default search action
Masaaki Fujiyoshi
Person information
- affiliation: Tokyo Metropolitan University, Japan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j20]Masaaki Fujiyoshi, Ruifeng Li, Hitoshi Kiya:
A Scheme of Reversible Data Hiding for the Encryption-Then-Compression System. IEICE Trans. Inf. Syst. 104-D(1): 43-50 (2021)
2010 – 2019
- 2019
- [c47]Yasunobu Sumikawa, Masaaki Fujiyoshi, Hisashi Hatakeyama, Masahiro Nagai:
Supporting Creation of FAQ Dataset for E-Learning Chatbot. KES-IDT (1) 2019: 3-13 - 2017
- [c46]Wannida Sae-Tang, Masaaki Fujiyoshi, Hitoshi Kiya:
Encryption-then-Compression-Based Copyright- and Privacy-Protected Image Trading System. ICAIP 2017: 66-71 - [c45]Masaaki Fujiyoshi, Hitoshi Kiya:
A Blind Reversible Data Hiding Method for High Dynamic Range Images Taking Advantage of Sparse Histogram. IWDW 2017: 347-361 - 2015
- [c44]Masaaki Fujiyoshi, Hitoshi Kiya:
A near-lossless image compression system with data hiding capability. APSIPA 2015: 1280-1286 - [c43]Masaaki Fujiyoshi, Hitoshi Kiya:
Histogram-Based Near-Lossless Data Hiding and Its Application to Image Compression. PCM (2) 2015: 225-235 - 2014
- [j19]Shenchuan Liu, Wannida Sae-Tang, Masaaki Fujiyoshi, Hitoshi Kiya:
An Efficient Compression of Amplitude-Only Images for the Image Trading System. IEICE Trans. Inf. Syst. 97-D(2): 378-379 (2014) - [j18]Wannida Sae-Tang, Shenchuan Liu, Masaaki Fujiyoshi, Hitoshi Kiya:
A Copyright- and Privacy-Protected Image Trading System Using Fingerprinting in Discrete Wavelet Domain with JPEG 2000. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(11): 2107-2113 (2014) - [j17]Taku Odaka, Wannida Sae-Tang, Masaaki Fujiyoshi, Hiroyuki Kobayashi, Masahiro Iwahashi, Hitoshi Kiya:
An Efficient Lossless Compression Method Using Histogram Packing for HDR Images in OpenEXR Format. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(11): 2181-2183 (2014) - [c42]Yuichi Muraki, Masakazu Furukawa, Masaaki Fujiyoshi, Yoshihide Tonomura, Hitoshi Kiya:
A compressible template protection scheme for face recognition based on sparse representation. EUSIPCO 2014: 1647-1651 - [c41]Shenchuan Liu, Masaaki Fujiyoshi, Hitoshi Kiya:
A cheat preventing method with efficient pixel expansion for Naor-Shamir's visual cryptography. ICIP 2014: 5527-5531 - [c40]Wannida Sae-Tang, Masaaki Fujiyoshi, Hitoshi Kiya:
Effects of Random Sign Encryption in JPEG 2000-Based Data Hiding. IIH-MSP 2014: 516-519 - [c39]Masaaki Fujiyoshi:
A near-lossless data hiding method with an improved quantizer. ISCAS 2014: 2289-2292 - [c38]Akira Uchida, Masaaki Fujiyoshi, Sayaka Shiota, Hitoshi Kiya:
Image invisibility assessment for visually encrypted images. ISPACS 2014: 71-75 - [c37]Wannida Sae-Tang, Masaaki Fujiyoshi, Hitoshi Kiya:
Efficient data hiding in encrypted JPEG 2000 codestreams. ISPACS 2014: 121-126 - 2013
- [j16]Shenchuan Liu, Masaaki Fujiyoshi, Hitoshi Kiya:
An Image Trading System Using Amplitude-Only Images for Privacy- and Copyright-Protection. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(6): 1245-1252 (2013) - [j15]Wannida Sae-Tang, Masaaki Fujiyoshi, Hitoshi Kiya:
A Generation Method of Amplitude-Only Images with Low Intensity Ranges. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(6): 1323-1330 (2013) - [j14]Shenchuan Liu, Masaaki Fujiyoshi, Hitoshi Kiya:
A Cheat-Prevention Visual Secret Sharing Scheme with Efficient Pixel Expansion. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(11): 2134-2141 (2013) - [c36]Masaaki Fujiyoshi:
A blind lossless information embedding scheme based on generalized histogram shifting. APSIPA 2013: 1-4 - [c35]Masakazu Furukawa, Yuichi Muraki, Masaaki Fujiyoshi, Hitoshi Kiya:
A secure face recognition scheme using noisy images based on kernel sparse representation. APSIPA 2013: 1-4 - [c34]Masaaki Fujiyoshi:
A separable lossless data embedding scheme in encrypted images considering hierarchical privilege. EUSIPCO 2013: 1-5 - [c33]Masaaki Fujiyoshi:
Separable reversible data hiding in encrypted images with histogram permutation. ICME Workshops 2013: 1-4 - [c32]Fitri Arnia, Khairul Munadi, Roslidar, Masaaki Fujiyoshi, Hitoshi Kiya:
Improved Iris matching technique using reduced sized of ordinal measure of DCT coefficients. ISCE 2013: 287-288 - [c31]Khairul Munadi, Mohd. Syaryadhi, Fitri Arnia, Masaaki Fujiyoshi, Hitoshi Kiya:
Secure online image trading scheme using DCT coefficients and moment invariants feature. ISCE 2013: 291-292 - [c30]Masaaki Fujiyoshi:
A dual permutation-based separable reversible information hiding scheme in encrypted images. ISCE 2013: 293-294 - [c29]Masanori Kikuchi, Masaaki Fujiyoshi, Hitoshi Kiya:
A new color QR code forward compatible with the standard QR code decoder. ISPACS 2013: 26-31 - [c28]Wannida Sae-Tang, Masaaki Fujiyoshi, Hitoshi Kiya:
An image trading system with JPEG 2000 using fingerprinting in visually protected domain. ISPACS 2013: 32-37 - [c27]Shenchuan Liu, Masaaki Fujiyoshi, Hitoshi Kiya:
A Cheat-Prevention Visual Secret Sharing Scheme with Minimum Pixel Expansion. IWDW 2013: 362-375 - [c26]Masaaki Fujiyoshi:
Generalized Histogram Shifting-Based Blind Reversible Data Hiding with Balanced and Guarded Double Side Modification. IWDW 2013: 488-502 - 2012
- [c25]Masaaki Fujiyoshi, Hitoshi Kiya:
Generalized histogram shifting-based reversible data hiding with an adaptive binary-to-q-ary converter. APSIPA 2012: 1-4 - [c24]Masaaki Fujiyoshi, Hitoshi Kiya:
A visually-lossless data hiding method based on histogram modification. ISCAS 2012: 1692-1695 - [c23]Masaaki Fujiyoshi:
A Histogram shifting-based blind reversible data hiding method with a histogram peak estimator. ISCIT 2012: 313-318 - [c22]Wannida Sae-Tang, Mika Sugiyama, Masaaki Fujiyoshi, Hitoshi Kiya:
Non-separable weighted median-cut quantization for images with sparse color histogram. ISPACS 2012: 473-478 - 2011
- [c21]Shenchuan Liu, Masaaki Fujiyoshi, Hitoshi Kiya:
A leakage suppressed two-level security visual secret sharing scheme. ISPACS 2011: 1-6 - [c20]Shoko Imaizumi, Masaaki Fujiyoshi, Hitoshi Kiya, Naokazu Aoki, Hiroyuki Kobayashi:
A Key Derivation Scheme for Hierarchical Access Control to JPEG 2000 Coded Images. PSIVT (2) 2011: 180-191 - 2010
- [j13]Shoko Imaizumi, Masaaki Fujiyoshi, Hitoshi Kiya:
An efficient access control method for composite multimedia content. IEICE Electron. Express 7(20): 1534-1538 (2010) - [j12]Masaaki Fujiyoshi, Takahiro Tsuneyoshi, Hitoshi Kiya:
A parameter memorization-free lossless data hiding method with flexible payload size. IEICE Electron. Express 7(23): 1702-1708 (2010) - [c19]Masaaki Fujiyoshi, Yuji Tachizaki, Hitoshi Kiya:
A Moving Object Detection Scheme in Codestream Domain for Motion JPEG Encoded Movies. PCM (2) 2010: 595-606
2000 – 2009
- 2009
- [j11]Michihiko Ono, Seungwu Han, Masaaki Fujiyoshi, Hitoshi Kiya:
A location map-free reversible data hiding method for specific area embedding. IEICE Electron. Express 6(8): 483-489 (2009) - [j10]Seungwu Han, Masaaki Fujiyoshi, Hitoshi Kiya:
A Reversible Image Authentication Method without Memorization of Hiding Parameters. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(10): 2572-2579 (2009) - [c18]Masaaki Fujiyoshi, Seungwu Han, Hitoshi Kiya:
Reversible Information Hiding Considering Hierarchical Access Control. IAS 2009: 209-212 - [c17]Shoko Imaizumi, Masaaki Fujiyoshi, Hitoshi Kiya:
Efficient Collusion Attack-free Access Control for Multidimensionally Hierarchical Scalability Content. ISCAS 2009: 505-508 - 2008
- [j9]Seungwu Han, Masaaki Fujiyoshi, Hitoshi Kiya:
An Efficient Reversible Image Authentication Method. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(8): 1907-1914 (2008) - [c16]Seungwu Han, Masaaki Fujiyoshi, Hitoshi Kiya:
A location map-free visible and reversible watermarking method with authentication ability. APCCAS 2008: 1584-1587 - [c15]Masaaki Fujiyoshi, Keijiro Kuroiwa, Hitoshi Kiya:
A scrambling method for Motion JPEG videos enabling moving objects detection from scrambled videos. ICIP 2008: 773-776 - [c14]Noriaki Hashimoto, Shoko Imaizumi, Masaaki Fujiyoshi, Hitoshi Kiya:
Hierarchical encryption using short encryption keys for scalable access control of JPEG 2000 coded images. ICIP 2008: 3116-3119 - 2007
- [j8]Khairul Munadi, Masaaki Fujiyoshi, Kiyoshi Nishikawa, Hitoshi Kiya:
Codeblock-Based Error Concealment for JPEG2000 Coded Image Transmission over RTP. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(2): 429-438 (2007) - [j7]Masaaki Fujiyoshi, Shoko Imaizumi, Hitoshi Kiya:
Encryption of Composite Multimedia Contents for Access Control. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(3): 590-596 (2007) - [j6]Hong Lin Jin, Masaaki Fujiyoshi, Hitoshi Kiya:
Lossless Data Hiding in the Spatial Domain for High Quality Images. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(4): 771-777 (2007) - [j5]Fitri Arnia, Ikue Iizuka, Masaaki Fujiyoshi, Hitoshi Kiya:
DCT Sign-Based Similarity Measure for JPEG Image Retrieval. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(9): 1976-1985 (2007) - [c13]Mirei Kihara, Masaaki Fujiyoshi, Qing Tao Wan, Hitoshi Kiya:
Image Tamper Detection using Mathematical Morphology. ICIP (6) 2007: 101-104 - [c12]Shoko Imaizumi, Masaaki Fujiyoshi, Yoshito Abe, Hitoshi Kiya:
Collusion Attack-Resilient Hierarchical Encryption of JPEG 2000 Codestreams with Scalable Access Control. ICIP (2) 2007: 137-140 - [c11]Keijiro Kuroiwa, Masaaki Fujiyoshi, Hitoshi Kiya:
Codestream Domain Scrambling of Moving Objects Based on DCT Sign-only Correlation for Motion JPEG Movies. ICIP (5) 2007: 157-160 - [c10]Fitri Arnia, Ikue Iizuka, Masaaki Fujiyoshi, Hitoshi Kiya:
Fast Method for Joint Retrieval and Identification of JPEG Coded Images Based on DCT Sign. ICIP (2) 2007: 229-232 - [c9]Masaaki Fujiyoshi, Shuji Sato, Hong Lin Jin, Hitoshi Kiya:
A Location-Map Free Reversible Data Hiding Method using Block-Based Single Parameter. ICIP (3) 2007: 257-260 - 2006
- [j4]Fitri Arnia, Ikue Iizuka, Masaaki Fujiyoshi, Hitoshi Kiya:
Fast Image Identification Methods for JPEG Images with Different Compression Ratios. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(6): 1585-1593 (2006) - [j3]Takashi Tachibana, Masaaki Fujiyoshi, Hitoshi Kiya:
A digital watermarking scheme that preserves image quality and is applicable to watermark sequences from a variety of distributions. Syst. Comput. Jpn. 37(8): 90-100 (2006) - [c8]Fitri Arnia, Ikue Iizuka, Hiroyuki Kobayashi, Masaaki Fujiyoshi, Hitoshi Kiya:
DCT Sign Only Correlation and Its Application to Image Registration. APCCAS 2006: 466-469 - [c7]Khairul Munadi, Masaaki Fujiyoshi, Kiyoshi Nishikawa, Hitoshi Kiya:
Codeblock-Based Concealment Scheme for JPEG2000 Images in Lossy Packet Networks. APCCAS 2006: 1847-1850 - [c6]Fitri Arnia, Ikue Iizuka, Masaaki Fujiyoshi, Hitoshi Kiya:
Fast and Robust Identification Methods for JPEG Images with Various Compression Ratios. ICASSP (2) 2006: 397-400 - [c5]Masaaki Fujiyoshi, Wataru Saitou, Osamu Watanabe, Hitoshi Kiya:
Hierarchical Encryption of Multimedia Contents for Access Control. ICIP 2006: 1977-1980 - 2005
- [j2]Masaaki Fujiyoshi, Osamu Watanabe, Hitoshi Kiya:
A Method of Guaranteeing Image-Quality for Quantization-Based Watermarking Using a Nonorthogonal Transformation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(6): 1434-1442 (2005) - [c4]Masaaki Fujiyoshi, Yusuke Seki, Hiroyuki Kobayashi, Hitoshi Kiya:
Modulo arithmetic-based image watermarking and its theoretical analysis of image-quality. ICIP (1) 2005: 969-972 - [c3]Shoko Imaizumi, Osamu Watanabe, Masaaki Fujiyoshi, Hitoshi Kiya:
Generalized hierarchical encryption of JPEG 2000 codestreams for access control. ICIP (2) 2005: 1094-1097 - [c2]Yusuke Seki, Hiroyuki Kobayashi, Masaaki Fujiyoshi, Hitoshi Kiya:
Quantization-based image steganography without data hiding position memorization. ISCAS (5) 2005: 4987-4990 - 2004
- [c1]Masaaki Fujiyoshi, Hitoshi Kiya:
An image-quality guaranteed method for quantization-based watermarking using a dwt. ICIP 2004: 2629-2632 - 2002
- [j1]Masaaki Fujiyoshi, Takashi Tachibana, Hitoshi Kiya:
A Data Embedding Method Considering the Finite Word-Length for High Quality Images. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(12): 2830-2838 (2002)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint