The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Hitoshi Kiya: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Masaaki Fujiyoshi, Hitoshi Kiya
    An image-quality guaranteed method for quantization-based watermarking using a dwt. [Citation Graph (0, 0)][DBLP]
    ICIP, 2004, pp:2629-2632 [Conf]
  2. Hitoshi Kiya, Shoko Imaizumi, Osamu Watanabe
    Partial-scrambling of images encoded using JPEG2000 without generating marker codes. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 2003, pp:205-208 [Conf]
  3. Hitoshi Kiya, Yoshihiro Noguchi, Ayuko Takagi, Hiroyuki Kobayashi
    A Method of Inserting Binary Data Into Mpeg Bitstreams for Video Index Labeling. [Citation Graph (0, 0)][DBLP]
    ICIP (4), 1999, pp:285-289 [Conf]
  4. Masayuki Kurosaki, Khairul Munadi, Hitoshi Kiya
    Error correction using data hiding technique for JPEG2000 images. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 2003, pp:473-476 [Conf]
  5. Khairul Munadi, Masayuki Kurosaki, Kiyoshi Nishikawa, Hitoshi Kiya
    Efficient packet loss protection for JPEG2000 images enabling backward compatibility with a standard decoder. [Citation Graph (0, 0)][DBLP]
    ICIP, 2004, pp:833-836 [Conf]
  6. Yoshihiro Noguchi, Jun Furukawa, Hitoshi Kiya
    A Fast Full Search Block Matching Algorithm for Mpeg-4 Video. [Citation Graph (0, 0)][DBLP]
    ICIP (1), 1999, pp:61-65 [Conf]
  7. Yoshihiro Noguchi, Hiroyuki Kobayashi, Hitoshi Kiya
    A Method of Extracting Embedded Binary Data from JPEG Bitstreams Using Standard JPEG Decoder. [Citation Graph (0, 0)][DBLP]
    ICIP, 2000, pp:- [Conf]
  8. Ayuko Takagi, Shogo Muramatsu, Hitoshi Kiya
    Motion Estimation With Power Scalability and its VHDL Model. [Citation Graph (0, 0)][DBLP]
    ICIP, 2000, pp:- [Conf]
  9. Osamu Watanabe, Akiko Nakazaki, Hitoshi Kiya
    A fast image-scramble method using public-key encryption allowing backward compatibility with jpeg2000. [Citation Graph (0, 0)][DBLP]
    ICIP, 2004, pp:3435-3438 [Conf]
  10. Masaaki Fujiyoshi, Yusuke Seki, Hiroyuki Kobayashi, Hitoshi Kiya
    Modulo arithmetic-based image watermarking and its theoretical analysis of image-quality. [Citation Graph (0, 0)][DBLP]
    ICIP (1), 2005, pp:969-972 [Conf]
  11. Shoko Imaizumi, Osamu Watanabe, Masaaki Fujiyoshi, Hitoshi Kiya
    Generalized hierarchical encryption of JPEG 2000 codestreams for access control. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 2005, pp:1094-1097 [Conf]
  12. Khairul Munadi, Masayuki Kurosaki, Kiyoshi Nishikawa, Hitoshi Kiya
    Error protection for JPEG2000 encoded images and its evaluation over OFDM channel. [Citation Graph (0, 0)][DBLP]
    ISCAS (2), 2003, pp:432-435 [Conf]
  13. Shogo Muramatsu, Hitoshi Kiya
    An Extended Overlap-Add Method and -Save Method for Sampling Rate Conversion. [Citation Graph (0, 0)][DBLP]
    ISCAS, 1994, pp:313-316 [Conf]
  14. Shogo Muramatsu, Hitoshi Kiya
    Multidimensional Parallel Processing Methods for Rational Sampling Lattice Alteration. [Citation Graph (0, 0)][DBLP]
    ISCAS, 1995, pp:756-759 [Conf]
  15. Kiyoshi Nishikawa, Hitoshi Kiya
    A Technique to Improve Convergence Speed of the LMS Algorithm. [Citation Graph (0, 0)][DBLP]
    ISCAS, 1994, pp:405-408 [Conf]
  16. Yusuke Seki, Hiroyuki Kobayashi, Masaaki Fujiyoshi, Hitoshi Kiya
    Quantization-based image steganography without data hiding position memorization. [Citation Graph (0, 0)][DBLP]
    ISCAS (5), 2005, pp:4987-4990 [Conf]
  17. Osamu Watanabe, Hitoshi Kiya
    ROI-based scalability for progressive transmission in JPEG2000 coding. [Citation Graph (0, 0)][DBLP]
    ISCAS (2), 2003, pp:416-419 [Conf]
  18. Osamu Watanabe, Akiko Nakazaki, Hitoshi Kiya
    A scalable encryption method allowing backward compatibility with JPEG2000 images. [Citation Graph (0, 0)][DBLP]
    ISCAS (6), 2005, pp:6324-6327 [Conf]
  19. Ayuko Takagi, Kiyoshi Nishikawa, Hitoshi Kiya
    Low-bit motion estimation with edge enhanced images for lowpower MPEG encoder. [Citation Graph (0, 0)][DBLP]
    ISCAS (2), 2001, pp:505-508 [Conf]
  20. Hitoshi Kiya, Yoshihiro Noguchi, Ayuko Takagi, H. Kobayshi
    A method of inserting binary data into MPEG bitstreams. [Citation Graph (0, 0)][DBLP]
    ISCAS (4), 1999, pp:471-474 [Conf]
  21. Hiroyuki Kobayashi, Yoshihiro Noguchi, Hitoshi Kiya
    A Method of Embedding Binary Data into JPEG Bitstreams. [Citation Graph (0, 0)][DBLP]
    Systems and Computers in Japan, 2002, v:33, n:1, pp:18-26 [Journal]
  22. Takashi Tachibana, Masaaki Fujiyoshi, Hitoshi Kiya
    A digital watermarking scheme that preserves image quality and is applicable to watermark sequences from a variety of distributions. [Citation Graph (0, 0)][DBLP]
    Systems and Computers in Japan, 2006, v:37, n:8, pp:90-100 [Journal]
  23. Hitoshi Kiya, Kiyoshi Nishikawa, Masahiro Iwahashi
    A development of symmetric extension method for subband image coding. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 1994, v:3, n:1, pp:78-81 [Journal]
  24. Masaaki Fujiyoshi, Wataru Saitou, Osamu Watanabe, Hitoshi Kiya
    Hierarchical Encryption of Multimedia Contents for Access Control. [Citation Graph (0, 0)][DBLP]
    ICIP, 2006, pp:1977-1980 [Conf]

  25. Fast Method for Joint Retrieval and Identification of JPEG Coded Images Based on DCT Sign. [Citation Graph (, )][DBLP]


  26. Collusion Attack-Resilient Hierarchical Encryption of JPEG 2000 Codestreams with Scalable Access Control. [Citation Graph (, )][DBLP]


  27. A Location-Map Free Reversible Data Hiding Method using Block-Based Single Parameter. [Citation Graph (, )][DBLP]


  28. Codestream Domain Scrambling of Moving Objects Based on DCT Sign-only Correlation for Motion JPEG Movies. [Citation Graph (, )][DBLP]


  29. Image Tamper Detection using Mathematical Morphology. [Citation Graph (, )][DBLP]


  30. A scrambling method for Motion JPEG videos enabling moving objects detection from scrambled videos. [Citation Graph (, )][DBLP]


  31. A new class of image registration for guaranteeing secure data management. [Citation Graph (, )][DBLP]


  32. Hierarchical encryption using short encryption keys for scalable access control of JPEG 2000 coded images. [Citation Graph (, )][DBLP]


  33. Non separable 2D factorization of separable 2D DWT for lossless image coding. [Citation Graph (, )][DBLP]


  34. Identification of JPEG 2000 images in encrypted domain for digital cinema. [Citation Graph (, )][DBLP]


  35. A new structure of lifting wavelet for reducing rounding error. [Citation Graph (, )][DBLP]


  36. Accurate Identifying Method of JPEG2000 Images for Digital Cinema. [Citation Graph (, )][DBLP]


  37. A Moving Object Detection Scheme in Codestream Domain for Motion JPEG Encoded Movies. [Citation Graph (, )][DBLP]


  38. Codeblock-Based Concealment Scheme for JPEG2000 Images in Lossy Packet Networks. [Citation Graph (, )][DBLP]


  39. DCT Sign Only Correlation and Its Application to Image Registration. [Citation Graph (, )][DBLP]


  40. An extension of ROI-based scalability for progressive transmission in JPEG2000 coding. [Citation Graph (, )][DBLP]


  41. Error concealment using layer structure for JPEG2000 images. [Citation Graph (, )][DBLP]


  42. Reversible Information Hiding Considering Hierarchical Access Control. [Citation Graph (, )][DBLP]


  43. A new class of lifting wavelet transform for guaranteeing losslessness of specific signals. [Citation Graph (, )][DBLP]


  44. Multiple-peak model fitting function for DCT sign phase correlation with non-integer shift precision. [Citation Graph (, )][DBLP]


  45. Phase scrambling for blind image matching. [Citation Graph (, )][DBLP]


  46. DCT Sign-Only Correlation with Application to Image Matching and the Relationship with Phase-Only Correlation. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002