|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EA, EMM, ASJ-H |
2022-11-21 10:00 |
Online |
Online |
[Poster Presentation]
ConvMixer model transformation using random orthogonal matrices for privacy protection of test images. Rei Aso, Tatsuya Chuman, Hitoshi Kiya (TMU) EA2022-49 EMM2022-49 |
In this paper, a privacy preserving image classification method is proposed under the use of ConvMixer models. To protec... [more] |
EA2022-49 EMM2022-49 pp.46-51 |
EE |
2022-01-27 13:00 |
Online |
Online |
Survey on the use of middle-size office building under the New Normal
-- Analysis of the impact working from home on the energy of building facilities and equipments -- Kosuke Sasakura, Tatsuya Chuman, Masayoshi Komatsu (NTT-F) EE2021-35 |
[more] |
EE2021-35 pp.24-29 |
SIS, IPSJ-AVM |
2017-10-12 13:20 |
Nara |
Todaiji Culture Center |
A JPEG-Friendly Image Encryption Scheme Ayana Kawamura, Tatsuya Chuman, Kenta Iida, Hitoshi Kiya (Tokyo Metropolitan Univ.) SIS2017-22 |
Conventional secure image transmission systems are based on Compression-then-Encryption systems, where image encryption ... [more] |
SIS2017-22 pp.7-12 |
EMM, IE, LOIS, IEE-CMN, ITE-ME [detail] |
2017-09-04 13:00 |
Kyoto |
Kyoto Univ. (Clock Tower Centennial Hall) |
Image Manipulation Analysis on Social Networking Service for Encryption-then-Compression Systems Tatsuya Chuman, Kenta Iida, Hitoshi Kiya (Tokyo Metro. Univ.) LOIS2017-13 IE2017-34 EMM2017-42 |
Encryption-then-Compression (EtC) systems have been proposed to securely transmit images through an untrusted channel pr... [more] |
LOIS2017-13 IE2017-34 EMM2017-42 pp.1-6 |
EMM, IE, LOIS, IEE-CMN, ITE-ME [detail] |
2017-09-04 13:25 |
Kyoto |
Kyoto Univ. (Clock Tower Centennial Hall) |
An Image Identification Scheme for Double-Compressed JPEG Images and Its Application to SNSs Kenta Iida, Tatsuya Chuman, Hitoshi Kiya (Tokyo Metropolitan Univ.) LOIS2017-14 IE2017-35 EMM2017-43 |
[more] |
LOIS2017-14 IE2017-35 EMM2017-43 pp.7-12 |
IE, CS, IPSJ-AVM, ITE-BCT [detail] |
2016-12-09 15:15 |
Ishikawa |
|
Extension of Jigsaw Puzzle Solvers and Its Attack on Permutation-Based Image Encryption Schemes Tatsuya Chuman, Kenta Kurihara, Sayaka Shiota, Hitoshi Kiya (Tokyo Metro. Univ.) CS2016-63 IE2016-99 |
Block-based scrambled image encryption schemes have superior features that are compressible and against noises to number... [more] |
CS2016-63 IE2016-99 pp.115-120 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-14 14:40 |
Yamaguchi |
|
Safety Evaluation for Permutation-Based Image Encryption Schemes against Jigsaw Puzzle Solvers Tatsuya Chuman, Kenta Kurihara, Hitoshi Kiya (Tokyo Metro. Univ.) ISEC2016-17 SITE2016-11 ICSS2016-17 EMM2016-25 |
Block-based scrambled image encryption schemes have superior features that are compressible and against noises to number... [more] |
ISEC2016-17 SITE2016-11 ICSS2016-17 EMM2016-25 pp.23-28 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|