Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generation and Detection of Media Clones., , , , , , , , , and 2 other author(s). IEICE Trans. Inf. Syst., 104-D (1): 12-23 (2021)Anonymous communication system using probabilistic choice of actions and multiple loopbacks., , and . IAS, page 210-215. IEEE, (2010)Data Anonymization for Service Strategy Development and Information Recommendation to Users Based on TF-IDF Method., and . ISITA, page 485-489. IEEE, (2020)Performance Analysis of Anonymous Communication System 3-Mode Net., , , and . IAS, page 593-596. IEEE Computer Society, (2009)Matrix-Based Algorithm for Integrating Inheritance Relations of Access Rights for Policy Generation., , , , and . J. Inf. Process., (2009)Tablet owner authentication based on behavioral characteristics of multi-touch actions., , , and . ICPR, page 3431-3434. IEEE Computer Society, (2012)Passive Video Forgery Detection Considering Spatio-Temporal Consistency., , , and . SoCPaR, volume 942 of Advances in Intelligent Systems and Computing, page 381-391. Springer, (2018)Owner authentication for mobile devices using motion gestures based on multi-owner template update., , , , and . ICME Workshops, page 1-6. IEEE Computer Society, (2015)