If you made any changes in Pure these will be visible here soon.

Research Output 1982 2018

  • 54 Citations
  • 4 h-Index
  • 27 Article
  • 11 Conference contribution
2018

Borderless interface for user authentication method tolerant against multiple video-recording attacks

Hirakawa, Y., Kurihara, K. & Ohzeki, K., 2018 Aug 24, 2017 International Conference on Computer Systems, Electronics and Control, ICCSEC 2017. Institute of Electrical and Electronics Engineers Inc., p. 1144-1148 5 p. 8446913

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Video recording
Authentication
attack
recording
entry
2016
Face recognition
Authentication
Statistics
1 Citation (Scopus)

On the false rejection ratio of face recognition based on automatic detected feature points

Ohzeki, K., Takatsuka, M., Kajihara, M., Hirakawa, Y. & Sato, K., 2016 Apr 1, In : Pattern Recognition and Image Analysis. 26, 2, p. 379-384 6 p.

Research output: Contribution to journalArticle

Function evaluation
Face recognition
Compensation and Redress
2015

Minimum variance method to obtain the best shot in video for face recognition

Ohzeki, K., Aoyama, R. & Hirakawa, Y., 2015, Proceedings of the 2015 Federated Conference on Computer Science and Information Systems, FedCSIS 2015. Institute of Electrical and Electronics Engineers Inc., p. 869-874 6 p. 2015F398

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Face recognition
2014
3 Citations (Scopus)

Authentication system using encrypted discrete biometrics data

Ohzeki, K., Wei, Y., Kajihara, M., Takatsuka, M., Hirakawa, Y. & Sugimoto, T., 2014, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 8564 LNCS. p. 210-211 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8564 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Biometrics
Authentication
Servers
Analog to digital conversion
1 Citation (Scopus)

Robust watermark against double attacks of compression and cropping

Takatsuka, M., Kajihara, M., Hirakawa, Y. & Ohzeki, K., 2014 Feb 3, 2014 IEEE 3rd Global Conference on Consumer Electronics, GCCE 2014. Institute of Electrical and Electronics Engineers Inc., p. 200-201 2 p. 7031337

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Experiments

Robust watermarking method by systematic block diffusion using discrete cosine transform

Ohzeki, K., Bannai, K., Wei, Y. Y., Hirakawa, Y. & Sato, K., 2014, Proceedings of the 11th Australian Digital Forensics Conference, ADF 2013. Edith Cowan University, p. 112-121 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Discrete cosine transforms
Watermarking
Pixels
Experiments
2013
1 Citation (Scopus)

Consideration of the watermark inversion attack and its invalidation framework

Ohzeki, K., Wei, Y., Hirakawa, Y. & Sato, K., 2013, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 7809 LNCS. p. 98-110 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7809 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Watermarking
1 Citation (Scopus)

Two-stage watermark system for increasing copyright potency in image media

Ohzeki, K., Wei, Y. Y., Hirakawa, Y. & Sato, K., 2013, Proceedings of the IADIS International Conference ICT, Society and Human Beings 2013, Proceedings of the IADIS International Conference e-Commerce 2013. p. 93-95 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Watermarking
Digital watermarking
Authentication
2012
1 Citation (Scopus)

A new watermarking method with obfuscated quasi-chirp transform

Ohzeki, K., Wei, Y., Hirakawa, Y. & Sato, K., 2012, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 7128 LNCS. p. 57-71 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7128 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Watermarking
Fourier transforms
Experiments
1 Citation (Scopus)

New Watermarking Method with Obfuscated Quasi-Chirp Transform

Ohzeki, K., Wei, Y., Hirakawa, Y. & Sato, K., 2012 Jul 1, In : Lecture Notes in Computer Science Volume 7128, 2012, DOI: 10.1007/978-3-642-32205-1, Springer 2012. 7128, p. 57-71

Research output: Contribution to journalArticle

Pass-image authentication method tolerant to random and video-recording attacks

Hirakawa, Y., Take, M. & Ohzeki, K., 2012, In : International Journal of Computer Science and Applications. 9, 3, p. 20-36 17 p.

Research output: Contribution to journalArticle

Video recording
Authentication
Automatic teller machines
CCD cameras
Internet
2011
4 Citations (Scopus)

Pass-image authentication method tolerant to video-recording attacks

Hirakawa, Y., Take, M. & Ohzeki, K., 2011, 2011 Federated Conference on Computer Science and Information Systems, FedCSIS 2011. p. 767-773 7 p. 6078195

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Video recording
Authentication
Automatic teller machines
CCD cameras
Internet
2010

A study on Character Identification in Four-panel Cartoon

Iwakami, I., Iwakami;Hirakawa, IH. & Hirakawa, Y., 2010 Mar 26, In : Proceedings of First International Senior Project Conference. p. 16-16

Research output: Contribution to journalArticle

Random Board: Password Authentication Method with Tolerance to Video-Recording Attacks

Hirakawa, Y., 2010 Dec 27, In : Proceedings of ICIMT2010. V1, p. 258-263

Research output: Contribution to journalArticle

2009

The utilization method of idle PC resources

Hirakawa, Y. & Matsuda, Y., 2009, ACM International Conference Proceeding Series. p. 325-328 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Personal computers
Bandwidth
Experiments
2008
6 Citations (Scopus)

A study of password authentication method against observing attacks

Fujita, K. & Hirakawa, Y., 2008, SISY 2008 - 6th International Symposium on Intelligent Systems and Informatics. 4664927

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Video recording
Automatic teller machines
Authentication
Cameras
Computer crime
2004

Analysis and improvement of Visual Customer Relationship Management system

Hidaka, T., Morita, T., Nakamura, T., Oinuma, M. & Hirakawa, Y., 2004 Nov 8, In : Proceedings on IEEE Int. Conf. Information Reuse and Integration, IRI2004.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Visual Customer Relationship Management System that supports Broadband Network E-commerce

Morita, T., Hidaka, T., Nakamura, T., Oinuma, M. & Hirakawa, Y., 2004 Jul 1, In : IEICE Transactions. E67-B, p. 1789-1796

Research output: Contribution to journalArticle

2003

A CC/PP-Based Service Discovery and Service Quality selection Method

Nakamura, T., Yuitou, M., Hirakawa, Y., Niki, T., Iwai, K., Takeuchi, S. & Nomura, K., 2003 Nov 25, In : Proceedings of Int. Symp. on Information and telecomm. Technologies. APSTITT2003. p. 485-490

Research output: Contribution to journalArticle

Visual Customer Relationship Management service that supports broadband e-commerce

Morita, T., Hidaka, T., Nakamura, T., Oinuma, M. & Hirakawa, Y., 2003 Nov 25, In : Proceedings of Int. Symp. on Information and telecomm. Technologies, APSITT2003. p. 31-36

Research output: Contribution to journalArticle

2001

A Quality Control Method for 3D Navigation System

Nakamura, T., Yuitou, M., Hirakawa, Y., Okuyama, H. & Mutou, T., 2001 Nov 7, In : Proceedings of Int. Symp. on Information and telecomm. Technologies, APSITT2001. p. 323-327

Research output: Contribution to journalArticle

1996
2 Citations (Scopus)

Group Communication for Upgrading Distributed Programs

Higaki, H. & Hirakawa, Y., 1996 May 1, In : the method can be applied to a wider range of distributed application programs.. 情報処理学会論文誌, p. 37-5

Research output: Contribution to journalArticle

1994

A Design Method for Communications Software Evolution

Okuyama, H., Moriyasu, K. & Hirakawa, Y., 1994 Oct 1, In : Proceedings on IEE Int. Conf. Network Protocol, ICNP94. p. 160-167

Research output: Contribution to journalArticle

An application method of message sequence chart specifications for services with variant process structure

Moriyasu, K. & Hirakawa, Y., 1994 Dec 1, In : IEICE Transactions. J77B-1, p. 717-727

Research output: Contribution to journalArticle

1991

A Design Support Method for Service Interactions

Harada, Y., Hirakawa, Y. & Takenaka, T., 1991 Oct 1, In : Proceedings of IEEE Global Communications Conference, GLOBECOM91. p. 1661-1666

Research output: Contribution to journalArticle

25 Citations (Scopus)

Comments pertaining to: On the Projection Method for Protocol Verification

Hirakawa, Y., 1990 Mar 1, In : IEEE Transactions on Software Engineering. SE-16, p. 370-371

Research output: Contribution to journalArticle

Reachability Analysis for a Behavior Description Independent of the Number of Processes

Shibata, K., Hirakawa, Y. & Takenaka, T., 1990 Jul 1, In : Proceedings of Joint Workshop on Computer Commun, JWCC90. p. 85-93

Research output: Contribution to journalArticle

1989

Hypermedia as a Communication Software Design Support System

Hirakawa, Y., Uchida, S. & Monden, M., 1989 Jun 1, In : IEE Proceedings of Hyper TEXT II. p. 244-251

Research output: Contribution to journalArticle

1987

A Prototype Switching System Employing a Matching-Based Language

Kawashima, N. & Hirakawa, Y., 1987 Jun 1, In : IEEE Transactions on Communications. COM-35, p. 653-658

Research output: Contribution to journalArticle

1984
1 Citation (Scopus)

Functional Programming Language for Switching Description and Its Hardware Architecture

Imase, M., Hirakawa, Y., Okada, K. & Kajiwara, M., 1984 May 1, In : Proceedings of International Switching Symposium, ISS84. p. 1-7

Research output: Contribution to journalArticle

1982
6 Citations (Scopus)

Recognition of Distorted Patterns Using the Viterbi Algorithm

Tanaka, H. & Hirakawa, Y., 1982 Jan 1, In : IEEE Transactions on Pattern Analysis and Machine Intelligence. PAMI-4, p. 18-25

Research output: Contribution to journalArticle