Eiji Kawaguchi’s research while affiliated with Keio University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (109)


Steganographic Methods Focusing on BPCS Steganography
  • Chapter

April 2007

·

72 Reads

Studies in Computational Intelligence

Hideki Noda

·

Michiharu Niimi

·

Eiji Kawaguchi

Steganography is a technique to hide secret information in some other data (we call it a vessel) without leaving any apparent evidence of data alteration. This chapter describes a high capacity steganographic method called bit-plane complexity segmentation (BPCS) steganography. BPCS steganography usually uses an image as the vessel data, and secret information is embedded in the bit-planes of the vessel. This technique makes use of the characteristics of the human vision system whereby a human cannot perceive any shape information in a very complicated binary pattern. We can replace all of the “noise-like” regions in the bit-planes of the vessel image with secret data without deteriorating image quality. The principle and possible applications of BPCS, attacks to BPCS, and BPCS applicable to JPEG2000 images are here addressed. Additionally, histogram preserving JPEG steganography is described, and finally experimental results are given.


High-performance JPEG steganography using quantization index modulation in DCT domain

April 2006

·

133 Reads

·

115 Citations

Pattern Recognition Letters

This paper presents two JPEG steganographic methods using quantization index modulation (QIM) in the discrete cosine transform (DCT) domain. The two methods approximately preserve the histogram of quantized DCT coefficients, aiming at secure JPEG steganography against histogram-based attacks. In comparison with F5 as a representative JPEG steganography, the proposed methods show high performance with regard to embedding rate, PSNR of stego image, and particularly histogram preservation. (c) 2005 Elsevier B.V. All rights reserved.



Application of QIM with dead zone for histogram preserving JPEG steganography

October 2005

·

29 Reads

·

21 Citations

This paper presents two histogram preserving JPEG steganographic methods aiming at secure JPEG steganography against histogram-based attacks. The first one is a histogram quasi-preserving method, which uses quantization index modulation (QIM) at quantization step of DCT coefficients. Since a straightforward application of QIM causes a significant histogram change, a device is introduced in order not to change the after-embedding histogram excessively. The second one is a histogram preserving method based on histogram matching using two quantizers with a dead zone. In comparison with F5 as a representative JPEG steganography, the two methods show high performance with regard to embedding rate, PSNR of stego image, and particularly histogram preservation.


BPCS-Steganography – Principle and Applications

September 2005

·

726 Reads

·

67 Citations

Lecture Notes in Computer Science

The abstract should summarize the contents of the paper and should Steganography is a technique to hide secret information in some other data (we call it a vessel) without leaving any apparent evidence of data alteration. All of the traditional steganographic techniques have limited information-hiding capacity. This is because the principle of those techniques was either to replace a special part of the frequency components of the vessel image, or to replace all the least significant bits of a multi-valued image with the secret information. Our new steganography uses an image as the vessel data, and we embed secret information in the bit-planes of the vessel. This technique makes use of the characteristics of the human vision system whereby a human cannot perceive any shape information in a very complicated binary pattern. We can replace all of the “noise-like” regions in the bit-planes of the vessel image with secret data without deteriorating the image quality. We termed our steganography “BPCS-Steganography,” which stands for Bit-Plane Complexity Segmentation Steganography.


Position Paper: Digital Media Archive for Academic Resources.

January 2005

·

28 Reads

·

1 Citation

Today, there is high demand for digital media archives that can archive wide variety of academic resources and deliver customized contents upon audiences' needs. Key challenges of the digital media archives for academic resources are a) a methodology to embed academically meaningful interpretation of resources, i.e. metadata, to digital media data themselves b) search mechanism to such academic metadata, and c) sophisticated access methodology to such digital archives. In this position paper, we describe our approach to these challenges, and how we're going to implement the digital media archives in our project.


A Model of Unforgeable Digital Certificate Document System

January 2005

·

157 Reads

·

5 Citations

Certificate documents today are either written or printed matter on a paper surface or plastic card. No digital data are accepted as a certificate document. People always asked to send an original certificate documents by traditional post mail even in this developing information age. The present paper proposes an unforgeable certificate document system wherein each document has a forgery-protective capability by itself. It does not need any communication with an authentication bureau. The system has several variations according to the key usage and additionally incorporated data. If this system is implemented, all certificate documents may be digitalized.


Application of BPCS steganography to wavelet compressed video

November 2004

·

206 Reads

·

37 Citations

Proceedings / ICIP ... International Conference on Image Processing

This paper presents a steganography method using lossy compressed video which provides a natural way to send a large amount of secret data. The proposed method is based on wavelet compression for video data and bit-plane complexity segmentation (BPCS) steganography. In wavelet-based video compression methods such as 3-D set partitioning in hierarchical trees (SPIHT) algorithm and motion-JPEG2000, wavelet coefficients in discrete wavelet transformed video are quantized into a bit-plane structure and therefore BPCS steganography can be applied in the wavelet domain. 3-D SPIHT-BPCS steganography and motion-JPEG2000-BPCS steganography are presented and tested, which are the integration of 3-D SPIHT video coding and BPCS steganography and that of motion-JPEG2000 and BPCS, respectively. Experimental results show that 3-D SPIHT-BPCS is superior to motion-JPEG2000-BPCS with regard to embedding performance.


An attack to BPCS-steganography using complexity histogram and countermeasure

November 2004

·

40 Reads

·

7 Citations

Proceedings / ICIP ... International Conference on Image Processing

M. Niimi

·

T. Ei

·

H. Noda

·

[...]

·

B. Segee

This paper discusses an attack to BPCS-Steganography (Bit-Plane Complexity Segmentation-Steganography) and presents a countermeasure. BPCS is an image-based steganographic method. BPCS embeds secret data by replacing blocks that appear noise-like on bit-planes. Blocks on bit-planes are categorized as a "noise-like region" or an "informative region" by means of the binary-image feature called complexity. When the complexity distribution of noise-like blocks is different from the complexity distribution of the secret data that replaces those blocks, we can see an unusual shape in the form of a valley in the complexity histogram that represents the relative frequency of occurrence of the various complexities. This would be a signature of BPCS. Because steganography must hide the existence of the secret message, the signature should be removed from steganographic images. We present a method for making embedded binary patterns that quasipreserves the complexity distribution.


Electronic Imaging 2004

June 2004

·

5 Reads

·

2 Citations

Proceedings of SPIE - The International Society for Optical Engineering

This paper presents a steganography method using lossy compressed video which provides a natural way to send a large amount of secret data. The proposed method is based on wavelet compression for video data and bit-plane complexity segmentation (BPCS) steganography. BPCS steganography makes use of bit-plane decomposition and the characteristics of the human vision system, where noise-like regions in bit-planes of a dummy image are replaced with secret data without deteriorating image quality. In wavelet-based video compression methods such as 3-D set partitioning in hierarchical trees (SPIHT) algorithm and Motion-JPEG2000, wavelet coefficients in discrete wavelet transformed video are quantized into a bit-plane structure and therefore BPCS steganography can be applied in the wavelet domain. 3-D SPIHT-BPCS steganography and Motion-JPEG2000-BPCS steganography are presented and tested, which are the integration of 3-D SPIHT video coding and BPCS steganography, and that of Motion-JPEG2000 and BPCS, respectively. Experimental results show that 3-D SPIHT-BPCS is superior to Motion-JPEG2000-BPCS with regard to embedding performance. In 3-D SPIHT-BPCS steganography, embedding rates of around 28% of the compressed video size are achieved for twelve bit representation of wavelet coefficients with no noticeable degradation in video quality.© (2004) COPYRIGHT SPIE--The International Society for Optical Engineering. Downloading of the abstract is permitted for personal use only.


Citations (59)


... With image data, content analysis of the data can be combined with natural-language processing of the captions to supplement the original English caption, as in the weather map system of Yokokota et al. [1984] and the face-locating program of Srihari and Rapaport [1989]. But content analysis of audio, pictures, and video can be very slow and is only successful for narrowly restricted content. ...

Reference:

Natural-Language Retrieval of Images Based on Descriptive Captions
Language-Picture Question-Answering Through Common Semantic Representation And its Application to the World of Weather Report
  • Citing Chapter
  • January 1984

... Therefore, if yi = yj , then z ik = z jk ; 1 k L(i), that is, Ii = Ij . Therefore y i = y j ) I i = I j (16) which is equivalent to I i 6 = I j ) y i 6 = y j : (17) Equations (13) and (17) result in x i 6 = x j ) y i 6 = y j : (18) Theorem 2: Among indexvectors generated with the fixed previous input x p = (l p ; n p ), no indexvector is a prefix of any other indexvector. ...

A method of making lookup tables for hubert scans
  • Citing Article
  • January 1996

... There are several algorithms that are used to embed in palette based images. Some examples of the well known algorithms are: Gifshufle [7], EzStego [4], Fridrich's parity bit method [3], BPCS Steganographic method for palette-based images [5,6] and the new pixel sorting method [1]. These algorithms have several limitations which are explained in section 2.2. ...

A method to apply BPCS-Steganography to palette-based images using luminance quasi-preserving color quantization
  • Citing Article
  • September 2002

IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences

... Clustering techniques have been very popular in remote sensing applications (Faber et. al. 1994, Kelly and White 1993, Kamata and Kawaguchi 1995Larch 1994, Kamata et. al. 1991. Multi-spectral scanners on LANDSAT satellites sense the electromagnetic energy of the light reflected by the earth's surface in several bands (or wavelengths) of the spectrum. A pixel represents the smallest area on earth's surface that can be separated from the neighboring areas. The pixel size and the number of bands varies, dependin ...

Classification of LANDSAT Image Data and Its Evaluation Using a Neural Network Approach
  • Citing Article
  • January 1991

Transactions of the Society of Instrument and Control Engineers

... Here we are exclusively concerned with parsing or textual analysis. Analogous considerations can be made concerning textual synthesis or generation (Kawaguchi, 1997). We shall discuss a new method for extracting the informational content of (brief) texts formulated in natural language (NL). ...

Toward development of multimedia database system for conversational natural language
  • Citing Conference Paper
  • May 1998

... As a method of embedding the secret data in the content, a method of embedding the secret data in the real space of the content [9] and a method of embedding the secret data in the frequency space have been proposed [10], [11]. The latter has a higher ability to conceal the secret data information than the former because the secret data can be embedded in a specific frequency band that is relatively unaffected by the content quality. ...

Topological ordered color table for BPCS-Steganography using indexed color images
  • Citing Article
  • May 2000

Proceedings of SPIE - The International Society for Optical Engineering