研究室/研究室の業績

I 主な著書,編書

  1. Isao Echizen, Yasuhiro Fujii, Takaaki Yamada, Satoru Tezuka, and Hiroshi Yoshiura: Adaptive Embedding and Detection for Improved Video Watermarking, Jeng-Shyang Pan, Wai-Chi Fang, Hsiang-Cheh Huang, Lakhmi C. Jain (Eds.): Intelligent Multimedia Data Hiding, Chapter 7 (pp. 157-187), Springer (2007.6)
  2. Hiroshi Yoshiura, Kouichi Sakurai, Kai Rannenberg, Yuko Yurayama, Shinchi Kawamura (Eds.): Advances in Information and Computer Security, Lecture Note in Computer Science 4266, Springer (2006.10).
  3. Ryoichi Sasaki, Shihan Qing, Eiji Okamoto, Hiroshi Yoshiura (Eds.): Security and Privacy in the Age of Ubiquitous Computing, Springer (2005.6).
  4. 吉浦裕:不正コピー対策, 電子情報通信学会(編):情報セキュリティハンドブック, 4編5章 (pp.359-367), オーム社 (2004.11).
  5. 佐々木良一, 吉浦裕, 手塚悟, 三島久典:インターネット時代の情報セキュリティ−暗号と電子透かし−, 共立出版 (2000.9).

II 主な学術雑誌

  1. Masatsugu Ichino, Yasushi Yamazaki, and Hiroshi Yoshiura: Speaker Verification Method for Operation System of Consumer Electronic Devices, IEEE Transactions on Consumer Electronics, Vol.61, Issue 1, pp. 96-102 (2015.2).
  2. Hoang-Quoc Nguyen-Son, Minh-Triet Tran, Hiroshi Yoshiura, Noboru Sonehara, and Isao Echizen: Anonymizing Personal Text Messages Posted in Online Social Networks and Detecting Disclosures of Personal Information, IEICE Transactions on Information and Systems, Vol.E98-D, No.1, pp.78-88 (2015.1).
  3. 加藤遼,西出隆志,吉浦裕:部分的に小さな法を用いたマルチパーティ計算のビット演算効率化, 情報処理学会論文誌, Vol.55, No.9, pp.1971-1991 (2014.9).
  4. 片岡春乃, 奥野智孝, 木村聡一, 内海彰, 吉浦裕:ソーシャルネットワークから注目者の発言を特定するシステムの提案と予備評価, 日本セキュリティ・マネジメント学会誌, Vol.27, No.3, pp. 13-28 (2014.1) <日本セキュリティ・マネジメント学会論文奨励賞受賞>.
  5. Yusuke Otsuki, Masatsugu Ichino, Soichi Kimura, Mitsuhiro Hatada, and Hiroshi Yoshiura: Evaluating Payload Features for Malware Infection Detection, Journal of Information Processing, Vol.55, No.2, pp.376-387 (2013.2) <情報処理学会CSEC研究会推薦論文>.
  6. Takaaki Yamada, Isao Echizen, and Hiroshi Yoshiura: PC-Based Real-Time Video Watermark Embedding System Independent of Platform for Parallel Computing, Transactions on Data Hiding and Multimedia Security, Vol.7, LNCS 7110, pp.15-33 (2012.11).
  7. Naoto Kiribuchi, Ryo Kato, Tsukasa Endo, Takashi Nishide, and Hiroshi Yoshiura: Batch Logical Protocols for Efficient Multi-Party Computation, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E95-A, No.10, pp.1718-1728 (2012.10).
  8. Naoto Kiribuchi, Ryo Kato, Takashi Nishide, Tsukasa Endo, and Hiroshi Yoshiura: Reducing Communication Complexity of Random Number Bitwise-Sharing for Efficient Multi-Party Computation, Journal of Information Processing, Vol.20, No.4, pp.861-870 (2012.10).
  9. 渡辺夏樹, 片岡春乃, 内海彰, 吉浦裕:SNS上のテキストからプライバシー情報を検知するシステムの構想と予備評価, 日本セキュリティ・マネジメント学会誌, Vol.24, No.3, pp.15-30 (2011.1). <日本セキュリティ・マネジメント学会論文賞受賞>
  10. 志村正法, 宮粼邦彦, 西出隆, 吉浦裕:秘密分散データベースの構造演算を可能にするマルチパーティプロトコルを用いた関係代数演算, 情報処理学会論文誌, Vol.51, No.9, pp.1563-1578 (2010.9). <情報処理学会論文賞受賞>
  11. Takaaki Yamada, Yoshiyasu Takahashi, Yasuhiro Fujii, Ryu Ebisawa, Hiroshi Yoshiura and Isao Echizen: Integrity Verification Method for Video Content Using Robust Watermarking, International Journal of Knowledge-Based and Intelligent Engineering Systems, Vol.13, No.3-4, pp.141-153 (2009.12).
  12. 金子聡, 吉浦裕:暗号学的安全性モデルに基づく電子透かしアルゴリズムの評価と改良, 情報処理学会論文誌, Vol.49. NO.3, pp.1402-1413 (2008.3) <情報処理学会CSEC研究会推薦論文>.
  13. 大中雅憲, 中山心太, 後守裕介, 越前功, 吉浦裕:カラー画像の2つの色成分の関係に基づいて多様な幾何変形に対応する画像電子透かし方式, 情報処理学会論文誌, Vol.49, NO.3, pp.1387-1401 (2008.3).
  14. Isao Echizen, Yusuke Atomori, Shinta Nakayama, and Hiroshi Yoshiura: Use of Human Visual System to Improve Video Watermarking for Immunity to Rotation, Scale, Translation, and Random Distortion, Circuits, Systems and Signal Processing, Vol.27, No.2, pp.213-227 (2008.3).
  15. Isao Echizen, Yasuhiro Fujii, Takaaki Yamada, Satoru Tezuka, and Hiroshi Yoshiura: Use of Statistically Adaptive Accumulation to Improve Video Watermarking Detection, IPSJ Journal, Vol.47, No.8, pp.2440-2453 (2006.8).
  16. Hiroshi Yoshiura and Isao Echizen: Maintaining Picture Quality and Improving Robustness of Color Watermarking by Using Human Vision Models, IEICE Transactions on Information & Systems, Vol.E89-D, No.1, pp.256-270 (2006.1).
  17. 佐々木良一, 石井真之, 日高悠, 矢島敬士, 吉浦裕, 村山優子: 多重リスクコミュニケータの開発構想と試適用, 情報処理学会論文誌, Vol.46, No.8, pp.2120-2128 (2005.8).
  18. 宮崎邦彦, 岩村充, 松本勉, 佐々木良一, 吉浦裕, 松木武, 秦野康生, 手塚悟, 今井秀樹: 交渉ゲームにおける鍵自己暴露戦略のインパクト, 情報処理学会論文誌, Vol.46, No.8, pp.1871-1879 (2005.8).
  19. Kunihiko Miyazaki, Mitsuru Iwamura, Tsutomu Matsumoto, Ryoici Sasaki, and Hiroshi Yoshiura, Satoru Tezuka, Hiroshi Imai: Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control, IEICE Transactions on Fundamentals, Vol. E88-A, No.1, pp.239-246 (2005.1).
  20. Isao Echizen, Yasuhiro Fujii, Takaaki Yamada, Satoru Tezuka, and Hiroshi Yoshiura: Perceptually Adaptive Video Watermarking Using Motion Estimation, International Journal of Image and Graphics, Vol.5, No.1, pp.89-109 (2005.1).
  21. Hiroshi Yoshiura and Isao Echizen: Color Picture Watermarking Correlating Two Constituent Planes for Immunity to Random Geometric Distortion, IEICE Transactions on Information & Systems, Vol. E87-D, No.9, pp.2239-2252 (2004.9).
  22. 藤井康広, 越前功, 山田隆亮, 手塚悟, 吉浦裕:電子透かし検出に適した誤り訂正符号の拡張方式, 情報処理学会論文誌, Vol.45, No.8, pp.1980-1997 (2004.8). <情報処理学会論文賞受賞>
  23. 青島弘和, 吉浦裕, 洲崎誠一, 本城信輔, 豊島久, 佐々木良一:電子透かしを用いたWebサイト認定マークの実用システム開発と評価, システム制御情報学会論文誌, Vol.16, No.12, pp.616-627 (2003.12). <システム制御情報学会産業技術賞受賞>
  24. 宮崎邦彦, 吉浦裕, 岩村充, 松本勉, 佐々木良一:第三者機関への依存度に基づく長期利用向け電子署名技術評価手法の提案, 情報処理学会論文誌, Vol.44, No.8, pp.1955-1969 (2003.8).
  25. 藤井康広, 中野和典, 越前功, 吉浦裕, 手塚悟:局所特徴量を用いた二値画像用電子透かしの画質維持方式, 情報処理学会論文誌, Vol.44, No.8, pp.1872-1883 (2003.8).
  26. 佐々木良一, 吉浦裕, 伊藤信治:不正コピー対策の最適組み合わせに関する考察, 情報処理学会論文誌, Vol.43, No.8, pp.2435-2446 (2002.8).
  27. 越前功, 吉浦裕, 安細康介, 佐々木良一:分布推定手法を用いた電子透かしの検出誤り確率推定方式, 情報処理学会論文誌, Vol.42, No.8, pp.2006-2016 (2001.8).
  28. 越前功, 吉浦裕, 安細康介, 田口順一, 黒須豊, 佐々木良一, 手塚 悟: 輪郭保存に基づく電子透かしの画質維持方式, 情報処理学会論文誌, Vol.41, No.6, pp.1828-1839 (2000.6).
  29. Isao Echizen, Hiroshi Yoshiura, Takao Arai, Hiroyuki Kimura and Toshifumi Takeuchi: General Quality Maintenance Module for Motion Picture Watermarking, IEEE Transactions on Consumer Electronics, Vol.45, No.4, pp.1150-1158 (1999.11).
  30. Hiroshi. Yoshiura, Kikuo. Fujimura, Toshiyasu. Kunii: Top-Down Construction of 3-D Mechanical Object Shapes from Engineering Drawings, IEEE Computer, Vol.17, No.12, pp.32-40 (1984.12)

III 主な国際会議発表

  1. Eina Hashimoto, Masatsugu Ichino, Tetsuji Kuboyama, Isao Echizen, Hiroshi Yoshiura: Breaking Anonymity of Social Network Accounts by Using Coordinated and Extensible Classifiers based on Machine Learning, Proc. of FIP Conference on e-Business, e-Services and e-Society (I3E2016), Lecture Notes in Computer Science 9844, Springer, pp.455-470, Swansea UK (2013.11). <Awarded as Best Paper of I3E2016>
  2. Hoang-Quoc Nguyen-Son, Anh-Tu Hoang, Minh-Triet Tran, Hiroshi Yoshiura, Noboru Sonehara and Isao Echizen: Anonymizing Temporal Phrases in Natural Language Text to be Posted on Social Networking Services, Proc. of 12th International Workshop on Digital-forensics and Watermarking, Lecture Notes in Computer Science 8389, Springer, pp.437-451, Auckland New Zealand (2013.11).
  3. Yutaka Nishiwaki, Ryo Kato, Hiroshi Yoshiura: Securing a B+tree for Use with Secret-Shared Databases, Proc. of 8th International Workshop on Databases in Networked Information Systems (DNIS 2013),Lecture Notes in Computer Science 7813, Springer, pp.246-261, Aizu (2013.3).
  4. Tomotaka Okuno, Masatsugu Ichino, Isao Echizen, Hiroshi Yoshiura: Ineluctable Background Checking on Social Networks: Linking Job Seeker's Resume and Posts, Proc. of 5th IEEE International Workshop on Security and Social Networking (SESOC2013), San Diego (2013.3). (23.5% Acceptance rate)
  5. Hoang-Quoc Nguyen-Son, Minh-Triet Tran, Dung Tran, Hiroshi Yoshiura and Isao Echizen:Automatic Anonymous Fingerprinting of Text Posted on Social Networking Services, Proc. of 11th International Workshop on Digital-forensics and Watermarking, pp.410-424, Lecture Notes in Computer Science 7809, Springer, Shanghai (2012.11).
  6. Naoto Kiribuchi, Ryo Kato, Takashi Nishide, Hiroshi Yoshiura: Batching Multiple Protocols to Improve Efficiency of Multi-party Computation, Proc. of 7th International Conference on Information Security and Cryptology (Inscrypt'2011), Lecture Notes in Computer Science 7537, Springer, pp289-308, Beijing (2011.11). (32% acceptance rate)
  7. Naoto Kiribuchi, Takashi Nishide, Tsukasa Endo, Hiroshi Yoshiura: Accelerating Multiparty Computation by Efficient Random Number Bitwise-Sharing Protocols, Proc. of 12th International Workshop on Information Security Applications (WISA2011), Lecture Notes in Computer Science 7115, Springer, pp.187-202, Cheju, Korea (2011.8).(28% acceptance rate)
  8. Komei Kamiyama, Tran Hong Ngoc, Isao Echizen, and Hiroshi Yoshiura: Measuring Accumulated Revelations of Private Information by Multiple Media, Proc. of 10th IFIP Conference on e-Business, e-Services, and e-Society, pp.70-80, Buenos Aires, Argentina (2010.11).
  9. Tran Hong Ngoc, Isao Echizen, Komei Kamiyama, and Hiroshi Yoshiura: New Approach to Quantification of Privacy on Social Network Sites, Proc. of 24th IEEE International Conference on Advanced Information Networking and Applications, pp.556-564 (2010.4). (25% Acceptance rate)
  10. Satoshi Kaneko, Isao Echizen, and Hiroshi Yoshiura:Evaluation and Improvement of Digital Watermarking Algorithm Based on Cryptographic Security Models, Proc. of 7th International Workshop on Digital Watermarking, Lecture Notes in Computer Science 5964, Springer, pp.401-418, Busan Korea (2008.11).
  11. Haruno Kataoka, Akira Utsumi, Yuki Hirose, and Hiroshi Yoshiura:Disclosure Control of Natural Language Information to Enable Secure and Enjoyable Communication over the Internet, Proc. of 15th International Workshop on Security Protocols, Lecture Notes in Computer Science 5964, Springer, pp.178-188 (2007.4).
  12. Isao Echizen, Takaaki Yamada, Satoru Tezuka, Stephan Singh, and Hiroshi Yoshiura: Improved Video Verification Method Using Digital Watermarking, Proc. of 2nd IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP2006), pp.445-448, Pasadena USA (2006.12) <Awarded as Best Paper of IIH-MSP2006>.
  13. Isao Echizen, Kouich Tanimoto, Takaaki Yamada, Masanori Dainaka, Satoru Tezuka, and Hiroshi Yoshiura : PC-Based Real-Time Watermark Embedding System with Standard Video Interface, Proc. of IEEE International Conference on Systems, Man and Cybernetics, pp.267-271, Taipei (2006.10).
  14. Ryoichi Sasaki, Saneyuki Ishii, Yuu Hidaka, Hiroshi Yajima, and Hiroshi Yoshiura: Development Concept for and Trial Application of “a Multiplex Risk Communicator”, Proc. of 5th IFIP Conference on E-commerce, E-business, and E-government, pp. 607-621, Poznan (2005.10).
  15. Isao Echizen, Takayuki Yamada, Yasuhiro Fujii, Satoru Tezuka, and Hiroshi Yoshiura : Real-Time Video Watermark Embedding System Using Software on Personal Computer, Proc. of IEEE International Conference on Systems, Man and Cybernetics, Hawaii, pp.3369-3373 (2005.10).
  16. Isao Echizen, Yasuhiro Fujii, Tataai Yamada, Satoru Tezuka, and Hiroshi Yoshiura: Improved Video Watermark Detection Using Statistically-Adaptive Accumulation, Proceeding. of Knowledge-Based Intelligent Information and Engineering Systems: Proc. of 9th International Conference (KES 2005), Lecture Notes in Computer Science 3684, pp.300-308, Springer, Melbourne (2005.9)
  17. Isao Echizen, Hiroshi Yoshiura, Yasuhiro Fujii, Takaaki Yamada, and Satoru Tezuka: Use of Inferential Statistics to Estimate Error Probability of Video Watermarks, Proc. of SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents, Vol. 5681, pp.391-399, San Jose (2005.1).
  18. Isao Echizen, Hiroshi Yoshiura, Yasuhiro Fujii, and Sarotu Tezuka: Use of Motion Analysis to Improve Video Watermarking for MPEG Encoders, Proc. of 2003 International Workshop on Digital Watermarking, Lecture Notes in Computer Science 2939, Springer, pp.184-199 (2003.10).
  19. Hiroshi Yoshiura, Isao Echizen, Kosuke Anzai, Junichi Taguchi, and Kazunori Nakano: Improved Video Watermarking for MPEG Encoders Using Motion Analysis, Proc. of 2002 IEEE International Conference on Consumer Electronics, pp.14-15, Los Angeles (2002.6)
  20. Hiroshi Yoshiura, Kunihiko Miyazaki, Kazuo Takaragi, Ryoici Sasaki: Legally Authorized and Unauthorized Digital Evidence, Proc. of 10th International Workshop on Security Protocols, Lecture Notes in Computer Science 2845, Springerg, pp.67-70, Cambridge (2002.4).
  21. Ryoichi Sasaki, Hiroshi Yoshiura, Shinji Itoh: Combinatorial Optimization of Countermeasures against Illegal Copying, Proc. of 10th International Workshop on Security Protocols, Lecture Notes in Computer Science 2845, Springer-Verlag, pp.55-64, Cambridge (2002.4).
  22. Hiroshi Yoshiura, Kunihiko Miyazaki, Shinji Itoh, Kazuo Takaragi, and Ryoici Sasaki: A Multi-OS Approach to Trusted Computer Systems, Proc. of 9th International Workshop on Security Protocols, Lecture Notes in Computer Science 2467, Springer, pp.107-114, Cambridge (2001.4).
  23. Hiroshi Yoshiura, Takaaki Shigematsu, Seiichi Susaki, Tsukasa Saitoh, Hisashi Toyoshima, Chikako Kurita, Satoru Tezuka, and Ryoichi Sasaki: Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks, Proc. of 8th International Workshop on Security Protocols, Lecture Notes in Computer Science 2133, Springer, pp.238-248, Cambridge (2000.4).
  24. Hiroshi Yoshiura, Seiichi Susaki, Yasuhiko Nagai, Tsukasa Saitoh, Hisashi Toyoshima, Ryoichi Sasaki, and Satoru Tezuka: Internet-Marks: Clear, Secure, and Portable Visual Marks for the Cyber Worlds, Proc. of 7th International Workshop on Security Protocols, Lecture Notes in Computer Science 1796, Springer, pp.195-202, Cambridge (1999.4).
  25. Hiroshi Yoshiura, Ryoichi Sasaki, Kazuo Takaragi: Secure Fingerprinting Using Public-Key Cryptography, Proc. of 6th International Workshop on Security Protocols, Lecture Notes in Computer Science 1550, Springer, pp.83-89, Cambridge (1998.4).

? 主な特許登録
米国を含む複数の国で成立した特許は米国特許の名称を代表例とする。それ以外は日本特許の名称を代表例とする。米国(または日本)の特許成立日の降順。
US: 米国, JP: 日本, EU: 欧州, AU: オーストラリア, KR: 韓国,SG: シンガポール, CA: カナダ, TW: 台湾, RU:ロシア, HK: 香港, VT: ベトナム

  1. Kunihiko Miyazaki, Mitsuru Iwamura, Tsutomu Matsumoto, Ryoichi Sasaki, Hiroshi Yoshiura, Hirokazu Aoshima, Hideo Noyama, Seiichi Susaki, and Takeshi Matsuki: Electronic Document Authenticity Assurance Method and Electronic Document Disclosure System, 出願 (2003.7.15), US 7526645 (2009.4.28), JP 4144645(2008.6.27).
  2. Yasuhiro Fujii, Kazunori Nakano, Isao Echizen, and Hiroshi Yoshiura: Method of Watermarking for Binary Images, 出願 (2003.3.5), US 7499565 (2009.3.3), JP 4193665 (2008.10.3).
  3. Isao Echizen, Hiroshi Yoshiura, Kunihiko Miyazaki, Kousuke Anzai, Junichi Taguchi, Kazunori Nakano, and Katsuyuki, Okeya: Method and System for Content Control, 出願 (2001.6.7), US 7478432 (2009.1.13).
  4. Kousuke Anzai, Isao Echizen, and Hiroshi Yoshiura: Method of Detecting Digital Watermark Information, 出願 (2002.4.17), US 7310428 (2007.12.18).
  5. Tooru Matsumura, Hiroshi Yoshiura, Hiroo Okamoto, and Hiroyuki Kimura: Method and Apparatus for Temporarily Giving Copy Permission for Reproducing Digital Signals, 出願 (2000.4.20), US 7151888 (2006.12.19).
  6. Kunihiko Miyazaki, Hiroshi Yoshiura, Seiichi Susaki, Ryoichi Sasaki, Kazuo Takaragi, Hisashi Toyoshima, and Takeshi Matsuki: Method and System for Recovering the Validity of Cryptographically Signed Digital Data, 出願 (2001.3.22), US 7134021 (2006.11.7), JP 4853479 (2011.11.4), EP 1243999 (2013.1.29).
  7. Isao Echizen, Hiroshi Yoshiura, Hiroyuki Kimura, Akio Fukushima, and Kosuke Anzai:Watermark Information Detection Method, 出願 (2001.6.8), US 7113613 (2006.9.26).
  8. Kousuke Anzai, Isao Echizen, Hiroshi Yoshiura, and Shinobu Eikawa: Method for Embedding Information and Extracting the Same, 出願 (1999.6.1), US 7065226 (2006.6.20), JP 3706766 (2005.8.5).
  9. Isao Echizen, Hiroshi Yoshiura, Ryoichi Sasaki, Shinichiro Harano, and Shinobu Eikawa: Digital Watermark Data Embedding Method, and Digital Watermark Data Embeddability Analyzing Method, 出願 (2000.7.6), US 7047412 (2006.5.16), JP 3809323 (2006.5.26), EU 1170938 (2012.10.10).
  10. Osamu Kawamae, Toshifumi Takeuchi, Hiroyuki Kimura, Takao Arai, Hiroshi Yoshiura: Reproducing Apparatus, Recording Apparatus and Display Apparatus, 出願 (1998.4.14), US 7043645 (2006.5.9), JP 5083420 (2012.9.14).
  11. 吉浦裕,洲崎誠一,永井康彦,篠田隆志:画像への情報添付方法および画像からの情報抽出方法,出願 (1998.8.11), JP 3770732(2006.2.17)
  12. Hiroshi Yoshiura, Hiroyuki Kimura, Akira Ogino, Yoshiaki Moriyama, and Kazumi Sugaya: Method of and Apparatus for Restricting Copy of Digital Information, and Apparatus for Recording Digital Information, 出願 (1998.12.3), US 6990584 (2006.1.24), JP 3868643 (2006.10.20), AU 768687(2002.4.22).
  13. Takashi Kohashi, Akira Ogino, Hiroyuki Kimura, Hiroshi Yoshiura, Yoshiaki Moriyama, and Kazumi Sugaya: Additional Information Embedding Method, Additional Information Detecting Method, Additional Information Embedding Apparatus and Additional Information Detecting Apparatus, 出願 (1999.2.22), US 6954856 (2005.10.11), JP 3636915 (2005.1.14), EP 1032205 (2007.1.11), TW 507448/165694 (2002.10.21).
  14. Hiroshi Yoshiura, Hirokazu Aoshima, Eiichi Kamada, and Atsushi Kikuta: System and Method of Searching for Electronic Data, 出願 (2000.10.12), US 6879978 (2005.4.12), JP 3923247 (2007.3.2).
  15. 吉浦裕, 佐々木良一, 本城信輔, 高嶋洋一, 小川宏, 中村高雄, 佐野睦夫: 電子透かしを用いた情報埋め込み方法および抽出方法, 出願 (2000.3.10), JP 3656728 (2005.3.18).
  16. Isao Echizen, Hiroshi Yoshiura, Ryoici Sasaki, Shin-ichiro Harano, and Shinobu Eikawa: Contents Rendering Control Method, Contents Reproducing Equipment, and Contents Distribution Equipment, 出願 (2000.7.6), US 6865677 (2005.3.8), EP 1170938 (2012.4.6), JP 3973346 (2007.6.22).
  17. Hiroshi Yoshiura, Isao Echizen, Junichi Taguchi, Akira Maeda, Takao Arai, and Toshifumi Takeuchi: Method and System for Embedding Information into Contents, 出願 (1997.9.3), US 6826291(2004.11.30), JP 3570236 (2004.7.2), EU 901274 (2004.4.7), KR 332033 (2002.3.27).
  18. Hiroshi Yoshiura, Ryoici Sasaki, and Mitsuru Iwamura: Method for Physical Individual Authentication and System Using the Same, 出願(2000.1.27), US 6775775 (2004.8.10).
  19. Isao Echizen, Hiroshi Yoshiura, Masafumi Nakamura, Takao Arai, and Toshifumi Takeuchi: Water-Mark Embedding Method and System, 出願 (1997.9.3), US 6728408 (2004.4.27), JP 3902863 (2007.1.12), EP 901102 (1990.11.02).
  20. Hiroshi Yoshiura, Isao Echizen, Takao Arai, Hiroyuki Kimura, Toshifumi Takeuchi, Yoshiaki Moriyama, Kazumi Sugaya, and Akira Ogino: Control Method and Apparatus for Embedding Information in Data, 出願 (1998.12.3), US 6711276 (2004.3.23), JP 3698901 (2005.7.15), AU 735422 (2001.10.18), CA 2291383 (2004.1.20), RU 2219582 (2003.12.20), KR 384959 (2003.5.10), TW 455759 (2001.1.24), SG 80664(2005.3.31), HK 1030706 (2005.7.29), VT 2837 (2002.7.1).
  21. Kazumasa Kita, Hiroshi Yoshiura, Yutaka Kurosu, Miki Tanaka, Sinobu Eikawa, and Tomoyuki Kaji: Steganographic System, Method, Program and Storage Medium Therefor, 出願 (2000.4.4), US 6707927 (2004.3.16).
  22. Hiroshi Yoshiura, Kousuke Anzai, and Yutaka Kurosu: Method of Judging Digital Watermark Information, 出願 (1998.12.2), US 6665417 (2003.12.16), JP 3630026 (2004.12.24).
  23. Isao Echizen, Hiroshi Yoshiura, Kosuke Anzai, and Yutaka Kurosu: Method of Extracting Digital Watermark Information and Method of Judging Bit Value of Digital Watermark Information, 出願 (1998.12.2), US 6563935 (2003.5.13), JP 3678084 (2005.5.20).
  24. Hiroyuki Kimura, Takao Arai, Toshifumi Takeuchi, and Hiroshi Yoshiura: Method and Apparatus for Recording and Reproducing Electronic Watermark Information, and Recording Medium, 出願 (1997.9.3), US 6519351 (2003.2.11), EP 901282 (2006.9.5).
  25. Hiroshi Yoshiura, Kazuo Takaragi, Ryoichi Sasaki, Seiichi Susaki, Hisashi Toyoshima, and Tsukasa Saito: Digital Data Authentication Method, 出願 (1997.6.5), US 6499105 (2002.12.24), JP 3184869 (2001.4.27).
  26. Kazunori Nakano, Junichi Taguchi, Hiroshi Yoshiura, Isao Echizen, and Yutaka Kurosu: Method of Authenticating Digital-Watermark Pictures, 出願 (1998.8.28), US 6418232 (2002.7.9)、JP3563270 (2004.6.11).
  27. Osamu Kawamae, Toshifumi Takeuchi, Hiroshi Yoshiura, and Takao Arai: Data Transmission Method for Embedded Data, Data Transmitting and Reproducing Apparatuses and Information Recording Medium Therefore, 出願(1998.9.1), US 6404781 (2002.6.11), KR 306457 (2001.8.9).
  28. Kazuo Takaragi, Seiichi Domyo, and Hiroshi Yoshiura: Method and Device for Managing Computer Network, 出願 (1996.3.22), US 6311277 (2001.10.30), JP 3848684 (2006.9.1).
  29. Hajime Morito, Hiroshi Yoshiura, Michael Roe: Copy Protection Apparatus and Method, 出願 (1999.3.16), US 6310956 (2001.10.30).
  30. Hiroshi Yoshiura, Kazuo Takaragi, Ryoichi Sasaki, Seiichi Susaki, Hisashi Toyoshima, and Tsukasa Saito: Digital Data Authentication Method, 出願 (1997.6.5), US Patent 6131162 (2000), JP Patent 3184868 (2001.4.27).

? 主な解説論文

  1. 吉浦裕,越前功:ユビキタス情報社会のプライバシーとその保護技術,情報処理学会誌,Vol.51, No.9, pp.1136-1143 (2010.9).
  2. 吉浦裕, 佐々木良一:通信・配信技術とビジネスモデル, 電子情報通信学会誌, Vol.90, No.2, pp.95-100 (2007.2).
  3. 吉浦裕:電子透かし, 計測と制御(計測自動制御学会誌), Vol.40, No.4, p.328 (2001.4).