Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SIP |
2023-08-07 12:50 |
Osaka |
Osaka Univ. (Suita) Convention Center (Primary: On-site, Secondary: Online) |
An Extension of Image Encryption for Vision Transformer Considering Privacy Protection Haiwei Lin, Shoko Imaizumi (Chiba Univ.), Kiya Hitoshi (Tokyo Metropolitan Univ) SIP2023-46 |
In this paper, we propose an extended framework of access control for Vision Transformer (ViT).
The previous study acc... [more] |
SIP2023-46 pp.1-6 |
EMM |
2023-01-26 09:30 |
Miyagi |
Tohoku Univ. (Primary: On-site, Secondary: Online) |
Influence of Data Hiding in EtC-Image Classification with Vision Transformer Kosuke Abe, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metropolitan Univ.) EMM2022-61 |
A privacy-preserving image classification method with the vision transformer (ViT) was proposed in which the accuracy of... [more] |
EMM2022-61 pp.1-6 |
EMM, IT |
2021-05-21 14:25 |
Online |
Online |
A reversible data hiding method with high flexibility in compressive encrypted images Ryota Motomura, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metropolitan Univ.) IT2021-14 EMM2021-14 |
In this paper, we propose a reversible data hiding method in encrypted images, where both the com-pression efficiency an... [more] |
IT2021-14 EMM2021-14 pp.78-83 |
EMM |
2021-03-05 09:30 |
Online |
Online |
An MSB Prediction-Based Method Using Linear Regression for Reversible Data Hiding in Encrypted Images Kotaro Yamamura, Ryoichi Hirasawa, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metropolitan Univ.) EMM2020-75 |
In this paper, we propose an MSB prediction-based reversible data hiding method using linear regression in encrypted dom... [more] |
EMM2020-75 pp.46-51 |
EMM |
2021-01-28 15:15 |
Online |
Online |
An Extension of MSB Prediction-Based Method for Reversible Data Hiding in Encrypted Images Ryoichi Hirasawa, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metropolitan Univ.) EMM2020-65 |
In this paper, we propose a high capacity MSB prediction-based method with sufficient reversibility for data hiding in e... [more] |
EMM2020-65 pp.25-30 |
EMM |
2020-03-05 14:25 |
Okinawa |
(Cancelled but technical report was issued) |
[Poster Presentation]
Extended EtC images for flexible data hiding and extracting Ryoichi Hirasawa, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metropolitan Univ.) EMM2019-109 |
This paper proposes a data hiding method for encrypted images by using an encryption-then-compression (EtC) system. Afte... [more] |
EMM2019-109 pp.43-48 |
EMM |
2018-03-05 14:35 |
Kagoshima |
Naze Community Center (Amami-Shi, Kagoshima) |
[Poster Presentation]
A Block-Permutation-Based Image Encryption Allowing Hierarchical Decryption Yusuke Izawa, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metro. Univ.) EMM2017-77 |
This paper proposes a permutation-based image encryption scheme, which allows decrypting only a particular area in the e... [more] |
EMM2017-77 pp.1-6 |
SIS, IPSJ-AVM |
2017-10-12 13:20 |
Nara |
Todaiji Culture Center |
A JPEG-Friendly Image Encryption Scheme Ayana Kawamura, Tatsuya Chuman, Kenta Iida, Hitoshi Kiya (Tokyo Metropolitan Univ.) SIS2017-22 |
Conventional secure image transmission systems are based on Compression-then-Encryption systems, where image encryption ... [more] |
SIS2017-22 pp.7-12 |
EMM, IE, LOIS, IEE-CMN, ITE-ME [detail] |
2017-09-04 13:00 |
Kyoto |
Kyoto Univ. (Clock Tower Centennial Hall) |
Image Manipulation Analysis on Social Networking Service for Encryption-then-Compression Systems Tatsuya Chuman, Kenta Iida, Hitoshi Kiya (Tokyo Metro. Univ.) LOIS2017-13 IE2017-34 EMM2017-42 |
Encryption-then-Compression (EtC) systems have been proposed to securely transmit images through an untrusted channel pr... [more] |
LOIS2017-13 IE2017-34 EMM2017-42 pp.1-6 |
EMM |
2017-03-06 15:40 |
Okinawa |
Miyakojima Marin Terminal Building (Okinawa) |
[Poster Presentation]
A Permutation-Based Image Encryption Scheme with Resistance against Some Attacks and Its Key Management Takeshi Ogasawara, Shoko Imaizumi (Chiba Univ), Hitoshi Kiya (TMU) EMM2016-91 |
This paper proposes a permutation-based image encryption scheme that improves resistance against brute force attacks and... [more] |
EMM2016-91 pp.31-36 |
IE, ITS, ITE-AIT, ITE-HI, ITE-ME, ITE-MMS, ITE-CE [detail] |
2017-02-20 10:15 |
Hokkaido |
Hokkaido Univ. |
Privacy Protection in Social Networking Services based on an Encryption-then-Compression System for the JPEG Standard Takahiro Maekawa, Kenta Kurihara, Hitoshi Kiya (Tokyo Metro.Univ.) ITS2016-43 IE2016-101 |
Conventional secure image transmision is based on a Compression-then-Encryption system where image compression has to be... [more] |
ITS2016-43 IE2016-101 pp.7-12 |
SIS |
2016-12-08 10:40 |
Hiroshima |
Hiroshima City Univ. |
An Encryption-then-Compression System Allowing the Use of Arbitrary Chroma Interpolation Methods for JPEG Compression Kenta Kurihara (Tokyo Metro. Univ), Hiroyuki Kobayashi (TMCIT), Hitoshi Kiya (Tokyo Metro. Univ) SIS2016-28 |
Conventional transmission systems of image contents are based on Compression-then-Encryption systems, where image encryp... [more] |
SIS2016-28 pp.1-6 |
IE, CS, IPSJ-AVM, ITE-BCT [detail] |
2016-12-09 15:15 |
Ishikawa |
|
Extension of Jigsaw Puzzle Solvers and Its Attack on Permutation-Based Image Encryption Schemes Tatsuya Chuman, Kenta Kurihara, Sayaka Shiota, Hitoshi Kiya (Tokyo Metro. Univ.) CS2016-63 IE2016-99 |
Block-based scrambled image encryption schemes have superior features that are compressible and against noises to number... [more] |
CS2016-63 IE2016-99 pp.115-120 |
EA, EMM |
2016-11-17 16:40 |
Oita |
Compal Hall (Oita) |
An Extension of Block-Permutation-Based-Encryption Schemes for Lossless Image Compression Takeshi Ogasawara, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (TMU) EA2016-55 EMM2016-61 |
This paper proposes a permutation-based image encryption scheme for lossless coded images. The conventional scheme gener... [more] |
EA2016-55 EMM2016-61 pp.43-48 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-14 14:40 |
Yamaguchi |
|
Safety Evaluation for Permutation-Based Image Encryption Schemes against Jigsaw Puzzle Solvers Tatsuya Chuman, Kenta Kurihara, Hitoshi Kiya (Tokyo Metro. Univ.) ISEC2016-17 SITE2016-11 ICSS2016-17 EMM2016-25 |
Block-based scrambled image encryption schemes have superior features that are compressible and against noises to number... [more] |
ISEC2016-17 SITE2016-11 ICSS2016-17 EMM2016-25 pp.23-28 |
ITS, IE, ITE-AIT, ITE-HI, ITE-ME, ITE-MMS, ITE-CE [detail] |
2016-02-22 09:45 |
Hokkaido |
Hokkaido Univ. |
An Image Encryption Scheme Allowing Tone Map Operations and Its Application to JPEG XT Standard Kenta Kurihara, Hitoshi Kiya (Tokyo Metro. Univ.) ITS2015-58 IE2015-100 |
Conventional secure image transmission systems are based on Compression-then-Encryption systems, where image encryption ... [more] |
ITS2015-58 IE2015-100 pp.11-16 |
IE, ITE-ME, IPSJ-AVM, ITE-CE [detail] |
2015-08-03 13:00 |
Tokyo |
Tokyo Metropolitan Univ. |
An Image Encryption Method Allowing Lossless Compression Kenta Kurihara, Sayaka Shiota, Hitoshi Kiya (Tokyo Metro. Univ.) IE2015-49 |
Conventional secure image transmission is based on a Compression-then-Encryption system where image encryption has to be... [more] |
IE2015-49 pp.19-24 |
IT, ISEC, WBS |
2010-03-05 14:40 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
An effective attack against a chaos-based image scrambling encryption Liang Zhao, Kouichi Sakurai (Kyushu Univ.) IT2009-112 ISEC2009-120 WBS2009-91 |
An image encryption algorithm which makes use of chaos system for shuffling the pixel bits was proposed in [G.-D. Ye, Pa... [more] |
IT2009-112 ISEC2009-120 WBS2009-91 pp.269-274 |