Author of the publication

Privacy-Preserving Support Vector Machine Computing Using Random Unitary Transformation.

, , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 102-A (12): 1849-1855 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A development of symmetric extension method for subband image coding., , and . IEEE Trans. Image Processing, 3 (1): 78-81 (1994)Optimumization of lifting structure of reversible KLT based on permutation of signal's order and sign., and . ICIP, page 465-468. IEEE, (2010)A Fast Full Search Block Matching Algorithm for Mpeg-4 Video., , and . ICIP (1), page 61-65. IEEE, (1999)Reversible color transform with compatiblity to irreversible transform., and . ICIP, page 2881-2884. IEEE, (2010)A Method of Extracting Embedded Binary Data from JPEG Bitstreams Using Standard JPEG Decoder., , and . ICIP, page 577-580. IEEE, (2000)Image Tamper Detection using Mathematical Morphology., , , and . ICIP (6), page 101-104. IEEE, (2007)Fast Method for Joint Retrieval and Identification of JPEG Coded Images Based on DCT Sign., , , and . ICIP (2), page 229-232. IEEE, (2007)Identification of JPEG 2000 images in encrypted domain for digital cinema., , , and . ICIP, page 2065-2068. IEEE, (2009)A parallel computation algorithm for super-resolution methods using convolutional neural networks., , and . APSIPA, page 1169-1173. IEEE, (2017)L2 norm optimization of tone mapping for two layer lossless coding of HDR images., , and . APSIPA, page 1-4. IEEE, (2014)