default search action
Shoko Imaizumi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i7]Hiroto Sawada, Shoko Imaizumi, Hitoshi Kiya:
Enhancing Security Using Random Binary Weights in Privacy-Preserving Federated Learning. CoRR abs/2409.19988 (2024) - 2023
- [j12]Genki Hamano, Shoko Imaizumi, Hitoshi Kiya:
Effects of JPEG Compression on Vision Transformer Image Classification for Encryption-then-Compression Images. Sensors 23(7): 3400 (2023) - [c33]Daichi Nakaya, Shoko Imaizumi:
A Reversible Image Processing Method for Color Tone Control Using Data Hiding. APSIPA ASC 2023: 599-604 - [c32]Kosuke Abe, Shoko Imaizumi, Hitoshi Kiya:
Effects of Data Hiding on Vision Transformer Classification for Encryption-then-Compression Images. GCCE 2023: 787-789 - 2022
- [j11]Yuki Sugimoto, Shoko Imaizumi:
An Extension of Reversible Image Enhancement Processing for Saturation and Brightness Contrast. J. Imaging 8(2): 27 (2022) - [j10]Eichi Arai, Shoko Imaizumi:
High-Capacity Reversible Data Hiding in Encrypted Images with Flexible Restoration. J. Imaging 8(7): 176 (2022) - [j9]Hitoshi Kiya, Teru Nagamori, Shoko Imaizumi, Sayaka Shiota:
Privacy-Preserving Semantic Segmentation Using Vision Transformer. J. Imaging 8(9): 233 (2022) - [c31]Noa Kikuchi, Shoko Imaizumi:
A Reversible Data Hiding Method in Compressible Encrypted Domain for OpenEXR Images. GCCE 2022: 38-40 - [c30]Eichi Arai, Shoko Imaizumi:
An Extension of High-Capacity Reversible Data Hiding in Encrypted Images with Bit-Plane Partition. ICCE-TW 2022: 459-460 - [c29]Yuki Sugimoto, Shoko Imaizumi:
A Reversible Image Processing Method with Selectable Functions. ISPACS 2022: 1-4 - [i6]Hitoshi Kiya, AprilPyone MaungMaung, Yuma Kinoshita, Shoko Imaizumi, Sayaka Shiota:
An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications. CoRR abs/2201.11006 (2022) - 2021
- [j8]Ryota Motomura, Shoko Imaizumi, Hitoshi Kiya:
A Reversible Data Hiding Method in Encrypted Images for Controlling Trade-Off between Hiding Capacity and Compression Efficiency. J. Imaging 7(12): 268 (2021) - [c28]Ryota Motomura, Shoko Imaizumi, Hitoshi Kiya:
A Flexible Reversible Data Hiding Method in Compressible Encrypted Images. APSIPA ASC 2021: 1794-1799 - [c27]Minagi Ueda, Shoko Imaizumi, KokSheik Wong:
An Extended Reversible Data Hiding Method for HDR Images Using Edge Estimation. APSIPA ASC 2021: 1821-1827 - [c26]Yuto Matsuoka, Shoko Imaizumi, Takahiko Horiuchi:
A Perception-Based Collation Method Using CNN for Color Halftone Images. GCCE 2021: 91-94 - [c25]Eichi Arai, Shoko Imaizumi:
An Efficient Data Hiding Method Using Correlation Coefficients among Index Colors for Palette-Based Images. GCCE 2021: 407-410 - [c24]Ryoichi Hirasawa, Shoko Imaizumi, Hitoshi Kiya:
An MSB Prediction-Based Method with Marker Bits for Reversible Data Hiding in Encrypted Images. LifeTech 2021: 48-50 - [c23]Yuki Sugimoto, Shoko Imaizumi:
A Lossless Image Processing Method with Contrast and Saturation Enhancement. MMSP 2021: 1-6 - [i5]Minagi Ueda, Shoko Imaizumi:
Reversible Data Hiding Associated with Digital Halftoning That Allows Printing with Special Color Ink by Using Single Color Layer. CoRR abs/2103.02453 (2021) - [i4]Kotoko Hiraoka, Kensuke Fukumoto, Takashi Yamazoe, Norimichi Tsumura, Satoshi Kaneko, Wataru Arai, Shoko Imaizumi:
Application of Reversible Data Hiding for Printing with Special Color Inks to Preserve Compatibility with Normal Printing. CoRR abs/2103.02777 (2021) - 2020
- [j7]Shoko Imaizumi, Yusuke Izawa, Ryoichi Hirasawa, Hitoshi Kiya:
A Reversible Data Hiding Method in Compressible Encrypted Images. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(12): 1579-1588 (2020) - [c22]Ryoichi Hirasawa, Shoko Imaizumi, Hitoshi Kiya:
Flexible Data Hiding and Extraction in EtC Images. APSIPA 2020: 1347-1351 - [c21]Ren Nakamura, Takahiko Horiuchi, Midori Tanaka, Shoko Imaizumi, Tomoyuki Takanashi:
Perceptual Collation Method for Multi-Level Color Halftone Image Based on Visual Characteristics. CVCS 2020 - [i3]Shoko Imaizumi, Hitoshi Kiya:
A Block-Permutation-Based Encryption Scheme with Independent Processing of RGB Components. CoRR abs/2011.08964 (2020) - [i2]Shoko Imaizumi, Yusuke Izawa, Ryoichi Hirasawa, Hitoshi Kiya:
A Reversible Data Hiding Method in Compressible Encrypted Images. CoRR abs/2011.08969 (2020)
2010 – 2019
- 2019
- [c20]Hinata Seguchi, Shoko Imaizumi:
A Reversible Data Hiding Scheme Using Difference Values Based on Similarity between Adjacent Pixels. GCCE 2019: 1107-1110 - [c19]Minagi Ueda, Shoko Imaizumi:
A Reversible Data Hiding Scheme for Printing with Special Color Inks Using Digital Halftoning. GCCE 2019: 1135-1138 - 2018
- [j6]Shoko Imaizumi, Hitoshi Kiya:
A Block-Permutation-Based Encryption Scheme with Independent Processing of RGB Components. IEICE Trans. Inf. Syst. 101-D(12): 3150-3157 (2018) - [j5]Anu Aryal, Shoko Imaizumi, Takahiko Horiuchi, Hitoshi Kiya:
Integrated Model of Image Protection Techniques. J. Imaging 4(1): 1 (2018) - [c18]Yusuke Izawa, Shoko Imaizumi, Hitoshi Kiya:
A Block-Permutation-Based Image Encryption Allowing Hierarchical Decryption. APSIPA 2018: 1106-1112 - [c17]Warit Sirichotedumrong, Tatsuya Chuman, Shoko Imaizumi, Hitoshi Kiya:
Grayscale-Based Block Scrambling Image Encryption for Social Networking Services. ICME 2018: 1-6 - [i1]Warit Sirichotedumrong, Tatsuya Chuman, Shoko Imaizumi, Hitoshi Kiya:
Grayscale-based Block Scrambling Image Encryption for Social Networking Services. CoRR abs/1806.03787 (2018) - 2017
- [j4]Kenta Kurihara, Shoko Imaizumi, Sayaka Shiota, Hitoshi Kiya:
An Encryption-then-Compression System for Lossless Image Compression Standards. IEICE Trans. Inf. Syst. 100-D(1): 52-56 (2017) - [c16]Anu Aryal, Shoko Imaizumi, Takahiko Horiuchi, Hitoshi Kiya:
Integrated algorithm for block-permutation-based encryption with reversible data hiding. APSIPA 2017: 203-208 - [c15]Shoko Imaizumi, Takeshi Ogasawara, Hitoshi Kiya:
Block-Permutation-Based Encryption Scheme with Enhanced Color Scrambling. SCIA (1) 2017: 562-573 - 2015
- [j3]Kenta Kurihara, Masanori Kikuchi, Shoko Imaizumi, Sayaka Shiota, Hitoshi Kiya:
An Encryption-then-Compression System for JPEG/Motion JPEG Standard. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(11): 2238-2245 (2015) - [c14]Anu Aryal, Kazuma Motegi, Shoko Imaizumi, Naokazu Aoki:
Improvement of Multi-bit Information Embedding Algorithm for Palette-Based Images. ISC 2015: 511-523 - [c13]Takeshi Ogasawara, Shoko Imaizumi, Naokazu Aoki:
Scalable Tamper Detection and Localization Scheme for JPEG2000 Codestreams. PCM (2) 2015: 340-349 - [c12]Hiroyuki Kobayashi, Shoko Imaizumi, Hitoshi Kiya:
A Robust Identification Scheme for JPEG XR Images with Various Compression Ratios. PSIVT 2015: 38-50 - 2014
- [c11]Anu Aryal, Shoko Imaizumi, Naokazu Aoki:
Hierarchical scrambling scheme for palette-based images. ISPACS 2014: 65-70 - 2013
- [c10]Shoko Imaizumi:
A collusion-free key assignment scheme for hierarchical access control using recursive hash chains. ISCAS 2013: 445-448 - [c9]Shoko Imaizumi, Kei Ozawa:
Multibit Embedding Algorithm for Steganography of Palette-Based Images. PSIVT 2013: 99-110 - 2012
- [c8]Shoko Imaizumi, Naokazu Aoki, Hiroyuki Kobayashi, Hitoshi Kiya:
Hierarchical Key Assignment Scheme for Multimedia Access Control with Modified Hash Chain. IIH-MSP 2012: 293-296 - [c7]Yuto Tobe, Shoko Imaizumi, Naokazu Aoki, Hiroyuki Kobayashi:
A visible data hiding scheme for printed color images. ISPACS 2012: 653-657 - 2011
- [c6]Shoko Imaizumi, Masaaki Fujiyoshi, Hitoshi Kiya, Naokazu Aoki, Hiroyuki Kobayashi:
A Key Derivation Scheme for Hierarchical Access Control to JPEG 2000 Coded Images. PSIVT (2) 2011: 180-191 - 2010
- [j2]Shoko Imaizumi, Masaaki Fujiyoshi, Hitoshi Kiya:
An efficient access control method for composite multimedia content. IEICE Electron. Express 7(20): 1534-1538 (2010)
2000 – 2009
- 2009
- [c5]Shoko Imaizumi, Masaaki Fujiyoshi, Hitoshi Kiya:
Efficient Collusion Attack-free Access Control for Multidimensionally Hierarchical Scalability Content. ISCAS 2009: 505-508 - 2008
- [c4]Noriaki Hashimoto, Shoko Imaizumi, Masaaki Fujiyoshi, Hitoshi Kiya:
Hierarchical encryption using short encryption keys for scalable access control of JPEG 2000 coded images. ICIP 2008: 3116-3119 - 2007
- [j1]Masaaki Fujiyoshi, Shoko Imaizumi, Hitoshi Kiya:
Encryption of Composite Multimedia Contents for Access Control. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(3): 590-596 (2007) - [c3]Shoko Imaizumi, Masaaki Fujiyoshi, Yoshito Abe, Hitoshi Kiya:
Collusion Attack-Resilient Hierarchical Encryption of JPEG 2000 Codestreams with Scalable Access Control. ICIP (2) 2007: 137-140 - 2005
- [c2]Shoko Imaizumi, Osamu Watanabe, Masaaki Fujiyoshi, Hitoshi Kiya:
Generalized hierarchical encryption of JPEG 2000 codestreams for access control. ICIP (2) 2005: 1094-1097 - 2003
- [c1]Hitoshi Kiya, Shoko Imaizumi, Osamu Watanabe:
Partial-scrambling of images encoded using JPEG2000 without generating marker codes. ICIP (3) 2003: 205-208
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-21 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint