• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
19982011

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2011

    An authentication system using smart phones as secure storage

    Umezawa, K., Tezuka, S. & Hirasawa, S., 2011 Dec 23, 2011 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2011 - Conference Digest. p. 415-420 6 p. 6083701. (Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2008

    A study on an authentication infrastructure between terminal and ASP for next generation telematics

    Umezawa, K., Susaki, S., Kashiyama, M. & Tezuka, S., 2008 Dec 1, Proceedings - 2008 8th International Conference on Intelligent Transport System Telecommunications, ITST 2008. p. 67-71 5 p. 4740229. (Proceedings - 2008 8th International Conference on Intelligent Transport System Telecommunications, ITST 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • A study on user authentication infrastructure for next generation telematics

    Umezawa, K., Susaki, S., Kashiyama, M. & Tezuka, S., 2008 Dec 1, Proceedings of the 2008 IEEE International Conference on Vehicular Electronics and Safety, ICVES 2008. p. 38-44 7 p. 4640865. (Proceedings of the 2008 IEEE International Conference on Vehicular Electronics and Safety, ICVES 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Information embedding method for home printing of certifications

    Takahashi, Y., Yamada, T., Ebisawa, R., Fujii, Y. & Tezuka, S., 2008 May 28, 10th International Conference on Advanced Communication Technology, ICACT 2008 - Proceedings. p. 2116-2120 5 p. 4494206. (International Conference on Advanced Communication Technology, ICACT; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • 2007

    Use of gap-filling operation to enhance image quality of binary image watermarking

    Ebisawa, R., Fujii, Y., Yamada, T., Tezuka, S. & Echizen, I., 2007 Dec 1, Proceedings - 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007.. p. 25-28 4 p. 4457645. (Proceedings - 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007.; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • 2006

    Evaluation of digital watermarking system for vector map content distribution

    Yamada, T., Fujii, Y., Tezuka, S. & Komoda, N., 2006 Jan 1, Proceedings - ICSSSM'06: 2006 International Conference on Service Systems and Service Management. IEEE Computer Society, p. 1637-1642 6 p. 4114737. (Proceedings - ICSSSM'06: 2006 International Conference on Service Systems and Service Management; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Improved video verification method using digital watermarking

    Echizen, I., Yamada, T., Tezuka, S., Singh, S. & Yoshiura, H., 2006 Jan 1, Proceedings - 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2006. IEEE Computer Society, p. 445-448 4 p. 4041757. (Proceedings - 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Integrity verification system for video content by using digital watermarking

    Echizen, I., Singh, S., Yamada, T., Tanimoto, K., Tezuka, S. & Huet, B., 2006 Jan 1, Proceedings - ICSSSM'06: 2006 International Conference on Service Systems and Service Management. IEEE Computer Society, p. 1619-1624 6 p. 4114734. (Proceedings - ICSSSM'06: 2006 International Conference on Service Systems and Service Management; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • PC-based real-time watermark embedding system with standard video interface

    Echizen, I., Tanimoto, K., Yamada, T., Dainaka, M., Tezuka, S. & Yoshiura, H., 2006 Jan 1, 2006 IEEE International Conference on Systems, Man and Cybernetics. Institute of Electrical and Electronics Engineers Inc., p. 267-271 5 p. 4273840. (Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • 2005

    Correlation-based model of color picture watermarking against random geometric distortion

    Echizen, I., Fujii, Y., Yamada, T., Tezuka, S. & Yoshiura, H., 2005 Dec 1, IEEE International Conference on Multimedia and Expo, ICME 2005. p. 213-216 4 p. 1521398. (IEEE International Conference on Multimedia and Expo, ICME 2005; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Improved video watermark detection using statistically-adaptive accumulation

    Echizen, I., Fujii, Y., Yamada, T., Tezuka, S. & Yoshiura, H., 2005 Jan 1, Knowledge-Based Intelligent Information and Engineering Systems - 9th International Conference, KES 2005, Proceedings. Springer Verlag, p. 300-308 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3684 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2004

    Print traceability systems framework using digital watermarks for binary images

    Yamada, T., Fujii, Y., Echizen, I., Tanimoto, K. & Tezuka, S., 2004 Dec 1, 2004 IEEE International Conference on Systems, Man and Cybernetics, SMC 2004. p. 3285-3290 6 p. (Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics; vol. 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • 2001

    Authenticating web-based virtual shops using signature-embedded marks – A practical analysis

    Yoshiura, H., Shigematsu, T., Susaki, S., Saitoh, T., Toyoshima, H., Kurita, C., Tezuka, S. & Sasaki, R., 2001, Security Protocols - 8th International Workshop, Revised Papers. Christianson, B., Malcolm, J. A., Crispo, B. & Roe, M. (eds.). Springer Verlag, p. 238-248 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2133).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2000

    Internet-Marks: The secure seal for WWW site authentication

    Honjo, S., Susaki, S., Yoshiura, H., Aoshima, H., Tezuka, S., Sasaki, R., Saito, T. & Toyoshima, H., 2000 Jan 1, Proceedings - 7th International Conference on Parallel and Distributed Systems: Workshops. Shibata, Y. (ed.). Institute of Electrical and Electronics Engineers Inc., p. 393-398 6 p. 884657. (Proceedings - 7th International Conference on Parallel and Distributed Systems: Workshops).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • INTERNET-MARKs: Clear, secure, and portable visual marks for the cyber worlds

    Yoshiura, H., Susaki, S., Nagai, Y., Saitoh, T., Toyoshima, H., Sasaki, R. & Tezuka, S., 2000, Security Protocols - 7th International Workshop, Proceedings. Christianson, B., Malcolm, J. A., Crispo, B. & Roe, M. (eds.). Springer Verlag, p. 195-202 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1796).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Seamless object authentication in different security policy domains

    Tezuka, S., Sasaki, R. & Kataoka, M., 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, HICSS 2000. IEEE Computer Society, (Proceedings of the Annual Hawaii International Conference on System Sciences; vol. 2000-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Seamless Object Authentication in different security policy domains

    Tezuka, S., Sasaki, R. & Kataoka, M., 2000 Jan 1, Proceedings of the Hawaii International Conference on System Sciences. IEEE, 1 p. (Proceedings of the Hawaii International Conference on System Sciences).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)