Koga Hiroki

Researcher's full information

Articles
  • Asymptotic Optimality of Modified Spherical Codes with Scalar Quantizer of Gain for Memoryless Gaussian Source
    Hiroki Koga; Suguru Arimoto
    IEICE Transactions on Fundamentals/E76-A(9)/p.1403-1410, 1993-09
  • On the Asynptotic Behaviors of the Recurcence Time Fidelity Criterian for Discrete Memoryless Sources and Memoryless Gaussian Sources
    Hiroki Koga; Suguru Arimoto
    IEICE Transactions on Fundamentels/E81-A(5)/p.981-986, 1998-06
  • Proposal of a Lattice-Based Visual Seuet Sharing Scheme for Color and Gray-Scale Images (共著)
    Hiroki Koga; Hirosuke Yamamoto
    IEICE Transactions on Fundamentals/E81-A(6)/p.1263-1269, 1998-06
  • Coding Theorem for Secret-Key Authentication Systems
    Hiroki Koga; Hirosuke Yamamoto
    IEICE Trans. on Fundamentals/E83-A(8)/p.1691--703, 2000-08
  • An Analytic Construction of the Visual Secret Sharing Scheme for Color Images
    Hiroki Koga; Mitsugu Iwamoto; Hirosuke Yamamoto
    IEICE Trans. on Fundamentals,/E84-A(1)/p.pp. 262--272, 2001-01
  • A Construction of a Visual Secret Sharing Scheme for Plural Secret Images and its Basic Properties
    Hiroki Koga; Masayuki Miyata
    Proceedings of 2008 International Symposium on Information Theory and its Applications/p.24-29, 2008-12
  • Basic Properties of the Complete Complementary Codes Using DTF Matrices and the Kronecker Products
    Jin Yi; Hiroki Koga
    Proceedings of 2008 International Symposium on Information Theory and its Applications/p.887-892, 2008-12
  • New Coding Theorems for Fixed-Length Source Coding and Shannons's Cipher System with a General Source
    Hiroki Koga
    Proceedings of 2008 International Symposium on Information Theory and its Applications/p.251-256, 2008-12
  • Coding Theorems on the Threshold Scheme for a General Source
    Hiroki Koga
    IEEE Transactions on Information Theory/54(6)/p.2658-2677, 2008-06
  • A Coding Theorem for Cheating-Detectable (2,2)-Threshold Blockwise Secret Sharing Schemes
    M. Iwamoto; H. Yamamoto; H. Koga
    Proc. 2009 IEEE International Symposium on Information Theory/p.1308--1312, 2009-06
  • Coding Theorems for a (2,2)-Threshold Scheme Secure against Impersonation by an Opponent
    H. Koga; M. Iwamoto; H. Yamamoto
    Proc. 2009 IEEE Information Theory Workshop/(1)/p.188--192, 2009-10
  • Two Generalizations of a Coding Theorem for a (2,2)-THreshold Scheme with a Cheater
    Hiroki Koga
    Proceedings of 2010 International Symposium on Information Theory and its Applications/p.678-683, 2010-10
  • A digital Fingerprinting Code Based on a Projective Plane and Its Identifiability of all Malicious Users
    Hiroki Koga; Yusuke Minami
    IEICE Trans. on Fundamentals/E94-A(1)/p.223-232, 2011-01
  • Coding Theorems on the Worst-Case Redundancy of Fixed-Length Coding for a General Source
    Hiroki Koga; Mitsuharu Arimura; Ken-ichi Iwata
    Proceedings of 2011 IEEE International Symposium on Information Theory/p.1434--1438, 2011-01
  • Toward Further Developments in Information Theory
    鎌部 浩; 古賀 弘樹
    IEICE technical report. Information theory/111(329)/pp.25-28, 2011-11
  • AS-2-6 On Construction and Optimality of a (k,n)-Threshold Scheme with Detectability of Impersonation Attacks
    古賀 弘樹
    Proceedings of the IEICE General Conference/2012(0)/pp.S-27-S-28, 2012-03
  • Coding Theorems for a (2,2)-Threshold Scheme With Detectability of Impersonation Attacks
    Iwamoto Mitsugu; Koga Hiroki; Yamamoto Hirosuke
    IEEE TRANSACTIONS ON INFORMATION THEORY/58(9)/pp.6194-6206, 2012-09
  • The Width of Information-Spectrum and the Worst-Case Redundancy of Fixed-Length Coding
    古賀 弘樹; 有村 光晴; 岩田 賢一
    電子情報通信学会技術研究報告. IT, 情報理論/110(442)/pp.93-98, 2011-02
  • A (3, 3)-Threshold Scheme Secure against Ordinary and Extended Impersonation Attacks
    児矢野 和也; 古賀 弘樹
    電子情報通信学会技術研究報告. IT, 情報理論/110(442)/pp.311-318, 2011-02
  • On the Achievable Rate Region in the Optimistic Sense for Independent Coding of Two Correlated General Sources
    古賀 弘樹
    IEICE technical report. Information theory/111(220)/pp.49-54, 2011-09
  • Performance of a Fragile Watermarking Scheme with Detectability of Tampered Locations in JPEG Images
    坂下 光輝; 古賀 弘樹
    IEICE technical report. Information theory/111(51)/pp.31-36, 2011-05
  • Four Limits in Probability and Their Roles in Source Coding
    Koga Hiroki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES/E94A(11)/pp.2073-2082, 2011-11
  • Four Limits in Probability and Coding of a General Source
    古賀 弘樹
    IEICE technical report. Information theory/110(363)/pp.37-42, 2011-01
  • The Width of Information-Spectrum and the Worst-Case Redundancy of Fixed-Length Coding
    古賀 弘樹; 有村 光晴; 岩田 賢一
    IEICE technical report. Information theory/110(442)/pp.93-98, 2011-02
  • A (3,3)-Threshold Scheme Secure against Ordinary and Extended Impersonation Attacks
    児矢野 和也; 古賀 弘樹
    IEICE technical report. Information theory/110(442)/pp.311-318, 2011-02
  • more...