Pureに変更を加えた場合、すぐここに表示されます。

研究成果 1982 2018

  • 54 引用
  • 4 h指数
  • 27 Article
  • 11 Conference contribution
2018

Borderless interface for user authentication method tolerant against multiple video-recording attacks

Hirakawa, Y., Kurihara, K. & Ohzeki, K., 2018 8 24, 2017 International Conference on Computer Systems, Electronics and Control, ICCSEC 2017. Institute of Electrical and Electronics Engineers Inc., p. 1144-1148 5 p. 8446913

研究成果: Conference contribution

Video recording
Authentication
attack
recording
entry
2016
Face recognition
Authentication
Statistics
1 引用 (Scopus)

On the false rejection ratio of face recognition based on automatic detected feature points

Ohzeki, K., Takatsuka, M., Kajihara, M., Hirakawa, Y. & Sato, K., 2016 4 1, : : Pattern Recognition and Image Analysis. 26, 2, p. 379-384 6 p.

研究成果: Article

Function evaluation
Face recognition
Compensation and Redress
2015

Minimum variance method to obtain the best shot in video for face recognition

Ohzeki, K., Aoyama, R. & Hirakawa, Y., 2015, Proceedings of the 2015 Federated Conference on Computer Science and Information Systems, FedCSIS 2015. Institute of Electrical and Electronics Engineers Inc., p. 869-874 6 p. 2015F398

研究成果: Conference contribution

Face recognition
2014
3 引用 (Scopus)

Authentication system using encrypted discrete biometrics data

Ohzeki, K., Wei, Y., Kajihara, M., Takatsuka, M., Hirakawa, Y. & Sugimoto, T., 2014, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, 巻 8564 LNCS. p. 210-211 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 8564 LNCS).

研究成果: Conference contribution

Biometrics
Authentication
Servers
Analog to digital conversion
1 引用 (Scopus)

Robust watermark against double attacks of compression and cropping

Takatsuka, M., Kajihara, M., Hirakawa, Y. & Ohzeki, K., 2014 2 3, 2014 IEEE 3rd Global Conference on Consumer Electronics, GCCE 2014. Institute of Electrical and Electronics Engineers Inc., p. 200-201 2 p. 7031337

研究成果: Conference contribution

Experiments

Robust watermarking method by systematic block diffusion using discrete cosine transform

Ohzeki, K., Bannai, K., Wei, Y. Y., Hirakawa, Y. & Sato, K., 2014, Proceedings of the 11th Australian Digital Forensics Conference, ADF 2013. Edith Cowan University, p. 112-121 10 p.

研究成果: Conference contribution

Discrete cosine transforms
Watermarking
Pixels
Experiments
2013
1 引用 (Scopus)

Consideration of the watermark inversion attack and its invalidation framework

Ohzeki, K., Wei, Y., Hirakawa, Y. & Sato, K., 2013, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 巻 7809 LNCS. p. 98-110 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 7809 LNCS).

研究成果: Conference contribution

Watermarking
1 引用 (Scopus)

Two-stage watermark system for increasing copyright potency in image media

Ohzeki, K., Wei, Y. Y., Hirakawa, Y. & Sato, K., 2013, Proceedings of the IADIS International Conference ICT, Society and Human Beings 2013, Proceedings of the IADIS International Conference e-Commerce 2013. p. 93-95 3 p.

研究成果: Conference contribution

Watermarking
Digital watermarking
Authentication
2012
1 引用 (Scopus)

A new watermarking method with obfuscated quasi-chirp transform

Ohzeki, K., Wei, Y., Hirakawa, Y. & Sato, K., 2012, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 巻 7128 LNCS. p. 57-71 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 7128 LNCS).

研究成果: Conference contribution

Watermarking
Fourier transforms
Experiments
Video recording
Authentication
Automatic teller machines
CCD cameras
Internet
2011
4 引用 (Scopus)

Pass-image authentication method tolerant to video-recording attacks

Hirakawa, Y., Take, M. & Ohzeki, K., 2011, 2011 Federated Conference on Computer Science and Information Systems, FedCSIS 2011. p. 767-773 7 p. 6078195

研究成果: Conference contribution

Video recording
Authentication
Automatic teller machines
CCD cameras
Internet
2010
2009

The utilization method of idle PC resources

Hirakawa, Y. & Matsuda, Y., 2009, ACM International Conference Proceeding Series. p. 325-328 4 p.

研究成果: Conference contribution

Personal computers
Bandwidth
Experiments
2008
6 引用 (Scopus)

A study of password authentication method against observing attacks

Fujita, K. & Hirakawa, Y., 2008, SISY 2008 - 6th International Symposium on Intelligent Systems and Informatics. 4664927

研究成果: Conference contribution

Video recording
Automatic teller machines
Authentication
Cameras
Computer crime
1 引用 (Scopus)

Visual Customer Relationship Management System that supports Broadband Network E-commerce

Morita, T., Hidaka, T., Nakamura, T., Oinuma, M. & Hirakawa, Y., 2004 7 1, : : IEICE Transactions. E67-B, p. 1789-1796

研究成果: Article

2003

A CC/PP-Based Service Discovery and Service Quality selection Method

Nakamura, T., Yuitou, M., Hirakawa, Y., Niki, T., Iwai, K., Takeuchi, S. & Nomura, K., 2003 11 25, : : Proceedings of Int. Symp. on Information and telecomm. Technologies. APSTITT2003. p. 485-490

研究成果: Article

2001

A Quality Control Method for 3D Navigation System

Nakamura, T., Yuitou, M., Hirakawa, Y., Okuyama, H. & Mutou, T., 2001 11 7, : : Proceedings of Int. Symp. on Information and telecomm. Technologies, APSITT2001. p. 323-327

研究成果: Article

1996
2 引用 (Scopus)
1994
1991
1989

Hypermedia as a Communication Software Design Support System

Hirakawa, Y., Uchida, S. & Monden, M., 1989 6 1, : : IEE Proceedings of Hyper TEXT II. p. 244-251

研究成果: Article

1987
1984
1 引用 (Scopus)
1982
6 引用 (Scopus)