Author of the publication

Access Control of Object Detection Models Using Encrypted Feature Maps.

, , , and . LifeTech, page 175-178. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Image and Model Transformation with Secret Key for Vision Transformer., , , and . CoRR, (2022)A location map-free visible and reversible watermarking method with authentication ability., , and . APCCAS, page 1584-1587. IEEE, (2008)Fast identification of JPEG 2000 images for digital cinema profiles., , and . ICASSP, page 881-884. IEEE, (2011)A Technique to Improve Convergence Speed of the LMS Algorithm., and . ISCAS, page 405-408. IEEE, (1994)Multidimensional Parallel Processing Methods for Rational Sampling Lattice Alteration., and . ISCAS, page 756-759. IEEE, (1995)A new class of near-lossless coding allowing estimation of ℓ∞ bound., , and . ISCIT, page 109-112. IEEE, (2015)A Reversible Data Hiding Method in Encrypted Images for Controlling Trade-Off between Hiding Capacity and Compression Efficiency., , and . J. Imaging, 7 (12): 268 (2021)Effects of JPEG Compression on Vision Transformer Image Classification for Encryption-then-Compression Images., , and . Sensors, 23 (7): 3400 (April 2023)A Block-Permutation-Based Encryption Scheme with Independent Processing of RGB Components., and . CoRR, (2020)Privacy-preserving Image Retrieval Scheme Allowing Mixed Use of Lossless and JPEG Compressed Images., and . LifeTech, page 37-39. IEEE, (2021)