Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-19 16:55 |
Online |
Online |
Evaluation on Biometric Template Protection System Based on Somewhat Homomorphic Encryption Hiroto Tamiya, Toshiyuki Isshiki, Kengo Mori (NEC), Satoshi Obana (Hosei Univ.), Tetsushi Ohki (Shizuoka Univ.) ISEC2021-21 SITE2021-15 BioX2021-22 HWS2021-21 ICSS2021-26 EMM2021-26 |
Many biometric template protection systems have been proposed to perform biometric authentication while keeping the biom... [more] |
ISEC2021-21 SITE2021-15 BioX2021-22 HWS2021-21 ICSS2021-26 EMM2021-26 pp.68-73 |
MBE, BioX |
2018-07-27 14:00 |
Tottori |
|
Biometric-bit-string generation from speech information on smart-phones Aki Harada, Yasushi Yamazaki (The Univ. of Kitakyushu), Tetsushi Ohki (Shizuoka Univ.) BioX2018-18 MBE2018-26 |
Because smart-phones are in wide use, biometric authentication has attracted substantial attention as a user authenticat... [more] |
BioX2018-18 MBE2018-26 pp.63-68 |
BioX |
2017-10-13 09:25 |
Okinawa |
Nobumoto Ohama Memorial Hall |
A study on biometric-bit-string generation from handwritten initials on smart phones Ryo Yamagami, Yasushi Yamazaki, Takeru Miyazaki (Kitakyushu Univ.), Tetsushi Ohki (Shizuoka Univ.) BioX2017-32 |
As a means of user authentication on smart phones, biometric authentication using biometric information that can be obta... [more] |
BioX2017-32 pp.39-44 |
EMM, IE, LOIS, IEE-CMN, ITE-ME [detail] |
2017-09-04 13:50 |
Kyoto |
Kyoto Univ. (Clock Tower Centennial Hall) |
Privacy-preserving SVM processing by using random unitary transformation Takahiro Maekawa, Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya (Tokyo Metro.Univ.) LOIS2017-15 IE2017-36 EMM2017-44 |
In this paper,we propose a privacy-preserving SVM processing method with templates protected by using a random unitary t... [more] |
LOIS2017-15 IE2017-36 EMM2017-44 pp.13-18 |
MBE, BioX, NC |
2016-10-22 16:55 |
Osaka |
Osaka Electro-Communication University |
A study on biometric-bit-string generation from touch panel on smart device Suguru Sunada, Taiki Sowa, Yasushi Yamazaki, Takeru Miyazaki (Kitakyushu Univ.), Tetsushi Ohki (AIST.) BioX2016-30 MBE2016-44 NC2016-29 |
As a means of secure and convenient user authentication on
smart devices, such as smart-phones and tablet PCs,
biometr... [more] |
BioX2016-30 MBE2016-44 NC2016-29 pp.73-76 |
VLD, CAS, MSS, SIP |
2016-06-16 16:40 |
Aomori |
Hirosaki Shiritsu Kanko-kan |
A generation scheme of random unitary matrices for template protection Yuko Saito, Sayaka Shiota, Hitoshi Kiya (Tokyo Metropolitan Univ.) CAS2016-14 VLD2016-20 SIP2016-48 MSS2016-14 |
Random unitary matrices-based template protection methods have been proposed as one of biometric template protection sch... [more] |
CAS2016-14 VLD2016-20 SIP2016-48 MSS2016-14 pp.73-78 |
ITS, IE, ITE-AIT, ITE-HI, ITE-ME, ITE-MMS, ITE-CE [detail] |
2016-02-22 10:00 |
Hokkaido |
Hokkaido Univ. |
Secure classification based on kernel method using unitary transformation Ibuki Nakamura, Yuko Saito, Sayaka Shiota, Hitoshi Kiya (Tokyo Metropolitan Univ.) ITS2015-59 IE2015-101 |
This study considers a template protection scheme based on an random unitary transformation, where the template consists... [more] |
ITS2015-59 IE2015-101 pp.17-22 |
IE, ITE-ME, IPSJ-AVM, ITE-CE [detail] |
2015-08-03 10:55 |
Tokyo |
Tokyo Metropolitan Univ. |
A study of random unitary matrices for secure biometric authentication Yuko Saito, Ibuki Nakamura, Sayaka Shiota (Tokyo Metro.Univ), Yoshihide Tonomura (NTT), Hitoshi Kiya (Tokyo Metro.Univ) IE2015-47 |
Random unitary transformation-based template protection methods have
been proposed as one of biometric template protec... [more] |
IE2015-47 pp.7-12 |
EMM, IT |
2015-05-21 14:30 |
Kyoto |
Kyoto International Community House |
Generating Protected Eigenface Templates Using an Unitary Transformaion Ibuki Nakamura (Tokyo Metropolitan Univ.), Yoshihide Tonomura (NTT), Hitoshi Kiya (Tokyo Metropolitan Univ.) IT2015-7 EMM2015-7 |
This paper considers a template protection scheme based on an unitary transformation, where the template consists of the... [more] |
IT2015-7 EMM2015-7 pp.35-40 |
EMM |
2015-03-12 14:10 |
Okinawa |
|
[Poster Presentation]
An extension of the unitary transformation-based template protection method for biometrics and its application Yuko Saito, Ibuki Nakamura, Sayaka Shiota (Tokyo Metro. Univ.), Yoshihide Tonomura (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) EMM2014-81 |
Since biometric features are personal and irrevocable data, some schemes to protect the features (templates) extracted f... [more] |
EMM2014-81 pp.25-30 |
SIS, IPSJ-AVM |
2014-09-11 10:25 |
Yamagata |
SHONAI INDUSTRIAL PROMOTION CENTER |
A Generation Scheme of Protected Templates Based on Orthogonal Transforms for Biometrics Ibuki Nakamura, Takashi Kurakami (Tokyo Metropolitan Univ.), Yoshihide Tonomura (NTT), Hitoshi Kiya (Tokyo Metropolitan Univ.) SIS2014-52 |
Since biometric features are personal and irrevocable data, some schemes which protect the features (templates) extracte... [more] |
SIS2014-52 pp.7-12 |
BioX (2nd) |
2013-08-28 15:15 |
Osaka |
The Institute of Scientific and Industrial Research, Osaka Univ. |
Relations among Security Metrics for Template Protection Algorithms Manabu Inuma (JU), Akira Otsuka (AIST) |
This paper gives the formal definitions for security metrics proposed by Simoens et al. and Nagar et al., and analyze th... [more] |
|
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-19 13:20 |
Hokkaido |
|
A proposal of key binding technology using lattice masking Yuka Sugimura, Masaya Yasuda, Shigefumi Yamada, Narishige Abe, Takashi Shinzaki (Fujitsu Lab.) ISEC2013-42 SITE2013-37 ICSS2013-47 EMM2013-44 |
Recently, the biometric template protection technology has been actively researched in biometrics.
In this technology, ... [more] |
ISEC2013-42 SITE2013-37 ICSS2013-47 EMM2013-44 pp.297-304 |
ISEC, IT, WBS |
2011-03-04 10:50 |
Osaka |
Osaka University |
A Method of Fingerprint Authentication Using KSS(I) Hiroki Satomura, Tetsushi Ohki, Naohisa Komatsu (Waseda Univ.), Masao Kasahara (Osaka Gakuin Univ.) IT2010-121 ISEC2010-125 WBS2010-100 |
We propose a method of fingerprint authentication using KSS(I). KSS(I)
requires to recover user's biometric sample corr... [more] |
IT2010-121 ISEC2010-125 WBS2010-100 pp.353-360 |
SIS |
2008-06-13 11:25 |
Hokkaido |
|
An Implementation of Privacy Protection using ROI Coding of JPEG2000 with Face Detection Hitoshi Namba, Syuhei Odani, Yoshihiro Kitaura, Mitsuji Muneyasu (Kansai Univ.) SIS2008-19 |
In the use of a surveillance camera, the requirement of privacy protection may be considered. This paper proposes a new ... [more] |
SIS2008-19 pp.27-32 |