default search action
Hideki Noda
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2013
- [j21]Kazumi Yamawaki, Fumiya Nakano, Hideki Noda, Michiharu Niimi:
Improvement of JPEG Compression Efficiency Using Information Hiding and Image Restoration. IEICE Trans. Inf. Syst. 96-D(5): 1233-1237 (2013) - 2012
- [c46]Kazumi Yamawaki, Fumiya Nakano, Hideki Noda, Michiharu Niimi:
Improvement of JPEG compression efficiency using information hiding and image restoration. ISPACS 2012: 436-440 - [c45]Michiharu Niimi, Fuyuki Masutani, Hideki Noda:
Protection of privacy in JPEG files using reversible information hiding. ISPACS 2012: 441-446 - 2011
- [j20]Yuuji Mukai, Hideki Noda, Takashi Osanai:
Artificial Cohort Generation Based on Statistics of Real Cohorts for GMM-Based Speaker Verification. IEICE Trans. Inf. Syst. 94-D(1): 162-166 (2011) - [j19]Hideki Noda, Michiharu Niimi:
Local MAP estimation for quality improvement of compressed color images. Pattern Recognit. 44(4): 788-793 (2011) - [c44]Michiharu Niimi, Hideki Noda:
An application of Sparse Code Shrinkage to image steganalysis based on supervised learning. ICIP 2011: 1941-1944
2000 – 2009
- 2009
- [j18]Takayuki Ishida, Kazumi Yamawaki, Hideki Noda, Michiharu Niimi:
An Improved QIM-JPEG2000 Steganography and Its Evaluation by Steganalysis. Inf. Media Technol. 4(4): 1040-1045 (2009) - [j17]Takayuki Ishida, Kazumi Yamawaki, Hideki Noda, Michiharu Niimi:
An Improved QIM-JPEG2000 Steganography and Its Evaluation by Steganalysis. J. Inf. Process. 17: 267-272 (2009) - [c43]Hideki Noda, Shun Haraguchi, Michiharu Niimi:
Quality Improvement of Compressed Color Images by Model-Based Chrominance Estimation. PCM 2009: 1251-1256 - 2008
- [j16]Yuuji Mukai, Hideki Noda, Michiharu Niimi, Takashi Osanai:
Text-Independent Speaker Verification Using Artificially Generated GMMs for Cohorts. IEICE Trans. Inf. Syst. 91-D(10): 2536-2539 (2008) - [c42]Shogo Ohyama, Michiharu Niimi, Kazumi Yamawaki, Hideki Noda:
Reversible data hiding of full color JPEG2000 compressed bit-stream preserving bit-depth information. ICPR 2008: 1-4 - [c41]Shogo Ohyama, Michiharu Niimi, Kazumi Yamawaki, Hideki Noda:
Lossless Data Hiding Using Bit-Depth Embedding for JPEG2000 Compressed Bit-Stream. IIH-MSP 2008: 151-154 - [c40]Takayuki Ishida, Kazumi Yamawaki, Hideki Noda, Michiharu Niimi:
Performance Improvement of JPEG2000 Steganography Using QIM. IIH-MSP 2008: 155-158 - 2007
- [j15]Hideki Noda, Yohsuke Tsukamizu, Michiharu Niimi:
JPEG2000 Steganography which Preserves Histograms of DWT Coefficients. IEICE Trans. Inf. Syst. 90-D(4): 783-786 (2007) - [j14]Hideki Noda, Michiharu Niimi:
Colorization in YCbCr color space and its application to JPEG images. Pattern Recognit. 40(12): 3714-3720 (2007) - [c39]Hideki Noda, Nobuteru Takao, Michiharu Niimi:
Colorization in YCbCr Space and its Application to Improve Quality of JPEG Color Images. ICIP (4) 2007: 385-388 - [c38]Sho Tanaka, Michiharu Niimi, Hideki Noda:
A Study on Reversible Information Hiding Using Complexity Measure for Binary Images. IIH-MSP 2007: 29-32 - [p1]Hideki Noda, Michiharu Niimi, Eiji Kawaguchi:
Steganographic Methods Focusing on BPCS Steganography. Intelligent Multimedia Data Hiding: New Directions 2007: 189-229 - [e1]Bin-Yih Liao, Jeng-Shyang Pan, Lakhmi C. Jain, Mark Liao, Hideki Noda, Anthony T. S. Ho:
3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), Kaohsiung, Taiwan, 26-28 November 2007, Proceedings. IEEE Computer Society 2007, ISBN 978-0-7695-2994-3 [contents] - 2006
- [j13]Hideki Noda, Jin Korekuni, Michiharu Niimi:
A colorization algorithm based on local MAP estimation. Pattern Recognit. 39(11): 2212-2217 (2006) - [j12]Hideki Noda, Michiharu Niimi, Eiji Kawaguchi:
High-performance JPEG steganography using quantization index modulation in DCT domain. Pattern Recognit. Lett. 27(5): 455-461 (2006) - [c37]Eiji Kawaguchi, Michiro Maeta, Hideki Noda, Koichi Nozaki:
A Model of Digital Contents Access Control System Using Steganographic Information Hiding Scheme. EJC 2006: 50-61 - [c36]Michiharu Niimi, Tetsuji Nakamura, Hideki Noda:
Application of Complexity Measure to Reversible Information Hiding. ICIP 2006: 113-116 - [c35]Hideki Noda, Michiharu Niimi, Jin Korekuni:
Simple and Efficient Colorization in YCbCr Color Space. ICPR (3) 2006: 685-688 - [c34]Hideki Noda, Yohsuke Tsukamizu, Michiharu Niimi:
JPEG2000 Steganography Possibly Secure Against Histogram-Based Attack. PCM 2006: 80-87 - 2005
- [c33]Hideki Noda, Michiharu Niimi, Eiji Kawaguchi:
Application of QIM with dead zone for histogram preserving JPEG steganography. ICIP (2) 2005: 1082-1085 - [c32]Hideki Noda, Hitoshi Korekuni, Nobuteru Takao, Michiharu Niimi:
Bayesian Colorization Using MRF Color Image Modeling. PCM (2) 2005: 889-899 - [c31]Michiharu Niimi, Hideki Noda, Bruce Segee:
A Study on Visual Attack to BPCS-Steganography and Countermeasure. VLBV 2005: 29-36 - 2004
- [c30]Michiharu Niimi, Tomohito Ei, Hideki Noda, Eiji Kawaguchi, Bruce Segee:
An attack to BPCS-steganography using complexity histogram and countermeasure. ICIP 2004: 733-736 - [c29]Hideki Noda, Tomonori Furuta, Michiharu Niimi, Eiji Kawaguchi:
Application of BPCS steganography to wavelet compressed video. ICIP 2004: 2147-2150 - [c28]Hideki Noda, Tomofumi Furuta, Michiharu Niimi, Eiji Kawaguchi:
Video steganography based on bit-plane decomposition of wavelet-transformed video. Security, Steganography, and Watermarking of Multimedia Contents 2004: 345-353 - 2003
- [c27]Michiharu Niimi, Sayaka Minewaki, Hideki Noda, Eiji Kawaguchi:
A Framework for a Simple Sentence Paraphrase Using Concept Hieararchy in SD-Form Semantics Model. EJC 2003: 55-66 - 2002
- [j11]Michiharu Niimi, Richard O. Eason, Hideki Noda, Eiji Kawaguchi:
A Method to Apply BPCS-Steganography to Palette-Based Images Using Luminance Quasi-Preserving Color Quantization. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(9): 2141-2148 (2002) - [j10]Hideki Noda, Mahdad Nouri Shirazi, Eiji Kawaguchi:
MRF-based texture segmentation using wavelet decomposed images. Pattern Recognit. 35(4): 771-782 (2002) - [j9]Jeremiah Spaulding, Hideki Noda, Mahdad Nouri Shirazi, Eiji Kawaguchi:
BPCS steganography using EZW lossy compressed images. Pattern Recognit. Lett. 23(13): 1579-1587 (2002) - [j8]Hideki Noda, Jeremiah Spaulding, Mahdad Nouri Shirazi, Eiji Kawaguchi:
Application of bit-plane decomposition steganography to JPEG2000 encoded images. IEEE Signal Process. Lett. 9(12): 410-413 (2002) - [c26]Jeremiah Spaulding, Hideki Noda, Mahdad Nouri Shirazi, Michiharu Niimi, Eiji Kawaguchi:
Application of bit-plane decomposition steganography to wavelet encoded images. ICIP (2) 2002: 909-912 - [c25]Michiharu Niimi, Richard O. Eason, Hideki Noda, Eiji Kawaguchi:
High capacity and secure digital steganography to palette-based images. ICIP (2) 2002: 917-920 - [c24]Michiharu Niimi, Hideki Noda, Eiji Kawaguchi, Richard O. Eason:
Luminance Quasi-Preserving Color Quantization for Digital Steganography to Palette-Based Images. ICPR (1) 2002: 252-254 - [c23]Hideki Noda, Jeremiah Spaulding, Mahdad Nouri Shirazi, Michiharu Niimi, Eiji Kawaguchi:
Bit-Plane Decomposition Steganography Combined with JPEG2000 Compression. Information Hiding 2002: 295-309 - [c22]Hideki Noda, Jeremiah Spaulding, Michiharu Niimi, Eiji Kawaguchi, Mahdad Nouri Shirazi:
BPCS Steganography Combined with Lossy Wavelet CompressionvS. JCIS 2002: 676-679 - 2001
- [c21]Bing Zhang, Mehdi N. Shirazi, Hideki Noda:
Robust Parallel Segmentation Of Basag-Gausslan Mrfs With Uncertain Parametters. ICME 2001 - [c20]Jeremiah Spaulding, Hideki Noda, Mahdad Nouri Shirazi, Michiharu Niimi, Eiji Kawaguchi:
Steganography using wavelet compressed images. Security and Watermarking of Multimedia Contents 2001: 336-341 - [c19]Michiharu Niimi, Richard O. Eason, Hideki Noda, Eiji Kawaguchi:
Intensity histogram steganalysis in BPCS-steganography. Security and Watermarking of Multimedia Contents 2001: 555-564 - 2000
- [j7]Mahdad Nouri Shirazi, Hideki Noda, Nobuteru Takao:
Texture classification based on Markov modeling in wavelet feature space. Image Vis. Comput. 18(12): 967-973 (2000) - [c18]Mahdad Nouri Shirazi, Hideki Noda, Nobuteru Takao:
Texture Modeling and Classification in Wavelet Feature Space. ICIP 2000: 272-275 - [c17]Hideki Noda, Mahdad Nouri Shirazi, Eiji Kawaguchi:
Textured Image Segmentation Using MRF in Wavelet Domain. ICIP 2000: 572-575 - [c16]Hideki Noda, Eiji Kawaguchi:
Adaptive Speaker Identification Using Sequential Probability Ratio Test. ICPR 2000: 3266-3269 - [c15]Robert Ouellette, Hideki Noda, Michiharu Niimi, Eiji Kawaguchi:
Topological-ordered color table for BPCS-steganography using indexed color images. Security and Watermarking of Multimedia Contents 2000: 502-509
1990 – 1999
- 1999
- [j6]Michiharu Niimi, Hideki Noda, Eiji Kawaguchi:
Steganography based on region segmentation with a complexity measure. Syst. Comput. Jpn. 30(3): 1-9 (1999) - [c14]Hideki Noda, Mehdi N. Shirazi, Bing Zhang, Eiji Kawaguchi:
Mean field decomposition of a posteriori probability for MRF-based unsupervised textured image segmentation. ICASSP 1999: 3477-3480 - 1998
- [c13]Eiji Kawaguchi, Koichi Nozaki, Michiharu Niimi, Hideki Noda, Richard O. Eason:
A Concept of Digital Picture Envelope for Internet Communication. EJC 1998: 343-350 - [c12]Bing Zhang, Mehdi N. Shirazi, Hideki Noda:
A Robust Segmentation Algorithm for the MRF Texture Images and Its Implementation by a Neural Circuitry. ICONIP 1998: 1061-1064 - [c11]Mahdad Nouri Shirazi, Hideki Noda, Ikuo Yonemoto, Hidefumi Sawai:
A Growing Algorithm for Training of RBF Density Estimation Network. ICONIP 1998: 1583-1586 - [c10]Hideki Noda, Katsuya Harada, Eiji Kawaguchi, Hidefumi Sawai:
A context-dependent approach for speaker verification using sequential decision. ICSLP 1998 - 1997
- [c9]Michiharu Niimi, Hideki Noda, Eiji Kawaguchi:
An Image Embedding in Image by a Complexity Based Region Segmentation Method. ICIP (3) 1997: 74-77 - 1996
- [j5]Bing Zhang, Mehdi N. Shirazi, Hideki Noda:
NOTE: Blind Restoration of Degraded Binary Markov Random Field Images. CVGIP Graph. Model. Image Process. 58(1): 90-98 (1996) - [j4]Ferdinand Peper, Hideki Noda:
A symmetric linear neural network that learns principal components and their variances. IEEE Trans. Neural Networks 7(4): 1042-1047 (1996) - [c8]Hideki Noda, Mehdi N. Shirazi, Eiji Kawaguchi:
An MRF model-based method for unsupervised textured image segmentation. ICPR 1996: 765-769 - [c7]Ferdinand Peper, Hideki Noda:
Hebb Learning of Features based on their Information Content. NIPS 1996: 246-252 - 1995
- [j3]Hideki Noda, Mehdi N. Shirazi:
Data-driven segmentation of textured images using hierarchical markov random fields. Syst. Comput. Jpn. 26(5): 43-53 (1995) - [c6]Ferdinand Peper, Hideki Noda:
A Mechanism for the Development of Feature Detecting Neurons. ANNES 1995: 59-62 - [c5]Ferdinand Peper, Hideki Noda:
A class of simple nonlinear 1-unit PCA neural networks. ICNN 1995: 285-289 - 1994
- [j2]Hideki Noda, Mehdi N. Shirazi, Bing Zhang:
A parallel processing algorithm for speech recognition using markov random fields. Syst. Comput. Jpn. 25(2): 92-100 (1994) - [c4]Hideki Noda, Mehdi N. Shirazi:
A MRF-based parallel processing algorithm for speech recognition using linear predictive HMM. ICASSP (1) 1994: 597-600 - 1993
- [j1]Ferdinand Peper, Mehdi N. Shirazi, Hideki Noda:
A noise suppressing distance measure for competitive learning neural networks. IEEE Trans. Neural Networks 4(1): 151-153 (1993) - 1990
- [c3]Hideki Noda, Masuzo Yanagida:
Extraction of phoneme-dependent individuality using HMM-based segmentation for text-independent speaker recognition. ICSLP 1990: 129-132
1980 – 1989
- 1989
- [c2]Hideki Noda:
On the use of the information on individual speaker's position in the parameter space for speaker recognition. ICASSP 1989: 516-519 - 1988
- [c1]Hideki Noda:
Frequency-warped spectral distance measures for speaker verification in noise. ICASSP 1988: 576-579
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 01:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint