Publications

Book Chapter

  1. Shoko IMAIZUMI, Masaaki FUJIYOSHI, and Hitoshi KIYA,
    A Novel Access Control Scheme for Multimedia Content with Modified Hash Chain,”
    in Multimedia - A Multidisciplinary Approach to Complex Issues (edited by Ioannis Karydis), pp.85–98, Intech, March 2012.

Journal Articles

  1. Anu ARYAL, Shoko IMAIZUMI, Takahiko HORIUCHI, and Hitoshi KIYA,
    Integrated Model of Image Protection Techniques,”
    J. Imaging, vol.4, no.1, January 2018.

  2. Shoko IMAIZUMI, Takeshi OGASAWARA, and Hitoshi KIYA,
    Block-Permutation-Based Encryption Scheme with Enhanced Color Scrambling,”
    LNCS, P. Sharma, F. Bianchi (Eds.), Springer-Verlag, vol.10269, pp.562-573, May 2017.

  3. Kenta KURIHARA, Shoko IMAIZUMI, Sayaka SHIOTA, and Hitoshi KIYA,
    An Encryption-then-Compression System for Lossless Image Compression Standards,”
    IEICE Trans. Inf. & Syst., vol.E100-D, no.1, pp.52-56, January 2017.

  4. Anu ARYAL, Shoko IMAIZUMI, and Takahiko HORIUCHI,
    Hierarchical Scrambling Method for Palette-Based Image Using Bitwise Operation,”
    Bull. Soc. Photogr. Imag. Japan, vol.26, no.1, pp.1–9, June 2016.

  5. Hiroyuki KOBAYASHI, Shoko IMAIZUMI, and Hitoshi KIYA,
    A Robust Identification Scheme for JPEG XR Images with Various Compression Ratios,”
    LNCS, T. Bräunl, B. McCane, M. Rivera, and X. Yu (Eds.), Springer-Verlag, vol.9431, pp.38-50, February 2016.

  6. Takeshi OGASAWARA, Shoko IMAIZUMI, and Naokazu AOKI,
    Scalable Tamper Detection and Localization Scheme for JPEG2000 Codestreams,”
    LNCS, Y. -S. Ho, J. Sang, Y. M. Ro, J. Kim, and F. Wu (Eds.), Springer-Verlag, vol.9315, pp.340-349, December 2015.

  7. Kenta KURIHARA, Masanori KIKUCHI, Shoko IMAIZUMI, Sayaka SHIOTA, and Hitoshi KIYA,
    An Encryption-then-Compression System for JPEG / Motion JPEG Standard,”
    IEICE Trans. Fundamentals, vol.E98-A, no.11, pp.2238-2245, November 2015.

  8. Anu ARYAL, Kazuma MOTEGI, Shoko IMAIZUMI, and Naokazu AOKI,
    Improvement of Multibit Information Embedding Algorithm for Palette-Based Images,”
    LNCS, J. Lopez and C. J. Mitchell (Eds.), Springer-Verlag, vol.9290, pp.511-523, August 2015.

  9. Shoko IMAIZUMI and Kei OZAWA,
    Palette-Based Image Steganography for High-Capacity Embedding,”
    Bull. Soc. Photogr. Imag. Japan, vol.25, no.1, pp.7–11, June 2015.

  10. Shoko IMAIZUMI and Kanichi TANIGUCHI,
    Hierarchical Image Authentication Based on Reversible Data Hiding,”
    Bull. Soc. Photogr. Imag. Japan, vol.24, no.1, pp.1–5, June 2014.
    Best Paper Award of SPIJ Prize

  11. Shoko IMAIZUMI and Kei OZAWA,
    Multibit Embedding Algorithm for Steganography of Palette-Based Images,”
    LNCS, R. Klette, M. Rivera, S. Satoh (Eds.), Springer-Verlag, vol.8333, pp.99–110, January 2014.

  12. Shoko Imaizumi, Masaaki Fujiyoshi, and Hitoshi Kiya,
    Multiple Level Access Control Method for Hierarchical Multimedia Content Using Low-complexity Key Generating Schemes,”
    ITE Journal, vol.66, no.2, pp.69–73, February 2012. (in Japanese)

  13. Shoko IMAIZUMI, Masaaki FUJIYOSHI, Hitoshi KIYA, Naokazu AOKI, and Hiroyuki KOBAYASHI,
    A Key Derivation Scheme for Hierarchical Access Control to JPEG 2000 Coded Images,”
    LNCS, Y. -S. Ho (Ed.), Springer-Verlag, vol.7088, pp.180–191, January 2012.

  14. Shoko Imaizumi, Masaaki Fujiyoshi, and Hitoshi Kiya,
    A Key Generating Method Using Recursive Hash Chains and Its Applications for Multi-Dimensionally Hierarchical Access Control,”
    ITE Journal, vol.65, no.2, pp.193–202, February 2011. (in Japanese)
    Best Paper Award of ITE Niwa-Takayanagi Prize

  15. Shoko IMAIZUMI, Yoshito ABE, Masaaki FUJIYOSHI, and Hitoshi KIYA,
    An Efficient Access Control Method Based on One-Way Hash Functions for Digital Videos,”
    ITE Journal, vol.64, no.11, pp.1621–1627, November 2010. (in Japanese)

  16. Shoko IMAIZUMI, Masaaki FUJIYOSHI, and Hitoshi KIYA,
    An efficient access control method for composite multimedia content,”
    IEICE Electronics Express, vol.7, no.20, pp.1534–1538, October 2010.

  17. Masaaki FUJIYOSHI, Shoko IMAIZUMI, and Hitoshi KIYA,
    Encryption of Composite Multimedia Contents for Access Control,”
    IEICE Trans. Fundamentals, vol.E90-A, no.3, pp.590–596, March 2007.

  18. Hitoshi KIYA, Shoko IMAIZUMI, and Osamu WATANABE,
    Partial-Scrambling of JPEG2000 Images without Generating Marker Codes,”
    IEICE Trans., vol.J86-D-II, no.11, pp.1628–1636, November 2003. (in Japanese)

International Conference Papers

  1. Warit SIRICHOTEDUMRONG, Tatsuya CHUMAN, Shoko IMAIZUMI, and Hitoshi KIYA,
    Grayscale-based Block Scrambling Image Encryption for Social Networking Services,”
    in Proc. IEEE International Conference on Multimedia and Expo, San Diego, USA, 23rd July, 2018 (to be presented).

  2. Hiroki UJIIE, Shoko IMAIZUMI, Takeshi OGASAWARA, Kazuma MOTEGI, Seiji SHIRONO, and Mai SARAI,
    Encryption System for Digital Archiving of Cultural Properties,”
    in Proc. of International Workshop on Advanced Image Technology, no.131(PS1-18), Chiang Mai, Thailand, 9th January, 2018.

  3. Anu ARYAL, Shoko IMAIZUMI, Takahiko HORIUCHI, and Hitoshi KIYA,
    Integrated Algorithm for Block-Permutation-Based Encryption with Reversible Data Hiding,”
    in Proc. of APSIPA Annual Summit and Conference, no.WA-08.2, Kuala Lumpur, Malaysia, 13th December, 2017.

  4. Shoko IMAIZUMI, Takeshi OGASAWARA, and Hitoshi KIYA,
    Block-Permutation-Based Encryption Scheme with Enhanced Color Scrambling,”
    in Proc. of Scandinavian Conference on Image Analysis, LNCS 10269, pp.562-573, Tromso, Norway, 13th June, 2017.

  5. Kazuma MOTEGI and Shoko IMAIZUMI,
    Image Authentication Scheme with Localization Using YIQ Color Space,”
    in Proc. of International Workshop on Advanced Image Technology, no.2B-6, Penang, Malaysia, 9th January, 2017.

  6. Hiroyuki KOBAYASHI, Shoko IMAIZUMI, and Hitoshi KIYA,
    A Robust Identification Scheme for JPEG XR Images with Various Compression Ratios,”
    in Proc. of Pacific-Rim Symposium on Image and Video Technology, LNCS 9431, pp.38-50, Auckland, New Zealand, 25th November, 2015.

  7. Takeshi OGASAWARA, Shoko IMAIZUMI, and Naokazu AOKI,
    Scalable Tamper Detection and Localization Scheme for JPEG2000 Codestreams,”
    in Proc. of Pacific-Rim Conference on Multimedia, LNCS 9315, pp.340-349, Gwangju, Korea, 17th September 2015.

  8. Anu ARYAL, Kazuma MOTEGI, Shoko IMAIZUMI, and Naokazu AOKI,
    Improvement of Multibit Information Embedding Algorithm for Palette-Based Images,”
    in Proc. of Information Security Conference, LNCS 9290, pp.511-523, Trondheim, Norway, 11th September 2015.

  9. Anu ARYAL, Shoko IMAIZUMI, and Naokazu AOKI,
    Hierarchical Scrambling for Palette-Based Images Using Transposition Cipher,”
    in Proc. of International Conference on Advanced Imaging, no.T109-01, pp.701-704, Tokyo, Japan, 19th June, 2015.

  10. Shoko IMAIZUMI and Yuto TOBE,
    Flexible Partial Encryption for Palette-Based Images,”
    in Proc. of International Workshop on Advanced Image Technology, no.160, Tainan, Taiwan, R.O.C., 12th January, 2015.

  11. Anu ARYAL, Shoko IMAIZUMI, and Naokazu AOKI,
    Hierarchical Scrambling Scheme for Palette-Based Images,”
    in Proc. of IEEE International Symposium on Intelligent Signal Processing and Communication Systems, no.74, pp.65-70, Kuching, Malaysia, 2nd December, 2014.

  12. Shoko IMAIZUMI and Kei OZAWA,
    Multibit Embedding Algorithm for Steganography of Palette-Based Images,”
    in Proc. of Pacific-Rim Symposium on Image and Video Technology, LNCS 8333, pp.99–110, Guanajuato, Mexico, 30th October, 2013.

  13. Shoko IMAIZUMI,
    A Collusion-Free Key Assignment Scheme for Hierarchical Access Control Using Recursive Hash Chains,”
    in Proc. of IEEE International Symposium on Circuits and Systems, no.A3L-A-4, pp.445-448, Beijing, China, 20th May, 2013.

  14. Kei OZAWA, Shoko IMAIZUMI, Naokazu AOKI, and Hiroyuki KOBAYASHI,
    A High-Capacity Data Embedding Scheme for Palette-Based Images with High Image Quality,”
    in Proc. of International Workshop on Advanced Image Technology, no.SPS-27, p.806, Nagoya, Japan, 8th January, 2013.

  15. Shoko IMAIZUMI, Naokazu AOKI, Hiroyuki KOBAYASHI, and Hitoshi KIYA,
    Multi-dimensional Key Assignment for Hierarchical Media Access Control with Collusion Resilience,”
    in Proc. of IARIA International Conference on Systems and Networks Communications, pp.77-82, Lisbon, Portugal, 20th November, 2012.

  16. Yuto TOBE, Shoko IMAIZUMI, Naokazu AOKI, and Hiroyuki KOBAYASHI,
    A Visible Data Hiding Scheme for Printed Color Images,”
    in Proc. of IEEE International Symposium on Intelligent Signal Processing and Communication Systems, no.E4.4, pp.653–657, New Taipei City, Taiwan, R.O.C., 6th November, 2012.

  17. Shoko IMAIZUMI, Naokazu AOKI, Hiroyuki KOBAYASHI, and Hitoshi KIYA,
    Hierarchical Key Assignment Scheme for Multimedia Access Control with Modified Hash Chain,”
    in Proc. of IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, no.CM-2.1, pp.293–296, Piraeus, Greece, 20th July, 2012.

  18. Shoko IMAIZUMI, Masaaki FUJIYOSHI, Hitoshi KIYA, Naokazu AOKI, and Hiroyuki KOBAYASHI,
    Key Derivation Scheme for Hierarchical Access Control to Multimedia Content,”
    in Proc. of International Workshop on Advanced Image Technology, no.F-4, pp.246–251, Ho Chi Minh City, Vietnam, 10th January, 2012.

  19. Shoko IMAIZUMI, Masaaki FUJIYOSHI, Hitoshi KIYA, Naokazu AOKI, and Hiroyuki KOBAYASHI,
    A Key Derivation Scheme for Hierarchical Access Control to JPEG 2000 Coded Images,”
    in Proc. of Pacific-Rim Symposium on Image and Video Technology, Part II, LNCS 7088, pp.180–191, Gwangju, Korea, 22nd November, 2011.

  20. Shoko IMAIZUMI, Masaaki FUJIYOSHI, and Hitoshi KIYA,
    An Efficient Access Control Scheme for Multimedia Content Using Modified Hash Chain,”
    in Proc. of IARIA International Conference on Systems and Networks Communications, pp.175–180, Barcelona, Spain, 26th October, 2011.

  21. Shoko IMAIZUMI, Masaaki FUJIYOSHI, and Hitoshi KIYA,
    Efficient Collusion Attack-Free Access Control for JPEG 2000 Coded Images,”
    in Proc. of APSIPA Annual Summit and Conference, no.MP-P2-6, pp.270–273, Sapporo, Japan, 5th October, 2009.

  22. Shoko IMAIZUMI, Masaaki FUJIYOSHI, and Hitoshi KIYA,
    Efficient Collusion Attack-Free Access Control for Multidimensionally Hierarchical Scalability Content,”
    in Proc. of IEEE International Symposium on Circuits and Systems, no.A3L-F-4, pp.505–508, Taipei, Taiwan, R.O.C., 25th May, 2009.

  23. Noriaki HASHIMOTO, Shoko IMAIZUMI, Masaaki FUJIYOSHI, and Hitoshi KIYA,
    Hierarchical Encryption Using Short Encryption Keys for Scalable Access Control of JPEG 2000 Coded Images,”
    in Proc. of IEEE International Conference on Image Processing, no.WP-PG.4, pp.3116–3119, San Diego, CA, the US, 15th October, 2008.

  24. Shoko IMAIZUMI, Masaaki FUJIYOSHI, Yoshito ABE, and Hitoshi KIYA,
    Collusion Attack-Resilient Hierarchical Encryption of JPEG 2000 Codestreams with Scalable Access Control,” in Proc. of IEEE International Conference on Image Processing, vol.II, no.MP-L5.3, pp.137–140, San Antonio, TX, the U.S., 17th September, 2007.

  25. Masaaki FUJIYOSHI, Wataru SAITOU, Shoko IMAIZUMI, and Hitoshi KIYA,
    Hierarchical Cipher for Controlling Access to Multimedia Contents,”
    in Proc. of International Technical Conference on Circuits/Systems, Computers and Communications, vol.II, no.WAM1-4-4, pp.69–72, Chiang Mai, Thailand, 12th July, 2006.

  26. Shoko IMAIZUMI, Osamu WATANABE, Masaaki FUJIYOSHI, and Hitoshi KIYA,
    Generalized Hierarchical Encryption of JPEG 2000 Codestreams for Access Control,”
    in Proc. of IEEE International Conference on Image Processing, vol.II, no.TuePmPO5.6, pp.1094–1097, Genoa, Italy, 13th September, 2005.

  27. Hitoshi KIYA, Shoko IMAIZUMI, and Osamu WATANABE,
    Partial-Scrambling of Image Encoded Using JPEG2000 without Generating Marker Codes,”
    in Proc. of IEEE International Conference on Image Processing, no.WA-P1.3, pp.III-205-208, Barcelona, Spain, 17th September, 2003.

  28. Shoko IMAIZUMI, Ayuko TAKAGI, and Hitoshi KIYA,
    Lossless Inter-Frame Video Coding Using Extended JPEG2000,”
    in Proc. of International Technical Conference on Circuits/Systems, Computers and Communications, Phuket, Thailand, 1st July, 2002