default search action
Hatsukazu Tanaka
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2000 – 2009
- 2008
- [j25]Minoru Kuribayashi, Masakatu Morii, Hatsukazu Tanaka:
Reversible Watermark with Large Capacity Based on the Prediction Error Expansion. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(7): 1780-1790 (2008) - 2006
- [j24]Minoru Kuribayashi, Hatsukazu Tanaka:
Fingerprinting Protocol for On-Line Trade Using Information Gap between Buyer and Merchant. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(4): 1108-1115 (2006) - [j23]Hatsukazu Tanaka:
Collusion-Attack Free ID-Based Non-interactive Key Sharing. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(6): 1820-1824 (2006) - [j22]Urara Shinmyo, Minoru Kuribayashi, Masakatu Morii, Hatsukazu Tanaka:
Fingerprinting Protocol Based on Distributed Providers Using Oblivious Transfer. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(10): 2597-2602 (2006) - [j21]Hidenori Kuwakado, Hatsukazu Tanaka:
Secure Length-Preserving All-or-Nothing Transform. Inf. Media Technol. 1(1): 112-120 (2006) - [j20]Minoru Kuribayashi, Hatsukazu Tanaka:
How to Generate Cyclically Permutable Codes From Cyclic Codes. IEEE Trans. Inf. Theory 52(10): 4660-4663 (2006) - 2005
- [j19]Minoru Kuribayashi, Hatsukazu Tanaka:
Fingerprinting protocol for images based on additive homomorphic property. IEEE Trans. Image Process. 14(12): 2129-2139 (2005) - [c7]Hidenori Kuwakado, Masakatu Morii, Hatsukazu Tanaka:
Visual Cryptographic Protocols Using the Trusted Initializer. ICICS 2005: 112-122 - [c6]Minoru Kuribayashi, Masakatu Morii, Hatsukazu Tanaka:
Reversible Watermark with Large Capacity Using the Predictive Coding. ICICS 2005: 441-453 - 2003
- [j18]Hidenori Kuwakado, Hatsukazu Tanaka:
Transitive Signature Scheme for Directed Trees. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(5): 1120-1126 (2003) - [j17]Yuichi Igarashi, Hidenori Kuwakado, Hatsukazu Tanaka:
Efficient Relative Time-Stamping Scheme Based on the Ternary Link. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(10): 2552-2559 (2003) - [j16]Minoru Kuribayashi, Hatsukazu Tanaka:
Video Watermarking of Which Embedded Information Depends on the Distance between Two Signal Positions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(12): 3267-3275 (2003) - [c5]Minoru Kuribayashi, Hatsukazu Tanaka:
A Watermarking Scheme Applicable for Fingerprinting Protocol. IWDW 2003: 532-543 - 2002
- [j15]Hidenori Kuwakado, Hatsukazu Tanaka:
Message Authentication for Stream. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(1): 190-193 (2002) - [j14]Hidenori Kuwakado, Hatsukazu Tanaka:
All-or-Nothing Transform Based on a Linear Code. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(5): 1084-1087 (2002) - [j13]Hidenori Kuwakado, Hatsukazu Tanaka:
Polynomial Representation of a Visual Secret Sharing Scheme and Its Application. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(6): 1379-1386 (2002) - [j12]Hatsukazu Tanaka:
Foreword. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(10): 2195 (2002) - 2001
- [c4]Minoru Kuribayashi, Hatsukazu Tanaka:
A New Anonymous Fingerprinting Scheme with High Enciphering Rate. INDOCRYPT 2001: 30-39 - 2000
- [c3]Minoru Kuribayashi, Hatsukazu Tanaka:
A Watermarking Scheme Based on the Characteristic of Addition among DCT Coefficients. ISW 2000: 1-14
1990 – 1999
- 1997
- [c2]Hidenori Kuwadako, Hatsukazu Tanaka:
Fast Algorithm for Finding a Small Root of a Quadratic Modular Equation. ISW 1997: 75-81 - 1996
- [j11]Toshio Tohne, Hiromu Koda, Hatsukazu Tanaka:
A scheme for constructing directional filters and its application to two-channel coding of images. Syst. Comput. Jpn. 27(3): 94-105 (1996) - 1994
- [j10]Hiromu Koda, Hatsukazu Tanaka:
Formulation of the modified akaike information criterion (AIC) for a one-dimensional multipulse model and its application to image coding. Syst. Comput. Jpn. 25(6): 61-72 (1994)
1980 – 1989
- 1989
- [j9]Shiro Handa, Hideki Inoue, Hatsukazu Tanaka:
An approximate encoding scheme for line-drawings using the concept of vector quantization. Syst. Comput. Jpn. 20(1): 74-82 (1989) - 1987
- [j8]Hatsukazu Tanaka:
Data structure of Huffman codes and its application to efficient encoding and decoding. IEEE Trans. Inf. Theory 33(1): 154-156 (1987) - [c1]Hatsukazu Tanaka:
A Realization Scheme for the Identity-Based Cryptosystem. CRYPTO 1987: 340-349 - 1985
- [j7]Hatsukazu Tanaka, Minoru Ando, Alberto Leon-Garcia:
A unique ranking of multilevel sequences and its application to source coding. IEEE Trans. Inf. Theory 31(4): 530-537 (1985) - 1984
- [j6]Alberto Leon-Garcia, Hatsukazu Tanaka:
Noiseless coding of binary finite-order Markov sources. IEEE Trans. Inf. Theory 30(1): 88-91 (1984) - 1983
- [j5]Hatsukazu Tanaka, Koji Kakigahara:
Simplified correlation decoding by selecting possible codewords using erasure information. IEEE Trans. Inf. Theory 29(5): 743-748 (1983) - 1982
- [j4]Hatsukazu Tanaka, Yutaka Hirakawa, Seiko Kaneku:
Recognition of Distorted Patterns Using the Viterbi Algorithm. IEEE Trans. Pattern Anal. Mach. Intell. 4(1): 18-25 (1982) - [j3]Hatsukazu Tanaka, Alberto Leon-Garcia:
Efficient run-length encodings. IEEE Trans. Inf. Theory 28(6): 880-889 (1982) - 1980
- [j2]Hatsukazu Tanaka, Kazuo Furusawa, Seiko Kaneku:
A novel approach to soft decision decoding of threshold decodable codes (Corresp.). IEEE Trans. Inf. Theory 26(2): 244-246 (1980)
1970 – 1979
- 1979
- [j1]Hatsukazu Tanaka, H. Matsuo, Seiko Kaneku:
Efficient encoding of sources with memory (Corresp.). IEEE Trans. Inf. Theory 25(2): 221-225 (1979)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-27 22:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint