Isao Echizen
Isao Echizen
National Institute of Informatics / University of Tokyo / SOKENDAI
Verified email at - Homepage
Cited by
Cited by
Mesonet: a compact facial video forgery detection network
D Afchar, V Nozick, J Yamagishi, I Echizen
2018 IEEE International Workshop on Information Forensics and Security (WIFS …, 2018
Aspects of privacy for electronic health records
S Haas, S Wohlgemuth, I Echizen, N Sonehara, G Müller
International journal of medical informatics 80 (2), e26-e31, 2011
Capsule-forensics: Using capsule networks to detect forged images and videos
HH Nguyen, J Yamagishi, I Echizen
ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and …, 2019
Multi-task learning for detecting and segmenting manipulated facial images and videos
HH Nguyen, F Fang, J Yamagishi, I Echizen
arXiv preprint arXiv:1906.06876, 2019
Distinguishing computer graphics from natural images using convolution neural networks
N Rahmouni, V Nozick, J Yamagishi, I Echizen
2017 IEEE Workshop on Information Forensics and Security (WIFS), 1-6, 2017
High-quality nonparallel voice conversion based on cycle-consistent adversarial network
F Fang, J Yamagishi, I Echizen, J Lorenzo-Trueba
2018 IEEE International Conference on Acoustics, Speech and Signal …, 2018
Method of authenticating digital-watermark pictures
K Nakano, J Taguchi, H Yoshiura, I Echizen, Y Kurosu
US Patent 6,418,232, 2002
Method of extracting digital watermark information and method of judging bit value of digital watermark information
I Echizen, H Yoshiura, K Anzai, Y Kurosu
US Patent 6,563,935, 2003
Network system enabling transmission control
S Itoh, K Miyazaki, I Echizen
US Patent 7,047,407, 2006
Use of a capsule network to detect fake images and videos
HH Nguyen, J Yamagishi, I Echizen
arXiv preprint arXiv:1910.12467, 2019
Voice liveness detection algorithms based on pop noise caused by human breath for automatic speaker verification
S Shiota, F Villavicencio, J Yamagishi, N Ono, I Echizen, T Matsui
Sixteenth annual conference of the international speech communication …, 2015
Can we steal your vocal identity from the Internet?: Initial investigation of cloning Obama's voice using GAN, WaveNet and low-quality found data
J Lorenzo-Trueba, F Fang, X Wang, I Echizen, J Yamagishi, T Kinnunen
arXiv preprint arXiv:1803.00860, 2018
Digital watermark data embedding method, and digital watermark data embeddability analyzing method
I Echizen, H Yoshiura, R Sasaki, S Harano, S Eikawa
US Patent 7,047,412, 2006
Speaker anonymization using x-vector and neural waveform models
F Fang, X Wang, J Yamagishi, I Echizen, M Todisco, N Evans, ...
arXiv preprint arXiv:1905.13561, 2019
Watermark information detection method
I Echizen, H Yoshiura, H Kimura, A Fukushima, K Anzai
US Patent 7,113,613, 2006
Privacy visor: Method for preventing face image detection by using differences in human and device sensitivity
T Yamada, S Gohshi, I Echizen
IFIP International Conference on Communications and Multimedia Security, 152-161, 2013
Robust message hiding for QR code
TV Bui, NK Vu, TTP Nguyen, I Echizen, TD Nguyen
2014 Tenth International Conference on Intelligent Information Hiding and …, 2014
Method and apparatus for using contents
H Ukai, S Hirasawa, K Anzai, I Echizen, H Yoshiura, M Okayama, S Tago
US Patent 7,293,294, 2007
New approach to quantification of privacy on social network sites
TH Ngoc, I Echizen, K Komei, H Yoshiura
2010 24th IEEE International Conference on Advanced Information Networking …, 2010
Isolation in cloud computing and privacy-enhancing technologies
N Sonehara, I Echizen, S Wohlgemuth
Business & information systems engineering 3 (3), 155-162, 2011
The system can't perform the operation now. Try again later.
Articles 1–20