If you made any changes in Pure these will be visible here soon.

Research Output 1982 2018

  • 54 Citations
  • 4 h-Index
  • 27 Article
  • 11 Conference contribution
Filter
Conference contribution
2018

Borderless interface for user authentication method tolerant against multiple video-recording attacks

Hirakawa, Y., Kurihara, K. & Ohzeki, K., 2018 Aug 24, 2017 International Conference on Computer Systems, Electronics and Control, ICCSEC 2017. Institute of Electrical and Electronics Engineers Inc., p. 1144-1148 5 p. 8446913

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Video recording
Authentication
attack
recording
entry
2015

Minimum variance method to obtain the best shot in video for face recognition

Ohzeki, K., Aoyama, R. & Hirakawa, Y., 2015, Proceedings of the 2015 Federated Conference on Computer Science and Information Systems, FedCSIS 2015. Institute of Electrical and Electronics Engineers Inc., p. 869-874 6 p. 2015F398

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Face recognition
2014
3 Citations (Scopus)

Authentication system using encrypted discrete biometrics data

Ohzeki, K., Wei, Y., Kajihara, M., Takatsuka, M., Hirakawa, Y. & Sugimoto, T., 2014, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 8564 LNCS. p. 210-211 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8564 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Biometrics
Authentication
Servers
Analog to digital conversion
1 Citation (Scopus)

Robust watermark against double attacks of compression and cropping

Takatsuka, M., Kajihara, M., Hirakawa, Y. & Ohzeki, K., 2014 Feb 3, 2014 IEEE 3rd Global Conference on Consumer Electronics, GCCE 2014. Institute of Electrical and Electronics Engineers Inc., p. 200-201 2 p. 7031337

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Experiments

Robust watermarking method by systematic block diffusion using discrete cosine transform

Ohzeki, K., Bannai, K., Wei, Y. Y., Hirakawa, Y. & Sato, K., 2014, Proceedings of the 11th Australian Digital Forensics Conference, ADF 2013. Edith Cowan University, p. 112-121 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Discrete cosine transforms
Watermarking
Pixels
Experiments
2013
1 Citation (Scopus)

Consideration of the watermark inversion attack and its invalidation framework

Ohzeki, K., Wei, Y., Hirakawa, Y. & Sato, K., 2013, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 7809 LNCS. p. 98-110 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7809 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Watermarking
1 Citation (Scopus)

Two-stage watermark system for increasing copyright potency in image media

Ohzeki, K., Wei, Y. Y., Hirakawa, Y. & Sato, K., 2013, Proceedings of the IADIS International Conference ICT, Society and Human Beings 2013, Proceedings of the IADIS International Conference e-Commerce 2013. p. 93-95 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Watermarking
Digital watermarking
Authentication
2012
1 Citation (Scopus)

A new watermarking method with obfuscated quasi-chirp transform

Ohzeki, K., Wei, Y., Hirakawa, Y. & Sato, K., 2012, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 7128 LNCS. p. 57-71 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7128 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Watermarking
Fourier transforms
Experiments
2011
4 Citations (Scopus)

Pass-image authentication method tolerant to video-recording attacks

Hirakawa, Y., Take, M. & Ohzeki, K., 2011, 2011 Federated Conference on Computer Science and Information Systems, FedCSIS 2011. p. 767-773 7 p. 6078195

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Video recording
Authentication
Automatic teller machines
CCD cameras
Internet
2009

The utilization method of idle PC resources

Hirakawa, Y. & Matsuda, Y., 2009, ACM International Conference Proceeding Series. p. 325-328 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Personal computers
Bandwidth
Experiments
2008
6 Citations (Scopus)

A study of password authentication method against observing attacks

Fujita, K. & Hirakawa, Y., 2008, SISY 2008 - 6th International Symposium on Intelligent Systems and Informatics. 4664927

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Video recording
Automatic teller machines
Authentication
Cameras
Computer crime