IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information Security (ISEC)  (Searched in: 2012)

Search Results: Keywords 'from:2012-07-19 to:2012-07-19'

[Go to Official ISEC Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 20 of 34  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
10:30
Hokkaido   Reevaluation of Threshold Levels for Judging Complexity Boundary Using Distributions of Complexity in BPCS Steganography Technique
Syouhei Harada, Seok Kang, Yuji Sakamoto (Hokkaido Univ.) ISEC2012-9 SITE2012-5 ICSS2012-11 EMM2012-1
In this paper, we propose a technique reducing two dispersion values of a degradation level of stego images and a embedd... [more] ISEC2012-9 SITE2012-5 ICSS2012-11 EMM2012-1
pp.1-8
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
10:55
Hokkaido   Hybrid Additive-Multiplicative Watermarking for General Embedding Domains
Seigo Ikeda, Maki Yoshida, Toru Fujiwara (Osaka Univ.) ISEC2012-10 SITE2012-6 ICSS2012-12 EMM2012-2
 [more] ISEC2012-10 SITE2012-6 ICSS2012-12 EMM2012-2
pp.9-16
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
11:20
Hokkaido   On Information Hiding Technologies Based on Complete Complementary Codes
Tetsuya Kojima (Tokyo Natl. Coll. Tech.), Ryusuke Mayuzumi (Univ. of Electro-Comm.), Naoki Ohtani (NHK Media Tech.) ISEC2012-11 SITE2012-7 ICSS2012-13 EMM2012-3
Complete complemenary code (CCC) is a spread spectrum sequence family with good correlation properties. A digital waterm... [more] ISEC2012-11 SITE2012-7 ICSS2012-13 EMM2012-3
pp.17-22
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
13:05
Hokkaido   A data hiding method for binary images based on a pixel block feature and position of connected component
Hiroo Iwanaga, Hirohisa Hioki (Kyoto Univ.) ISEC2012-12 SITE2012-8 ICSS2012-14 EMM2012-4
Designing high capacity and quality-preserving data hiding methods for binary images is more difficult than for multi-va... [more] ISEC2012-12 SITE2012-8 ICSS2012-14 EMM2012-4
pp.23-28
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
13:30
Hokkaido   Performance evaluation of digital watermarking model with image restoration -- image restoration using 2D Ising model --
Masaki Kawamura (Yamaguchi Univ.), Tatsuya Uezu (Nara Women's Univ.), Masato Okada (Univ. Tokyo) ISEC2012-13 SITE2012-9 ICSS2012-15 EMM2012-5
We evaluate the decoding performance in the case that the prior probability is given by 2D Ising model in a spread spect... [more] ISEC2012-13 SITE2012-9 ICSS2012-15 EMM2012-5
pp.29-34
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
13:55
Hokkaido   Design of a Realtime Watermarking FPGA
Atsushi Katayama, Susumu Yamamoto, Shingo Ando, Ken Tsutsuguchi, Yukinobu Taniguchi (NTT) ISEC2012-14 SITE2012-10 ICSS2012-16 EMM2012-6
We reported watermark technique for movie which made a camera equipped cellular phone could detect watermark data in 20... [more] ISEC2012-14 SITE2012-10 ICSS2012-16 EMM2012-6
pp.35-42
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
14:35
Hokkaido   A Hiding Technique of Copy-Disturbance Noises Based on Temporal Scrambling of Narrow-band Components -- G-encoder Mark for COPY PROTECT --
Toshio Modegi, Shin'ichi Miyazaki (DNP), Goh Sekiguchi, Yuji Kosuda (DAC) ISEC2012-15 SITE2012-11 ICSS2012-17 EMM2012-7
We are developing a novel noise hiding technique, which can make audible copy disturbance noises embedded in the acousti... [more] ISEC2012-15 SITE2012-11 ICSS2012-17 EMM2012-7
pp.43-49
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
15:00
Hokkaido   Evaluation of a Visualization System to Assess the Risk of Websites
Tomoko Kajiyama (Aoyama Gakuin Univ.), Isao Echizen (NII) ISEC2012-16 SITE2012-12 ICSS2012-18 EMM2012-8
A prototype visualization system for helping children learn to assess website features and use them to identify risky we... [more] ISEC2012-16 SITE2012-12 ICSS2012-18 EMM2012-8
pp.51-57
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
15:25
Hokkaido   Quantitative evaluation on effectiveness of privacy protection for facial images
Yuta Nakashima (NAIST), Tomoaki Ikeno, Noboru Babaguchi (Osaka Univ.) ISEC2012-17 SITE2012-13 ICSS2012-19 EMM2012-9
Images and videos usually contain privacy sensitive information (PSI) such as faces; therefore, publishing such images a... [more] ISEC2012-17 SITE2012-13 ICSS2012-19 EMM2012-9
pp.59-66
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
15:50
Hokkaido   A Possibility of Value Creation Based on Information Hiding
Naofumi Aoki (Hokkaido Univ.) ISEC2012-18 SITE2012-14 ICSS2012-20 EMM2012-10
Discovering secret information may potentially satisfy the curiosity of consumer. This viewpoint can be a technique for ... [more] ISEC2012-18 SITE2012-14 ICSS2012-20 EMM2012-10
pp.67-70
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
13:05
Hokkaido   A Study on Cybersecurity Information Discovery Mechanisms over the Internet
Takeshi Takahashi, Youki Kadobayashi, Yuuki Takano (NICT) ISEC2012-19 SITE2012-15 ICSS2012-21 EMM2012-11
This paper prposes a scheme that links assorted structured cybersecurity information over networks and discovers them in... [more] ISEC2012-19 SITE2012-15 ICSS2012-21 EMM2012-11
pp.71-76
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
13:30
Hokkaido   Identifying the Code to be Analyzed with Taint Tags
Yuhei Kawakoya, Makoto Iwamura, Takeo Hariu (NTT) ISEC2012-20 SITE2012-16 ICSS2012-22 EMM2012-12
 [more] ISEC2012-20 SITE2012-16 ICSS2012-22 EMM2012-12
pp.77-82
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
13:55
Hokkaido   An Efficient Certificate Management Method for Improving Traffic Flow of Certificates in Mobile Communications
Norihito Yosaka, Tomoyuki Nagase (Hirosaki Univ.) ISEC2012-21 SITE2012-17 ICSS2012-23 EMM2012-13
 [more] ISEC2012-21 SITE2012-17 ICSS2012-23 EMM2012-13
pp.83-90
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
14:35
Hokkaido   TSP Solution Based on Clustering nodes in Ad-hoc networks
XIiaoji Li (DLUT), Tomoyuki Nagase (Hirosaki Uni.) ISEC2012-22 SITE2012-18 ICSS2012-24 EMM2012-14
 [more] ISEC2012-22 SITE2012-18 ICSS2012-24 EMM2012-14
pp.91-96
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
15:00
Hokkaido   A Fast Privacy-Preserving Collaborative Filtering Scheme with Transferring Statistical Value
Toru Nakamura, Shinsaku Kiyomoto, Ryu Watanabe, Yutaka Miyake (KDDI R&D Labs) ISEC2012-23 SITE2012-19 ICSS2012-25 EMM2012-15
The goal of this study is to provide more accurate recommendation to
users with sharing user information among service ... [more]
ISEC2012-23 SITE2012-19 ICSS2012-25 EMM2012-15
pp.97-102
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
15:25
Hokkaido   Detecting Invalid Control Flow with Pseudo-Dispersion of Program Code
Eitaro Shioji, Yuhei Kawakoya, Makoto Iwamura, Takeo Hariu (NTT) ISEC2012-24 SITE2012-20 ICSS2012-26 EMM2012-16
Attacks that modify the control flow of a running program by corrupting memory address pointers have been a major threat... [more] ISEC2012-24 SITE2012-20 ICSS2012-26 EMM2012-16
pp.103-108
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
15:50
Hokkaido   Architecture Design for Visualizing Risks and Implementing Adequate Security
Shin'ichiro Matsuo, Akira Kanaoka, Takeshi Takahashi, Shinsuke Miwa, Tadashi Minowa (NICT) ISEC2012-25 SITE2012-21 ICSS2012-27 EMM2012-17
 [more] ISEC2012-25 SITE2012-21 ICSS2012-27 EMM2012-17
pp.109-114
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
16:30
Hokkaido   [Invited Talk] The Diversity of Color Vision and Its Applications to Communication
Kazunori Asada ISEC2012-26 SITE2012-22 ICSS2012-28 EMM2012-18
People who have various types of color vision exist all over the world. The proportion of the distribution of congenital... [more] ISEC2012-26 SITE2012-22 ICSS2012-28 EMM2012-18
pp.115-120
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-20
09:00
Hokkaido   Keystroke Authentication Using the Technique of Quality engineering
Hitoshi Osaka, Koya Yano (Nihon Univ.) ISEC2012-27 SITE2012-23 ICSS2012-29 EMM2012-19
The personal authentication by a keystroke is the biometrics using the Characteristics of the action that imitation by a... [more] ISEC2012-27 SITE2012-23 ICSS2012-29 EMM2012-19
pp.121-126
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-20
09:25
Hokkaido   Spoofing detection in biometric authentication system
Tomoaki Matsunami, Ken Kamakura (Fujitsu Lab.) ISEC2012-28 SITE2012-24 ICSS2012-30 EMM2012-20
 [more] ISEC2012-28 SITE2012-24 ICSS2012-30 EMM2012-20
pp.127-134
 Results 1 - 20 of 34  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan