IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 112, Number 128

Information and Communication System Security

Workshop Date : 2012-07-19 - 2012-07-20 / Issue Date : 2012-07-12

[PREV] [NEXT]

[TOP] | [2009] | [2010] | [2011] | [2012] | [2013] | [2014] | [2015] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ICSS2012-11
Reevaluation of Threshold Levels for Judging Complexity Boundary Using Distributions of Complexity in BPCS Steganography Technique
Syouhei Harada, Seok Kang, Yuji Sakamoto (Hokkaido Univ.)
pp. 1 - 8

ICSS2012-12
Hybrid Additive-Multiplicative Watermarking for General Embedding Domains
Seigo Ikeda, Maki Yoshida, Toru Fujiwara (Osaka Univ.)
pp. 9 - 16

ICSS2012-13
On Information Hiding Technologies Based on Complete Complementary Codes
Tetsuya Kojima (Tokyo Natl. Coll. Tech.), Ryusuke Mayuzumi (Univ. of Electro-Comm.), Naoki Ohtani (NHK Media Tech.)
pp. 17 - 22

ICSS2012-14
A data hiding method for binary images based on a pixel block feature and position of connected component
Hiroo Iwanaga, Hirohisa Hioki (Kyoto Univ.)
pp. 23 - 28

ICSS2012-15
Performance evaluation of digital watermarking model with image restoration -- image restoration using 2D Ising model --
Masaki Kawamura (Yamaguchi Univ.), Tatsuya Uezu (Nara Women's Univ.), Masato Okada (Univ. Tokyo)
pp. 29 - 34

ICSS2012-16
Design of a Realtime Watermarking FPGA
Atsushi Katayama, Susumu Yamamoto, Shingo Ando, Ken Tsutsuguchi, Yukinobu Taniguchi (NTT)
pp. 35 - 42

ICSS2012-17
A Hiding Technique of Copy-Disturbance Noises Based on Temporal Scrambling of Narrow-band Components -- G-encoder Mark for COPY PROTECT --
Toshio Modegi, Shin'ichi Miyazaki (DNP), Goh Sekiguchi, Yuji Kosuda (DAC)
pp. 43 - 49

ICSS2012-18
Evaluation of a Visualization System to Assess the Risk of Websites
Tomoko Kajiyama (Aoyama Gakuin Univ.), Isao Echizen (NII)
pp. 51 - 57

ICSS2012-19
Quantitative evaluation on effectiveness of privacy protection for facial images
Yuta Nakashima (NAIST), Tomoaki Ikeno, Noboru Babaguchi (Osaka Univ.)
pp. 59 - 66

ICSS2012-20
A Possibility of Value Creation Based on Information Hiding
Naofumi Aoki (Hokkaido Univ.)
pp. 67 - 70

ICSS2012-21
A Study on Cybersecurity Information Discovery Mechanisms over the Internet
Takeshi Takahashi, Youki Kadobayashi, Yuuki Takano (NICT)
pp. 71 - 76

ICSS2012-22
Identifying the Code to be Analyzed with Taint Tags
Yuhei Kawakoya, Makoto Iwamura, Takeo Hariu (NTT)
pp. 77 - 82

ICSS2012-23
An Efficient Certificate Management Method for Improving Traffic Flow of Certificates in Mobile Communications
Norihito Yosaka, Tomoyuki Nagase (Hirosaki Univ.)
pp. 83 - 90

ICSS2012-24
TSP Solution Based on Clustering nodes in Ad-hoc networks
XIiaoji Li (DLUT), Tomoyuki Nagase (Hirosaki Uni.)
pp. 91 - 96

ICSS2012-25
A Fast Privacy-Preserving Collaborative Filtering Scheme with Transferring Statistical Value
Toru Nakamura, Shinsaku Kiyomoto, Ryu Watanabe, Yutaka Miyake (KDDI R&D Labs)
pp. 97 - 102

ICSS2012-26
Detecting Invalid Control Flow with Pseudo-Dispersion of Program Code
Eitaro Shioji, Yuhei Kawakoya, Makoto Iwamura, Takeo Hariu (NTT)
pp. 103 - 108

ICSS2012-27
Architecture Design for Visualizing Risks and Implementing Adequate Security
Shin'ichiro Matsuo, Akira Kanaoka, Takeshi Takahashi, Shinsuke Miwa, Tadashi Minowa (NICT)
pp. 109 - 114

ICSS2012-28
[Invited Talk] The Diversity of Color Vision and Its Applications to Communication
Kazunori Asada
pp. 115 - 120

ICSS2012-29
Keystroke Authentication Using the Technique of Quality engineering
Hitoshi Osaka, Koya Yano (Nihon Univ.)
pp. 121 - 126

ICSS2012-30
Spoofing detection in biometric authentication system
Tomoaki Matsunami, Ken Kamakura (Fujitsu Lab.)
pp. 127 - 134

ICSS2012-31
An efficient variant of Rainbow without triangular matrix representation
Takanori Yasuda (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (ISIT)
pp. 143 - 150

ICSS2012-32
A New Higher Order Differential Property of Hierocrypt
Tetsuhiro Takahashi, Toshinobu Kaneko (TUS)
pp. 151 - 158

ICSS2012-33
A New Solving Algorithm for Attack Equation of Higher Order Differential Attack on AES (II)
Yusuke Inoue, Akinobu Kitagawa, Toshinobu Kaneko (TUS)
pp. 159 - 166

ICSS2012-34
How to purge imaginary path in truncate analysis
Toshinobu Kaneko (TUS)
pp. 167 - 173

ICSS2012-35
Privacy Preserving Data Processing with Collaboration of Paillier and RSA Public Key Cryptosystems -- For Overcoming Contradiction of Protection and Utilization of Personal Data --
Shigeo Tsujii, Hiroshi Yamaguchi (Chuo Univ.), Hiroshi Doi (IISEC), Yukiyasu Tsunoo (NEC), Ryo Fujita (Chuo Univ.), Takahiko Syouji (YDK)
pp. 175 - 179

ICSS2012-36
Rationality and Security in Oblivious Transfer
Haruna Higo, Akihiro Yamada, Keisuke Tanaka (Tokyo Inst. of Tech.), Kenji Yasunaga (ISIT)
pp. 181 - 188

ICSS2012-37
An Improved Algorithm for Approximate GCD Problems
Atsushi Takayasu, Noboru Kunihiro (UT)
pp. 189 - 194

ICSS2012-38
A Batch Mapping Algorithm for Secure Function Evaluation
Koki Hamada, Dai Ikarashi, Koji Chida (NTT)
pp. 195 - 199

ICSS2012-39
Efficient elliptic curve scalar multiplication using an elliptic net algorithm
Naoki Kanayama, Yang Liu, Eiji Okamoto, Kazutaka Saito, Tadanori Teruya (Univ. of Tsukuba), Shigenori Uchiyama (Tokyo Metro Univ.)
pp. 201 - 206

ICSS2012-40
Efficient Proofs for CNF Formulas on Attributes in Pairing-Based Anonymous Credential System
Nasima Begum, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.)
pp. 207 - 212

ICSS2012-41
Construction of the Tsujii-Shamir-Kasahara (TSK) Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization
Shigeo Tsujii, Masahito Gotaishi (Chuo Univ.)
pp. 213 - 216

ICSS2012-42
A Proposal of Personal Authentication System using Cocktail Party Effect
Kosei Taketa, Hiroyuki Inaba (KIT)
pp. 217 - 221

ICSS2012-43
A Recent Trend in Ethical and Legal Studies on Privacy
Takushi Otani (Kibi Internationla Univ.)
pp. 223 - 228

ICSS2012-44
Proposal of Virtual Experimental System for Computer Virus Infection Situation
Shun-ichi Kurino, Noriaki Yoshikai (Nihon Univ.), Toshio Takahshi (JEED)
pp. 229 - 235

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan