The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Hiroshi Yoshiura: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Isao Echizen, Hiroshi Yoshiura, Yasuhiro Fujii, Satoru Tezuka
    Use of Motion Estimation to Improve Video Watermarking for MPEG Encoders. [Citation Graph (0, 0)][DBLP]
    IWDW, 2003, pp:184-199 [Conf]
  2. Isao Echizen, Yasuhiro Fujii, Takaaki Yamada, Satoru Tezuka, Hiroshi Yoshiura
    Improved Video Watermark Detection Using Statistically-Adaptive Accumulation. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:300-308 [Conf]
  3. Ryôichi Sasaki, Hiroshi Yoshiura, Shinji Itoh
    Combinatorial Optimization of Countermeasures against Illegal Copying. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2002, pp:128-144 [Conf]
  4. Hiroshi Yoshiura, Takaaki Shigematsu, Seiichi Susaki, Tsukasa Saitoh, Hisashi Toyoshima, Chikako Kurita, Satoru Tezuka, Ryôichi Sasaki
    Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks - A Practical Analysis. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:238-248 [Conf]
  5. Hiroshi Yoshiura
    Authentication Web-Based Virtual Shops Using Signature-Embedded Marks - A Practical Analysis (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:249-252 [Conf]
  6. Hiroshi Yoshiura
    A Multi-OS Approach to Trusted Computer Systems (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:115-118 [Conf]
  7. Hiroshi Yoshiura, Seiichi Susaki, Yasuhiko Nagai, Tsukasa Saitoh, Hisashi Toyoshima, Ryôichi Sasaki, Satoru Tezuka
    INTERNET-MARKs: Clear, Secure, and Portable Visual Marks for the Cyber Worlds. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:195-207 [Conf]
  8. Hiroshi Yoshiura, Kunihiko Miyazaki, Shinji Itoh, Kazuo Takaragi, Ryôichi Sasaki
    A Multi-OS Approach to Trusted Computer Systems. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:107-114 [Conf]
  9. Hiroshi Yoshiura, Ryôichi Sasaki, Kazuo Takaragi
    Secure Fingerprinting Using Public-Key Cryptography (Position Paper). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:83-89 [Conf]
  10. Hiroshi Yoshiura, Kunihiko Miyazaki, Shinji Itoh, Kazuo Takaragi, Ryôichi Sasaki
    Legally Authorized and Unauthorized Digital Evidence. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2002, pp:67-73 [Conf]
  11. Isao Echizen, Hiroshi Yoshiura, Yasuhiro Fujii, Takaaki Yamada, Satoru Tezuka
    Use of inferential statistics to estimate error probability of video watermarks. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:391-399 [Conf]
  12. Isao Echizen, Takaaki Yamada, Satoru Tezuka, Stephan Singh, Hiroshi Yoshiura
    Improved Video Verification Method Using Digital Watermarking. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:445-448 [Conf]
  13. Masanori Dainaka, Shinta Nakayama, Isao Echizen, Hiroshi Yoshiura
    Dual-Plane Watermarking for Color Pictures Immune to Rotation, Scale, Translation, and Random Bending. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:93-96 [Conf]
  14. Kunihiko Miyazaki, Mitsuru Iwamura, Tsutomu Matsumoto, Ryôichi Sasaki, Hiroshi Yoshiura, Satoru Tezuka, Hideki Imai
    Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:239-246 [Journal]
  15. Isao Echizen, Yasuhiro Fujii, Takaaki Yamada, Satoru Tezuka, Hiroshi Yoshiura
    Perceptually Adaptive Video Watermarking Using Motion Estimation. [Citation Graph (0, 0)][DBLP]
    Int. J. Image Graphics, 2005, v:5, n:1, pp:89-110 [Journal]

  16. Electronic Voting Scheme to Maintain Anonymity in Small-scale Election by Hiding the Number of Votes. [Citation Graph (, )][DBLP]


  17. New Approach to Quantification of Privacy on Social Network Sites. [Citation Graph (, )][DBLP]


  18. Development Concept for and Trial Application of a "Mulutiplex Risk Communicator". [Citation Graph (, )][DBLP]


  19. Correlation-based model of color picture watermarking against random geometric distortion. [Citation Graph (, )][DBLP]


  20. Evaluation and Improvement of Digital Watermarking Algorithm Based on Cryptographic Security Models. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002