Hitoshi Kiya
#152,306
Most Influential Person Now
Hitoshi Kiya's AcademicInfluence.com Rankings
Hitoshi Kiyaengineering Degrees
Engineering
#6200
World Rank
#7511
Historical Rank
Electrical Engineering
#1807
World Rank
#1908
Historical Rank
Applied Physics
#1943
World Rank
#1978
Historical Rank
Download Badge
Engineering
Hitoshi Kiya's Degrees
- PhD Electrical Engineering Tokyo Metropolitan University
- Masters Electrical Engineering Tokyo Metropolitan University
- Bachelors Electrical Engineering Tokyo Metropolitan University
Why Is Hitoshi Kiya Influential?
(Suggest an Edit or Addition)According to Wikipedia, Hitoshi Kiya from the Tokyo Metropolitan University, Tokyo, Japan was named Fellow of the Institute of Electrical and Electronics Engineers in 2016 for contributions to filter structure, data hiding, and multimedia security.
Hitoshi Kiya's Published Works
Published Works
- Encryption-Then-Compression Systems Using Grayscale-Based Image Encryption for JPEG Images (2018) (146)
- An Encryption-then-Compression System for JPEG/Motion JPEG Standard (2015) (76)
- A development of symmetric extension method for subband image coding (1994) (74)
- Privacy-Preserving Deep Neural Networks with Pixel-Based Image Encryption Considering Data Augmentation in the Encrypted Domain (2019) (69)
- Pixel-Based Image Encryption Without Key Management for Privacy-Preserving Deep Neural Networks (2019) (59)
- An Encryption-then-Compression System for Lossless Image Compression Standards (2017) (58)
- Grayscale-based block scrambling image encryption using YCbCr color space for encryption-then-compression systems (2019) (56)
- An encryption-then-compression system for JPEG standard (2015) (52)
- Lossless Data Hiding in the Spatial Domain for High Quality Images (2007) (52)
- One-Time Key Based Phase Scrambling for Phase-Only Correlation between Visually Protected Images (2009) (51)
- An Encryption-then-Compression system for JPEG 2000 standard (2015) (48)
- Generalized hierarchical encryption of JPEG 2000 codestreams for access control (2005) (46)
- A design method of multidimensional linear-phase paraunitary filter banks with a lattice structure (1997) (45)
- Scene Segmentation-Based Luminance Adjustment for Multi-Exposure Image Fusion (2019) (44)
- DCT Sign-Only Correlation with Application to Image Matching and the Relationship with Phase-Only Correlation (2007) (43)
- Two layer lossless coding of HDR images (2013) (43)
- A linear phase two-channel filter bank allowing perfect reconstruction (image coding) (1992) (43)
- On the Security of Block Scrambling-Based EtC Systems against Extended Jigsaw Puzzle Solver Attacks (2018) (43)
- Partial-scrambling of images encoded using JPEG2000 without generating marker codes (2003) (42)
- A GAN-Based Image Transformation Scheme for Privacy-Preserving Deep Neural Networks (2020) (42)
- Pipelined LMS adaptive filter using a new look-ahead transformation (1997) (41)
- A Method of Embedding Binary Data into JPEG Bitstreams (2002) (41)
- On the security of block scrambling-based ETC systems against jigsaw puzzle solver attacks (2017) (40)
- Block-Wise Image Transformation With Secret Key for Adversarially Robust Defense (2020) (38)
- Super-Resolution Using Convolutional Neural Networks Without Any Checkerboard Artifacts (2018) (37)
- A fast image-scramble method using public-key encryption allowing backward compatibility with JPEG2000 (2004) (37)
- Security evaluation for block scrambling-based ETC systems against extended jigsaw puzzle solver attacks (2017) (35)
- Extended overlap-add and -save methods for multirate signal processing (1997) (35)
- Fast and Robust Identification Methods for JPEG Images with Various Compression Ratios (2006) (35)
- A new class of image registration for guaranteeing secure data management (2008) (34)
- A Location-Map Free Reversible Data Hiding Method using Block-Based Single Parameter (2007) (33)
- Lossy compression of sparse histogram image (2012) (32)
- Unitary Transform-Based Template Protection and Its Application to l2-norm Minimization Problems (2016) (30)
- A subband adaptive filter allowing maximally decimation (1994) (30)
- Advances in Multimedia Information Processing - PCM 2010 - 11th Pacific Rim Conference on Multimedia, Shanghai, China, September 2010, Proceedings, Part II (2011) (28)
- Efficient lossless bit depth scalable coding for HDR images (2012) (28)
- An integer tone mapping operation for hdr images expressed in floating point data (2013) (27)
- An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications (2022) (27)
- Image to Perturbation: An Image Transformation Network for Generating Visually Protected Images for Privacy-Preserving Deep Neural Networks (2021) (27)
- A fast full search block matching algorithm for MPEG-4 video (1999) (26)
- Non separable 2D factorization of separable 2D DWT for lossless image coding (2009) (25)
- An encryption-then-compression system for JPEG XR standard (2016) (24)
- No-Reference PSNR Estimation for Quality Monitoring of Motion JPEG2000 Video Over Lossy Packet Networks (2008) (24)
- Encryption Inspired Adversarial Defense For Visual Classification (2020) (23)
- Grayscale-Based Block Scrambling Image Encryption for Social Networking Services (2018) (22)
- An integer tone mapping operation for HDR images in OpenEXR with denormalized numbers (2014) (22)
- Image manipulation on social media for encryption-then-compression systems (2017) (22)
- Fast inverse tone mapping with Reinhard's global operator (2017) (21)
- Checkerboard artifacts free convolutional neural networks (2019) (21)
- A Privacy-Preserving Machine Learning Scheme Using EtC Images (2020) (21)
- FSF (frequency sampling filter) bank for adaptive system identification (1992) (21)
- A new pipelined architecture of the LMS algorithm without degradation of convergence characteristics (1997) (21)
- Bitstream-Based JPEG Image Encryption with File-Size Preserving (2018) (20)
- Automatic exposure compensation using an image segmentation method for single-image-based multi-exposure fusion (2018) (20)
- Collusion Attack-Resilient Hierarchical Encryption of JPEG 2000 Codestreams with Scalable Access Control (2007) (20)
- Image matching between scrambled images for secure data management (2008) (19)
- Quantization-based image steganography without data hiding position memorization (2005) (19)
- A new lifting structure of non separable 2D DWT with compatibility to JPEG 2000 (2010) (19)
- Privacy-Preserving Support Vector Machine Computing Using Random Unitary Transformation (2019) (18)
- Privacy-Preserving Image Classification Using an Isotropic Network (2022) (18)
- Fast Method for Joint Retrieval and Identification of JPEG Coded Images Based on DCT Sign (2007) (18)
- Property of circular convolution for subband image coding (1992) (18)
- A method of extracting embedded binary data from JPEG bitstreams using standard JPEG decoder (2000) (18)
- A scalable encryption method allowing backward compatibility with JPEG2000 images (2005) (17)
- Identification of JPEG 2000 images in encrypted domain for digital cinema (2009) (17)
- Performance analysis of subband adaptive systems using an equivalent model (1994) (17)
- A protection method of trained CNN model with a secret key from unauthorized access (2021) (16)
- Multi-Exposure Image Fusion Based on Exposure Compensation (2018) (16)
- iTM-Net: Deep Inverse Tone Mapping Using Novel Loss Function Considering Tone Mapping Operator (2019) (16)
- Efficient content-based copy detection using signs of DCT coefficient (2009) (16)
- Error concealment using layer structure for JPEG2000 images (2002) (16)
- A Reversible Image Authentication Method without Memorization of Hiding Parameters (2009) (15)
- Hue-Correction Scheme Based on Constant-Hue Plane for Deep-Learning-Based Color-Image Enhancement (2020) (15)
- Training DNN Model with Secret Key for Model Protection (2020) (15)
- Image Manipulation Specifications on Social Networking Services for Encryption-then-Compression Systems (2018) (14)
- Fixed Smooth Convolutional Layer for Avoiding Checkerboard Artifacts in CNNS (2020) (14)
- Conditions for convergence of a delayless subband adaptive filter and its efficient implementation (1998) (14)
- Privacy-Preserving Content-Based Image Retrieval Using Compressible Encrypted Images (2020) (14)
- Integrated Model of Image Protection Techniques (2017) (14)
- Multidimensional Multirate Filter and Filter Bank without Checkerboard Effect(Special Section on Digital Signal Processing) (1998) (14)
- Three dimensional discrete wavelet transform with deduced number of lifting steps (2013) (14)
- Image Transformation Network for Privacy-Preserving Deep Neural Networks and Its Security Evaluation (2020) (14)
- Pseudo multi-exposure fusion using a single image (2017) (13)
- Convolutional Neural Networks Considering Local and Global Features for Image Enhancement (2019) (13)
- Modulo arithmetic-based image watermarking and its theoretical analysis of image-quality (2005) (13)
- A fixed-point tone mapping operation for HDR images in the RGBE format (2013) (13)
- A Fixed-Point Global Tone Mapping Operation for HDR Images in the RGBE Format (2014) (13)
- Secure Overcomplete Dictionary Learning for Sparse Representation (2020) (13)
- Automatic Exposure Compensation for Multi-Exposure Image Fusion (2018) (13)
- A Method of Inserting Binary Data into MPEG Video in the Compressed Domain (Special Section on Digital Signal Processing) (1999) (13)
- Hierarchical Encryption of Multimedia Contents for Access Control (2006) (13)
- Efficient collusion attack-free access control for multidimensionally hierarchical scalability content (2009) (12)
- An Efficient Random Unitary Matrix for Biometric Template Protection (2016) (12)
- Privacy-Preserving SVM Computing in the Encrypted Domain (2018) (12)
- Error Concealment Using a Data Hiding Technique for MPEG Video (2002) (12)
- A Robust Identification Scheme for JPEG XR Images with Various Compression Ratios (2015) (12)
- Non Separable Two Dimensional Discrete Wavelet Transform for Image Signals (2013) (12)
- Error protection for JPEG2000 encoded images and its evaluation over OFDM channel (2003) (12)
- Adversarial Robustness by One Bit Double Quantization for Visual Classification (2019) (11)
- Encryption of Composite Multimedia Contents for Access Control (2007) (11)
- Phase scrambling for blind image matching (2009) (11)
- An image-quality guaranteed watermarking scheme with spreading spectrum of watermark (2004) (11)
- A Block-Permutation-Based Encryption Scheme with Independent Processing of RGB Components (2018) (11)
- Lightweight Voice Anonymization Based on Data-Driven Optimization of Cascaded Voice Modification Modules (2021) (11)
- Fine rate control and high SNR coding for sparse histogram images (2012) (11)
- Layered Low-Density Generator Matrix Codes for Super High Definition Scalable Video Coding System (2009) (11)
- A new class of lifting wavelet transform for guaranteeing losslessness of specific signals (2008) (11)
- Piracy-Resistant DNN Watermarking by Block-Wise Image Transformation with Secret Key (2021) (11)
- Practical Secure OMP Computation and Its Application to Image Modeling (2018) (11)
- A Watermarking Method Retaining the Desired Image-Quality for Binary Sequences (2003) (11)
- A new color QR code forward compatible with the standard QR code decoder (2013) (10)
- Pipelined Architecture of the LMS Adaptive Digital Filter with the Minimum Output Latency(Special Section on Digital Signal Processing) (1998) (10)
- An equivalent model for subband adaptive system and analysis of its performance (1995) (10)
- Security Evaluation for Block Scrambling-Based Image Encryption Including JPEG Distortion against Jigsaw Puzzle Solver Attacks (2018) (10)
- Non separable 3D lifting structure compatible with separable quadruple lifting DWT (2013) (10)
- Bit-depth scalable lossless coding for high dynamic range images (2015) (10)
- An Remapping Operation without Tone Mapping Parameters for HDR Images (2016) (10)
- Error correction using data hiding technique for JPEG2000 images (2003) (10)
- DCT Sign-Based Similarity Measure for JPEG Image Retrieval (2007) (10)
- Fast Image Identification Methods for JPEG Images with Different Compression Ratios (2006) (10)
- Privacy-Preserving Network BMI Decoding of Covert Spatial Attention (2018) (10)
- A fixed-point implementation of tone mapping operation for HDR images expressed in floating-point format (2014) (10)
- A New Factorization Technique for the Generalized Linear-Phase LOT and Its Fast Implementation (Special Section on Digital Signal Processing) (1996) (10)
- Fast Inverse Tone Mapping Based on Reinhard's Global Operator with Estimated Parameters (2017) (10)
- Voice liveness detection using phoneme-based pop-noise detector for speaker verification (2018) (10)
- Motion estimation with power scalability and its VHDL model (2000) (9)
- An extension of ROI-based scalability for progressive transmission in JPEG2000 coding (2002) (9)
- A Pipelined Architecture for Normalized LMS Adaptive Digital Filters (Special Section on VLSI for Digital Signal Processing) (1999) (9)
- A Fast Scrambling Method for JPEG 2000 Images Using Public-Key Encryption (2004) (9)
- An Image Trading System Using Amplitude-Only Images for Privacy- and Copyright-Protection (2013) (9)
- On the Security of Pixel-Based Image Encryption for Privacy-Preserving Deep Neural Networks (2019) (9)
- A parameter memorization-free lossless data hiding method with flexible payload size (2010) (9)
- Secure and robust identification based on fuzzy commitment scheme for JPEG images (2016) (9)
- An Efficient Reversible Image Authentication Method (2008) (9)
- Lossless Data Hiding in the Spatial Domain for Image Tamper Detection (2006) (9)
- An Image Identification Scheme Of Encrypted Jpeg Images For Privacy-Preserving Photo Sharing Services (2019) (9)
- Near lossless coding of sparse histogram images based on zero-skip quantization (2017) (8)
- A Reversible Data Hiding Method in Compressible Encrypted Images (2020) (8)
- AN IDENTIFICATION METHOD FOR JPEG 2000 IMAGES USING THE SIGNS OF DWT COEFFICIENTS(International Workshop on Advanced Image Technology 2007) (2007) (8)
- Accurate Identifying Method of JPEG2000 Images for Digital Cinema (2008) (8)
- Robust Image Identification with DC Coefficients for Double-Compressed JPEG Images (2019) (8)
- Secure identification based on fuzzy commitment scheme for JPEG XR images (2016) (8)
- Image and Model Transformation with Secret Key for Vision Transformer (2022) (8)
- Integrated algorithm for block-permutation-based encryption with reversible data hiding (2017) (8)
- Secure Dictionary Learning for Sparse Representation (2019) (8)
- An image-quality guaranteed method for quantization-based watermarking using a DWT (2004) (8)
- Unitary transform-based template protection and its properties (2015) (8)
- A method for embedding binary data into JPEG2000 bit streams based on the layer structure (2002) (8)
- A computing method for linear convolution in the DCT domain (2011) (8)
- CycleGAN without checkerboard artifacts for counter-forensics of fake-image detection (2020) (8)
- Multidimensional parallel processing methods for rational sampling lattice alteration (1995) (8)
- An Efficient Lossless Compression Method Using Histogram Packing for HDR Images in OpenEXR Format (2014) (8)
- Fast identification of JPEG 2000 images for digital cinema profiles (2011) (8)
- Generalized histogram shifting-based reversible data hiding with an adaptive binary-to-q-ary converter (2012) (8)
- Multiple-peak model fitting function for DCT sign phase correlation with non-integer shift precision (2009) (8)
- Hash-based identification of JPEG 2000 images in encrypted domain (2012) (8)
- Fuzzy Commitment Scheme-Based Secure Identification for JPEG Images with Various Compression Ratios (2016) (8)
- A Pseudo Multi-Exposure Fusion Method Using Single Image (2018) (8)
- Multidimensional multirate filter without checkerboard effects (1998) (8)
- A parallel implementation method of FFT-based full-search block matching algorithms (2013) (7)
- Privacy-Preserving SVM Computing by Using Random Unitary Transformation (2018) (7)
- Lossless Two-Layer Coding using Histogram Packing Technique for HDR Images (2018) (7)
- HOG feature extraction from encrypted images for privacy-preserving machine learning (2019) (7)
- Design of integer wavelet filters for image compression (2000) (7)
- Methods for Avoiding the Checkerboard Distortion Caused by Finite Word Length Error in Multirate System (2010) (7)
- A retinex-based image enhancement scheme with noise aware shadow-up function (2018) (7)
- A Generation Method of Amplitude-Only Images with Low Intensity Ranges (2013) (7)
- Two-Layer Lossless Coding for High Dynamic Range Images Based on Range Compression and Adaptive Inverse Tone-Mapping (2018) (7)
- Phase-Only Correlation Based Matching in Scrambled Domain for Preventing Illegal Matching (2010) (7)
- An Effective Architecture of the Pipelined LMS Adaptive Filters (Special Section on Digital Signal Processing) (1999) (7)
- Hue-correction scheme considering CIEDE2000 for color-image enhancement including deep-learning-based algorithms (2020) (7)
- Codestream Domain Scrambling of Moving Objects Based on DCT Sign-only Correlation for Motion JPEG Movies (2007) (7)
- Visual Security Evaluation of Learnable Image Encryption Methods against Ciphertext-only Attacks (2020) (7)
- Phase Scrambling for Image Matching in the Scrambled Domain (2010) (7)
- Partial-Scrambling of Images Encoded by JPEG2000 (2002) (7)
- Interleaved Multiple Frame Coding using JPEG2000 (2002) (7)
- Word Length Condition for DC Lossless DWT (2009) (6)
- A reversible data hiding method free from location map and parameter memorization (2010) (6)
- A scrambling method for Motion JPEG videos enabling moving objects detection from scrambled videos (2008) (6)
- A secure online image trading system for untrusted cloud environments (2015) (6)
- Two-Layer Near-Lossless HDR Coding with Backward Compatibility to JPEG (2019) (6)
- Privacy-Preserving Image Classification Using Vision Transformer (2022) (6)
- The use of DCT coefficient sign for content-based copy detection (2007) (6)
- A Framework for Transformation Network Training in Coordination with Semi-trusted Cloud Provider for Privacy-Preserving Deep Neural Networks (2020) (6)
- Privacy-preserving machine learning using EtC images (2019) (6)
- Image-Enhancement-Based Data Augmentation for Improving Deep Learning in Image Classification Problem (2020) (6)
- A pipelined architecture for the normalized LMS adaptive digital filters (1998) (6)
- Parallel Processing Techniques for Multidimensional Sampling Lattice Alteration Based on Overlap-Add and Overlap-Save Methods (1995) (6)
- An extension of JPEG XT with JPEG2000 (2017) (6)
- A robust error protection technique for JPEG2000 codestream and its evaluation in CDMA environment (2003) (6)
- An FFT-Based Full-Search Block-Matching Algorithm With SSD Criterion (2009) (6)
- Reversible Data Hiding Based on Adaptive Modulation of Statistics Invertibility (2010) (6)
- A content-based image retrieval system for visually protected image databases (2015) (6)
- Robust image identification with secure features for JPEG images (2017) (6)
- Voice livness detection based on pop-noise detector with phoneme information for speaker verification (2016) (6)
- Privacy-Preserving Semantic Segmentation Using Vision Transformer (2022) (6)
- Reversible 2D 9-7 DWT Based on Non-separable 2D Lifting Structure Compatible with Irreversible DWT (2011) (6)
- The generalized overlap-add and overlap-save methods using discrete sine and cosine transforms for FIR filtering (1996) (6)
- A method of inserting binary data into MPEG bitstreams for video index labeling (1999) (6)
- Partial-Scrambling of JPEG2000 Images without Generating Marker Codes (2003) (6)
- Double-search-window block matching using the fast fourier transform (2010) (6)
- A pipelined architecture for DLMS algorithm considering both hardware complexity and output latency (1998) (6)
- Weighted median cut quantization and its applications (2012) (6)
- Improvement of convergence speed for subband adaptive digital filters using the multirate repeating method (1995) (6)
- 2-D Pipelined Adaptive Filters Based on 2-D Delayed LMS Algorithm (1997) (6)
- An effective architecture of pipelined LMS adaptive filters (1998) (6)
- Ensemble of Key-Based Models: Defense Against Black-Box Adversarial Attacks (2021) (6)
- Reversible color transform for Bayer color filter array images (2013) (6)
- Two-layer Lossless HDR Coding considering Histogram Sparseness with Backward Compatibility to JPEG (2018) (6)
- A Privacy-Preserving Content-Based Image Retrieval Scheme Allowing Mixed Use Of Encrypted And Plain Images (2020) (6)
- Optimumization of lifting structure of reversible KLT based on permutation of signal's order and sign (2010) (5)
- Deep Retinex Network for Estimating Illumination Colors with Self-Supervised Learning (2021) (5)
- Distributed Secure Sparse Modeling Based on Random Unitary Transform (2020) (5)
- A Blind Reversible Data Hiding Method for High Dynamic Range Images Taking Advantage of Sparse Histogram (2017) (5)
- On the security of block scrambling-based image encryption including JPEG distorsion against jigsaw puzzle solver attacks (2017) (5)
- Histogram-Based Near-Lossless Data Hiding and Its Application to Image Compression (2015) (5)
- Signal and Image Processing in the Encrypted Domain (1970) (5)
- A technique to improve convergence speed of the LMS algorithm (1994) (5)
- Pure-color preserving multi-exposure image fusion (2019) (5)
- A perceptual encryption scheme for Motion JPEG 2000 standard (2015) (5)
- Novel implementation technique of RLS algorithm for improving throughput of adaptive filters (2000) (5)
- Block Matching Motion Estimation Based on Median Cut Quantization for MPEG Video (1999) (5)
- Block-Permutation-Based Encryption Scheme with Enhanced Color Scrambling (2017) (5)
- Replay Attack Detection Using Generalized Cross-Correlation of Stereo Signal (2019) (5)
- Robust Image Identification without Visible Information for JPEG Images (2018) (5)
- JPEG XT Image Compression with Hue Compensation for Two-Layer HDR Coding (2019) (5)
- Error Concealment Using a Digital Watermarking Technique for Interframe Video Coding (2002) (5)
- Low-Density Generator Matrix Codes for IP Packet Video Streaming with Backward Compatibility (2011) (5)
- An efficient access control method for composite multimedia content (2010) (5)
- 1D Frequency Transformation- Based Amplitude- Only Images for Copyright- and Privacy- Protection in Image Trading Systems (1970) (5)
- Noise bias compensation of tone mapped noisy image (2014) (5)
- A new design method of linear-phase paraunitary filter banks with an odd number of channels (1996) (5)
- Privacy-Preserving Pattern Recognition Using Encrypted Sparse Representations in L0 Norm Minimization (2020) (5)
- Reversible Information Hiding and Its Application to Image Authentication (2013) (5)
- Reduction of Lifting Steps of Non Separable 2D Quadruple Lifting DWT Compatible with Separable 2D DWT (2014) (5)
- Adversarial Test on Learnable Image Encryption (2019) (5)
- A data hiding method for JPEG 2000 coded images using modulo arithmetic (2007) (5)
- Adaptive Directional Lifting Structure of Three Dimensional Non-Separable Discrete Wavelet Transform for High Resolution Volumetric Data Compression (2016) (5)
- Robust image authentication using hash function (2004) (5)
- Avoidance of Singular Point in Integer Orthonormal Transform for Lossless Coding (2012) (5)
- A Copyright- and Privacy-Protected Image Trading System Using Fingerprinting in Discrete Wavelet Domain with JPEG 2000 (2014) (5)
- An MSB Prediction-Based Method with Marker Bits for Reversible Data Hiding in Encrypted Images (2021) (4)
- QoS Estimation Method for JPEG 2000 Coded Image at RTP Layer (2006) (4)
- Pipelined adaptive filters based on delayed LMS algorithm (1997) (4)
- A method of inserting binary data into MPEG bitstreams (1998) (4)
- Investigation on Blind Bandwidth Extension with a Non-Linear Function and its Evaluation of x-Vector-Based Speaker Verification (2019) (4)
- Generalizations of the image resolution conversions in DCT-domain using 8 points inversed DCT (1998) (4)
- An Efficient Compression of Amplitude-Only Images for the Image Trading System (2014) (4)
- Reversible color transform with compatiblity to irreversible transform (2010) (4)
- A data hiding method without specifying embedded positions for JPEG image (2007) (4)
- A Key Derivation Scheme for Hierarchical Access Control to JPEG 2000 Coded Images (2011) (4)
- Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models (2021) (4)
- Privacy-preserving Image Retrieval Scheme Allowing Mixed Use of Lossless and JPEG Compressed Images (2021) (4)
- BIT REDUCTION OF DCT BASIS FOR TRANSFORM CODING (1997) (4)
- Improving replay attack detection by combination of spatial and spectral features (2019) (4)
- A leakage suppressed two-level security visual secret sharing scheme (2011) (4)
- A new structure of lifting wavelet for reducing rounding error (2008) (4)
- Non-linear harmonic generation based blind bandwidth extension considering aliasing artifacts (2018) (4)
- Improved Iris matching technique using reduced sized of ordinal measure of DCT coefficients (2013) (4)
- Privacy-Preserving Deep Neural Networks Using Pixel-Based Image Encryption Without Common Security Keys (2019) (4)
- Range reduction of HDR images for backward compatibility with LDR image processing (2014) (4)
- Codestream-Based Identification of JPEG 2000 Images with Different Coding Parameters (2012) (4)
- Deep Inverse Tone Mapping Using LDR Based Learning for Estimating HDR Images with Absolute Luminance (2019) (4)
- An FFT-Based Full-Search Block Matching Algorithm with Sum of Squared Differences Criterion (2010) (4)
- A secure face recognition scheme using noisy images based on kernel sparse representation (2013) (4)
- A location map-free reversible data hiding method for specific area embedding (2009) (4)
- Finite word length error analysis based on basic formula of rounding operation (2009) (4)
- A compressible template protection scheme for face recognition based on sparse representation (2014) (4)
- A Content-based Image Retrieval Scheme Using Compressible Encrypted Images (2021) (4)
- Lossless Data Embedding in the Spatial Domain (2006) (4)
- Multi-color balancing for correctly adjusting the intensity of target colors (2021) (4)
- A Cheat-Prevention Visual Secret Sharing Scheme with Efficient Pixel Expansion (2013) (4)
- Robust Image Identification for Double-Compressed and Resized JPEG Images (2018) (4)
- Lossless Inter-frame Video Coding using Extended JPEG2000 (2002) (3)
- Secure online image trading scheme using DCT coefficients and moment invariants feature (2013) (3)
- An image trading system with JPEG 2000 using fingerprinting in visually protected domain (2013) (3)
- A parallel computation algorithm for super-resolution methods using convolutional neural networks (2017) (3)
- New structure of affine projection algorithm using a novel subband adaptive system (2001) (3)
- An LS based new gradient type adaptive algorithm-least squares gradient (1994) (3)
- A Protection Method of Trained CNN Model Using Feature Maps Transformed With Secret Key From Unauthorized Access (2021) (3)
- A parallel AR spectral estimation using a new class of filter bank (1993) (3)
- A design method for oversampled paraunitary DFT filter banks using householder factorization (1996) (3)
- Hierarchical encryption using short encryption keys for scalable access control of JPEG 2000 coded images (2008) (3)
- A Method of Guaranteeing Image-Quality for Quantization-Based Watermarking Using a Nonorthogonal Transformation (2005) (3)
- A structure of JPEG XT encoder considering effect of quantization error (2016) (3)
- A Frequency Domain Adaptive Algorithm for Estimating Impulse Response with Flat Delay and Dispersive Response Region (Special Section on Digital Signal Processing) (1999) (3)
- Scale Factor of Resolution Conversion Based on Orthogonal Transforms (1993) (3)
- Compressed Domain Based Image Authentication for JPEG Coded Images (2005) (3)
- Encryption-then-Compression-Based Copyright- and Privacy-Protected Image Trading System (2017) (3)
- A Scheme of Reversible Data Hiding for the Encryption-Then-Compression System (2021) (3)
- An inverse tone mapping operator based on Reinhard's global operator (2016) (3)
- Sparse Modeling on Distributed Encryption Data (2020) (3)
- A Detection Method of Operated Fake-Images Using Robust Hashing (2021) (3)
- N-White Balancing: White Balancing for Multiple Illuminants Including Non-Uniform Illumination (2022) (3)
- Dialect-Aware Modeling for End-to-End Japanese Dialect Speech Recognition (2020) (3)
- Image Tamper Detection using Mathematical Morphology (2007) (3)
- Codestream level secure identification for JPEG 2000 images under various compression ratios (2016) (3)
- Error equalization for high quality LDR images in backward compatible HDR image coding (2013) (3)
- Two‐channel QMF bank without checkerboard effect and its lattice structure (1999) (3)
- Multi-Color Balance For Color Constancy (2021) (3)
- Histogram-Based Image Pre-processing for Machine Learning (2018) (3)
- Parallel Processing of Distributed Video Coding to Reduce Decoding Time (2009) (3)
- A Reversible Data Hiding Method in Encrypted Images for Controlling Trade-Off between Hiding Capacity and Compression Efficiency (2021) (3)
- Image matching between visually protected images with one-time key based phase scrambling (2009) (3)
- FFT-based full-search block matching using overlap-add method (2010) (3)
- Lossless Bit Depth Scalable Coding for Floating Point Images (2013) (3)
- A Reversible Data-Hiding Method with Prediction-Error Expansion in Compressible Encrypted Images (2022) (3)
- A cheat preventing method with efficient pixel expansion for Naor-Shamir's visual cryptography (2014) (3)
- Three-Color Balancing for Color Constancy Correction (2021) (3)
- DCT Sign Only Correlation and Its Application to Image Registration (2006) (3)
- INTERPOLATED ADAPTIVE DIGITAL FILTER HAVING FASTER CONVERGENCE SPEED IN IMPLEMENTATION TIME (1992) (2)
- An Image Fusion Scheme for Single-Shot High Dynamic Range Imaging with Spatially Varying Exposures (2019) (2)
- A Color Compensation Method Using Inverse Camera Response Function for Multi-exposure Image Fusion (2019) (2)
- End-to-end Japanese Multi-dialect Speech Recognition and Dialect Identification with Multi-task Learning (2022) (2)
- Secure Sparse Representations in L0 Norm Minimization and Its Application to EtC Systems (2019) (2)
- An Image Contrast Enhancement Scheme with Noise Aware Shadow-Up Function (2018) (2)
- Access Control of Semantic Segmentation Models Using Encrypted Feature Maps (2022) (2)
- A location map-free visible and reversible watermarking method with authentication ability (2008) (2)
- Equivalent representations and generalizations of the image resolution conversions in DCT domain (2000) (2)
- A lossless condition of lifting DWT for specific DC values (2010) (2)
- Efficient packet loss protection for JPEG2000 images enabling backward compatibility with a standard decoder (2004) (2)
- Pipelined Adaptive Filters based on Two-Dimensional LMS Algorithm (1996) (2)
- Packet analyzer for JPEG2000 codestreams and its VHDL model (2004) (2)
- Fast implementation technique for improving throughput of RLS adaptive filters (2000) (2)
- Block Scrambling Image Encryption Used in Combination with Data Augmentation for Privacy-Preserving DNNs (2021) (2)
- Separated-Spectral-Distribution Estimation Based on Bayesian Inference with Single RGB Camera (2021) (2)
- A Super-Resolution Method Based on the Discrete Cosine Transform (Special Section of Papers Selected from JTC-CSCC'95) (1996) (2)
- A new technique of non-iterative super-resolution without boundary distortion (2012) (2)
- Sequence-To-One Neural Networks for Japanese Dialect Speech Classification (2020) (2)
- Spatially varying white balancing for mixed and non-uniform illuminants (2021) (2)
- Layered LDGM codes for scalable video streaming over packet erasure channels (2009) (2)
- Avoidance of singular point in reversible KLT (2010) (2)
- Image Identification of Encrypted JPEG Images for Privacy-Preserving Photo Sharing Services (2019) (2)
- Grayscale-Based Image Encryption Considering Color Sub-sampling Operation for Encryption-then-Compression Systems (2018) (2)
- An extended overlap-add method and -save method for sampling rate conversion (1994) (2)
- A Data Hiding Method for Indexing JPEG-Coded Images and Theoretical Analyses of Image-Quality (2004) (2)
- Robust image identification without any visible information for double-compressed JPEG images (2017) (2)
- Two-Layer Near-Lossless HDR Coding Using Zero-Skip Quantization with Backward Compatibility to JPEG (2019) (2)
- Codeblock-Based Error Concealment for JPEG2000 Coded Image Transmission over RTP (2007) (2)
- Hue-Correction Scheme Considering Non-Linear Camera Response for Multi-Exposure Image Fusion (2020) (2)
- MODIFIED PHASE-ONLY CORRELATION USING THE SIGN OF DCT COEFFICIENTS WITH APPLICATION TO IMAGE MATCHING(International Workshop on Advanced Image Technology 2007) (2007) (2)
- A Unified Tone Mapping Operation for HDR Images Including Both Floating-Point and Integer Data (2015) (2)
- Block Matching Motion Estimation Using Less Gray Level Images for Mpeg Video (1998) (2)
- A Hue-Preserving Tone Mapping Scheme Based on Constant-Hue Plane Without Gamut Problem (2019) (2)
- Fake-image detection with Robust Hashing (2021) (2)
- A New Copyright- and Privacy-Protected Image Trading System Using a Novel SteganographyBased Visual Encryption Scheme (2019) (2)
- A no reference geometrical compensation method using simple correlation-based data hiding (2009) (2)
- A Method of Applying JPEG2000 which Enables Undistorted Re-encoding (2002) (2)
- A near-lossless image compression system with data hiding capability (2015) (2)
- Iris recognition method based on ordinal measure of discrete cosine transform coefficients (2012) (2)
- A Geometric Compensation Method for Image Watermarking Schemes and Its Required Accuracy (2009) (2)
- Privacy-Preserving Image Classification Using ConvMixer with Adaptive Permutation Matrix (2022) (2)
- Fitting Functions for Noninteger Shift Value Estimation Using DCT Sign Phase Correlation (2009) (2)
- An oversampling subband adaptive digital filter with rational decimation rations (1995) (2)
- Two layer coding of HDR images with noise bias compensation (2015) (2)
- Noise bias compensation based on Bayesian inference for tone mapped noisy image (2015) (2)
- Reversible data hiding for compression-friendly image encryption method (2017) (2)
- Resolution conversion method with arbitrary rational values for transform‐coded images (1994) (2)
- Image Identification of Grayscale-Based JPEG Images for Privacy-Preserving Photo Sharing Services (2019) (2)
- A new two-dimensional parallel block adaptive digital filter (1996) (2)
- A visually-lossless data hiding method based on histogram modification (2012) (2)
- A digital watermarking scheme that preserves image quality and is applicable to watermark sequences from a variety of distributions (2006) (2)
- Pipeline implementation of gradient‐type adaptive filters (2001) (2)
- 2D blind system identification using adaptive algorithms (2000) (2)
- Extension of DCT sign phase correlation to subpixel registration (2009) (2)
- Pipelined adaptive filters based on look‐ahead‐based delayed LMS algorithm (1999) (2)
- Convolutional Neural Networks Without Any Checkerboard Artifacts (2018) (2)
- A fixed-point local tone mapping operation for HDR images (2016) (2)
- Transfer Learning-Based Model Protection With Secret Key (2021) (2)
- Security Evaluation of Block-based Image Encryption for Vision Transformer against Jigsaw Puzzle Solver Attack (2022) (2)
- Color-component bit allocation scheme for JPEG 2000 parallel codec (2010) (2)
- Improvement in the Image Quality and the Capacity of the Reversible Data Hiding (2007) (2)
- Lightweight and irreversible speech pseudonymization based on data-driven optimization of cascaded voice modification modules (2021) (2)
- Partial-scrambling of Still Images based on a general JPEG2000 encoder (2001) (2)
- Filtering Adversarial Noise with Double Quantization (2019) (2)
- A Cheat-Prevention Visual Secret Sharing Scheme with Minimum Pixel Expansion (2013) (2)
- Subband coding of images with circular convolution (1992) (2)
- Reinhard's global operator based inverse tone mapping with one parameter (2017) (2)
- Robust Image Identification for Double-Compressed JPEG Images (2018) (2)
- A Bit-Operation Algorithm of the Median-Cut Quantization and Its Hardware Architecture(Special Section on Intelligent Signal and Image Processing) (2000) (2)
- Compression performance of extended JPEG XT under various TMOs (2017) (2)
- A DCT coefficient sign-based background model for moving objects detection from motion JPEG coded movies (2009) (2)
- An efficient structure of generalized lapped orthogonal transforms for finite-duration sequences and its application to M-band discrete-time wavelet transforms (1997) (1)
- ROI-based scalability for progressive transmission in JPEG2000 coding (2003) (1)
- A jigsaw puzzle solver-based attack on block-wise image encryption for privacy-preserving DNNs (2022) (1)
- Image Enhancement Network Trained by Using HDR images (2019) (1)
- Hierarchical Key Assignment Scheme for Multimedia Access Control with Modified Hash Chain (2012) (1)
- Channel Scaling for Integer Implementation of Minimum Lifting 2D Wavelet Transform (2016) (1)
- An Efficient Access Control Scheme for Multimedia Content Using Modified Hash Chain (2011) (1)
- Image Fusion for Single-Shot High Dynamic Range Imaging with Spatially Varying Exposures (2018) (1)
- A Representation Method of the Convergence Characteristic of the LMS Algorithm Using Tap-Input Vectors (1995) (1)
- Lossless integer color transform for four color components (2011) (1)
- Image Classification Using Vision Transformer for EtC Images (2022) (1)
- Scrambling of MPEG Video by Exchanging Motion Vectors(Image/Visual Signal Processing)( Digital Signal Processing) (2004) (1)
- Two-Layer Lossless HDR Coding using Histogram Packing Technique with Backward Compatibility to JPEG (2018) (1)
- An extended overlap‐add method and overlap‐save method for sampling rate conversion (1995) (1)
- Technical Program Committee Chair’s Message (2005) (1)
- Lossless transform with functionality of thumbnail previewing (2013) (1)
- Codestream Length-Invariant Partial Scrambler Using DCT Signs for Motion JPEG Movies (2006) (1)
- Image Authentication Based on Invertible Data Hiding with Multi-Tiers (2007) (1)
- A new class of subband adaptive filter using alias-free maximally decimated DFT-bank (1992) (1)
- Blind Bandwidth Extension with a Non-Linear Function and Its Evaluation on Automatic Speaker Verification (2020) (1)
- L2 norm optimization of tone mapping for two layer lossless coding of HDR images (2014) (1)
- No reference affine compensation using three 2-D barcodes (2010) (1)
- A Moving Object Detection Scheme in Codestream Domain for Motion JPEG Encoded Movies (2010) (1)
- No-reference image quality estimation for motion JPEG 2000 enabling precise estimation of PSNR values (2010) (1)
- iTM-Net: Deep Inverse Tone Mapping Using Novel Loss Function Based on Tone Mapping Operator (2019) (1)
- A-4-30 A Method of overlaying color Images on QR codes (2013) (1)
- An Extension of Encryption-Inspired Adversarial Defense with Secret Keys against Adversarial Examples (2020) (1)
- PE Expansion-based reversible data hiding without location maps (2011) (1)
- Ensemble of Models Trained by Key-based Transformed Images for Adversarially Robust Defense Against Black-box Attacks (2020) (1)
- Efficient Lossless to Lossy Transcoding of JPEG 2000 Codestreams for D-Cinema (2009) (1)
- Proceedings of the Advances in multimedia information processing, and 11th Pacific Rim conference on Multimedia: Part II (2010) (1)
- Reversible Information Hiding Considering Hierarchical Access Control (2009) (1)
- A Privacy-Preserving Image Retrieval Scheme with a Mixture of Plain and EtC Images (2022) (1)
- Combined Use of Federated Learning and Image Encryption for Privacy-Preserving Image Classification with Vision Transformer (2023) (1)
- A Fast Sub-Pixel Block-Matching Algorithm Using FFT-Based Full-Search Block- Matching (2010) (1)
- An intensity range reduction method for the image trading system with digital fingerprinting in visually protected domain (2013) (1)
- Symmetric Extension and Point Symmetric Extension for Finite Length Signal (2000) (1)
- Performance Evaluation of Two-layer lossless HDR Coding using Histogram Packing Technique under Various Tone-mapping Operators (2019) (1)
- Generation of Gradient-Preserving Images allowing HOG Feature Extraction (2021) (1)
- A Hue Correction Scheme Based on Constant-Hue Plane for Color Image Enhancement (2019) (1)
- Access Control with Encrypted Feature Maps for Object Detection Models (2022) (1)
- Compressible and Learnable Encryption for Untrusted Cloud Environments (2018) (1)
- A-4-2 Applying Cipher to the Reversible Image Authentication (2007) (1)
- SCRAMBLING OF MPEG VIDEO SUITABLE FOR IMAGE SEARCH (Image Processing and Coding)(International Workshop On Advanced Image Technology (IWAIT2004)) (2004) (1)
- StyleGAN Encoder-Based Attack for Block Scrambled Face Images (2022) (1)
- An Efficient Access Control Method Based on One-way Hash Functions for Digital Videos (2010) (1)
- Adversarial Detector with Robust Classifier (2022) (1)
- Replay Attack Detection Based on Spatial and Spectral Features of Stereo Signal (2021) (1)
- Image invisibility assessment for visually encrypted images (2014) (1)
- [Invited Paper] An Efficient Unified-Tone-Mapping Operation for HDR Images with Various Formats (2016) (1)
- A super-resolution method based on the discrete cosine transforms (1996) (1)
- On the Transferability of Adversarial Examples between Encrypted Models (2022) (1)
- A Use of Magnitude-Only Images for Privacy- and Copyright-Protected Image Trading Systems (ライフインテリジェンスとオフィス情報システム) (2012) (1)
- Research Community and Its Support Plan (2011) (1)
- A design method OF 2-D axial-symmetric paraunitary filter banks with a lattice structure (1998) (1)
- Low-bit motion estimation with edge enhanced images for lowpower MPEG encoder (2001) (1)
- Noise bias compensation for tone mapped noisy image using prior knowledge (2019) (1)
- Access Control of Object Detection Models Using Encrypted Feature Maps (2022) (1)
- Compression Performance of Grayscale-based Image Encryption for Encryption-then-Compression Systems (2018) (1)
- Investigation on Spatial and Frequency-Based Features for Asynchronous Acoustic Scene Analysis (2021) (1)
- Hash based identification of JPEG 2000 images with different coding parameters (2012) (1)
- Fuzzy Commitment Scheme-Based Secure Identifica- tion for JPEG XR Images under Various Compression Ratios (2017) (1)
- Flexible Data Hiding and Extraction in EtC Images (2020) (1)
- A reconstruct method frequency components using DFT expression (1994) (1)
- Effectiveness of Learning Support by Expert Teachers in Lessons Using a Digital Pen (2019) (1)
- Condition on Word Length of Signals and Coefficients for DC Lossless Property of DWT (2011) (1)
- Effectiveness of collaborative learning using the digital pen and the mind-map (2011) (1)
- [Paper] Fuzzy Commitment Scheme-Based Secure Identification for JPEG XR Images under Various Compression Ratios (2017) (1)
- Robustness of Signal Processing-Based Pseudonymization Method Against Decryption Attack (2022) (1)
- Effects of Random Sign Encryption in JPEG 2000-Based Data Hiding (2014) (1)
- A Quantization-Based Watermarking Scheme Allowing aDesired Image-Quality Using a DWT (2004) (1)
- A Design Method of Odd-Channel Linear-Phase Paraunitary Filter Banks with a Lattice Structure (1998) (1)
- Design of oversampled DFT filter banks with minimum delay (1998) (1)
- CONSIDERATION ON DCT SIGN ONLY CORRELATION FOR IMAGE IDENTIFICATION (2006) (1)
- AN FFT-BASED FULL-SEARCH BLOCK MATCHING ALGORITHM USING OVERLAP-ADD METHOD (2010) (1)
- Application of Bandwidth Extension with No Learning to Data Augmentation for Speaker Verification (2020) (1)
- A REVERSIBLE IMAGE AUTHENTICATION METHOD FREE FROM LOCATION MAP AND PARAMETER MEMORIZATION(International Workshop on Advanced Image Technology 2009) (2009) (1)
- A Unified Tone Mapping Operation for HDR Images Expressed in Integer Data (2016) (1)
- Non-separable three dimensional discrete wavelet transform with adaptive directional prediction (2014) (1)
- Checkerboard-Artifact-Free Image-Enhancement Network Considering Local and Global Features (2020) (1)
- Secure OMP Computation Maintaining Sparse Representations and Its Application to EtC Systems (2020) (1)
- Factors determining student satisfaction in a learning environment featuring the use of a digital pen at an elementary school in Japan (2013) (0)
- A codestream domain authentication and tamper localization scheme for JPEG 2000 (2010) (0)
- Word Length Allocation for Multiplier Coefficients of Minimum Lifting Non-Separable 2D Wavelet Transform (2016) (0)
- IMAGE QUALITY IMPROVEMENT SCHEME BY DISCARDING CODING PASS FOR TRANSMITTING MOTION JPEG 2000 STREAMS OVER RTP(International Workshop on Advanced Image Technology 2005) (2005) (0)
- Oversampled DFT Filter Banks with Arbitrary Decimation Ratios and Their Minimum Delays (1996) (0)
- Method for Subband Image Coding (1994) (0)
- MORPHOLOGICAL IMAGE TAMPER DETECTING METHOD CONSIDERING ROBUSTNESS AGAINST COMPRESSION(INTERNATIONAL Workshop on Advanced Image Technology 2008) (2007) (0)
- Privacy-preserving Pattern Recognition with Image Compression (2020) (0)
- An inverse tone mapping operation with two integer data for HDR images (2017) (0)
- A universal detector of CNN-generated images using properties of checkerboard artifacts in the frequency domain (2021) (0)
- Malticarrier Transmission with Haar Basis (1993) (0)
- Design Methods for Oversampled DFT Filter Banks (1996) (0)
- Near lossless coding of sparse histogram images based on zero-skip quantization (2017) (0)
- Methods for Avoiding the Checkerboard Distortion Caused by Rounding Error in Multirate System (2009) (0)
- The Two-Dimensional Lapped Hadamard Transform(Special Section on Digital Signal Processing) (1998) (0)
- On the predictability in reversible steganography (2022) (0)
- A NEW REALIZATION OF THE FREQUENCY SAMPLING FILTER ( FSF ) BANK SUITED FOR THE BLOCK ADAPTIVE FILTERS (1992) (0)
- A Detection Method of Temporally Operated Videos Using Robust Hashing (2022) (0)
- Two-layer image coding compatible with JPEG XS (2021) (0)
- An Access Control Method with Secret Key for Semantic Segmentation Models (2022) (0)
- Bit-depth scalable lossless coding for high dynamic range images (2015) (0)
- A Key Generating Method Using Recursive Hash Chains and Its Applications for Multi-dimensionally Hierarchical Access Control (2011) (0)
- A Packet Analyzer for JPEG2000 Codestrams and Its Application to Error Correction (2004) (0)
- An Equivalent Model for Adaptive System Identification with Clock Rate Conversion (1993) (0)
- Quality Improvement of Streaming Transmission by RTP Packetization in Consideration of JPEG2000 Codestream (2004) (0)
- Subset noise bias compensation for tone-mapping and up-scaling of JPEG images (2016) (0)
- LOW DELAY PRE-FEC INTERLEAVING SCHEME FOR ROBUST JPEG2000 VIDEO STREAMING IN PACKET LOSS ENVIRONMENT(International Workshop on Advanced Image Technology 2006) (2006) (0)
- Multirate repeating methods to improve convergence speed for subband adaptive digital filters (1994) (0)
- Two-Channel QMF Banks with Ringing Constraints (1997) (0)
- THE EFFECTIVE METHOD FOR APPLYING JPEG2000 TO QCIF VIDEO CODING(Sessions6 Image Coding)(IWAIT2002) (2002) (0)
- A Low-memory Cross-fading Method for JPEG2000 Images (2003) (0)
- A-4-19 Aperture Compensation in 1D Sampling of 3D Signals for De-Blurring : Progress of Signal Processing of Visual Perception (2008) (0)
- A Block-Permutation-Based Image Encryption Allowing Hierarchical Decryption (2018) (0)
- A Meeting With the Origins of Technologies (2008) (0)
- Block sampling rate conversion for delay reduction (1997) (0)
- Effective Integer Wavelet Filters for Image Compression (1999) (0)
- On the Adversarial Transferability of ConvMixer Models (2022) (0)
- On the influence of using quantized images on machine learning algorithms (2020) (0)
- Low Delay Interleaved FEC for Robust JPEG2000 Video Streaming (2005) (0)
- A Location Map-Free Reversible Data Hiding Method Inserting Data to Image Edges (2008) (0)
- Symmetric-extension Based Whitening for Phase Correlation (2010) (0)
- The Effective Method for Applying JPEG2000 to QCIF Video Coding (マルチメディア情報処理,映像表現,ネットワーク映像メディア,画像情報システム 第4回International Workshop on Advanced Image Technology (IWAIT2002)) (2002) (0)
- A STUDY ON TEXTURE FILTERING USING JPEG 2000 SCALABILITIES (2010) (0)
- DCT SIGN ONLY IMAGE AND ITS APPLICATION TO PHASE ONLY CORRELATION(INTERNATIONAL Workshop on Advanced Image Technology 2008) (2007) (0)
- Self-Supervised Intrinsic Image Decomposition Network Considering Reflectance Consistency (2021) (0)
- Motion Compensation for MPEG Video in the DCT Domain (1997) (0)
- Codeblock-Based Concealment Scheme for JPEG2000 Images in Lossy Packet Networks (2006) (0)
- An Extrapolation Algorithm with DFT Matrix for Discrete Time Signals (1994) (0)
- Motion Estimation Using Edge Enhanced Low-Bit Images for Lowpower MPEG Encoder (2001) (0)
- A FAST IDENTIFICATION METHOD FOR JPEG 2000 IMAGES WITH DIFFERENT CODE-BLOCK SIZES AND RESOLUTION LEVELS (2009) (0)
- Generalizations of image resolution conversions using 8-point inverse DCT (2002) (0)
- L0 Norm Optimization in Scrambled Sparse Representation Domain and Its Application to EtC System (2020) (0)
- A Novel Access Control Scheme for Multimedia Content with Modified Hash Chain (2012) (0)
- A Frequency Domain Estimation Algorithm Allowing Broadband Feedforward Active Noise Control Systems (2006) (0)
- A-4-51 Adaptive Zero-Order Interpolation based on Luminance Gradient and Distance between Input and Output Signals (2007) (0)
- Investigation on latency issues and objective measurements of non-linear blind bandwidth extension (2019) (0)
- An Encryption Method of Convmixer Models without Performance Degradation (2022) (0)
- FAST AND ROBUST IDENTIFICATION METHODS FOR JPEG-CODED IMAGES(International Workshop on Advanced Image Technology 2006) (2006) (0)
- Improvement of Convergence Speed of Alias-free Subband Adaptive Filtering Using Multirate Repeating Method (2001) (0)
- Efficient data hiding in encrypted JPEG 2000 codestreams (2014) (0)
- New structure of affine projection algorithm based on subband adaptive filters (2000) (0)
- Lossless video coding interleaved multiple frames (2003) (0)
- Optimum Block Size of Discrete Sine and Cosine Transforms for Symmetric Convolution (1995) (0)
- Sign Summation Image and Its Application to Robust Image Registration (2009) (0)
- Oversampled Filter Banks Based on Polyphase Submatrices (1999) (0)
- Difficulty in estimating visual information from randomly sampled images (2020) (0)
- An image estimation method by header information in JPEG 2000 codestreams and its application to image identification (2014) (0)
- Co-Linked Institutes (2009) (0)
- 2014 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2014, Ishigaki, Japan, November 17-20, 2014 (2014) (0)
- Scale Factor of Resolution Conversion in Transform / Subband Domain (1993) (0)
- Missing data recovery using autoencoder for multi-channel acoustic scene classification (2022) (0)
- A Low-memory Transition Method for Motion-JPEG2000 Images (2003) (0)
- Fast Accurate Identifying Method of JPEG 2000 Images with Different Coding Parameters for Digital Cinema (2010) (0)
- Technical chair's overview (2012) (0)
- Packet loss recovery for RTP-based transmission of JPEG2000 images enabling backward compatibility with standard decoder (2004) (0)
- Optimum SPT allocation for multipliers of minimum lifting 2D wavelet transform (2016) (0)
- THE PARALLEL AR SPECTRAL ESTIMATION METHOD USING FILTER BANKS (1992) (0)
- Extension of JPEG XS for Two-Layer Lossless Coding (2020) (0)
- Co-Linked Institutes(Focus) (2009) (0)
- Missing Data Completion of Multi-channel Signals Using Autoencoder for Acoustic Scene Classification (2023) (0)
- Effects of JPEG Compression on Vision Transformer Image Classification for Encryption-then-Compression Images (2023) (0)
- Ensemble based speaker verification using adapted score fusion in noisy reverberant environments (2016) (0)
- Non-separable weighted median-cut quantization for images with sparse color histogram (2012) (0)
- A VLSI Architecture of Median-Cut Quantization for Low-Bit Motion Estimation (1999) (0)
- Robust Image Identification for Double-Compressed JPEG Images (2018) (0)
- QCIF Video Coding Based on JPEG2000 Using Symmetry of Images (2002) (0)
- Spatial Subsampling MD Coding with Code Block-Based Error Concealment for JPEG 2000 Coded Images (2005) (0)
- On the Selection of Synthesis Filter Bank in Subband Adaptive Filtering (1995) (0)
- Template matching with white balance adjustment under multiple illuminants (2022) (0)
- Single-Shot High Dynamic Range Imaging with Spatially Varying Exposures Considering Hue Distortion (2019) (0)
- A Noise-aware Enhancement Method for Underexposed Images (2019) (0)
- Efficient Collusion Attack-Free Access Control for JPEG 2000 Coded Images (2009) (0)
- Joint bitstream level identification and retrieval method of JPEG 2000 images for digital cinema (2009) (0)
- QOS ESTIMATION BASED ON PSNR FOR MOTION JPEG2000 VIDEO IN LOSSY PACKET NETWORKS(International Workshop on Advanced Image Technology 2007) (2007) (0)
- SPATIAL SEGMENTATION METHOD OF IMAGES WITHOUT BOUNDARY DISTORTION FOR DWT (2006) (0)
- Special Section on Papers Selected from the 21st Symposium on Signal Processing (2007) (0)
- A Design Method of Two-Channel QMF Banks With Ringing Constraints (1997) (0)
- A Loop Pipelining Based Design Method for A Motion Estimator with Flexbility of Functional Unit Organization (1998) (0)
- Hue Correction Scheme for Multi-Exposure Image Fusion Considering Hue Distortion in Input Images (2020) (0)
- Codeblock-Based Error Concealment for JPEG 2000 Coded Image Transmission over Lossy Packet Networks (2006) (0)
- Near Lossless Data Hining Using Sparsity of Image Histogram (2015) (0)
- T-IP Editorial Board EDITOR-in-CHIEF (2011) (0)
- Error Correction Using a Data Hiding Technique for MPEG Video (2003) (0)
- A Method of Extracting Binary Data from JPEG Bitstreams Using Standard JPEG Decoder (1999) (0)
- Analysis on DC Lossless Condition of Wavelet Transform (2008) (0)
- Dialect-aware Semi-supervised Learning for End-to-End Multi-dialect Speech Recognition (2022) (0)
- Channel scaling for rounding noise reduction in minimum lifting 3D wavelet transform (2015) (0)
- Design and Approximation for DCT with Large Size (2014) (0)
- Efficient Scheme of Packet Loss Recovery for JPEG2000 Images Allowing Backward Compatibility with a Standard Decoder (2004) (0)
- A Histogram ROI Quantization Method and Its Applications (2012) (0)
- LASSO analysis for distributed encryption signal with random unitary transform (2020) (0)
- A Generation Scheme of Protected Templates Based on Orthogonal Transforms for Biometrics (2014) (0)
- A Flexible Reversible Data Hiding Method in Compressible Encrypted Images (2021) (0)
- FFT-Based Implementation of Sampling Rate Conversion with a Small Number of Delays (Special Section on Digital Signal Processing) (1997) (0)
- Noise Bias Compensation for Reconstructed HDR Images in Two Layer Coding (2019) (0)
- A extended edge emphasis method and its application to the expansion of images (2000) (0)
- Lossless two-layer coding for HDR images (2018) (0)
- Protecting Semantic Segmentation Models by Using Block-wise Image Encryption with Secret Key from Unauthorized Access (2021) (0)
- Quality improvement of tone mapped images by TMQI-II based optimization for the JPEG XT standard (2016) (0)
- Near-lossless image coding considering the influence of re-encoding (2014) (0)
- SCALABLE SCRAMBLING FOR MPEG VIDEO(International Workshop on Advanced Image Technology 2005) (2005) (0)
- A Moving Object Detection Scheme in Codestream Domain for Motion JPEG Encoded Movies Masaaki Fujiyoshi (0)
- A JPEG/MPEG-Compatible Subband Coding System (1997) (0)
- Protection of SVM model with secret key from unauthorized access (2021) (0)
- Structure of Delayless Subband Adaptive Filter Using Hadamard Transformation (1998) (0)
- Reversible Data Hiding with Hierarchical Access Control for Medical Imagery (2009) (0)
- Motion compensation for scalable decoder for drift reduction (1997) (0)
- A Privacy-Preserving Image Retrieval Scheme Using A Codebook Generated from Independent Plain-Image Dataset (2021) (0)
- A new class of near-lossless coding allowing estimation of ℓ∞ bound (2015) (0)
- An Image Quality Guaranteed Watermarking Scheme by Spreading the Spectrum of Watermarks (2005) (0)
- A Preset Adaptive Equalizer utilizing the Frequency Sampling Filter Bank (1995) (0)
- Privacy-Preserving Image Classification Using ConvMixer with Adaptative Permutation Matrix and Block-Wise Scrambled Image Encryption (2023) (0)
- A Data Embedding Method Considering the Finite Word-Length for High Quality Images (2002) (0)
- Foreword (2009) (0)
- Lossless JPEG2000 coding for lossy images and its applications (2002) (0)
- A Frequency Domain Estimation Algorithm for Impulse Response with Flat Delay and Dispersive Response Region (1998) (0)
- Multirate Repeating Method for Alias Free Subband Adaptive Filters (2002) (0)
- Security Evaluation of Compressible Image Encryption for Privacy-Preserving Image Classification Against Ciphertext-Only Attacks (2022) (0)
- A Privacy Preserving Method with a Random Orthogonal Matrix for ConvMixer Models (2023) (0)
- An Image Segmentation Method Based on Luminance Distribution and Its Application to Image Enhancement (2018) (0)
- A method of designing filter banks with alias-free characteristics at equally spaced frequency points (1995) (0)
- Efficient ROI Schemes considering size of Code-Block in JPEG2000 Coding (2002) (0)
- Multiple Level Access Control Method for Hierarchical Multimedia Content Using Low-complexity Key Generating Schemes (2012) (0)
- A Generation of Meaningfully Secured Images for Copyright- and Privacy-Protected Image Trading Systems Using Singular Component Interchange (2017) (0)
- Special Section on Papers Selected from 2005 International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC2005) (2006) (0)
- Method for Estimating Amount of Delay of Sparse Channel Based on Phase-Only Correlation (2008) (0)
- Speeding up image identification with visually protected features for JPEG image (2017) (0)
- Phase representation based on HSV color model for acoustic classification with convolutional neural networks (2021) (0)
- Conditions for avoiding the checkerboard distortion in continuous-time domain (2001) (0)
- Extension of Image Transport Protocol Allowing Sever-Side Control of Request for Retransmission(Communication Theory and Systems)( Applications and Implementations of Digital Signal Processing) (2004) (0)
- AN IMAGE TAMPER DETECTION USING MATHEMATICAL MORPHOLOGY AND ITS APPLICATION(International Workshop on Advanced Image Technology 2007) (2007) (0)
- Improving the Computational Redundancy of Spatially Segmented Wavelet Transform (1999) (0)
- Proxy system with JPEG bitstream-based file-size preserving encryption for cloud photo streams (2021) (0)
- Generating a hierarchical simulation model on the basis of functional model of register transfers (1996) (0)
- A Discrete Gerchberg-Papoulis Algorithm Based on DCT (1995) (0)
- An Efficient Error Correction Scheme Allowing Backward Compatibility with JPEG2000 Codestream (2004) (0)
- HIERARCHICAL CIPHER FOR CONTROLLING ACCESS TO MULTIMEDIA CONTENTS (2006) (0)
- Lossless Video Coding Using Interleaved Multiple Frames (2003) (0)
- Conditions to avoid the checkerboard distortion in continuous-time domain (1998) (0)
- Symmetric correlation and its properties (2010) (0)
- Word Length Assignment of DC Lossless DWT (2010) (0)
- Color-NeuraCrypt: Privacy-Preserving Color-Image Classification Using Extended Random Neural Networks (2023) (0)
- Generative Model-Based Attack on Learnable Image Encryption for Privacy-Preserving Deep Learning (2023) (0)
- Effective encoding of HDR images using the SNR scalability of JPEG2000 (2014) (0)
- Robustness Evaluation of Detectinon methods for Image manipulation with GANs (2020) (0)
- An E ffi cient Uni fi ed-Tone-Mapping Operation for HDR Images with Various Formats (2015) (0)
- A Scrambling Method for JPEG Coded Images Enabling Image Retrieval from Scrambled Images (2008) (0)
- Special Section on VLSI for Digital Signal Processing (1999) (0)
- A no reference image registration method using a LPM-based data hiding scheme (2009) (0)
- Selected Topics from Recent Researches in Signal and Image Processing at Tokyo Metropolitan University (2010) (0)
- ALIAS FREE SUBBAND ADAPTIVE FILTER BASED ON RECURSIVE LEAST SQUARES ALGORITHM FOR FINITE WORD-LENGTH IMPLEMENTATION (2006) (0)
This paper list is powered by the following services:
Other Resources About Hitoshi Kiya
What Schools Are Affiliated With Hitoshi Kiya?
Hitoshi Kiya is affiliated with the following schools: