Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Morizumi, Tetsuya"'
Autor:
Kinoshita Hirotsugu, Morizumi Tetsuya
Publikováno v:
2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC).
Publikováno v:
COMPSAC
Perceptual hashing generates a message digest based on the image content of the human visual system, and differs from the cryptographic hash function that generates the hash value based on each bit of the image file. We apply perceptual hashing to di
Autor:
Kinoshita, Hirotsugu, Sano, Kenji, Noto, Masato, Morizumi, Tetsuya, Miyata, Sumiko, Komatsu, Daisuke
Publikováno v:
非文字資料研究 = The study of nonwritten cultural materials. 14:29-33
Departmental Bulletin Paper
第三期共同研究活動報告
第三期共同研究活動報告
Publikováno v:
2019 Third World Conference on Smart Trends in Systems Security and Sustainablity (WorldS4).
In our previous study, we found three requirements for digital watermarking. The first is that to prevent watermark information of an image from being diverted to other images, this information must be generated based on the original image. The secon
Autor:
Morizumi, Tetsuya
Publikováno v:
非文字資料研究センター News Letter. (36):21-23
Departmental Bulletin Paper
研究エッセイ
研究エッセイ
Autor:
Morizumi Tetsuya, Kinoshita Hirotsugu
Publikováno v:
COMPSAC (2)
Various pieces of personal information are correlated to the My Number program, which establishes national identification numbers that are unique to each citizen and resident of Japan. Hence, its protection is paramount. However, whereas the aim of c
Publikováno v:
International Journal of Electronic Commerce Studies. 3:305-324
How should an individual contribute to the public good? Conversely, how does the public help the individual? We should analyze and alleviate conflicts in community clouds. Covert channels in the access matrix are caused by conflicts between public va
Publikováno v:
COMPSAC Workshops
The My Number program is a national identification number in Japan that will be introduced next year. Various personal information is correlated to the personal number of this program. Hence, its protection is paramount. However, whereas the aim of c