Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM |
2023-01-26 09:55 |
Miyagi |
Tohoku Univ. (Primary: On-site, Secondary: Online) |
On the Transferability of Adversarial Examples between Isotropic Network and CNN models Miki Tanaka (Tokyo Metropolitan Univ.), Isao Echizen (NII), Hitoshi Kiya (Tokyo Metropolitan Univ.) EMM2022-62 |
Deep neural networks are well known to be vulnerable to adversarial examples (AEs). In addition, AEs generated for a sou... [more] |
EMM2022-62 pp.7-12 |
CAS, SIP, VLD, MSS |
2022-06-16 14:40 |
Aomori |
Hachinohe Institute of Technology (Primary: On-site, Secondary: Online) |
Adversarial Robustness of Secret Key-Based Defenses against AutoAttack Miki Tanaka, April Pyone MaungMaung (Tokyo Metro Univ.), Isao Echizen (NII), Hitoshi Kiya (Tokyo Metro Univ.) CAS2022-7 VLD2022-7 SIP2022-38 MSS2022-7 |
Deep neural network (DNN) models are well-known to easily misclassify prediction results by using input images with smal... [more] |
CAS2022-7 VLD2022-7 SIP2022-38 MSS2022-7 pp.34-39 |
IT, EMM |
2022-05-17 15:30 |
Gifu |
Gifu University (Primary: On-site, Secondary: Online) |
A study of adversarial example detection using the correlation between adversarial noise and JPEG compression-derived distortion Kenta Tsunomori, Yuma Yamasaki, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.), Isao Echizen (NII) IT2022-6 EMM2022-6 |
Adversarial examples cause misclassification of image classifiers. Higashi et al. proposed a method to detect adversari... [more] |
IT2022-6 EMM2022-6 pp.29-34 |
IT, EMM |
2022-05-17 15:55 |
Gifu |
Gifu University (Primary: On-site, Secondary: Online) |
Examination of round color 2D symbol for B2C with display area and secret data area Nobuyuki Teraura (Terrara Code), Isao Echizen (NII), Keiichi Iwamura (TUS) IT2022-7 EMM2022-7 |
We examined 2D symbols for B2C applications. QR code is a matrix-type 2D symbol announced in 1994. Since QR code was dev... [more] |
IT2022-7 EMM2022-7 pp.35-40 |
EMM, IT |
2021-05-21 13:10 |
Online |
Online |
A Study of Detecting Adversarial Examples Using Sensitivities to Multiple Auto Encoders Yuma Yamasaki, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.), Huy Hong Nguyen, Isao Echizen (NII) IT2021-11 EMM2021-11 |
By removing the small perturbations involved in adversarial examples, the image classification result returns to the cor... [more] |
IT2021-11 EMM2021-11 pp.60-65 |
EMM |
2021-03-04 14:15 |
Online |
Online |
[Poster Presentation]
Detection of Adversarial Examples in CNN Image Classifiers Using Features Extracted with Multiple Strengths of Filter Akinori Higashi, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.), Huy Hong Nguyen, Isao Echizen (NII) EMM2020-70 |
Deep learning has been used as a new method for machine learning, and its performance has been significantly improved. A... [more] |
EMM2020-70 pp.19-24 |
EMM |
2020-03-05 16:45 |
Okinawa |
(Cancelled but technical report was issued) |
[Poster Presentation]
Detecting Adversarial Examples Based on Sensitivities to Lossy Compression Algorithms Akinori Higashi, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.), Huy Hong Nguyen, Isao Echizen (NII) EMM2019-123 |
The adversarial examples are created by adding small perturbations to an input image for misleading an CNN-based image c... [more] |
EMM2019-123 pp.113-116 |
EMM |
2019-03-14 10:40 |
Okinawa |
TBD |
Implementation of Digital Signature to QR Symbol with Compatible using Subcell Division and Double Encoding Nobuyuki Teraura (Terrara Code), Isao Echizen (NII), Keiichi Iwamura (TUS) EMM2018-113 |
(To be available after the conference date) [more] |
EMM2018-113 pp.117-122 |
IEE-CMN, EMM, LOIS, IE, ITE-ME [detail] |
2018-09-28 13:15 |
Oita |
Beppu Int'l Convention Ctr. aka B-CON Plaza |
Dynamic Estimation of Collusion Strategy for the Detection of Colluders in Fingerprinting Codes Tatsuya Yasui, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.), Isao Echizen (NII) LOIS2018-19 IE2018-39 EMM2018-58 |
An optimal detector known as MAP detector has been proposed for the probabilistic fingerprinting
code. It needs two kin... [more] |
LOIS2018-19 IE2018-39 EMM2018-58 pp.65-70 |
IT, EMM |
2018-05-18 14:20 |
Tokyo |
Ookayama Campus, Tokyo Institute of Technology |
Efficient schemes for encoding and decoding of non-adaptive group testing Thach V. BUI (SOKENDAI), Minoru Kuribayashi (Okayama Univ.), Tetsuya Kojima (TOKYO KOSEN), Roghayyeh Haghvirdinezhad (NJIT), Isao Echizen (NII) IT2018-10 EMM2018-10 |
[more] |
IT2018-10 EMM2018-10 pp.53-58 |
EMM |
2018-01-30 11:30 |
Miyagi |
Tohoku Univ. (Aobayama Campus) |
Study of a new information extraction method using a single dot method with machine learning technique Yuki Matsue, Kitahiro Kaneda, Keiichi Iwamura (TUS), Isao Echizen (NII) EMM2017-75 |
[more] |
EMM2017-75 pp.49-54 |
EMM, IE, LOIS, IEE-CMN, ITE-ME [detail] |
2017-09-05 11:00 |
Kyoto |
Kyoto Univ. (Clock Tower Centennial Hall) |
[Fellow Memorial Lecture]
Controlling the information at border between cyber and physical worlds
-- Future outlook on security and privacy research for multimedia -- Isao Echizen (NII) LOIS2017-21 IE2017-42 EMM2017-50 |
Due to developments of the Internet of Things, computers, sensors and their networks are located in all places, and usef... [more] |
LOIS2017-21 IE2017-42 EMM2017-50 pp.63-64 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-15 13:50 |
Tokyo |
|
Study of template matching application of steganography ANGO Hirokazu Ishizuka (Mitsubishi Electric), Isao Echizen (NII), Keiichi Iwamura (TUS), Koichi Sakurai (Kyushu Univ.) ISEC2017-33 SITE2017-25 ICSS2017-32 EMM2017-36 |
We propose a method ANGO(=Asymmetric Nondestractive steGanOgraphy) to extract different third information by two(o... [more] |
ISEC2017-33 SITE2017-25 ICSS2017-32 EMM2017-36 pp.247-252 |
EMM, IT |
2017-05-23 11:55 |
Yamagata |
Yamagata University(Yonezawa Campus) |
Investigation on the Effect of Error Correction by RS Code on Pattern Masking of Double Encoded Two-dimensional Code Nobuyuki Teraura (TCRI), Keiichi Iwamura (TUS), Isao Echizen (NII), Kouichi Sakurai (kyushu Univ.) IT2017-12 EMM2017-12 |
The black cell of a two dimensional code is coded in normal black ink (infrared absorption) and special black ink (infra... [more] |
IT2017-12 EMM2017-12 pp.67-72 |
PRMU |
2016-10-21 16:20 |
Miyazaki |
|
Study of template matching application of a steganography (ANGO)
-- Interdisciplinary cryptography and image processing -- Hirokazu Ishizuka (Kyudai), Isao Echizen (NII), Keiichi Iwamura (TUS), Koichi Sakurai (Kyudai) PRMU2016-108 |
We propose a steganographic method called ANGO using Ango Sakaguchi's
novel ``ANGOU'' as a hint. Go through the study ... [more] |
PRMU2016-108 pp.97-102 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-14 13:50 |
Yamaguchi |
|
Study of an information extraction method using artificial fiber pattern with a clear ink Yuki Matsue (TUS), Kitahiro Kaneda (OPU), Keiichi Iwamura (TUS), Isao Echizen (NII) ISEC2016-15 SITE2016-9 ICSS2016-15 EMM2016-23 |
Our laboratory has developed “single dot method”, which is one of a nearly invisible pattern as new information embeddin... [more] |
ISEC2016-15 SITE2016-9 ICSS2016-15 EMM2016-23 pp.13-18 |
IT, EMM |
2016-05-19 14:45 |
Hokkaido |
Otaru Economic Center |
Simulation of error-correcting code using LDPC code with Sum-Product method for a single-dot pattern method Kitahiro Kaneda (Osaka Prefecture Univ.), Yasuyuki Anezaki, Keiichi Iwamura (TUS), Isao Echizen (NII) IT2016-7 EMM2016-7 |
We have proposed a single dot information hiding method for printed matter. In this paper, we try to apply LDPC error co... [more] |
IT2016-7 EMM2016-7 pp.37-42 |
EA, SP, SIP |
2016-03-29 11:10 |
Oita |
Beppu International Convention Center B-ConPlaza |
Voice liveness detection using phoneme information for speaker verification Sayaka Shiota (Tokyo Metropolitan Univ.), Fernando Villavicencio, Junichi Yamagishi, Nobutaka Ono, Isao Echizen (NII), Tomoko Matsui (ISM), Hitoshi Kiya (Tokyo Metropolitan Univ.) EA2015-128 SIP2015-177 SP2015-156 |
[more] |
EA2015-128 SIP2015-177 SP2015-156 pp.347-351 |
SP, IPSJ-SLP (Joint) |
2015-07-17 13:40 |
Nagano |
Katakura Suwako Hotel |
Voice liveness detection based on frequency characteristics for speaker verification Sayaka Shiota (Tokyo Metro. Univ.), Fernando Villaviencio, Junichi Yamagishi, Nobutaka Ono, Isao Echizen (NII), Tomoko Matsui (ISM) SP2015-48 |
[more] |
SP2015-48 pp.73-78 |
SP, IPSJ-SLP (Joint) |
2015-07-17 14:10 |
Nagano |
Katakura Suwako Hotel |
Investigation of privacy-preserving sounds to degrade automatic speaker verification performance Kei Hashimoto (NITECH), Junichi Yamagishi, Isao Echizen (NII) SP2015-49 |
Sharing speech without permission and identifying the individual from the speech by speaker recognition lead to problems... [more] |
SP2015-49 pp.79-84 |