Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SANE, SAT (Joint) |
2019-02-13 13:30 |
Kagoshima |
Tanegashima Island |
Improvement of Specific Emitter Identification in low SNR
-- Method of using Short-time Fourier transformation and 2 step parameter optimization -- Takafumi Matsuda, Takeshi Amishima, Tadashi Oshima, Nobuhiro Suzuki (Mitsubishi Electric Corp.) SANE2018-121 |
Techniques for identifying wireless devices such as radar and communicator using the characteristics of the received sig... [more] |
SANE2018-121 pp.59-63 |
EA, ASJ-H, EMM, IPSJ-MUS [detail] |
2018-11-21 13:30 |
Ishikawa |
Hotel Koshuen |
Segment-wise watermarking scheme for PDF document file considering the applicability to fingerprinting system Takuya Fukushima, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) EA2018-69 EMM2018-69 |
Nowadays PDF document files are used by many people. Because of its popularity, the illegal use of PDF files may cause a... [more] |
EA2018-69 EMM2018-69 pp.37-42 |
SR |
2018-10-31 13:25 |
Overseas |
Mandarin Hotel, Bangkok, Thailand |
[Poster Presentation]
Device-free Indoor Localization utilizing BLE devices by controlling advertisement channels Junming Jiang, Azril Haniz, Kentaro Saito, Jun-ichi Takada (Tokyo Tech) SR2018-85 |
Indoor localization has become a focus of research and development recently due to
the increasing demand for the indoor... [more] |
SR2018-85 pp.63-70 |
IEE-CMN, EMM, LOIS, IE, ITE-ME [detail] |
2018-09-28 13:15 |
Oita |
Beppu Int'l Convention Ctr. aka B-CON Plaza |
Dynamic Estimation of Collusion Strategy for the Detection of Colluders in Fingerprinting Codes Tatsuya Yasui, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.), Isao Echizen (NII) LOIS2018-19 IE2018-39 EMM2018-58 |
An optimal detector known as MAP detector has been proposed for the probabilistic fingerprinting
code. It needs two kin... [more] |
LOIS2018-19 IE2018-39 EMM2018-58 pp.65-70 |
ASN, NS, RCS, SR, RCC (Joint) |
2018-07-11 14:35 |
Hokkaido |
Hakodate Arena |
An evaluation of propagation loss on wireless physical layer identification Taichi Ohtsuji, Tatsuya Soma, Toshiki Takeuchi, Masaki Kitsunezuka, Kazuaki Kunihiro (NEC) RCC2018-31 NS2018-44 RCS2018-86 SR2018-25 ASN2018-25 |
Wireless devices have trivial individual differences due to hardware imperfections. Therefore, extracting unique feature... [more] |
RCC2018-31 NS2018-44 RCS2018-86 SR2018-25 ASN2018-25 pp.37-43(RCC), pp.43-49(NS), pp.37-43(RCS), pp.25-31(SR), pp.53-59(ASN) |
SANE |
2018-05-14 15:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A study on specific emitter identification method focussing on continuous wave Junya Nasaka, Tsukasa Sugimoto, Masaaki Kobayashi, Takeshi Kumaki (Ritsumeikan Univ.) SANE2018-10 |
In recent years, the development of communication technology enables the society to send information easily and rapidly.... [more] |
SANE2018-10 pp.51-56 |
EMM |
2018-03-05 14:35 |
Kagoshima |
Naze Community Center (Amami-Shi, Kagoshima) |
[Poster Presentation]
Estimation of Collusion Strategy for Fingerprinting Codes Tatsuya Yasui, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) EMM2017-80 |
An optimal detector is known as MAP detector has been proposed for the probabilistic fingerprinting codes such as Tardo... [more] |
EMM2017-80 pp.17-22 |
EMM |
2018-01-29 15:05 |
Miyagi |
Tohoku Univ. (Aobayama Campus) |
A study of tracing algorithm for fingerprinting code considering erasure symbols Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) EMM2017-68 |
The robustness against collusion attack has been measured under the marking assumption in fingerprinting codes. In some ... [more] |
EMM2017-68 pp.13-18 |
EMM |
2017-01-30 16:15 |
Miyagi |
Tohoku University (Miyagi) |
On Some Variations of Information Hiding Strategies Based on Complete Complementary Codes Tetsuya Kojima (NIT, Tokyo College) EMM2016-79 |
Complete complementary code (CCC) is a spread spectrum sequence family with good correlation properties. Information hid... [more] |
EMM2016-79 pp.31-36 |
IT, ISEC, WBS |
2016-03-10 13:15 |
Tokyo |
The University of Electro-Communications |
Improvement in detection performance of Tardos's fingerprinting code using detailed score distribution Ryo Inoue, Kazuhiko Yamaguchi (UEC) IT2015-113 ISEC2015-72 WBS2015-96 |
Tardos proposed c-secure code based on randomness with certain distribution (Tardos’s code). The code is shorter than Bo... [more] |
IT2015-113 ISEC2015-72 WBS2015-96 pp.75-80 |
ASN |
2015-11-06 09:55 |
Tokyo |
NICT Koganei HQ |
Evaluation on Efficiency of Frequency Identification on Indoor Positioning with BLE tags Shuhei Yamaguchi, Daisuke Arai, Tomohiko Ogishi (KDDI Lab) ASN2015-69 |
With the extension of O2O (Online to Offline) services, achieving indoor positioning for obtaining the position of the s... [more] |
ASN2015-69 pp.103-108 |
SANE |
2015-04-24 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Survey Report on Specific Emitter Identification Technologies and Their Recent Trend of the R&D Masaaki Kobayashi (AOC Japan) SANE2015-2 |
Specific emitter identification (SEI), which designates the individual emitter among emitting sources derived from the s... [more] |
SANE2015-2 pp.7-12 |
EMM |
2015-01-29 14:15 |
Miyagi |
Tohoku University |
Study on Collaboration of Collusion Secure Code and Watermarking Technique Minoru Kuribayashi (Kobe Univ.) EMM2014-76 |
According to watermark security based on the Kerckhoffs' principle, we should mind that illegal users will be able to ac... [more] |
EMM2014-76 pp.57-62 |
IT |
2014-09-19 10:50 |
Chiba |
|
[Invited Talk]
Optimal Tracing Method for Fingerprinting Code Minoru Kuribayashi (Kobe Univ.) IT2014-45 |
G. Tardos has proposed a probabilistic fingerprinting code which has a length of theoretically minimal order with respec... [more] |
IT2014-45 pp.25-30 |
ITS |
2014-08-01 14:45 |
Tokyo |
The University of Tokyo |
Indoor Positioning Method by Fingerprinting Based on Incoming GPS Signals Masayuki Ochiai, Hiroyuki Hatano, Masahiro Fujii, Atsushi Ito, Yu Watanabe (Utsunomiya Univ.) ITS2014-13 |
In recent years, the useful services based on position information have attracted attention along with the growth of sma... [more] |
ITS2014-13 pp.29-34 |
ICSS, IPSJ-SPT |
2014-03-27 13:55 |
Okinawa |
Meio Univiersity |
An Investigation of Malicious JavaScript Code used in Drive-by Download Yuta Takata, Mitsuaki Akiyama, Takeo Hariu (NTT) ICSS2013-72 |
Malicious website contains JavaScript code that exploits vulnerabilities in the browser or the browser's plugins.Researc... [more] |
ICSS2013-72 pp.59-64 |
ISEC, IT, WBS |
2014-03-11 15:40 |
Aichi |
Nagoya Univ., Higashiyama Campus |
On the Performance of Probabilistic Digital Fingerprinting Codes Generated from Nonstationary Distribution Kouhei Kanai, Hiroki Koga (Univ. of Tsukuba) IT2013-94 ISEC2013-123 WBS2013-83 |
Illegal copies of digital contents are spreading due to the development
of the Internet. Digital fingerprinting codes p... [more] |
IT2013-94 ISEC2013-123 WBS2013-83 pp.255-260 |
EMM |
2014-03-08 11:30 |
Ishikawa |
JAIST |
Simplified Tracing Algorithm of Fingerprinting Code Against Averaging Attack Minoru Kuribayashi (Kobe Univ.) EMM2013-115 |
When a binary fingerprinting codeword is embedded into digital contents using a robust spread-spectrum(SS) watermarking ... [more] |
EMM2013-115 pp.93-98 |
WPT (2nd) |
2013-11-22 14:25 |
Kanagawa |
Yokosuka Research Park |
Location Estimation Considering Receiver Height in 2D Multi-hop Wireless Power Transfer Shinsuke Ohtake, Akiro Shimada, Yuichi Miyaji, Hideyuki Uehara, Takashi Ohira (Toyohashi Tech.) |
Two-dimensional multi-hop wireless power transfer via magnetic resonance is able to transmit electrical energy with high... [more] |
|
EMM |
2013-05-24 14:00 |
Kochi |
Kochijyo Hall |
Optimal Tracing Algorithm for Fingerprinting Code under Averaging Attack Minoru Kuribayashi (Kobe Univ.) EMM2013-5 |
When a binary fingerprinting codeword is embedded into digital contents using a robust spread-spectrum (SS) watermarking... [more] |
EMM2013-5 pp.25-30 |