Isao Echizen

Last updated: Oct 20, 2014 at 13:34
 
Avatar
Name
Isao Echizen
E-mail
iechizennii.ac.jp
URL
http://research.nii.ac.jp/~iechizen/official/index-e.html

Awards & Honors

 
Nov 2012
Best Poster Award, the 7th International Workshop on Security (IWSEC12)
 
Nov 2011
Best Poster Award, International Workshop on Security (IWSEC) 2011
Winner: Takayuki Yamada, Seiichi Gohshi, and Isao Echizen
 
Dec 2006
IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Best paper award
Winner: I. Echizen, T. Yamada, S. Tezuka, S. Singh, H. Yoshiura
 

Published Papers

 
Subjective assessment of HDTV with superresolution function
S. Gohshi, T. Hiroi, and I. Echizen
EURASIP Journal on Image and Video Processing   2014    Mar 2014   [Refereed]
An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata
P. Kieseberg, S. Schrittwieser, M. Mulazzani, I. Echizen
Electronic Markets      2014   [Refereed]
Effective Fingerprinting Codes for Database
T. Bui, B. Nguyen, T. Nguyen, N. Sonehara, and I. Echizen
Workshop on Dependable and Trustworthy Web and Distributed System (DTWD2013), Proc. of the 9th International Conference on Signal Image Technology & Internet Based Systems (SITIS2013)      Dec 2013   [Refereed]
Settings of Access Control by Detecting Privacy Leaks in SNS
S. Machida, S. Shimada, and I. Echizen
Workshop on Dependable and Trustworthy Web and Distributed System (DTWD2013), Proc. of the 9th International Conference on Signal Image Technology & Internet Based Systems (SITIS2013)      Dec 2013   [Refereed]
Robust Fingerprinting Codes for Database
T. Bui, B. Nguyen, T. Nguyen, N. Sonehara, and I. Echizen
Proc. of the 13th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP-2013)   LNCS(Springer)    Dec 2013   [Refereed]
A Color Extraction Method from Text for Use in Creating a Book Cover Image that Reflects Reader Impressions
T. Iida, T. Kajiyama, N. Ouchi, and I. Echizen
7th Workshop “Emotion and Computing -Current Research and Future Impact, Proc. of the 8th International Conference on Knowledge, Information and Creativity Support Systems (KICSS2013)   LNCS(Springer)    Nov 2013   [Refereed]
Anonymizing Temporal Phrases in Natural Language Text to be Posted on Social Networking Services
H-Q. Nguyen-Son, A-T. Hoang, M-T. Tran, H. Yoshiura, N. Sonehara, and I. Echizen
Proc. of the 12th International Workshop on Digital-Forensics and Watermarking (IWDW 2013)   LNCS(Springer)    Oct 2013   [Refereed]
Detecting Traitors in Re-Publishing Updated Datasets
A-T. Hoang, H-Q. Nguyen-Son, M-T. Tran, and I. Echizen
Proc. of the 12th International Workshop on Digital-Forensics and Watermarking (IWDW 2013)   LNCS(Springer)    Oct 2013   [Refereed]
Reversible audio watermarking based on integer DCT coefficients with adaptive hiding locations
Xuping Huang, Nobutaka Ono, Isao Echizen and Akira Nishimura
Proc. of the 12th International Workshop on Digital-Forensics and Watermarking (IWDW 2013)   LNCS(Springer)    Oct 2013   [Refereed]
Evaluation of privacy visor for preventing face recognition from camera images
T. Yamada, S. Gohshi, and I. Echizen
Proc. of the 2013 International Workshop on Smart Info-Media Systems in Asia (SISA2013)   128-133   Oct 2013   [Refereed]
Privacy Visor: Method based on Light Absorbing and Reflecting Properties for Preventing Face Image Detection
T. Yamada, S. Gohshi, and I. Echizen
Proc. of the 2013 IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC 2013)      Oct 2013   [Refereed]
Framework based on Privacy Policy Hiding for Preventing Unauthorized Face Image Processing
A. Dabrowski, E. Weippl, and I. Echizen
Proc. of the 2013 IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC 2013)      Oct 2013   [Refereed]
How can we acquire the most common query types in Two-tiered Wireless Sensor Networks?
T. Bui, V. Dang, I. Echizen, and T. Nguyen
Proc. of the 7th International Conference on Next Generation Mobile Apps, Services and Technologies (NGMAST 2013)   Proc. of the 7th International Conference on Next Generation Mobile Apps, Services and Technologies (NGMAST 2013)    Sep 2013   [Refereed]
Privacy Visor: Method for Preventing Face Image Detection by Using Differences in Human and Device Sensitivity
T. Yamada, S. Gohshi, and I. Echizen
Proc. of the 14th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security (CMS 2013)   short paper(LNCS 8099) 152-161   Sep 2013   [Refereed]
Securing Access to Complex Digital Artifacts - Towards a Controlled Processing Environment for Digital Research Data
J. Latocha, K. Rechert, and I. Echizen
Proc. of the 17th International Conference on Theory and Practice of Digital Libraries (TPDL 2013)      Sep 2013   [Refereed]
Anonymizing Face Images by Using Similarity-Based Metric
T. Muraki, S. Oishi, M. Ichino, I. Echizen, and H. Yoshiura
the 3rd International Workshop on Resilience and IT-Risk in Social Infrastructures (RISI 2013)   517-524   Sep 2013   [Refereed]
Predictive Notification Service of Privacy Invasion on Posting Pictures to SNS
S. Shimada and I. Echizen
Proc. of The 37th Annual International Computer Software & Applications Conference      Jul 2013   [Refereed]
Limitations of Super Resolution Image Reconstruction and How to Overcome them for a Single Image
S. Gohshi and I. Echizen
Proc. of the 10th International Conference on Signal Processing and Multimedia Applications (SIGMAP 2013)      Jul 2013   [Refereed]
Reclaiming Location Privacy in Mobile Telephony Networks -Effects and Consequences for Providers and Subscribers
K. Rechert, K. Meier, R. Zahoransky, D. Wehrle, D. Suchodoletz, B. Greschbach, S. Wohlgemuth, and I. Echizen
IEEE Systems Journal   7(2) 211-222   Jun 2013   [Refereed]
Coupons as Monetary Incentives in Participatory Sensing
I. Krontiris, A. Albers, N. Sonehara, and I. Echizen
Proc. of The 12th IFIP Conference on e-Business, e-Services, e-Society (I3E 2013)      Apr 2013   [Refereed]

Books etc

 
Dual-plane Correlation-based Video Watermarking for Immunity to Rotation, Scale, Translation, and Random Distortion, in Artificial Intelligence in Multimedia Data Hiding
I. Echizen, Y. Atomori, S. Nakayama, and H. Yoshihura
Springer   Dec 2009   
Long-Term and Dynamical Aspects of Information Security "A. Schmidt, M. Kreutzer, and R. Accorsi, eds"
T. Yamada, I. Echizen, S. Tezuka
Nova Publishers   Oct 2007   ISBN:1600219128
Intelligent Multimedia Data Hiding "J. Pan, W. Fang, H. Huang, and L. Jain, eds"
I. Echizen, Y. Fujii, T. Yamada, S. Tezuka, and H. Yosihura
Springer-Verlag   Jun 2007   ISBN:3540711686