Japanese
Echizen Laboratory, National Institute of Informatics
2-1-2, Hitotsubashi,
Chiyoda-ku, Tokyo, 101-8430, JAPAN
TEL:+81-3-4212-2516
FAX:+81-3-4212-2120

Research achievements

2017

Refereed journal papers

    T. Truong, T. Tran, D. Duong, and I. Echizen, "Provable identity based user authentication scheme on ECC in multi-server environment," Wireless Personal Communications, vol. 92, 13 pages, Springer (2017) [ranked as "Q2" by SJR rank]

Refereed conference papers

  1. L. Barua, P. Dhar, L. Alam, and I. Echizen, “Bangla Text Compression Based on Modified Lempel-Ziv-Welch Algorithm,” Proc. of the International Conference on Electrical, Computer and Communication Engineering (ECCE2017), 5 pages, (February 2017)
  2. A. Islam, P. Dhar, M. Haque, and I. Echizen, “An Asymmetric Key Based Encryption and Decryption Algorithm for Secured Data Transfer,” Proc. of the International Conference on Electrical, Computer and Communication Engineering (ECCE2017), 4 pages, (February 2017)
  3. Y. Matsue, K. Kaneda, K. Iwamura, and I. Echizen, “Study of an information extraction method using a single-dot pattern method with clear ink,” Proc. of the 5th IIEEJ International Workshop on Image Electronics and Visual Computing (IEVC2017), 4 pages, (March 2017)
  4. W. Tomita, K. Kaneda, K. Iwamura, and I. Echizen, “Expanding Information Hiding Scheme using Artificial Fiber (AF) Pattern into Katagami Patterns with A Low-resolution Web Camera,” Proc. of the 5th IIEEJ International Workshop on Image Electronics and Visual Computing (IEVC2017), 4 pages, (March 2017)

Others

Internet
  1. Naked Security, Designer launches fabric to bamboozle facial recognition January 4, 2017
  2. QUARTZ, New “camouflage” seeks to make you unrecognizable to facial-recognition technologyJanuary 6, 2017
  3. The Japan Times, Researchers warn of fingerprint theft from ‘peace’ sign Jan. 11, 2017
  4. The Telegraph, Peace sign selfies could let hackers copy your fingerprints Jan. 12, 2017
  5. The Times, Photos are a giveaway for fingerprint fraudsters Jan. 13, 2017
  6. Financial Times, Fingerprint theft points to digital danger Jan. 16, 2017
  7. Reuters,'Peace' signs risk fingerprint theft, says Japanese study Jan. 16, 2017
  8. REUTERS Mail Online WIRES,Researchers say fingerprint data vulnerable in "peace" photos Jan. 16, 2017
  9. FALA BRASIL,Digitais podem ser copiadas e fotos e usadas em golpes Jan. 19, 2017
  10. Slate, The Surprising Things Algorithms Can Glean About You From PhotosMarch 10, 2017
  11. Newsweek, HOW FLASHING A PEACE SIGN COULD GET YOU HACKEDMarch 18, 2017

2016

Refereed conference papers

  1. Kei Hashimoto, Junichi Yamagishi, and Isao Echizen, "Privacy-preserving sound to degrade automatic speaker verification performance," Proceedings of 2016 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2016), pp.5500-5504, (March 2016)
  2. S. Wohlgemuth, K. Takaragi, and I. Echizen, "Error-Correcting Codes as Source for Decoding Ambiguity,” Proc. of the Conference: Multikonferenz Wirtschaftsinformatik (MKWI) 2016, 7 pages, (March 2016)
  3. S. Shiota, F. Villavicencio, J. Yamagishi, N. Ono, I. Echizen, and Tomoko Matsui, "Voice liveness detection for speaker verification based on a tandem single/double-channel pop noise detector,” Proc. of the Speaker and Language Recognition Workshop (Odyssey 2016), 5 pages, (June 2016)
  4. T. Truong, D. Phan, M. Tran, A. Duong, I. Echizen, "Provable user authentication scheme in telecare medicine information system using elliptic curve cryptosystem," Proc. of 11th International Conference on Availability, Reliability and Security (ARES 2016), 7 pages, (August 2016)
  5. E. Hashimoto, M. Ichino, T. Kuboyama, I. Echizen, H. Yoshiura, "Breaking Anonymity of Social Network Accounts by Using Coordinated and Extensible Classifiers Based on Machine Learning," Proc. of the IFIP Conference on e-Business, e-Services and e-Society (I3E 2016), LNCS, pp.455-470, (September 2016) [Best Paper Award]
  6. T. Bui, T. Kojima, I. Echizen, "Efficiently Decodable Defective Items Detected by New Model of Noisy Group Testing," Proc. of the International Symposium on Information Theory and Its Applications (ISITA2016), 5 pages, (October 2016)
  7. Y. Kusama, H. Kang, K. Iwamura, I. Echizen, "Privacy-protected Video Surveillance in Crowded Environments Using Robust Watermarking," Proc. of the IEEE Global Conference on Consumer Electronics, 2 pages, (October 2016)
  8. Y. Yan, H. Kang, K. Iwamura, I. Echizen, "Image Watermarking Using the Differences Between Two Wavelet Filters," Proc. of the IEEE Global Conference on Consumer Electronics, 3 pages, (October 2016)
  9. N. Kokui, H. Kang, K. Iwamura, I. Echizen, "Best Embedding Direction for Spread Spectrum-Based Video Watermarking," Proc. of the IEEE Global Conference on Consumer Electronics, 3 pages, (October 2016)

Others

Internet
  1. Biometric Update, Japanese firm introduces privacy visor that confuses facial recognition software May 12, 2016
  2. The Japan Times, Privacy Visor thwarts facial-recognition tech May 13, 2016
  3. I4U NEWS, PRIVACY VISOR AGAINST COMPUTER FACE RECOGNITION GOES ON SALE May 13, 2016
  4. Inverse, Japanese Company Debuts Privacy Visor That Scrambles Facial Recognition Software May 13, 2016
  5. BleepingComputer, How to Trick Facial Recognition Tech with a Facebook Photo August 22, 2016
  6. IT-Weekly, В Нью-Йорке ПО распознает лица водителей автомобилей September 1, 2016
  7. New Scientist, Glasses make face recognition tech think you’re Milla Jovovich November 1, 2016
  8. ZD Net, These patterned glasses are all it takes to fool AI-powered facial recognition November 3, 2016
  9. Naked Security, Glasses make facial recognition think you’re a celebrity November 4, 2016
  10. MAGAZINE, Per ingannare la tecnologia di riconoscimento facciale bastano un paio di occhiali December 6, 2016

2015

Refereed journal papers

  1. H-Q. Nguyen-Son, A-T. Hoang, M-T. Tran, H. Yoshiura, N. Sonehara, and I. Echizen, " Anonymizing Personal Text Messages Posted in Online Social Networks and Detecting Disclosures of Personal Information," IEICE Trans. on Information & Systems, Vol. E97-D, No. 1, 12 pages (January 2015)
  2. T. Kajiyama and I. Echizen, "An Educational System to Help Students Assess Website Features and Identify High-risk Website," Interactive Technology and Smart Education, vol. 12, issue *, pp.14-30, Emerald (April 2015)
  3. Thach V. Bui, Binh Q. Nguyen, Thuc D. Nguyen, N. Sonehara, and I. Echizen, “Robust Fingerprinting Codes for Database using non-adaptive group testing,” International Journal of Big Data Intelligence, vol. 2, no. 2, pp.81-90 (2015)
  4. I. Echizen, T. Yamada, S. Gohshi, “IR Hiding: Use of Specular Reflection for Short-Wavelength-Pass-Filter Detection to Prevent Re-recording of Screen Images,” Transactions on Data Hiding and Multimedia Security, vol. 10, 17 pages, Springer (2015)

Refereed conference papers

  1. T. Bui, T. Nguyen, N. Sonehara, and I. Echizen, “Efficient authentication, traitor detection and privacy-preserving for the most common queries in two-tiered wireless sensor networks,” Proc. of the 29th IEEE International Conference on Advanced Information Networking and Applications (AINA-2015), 8 pages, (March 2015)
  2. T. Truong, M. Tran, A. Duong and I. Echizen, “Chaotic Chebyshev polynomials based remote user authentication scheme in client-server environment,” Proc. the IFIP TC-11 International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2015), to be published in the IFIP AICT series, Springer, 16 pages (May 2015)
  3. A. Dabrowski, I. Echizen, and E. Weippl "Error-Correcting Codes as Source for Decoding Ambiguity,” Proc. of the Second Language-Theoretic Security Workshop (LangSec2015) at the IEEE Security & Privacy Symposium, 6 pages, (May 2015)
  4. Y. Ogawa, E. Hashimoto, M. Ichino, I. Echizen, and H. Yoshiura, “De-Anonymising Social Network Posts by Linking with Résumé”, Workshop on Privacy by Transparency in Data-Centric Services (PTDCS2015), Proc. of the 18th International Conference on Business Information Systems (BIS2015), Lecture Notes in Business Information Processing (LNBIP), no. 228, Springer, 12 pages (June 2015)
  5. A. Dabrowski, K. Krombholz, E. Weippl, and I. Echizen, “Smart Privacy Visor: Bridging the Privacy Gap”, Workshop on Privacy by Transparency in Data-Centric Services (PTDCS2015), Proc. of the 18th International Conference on Business Information Systems (BIS2015), Lecture Notes in Business Information Processing (LNBIP), no. 228, Springer, 12 pages (June 2015)
  6. H-Q. Nguyen-Son, M-T. Tran, H. Yoshiura, N. Sonehara, and I. Echizen, “A Rule-Based Approach for Detecting Location Leaks of Short Text Messages”, Workshop on Privacy by Transparency in Data-Centric Services (PTDCS2015), Proc. of the 18th International Conference on Business Information Systems (BIS2015), Lecture Notes in Business Information Processing (LNBIP), no. 228, Springer, 12 pages (June 2015)
  7. K. Kobayashi, M. Inamura, K. Kaneda, K. Iwamura, and and I. Echizen, “Surveillance Camera System Balancing Privacy Protection and Effective Surveillance Image Use”, Proc. of the 12th International Conference on e-Business (ICE-B 2015), pp. 41-28 (July 2015)
  8. S. Shiota, F. Villavicencio, J. Yamagishi, N. Ono, I. Echizen, and T. Matsui, “Voice liveness detection algorithms based on pop noise caused by human breath for automatic speaker verification,” Proc. the Interspeech 2015, 5 pages (September 2015)
  9. T. Ito, H. Kang, K. Iwamura, K. Kaneda, and I. Echizen, “Audio Watermarking Using Different Wavelet Filters,” Proc. of the 14th International Workshop on Digital-Forensics and Watermarking (IWDW 2015), LNCS, 9 pages, Springer, (October 2015)
  10. H. Nguyen, H-Q. Nguyen-Son, T. Nguyen, and I. Echizen, “Discriminating between Computer-Generated Facial Images and Natural Ones Using Smoothness Property and Local Entropy,” Proc. of the 14th International Workshop on Digital-Forensics and Watermarking (IWDW 2015), LNCS, 12 pages, Springer, (October 2015)
  11. H.-Q. Nguyen-Son, Y. Miyao, I. Echizen, "Paraphrase Detection Based on Identical Phrase and Similar Word Matching," Proc. of the 29th Pacific Asia Conference on Language, Information and Computation (PACLIC 29), 10 pages, October 2015
  12. T. Bui, T. Nguyen, N. Sonehara, and I. Echizen, “Tradeoff between the price of distributing a database and its collusion resistance based on concatenated codes,” Proc. of the 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2015), 8 pages, (November 2015)
  13. H. Ishizuka, K. Sakurai, I. Echizen, and K. Iwamura, "Evaluation of matching accuracy of template-matching using a steganography algorithm," International Workshop on Information and Communication Security (WICS2015), Proc. of the Third International Symposium on Computing and Networking (CANDAR15), 6 pages, (December 2015)

Others

Internet
  1. RAW STORY, The anti-surveillance state: Clothes and gadgets block face recognition technology and make you digitally invisible April 26, 2015
  2. THE WALL STREET JOURNAL JAPAN, Eyeglasses with Face Un-Recognition Function to Debut in Japan August 7, 2015
  3. BIOMETRIC UPDATE.COM, Researchers develop glasses that prevent facial recognition systems from detecting a face August 7, 2015
  4. engadget, Japan’s Privacy Visor will hide your face from software for $240 August 7, 2015
  5. INVERSE, These Japanese Privacy Glasses Can Scramble Facial Recognition Software August 7, 2015
  6. planet biometrics, Japanese sunglasses launched to disrupt facial recognition August 7, 2015
  7. TECH TIMES, Glasses Designed To Block Facial Recognition To Go On Sale In Japan August 7, 2015
  8. GIZMODO, These Glasses Block Facial Recognition Technology August 8, 2015
  9. POPULAR SCIENCE, NEW JAPANESE GLASSES BLOCK FACIAL RECOGNITION August 8, 2015
  10. RT, ‘Privacy Visor’: Japan designs eyewear to prevent facial recognition August 8, 2015
  11. THE WALL STREET JOURNAL, Digits: Face Un-Recognition Glasses Set for Debut August 9, 2015
  12. LaStampa, Arrivano dal Giappone gli occhiali che proteggono dalle foto rubate dagli smartphone August 10, 2015
  13. SECOLOd’Italia, Sfida al Grande Fratello: in arrivo gli occhiali che rendono “invisibili” August 10, 2015
  14. TECH BULLETIN, Privacy Visor Glass to protect your face from Camera August 10, 2015
  15. FIND BIOMETRICS, New Glasses Can Thwart Facial Recognition August 10, 2015
  16. Republica, Inventan en Japón unas gafas que impiden el reconocimiento facial en fotosk August 10, 2015
  17. VodafoneNews, Gli occhiali per restare “invisibili” al riconoscimento facciale dei social network August 10, 2015
  18. NewZilla.net, Au Japon, des lunettes qui bloquent les logiciels de reconnaissance faciale August 10, 2015
  19. tom’sGUIDE, Des lunettes pour déjouer les systèmes de reconnaissance faciale August 10, 2015
  20. welivesecurity, Glasses that ‘block’ facial recognition technology to launch in 2016 August 10, 2015
  21. iDigitalTimes, Glasses Aim to Champion Privacy by Blocking Facial Recognition August 10, 2015
  22. ITWORLD, How Japan's Privacy Visor fools face-recognition cameras August 11, 2015
  23. PCWorld, How Japan's Privacy Visor fools face-recognition cameras August 11, 2015
  24. CIO, How Japan's Privacy Visor fools face-recognition cameras August 11, 2015
  25. ANSA, Gli occhiali anti-riconoscimento volto August 11, 2015
  26. SecurityLab, «Козырек приватности» поможет сбить с толку системы распознавания лиц August 11, 2015
  27. imveurope, Glasses that block facial recognition software to be sold in Japan in 2016 August 12, 2015
  28. COMPUTERWORLD, Imagem do dia: viseira de privacidade engana câmaras August 12, 2015
  29. TheWashingtonTimes, Can you see me now? ‘Privacy Visor’ goggles trick facial recognition tech August 12, 2015
  30. 3ders, Imagem do dia: viseira de privacidade engana câmaras August 12, 2015
  31. PCWorldNewZealand, How Japan's Privacy Visor fools face-recognition cameras August 12, 2015
  32. Pravda, Vyvinuli špeciálne okuliare, ktoré dokážu zmiasť bezpečnostné kamery August 12, 2015
  33. SOFTWARE ZONE, Gli occhiali che impediscono il riconoscimento facciale August 13, 2015
  34. DAILY NEWS, SHADY SHADES: Hi-tech specs confuse facial-recognition software, but there's more you can do to protect yourself August 13, 2015
  35. nakedsecurity, The latest accessory to flummox facial recognition cameras - the Privacy Visor! August 13, 2015
  36. RSI NEWS, Gli occhiali dell'invisibilità August 15, 2015
  37. CIO, Privacy visor fools facial recognition August 19, 2015
  38. FAST COMPANY, Yes, Anti-Facial-Recognition Glasses Are Coming August 27, 2015
  39. NUMRUSH, Privacy Visor: een bril die gezichtsherkenning blokkeert August 28, 2015
  40. pressecitron, Bientôt, des lunettes anti-reconnaissance faciale pour les plus paranoïaques August 28, 2015
  41. ACM, Glasses Foil Facial Recognition September 17, 2015
  42. Linkedin, Technological Hide and Seek with new Facial Recognition Technology September 21, 2015

2014

Refereed journal papers

  1. S. Gohshi, T. Hiroi, and I. Echizen, "Subjective assessment of HDTV with superresolution function," EURASIP Journal on Image and Video Processing, vol. 2014, no. 1, 10 pages, (February 2014)
  2. P. Kieseberg, S. Schrittwieser, M. Mulazzani, I. Echizen, and E. Weippl, " An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata," Electronic Markets, vol. 24, pp.113-124, (June 2014)
    <ranked as "A" by ACPHIS IS Journal Ranking/ERA Journal List>

Refereed conference papers

  1. K. Kaneda, H. Kitazawa, K. Iwamura, and I. Echizen, "A study of equipment dependence of a single-dot pattern method for an information-hiding by applying an error-correcting code," Proc. of the 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2014), pp.497 - 501 (August 2014)
  2. K. Kaneda, T. Inui, K. Iwamura, and I. Echizen, "Novel proposal and evaluation of information extraction method from Artificial Fiber Pattern using a camera," Proc. of the 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2014), pp. 502 - 506 (August 2014)
  3. K. Kaneda, K. Kawabata, K. Iwamura, and I. Echizen, " Mathematical Simulation Model and its Evaluation for Artificial Fiber Pattern," Proc. of the 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2014), pp.507 - 511 (August 2014)
  4. T. Bui, B. Nguyen, V. Nguyen, T. Nguyen, I. Echizen, and T. Nguyen, "Robust Message Hiding for QR Code," Proc. of the 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2014), pp.520 - 523 (August 2014)
  5. T. Ito, R. Sugiyama, H. Kang, K. Iwamura, K. Kaneda, and I. Echizen, "A New Approach to Reversible Watermarking," Proc. of the 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2014), pp.455 - 458 (August 2014)
  6. H. Ishizuka, I. Echizen, K. Iwamura, and K. Sakurai, " A Zero-watermarking-like Steganography and Potential Applications," Proc. of the 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2014), pp. 459 - 462 (August 2014)
  7. K. Kobayashi, K. Iwamura, K. Kaneda, and I. Echizen, " Surveillance Camera System to Achieve Privacy Protection and Crime Prevention," Proc. of the 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2014), pp.463 - 466 (August 2014)
  8. S. Machida, T. Kajiyama, S. Shimada, and I. Echizen, "Analysis of Facebook Friends using Disclosure Level," Proc. of the 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2014), pp.471 - 474 (August 2014)
  9. S. Machida, T. Kajiyama, S. Shimada, and I. Echizen, " Adaptive Disclosure Control System Using Detection of Sensitive Information in SNSs," Symposium On Usable Privacy and Security 2014 (SOUPS 2014), 2 pages, Poster (July 2014)
  10. H-Q. Nguyen-Son, M-T. Tran, H. Yoshiura, N. Sonehara, and I. Echizen, “A System for Anonymizing Temporal Phrases of Message Posted in Online Social Networks and for Detecting Disclosure”, The 4th International Workshop on Resilience and IT-Risk in Social Infrastructures (RISI), Proc. of the 9th International Conference on Availability, Reliability and Security (ARES), pp. 455-460, Switzerland (September 2014)
  11. A. Jimenez, A. Dabrowski, J. Martinez, N. Sonehara and I. Echizen, "Tag Detection for Preventing Unauthorized Face Image Processing," Proc. of the 13th International Workshop on Digital-Forensics and Watermarking (IWDW 2014), LNCS, 15 pages, Springer (October 2014)
  12. E. Chaussy, S. Machida, N. Sonehara and I. Echizen, "Definition of Private Information for Image Sharing in Social Networking Services," Proc. of the 13th International Workshop on Digital-Forensics and Watermarking (IWDW 2014), LNCS, 15 pages, Springer (October 2014)
  13. H. Ishizuka, I. Echizen, K. Iwamura and K. Sakurai, "Evaluation of a zero-watermarking-type steganography," Proc. of the 13th International Workshop on Digital-Forensics and Watermarking (IWDW 2014), LNCS, 15 pages, Springer (October 2014)

Others

TV broadcasting
  1. BBC News(UK)BBC One, BBC Two, BBC News Channel and BBC World News Channel
    Click, https://www.youtube.com/watch?v=1I0pqEdgaA8&feature=c4-overview&list=UUYNExa kJwt5T9B6UyI7Qbkw  January 25, 2014
Internet
  1. BLACK BAG, Japanese Eyewear Giants Enlist to Save Humanity From Google Glass July 14, 2014
  2. GIZMODO, 5 Ways to Hide From Common Surveillance Tech October 20, 2014
  3. GIZMODO INDIA, 5 Ways to Hide From Common Surveillance Tech October 20, 2014
  4. AKIHABARA NEWS, 3D printer plays a key role in development of Privacy Visor October 23, 2014
  5. engadget, Privacy gear for the age of surveillance:Face off November 4, 2014
Publicity
  1. NII Today, No.50, Get Control of Personal Data Back in Our Hands -PrivacyVisor raises discussion on arbitrary facial recognition- (June 2014)

2013

Refereed journal papers

  1. K. Rechert, K. Meier, R. Zahoransky, D. Wehrle, D. Suchodoletz, B. Greschbach, S. Wohlgemuth, and I. Echizen, "Reclaiming Location Privacy in Mobile Telephony Networks -Effects and Consequences for Providers and Subscribers", IEEE Systems Journal, vol. 7, no. 2, pp.211-222, (June 2013)

Refereed conference papers

  1. T. Yamada, S. Gohshi, and I. Echizen, “Privacy visor: wearable device for preventing privacy invasion through face recognition from camera images,” Proc. of the 2013 International Workshop on Advanced Image Technology 2013 (IWAIT2013), pp. 90-93, (January 2013)
  2. S. Gohshi and I. Echizen, “Subjective Assessment of HDTV with Super Resolution Function,” Proc. of the Seventh International Workshop on Video Processing and Quality Metrics for Consumer Electronics (VPQM 2013), 6 pages, (January 2013)
  3. T. Hue, N. Thuc, D. Thuy, I. Echizen, and S. Wohlgemuth, “Protecting Access Pattern Privacy in Database Outsourcing Service,” Proc. of the 9th International Symposium on Frontiers of Information Systems and Network Applications, pp. 922-928, (March 2013)
  4. H. Nishikawa, Y. Kakizaki, K. Iwamura, I. Echizen, “Experiment of Geometrically Invariant and Unneeded Synchoronism Watermarking Using Winding Number,” Proc. of the 9th International Symposium on Frontiers of Information Systems and Network Applications, 6 pages, (March 2013)
  5. T. Okuno, M. Ichino, I. Echizen, A. Utsumi, and H. Yoshiura, “Ineluctable Background Checking on Social Networks: Linking Job Seeker's Résumé and Posts,” Proc. of the 5th IEEE International Workshop on. Security and Social Networking (SESOC 2013), pp.273-278, (March 2013)
  6. T. Hue, D. Thuy, N. Thuc, I. Echizen, and S. Wohlgemuth, “A User Privacy Protection Technique for Executing SQL over Encrypted Data in Database Outsourcing Service,” Proc. of the 12th IFIP Conference on e-Business, e-Services, e-Society (I3E 2013), IFIP Advances in Information and Communication Technology, vol. 399, pp.25-37, Springer, (April 2013)
  7. I. Krontiris, A. Albers, N. Sonehara, and I. Echizen, “Coupons as Monetary Incentives in Participatory Sensing,” Proc. of the 12th IFIP Conference on e-Business, e-Services, e-Society (I3E 2013), IFIP Advances in Information and Communication Technology, vol. 399, pp.226-237, Springer, (April 2013)
  8. S. Gohshi and I. Echizen, “Limitations of Super Resolution Image Reconstruction and How to Overcome them for a Single Image,” Proc. of the 10th International Conference on Signal Processing and Multimedia Applications (SIGMAP 2013), 4 pages, (July 2013)
  9. S. Shimada and I. Echizen, "Predictive Notification Service of Privacy Invasion on Posting Pictures to SNS," The 5TH IEEE International Workshop on Security Aspects in Processes and Services Engineering (SAPSE 2013), Proc. of the 37th Annual International Computer Software & Applications Conference, 7 pages, (July 2013)
  10. T. Muraki, S. Oishi, M. Ichino, I. Echizen, and H. Yoshiura, “Anonymizing Face Images by Using Similarity-Based Metric,” the 3rd International Workshop on Resilience and IT-Risk in Social Infrastructures (RISI 2013), Proc. of the International Conference on Availability, Reliability and Security (ARES 2013), pp. 517-524, (September 2013)
  11. J. Latocha, K. Rechert, and I. Echizen, “Securing Access to Complex Digital Artifacts - Towards a Controlled Processing Environment for Digital Research Data,” Proc. of the 17th International Conference on Theory and Practice of Digital Libraries (TPDL 2013), 7 pages, (September 2013)
  12. T. Yamada, S. Gohshi, and I. Echizen, “Privacy Visor: Method for Preventing Face Image Detection by Using Differences in Human and Device Sensitivity,” Proc. of the 14th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security (CMS 2013), short paper, LNCS 8099, pp. 152-161, Springer (September 2013)
  13. T. Bui, V. Dang, I. Echizen, and T. Nguyen, “How can we acquire the most common query types in Two-tiered Wireless Sensor Networks?,” Proc. of the 7th International Conference on Next Generation Mobile Apps, Services and Technologies (NGMAST 2013), 5 pages, (September 2013)
  14. T. Kajiyama and I. Echizen, " A Method for Extracting Colors from Text to Visualize Readers’ Impressions," 7th Workshop "Emotion and Computing -Current Research and Future Impact, Proc. of the 36th German Conference on Artificial Intelligence, LNAI 8077, 8 pages, Springer (September 2013)
  15. A. Dabrowski, E. Weippl, and I. Echizen, "Framework based on Privacy Policy Hiding for Preventing Unauthorized Face Image Processing,” Proc. of the 2013 IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC 2013), 7 pages, (October 2013)
  16. T. Yamada, S. Gohshi, and I. Echizen, “Privacy Visor: Method based on Light Absorbing and Reflecting Properties for Preventing Face Image Detection,” Proc. of the 2013 IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC 2013), 6 pages, (October 2013)
  17. T. Yamada, S. Gohshi, and I. Echizen, “Evaluation of privacy visor for preventing face recognition from camera images,” Proc. of the 2013 International Workshop on Smart Info-Media Systems in Asia (SISA2013), pp. 128-133, (October 2013)
  18. Xuping Huang, Nobutaka Ono, Isao Echizen and Akira Nishimura, "Reversible audio watermarking based on integer DCT coefficients with adaptive hiding locations," Proc. of the 12th International Workshop on Digital-Forensics and Watermarking (IWDW 2013), LNCS, 15 pages, Springer (October 2013)
  19. A-T. Hoang, H-Q. Nguyen-Son, M-T. Tran, and I. Echizen, "Detecting Traitors in Re-Publishing Updated Datasets," Proc. of the 12th International Workshop on Digital-Forensics and Watermarking (IWDW 2013), LNCS, 15 pages, Springer (October 2013)
  20. H-Q. Nguyen-Son, A-T. Hoang, M-T. Tran, H. Yoshiura, N. Sonehara, and I. Echizen, " Anonymizing Temporal Phrases in Natural Language Text to be Posted on Social Networking Services," Proc. of the 12th International Workshop on Digital-Forensics and Watermarking (IWDW 2013), LNCS, 15 pages, Springer (October 2013)
  21. T. Iida, T. Kajiyama, N. Ouchi, and I. Echizen, “A Color Extraction Method from Text for Use in Creating a Book Cover Image that Reflects Reader Impressions,” 7th Workshop “Emotion and Computing -Current Research and Future Impact, Proc. of the 8th International Conference on Knowledge, Information and Creativity Support Systems (KICSS2013), LNCS, 10 pages, Springer, (November 2013)
  22. T. Bui, B. Nguyen, T. Nguyen, N. Sonehara, and I. Echizen, “Robust Fingerprinting Codes for Database,” Proc. of the 13th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP-2013), LNCS, 8 pages, Springer, (December 2013)
  23. S. Machida, S. Shimada, and I. Echizen, “Settings of Access Control by Detecting Privacy Leaks in SNS,” Workshop on Dependable and Trustworthy Web and Distributed System (DTWD2013), Proc. of the 9th International Conference on Signal Image Technology & Internet Based Systems (SITIS2013), 7 pages, (December 2013)
  24. T. Bui, B. Nguyen, T. Nguyen, N. Sonehara, and I. Echizen, “Effective Fingerprinting Codes for Database,” Workshop on Dependable and Trustworthy Web and Distributed System (DTWD2013), Proc. of the 9th International Conference on Signal Image Technology & Internet Based Systems (SITIS2013), 5 pages, (December 2013)

Others

TV broadcasting
  1. BBC News(UK)BBC One, BBC Two, BBC News Channel and BBC World News Channel
    Click, Infrared glasses to thwart embarrassing Facebook photos  January 26-27, 2013
  2. Rede Record (Brazil), Fala Brasil, Tecnologia: óculos permite mais privacidade  February 1, 2013
  3. RT (Spain), Crean ropa antivigilancia para burlar al 'Gran Hermano'  February 11, 2013
  4. Discovery Channel, Daily Planet, "Asia Tech: Privacy Glasses", May 17, 2013
Radio broadcasting
  1. BBC Radio 5Live, Eye-Tech, August 27, 2013
  2. BBC Radio 5Live   http://www.bbc.co.uk/podcasts/series/pods'  
    Eye-Tech   http://downloads.bbc.co.uk/podcasts/fivelive/pods/pods_20130827-0330b.mp3'
Newspaper article
  1. Metro(UK) "The specs that shield you from snappers" January 31, 2013
Internet
  1. Kotaku, Worried About Your Face Ending Up Online? These Glasses Could Help. January 12, 2013
  2. Slate(US), These Goofy-Looking Glasses Could Make You Invisible to Facial Recognition Technology January 18, 2013
  3. TechHive, Tracking tech abounds, but emerging tools offer a shield January 19, 2013
  4. GIZMODO, Could You Ever Be So Paranoid About Privacy That You’d Wear These Goofy Glasses? January 21, 2013
  5. Phys.org, In your face: Near-infrared glasses thwart face recognition January 21, 2013
  6. BBC News(UK), Privacy visor blocks facial recognition software January 22, 2013
  7. CNET, Foil face-recognition cameras with Privacy Visor January 22, 2013
  8. TechCrunch, New Glasses Thwart Facial Recognition Scanners, Marking Trend In Privacy Wearables January 22, 2013
  9. RT, Guess who? Japanese scientists launch face recognition-blocking glasses January 23, 2013
  10. SPIEGEL ONLINE(GER), Gesichtserkennung: Japanischer Forscher entwickelt Tarnbrille January 23, 2013
  11. Popular science, "Privacy Visor" Protects You From Facial Recognition Machines January 23, 2013
  12. Discovery News, Privacy Visor Confuses Face Recognition Camera January 23, 2013
  13. Mashable, Privacy Visor Confuses Face Recognition Camera January 24, 2013
  14. Digital Trends, Facial recognize this: Privacy visor foils computer’s ability to read your face January 24, 2013
  15. The Telegraph(UK), New 'privacy visor' thwarts Big Brother January 25, 2013
  16. smartplanet, The ‘privacy visor’ that stops surveillance in its tracks January 25, 2013
  17. AFP, Goggles fool face-recognition cameras: Japan maker January 25, 2013
  18. ACM TechNews, Privacy Visor Blocks Facial Recognition Software January 28, 2013
  19. The Japan Times, Privacy goggles fool hidden facial-recognition cameras January 29, 2013
  20. Business2Community, Privacy Concerns Spark Strange New Fashion Initiatives January 29, 2013
  21. BusinessDay, TECHNO FILE: End of the age of privacy is nigh January 30, 2013
  22. The Huffington Post, Straight Out of the Movies: Real-Life Gadgets Inspired by Film January 30, 2013
  23. Metro News(UK), Anti-paparazzi glasses use infra-red light to help you keep a low profile January 31, 2013
  24. Smithsonian.com, The Privacy Wars: Goggles That Block Facial Recognition Technology February 6, 2013
  25. 新华网, 人脸识别技术市场化 "读脸"时代隐私变透明? February 11, 2013
  26. Technology Review, Verriss des Monats: Der Gesichtsprivatisator February 18, 2013
  27. DigInfo TV, Privacy visor glasses jam facial recognition systems to protect your privacy June 19, 2013
  28. CNET, Privacy glasses screw with facial recognition systems June 19, 2013
  29. Engadget, These specs preserve your privacy in a world of cameras (video) June 19, 2013
  30. PetaPixel, These Privacy Glasses Use Infrared Light to Hide Your Face from Cameras June 19, 2013
  31. TechHive, Google Glass panic triggers rise in facial-recognition blockers June 19, 2013
  32. Gizmodo, Reclaim Your Privacy With Glowing Glasses That Foil Facial Recognition June 19, 2013
  33. Geeky Gadgets, Privacy Visor Will Stop Google Glass From Recognizing Your Face June 20, 2013
  34. FastCompany, GOGGLES BLOCK FACIAL RECOGNITION ALGORITHMS June 19, 2013
  35. NBC News, LED-powered 'privacy visor' thwarts facial recognition June 20, 2013
  36. Time, Leery of Facial Recognition? These Glasses Might Help June 20, 2013
  37. Slash Gear, Face-recognition fooling Privacy Visor disguises with light June 20, 2013
  38. The Japan Daily Press, Japanese researchers invent visor to block facial recognition algorithms June 20, 2013
  39. The Huffington Post, Block Facial Recognition With New Glasses That Ease Privacy Concern June 21, 2013
  40. FOX News, ‘Anti-Glass’ specs developed to block face recognition technology June 24, 2013
  41. Daily Mail, How to stop Google seeing you: Scientists produce 'Anti-Glass' specs that BLOCK eye-wear technology June 26, 2013
  42. TechCrunch, Tomorrow’s Surveillance: Everyone, Everywhere, All The Time June 29, 2013
  43. NY Times, Stealth Wear Aims to Make a Tech Statement June 29, 2013
  44. BBC News Technology, How to get away from everyday technology July 1, 2013
  45. BBC Mundo, Tecnología para huirle a la tecnología July 7, 2013
  46. The Huffington Post, Google Glass Captures Arrest On Camera, Sparks Controversy July 8, 2013
  47. BBC Brasil, A tecnologia para fugir da tecnologia, July 14, 2013
  48. ABC News, How To Steal Google Glasses Using Technology, August 23, 2013

2012

Refereed book chapters

  1. X. Huang, Y. Abe, and I. Echizen, "A Fast and Low-Distortion Capacity Adaptive Synchronized Acoustic-to-Acoustic Steganography Scheme," Recent Advances in Information Hiding and Applications (J. Pan, H. Huang, L. Jain, and Y. Zhao, eds.), Chapter 9, 29 pages, Springer (2012)

Refereed journal papers

  1. T. Yamada, I. Echizen, and H. Yoshiura, "PC-Based Real-Time Video Watermark Embedding System Independent of Platform for Parallel Computing," Transactions on Data Hiding and Multimedia Security, vol. 7, pp. 15-33, Springer (2012)
  2. I. Echizen, T. Yamada, and S. Gohshi, "IR Hiding: Method for Preventing Illegal Recording of Videos Based on Differences in Sensory Perception between Humans and Devices," Transactions on Data Hiding and Multimedia Security, vol. 7, pp. 34-51, Springer (2012)
  3. T. Kajiyama and I. Echizen, "A Faceted Navigation System for Helping Children Understand Features of Risky Website," International Journal of Information Processing and Management, vol. 3, no. 2, pp. 35-44 (April 2012)
  4. K. Rechert, K. Meier, R. Zahoransky, D. Wehrle, D. Suchodoletz, B. Greschbach, S. Wohlgemuth, and I. Echizen, "Reclaiming Location Privacy in Mobile Telephony Networks -Effects and Consequences for Providers and Subscribers", IEEE Systems Journal, vol. *, no. *, 11 pages (2012)

Refereed conference papers

  1. F. Murakami, K. Komoriya, R. Uda, S. Gohshi, and I. Echizen, "Preventing Surreptitious Filming by Saturation Irradiation of Infrared Rays," The Eighth International Symposium on Frontiers of Information Systems and Network Applications, Proc. of the 26th IEEE International Conference on Advanced Information Networking and Applications (AINA-2012), pp. 232-237 (March 2012)
  2. T. Yamada, S. Gohshi, and I. Echizen, "Enhancement of Method for Preventing Illegal Recording of Movies to Enable it to Detect Cameras with Attached Infrared-cut filter," Proc. of the 37th International Conference on Acoustics, Speech, and Signal Processing (ICASSP2012), pp.1825-1828 (March 2012)
  3. H. Nguyen-Son, Q. Nguyen, M. Tran, D. Nguyen, H. Yoshiura, and I. Echizen, "New Approach to Anonymity of User Information on Social Networking Services," The 6th International Symposium on Digital Forensics and Information Security (DFIS-12), Proc. of the 7th FTRA International Conference on Future Information Technology (FutureTech2012), Lecture Notes in Electrical Engineering, vol. 164, pp. 731-739, Springer (June 2012)
  4. H. Nguyen-Son, Q. Nguyen, M. Tran, D. Nguyen, H. Yoshiura, and I. Echizen, "Automatic Anonymization of Natural Languages Texts Posted on Social Networking Services and Automatic Detection of Disclosure," the 7th International Workshop on Frontiers in Availability, Reliability and Security (FARES 2012), Proc. of the International Conference on Availability, Reliability and Security (ARES 2012), pp. 358-364 (August 2012)
  5. T. Kajiyama and I. Echizen, "Evaluation of an Improved Visualization System for Helping Children Identify Risky Websites," the 2nd International Workshop on Resilience and IT-Risk in Social Infrastructures (RISI 2012), Proc. of the International Conference on Availability, Reliability and Security (ARES 2012), pp. 495-498 (August 2012)
  6. M. Hirose, T. Muraki, A. Utsumi, I. Echizen, and H. Yoshiura, "A Private Information Detector for Controlling Circulation of Private Information through Social Networks," the 2nd International Workshop on Resilience and IT-Risk in Social Infrastructures (RISI 2012), Proc. of the International Conference on Availability, Reliability and Security (ARES 2012), pp. 473-478 (August 2012)
  7. T. Hue, N. Luyen, D. Kha, S. Wohlgemuth, I. Echizen, N. Thuc, D. Thuy, "An Efficient Fine-grained Access Control Mechanism for Database Outsourcing Service," Proc. of the 2012 International Conference on Information Security and Intelligent Control (ISIC 2012), 5 pages, (August 2012)
  8. J. Munoz-Gama and I. Echizen, "Insuring Sensitive Processes through Process Mining," Proc. of the 9th IEEE International Conference on Autonomic and Trusted Computing (ATC 2012), 8 pages, (September 2012)
  9. H. Nishikawa, S. Kuse, K. Iwamura, and I. Echizen, "A method for resisting averaging attacks on digital watermarks and use of this method with digital watermarks," the third International Workshop on Trustworthy Computing, Proc. of the 15th International Conference on Network-Based Information Systems (NBiS-2012), pp. 777-781, (September 2012)
  10. T. Yamada, S. Gohshi, and I. Echizen, "Use of invisible noise signals to prevent privacy invasion through face recognition from camera images," Proc. of the ACM Multimedia 2012 (ACM MM 2012), 2 pages, (October 2012)
  11. T. Yamada, S. Gohshi, and I. Echizen, “Enhancement of method for preventing unauthorized copying of displayed information using object surface reflection,” Proc. of the 11th International Workshop on Digital-Forensics and Watermarking (IWDW 2012), LNCS, 15 pages, Springer (October 2012)
  12. H. Nguyen-Son, Q. Nguyen, M. Tran, D. Nguyen, H. Yoshiura, and I. Echizen, “Automatic Anonymous Fingerprinting of Text Posted on Social Networking Services,” Proc. of the 11th International Workshop on Digital-Forensics and Watermarking (IWDW 2012), LNCS, 15 pages, Springer (October 2012)
  13. A-T. Hoang, M-T. Tran, A-D. Duong, and I. Echizen, " An Indexed Bottom-up Approach for Publishing Anonymized Data," Third International Workshop on Trustworthy Computing, Proc. of the 8th International Conference on Computational Intelligence and Security (CIS 2012), 5 pages (November 2012)
  14. T. Yamada, S. Gohshi, and I. Echizen, “Preventing unauthorized copying of displayed information by utilizing differences in spectral sensitivity between humans and imaging devices,” Proc. of the IEEE International Workshop on Information Forensics and Security (WIFS'12), 6 pages (December 2012)

Registered patents

  1. I. Echizen, T. Yamada, N. Miura, M. Maeta, T. Mizuno: Dynamic image content tamper detecting device and system, US Patent No. 8285998(Issued: October 9, 2012)

Others

  1. NII Interview, “Psychological Reluctance to Personal Information Disclosure and Anti-Leak Technology,” NII Today, No. 41, pp. 4-5 (April 2012)
  2. NII Press Release, Privacy Protection Techniques Using Differences in Human and Device Sensitivity -Protecting Photographed Subjects against Invasion of Privacy Caused by Unintentional Capture in Camera Images- December 12, 2012
  3. NIKKEI.com, Device Fools Face Recognition System To Protect Privacy December 18, 2012

2011

Editorial

  1. G. Mueller, N. Sonehara, I. Echizen, and S. Wohlgemuth (eds.), “Sustainable Cloud Computing,” Special Issue 3/2011 of the international journal Business & Information Systems Engineering (BISE) and the German journal WIRTSCHAFTSINFORMATIK, Gabler (June 2011)

Refereed journal papers

  1. S. Haas, S. Wohlgemuth, I. Echizen, N. Sonehara and G. Mueller, “Aspects of Privacy for Electronic Health Records”, International Journal of Medical Informatics, Special Issue: Security in Health Information Systems 80(2), pp.e26-e31, Elsevier, http://dx.doi.org/10.1016/j.ijmedinf.2010.10.001 (February 2011)
  2. M. Tran, T. Nguyen, A. Duong, and I. Echizen, “Pool-Based Anonymous Communication Framework for High Performance Computing,” Journal of Supercomputing, Volume 55, Issue 2, pp.246-268, Springer (February 2011)
  3. N. Sonehara, I. Echizen, and S. Wohlgemuth, “Isolation in Cloud Computing and Privacy-Enhancing Technologies: Suitability of Privacy-Enhancing Technologies for Separating Data Usage in Business Processes,” Business Information Systems Engineering (BISE)/WIRTSCHAFTSINFORMATIK", vol. 3, no. 3, pp. 155-162, Gabler (June 2011)
  4. S. Wohlgemuth, I. Echizen, N. Sonehara, and Gunter Muller, “On Privacy-compliant Disclosure of Personal Data to Third Parties using Digital Watermarking,” Journal of Information Hiding and Multimedia Signal Processing, Vol. 2, No. 2, pp. 269-280 (July 2011)
  5. P. Hue, S. Wohlgemuth, I. Echizen, N. Thuc, and D. Thuy, “An Experimental Evaluation for a New Column ? Level Access Control Mechanism for Electronic Health Record Systems,” International Journal of u- and e- Service, Science and Technology, vol. 4, no. 3, pp. 73-86 (September 2011)

Refereed conference papers

  1. P. Hue, T. Nguyen, D. Thuc, I. Echizen, and T. Dinh, “A Mutual and Pseudo Inverse Matrix - Based Authentication Mechanism for Outsourcing Service,” Proc. of the 3rd Asian Conference on Intelligent Information and Database Systems (ACIIDS 2011), LNAI 6591, pp.119-128, Springer (April 2011)
  2. K. Rechert, S, Wohlgemuth, and I. Echizen, “User Centric Privacy in Mobile Communication Scenarios,” Proc. of the 11th IEEE/IPSJ International Symposium on Applications and the Internet (SAINT 2011), pp. 202-207 (July 2011)
  3. S. Schrittwieser, P. Kieseberg, I. Echizen, S. Wohlgemuth, and N. Sonehara. “Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of Disasters,” In International Workshop on Resilience and IT-Risk in Social Infrastructures (RISI 2011), Proc. of the 6th ARES conference (ARES 2011), IEEE Computer Society, pp. 645-649 (August 2011)
  4. T. Yamada, S. Gohshi, and I. Echizen, “Countermeasure of re-recording prevention against attack with short wavelength pass filter,” Proc. of the 2011 IEEE 18th International Conference on Image Processing (ICIP2011), pp. 2753-2756 (September 2011).
  5. P. Dhar and I. Echizen, “Robust FFT Based Watermarking Scheme for Copyright Protection of Digital Audio,” Proc. of the 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2011), pp. 181-184 (October 2011)
  6. M. Salfer, S. Wohlgemuth, S. Schrittwieser, B. Bauer, and I. Echizen, “On Completeness of Monitoring for Data Processing,” International Workshop on Resilience and ICT for Secure Open Cities (ReISOC) 2011, Proc. of the 4th IEEE International Conference on Cyber, Physical and Social Computing (October 2011)
  7. S. Schrittwieser, P. Kieseberg, I. Echizen, S. Wohlgemuth, N. Sonehara, and E. Weippl, “An Algorithm for k-anonymity-based Fingerprinting,” Proc. of the 10th International Workshop on Digital Watermarking (IWDW 2011), LNCS, 14 pages, Springer (October 2011)
  8. T. Yamada, S. Gohshi, and I. Echizen, “IR Hiding: Method to Prevent Re-recording Screen Image Built in Short Wavelength Pass Filter Detection Method using Specular Reflection,” Proc. of the 10th International Workshop on Digital Watermarking (IWDW 2011), LNCS, 14 pages, Springer (October 2011)
  9. T. Yamada, S. Gohshi, and I. Echizen, “iCabinet: Stand-alone implementation of a method for preventing illegal recording of displayed content by adding invisible noise signals,” Proc. of the ACM Multimedia 2011 (ACM MM 2011), pp. 771-772 (November 2011)
  10. T. Kajiyama and I. Echizen, “A Faceted Navigation System for Helping Children Understand Features of Risky Websites,” Proc. of the 2nd International Conference on Advancements in Computing Technology, 6 pages (November 2011)

Others

  1. NII Press Release, “Technology to prevent unauthorized copying of displays by utilizing differences in sensitivity between human beings and devices - Prevent disclosure of confidential and personal information through unauthorized copying of displays,” July 4, 2011
  2. NII Interview, “Preventing Surreptitious Filming in the Divide Between Digital and Physical,” NII Today, No. 51, pp. 2-3 (February 2011)

2010

Editorial

  1. I. Echizen, Y. Suzuki, and X. Niu (eds.), “Special Issue on Information Hiding and Multimedia Signal Processing,” International Journal of Innovative Computing, Information and Control (IJICIC), vol. 6, no. 3(B), pp. 1207-1208 (March 2010)
  2. I. Echizen, J-S. Pan, D. Fellner, A. Nouak, A. Kuijper, and L. Jain (eds.), Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2010), IEEE Computer society (October 2010)
  3. I. Echizen, N. Kunihiro, and R. Sasaki (eds.), Proceedings of the 5th International Workshop on Security (IWSEC2010), Lecture Notes in Computer Science, vol. 6434, Springer (November 2010)

Refereed book chapters

  1. A. Savoldi, P. Gubian, and I. Echizen, "Uncertainty in Live Forensics," Advances in Digital Forensics VI, the Sixth Annual IFIP WG 11.9 International Conference on Digital Forensics (IFIP ICDF 2010), Chapter 12, pp. 171-184, Springer (January 2010)

Refereed journal papers

  1. Y. Atomori, I. Echizen, and H. Yoshiura, “Picture Watermarks Surviving General Affine Transformation and Random Distortion,” International Journal of Innovative Computing, Information and Control, vol.6, no.3(B), pp.1289-1304 (March 2010)
  2. X. Huang, Y. Abe, and I. Echizen, “Capacity Adaptive Synchronized Acoustic Steganography Scheme,” Journal of Information Hiding and Multimedia Signal Processing, Vol. 1, No. 2, pp.72-90 (April 2010)
  3. S. Wohlgemuth, I. Echizen, N. Sonehara and G. Mueller, “Privacy-compliant Disclosure of Personal Data to Third Parties”, International Journal it - Information Technology 52(6), Oldenbourg, pp. 350-355 (December 2010)

Refereed conference papers

  1. M. Tran, A. Duong, and I. Echizen, “Binomial-Mix-based Location Anonymizer System with Global Dummy Generation to Preserve User Location Privacy in Location-Based Services,” Fourth International Workshop on Advances in Information Security (WAIS 2010), Proc. of the Fifth International Conference on Availability, Reliability and Security (ARES 2010), pp. 580-585 (February 2010)
  2. T. Ngoc, I. Echizen, K. Kamiyama, H. Yoshiura, “New Approach to Quantification of Privacy from Social Network Sites,” Proc. of the 24th IEEE International Conference on Advanced Information Networking and Applications (AINA 2010), pp.556-564 (April 2010)
  3. M. Tran, V. Luong, A. Duong, and I. Echizen, “Bi-Directional RPROB-Based Location Anonymizer System for Location-Based Services,” Proc. of 2010 IEEE/IFIP International Symposium on Trust, Security and Privacy for Pervasive Applications (TSP-2010), pp.971-977 (June 2010)
  4. T. Yamada, Y. Takahashi, R. Ebisawa, and I. Echizen, H. Yoshiura, “Experiment on video watermark detection system using degraded original images,” Proc. of IEEE International Conference on Industrial Informatics (INDIN 2010), pp.454-459 (July 2010)
  5. S. Wohlgemuth, I. Echizen, N. Sonehara, and G. Mueller, “Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy,” Proc. the 25th IFIP TC-11 International Information Security Conference (IFIP SEC 2010), to be published in IFIP AICT series, Springer, pp.241-252 (September 2010) <One of the best papers>
  6. T. Yamada, S. Gohshi, and I. Echizen, “Preventing re-recording based on difference between sensory perceptions of humans and devices,” Proc. of the 17th International Conference on Image Processing (ICIP 2010), pp.993-996 (September 2010)
  7. K. Kamiyama, N. Tran, I. Echizen, and H. Yoshiura, “Unified metric for measuring anonymity and privacy with application to online social network,” Proc. of 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2010), pp. 506-509 (October 2010)
  8. J. Tharaud, S. Wohlgemuth, I. Echizen, N. Sonehara, G. Mueller, and P. Lafourcade, “Privacy by Data Provenance with Digital Watermarking,” Proc. of 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2010), pp. 510-513 (October 2010)
  9. X. Huang, I. Echizen, and A. Nishimura, “A New Approach of Reversible Acoustic Steganography for Tampering Detection,” Proc. of 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2010), pp. 538-542 (October 2010)
  10. T. Yamada, S. Gohshi, and I. Echizen, “IR Hiding: A Method to Prevent Video Re-shooting by Exploiting Differences between Human Perceptions and Recording Device Characteristics,” Proc. of the 9th International Workshop on Digital Watermarking (IWDW 2010), LNCS 6526, pp.280-292, Springer (October 2010)
  11. X. Huang, A. Nishimura, and I. Echizen, “A Reversible Acoustic Steganography for Integrity verification,” Proc. of the 9th International Workshop on Digital Watermarking (IWDW 2010), LNCS 6526, pp.305-316, Springer (October 2010)
  12. K. Kamiyama, N. Tran, I. Echizen, and H. Yoshiura, “Measuring Accumulated Revelations of Private Information by Multiple Media,” Proc. of the 10th IFIP WG 6.11 Conference on e-Business, e-Service, and e-Society (IFIP I3E 2010), IFIP AICT series, vol.341, pp.70-80, Springer (November 2010)
  13. H. Dang, S. Wohlgemuth, H. Yoshiura, T. Nguyen, and I. Echizen, “Approach to Privacy-Preserve Data in Two-Tiered Wireless Sensor Network based on Linear System and Histogram,” Proc. of the 2nd International Conference on u- and e- Service, Science and Technology (UNESST 2010), Communications in Computer and Information Science, vol. 124, pp.14-30, Springer (December 2010)
  14. P. Hue, S. Wohlgemuth, I. Echizen, T. Bich, and T. Dinh, “Fine-grained Access Control for Electronic Health Record Systems,” Proc. of the 2nd International Conference on u- and e- Service, Science and Technology (UNESST 2010), Communications in Computer and Information Science, vol. 124, pp.31-38, Springer (December 2010)

Others

  1. S. Wohlgemuth, I. Echizen, N. Sonehara and G. Mueller, “Privacy in Business Processes ? On Enforcement of Privacy Policies regarding Usage of Personal Data,” Journal of the Japan Society for Security Management (JSSM), Vol.24,No.2 , pp.21-30 (September 2010)

2009

Refereed book chapters

  1. I. Echizen, Y. Atomori, S. Nakayama, and H. Yoshihura, “Dual-plane Correlation-based Video Watermarking for Immunity to Rotation, Scale, Translation, and Random Distortion,” Information Hiding and Applications (J. Pan, H. Huang, and L. Jain, eds.), Chapter 2, pp. 21-46, Springer, (July 2009)

Refereed journal papers

  1. T. Yamada, Y. Takahashi, Y. Fujii, R. Ebisawa, H. Yoshiura and I. Echizen, “Integrity Verification Method for Video Content Using Robust Watermarking,” International Journal of Knowledge-based and intelligent Engineering Systems (IOS Press), Vol. 13, No.3,4, pp.141-153 (December 2009)

Refereed conference papers

  1. S. Wohlgemuth, G. Muller, N. Sonehara, I. Echizen, “On Observable Delegation of Personal Data by Watermarking,” Proc. of 5th IEEE Workshop on DRM Impact on Consumer Communications: CCNC 2009, pp. 1-5, (January 2009)
  2. X. Huang, I. Echizen, and Y. Abe, “Evaluation of Synchronized Significant Multi-bits Acoustic Steganography Method,” Proc. of AES 14th Regional Convention 2009, pp. 1-11, in CD-ROM, (May 2009)
  3. S. Wohlgemuth, I. Echizen, N. Sonehara, and G. Mueller, “On Privacy in Business Processes - Observing Delegation of Personal Data by Using Digital Watermarking,” Proc. of International Conference on e-Business (ICE-B 2009), pp. 27-32, (July 2009)
  4. A. Savoldi, P. Gubian, and I. Echizen, “How to Deal with Blurriness in Live Forensics: A Case of Study,” Proc. of 5th International Joint Conference on INC, IMS and IDC (NCM2009), pp. 25-28, (August 2009)
  5. M. Tran, A. Duong, and I. Echizen, “XPROB - A Generalized Pool-Based Anonymous Communication Framework,” Proc. of 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2009), pp. 52-55 (September 2009)
  6. S. Wohlgemuth, N. Sonehara, G. Mueller, I. Echizen, “On Privacy-aware Delegation of Personal Data using Digital Watermarking,” Proc. of 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2009), pp. 56-59 (September 2009)
  7. S. Nakayama, I. Echizen, and H. Yoshiura, “Preventing False Positives in Content-Based Phishing Detection,” Proc. of 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2009), pp. 48-51 (September 2009)
  8. A. Savoldi, P. Gubian, and I. Echizen, “A Comparison between Windows Mobile and Symbian S60 Embedded Forensics,” Proc. of 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2009), pp. 546-550 (September 2009)
  9. M. Tran, A. Duong, and I. Echizen, “RPROB - A Family of Binomial-Mix-based Anonymous Communication Systems,” Proc. of 2009 IEEE/IFIP International Symposium on Trust, Security and Privacy for Pervasive Applications (TSP-09), pp. 765-770 (October 2009)
  10. S. Haas, S. Wohlgemuth, I. Echizen, N. Sonehara, and G. Mueller, “On Privacy in Medical Services with Electronic Health Records,” Proc. of International Medical Informatics Association WG4 Security in Health Information Systems (IMIA SiHIS 2009), pp. 1-9, in CD-ROM (November 2009) <Gerd Griesser Award>

Registered patents

  1. I. Echizen, H. Yoshiura, K. Miyazaki, K. Anzai, J. Taguchi, K. Nakano, K. Okeya: Method and system for contents control, 米国特許7478432号(2009/01/13登録)
  2. Y. Fujii, K. Nakano, I. Echizen, H. Yoshiura: Method of watermarking for binary images, 米国特許7499565号(2009/03/03登録)
  3. I. Echizen, T. Arai, H. Kimura, T. Yamada, Y. Fujii: System and method for controlling contents by plurality of pieces of control information, US Patent No.7577843 (Issued: 2009/08/18)

Before 2009

Refereed book chapters

  1. I. Echizen, Y. Fujii, T. Yamada, S. Tezuka, and H. Yosihura, "Adaptive Embedding and Detection for Improved Video Watermarking," Intelligent Multimedia Data Hiding (J. Pan, W. Fang, H. Huang, and L. Jain, eds.), Chapter 7, pp. 157-187, Springer, (June 2007)
  2. T. Yamada, I. Echizen, S. Tezuka, H. Yoshiura, and N. Komada, "Evaluation of PC-based real-time watermarking system for long-term video preservation, in Long-Term and Dynamical Aspects of Information Security," Emerging Trends in Information and Communication Security (A. Schmidt, M. Kreutzer, and R. Accorsi, eds.), Chapter 6, pp. 73-85, Nova Science Publishers, (June 2007)
  3. T. Yamada, Y. Takahashi, H. Yoshiura, and I. Echizen, "Evaluation of PC-based Real-Time Watermark Embedding System for Standard-Definition Video stream," New Directions in Intelligent Interactive Multimedia (G. Tsihrintzis, M. Virvou, R. Howlett, and L. Jain Eds.), pp. 331-340, Springer, (July 2008)
  4. T. Yamada, Y. Takahashi, Y. Fujii, R. Ebisawa, H. Yoshiura, and I. Echizen, "Evaluation of Integrity Verification System for Video Content Using Digital Watermarking," New Directions in Intelligent Interactive Multimedia (G. Tsihrintzis, M. Virvou, R. Howlett, and L. Jain Eds.), pp. 363-372, Springer, (July 2008)

Refereed journal papers

  1. I. Echizen, H. Yoshiura, T. Arai, H. Kimura, and T. Takeuchi, “General Quality Maintenance Module for Motion Picture Watermarking,” IEEE Trans. Consumer Electronics, Vol. 45, No. 4, pp. 1150-1158 (November 1999)
  2. I. Echizen, H. Yoshiura, K. Anzai, J. Taguchi, K. Nakano, and S. Tezuka, “Improved Video Watermarking for MPEG Encoders Using Motion Analysis,” Journal of the Institute of Image Information and Television Engineers, Vol. 58, No. 2, pp. 233-242 (February 2004)
  3. H. Yoshiura and I. Echizen, “Color Picture Watermarking Correlating Two Constituent Planes for Immunity to Random Geometric Distortion,” IEICE Trans. on Information & Systems, Vol. E87-D, No. 9, pp. 2239-2252 (September 2004)
  4. I. Echizen, Y. Fujii, T. Yamada, S. Tezuka, and H. Yoshiura, “Perceptually Adaptive Video Watermarking Using Motion Estimation,” International Journal of Image and Graphics, Vol. 5, No. 1, pp. 89-109, World Scientific (January 2005)
  5. H. Yoshiura and I. Echizen, “Maintaining Picture Quality and Improving Robustness of Color Watermarking by Using Human Vision Models,” IEICE Trans. on Information & Systems, Vol. E89-D, No. 1, pp. 256-270 (January 2006)
  6. I. Echizen, Y. Fujii, T. Yamada, S. Tezuka, and H. Yoshiura, “Use of Statistically Adaptive Accumulation to Improve Video Watermark Detection,” Online version: IPSJ Digital Courier, Vol. 2, pp. 537-550, Paper version: IPSJ Journal, Vol.47, No. 8, pp. 2440-2453 (August 2006)
  7. I. Echizen, Y. Atomori, S. Nakayama, and H. Yoshiura, “Use of Human Visual System to Improve Video Watermarking for Immunity to Rotation, Scale, Translation, and Random Distortion,” Circuits, Systems and Signal Processing (CSSP), vol.27, no.2, pp. 213-227 (April 2008)
  8. Y. Atomori, I. Echizen, M. Dainaka, S. Nakayama, and H. Yoshiura, “Robust Video Watermarking based on Dual-plane Correlation for Immunity to Rotation, Scale, Translation, and Random Distortion,” Journal of Digital Information Management, vol.6, no.2, pp. 161-167 (April 2008)

Refereed conference papers

  1. H. Yoshiura, I. Echizen, T. Arai, H. Kimura, and T. Takeuchi, "VSP: A Digital Watermark Method for Motion Picture Copyright Protection," Proc. of 1998 IEEE International Conference on Consumer Electronics (ICCE 1998), pp. 338-339 (June 1998)
  2. H. Yoshiura, I. Echizen, T. Arai, H. Kimura, and T. Takeuchi, "General Quality-Maintenance Module for Motion Picture Watermarking," Proc. of 1999 IEEE International Conference on Consumer Electronics (ICCE 1999), pp. 98-99 (June 1999)
  3. H. Yoshiura, I. Echizen, K. Anzai, J. Taguchi, and K. Nakano, "Improved Video Watermarking for MPEG Encoders Using Motion Analysis," Proc. of 2002 IEEE International Conference on Consumer Electronics (ICCE 2002), pp. 14-15 (June 2002)
  4. H. Yoshiura, I. Echizen, K. Anzai, K. Nakano, and Y. Fujii, "Reliable Detection of Video Watermarks Using Inferential Statistics," Proc. of 2003 IEEE International Conference on Consumer Electronics (ICCE 2003), pp. 60-61 (June 2003)
  5. I. Echizen, H. Yoshiura, Y. Fujii, and S. Tezuka, "Use of Motion Estimation to Improve Video Watermarking for MPEG Encoders," Proc. of International Workshop on Digital Watermarking (IWDW 2003), Lecture Notes in Computer Science Vol. 2939, pp. 184-199, Springer, (October 2003)
  6. T. Yamada, Y. Fujii, I. Echizen, K. Tanimoto, and S. Tezuka, "Print Traceability Systems Framework using Digital Watermarks for Binary Images," Proc. of IEEE International Conference on Systems, Man and Cybernetics (SMC 2004), pp. 3285-3290, (October 2004)
  7. Y. Fujii, I. Echizen, T. Yamada, S. Tezuka, and H. Yoshiura, "Error Correction of Statistically Unstable Signals in Consumer Wireless Network," Proc. of 2005 IEEE International Conference on Consumer Electronics (ICCE 2005), pp. 171-172 (January 2005)
  8. I. Echizen, H. Yoshiura, Y. Fujii, T. Yamada, and S. Tezuka, "Use of Inferential Statistics to Estimate Error Probability of Video Watermarks," Proc. of Security and Watermarking of Multimedia Contents VII, SPIE, Vol. 5681, pp. 391-399 (January 2005)
  9. T. Yamada, Y. Fujii, S. Tezuka, I. Echizen, and N. Komada, "Watermarking Application System for Map Content Distribution," Proc. of 2005 IRMA International Conference (IRMA 2005), pp.618-621, (May 2005)
  10. I. Echizen, Y. Fujii, T. Yamada, S. Tezuka, and H. Yoshiura, "Correlation-Based Model of Color Picture Watermarking against Random Geometric Distortion," Proc. of IEEE International Conference on Multimedia & Expo (ICME 2005), in CD-ROM, (July 2005)
  11. I. Echizen, Y. Fujii, T. Yamada, S. Tezuka, and H. Yoshiura, "Improved Video Watermark Detection Using Statistically-Adaptive Accumulation," Proc. of Knowledge-Based Intelligent Information and Engineering Systems: 9th International Conference (KES 2005), Lecture Notes in Computer Science Vol. 3684, pp. 300-308, Springer, (September 2005)
  12. I. Echizen, T. Yamada, Y. Fujii, S. Tezuka, and H. Yoshiura, "Real-time video watermark embedding system using software on personal computer," Proc. of IEEE International Conference on Systems, Man and Cybernetics (SMC 2005), pp. 3369-3373, (October 2005)
  13. T. Yamada, I. Echizen, S. Tezuka, H. Yoshiura, and N. Komada, "Evaluation of real-time video watermarking system on a commodity PC," Proc. of International Workshop on Long-Term Security (in conjunction with ETRICS2006), http://www.etrics.org/workshop-4_lts.php, (June 2006)
  14. I. Echizen, K. Tanimoto, T. Yamada, M. Dainaka, S. Tezuka, and H. Yoshiura, "PC-based real-time watermark embedding system with standard video interface," Proc. of IEEE International Conference on Systems, Man and Cybernetics (SMC 2006), pp. 267-271, (October 2006)
  15. I. Echizen, S. Singh, T. Yamada, K. Tanimoto, and S. Tezuka, "Integrity Verification System For Video Content By Using Digital Watermarking," Proc. of IEEE International Conference Service Systems and Service Management (IEEE/SSSM'06), pp. 1619-1624, (October 2006)
  16. I. Echizen, T. Yamada, S. Tezuka, S. Singh, and H. Yoshiura, "Improved Video Verification Method Using Digital Watermarking," Proc. of IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2006), pp. 445-448, (December 2006). <Best Paper Award>
  17. M. Dainaka, S. Nakayama, I. Echizen, and H. Yoshiura, "Dual-plane watermarking for Color Pictures Immune to Rotation, Scale, Translation, and Random Bending," Proc. of IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2006) , pp. 93-96, (December 2006).
  18. H. Tanaka, S. Sasaki, I. Echizen, and H. Yoshiura, "Secure Generation of Digital Signature on Compromised Computer," Proc. of IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2007), pp. 12-15, (November 2007)
  19. I. Echizen, Y. Atomori, S. Nakayama, and H. Yoshiura, "HVS-Based Robust Video Watermarking with Dual-plane Correlation," Proc. of IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2007), pp. 20-24, (November 2007)
  20. R. Ebisawa, Y. Fujii, T. Yamada, S. Tezuka, and I. Echizen, "Use of Gap-Filling Operation to Enhance Image Quality of Binary Image Watermarking," Proc. of IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2007), pp. 25-28, (November 2007)
  21. T. Endo, I. Echizen, and H. Yoshiura, "Electronic Voting Scheme to Maintain Anonymity in Small-scale Election by Hiding the Number of Votes," Second International Workshop on Advances in Information Security (WAIS 2008), Proc. of the Third International Conference on Availability, Reliability and Security (ARES 2008), pp. 1287-1293, (March 2008)
  22. Yusuke Atomori, I. Echizen, and Hiroshi Yoshiura, "Picture Watermarks Surviving General Affine Transformation and Random Distortion," Proc. of IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2008), pp. 315-318, (August 2008)
  23. S. Kaneko, I. Echizen, and H. Yoshiura, "Evaluation and Improvement of Digital Watermarking Algorithm based on Cryptographic Security Models," Proc. of International Workshop on Digital Watermarking (IWDW 2008), Lecture Notes in Computer Science vol. 5450, pp. 401-418, Springer, (November 2008)
  24. M. Tran, T. Nguyen, and I. Echizen, "Pool-based APROB Channel to Provide Resistance against Global Active Adversary under Probabilistic Real-Time Condition," Proc. of 2008 IEEE/IFIP International Symposium on Trust, Security and Privacy for Pervasive Applications (TSP-08), pp. 257-263, (December 2008)

Registered patents

  1. K. Nakano, J. Taguchi, H. Yoshiura, I. Echizen, Y. Kurosu: Method of authenticating digital-watermark pictures, US Patent No.6418232 (Issued: 2002/07/09)
  2. I. Echizen, H. Yoshiura, K. Anzai, Y. Kurosu: Method of extracting digital watermark information and method of judging bit value of digital watermark information, US Patent No.6456727 (Issued: 2002/09/24)
  3. I. Echizen, H. Yoshiura, K. Anzai, Y. Kurosu: Method of extracting digital watermark information and method of judging bit value of digital watermark information, US Patent No.6563935 (Issued: 2003/05/13)
  4. J. Taguchi, H. Yoshiura, I. Echizen, A. Maeda, T. Arai, T. Takeuchi: Digital watermark image processing method, US Patent No.6584210 (Issued: 2003/06/24)
  5. I. Echizen, H. Yoshiura, K. Anzai, Y. Kurosu: Method of extracting digital watermark information and method of judging bit value of digital watermark information, US Patent No.6650763 (Issued: 2003/11/18)
  6. I. Echizen, H. Yoshiura, R. Sasaki, S. Harano, S. Eikawa: Digital watermark data embedding method, and digital watermark data embeddability analyzing method, US Patent No.7047412 (Issued: 2006/05/16), Korea Patent No.409164 (Issued: 2003/11/28), China Patent No.1117314.9 (Issued: 2005/03/16)
  7. H. Yoshiura, I. Echizen, T. Arai, H. Kimura, T. Takeuchi, Y. Moriyama, K. Sugaya, A. Ogino: Control method and apparatus for embedding information in data, US Patent No.6711276 (Issued: 2004/03/23), Canada Patent No.2291383 (Issued: 2004/01/20), Australia Patent No.735422 (Issued: 2001/10/18), Taiwan Patent No.141791 (Issued: 2002/01/24), Vietnam Patent No.2837 (Issued: 2002/07/01), Korea Patent No.384959 (Issued: 2003/05/10), Russia Patent No.2219582 (Issued: 2003/12/20), China Patent No.99127723.6 (Issued: 2005/04/06), Hong Kong Patent No.1030706 (Issued: 2005/07/29), Singapore Patent No.80664 (Issued: 2005/03/31)
  8. H. Yoshiura, I. Echizen, J. Taguchi, H. Kimura, A. Maeda, T. Arai, T. Takeuchi: Method and system for embedding information into contents, US Patent No.6826291 (Issued: 2004/11/30), EU Patent No.901274 (Issued: 2004/04/07), Korea Patent No.332033 (Issued: 2002/03/27)
  9. I. Echizen, H. Yoshiura, M. Nakamura, T. Arai, T. Takeuchi: Water-mark embedding method and system, US Patent No.6728408(Issued: 2004/04/27), EU Patent No.901102 (Issued: 2004/11/24), Korea Patent No.282752 (Issued: 2000/11/30)
  10. I. Echizen, H. Yoshiura, R. Sasaki, S. Harano, S. Eikawa: Contents rendering control method, contents reproducing equipment, and contents distribution equipment, US Patent No.6865677 (Issued: 2005/03/08)
  11. I. Echizen, H. Yoshiura, Y. Kurosu, K. Anzai: Method of extracting digital watermark information and method of judging bit value of digital watermark information, US Patent No.6970575 (Issued: 2005/11/29)
  12. S. Itoh, K. Miyazaki, I. Echizen: Network system enabling transmission control, US Patent No.7047407 (Issued: 2006/05/16)
  13. K. Anzai, I. Echizen, H. Yoshiura, S. Eikawa: Method for embedding information and extracting the same, US Patent No.7065226 (Issued: 2006/06/20)
  14. I. Echizen, H. Yoshiura, H. Kimura, A. Fukushima, K. Anzai: Watermark information detection method, US Patent No.7113613 (Issued: 2006/09/26)
  15. H. Ukai, S. Hirasawa, K. Anzai, I. Echizen, H. Yoshiura, M. Okayama, S. Tago: Method and apparatus for using contents, US Patent No.7293294(Issued: 2007/11/06)
  16. K. Anzai, I. Echizen, H. Yoshiura: Method of detecting digital watermark information, US Patent No.7310428(Issued: 2007/12/18)

Go to top of page