Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Masayuki Suto is active.

Publication


Featured researches published by Masayuki Suto.


international symposium on circuits and systems | 2002

A new semi-fragile image authentication framework combining ECC and PKI infrastructures

Qibin Sun; Shih-Fu Chang; Kurato Maeno; Masayuki Suto

Presents a new semi-fragile framework aiming at extending public key signature scheme from message level to content level. The content signing procedure includes signature generation and watermark embedding while the content authentication procedure includes watermark extraction and signature verification. One main unique contribution is the novel use of error correction coding (ECC) to address the incidental distortions caused by some acceptable manipulations such as lossy compression. Another unique feature is integration of PKI security infrastructure and the hashing mechanism to achieve security and short signatures/watermarks. In the signing procedure, block-based invariant features are extracted from the image content and then encoded by ECC to obtain their corresponding parity check bits (PCB). All PCBs are then embedded back into image as watermarks for the purpose of authentication and locating content alteration. In addition, codewords are concatenated, hashed and finally signed by content owners private key to generate a global cryptographic signature. The authentication procedure is the inverse procedure of signing except using content owners public key for signature verification.


international conference on image processing | 2002

A quantitative semi-fragile JPEG2000 image authentication system

Qibin Sun; Shih-Fu Chang; Maeno Kurato; Masayuki Suto

We propose a novel integrated approach to quantitative semi-fragile authentication of JPEG2000 images under a generic framework which combines ECC and PKI infrastructures. Firstly acceptable manipulations (e.g., re-encoding) which should pass authentication are defined based on considerations of some target applications. We propose a unique concept of lowest authenticable bit rate - images undergoing repetitive re-encoding are guaranteed to pass authentication provided the re-encoding rates are above the lowest allowable bit rate. Our solutions include computation of content-based features derived from the EBCOT encoding procedure of JPEG2000, error correction coding of the derived features, PKI cryptographic signing, and finally robust embedding of the feature codes into image as watermarks.


electronic imaging | 2002

New semifragile image authentication watermarking techniques using random bias and nonuniform quantization

Kurato Maeno; Qibin Sun; Shih-Fu Chang; Masayuki Suto

Semi-fragile watermarking techniques aim at detecting malicious manipulations on an image, while allowing acceptable manipulations such as lossy compression. Although both of these manipulations are considered to be pixel value changes, semi-fragile watermarks should be sensitive to malicious manipulations but robust to the degradation introduced by lossy compression and other defined acceptable manipulations. In this paper, after studying the characteristics of both natural images and malicious manipulations, we propose two new semi-fragile authentication techniques robust against lossy compression, using random bias and nonuniform quantization, to improve the performance of the methods proposed by Lin and Chang.


Archive | 1996

Method of and apparatus for embedding data into an electronic document by modulating spaces between words

Naoharu Horino; Masayuki Suto; Kineo Matsui


Archive | 2002

Method and system for watermarking an electrically depicted image

Kurato Maeno; Qibin Sun; Shih-Fu Chang; Masayuki Suto


electronic imaging | 2003

New alteration detecting technique for printed documents using dot pattern watermarking

Masahiko Suzaki; Yasuhiro Mitsui; Masayuki Suto


Archive | 1996

Method of and apparatus for embedding data into an electronic document

Naoharu Horino; Masayuki Suto; Kineo Matsui


Archive | 2002

Method and apparatus for watermarking and authenticating data

Qibin Sun; Shih-Fu Chang; Kurato Maeno; Masayuki Suto


Electronics and Communications in Japan Part Iii-fundamental Electronic Science | 2005

A watermark embedding and extracting method for printed documents

Masahiko Suzaki; Masayuki Suto


IPSJ SIG Notes | 2005

Robust watermarking scheme for copied, rotated and clipped documents

Kurato Maeno; Masayuki Suto

Collaboration


Dive into the Masayuki Suto's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge