Follow
Tatsuya Chuman
Tatsuya Chuman
Unknown affiliation
Verified email at ed.tmu.ac.jp
Title
Cited by
Cited by
Year
Encryption-then-compression systems using grayscale-based image encryption for JPEG images
T Chuman, W Sirichotedumrong, H Kiya
IEEE Transactions on Information Forensics and security 14 (6), 1515-1525, 2018
2262018
On the security of block scrambling-based etc systems against jigsaw puzzle solver attacks
T Chuman, K Kurihara, H Kiya
2017 IEEE International Conference on Acoustics, Speech and Signal …, 2017
672017
On the security of block scrambling-based etc systems against extended jigsaw puzzle solver attacks
T Chuman, K Kurihara, H Kiya
IEICE TRANSACTIONS on Information and Systems 101 (1), 37-44, 2018
572018
Security evaluation for block scrambling-based etc systems against extended jigsaw puzzle solver attacks
T Chuman, K Kurihara, H Kiya
2017 IEEE international conference on multimedia and expo (ICME), 229-234, 2017
492017
Grayscale-based block scrambling image encryption for social networking services
W Sirichotedumrong, T Chuman, S Imaizumi, H Kiya
2018 IEEE international conference on multimedia and expo (ICME), 1-6, 2018
352018
Image manipulation on social media for encryption-then-compression systems
T Chuman, K Iida, H Kiya
2017 Asia-Pacific Signal and Information Processing Association Annual …, 2017
322017
Image manipulation specifications on social networking services for encryption-then-compression systems
T Chuman, K Iida, W Sirichotedumrong, H Kiya
IEICE TRANSACTIONS on Information and Systems 102 (1), 11-18, 2019
192019
Security evaluation for block scrambling-based image encryption including jpeg distortion against jigsaw puzzle solver attacks
T Chuman, H Kiya
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2018
102018
On the security of block scrambling-based image encryption including JPEG distorsion against jigsaw puzzle solver attacks
T Chuman, H Kiya
2017 Eighth International Workshop on Signal Design and Its Applications in …, 2017
62017
A jigsaw puzzle solver-based attack on block-wise image encryption for privacy-preserving DNNs
T Chuman, H Kiya
International Workshop on Advanced Imaging Technology (IWAIT) 2023 12592 …, 2023
42023
Security evaluation of block-based image encryption for vision transformer against jigsaw puzzle solver attack
T Chuman, H Kiya
2022 IEEE 4th Global Conference on Life Sciences and Technologies (LifeTech …, 2022
42022
Block scrambling image encryption used in combination with data augmentation for privacy-preserving DNNs
T Chuman, H Kiya
2021 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW), 1-2, 2021
42021
A jigsaw puzzle solver-based attack on image encryption using vision transformer for privacy-preserving dnns
T Chuman, H Kiya
Information 14 (6), 311, 2023
32023
Compression Performance of Grayscale-based Image Encryption for Encryption-then-Compression Systems
W Sirichotedumrong, T Chuman, H Kiya
arXiv preprint arXiv:1810.13067, 2018
22018
Image manipulation analysis on social networking service for encryption-then-compression systems
T Chuman, K Iida, H Kiya
IEICE Technical Report; IEICE Tech. Rep. 117 (201), 1-6, 2017
22017
Grayscale-Based Image Encryption Considering Color Sub-Sampling Operation for Encryption-Then-Compression Systems
W Sirichotedumrong, T Chuman, H Kiya
2018 IEEE 7th Global Conference on Consumer Electronics (GCCE), 379-383, 2018
12018
Security Evaluation of Compressible and Learnable Image Encryption against Jigsaw Puzzle Solver Attacks
T Chuman, N Ono, H Kiya
2023 IEEE 12th Global Conference on Consumer Electronics (GCCE), 823-826, 2023
2023
A Privacy Preserving Method with a Random Orthogonal Matrix for ConvMixer Models
R Aso, T Chuman, H Kiya
arXiv preprint arXiv:2301.03843, 2023
2023
ConvMixer model transformation using random orthogonal matrices for privacy protection of test images.
R Aso, T Chuman, H Kiya
IEICE Technical Report; IEICE Tech. Rep. 122 (267), 46-51, 2022
2022
Security Evaluation of Compressible Image Encryption for Privacy-Preserving Image Classification Against Ciphertext-Only Attacks
T Chuman, H Kiya
arXiv preprint arXiv:2207.08109, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–20