IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 28  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
CAS, SIP, VLD, MSS 2022-06-16
15:05
Aomori Hachinohe Institute of Technology
(Primary: On-site, Secondary: Online)
Image Classification Using Vision Transformer for Compressible Encrypted Images
Genki Hamano, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metropolitan Univ.) CAS2022-8 VLD2022-8 SIP2022-39 MSS2022-8
In this paper, we propose an image classification method for compressible encrypted images without losing classification... [more] CAS2022-8 VLD2022-8 SIP2022-39 MSS2022-8
pp.40-45
EMM 2022-03-08
11:15
Online (Primary: Online, Secondary: On-site)
(Primary: Online, Secondary: On-site)
An Extension of High-Capacity Reversible Data Hiding in Encrypted Images by Bit Plane Partition
Eichi Arai, Shoko Imaizumi (Chiba Univ.) EMM2021-114
In this paper, we extend a previous reversible data hiding method in encrypted images of high-capacity that uses bit-pla... [more] EMM2021-114
pp.118-123
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2021-07-20
15:55
Online Online Evaluation of TRNG Using CMOS Image Sensor
Hayato Tatsuno, Tatsuya Oyama, Masayoshi Shirahata, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ.) ISEC2021-26 SITE2021-20 BioX2021-27 HWS2021-26 ICSS2021-31 EMM2021-31
Recently, the number of IoT devices has been increasing rapidly, and cryptographic functions such as authentication, key... [more] ISEC2021-26 SITE2021-20 BioX2021-27 HWS2021-26 ICSS2021-31 EMM2021-31
pp.98-103
EMM, IT 2021-05-21
14:25
Online Online A reversible data hiding method with high flexibility in compressive encrypted images
Ryota Motomura, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metropolitan Univ.) IT2021-14 EMM2021-14
In this paper, we propose a reversible data hiding method in encrypted images, where both the com-pression efficiency an... [more] IT2021-14 EMM2021-14
pp.78-83
EMM 2021-03-05
09:30
Online Online An MSB Prediction-Based Method Using Linear Regression for Reversible Data Hiding in Encrypted Images
Kotaro Yamamura, Ryoichi Hirasawa, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metropolitan Univ.) EMM2020-75
In this paper, we propose an MSB prediction-based reversible data hiding method using linear regression in encrypted dom... [more] EMM2020-75
pp.46-51
EMM 2021-01-28
15:15
Online Online An Extension of MSB Prediction-Based Method for Reversible Data Hiding in Encrypted Images
Ryoichi Hirasawa, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metropolitan Univ.) EMM2020-65
In this paper, we propose a high capacity MSB prediction-based method with sufficient reversibility for data hiding in e... [more] EMM2020-65
pp.25-30
SIS 2020-03-05
13:10
Saitama Saitama Hall
(Cancelled but technical report was issued)
An Improvement on Data Hiding in the Copyright- and Privacy-Protected Image Trading System
Kazuaki Takahashi, Masaaki Fujiyoshi (Tokyo Metro. Univ.), Wannida Sae-tang (KMUTNB), Hitoshi Kiya (Tokyo Metro. Univ.) SIS2019-39
This paper improves the data hiding performance in the copyright- and privacy-protected image trading system. In the sys... [more] SIS2019-39
pp.13-18
EMM 2020-03-05
14:25
Okinawa
(Cancelled but technical report was issued)
[Poster Presentation] Extended EtC images for flexible data hiding and extracting
Ryoichi Hirasawa, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metropolitan Univ.) EMM2019-109
This paper proposes a data hiding method for encrypted images by using an encryption-then-compression (EtC) system. Afte... [more] EMM2019-109
pp.43-48
SIS 2019-12-12
15:15
Okayama Okayama University of Science A Reversible Data Hiding Method for Both Plain and Encrypted Images
Yusuke Izawa, Ryoichi Hirasawa, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (TMU) SIS2019-28
In this paper, we propose a reversible data hiding method, where the data embedded into the original image can be extrac... [more] SIS2019-28
pp.29-34
ITE-BCT, SIS 2019-10-25
11:10
Fukui Fukui International Activities Plaza Image Compression in Encryption-then-Compression System Using Secure Sparse Representations
Takayuki Nakachi (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) SIS2019-21
n this paper, we propose a image compression method using secure sparse representations in Encryption-then-Compression (... [more] SIS2019-21
pp.77-82
EMM, IT 2019-05-24
10:35
Hokkaido Asahikawa International Conference Hall Searchable Image Encryption using Secret Sharing Scheme
Mohd Kamal Ahmad Akmal Aminuddin, Iwamura Keiichi (Tokyo University of Science) IT2019-9 EMM2019-9
Using the method of secrecy computation based on secret sharing scheme, Aminuddin et al. had introduced an image searchi... [more] IT2019-9 EMM2019-9
pp.43-48
EMM 2018-03-05
14:35
Kagoshima Naze Community Center (Amami-Shi, Kagoshima) [Poster Presentation] A Block-Permutation-Based Image Encryption Allowing Hierarchical Decryption
Yusuke Izawa, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metro. Univ.) EMM2017-77
This paper proposes a permutation-based image encryption scheme, which allows decrypting only a particular area in the e... [more] EMM2017-77
pp.1-6
SIS, IPSJ-AVM 2017-10-12
13:20
Nara Todaiji Culture Center A JPEG-Friendly Image Encryption Scheme
Ayana Kawamura, Tatsuya Chuman, Kenta Iida, Hitoshi Kiya (Tokyo Metropolitan Univ.) SIS2017-22
Conventional secure image transmission systems are based on Compression-then-Encryption systems, where image encryption ... [more] SIS2017-22
pp.7-12
EMM, IE, LOIS, IEE-CMN, ITE-ME [detail] 2017-09-04
13:00
Kyoto Kyoto Univ. (Clock Tower Centennial Hall) Image Manipulation Analysis on Social Networking Service for Encryption-then-Compression Systems
Tatsuya Chuman, Kenta Iida, Hitoshi Kiya (Tokyo Metro. Univ.) LOIS2017-13 IE2017-34 EMM2017-42
Encryption-then-Compression (EtC) systems have been proposed to securely transmit images through an untrusted channel pr... [more] LOIS2017-13 IE2017-34 EMM2017-42
pp.1-6
EMM 2017-03-06
15:40
Okinawa Miyakojima Marin Terminal Building (Okinawa) [Poster Presentation] A Permutation-Based Image Encryption Scheme with Resistance against Some Attacks and Its Key Management
Takeshi Ogasawara, Shoko Imaizumi (Chiba Univ), Hitoshi Kiya (TMU) EMM2016-91
This paper proposes a permutation-based image encryption scheme that improves resistance against brute force attacks and... [more] EMM2016-91
pp.31-36
IE, ITS, ITE-AIT, ITE-HI, ITE-ME, ITE-MMS, ITE-CE [detail] 2017-02-20
10:15
Hokkaido Hokkaido Univ. Privacy Protection in Social Networking Services based on an Encryption-then-Compression System for the JPEG Standard
Takahiro Maekawa, Kenta Kurihara, Hitoshi Kiya (Tokyo Metro.Univ.) ITS2016-43 IE2016-101
Conventional secure image transmision is based on a Compression-then-Encryption system where image compression has to be... [more] ITS2016-43 IE2016-101
pp.7-12
SIS 2016-12-08
10:40
Hiroshima Hiroshima City Univ. An Encryption-then-Compression System Allowing the Use of Arbitrary Chroma Interpolation Methods for JPEG Compression
Kenta Kurihara (Tokyo Metro. Univ), Hiroyuki Kobayashi (TMCIT), Hitoshi Kiya (Tokyo Metro. Univ) SIS2016-28
Conventional transmission systems of image contents are based on Compression-then-Encryption systems, where image encryp... [more] SIS2016-28
pp.1-6
IE, CS, IPSJ-AVM, ITE-BCT [detail] 2016-12-09
15:15
Ishikawa   Extension of Jigsaw Puzzle Solvers and Its Attack on Permutation-Based Image Encryption Schemes
Tatsuya Chuman, Kenta Kurihara, Sayaka Shiota, Hitoshi Kiya (Tokyo Metro. Univ.) CS2016-63 IE2016-99
Block-based scrambled image encryption schemes have superior features that are compressible and against noises to number... [more] CS2016-63 IE2016-99
pp.115-120
EA, EMM 2016-11-17
16:40
Oita Compal Hall (Oita) An Extension of Block-Permutation-Based-Encryption Schemes for Lossless Image Compression
Takeshi Ogasawara, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (TMU) EA2016-55 EMM2016-61
This paper proposes a permutation-based image encryption scheme for lossless coded images. The conventional scheme gener... [more] EA2016-55 EMM2016-61
pp.43-48
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-14
14:40
Yamaguchi   Safety Evaluation for Permutation-Based Image Encryption Schemes against Jigsaw Puzzle Solvers
Tatsuya Chuman, Kenta Kurihara, Hitoshi Kiya (Tokyo Metro. Univ.) ISEC2016-17 SITE2016-11 ICSS2016-17 EMM2016-25
Block-based scrambled image encryption schemes have superior features that are compressible and against noises to number... [more] ISEC2016-17 SITE2016-11 ICSS2016-17 EMM2016-25
pp.23-28
 Results 1 - 20 of 28  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan