Keyword : privacy protection


Privacy Protection for Social Video via Background Estimation and CRF-Based Videographer's Intention Modeling
Yuta NAKASHIMA Noboru BABAGUCHI Jianping FAN 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/04/01
Vol. E99-D  No. 4 ; pp. 1221-1233
Type of Manuscript:  PAPER
Category: Image Recognition, Computer Vision
Keyword: 
intentionally captured personconditional random fieldbackground estimationprivacy protectionsocial video
 Summary | Full Text:PDF(4MB)

Protection and Utilization of Privacy Information via Sensing
Noboru BABAGUCHI Yuta NAKASHIMA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2015/01/01
Vol. E98-D  No. 1 ; pp. 2-9
Type of Manuscript:  INVITED PAPER (Special Section on Enriched Multimedia)
Category: 
Keyword: 
privacy informationsensingvisual abstractionprivacy protectioninformation disclosure and utilization
 Summary | Full Text:PDF(6.4MB)

Sunshine-Change-Tolerant Moving Object Masking for Realizing both Privacy Protection and Video Surveillance
Yoichi TOMIOKA Hikaru MURAKAMI Hitoshi KITAZAWA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2014/09/01
Vol. E97-D  No. 9 ; pp. 2483-2492
Type of Manuscript:  PAPER
Category: Image Recognition, Computer Vision
Keyword: 
privacy protectionvideo surveillancebackground subtractionReal AdaBoostsunshine change
 Summary | Full Text:PDF(3.1MB)

An Image Trading System Using Amplitude-Only Images for Privacy- and Copyright-Protection
Shenchuan LIU Masaaki FUJIYOSHI Hitoshi KIYA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/06/01
Vol. E96-A  No. 6 ; pp. 1245-1252
Type of Manuscript:  Special Section PAPER (Special Section on Circuit, System, and Computer Technologies)
Category: 
Keyword: 
amplitude-only imagesphase-only imagescopyright protectionprivacy protectiondigital fingerprintingdata hiding
 Summary | Full Text:PDF(3.6MB)

Improving User's Privacy for Multi-Authority ABE Using Privacy Homomorphism
Ang GAO Zeng-Zhi LI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/03/01
Vol. E96-A  No. 3 ; pp. 724-727
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
privacy protectionprivacy homomorphismattribute-based encryptionmulti-authority
 Summary | Full Text:PDF(154.2KB) | Errata[Uploaded on April 1,2013]

An Efficient and Secure Service Discovery Protocol for Ubiquitous Computing Environments
Jangseong KIM Joonsang BAEK Jianying ZHOU Taeshik SHON 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/01/01
Vol. E95-D  No. 1 ; pp. 117-125
Type of Manuscript:  Special Section PAPER (Special Section on Trust, Security and Privacy in Computing and Communication Systems)
Category: Security
Keyword: 
privacy protectionservice discovery protocolubiquitousprivacy-preserving authenticationmembership verification
 Summary | Full Text:PDF(1.1MB)

Location-Aware and Privacy-Preserving Approach for Child Safety in Ubiquitous Computing Environment
Jangseong KIM Taeshik SHON Kwangjo KIM 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2011/03/01
Vol. E94-B  No. 3 ; pp. 686-689
Type of Manuscript:  Special Section LETTER (Special Section on Information and Communication Technologies for Next-generation Mobile Multimedia Life)
Category: 
Keyword: 
privacy protectionlocation supporting protocolubiquitouschild safety
 Summary | Full Text:PDF(408.2KB)

Privacy Protection by Masking Moving Objects for Security Cameras
Kenichi YABUTA Hitoshi KITAZAWA Toshihisa TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/03/01
Vol. E92-A  No. 3 ; pp. 919-927
Type of Manuscript:  PAPER
Category: Image
Keyword: 
security cameraprivacy protectionwatermarkingJPEGmoving object extraction
 Summary | Full Text:PDF(2.1MB)

A Flexible Personal Data Disclosure Method Based on Anonymity Quantification
Miyuki IMADA Masakatsu OHTA Mitsuo TERAMOTO Masayasu YAMAGUCHI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2007/12/01
Vol. E90-B  No. 12 ; pp. 3460-3469
Type of Manuscript:  Special Section PAPER (Special Section on Ubiquitous Sensor Networks)
Category: 
Keyword: 
privacy protectiondata miningentropyanonymitycrime-information-sharing service
 Summary | Full Text:PDF(1MB)

A Provably Secure Refreshable Partially Anonymous Token and Its Applications
Rie SHIGETOMI Akira OTSUKA Jun FURUKAWA Keith MARTIN Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/05/01
Vol. E89-A  No. 5 ; pp. 1396-1406
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
anonymous credentialrefreshable tokensanonymityprivacy protection
 Summary | Full Text:PDF(280KB)

FieldCast: Peer-to-Peer Presence Information Exchange in Ubiquitous Computing Environment
Katsunori MATSUURA Yoshitsugu TSUCHIYA Tsuyoshi TOYONO Kenji TAKAHASHI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2004/12/01
Vol. E87-D  No. 12 ; pp. 2610-2617
Type of Manuscript:  Special Section PAPER (Special Section on New Technologies and their Applications of the Internet)
Category: Protocols, Applications and Services
Keyword: 
presence servicepeer-to-peer (P2P)SIMPLEprivacy protectiongeolocation
 Summary | Full Text:PDF(1.8MB)