
Secure Sparse Representations in L0 Norm Minimization and Its Application to EtC Systems. ICSPCS 2019: 1-7 - [c179]Ryota Kaminishi, Haruna Miyamoto, Sayaka Shiota, Hitoshi Kiya:
Investigation on Blind Bandwidth Extension with a Non-Linear Function and its Evaluation of x-Vector-Based Speaker Verification. INTERSPEECH 2019: 4055-4059 - [i34]Yuma Kinoshita, Hitoshi Kiya:
Image Enhancement Network Trained by Using HDR images. CoRR abs/1901.05686 (2019) - [i33]Yuma Kinoshita, Hitoshi Kiya:
Deep Inverse Tone Mapping Using LDR Based Learning for Estimating HDR Images with Absolute Luminance. CoRR abs/1903.01277 (2019) - [i32]Yuma Kinoshita, Hitoshi Kiya:
Scene Segmentation-Based Luminance Adjustment for Multi-Exposure Image Fusion. CoRR abs/1903.07428 (2019) - [i31]Chien Cheng Chien, Yuma Kinoshita, Hitoshi Kiya:
A Noise-aware Enhancement Method for Underexposed Images. CoRR abs/1904.10961 (2019) - [i30]Hiroyuki Kobayashi, Hitoshi Kiya:
JPEG XT Image Compression with Hue Compensation for Two-Layer HDR Coding. CoRR abs/1904.11315 (2019) - [i29]Masaki Kitayama, Hitoshi Kiya:
HOG feature extraction from encrypted images for privacy-preserving machine learning. CoRR abs/1904.12434 (2019) - [i28]Warit Sirichotedumrong, Takahiro Maekawa, Yuma Kinoshita, Hitoshi Kiya:
Privacy-Preserving Deep Neural Networks with Pixel-based Image Encryption Considering Data Augmentation in the Encrypted Domain. CoRR abs/1905.01827 (2019) - [i27]Yuma Kinoshita, Hitoshi Kiya:
Convolutional Neural Networks Considering Local and Global features for Image Enhancement. CoRR abs/1905.02899 (2019) - [i26]Hiroyuki Kobayashi, Osamu Watanabe, Hitoshi Kiya:
Two-layer Near-lossless HDR Coding with Backward Compatibility to JPEG. CoRR abs/1905.04129 (2019) - [i25]Hiroyuki Kobayashi, Hitoshi Kiya:
Performance Evaluation of Two-layer lossless HDR Coding using Histogram Packing Technique under Various Tone-mapping Operators. CoRR abs/1907.10889 (2019) - [i24]Artit Visavakitcharoen, Yuma Kinoshita, Hitoshi Kiya:
A Color Compensation Method Using Inverse Camera Response Function for Multi-exposure Image Fusion. CoRR abs/1907.11379 (2019) - [i23]MaungMaung AprilPyone, Warit Sirichotedumrong, Hitoshi Kiya:
Adversarial Test on Learnable Image Encryption. CoRR abs/1907.13342 (2019) - [i22]Chihiro Go, Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya:
Single-Shot High Dynamic Range Imaging with Spatially Varying Exposures Considering Hue Distortion. CoRR abs/1908.00186 (2019) - [i21]Takahiro Maekawa, Ayana Kawamura, Takayuki Nakachi, Hitoshi Kiya:
Privacy-Preserving Support Vector Machine Computing Using Random Unitary Transformation. CoRR abs/1908.07915 (2019) - [i20]Chihiro Go, Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya:
An Image Fusion Scheme for Single-Shot High Dynamic Range Imaging with Spatially Varying Exposures. CoRR abs/1908.08195 (2019) - [i19]Ayana Kawamura, Yuma Kinoshita, Hitoshi Kiya:
Privacy-Preserving Machine Learning Using EtC Images. CoRR abs/1911.00227 (2019) - [i18]Warit Sirichotedumrong, Yuma Kinoshita, Hitoshi Kiya:
On the Security of Pixel-Based Image Encryption for Privacy-Preserving Deep Neural Networks. CoRR abs/1912.04746 (2019) - 2018
- [j67]Kenta Iida, Hitoshi Kiya:
Robust Image Identification without Visible Information for JPEG Images. IEICE Trans. Inf. Syst. 101-D(1): 13-19 (2018) - [j66]Tatsuya Chuman, Kenta Kurihara, Hitoshi Kiya:
On the Security of Block Scrambling-Based EtC Systems against Extended Jigsaw Puzzle Solver Attacks. IEICE Trans. Inf. Syst. 101-D(1): 37-44 (2018) - [j65]Taichi Yoshida, Masahiro Iwahashi, Hitoshi Kiya:
Two-Layer Lossless Coding for High Dynamic Range Images Based on Range Compression and Adaptive Inverse Tone-Mapping. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(1): 259-266 (2018) - [j64]Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya:
A Pseudo Multi-Exposure Fusion Method Using Single Image. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(11): 1806-1814 (2018) - [j63]Osamu Watanabe, Hiroyuki Kobayashi, Hitoshi Kiya:
Two-Layer Lossless HDR Coding Using Histogram Packing Technique with Backward Compatibility to JPEG. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(11): 1823-1831 (2018) - [j62]Tatsuya Chuman, Hitoshi Kiya:
Security Evaluation for Block Scrambling-Based Image Encryption Including JPEG Distortion against Jigsaw Puzzle Solver Attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(12): 2405-2408 (2018) - [j61]Shoko Imaizumi
, Hitoshi Kiya:
A Block-Permutation-Based Encryption Scheme with Independent Processing of RGB Components. IEICE Trans. Inf. Syst. 101-D(12): 3150-3157 (2018) - [j60]Anu Aryal, Shoko Imaizumi
, Takahiko Horiuchi, Hitoshi Kiya:
Integrated Model of Image Protection Techniques. J. Imaging 4(1): 1 (2018) - [c178]Yuma Kinoshita, Hitoshi Kiya:
An Image Segmentation Method Based on Luminance Distribution and Its Application to Image Enhancement. APSIPA 2018: 865-870 - [c177]Takahiro Maekawa, Ayana Kawamura, Yuma Kinoshita, Hitoshi Kiya:
Privacy-Preserving SVM Computing in the Encrypted Domain. APSIPA 2018: 897-902 - [c176]Chihiro Go, Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya:
Image Fusion for Single-Shot High Dynamic Range Imaging with Spatially Varying Exposures. APSIPA 2018: 1082-1086 - [c175]Yusuke Izawa, Shoko Imaizumi
, Hitoshi Kiya:
A Block-Permutation-Based Image Encryption Allowing Hierarchical Decryption. APSIPA 2018: 1106-1112 - [c174]Haruna Miyamoto, Sayaka Shiota, Hitoshi Kiya:
Non-linear harmonic generation based blind bandwidth extension considering aliasing artifacts. APSIPA 2018: 1868-1874 - [c173]Kenta Iida, Hitoshi Kiya:
Robust Image Identification for Double-Compressed and Resized JPEG Images. APSIPA 2018: 1968-1974 - [c172]Yusuke Sugawara, Sayaka Shiota, Hitoshi Kiya:
Convolutional Neural Networks Without Any Checkerboard Artifacts. EUSIPCO 2018: 1317-1321 - [c171]Ayumi Sada, Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya:
Histogram-Based Image Pre-processing for Machine Learning. GCCE 2018: 272-275 - [c170]Warit Sirichotedumrong, Tatsuya Chuman, Hitoshi Kiya:
Grayscale-Based Image Encryption Considering Color Sub-sampling Operation for Encryption-then-Compression Systems. GCCE 2018: 379-383 - [c169]Hiroyuki Kobayashi, Hitoshi Kiya:
Bitstream-Based JPEG Image Encryption with File-Size Preserving. GCCE 2018: 384-387 - [c168]Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya, Taichi Yoshida:
Multi-Exposure Image Fusion Based on Exposure Compensation. ICASSP 2018: 1388-1392 - [c167]Yusuke Sugawara, Sayaka Shiota, Hitoshi Kiya:
Super-Resolution Using Convolutional Neural Networks Without Any Checkerboard Artifacts. ICIP 2018: 66-70 - [c166]Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya:
Automatic Exposure Compensation for Multi-Exposure Image Fusion. ICIP 2018: 883-887 - [c165]Warit Sirichotedumrong, Tatsuya Chuman, Shoko Imaizumi
, Hitoshi Kiya:
Grayscale-Based Block Scrambling Image Encryption for Social Networking Services. ICME 2018: 1-6 - [c164]Takayuki Nakachi, Hiroyuki Ishihara, Hitoshi Kiya:
Privacy-Preserving Network BMI Decoding of Covert Spatial Attention. ICSPCS 2018: 1-8 - [c163]Osamu Watanabe, Hiroyuki Kobayashi, Hitoshi Kiya:
Lossless Two-Layer Coding using Histogram Packing Technique for HDR Images. ISCAS 2018: 1-5 - [c162]Takahiro Maekawa, Takayuki Nakachi, Sayaka Shiota, Hitoshi Kiya:
Privacy-Preserving SVM Computing by Using Random Unitary Transformation. ISPACS 2018: 146-150 - [c161]Shihono Mochizuki, Sayaka Shiota, Hitoshi Kiya:
Voice liveness detection using phoneme-based pop-noise detector for speaker verification. Odyssey 2018: 233-239 - [c160]Osamu Watanabe, Hiroyuki Kobayashi, Hitoshi Kiya:
Two-layer Lossless HDR Coding considering Histogram Sparseness with Backward Compatibility to JPEG. PCS 2018: 11-15 - [i17]Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya:
Automatic Exposure Compensation for Multi-Exposure Image Fusion. CoRR abs/1805.11211 (2018) - [i16]Yusuke Sugawara, Sayaka Shiota, Hitoshi Kiya:
Super-Resolution using Convolutional Neural Networks without Any Checkerboard Artifacts. CoRR abs/1806.02658 (2018) - [i15]Warit Sirichotedumrong, Tatsuya Chuman, Shoko Imaizumi, Hitoshi Kiya:
Grayscale-based Block Scrambling Image Encryption for Social Networking Services. CoRR abs/1806.03787 (2018) - [i14]Yuma Kinoshita, Taichi Yoshida, Sayaka Shiota, Hitoshi Kiya:
Multi-Exposure Image Fusion Based on Exposure Compensation. CoRR abs/1806.09607 (2018) - [i13]Osamu Watanabe, Hiroyuki Kobayashi, Hitoshi Kiya:
Two-layer Lossless HDR Coding considering Histogram Sparseness with Backward Compatibility to JPEG. CoRR abs/1806.10746 (2018) - [i12]Kenta Iida, Hitoshi Kiya:
Robust Image Identification for Double-Compressed JPEG Images. CoRR abs/1807.06928 (2018) - [i11]Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya:
A Pseudo Multi-Exposure Fusion Method Using Single Image. CoRR abs/1808.00195 (2018) - [i10]Osamu Watanabe, Hiroyuki Kobayashi, Hitoshi Kiya:
Two-Layer Lossless HDR Coding using Histogram Packing Technique with Backward Compatibility to JPEG. CoRR abs/1808.00956 (2018) - [i9]Tatsuya Chuman, Hitoshi Kiya:
Security Evaluation for Block Scrambling-Based Image Encryption Including JPEG Distortion against Jigsaw Puzzle Solver Attacks. CoRR abs/1808.02275 (2018) - [i8]Hiroyuki Kobayashi, Hitoshi Kiya:
Bitstream-Based JPEG Image Encryption with File-Size Preserving. CoRR abs/1808.06495 (2018) - [i7]Takahiro Maekawa, Takayuki Nakachi, Sayaka Shiota, Hitoshi Kiya:
Privacy-Preserving SVM Computing by Using Random Unitary Transformation. CoRR abs/1809.07055 (2018) - [i6]Tatsuya Chuman, Kenta Iida, Warit Sirichotedumrong, Hitoshi Kiya:
Image Manipulation Specifications on Social Networking Services for Encryption-then-Compression Systems. CoRR abs/1810.02062 (2018) - [i5]Warit Sirichotedumrong, Tatsuya Chuman, Hitoshi Kiya:
Compression Performance of Grayscale-based Image Encryption for Encryption-then-Compression Systems. CoRR abs/1810.13067 (2018) - [i4]Tatsuya Chuman, Warit Sirichotedumrong, Hitoshi Kiya:
Encryption-then-Compression Systems using Grayscale-based Image Encryption for JPEG Images. CoRR abs/1811.00236 (2018) - [i3]Chien Cheng Chien, Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya:
A Retinex-based Image Enhancement Scheme with Noise Aware Shadow-up Function. CoRR abs/1811.03280 (2018) - [i2]Hitoshi Kiya:
Compressible and Learnable Encryption for Untrusted Cloud Environments. CoRR abs/1811.10254 (2018) - [i1]Warit Sirichotedumrong, Tatsuya Chuman, Hitoshi Kiya:
Grayscale-Based Image Encryption Considering Color Sub-sampling Operation for Encryption-then-Compression Systems. CoRR abs/1812.06799 (2018) - 2017
- [j59]Kenta Kurihara, Shoko Imaizumi
, Sayaka Shiota, Hitoshi Kiya:
An Encryption-then-Compression System for Lossless Image Compression Standards. IEICE Trans. Inf. Syst. 100-D(1): 52-56 (2017) - [j58]Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya:
Fast Inverse Tone Mapping Based on Reinhard's Global Operator with Estimated Parameters. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(11): 2248-2255 (2017) - [c159]Anu Aryal, Shoko Imaizumi
, Takahiko Horiuchi, Hitoshi Kiya:
Integrated algorithm for block-permutation-based encryption with reversible data hiding. APSIPA 2017: 203-208 - [c158]Yuma Kinoshita, Taichi Yoshida, Sayaka Shiota, Hitoshi Kiya:
Pseudo multi-exposure fusion using a single image. APSIPA 2017: 263-269 - [c157]Kenta Iida, Hitoshi Kiya:
Robust image identification without any visible information for double-compressed JPEG images. APSIPA 2017: 852-857 - [c156]Tatsuya Chuman, Kenta Iida, Hitoshi Kiya:
Image manipulation on social media for encryption-then-compression systems. APSIPA 2017: 858-863 - [c155]Yusuke Sugawara, Sayaka Shiota, Hitoshi Kiya:
A parallel computation algorithm for super-resolution methods using convolutional neural networks. APSIPA 2017: 1169-1173 - [c154]KokSheik Wong
, Hitoshi Kiya:
Reversible data hiding for compression-friendly image encryption method. APSIPA 2017: 1205-1209 - [c153]Artit Visavakitcharoen, Hiroyuki Kobayashi, Sayaka Shiota, Hitoshi Kiya:
Compression performance of extended JPEG XT under various TMOs. GCCE 2017: 1-4 - [c152]Wannida Sae-Tang, Masaaki Fujiyoshi
, Hitoshi Kiya:
Encryption-then-Compression-Based Copyright- and Privacy-Protected Image Trading System. ICAIP 2017: 66-71 - [c151]Wannida Sae-Tang, Hitoshi Kiya:
A Generation of Meaningfully Secured Images for Copyright- and Privacy-Protected Image Trading Systems Using Singular Component Interchange. ICAIP 2017: 72-77 - [c150]Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya:
Fast inverse tone mapping with Reinhard's global operator. ICASSP 2017: 1972-1976 - [c149]Tatsuya Chuman, Kenta Kurihara, Hitoshi Kiya:
On the security of block scrambling-based ETC systems against jigsaw puzzle solver attacks. ICASSP 2017: 2157-2161 - [c148]Kenta Iida, Hitoshi Kiya:
Robust image identification with secure features for JPEG images. ICIP 2017: 4342-4346 - [c147]Tatsuya Chuman, Kenta Kurihara, Hitoshi Kiya:
Security evaluation for block scrambling-based ETC systems against extended jigsaw puzzle solver attacks. ICME 2017: 229-234 - [c146]Toshiyuki Dobashi, Masahiro Iwahashi, Hitoshi Kiya:
An inverse tone mapping operation with two integer data for HDR images. ISPACS 2017: 634-639 - [c145]Masaaki Fujiyoshi
, Hitoshi Kiya:
A Blind Reversible Data Hiding Method for High Dynamic Range Images Taking Advantage of Sparse Histogram. IWDW 2017: 347-361 - [c144]Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya:
Reinhard's global operator based inverse tone mapping with one parameter. IWSDA 2017: 49-53 - [c143]Kenta Iida, Hitoshi Kiya:
Speeding up image identification with visually protected features for JPEG image. IWSDA 2017: 54-58 - [c142]Tatsuya Chuman, Hitoshi Kiya:
On the security of block scrambling-based image encryption including JPEG distorsion against jigsaw puzzle solver attacks. IWSDA 2017: 64-68 - [c141]Shoko Imaizumi
, Takeshi Ogasawara, Hitoshi Kiya:
Block-Permutation-Based Encryption Scheme with Enhanced Color Scrambling. SCIA (1) 2017: 562-573 - 2016
- [j57]Ibuki Nakamura, Yoshihide Tonomura, Hitoshi Kiya:
Unitary Transform-Based Template Protection and Its Application to l2-norm Minimization Problems. IEICE Trans. Inf. Syst. 99-D(1): 60-68 (2016) - [j56]Toshiyuki Dobashi, Masahiro Iwahashi, Hitoshi Kiya:
A Unified Tone Mapping Operation for HDR Images Expressed in Integer Data. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(3): 774-776 (2016) - [j55]Fairoza Amira Binti Hamzah
, Taichi Yoshida, Masahiro Iwahashi, Hitoshi Kiya:
Adaptive Directional Lifting Structure of Three Dimensional Non-Separable Discrete Wavelet Transform for High Resolution Volumetric Data Compression. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(5): 892-899 (2016) - [j54]Teerapong Orachon, Taichi Yoshida, Somchart Chokchaitam, Masahiro Iwahashi, Hitoshi Kiya:
Channel Scaling for Integer Implementation of Minimum Lifting 2D Wavelet Transform. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(7): 1420-1429 (2016) - [j53]Yuma Kinoshita, Sayaka Shiota, Masahiro Iwahashi, Hitoshi Kiya:
An Remapping Operation without Tone Mapping Parameters for HDR Images. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(11): 1955-1961 (2016) - [j52]Kenta Iida, Hitoshi Kiya:
Fuzzy Commitment Scheme-Based Secure Identification for JPEG Images with Various Compression Ratios. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(11): 1962-1970 (2016) - [c140]Kenta Iida, Hitoshi Kiya:
Codestream level secure identification for JPEG 2000 images under various compression ratios. APSIPA 2016: 1-6 - [c139]Ryosuke Nakanishi, Sayaka Shiota, Hitoshi Kiya:
Ensemble based speaker verification using adapted score fusion in noisy reverberant environments. APSIPA 2016: 1-5 - [c138]Kenta Iida, Hitoshi Kiya:
Secure and robust identification based on fuzzy commitment scheme for JPEG images. BMSB 2016: 1-5 - [c137]Kenta Kurihara, Osamu Watanabe, Hitoshi Kiya:
An encryption-then-compression system for JPEG XR standard. BMSB 2016: 1-5 - [c136]Toshiyuki Dobashi, Masahiro Iwahashi, Hitoshi Kiya:
A fixed-point local tone mapping operation for HDR images. EUSIPCO 2016: 933-937 - [c135]Kenta Iida, Hiroyuki Kobayashi, Hitoshi Kiya:
Secure identification based on fuzzy commitment scheme for JPEG XR images. EUSIPCO 2016: 968-972 - [c134]Osamu Watanabe, Ryo Suzuki, Hitoshi Kiya:
A structure of JPEG XT encoder considering effect of quantization error. ISCAS 2016: 810-813 - [c133]Masahiro Iwahashi, Tin Moe Aye, Taichi Yoshida, Hitoshi Kiya:
Subset noise bias compensation for tone-mapping and up-scaling of JPEG images. ISCAS 2016: 2226-2229 - [c132]Masahiro Iwahashi, Teerapong Orachon, Tin Moe Aye, Taichi Yoshida, Hitoshi Kiya:
Optimum SPT allocation for multipliers of minimum lifting 2D wavelet transform. ISCAS 2016: 2543-2546 - [c131]Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya:
An inverse tone mapping operator based on Reinhard's global operator. ISPACS 2016: 1-6 - [c130]Artit Visavakitcharoen, Yuma Kinoshita, Hiroyuki Kobayashi, Hitoshi Kiya:
Quality improvement of tone mapped images by TMQI-II based optimization for the JPEG XT standard. ISPACS 2016: 1-5 - [c129]Yuko Saito, Ibuki Nakamura, Sayaka Shiota, Hitoshi Kiya:
An Efficient Random Unitary Matrix for Biometric Template Protection. SCIS&ISIS 2016: 366-370 - 2015
- [j51]Masahiro Iwahashi, Taichi Yoshida, Norrima Mokhtar, Hitoshi Kiya:
Bit-depth scalable lossless coding for high dynamic range images. EURASIP J. Adv. Signal Process. 2015: 22 (2015) - [j50]Kenta Kurihara, Masanori Kikuchi, Shoko Imaizumi
, Sayaka Shiota, Hitoshi Kiya:
An Encryption-then-Compression System for JPEG/Motion JPEG Standard. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(11): 2238-2245 (2015) - [c128]Masahiro Iwahashi, Fairoza Amira Binti Hamzah, Taichi Yoshida, Hitoshi Kiya:
Two layer coding of HDR images with noise bias compensation. APSIPA 2015: 436-439 - [c127]Masahiro Iwahashi, Fairoza Amira Binti Hamzah, Taichi Yoshida, Hitoshi Kiya:
Noise bias compensation based on Bayesian inference for tone mapped noisy image. APSIPA 2015: 440-443 - [c126]Fairoza Amira Binti Hamzah, Taichi Yoshida, Masahiro Iwahashi, Hitoshi Kiya:
Channel scaling for rounding noise reduction in minimum lifting 3D wavelet transform. APSIPA 2015: 888-891 - [c125]Masaaki Fujiyoshi
, Hitoshi Kiya:
A near-lossless image compression system with data hiding capability. APSIPA 2015: 1280-1286 - [c124]Ibuki Nakamura, Yoshihide Tonomura, Hitoshi Kiya:
Unitary transform-based template protection and its properties. EUSIPCO 2015: 2421-2425 - [c123]Osamu Watanabe, Akira Uchida, Takahiro Fukuhara, Hitoshi Kiya:
An Encryption-then-Compression system for JPEG 2000 standard. ICASSP 2015: 1226-1230 - [c122]Hiroyuki Kobayashi, Masahiro Iwahashi, Hitoshi Kiya:
A new class of near-lossless coding allowing estimation of ℓ∞ bound. ISCIT 2015: 109-112 - [c121]Osamu Watanabe, Takahiro Fukuhara, Hitoshi Kiya:
A perceptual encryption scheme for Motion JPEG 2000 standard. ISCIT 2015: 125-128 - [c120]Masaaki Fujiyoshi
, Hitoshi Kiya:
Histogram-Based Near-Lossless Data Hiding and Its Application to Image Compression. PCM (2) 2015: 225-235 - [c119]Toshiyuki Dobashi, Masahiro Iwahashi, Hitoshi Kiya:
A Unified Tone Mapping Operation for HDR Images Including Both Floating-Point and Integer Data. PCM (1) 2015: 321-333 - [c118]Kenta Kurihara, Sayaka Shiota, Hitoshi Kiya:
An encryption-then-compression system for JPEG standard. PCS 2015: 119-123 - [c117]Hiroyuki Kobayashi, Shoko Imaizumi
, Hitoshi Kiya:
A Robust Identification Scheme for JPEG XR Images with Various Compression Ratios. PSIVT 2015: 38-50 - 2014
- [j49]Shenchuan Liu, Wannida Sae-Tang, Masaaki Fujiyoshi
, Hitoshi Kiya:
An Efficient Compression of Amplitude-Only Images for the Image Trading System. IEICE Trans. Inf. Syst. 97-D(2): 378-379 (2014) - [j48]Suvit Poomrittigul
, Masahiro Iwahashi, Hitoshi Kiya:
Reduction of Lifting Steps of Non Separable 2D Quadruple Lifting DWT Compatible with Separable 2D DWT. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(7): 1492-1499 (2014) - [j47]Wannida Sae-Tang, Shenchuan Liu, Masaaki Fujiyoshi
, Hitoshi Kiya:
A Copyright- and Privacy-Protected Image Trading System Using Fingerprinting in Discrete Wavelet Domain with JPEG 2000. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(11): 2107-2113 (2014) - [j46]Toshiyuki Dobashi, Tatsuya Murofushi, Masahiro Iwahashi, Hitoshi Kiya:
A Fixed-Point Global Tone Mapping Operation for HDR Images in the RGBE Format. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(11): 2147-2153 (2014) - [j45]Taku Odaka, Wannida Sae-Tang, Masaaki Fujiyoshi
, Hiroyuki Kobayashi, Masahiro Iwahashi, Hitoshi Kiya:
An Efficient Lossless Compression Method Using Histogram Packing for HDR Images in OpenEXR Format. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(11): 2181-2183 (2014) - [c116]Katsuma Takimoto, Toshiyuki Dobashi, Hiroshi Ishikawa, Hitoshi Kiya:
An image estimation method by header information in JPEG 2000 codestreams and its application to image identification. APCCAS 2014: 25-28 - [c115]Fairoza Amira Hamzah, Teerapong Orachon, Taichi Yoshida, Masahiro Iwahashi, Hitoshi Kiya:
Non-separable three dimensional discrete wavelet transform with adaptive directional prediction. APSIPA 2014: 1-4 - [c114]Masahiro Iwahashi, Taichi Yoshida, Hitoshi Kiya:
Range reduction of HDR images for backward compatibility with LDR image processing. APSIPA 2014: 1-4 - [c113]Masahiro Iwahashi, Taichi Yoshida, Hitoshi Kiya:
L2 norm optimization of tone mapping for two layer lossless coding of HDR images. APSIPA 2014: 1-4 - [c112]Yuichi Muraki, Masakazu Furukawa, Masaaki Fujiyoshi, Yoshihide Tonomura, Hitoshi Kiya:
A compressible template protection scheme for face recognition based on sparse representation. EUSIPCO 2014: 1647-1651 - [c111]Masahiro Iwahashi, Hitoshi Kiya:
Noise bias compensation of tone mapped noisy image. ICIP 2014: 2654-2658 - [c110]Tatsuya Murofushi, Toshiyuki Dobashi, Masahiro Iwahashi, Hitoshi Kiya:
An integer tone mapping operation for HDR images in OpenEXR with denormalized numbers. ICIP 2014: 4497-4501 - [c109]Shenchuan Liu, Masaaki Fujiyoshi
, Hitoshi Kiya:
A cheat preventing method with efficient pixel expansion for Naor-Shamir's visual cryptography. ICIP 2014: 5527-5531 - [c108]Wannida Sae-Tang, Masaaki Fujiyoshi
, Hitoshi Kiya:
Effects of Random Sign Encryption in JPEG 2000-Based Data Hiding. IIH-MSP 2014: 516-519 - [c107]Akira Uchida, Masaaki Fujiyoshi
, Sayaka Shiota, Hitoshi Kiya:
Image invisibility assessment for visually encrypted images. ISPACS 2014: 71-75 - [c106]Wannida Sae-Tang, Masaaki Fujiyoshi
, Hitoshi Kiya:
Efficient data hiding in encrypted JPEG 2000 codestreams. ISPACS 2014: 121-126 - 2013
- [j44]Shenchuan Liu, Masaaki Fujiyoshi
, Hitoshi Kiya:
An Image Trading System Using Amplitude-Only Images for Privacy- and Copyright-Protection. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(6): 1245-1252 (2013) - [j43]Wannida Sae-Tang, Masaaki Fujiyoshi
, Hitoshi Kiya:
A Generation Method of Amplitude-Only Images with Low Intensity Ranges. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(6): 1323-1330 (2013) - [j42]Shenchuan Liu, Masaaki Fujiyoshi
, Hitoshi Kiya:
A Cheat-Prevention Visual Secret Sharing Scheme with Efficient Pixel Expansion. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(11): 2134-2141 (2013) - [c105]Toshiyuki Dobashi, Tatsuya Murofushi, Masahiro Iwahashi, Hitoshi Kiya:
A fixed-point tone mapping operation for HDR images in the RGBE format. APSIPA 2013: 1-4 - [c104]Masakazu Furukawa, Yuichi Muraki, Masaaki Fujiyoshi
, Hitoshi Kiya:
A secure face recognition scheme using noisy images based on kernel sparse representation. APSIPA 2013: 1-4 - [c103]Masahiro Iwahashi, Hitoshi Kiya:
Error equalization for high quality LDR images in backward compatible HDR image coding. APSIPA 2013: 1-4 - [c102]Masahiro Iwahashi, Teerapong Orachon, Hitoshi Kiya:
Non separable 3D lifting structure compatible with separable quadruple lifting DWT. APSIPA 2013: 1-4 - [c101]Masahiro Iwahashi, Suvit Poomrittigul
, Hitoshi Kiya:
Lossless transform with functionality of thumbnail previewing. APSIPA 2013: 1-4 - [c100]Masahiro Iwahashi, Hitoshi Kiya:
Two layer lossless coding of HDR images. ICASSP 2013: 1340-1344 - [c99]Tatsuya Murofushi, Masahiro Iwahashi, Hitoshi Kiya:
An integer tone mapping operation for hdr images expressed in floating point data. ICASSP 2013: 2479-2483 - [c98]Toshiyuki Dobashi, Hitoshi Kiya:
A parallel implementation method of FFT-based full-search block matching algorithms. ICASSP 2013: 2644-2648 - [c97]Masahiro Iwahashi, Teerapong Orachon, Hitoshi Kiya:
Three dimensional discrete wavelet transform with deduced number of lifting steps. ICIP 2013: 1651-1654 - [c96]Fitri Arnia
, Khairul Munadi
, Roslidar, Masaaki Fujiyoshi
, Hitoshi Kiya:
Improved Iris matching technique using reduced sized of ordinal measure of DCT coefficients. ISCE 2013: 287-288 - [c95]Khairul Munadi
, Mohd. Syaryadhi
, Fitri Arnia
, Masaaki Fujiyoshi
, Hitoshi Kiya:
Secure online image trading scheme using DCT coefficients and moment invariants feature. ISCE 2013: 291-292 - [c94]Masanori Kikuchi, Masaaki Fujiyoshi
, Hitoshi Kiya:
A new color QR code forward compatible with the standard QR code decoder. ISPACS 2013: 26-31 - [c93]Wannida Sae-Tang, Masaaki Fujiyoshi
, Hitoshi Kiya:
An image trading system with JPEG 2000 using fingerprinting in visually protected domain. ISPACS 2013: 32-37 - [c92]Shenchuan Liu, Masaaki Fujiyoshi
, Hitoshi Kiya:
A Cheat-Prevention Visual Secret Sharing Scheme with Minimum Pixel Expansion. IWDW 2013: 362-375 - 2012
- [j41]Osamu Watanabe, Takahiro Fukuhara, Hitoshi Kiya:
Codestream-Based Identification of JPEG 2000 Images with Different Coding Parameters. IEICE Trans. Inf. Syst. 95-D(4): 1120-1129 (2012) - [j40]Masahiro Iwahashi, Masanori Ogawa, Hitoshi Kiya:
Avoidance of Singular Point in Integer Orthonormal Transform for Lossless Coding. IEEE Trans. Signal Process. 60(5): 2648-2653 (2012) - [c91]Masaaki Fujiyoshi, Hitoshi Kiya:
Generalized histogram shifting-based reversible data hiding with an adaptive binary-to-q-ary converter. APSIPA 2012: 1-4 - [c90]Masahiro Iwahashi, Hitoshi Kiya:
Efficient lossless bit depth scalable coding for HDR images. APSIPA 2012: 1-4 - [c89]Osamu Watanabe, Takahiro Fukuhara, Hitoshi Kiya:
Hash based identification of JPEG 2000 images with different coding parameters. ICASSP 2012: 1037-1040 - [c88]Izumi Ito, Hitoshi Kiya:
A new technique of non-iterative super-resolution without boundary distortion. ICASSP 2012: 1273-1276 - [c87]Masahiro Iwahashi, Hiroyuki Kobayashi, Hitoshi Kiya:
Lossy compression of sparse histogram image. ICASSP 2012: 1361-1364 - [c86]Shoko Imaizumi
, Naokazu Aoki, Hiroyuki Kobayashi, Hitoshi Kiya:
Hierarchical Key Assignment Scheme for Multimedia Access Control with Modified Hash Chain. IIH-MSP 2012: 293-296 - [c85]Masaaki Fujiyoshi
, Hitoshi Kiya:
A visually-lossless data hiding method based on histogram modification. ISCAS 2012: 1692-1695 - [c84]Toshiyuki Dobashi, Osamu Watanabe, Takahiro Fukuhara, Hitoshi Kiya:
Hash-based identification of JPEG 2000 images in encrypted domain. ISPACS 2012: 469-472 - [c83]Wannida Sae-Tang, Mika Sugiyama, Masaaki Fujiyoshi
, Hitoshi Kiya:
Non-separable weighted median-cut quantization for images with sparse color histogram. ISPACS 2012: 473-478 - [c82]Hiroyuki Kobayashi, Masahiro Iwahashi, Hitoshi Kiya:
Weighted median cut quantization and its applications. ISPACS 2012: 509-514 - [c81]Masahiro Iwahashi, Hiroyuki Kobayashi, Hitoshi Kiya:
Fine rate control and high SNR coding for sparse histogram images. PCS 2012: 205-208 - 2011
- [j39]Masahiro Iwahashi, Hitoshi Kiya:
Reversible 2D 9-7 DWT Based on Non-separable 2D Lifting Structure Compatible with Irreversible DWT. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(10): 1928-1936 (2011) - [c80]Izumi Ito, Hitoshi Kiya:
A computing method for linear convolution in the DCT domain. EUSIPCO 2011: 323-327 - [c79]Osamu Watanabe, Takahiro Fukuhara, Hitoshi Kiya:
Fast identification of JPEG 2000 images for digital cinema profiles. ICASSP 2011: 881-884 - [c78]Yoshihide Tonomura, Daisuke Shirai, Masahiko Kitamura, Takayuki Nakachi, Tatsuya Fujii, Hitoshi Kiya:
Low-Density Generator Matrix Codes for IP Packet Video Streaming with Backward Compatibility. ICC 2011: 1-5 - [c77]Shenchuan Liu, Masaaki Fujiyoshi
, Hitoshi Kiya:
A leakage suppressed two-level security visual secret sharing scheme. ISPACS 2011: 1-6 - [c76]Shoko Imaizumi
, Masaaki Fujiyoshi
, Hitoshi Kiya, Naokazu Aoki, Hiroyuki Kobayashi:
A Key Derivation Scheme for Hierarchical Access Control to JPEG 2000 Coded Images. PSIVT (2) 2011: 180-191 - [c75]Masahiro Iwahashi, Masanori Ogawa, Hitoshi Kiya:
Lossless integer color transform for four color components. VCIP 2011: 1-4 - [e2]Guoping Qiu
, Kin-Man Lam, Hitoshi Kiya, Xiangyang Xue, C.-C. Jay Kuo
, Michael S. Lew:
Advances in Multimedia Information Processing - PCM 2010 - 11th Pacific Rim Conference on Multimedia, Shanghai, China, September 2010, Proceedings, Part II. Lecture Notes in Computer Science 6298, Springer 2011, ISBN 978-3-642-15695-3 [contents] - 2010
- [j38]Shoko Imaizumi
, Masaaki Fujiyoshi
, Hitoshi Kiya:
An efficient access control method for composite multimedia content. IEICE Electron. Express 7(20): 1534-1538 (2010) - [j37]Masaaki Fujiyoshi
, Takahiro Tsuneyoshi, Hitoshi Kiya:
A parameter memorization-free lossless data hiding method with flexible payload size. IEICE Electron. Express 7(23): 1702-1708 (2010) - [j36]Hong Lin Jin, Yoonsik Choe, Hitoshi Kiya:
Reversible Data Hiding Based on Adaptive Modulation of Statistics Invertibility. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(2): 565-569 (2010) - [j35]Hiroaki Iwai, Masahiro Iwahashi, Hitoshi Kiya:
Methods for Avoiding the Checkerboard Distortion Caused by Finite Word Length Error in Multirate System. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(3): 631-635 (2010) - [j34]Zhen Li, Atushi Uemura, Hitoshi Kiya:
An FFT-Based Full-Search Block Matching Algorithm with Sum of Squared Differences Criterion. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(10): 1748-1754 (2010) - [j33]Izumi Ito, Hitoshi Kiya:
Phase-Only Correlation Based Matching in Scrambled Domain for Preventing Illegal Matching. Trans. Data Hiding Multim. Secur. 5: 51-69 (2010) - [c74]Izumi Ito, Hitoshi Kiya:
Symmetric correlation and its properties. EUSIPCO 2010: 1301-1305 - [c73]Masahiro Iwahashi, Hitoshi Kiya:
A new lifting structure of non separable 2D DWT with compatibility to JPEG 2000. ICASSP 2010: 1306-1309 - [c72]Zhen Li, Hitoshi Kiya:
Double-search-window block matching using the fast fourier transform. ICASSP 2010: 1418-1421 - [c71]Masahiro Iwahashi, Hitoshi Kiya:
A lossless condition of lifting DWT for specific DC values. ICASSP 2010: 1458-1461 - [c70]Masahiro Iwahashi, Hitoshi Kiya:
Optimumization of lifting structure of reversible KLT based on permutation of signal's order and sign. ICIP 2010: 465-468 - [c69]Yoshihide Tonomura, Takayuki Nakachi, Daisuke Shirai, Tatsuya Fujii, Hitoshi Kiya:
Color-component bit allocation scheme for JPEG 2000 parallel codec. ICIP 2010: 1345-1348 - [c68]Masahiro Iwahashi, Hitoshi Kiya:
Reversible color transform with compatiblity to irreversible transform. ICIP 2010: 2881-2884 - [c67]Masaaki Fujiyoshi
, Yuji Tachizaki, Hitoshi Kiya:
A Moving Object Detection Scheme in Codestream Domain for Motion JPEG Encoded Movies. PCM (2) 2010: 595-606 - [c66]Masahiro Iwahashi, Hitoshi Kiya:
Avoidance of singular point in reversible KLT. PCS 2010: 110-113 - [c65]Hidetake Sasaki, Zhen Li, Hitoshi Kiya:
FFT-based full-search block matching using overlap-add method. PCS 2010: 586-589 - [e1]Guoping Qiu
, Kin-Man Lam, Hitoshi Kiya, Xiangyang Xue, C.-C. Jay Kuo
, Michael S. Lew:
Advances in Multimedia Information Processing - PCM 2010 - 11th Pacific Rim Conference on Multimedia, Shanghai, China, September 21-24, 2010, Proceedings, Part I. Lecture Notes in Computer Science 6297, Springer 2010, ISBN 978-3-642-15701-1 [contents]
2000 – 2009
- 2009
- [j32]Izumi Ito, Hitoshi Kiya:
One-Time Key Based Phase Scrambling for Phase-Only Correlation between Visually Protected Images. EURASIP J. Inf. Secur. 2009 (2009) - [j31]Michihiko Ono, Seungwu Han, Masaaki Fujiyoshi
, Hitoshi Kiya:
A location map-free reversible data hiding method for specific area embedding. IEICE Electron. Express 6(8): 483-489 (2009) - [j30]Hitoshi Kiya:
Foreword. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(3): 687 (2009) - [j29]Yoshihide Tonomura, Daisuke Shirai, Takayuki Nakachi, Tatsuya Fujii, Hitoshi Kiya:
Layered Low-Density Generator Matrix Codes for Super High Definition Scalable Video Coding System. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(3): 798-807 (2009) - [j28]Yoshihide Tonomura, Takayuki Nakachi, Tatsuya Fujii, Hitoshi Kiya:
Parallel Processing of Distributed Video Coding to Reduce Decoding Time. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(10): 2463-2470 (2009) - [j27]Seungwu Han, Masaaki Fujiyoshi
, Hitoshi Kiya:
A Reversible Image Authentication Method without Memorization of Hiding Parameters. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(10): 2572-2579 (2009) - [c64]Masaaki Fujiyoshi
, Seungwu Han, Hitoshi Kiya:
Reversible Information Hiding Considering Hierarchical Access Control. IAS 2009: 209-212 - [c63]Izumi Ito, Hitoshi Kiya:
Image matching between visually protected images with one-time key based phase scrambling. EUSIPCO 2009: 1314-1318 - [c62]Izumi Ito, Hitoshi Kiya:
Multiple-peak model fitting function for DCT sign phase correlation with non-integer shift precision. ICASSP 2009: 449-452 - [c61]Izumi Ito, Hitoshi Kiya:
Phase scrambling for blind image matching. ICASSP 2009: 1521-1524 - [c60]Masahiro Iwahashi, Hitoshi Kiya:
Non separable 2D factorization of separable 2D DWT for lossless image coding. ICIP 2009: 17-20 - [c59]Osamu Watanabe, Tomonori Iida, Takahiro Fukuhara, Hitoshi Kiya:
Identification of JPEG 2000 images in encrypted domain for digital cinema. ICIP 2009: 2065-2068 - [c58]Shoko Imaizumi
, Masaaki Fujiyoshi
, Hitoshi Kiya:
Efficient Collusion Attack-free Access Control for Multidimensionally Hierarchical Scalability Content. ISCAS 2009: 505-508 - 2008
- [j26]Seungwu Han, Masaaki Fujiyoshi
, Hitoshi Kiya:
An Efficient Reversible Image Authentication Method. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(8): 1907-1914 (2008) - [j25]Kiyoshi Nishikawa, Khairul Munadi
, Hitoshi Kiya:
No-Reference PSNR Estimation for Quality Monitoring of Motion JPEG2000 Video Over Lossy Packet Networks. IEEE Trans. Multim. 10(4): 637-645 (2008) - [c57]Seungwu Han, Masaaki Fujiyoshi
, Hitoshi Kiya:
A location map-free visible and reversible watermarking method with authentication ability. APCCAS 2008: 1584-1587 - [c56]Hitoshi Kiya, Izumi Ito:
Image matching between scrambled images for secure data management. EUSIPCO 2008: 1-5 - [c55]Hitoshi Kiya, Masahiro Iwahashi, Osamu Watanabe:
A new class of lifting wavelet transform for guaranteeing losslessness of specific signals. ICASSP 2008: 3273-3276 - [c54]Izumi Ito, Hitoshi Kiya:
A new class of image registration for guaranteeing secure data management. ICIP 2008: 269-272 - [c53]Masaaki Fujiyoshi
, Keijiro Kuroiwa, Hitoshi Kiya:
A scrambling method for Motion JPEG videos enabling moving objects detection from scrambled videos. ICIP 2008: 773-776 - [c52]Noriaki Hashimoto, Shoko Imaizumi
, Masaaki Fujiyoshi
, Hitoshi Kiya:
Hierarchical encryption using short encryption keys for scalable access control of JPEG 2000 coded images. ICIP 2008: 3116-3119 - [c51]Hitoshi Kiya, Masahiro Iwahashi, Osamu Watanabe:
A new structure of lifting wavelet for reducing rounding error. ISCAS 2008: 2881-2884 - [c50]Takahiro Fukuhara, Kazuhisa Hosaka, Hitoshi Kiya:
Accurate Identifying Method of JPEG2000 Images for Digital Cinema. MMM 2008: 380-390 - 2007
- [j24]Khairul Munadi
, Masaaki Fujiyoshi
, Kiyoshi Nishikawa, Hitoshi Kiya:
Codeblock-Based Error Concealment for JPEG2000 Coded Image Transmission over RTP. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(2): 429-438 (2007) - [j23]Masaaki Fujiyoshi
, Shoko Imaizumi
, Hitoshi Kiya:
Encryption of Composite Multimedia Contents for Access Control. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(3): 590-596 (2007) - [j22]Hong Lin Jin, Masaaki Fujiyoshi
, Hitoshi Kiya:
Lossless Data Hiding in the Spatial Domain for High Quality Images. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(4): 771-777 (2007) - [j21]Hitoshi Kiya:
Special Section on Papers Selected from the 21st Symposium on Signal Processing. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(8): 1503 (2007) - [j20]Fitri Arnia
, Ikue Iizuka, Masaaki Fujiyoshi
, Hitoshi Kiya:
DCT Sign-Based Similarity Measure for JPEG Image Retrieval. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(9): 1976-1985 (2007) - [c49]Izumi Ito, Hitoshi Kiya:
DCT Sign-Only Correlation with Application to Image Matching and the Relationship with Phase-Only Correlation. ICASSP (1) 2007: 1237-1240 - [c48]Mirei Kihara, Masaaki Fujiyoshi
, Qing Tao Wan, Hitoshi Kiya:
Image Tamper Detection using Mathematical Morphology. ICIP (6) 2007: 101-104 - [c47]Shoko Imaizumi
, Masaaki Fujiyoshi
, Yoshito Abe, Hitoshi Kiya:
Collusion Attack-Resilient Hierarchical Encryption of JPEG 2000 Codestreams with Scalable Access Control. ICIP (2) 2007: 137-140 - [c46]Keijiro Kuroiwa, Masaaki Fujiyoshi
, Hitoshi Kiya:
Codestream Domain Scrambling of Moving Objects Based on DCT Sign-only Correlation for Motion JPEG Movies. ICIP (5) 2007: 157-160 - [c45]Fitri Arnia
, Ikue Iizuka, Masaaki Fujiyoshi
, Hitoshi Kiya:
Fast Method for Joint Retrieval and Identification of JPEG Coded Images Based on DCT Sign. ICIP (2) 2007: 229-232 - [c44]Masaaki Fujiyoshi
, Shuji Sato, Hong Lin Jin, Hitoshi Kiya:
A Location-Map Free Reversible Data Hiding Method using Block-Based Single Parameter. ICIP (3) 2007: 257-260 - 2006
- [j19]Hitoshi Kiya:
Special Section on Papers Selected from 2005 International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC2005). IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(6): 1525-1526 (2006) - [j18]Fitri Arnia
, Ikue Iizuka, Masaaki Fujiyoshi
, Hitoshi Kiya:
Fast Image Identification Methods for JPEG Images with Different Compression Ratios. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(6): 1585-1593 (2006) - [j17]Kiyoshi Nishikawa, Shinichi Nagawara, Hitoshi Kiya:
QoS Estimation Method for JPEG 2000 Coded Image at RTP Layer. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(8): 2119-2128 (2006) - [j16]Takashi Tachibana, Masaaki Fujiyoshi
, Hitoshi Kiya:
A digital watermarking scheme that preserves image quality and is applicable to watermark sequences from a variety of distributions. Syst. Comput. Jpn. 37(8): 90-100 (2006) - [c43]Fitri Arnia
, Ikue Iizuka, Hiroyuki Kobayashi, Masaaki Fujiyoshi
, Hitoshi Kiya:
DCT Sign Only Correlation and Its Application to Image Registration. APCCAS 2006: 466-469 - [c42]Khairul Munadi
, Masaaki Fujiyoshi
, Kiyoshi Nishikawa, Hitoshi Kiya:
Codeblock-Based Concealment Scheme for JPEG2000 Images in Lossy Packet Networks. APCCAS 2006: 1847-1850 - [c41]Fitri Arnia, Ikue Iizuka, Masaaki Fujiyoshi, Hitoshi Kiya:
Fast and Robust Identification Methods for JPEG Images with Various Compression Ratios. ICASSP (2) 2006: 397-400 - [c40]Masaaki Fujiyoshi
, Wataru Saitou, Osamu Watanabe, Hitoshi Kiya:
Hierarchical Encryption of Multimedia Contents for Access Control. ICIP 2006: 1977-1980 - 2005
- [j15]Masaaki Fujiyoshi
, Osamu Watanabe, Hitoshi Kiya:
A Method of Guaranteeing Image-Quality for Quantization-Based Watermarking Using a Nonorthogonal Transformation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(6): 1434-1442 (2005) - [c39]Masaaki Fujiyoshi
, Yusuke Seki, Hiroyuki Kobayashi, Hitoshi Kiya:
Modulo arithmetic-based image watermarking and its theoretical analysis of image-quality. ICIP (1) 2005: 969-972 - [c38]Shoko Imaizumi
, Osamu Watanabe, Masaaki Fujiyoshi
, Hitoshi Kiya:
Generalized hierarchical encryption of JPEG 2000 codestreams for access control. ICIP (2) 2005: 1094-1097 - [c37]Yusuke Seki, Hiroyuki Kobayashi, Masaaki Fujiyoshi
, Hitoshi Kiya:
Quantization-based image steganography without data hiding position memorization. ISCAS (5) 2005: 4987-4990 - [c36]Osamu Watanabe, Akiko Nakazaki, Hitoshi Kiya:
A scalable encryption method allowing backward compatibility with JPEG2000 images. ISCAS (6) 2005: 6324-6327 - 2004
- [c35]Khairul Munadi
, Masayuki Kurosaki, Kiyoshi Nishikawa, Hitoshi Kiya:
Efficient packet loss protection for JPEG2000 images enabling backward compatibility with a standard decoder. ICIP 2004: 833-836 - [c34]Masaaki Fujiyoshi
, Hitoshi Kiya:
An image-quality guaranteed method for quantization-based watermarking using a dwt. ICIP 2004: 2629-2632 - [c33]Osamu Watanabe, Akiko Nakazaki, Hitoshi Kiya:
A fast image-scramble method using public-key encryption allowing backward compatibility with jpeg2000. ICIP 2004: 3435-3438 - 2003
- [j14]Osamu Watanabe, Hitoshi Kiya:
An Extension of ROI-Based Scalability for Progressive Transmission in JPEG2000 Coding. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(4): 765-771 (2003) - [j13]Masayuki Kurosaki, Hitoshi Kiya:
Error Concealment Using Layer Structure for JPEG2000 Images. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(4): 772-778 (2003) - [j12]Ayuko Takagi, Hitoshi Kiya:
Lossless Video Coding Using Interleaved Multiple Frames. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(6): 1504-1508 (2003) - [j11]Khairul Munadi, Masayuki Kurosaki, Kiyoshi Nishikawa, Hitoshi Kiya:
Error Protection for JPEG2000-Coded Images and Its Evaluation over OFDM Channel. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(8): 2056-2060 (2003) - [c32]Hitoshi Kiya, Shoko Imaizumi, Osamu Watanabe:
Partial-scrambling of images encoded using JPEG2000 without generating marker codes. ICIP (3) 2003: 205-208 - [c31]Masayuki Kurosaki, Khairul Munadi
, Hitoshi Kiya:
Error correction using data hiding technique for JPEG2000 images. ICIP (3) 2003: 473-476 - [c30]Osamu Watanabe, Hitoshi Kiya:
ROI-based scalability for progressive transmission in JPEG2000 coding. ISCAS (2) 2003: 416-419 - [c29]Khairul Munadi
, Masayuki Kurosaki, Kiyoshi Nishikawa, Hitoshi Kiya:
Error protection for JPEG2000 encoded images and its evaluation over OFDM channel. ISCAS (2) 2003: 432-435 - 2002
- [j10]Kiyoshi Nishikawa, Hitoshi Kiya:
Multirate Repeating Method for Alias Free Subband Adaptive Filters. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(4): 776-783 (2002) - [j9]Masayuki Kurosaki, Hitoshi Kiya:
Error Concealment Using a Data Hiding Technique for MPEG Video. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(4): 790-796 (2002) - [j8]Ayuko Takagi, Hitoshi Kiya:
QCIF Video Coding Based on JPEG2000 Using Symmetry of Images. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(8): 1898-1901 (2002) - [j7]Masaaki Fujiyoshi, Takashi Tachibana, Hitoshi Kiya:
A Data Embedding Method Considering the Finite Word-Length for High Quality Images. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(12): 2830-2838 (2002) - [j6]Hiroyuki Kobayashi, Yoshihiro Noguchi, Hitoshi Kiya:
A Method of Embedding Binary Data into JPEG Bitstreams. Syst. Comput. Jpn. 33(1): 18-26 (2002) - [c28]Masayuki Kurosaki, Khairul Munadi, Hitoshi Kiya:
Error concealment using layer structure for JPEG2000 images. APCCAS (1) 2002: 529-534 - [c27]Osamu Watanabe, Hitoshi Kiya:
An extension of ROI-based scalability for progressive transmission in JPEG2000 coding. APCCAS (1) 2002: 535-540 - [c26]Katsutoshi Ando, Hiroyuki Kobayashi, Hitoshi Kiya:
A method for embedding binary data into JPEG2000 bit streams based on the layer structure. EUSIPCO 2002: 1-4 - [c25]Osamu Watanabe, Hitoshi Kiya:
Lossless JPEG2000 coding for lossy images and its applications. EUSIPCO 2002: 1-4 - 2001
- [c24]Ayuko Takagi, Kiyoshi Nishikawa, Hitoshi Kiya:
Low-bit motion estimation with edge enhanced images for lowpower MPEG encoder. ISCAS (2) 2001: 505-508 - 2000
- [c23]Kiyoshi Nishikawa, Hitoshi Kiya:
Novel implementation technique of RLS algorithm for improving throughput of adaptive filters. EUSIPCO 2000: 1-4 - [c22]Kiyoshi Nishikawa, Hitoshi Kiya:
Fast implementation technique for improving throughput of RLS adaptive filters. ICASSP 2000: 3319-3322 - [c21]Ayuko Takagi, Shogo Muramatsu, Hitoshi Kiya:
Motion Estimation With Power Scalability and its VHDL Model. ICIP 2000: 118-121 - [c20]Yoshihiro Noguchi, Hiroyuki Kobayashi, Hitoshi Kiya:
A Method of Extracting Embedded Binary Data from JPEG Bitstreams Using Standard JPEG Decoder. ICIP 2000: 577-580
1990 – 1999
- 1999
- [j5]Shogo Muramatsu, Akihiko Yamada, Hitoshi Kiya:
A design method of multidimensional linear-phase paraunitary filter banks with a lattice structure. IEEE Trans. Signal Process. 47(3): 690-700 (1999) - [c19]Yoshihiro Noguchi, Jun Furukawa, Hitoshi Kiya:
A Fast Full Search Block Matching Algorithm for Mpeg-4 Video. ICIP (1) 1999: 61-65 - [c18]Hitoshi Kiya, Yoshihiro Noguchi, Ayuko Takagi, Hiroyuki Kobayashi:
A Method of Inserting Binary Data Into Mpeg Bitstreams for Video Index Labeling. ICIP (4) 1999: 285-289 - [c17]Hitoshi Kiya, Yoshihiro Noguchi, Ayuko Takagi, Hiroyuki Kobayashi:
A method of inserting binary data into MPEG bitstreams. ISCAS (4) 1999: 471-474 - 1998
- [j4]Kiyoshi Nishikawa, Hitoshi Kiya:
Conditions for convergence of a delayless subband adaptive filter and its efficient implementation. IEEE Trans. Signal Process. 46(4): 1158-1167 (1998) - [c16]Yasuhiro Harada, Shogo Muramatsu, Hitoshi Kiya:
Multidimensional multirate filter without checkerboard effects. EUSIPCO 1998: 1-4 - [c15]Tadaaki Kimijima, Kiyoshi Nishikawa, Hitoshi Kiya:
A pipelined architecture for DLMS algorithm considering both hardware complexity and output latency. EUSIPCO 1998: 1-4 - [c14]Shogo Muramatsu, Akihiko Yamada, Hitoshi Kiya:
A design method OF 2-D axial-symmetric paraunitary filter banks with a lattice structure. EUSIPCO 1998: 1-4 - 1997
- [j3]Shogo Muramatsu, Hitoshi Kiya:
Extended overlap-add and -save methods for multirate signal processing. IEEE Trans. Signal Process. 45(9): 2376-2380 (1997) - [c13]Katsushige Matsubara, Kiyoshi Nishikawa, Hitoshi Kiya:
A new pipelined architecture of the LMS algorithm without degradation of convergence characteristics. ICASSP 1997: 4125-4128 - 1996
- [c12]K. Kajita, Hiroyuki Kobayashi, Shogo Muramatsu, Akihiko Yamada, Hitoshi Kiya:
A design method for oversampled paraunitary DFT filter banks using householder factorization. EUSIPCO 1996: 1-4 - [c11]Shogo Muramatsu, Hitoshi Kiya:
A new design method of linear-phase paraunitary filter banks with an odd number of channels. EUSIPCO 1996: 1-4 - [c10]Hisashi Sakane, Kiyoshi Nishikawa, Hitoshi Kiya:
A super-resolution method based on the discrete cosine transforms. EUSIPCO 1996: 1-4 - 1995
- [c9]Koji Ashihara, Kiyoshi Nishikawa, Hitoshi Kiya:
Improvement of convergence speed for subband adaptive digital filters using the multirate repeating method. ICASSP 1995: 989-992 - [c8]Shogo Muramatsu, Hitoshi Kiya:
Multidimensional Parallel Processing Methods for Rational Sampling Lattice Alteration. ISCAS 1995: 756-759 - 1994
- [j2]Yoji Yamada, Hiroshi Ochi, Hitoshi Kiya:
A subband adaptive filter allowing maximally decimation. IEEE J. Sel. Areas Commun. 12(9): 1548-1552 (1994) - [j1]Hitoshi Kiya, Kiyoshi Nishikawa, Masahiro Iwahashi:
A development of symmetric extension method for subband image coding. IEEE Trans. Image Process. 3(1): 78-81 (1994) - [c7]Yoshihiro Ono, Hitoshi Kiya:
Performance analysis of subband adaptive systems using an equivalent model. ICASSP (3) 1994: 53-56 - [c6]Kiyoshi Nishikawa, Hitoshi Kiya:
An LS based new gradient type adaptive algorithm-least squares gradient. ICASSP (3) 1994: 413-416 - [c5]Shogo Muramatsu, Hitoshi Kiya:
An Extended Overlap-Add Method and -Save Method for Sampling Rate Conversion. ISCAS 1994: 313-316 - [c4]Kiyoshi Nishikawa, Hitoshi Kiya:
A Technique to Improve Convergence Speed of the LMS Algorithm. ISCAS 1994: 405-408 - 1993
- [c3]Kiyoshi Nishikawa, Kyoko Miyazaki, Hitoshi Kiya:
A parallel AR spectral estimation using a new class of filter bank. ICASSP (4) 1993: 244-247 - 1992
- [c2]Hitoshi Kiya, Satoshi Yamaguchi:
FSF (frequency sampling filter) bank for adaptive system identification. ICASSP 1992: 261-264 - [c1]Kiyoshi Nishikawa, Hitoshi Kiya, Masahiko Sagawa:
Property of circular convolution for subband image coding. ICASSP 1992: 281-284
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-06 21:37 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint