|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IE, ITS, ITE-AIT, ITE-HI, ITE-ME, ITE-MMS, ITE-CE [detail] |
2017-02-20 10:15 |
Hokkaido |
Hokkaido Univ. |
Privacy Protection in Social Networking Services based on an Encryption-then-Compression System for the JPEG Standard Takahiro Maekawa, Kenta Kurihara, Hitoshi Kiya (Tokyo Metro.Univ.) ITS2016-43 IE2016-101 |
Conventional secure image transmision is based on a Compression-then-Encryption system where image compression has to be... [more] |
ITS2016-43 IE2016-101 pp.7-12 |
SIS |
2016-12-08 10:40 |
Hiroshima |
Hiroshima City Univ. |
An Encryption-then-Compression System Allowing the Use of Arbitrary Chroma Interpolation Methods for JPEG Compression Kenta Kurihara (Tokyo Metro. Univ), Hiroyuki Kobayashi (TMCIT), Hitoshi Kiya (Tokyo Metro. Univ) SIS2016-28 |
Conventional transmission systems of image contents are based on Compression-then-Encryption systems, where image encryp... [more] |
SIS2016-28 pp.1-6 |
IE, CS, IPSJ-AVM, ITE-BCT [detail] |
2016-12-09 15:15 |
Ishikawa |
|
Extension of Jigsaw Puzzle Solvers and Its Attack on Permutation-Based Image Encryption Schemes Tatsuya Chuman, Kenta Kurihara, Sayaka Shiota, Hitoshi Kiya (Tokyo Metro. Univ.) CS2016-63 IE2016-99 |
Block-based scrambled image encryption schemes have superior features that are compressible and against noises to number... [more] |
CS2016-63 IE2016-99 pp.115-120 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-14 14:40 |
Yamaguchi |
|
Safety Evaluation for Permutation-Based Image Encryption Schemes against Jigsaw Puzzle Solvers Tatsuya Chuman, Kenta Kurihara, Hitoshi Kiya (Tokyo Metro. Univ.) ISEC2016-17 SITE2016-11 ICSS2016-17 EMM2016-25 |
Block-based scrambled image encryption schemes have superior features that are compressible and against noises to number... [more] |
ISEC2016-17 SITE2016-11 ICSS2016-17 EMM2016-25 pp.23-28 |
ITS, IE, ITE-AIT, ITE-HI, ITE-ME, ITE-MMS, ITE-CE [detail] |
2016-02-22 09:45 |
Hokkaido |
Hokkaido Univ. |
An Image Encryption Scheme Allowing Tone Map Operations and Its Application to JPEG XT Standard Kenta Kurihara, Hitoshi Kiya (Tokyo Metro. Univ.) ITS2015-58 IE2015-100 |
Conventional secure image transmission systems are based on Compression-then-Encryption systems, where image encryption ... [more] |
ITS2015-58 IE2015-100 pp.11-16 |
IE, ITE-ME, IPSJ-AVM, ITE-CE [detail] |
2015-08-03 13:00 |
Tokyo |
Tokyo Metropolitan Univ. |
An Image Encryption Method Allowing Lossless Compression Kenta Kurihara, Sayaka Shiota, Hitoshi Kiya (Tokyo Metro. Univ.) IE2015-49 |
Conventional secure image transmission is based on a Compression-then-Encryption system where image encryption has to be... [more] |
IE2015-49 pp.19-24 |
SIS, IPSJ-AVM |
2014-09-11 10:45 |
Yamagata |
SHONAI INDUSTRIAL PROMOTION CENTER |
A method of perceptual encryption and its efficient key management for JPEG/Motion JPEG images Kenta Kurihara, Yuko Saito (Tokyo Metropolitan Univ.), Shoko Imaizumi (Chiba Univ.), Sayaka Shiota, Hitoshi Kiya (Tokyo Metropolitan Univ.) SIS2014-53 |
In this paper, we propose a method of perceptual encryption and its efficient key management for images presupposing JPE... [more] |
SIS2014-53 pp.13-18 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|