Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM |
2013-05-24 14:00 |
Kochi |
Kochijyo Hall |
A Recommendation System for Anonymous Fingerprinting of Text Posted on Social Networks HoangQuoc Nguyen-Son (SOKENDAI), Hiroshi Yoshiura (Univ. of Electro-Comm.), Noboru Sonehara, Isao Echizen (NII) EMM2013-6 |
Sensitive information about a user can be disclosed by the user's Online Social Networks (OSNs) friends. This makes it u... [more] |
EMM2013-6 pp.31-36 |
MW (Workshop) |
2012-08-08 - 2012-08-10 |
Overseas |
Chulalongkorn University, Bangkok, Thailand |
Study on Indoor Localization Using Ultra Wideband Fingerprinting Technique Based On IEEE802.15.4a Standard Rattiya Uppahad, Jirapat Sangthong, Sathaporn Promwong (KMITL) |
The localization is a gaining interest in home-entertainment applications or smart home, social, commercial, emergency s... [more] |
|
MW (Workshop) |
2012-08-08 - 2012-08-10 |
Overseas |
Chulalongkorn University, Bangkok, Thailand |
UWB Fingerprinting Localization Using 2D Interpolation Kobkarn Thepsupornkul, Jirapat Sangthong, Pichaya Supanakoon, Sathaporn Promwong (KMITL) |
The indoor localization system has entered the realm of consumer applications. The popular application of indoor localiz... [more] |
|
IT |
2012-07-19 14:15 |
Aichi |
Toyota Technological Institute |
A Tracing Algorithm for the Boneh-Shaw Code under a Probabilistic Attack Model Kouhei Kanai, Hiroki Koga (Tsukuba Univ) IT2012-10 |
Illegal copies of digital contents is spreading due to the development of the Internet.A digital finger- printing code p... [more] |
IT2012-10 pp.7-12 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 11:20 |
Hokkaido |
|
On Information Hiding Technologies Based on Complete Complementary Codes Tetsuya Kojima (Tokyo Natl. Coll. Tech.), Ryusuke Mayuzumi (Univ. of Electro-Comm.), Naoki Ohtani (NHK Media Tech.) ISEC2012-11 SITE2012-7 ICSS2012-13 EMM2012-3 |
Complete complemenary code (CCC) is a spread spectrum sequence family with good correlation properties. A digital waterm... [more] |
ISEC2012-11 SITE2012-7 ICSS2012-13 EMM2012-3 pp.17-22 |
PRMU |
2011-02-17 16:00 |
Saitama |
|
Accurate Content-Based Copy Detection Scheme Using Global/Local Visual Features and Audio Features Yusuke Uchida, Shigeyuki Sakazawa (KDDI Labs) PRMU2010-216 |
In recent years, Content-Based Copy Detection (CBCD) technology, more generally referred to as digital fingerprinting, h... [more] |
PRMU2010-216 pp.49-54 |
CS, CQ (Joint) |
2010-04-27 09:30 |
Aomori |
Oirase Keiryu Hotel |
Low Bandwidth Consumption Multicast Fingerprinting by using Multi P2MP LSPs in MPLS Network Jun Matsumoto, Shan Gao, Sho Shimizu, Daisuke Ishii, Satoru Okamoto, Naoaki Yamanaka (Keio Univ.) CS2010-7 |
This paper proposes the method for multicast fingerprinting by using multi P2MP LSPs in MPLS Network. Multicast fingerpr... [more] |
CS2010-7 pp.35-40 |
IT, ISEC, WBS |
2010-03-05 13:50 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
Traitor Tracing system with Constant-size Public-key and Ciphertext using q-ary fingerprinting codes Ying Zhang (Chuo Univ.), Takashi Kitagawa (Univ. of Tokyo.), Nuttapong Attrapadung (AIST), Hideki Imai (Chuo Univ/AIST) IT2009-110 ISEC2009-118 WBS2009-89 |
A traitor tracing system enables a publisher to trace a pirate decryption box to one of the secret keys used to create t... [more] |
IT2009-110 ISEC2009-118 WBS2009-89 pp.255-260 |
IT |
2010-01-08 14:50 |
Overseas |
Univ. of Hawaii |
Performance analysis of the blacklist scheme for collusion-secure code Yoshinobu Iriguchi, Brian Kurkoski, Kazuhiko Yamaguchi (Univ. of Electro-Comm.) IT2009-68 |
We have proposed a scheme for collusion-secure code which utilizes a blacklist of colluders in order to improve efficien... [more] |
IT2009-68 pp.93-98 |
PRMU, IE, MI |
2009-05-29 13:30 |
Gifu |
Gifu Univ. |
Performance Evaluation on Content-Based Copy Detection Based on Color Layout Descriptor Yusuke Uchida, Masaru Sugano, Masayuki Hashimoto, Akio Yoneyama (KDDI R&D Labs) IE2009-38 PRMU2009-29 MI2009-29 |
Recently, Content-Based Copy Detection (CBCD), sometimes referred to as fingerprinting, attracts considerable attention ... [more] |
IE2009-38 PRMU2009-29 MI2009-29 pp.159-164 |
ISEC |
2008-05-16 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Integrating Fingerprint and Cryptosystem for Internet-Based Live Pay-TV System Shuhui Hou, Tetsutaro Uehara (Kyoto Univ.), Takashi Satoh (Univ. of Kitakyushu), Yoshitaka Morimura, Michihiko Minoh (Kyoto Univ.) ISEC2008-12 |
In the last few years, live pay-TV system via internet has come to be established with the development of broadband netw... [more] |
ISEC2008-12 pp.77-84 |
ICM |
2008-05-08 14:35 |
Kagoshima |
Kagoshima Public Access Center |
Construction and Evaluation of Live Video Streaming System with Broadcast Encryption over IP Multicast Yoshitaka Morimura, Tetsutaro Uehara, Shuhui Hou, Michihiko Minoh (Kyoto Univ.) ICM2008-6 |
We constructed a live video streaming system over IP Multicast, which uses SRTP and delivers the decryption key with bro... [more] |
ICM2008-6 pp.29-34 |
ISEC, LOIS |
2007-11-21 14:45 |
Hyogo |
Kobe University |
Anonymous Fingerprinting for Predelivery of Contents Kazuhiro Haramura, Maki Yoshida, Toru Fujiwara (Osaka Univ.) ISEC2007-92 OIS2007-64 |
Security requirements for predelivery of digital contents such as movies whose release date is predeterminedare analyzed... [more] |
ISEC2007-92 OIS2007-64 pp.23-30 |
IT |
2007-05-18 16:15 |
Yamagata |
Denkoku-No-Mori (Yonezawa) |
Shortened and concatenated collusion-secure codes for digital fingerprinting Hideki Yagi, Toshiyasu Matsushima, Shigeichi Hirasawa (Waseda Univ.) IT2007-6 |
Digital fingerprinting, which is employed in contents distribution systems to deter illegal use of digital contents, is ... [more] |
IT2007-6 pp.31-36 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 13:25 |
Okayama |
Okayama Univ. |
Fingerprinting Protocol Equipping Electronic Payment System Shinya Yamane, Minoru Kuribayashi, Masakatu Morii (Kobe Univ.) |
On digital contents distribution system fingerprinting protocols enable sellers to trace the buyer who redistributed a c... [more] |
ISEC2006-53 pp.99-106 |
IT |
2006-05-24 14:50 |
Nara |
Nara-ken new public hall |
A New Class of Traceability Codes for Digital Fingerprinting Hideki Yagi, Toshiyasu Matsushima, Shigeichi Hirasawa (Waseda Univ.) |
In this paper, we discuss collusion-secure traceability codes for digital fingerprinting which is a technique for copyri... [more] |
IT2006-9 pp.13-18 |
WBS, IT, ISEC |
2006-03-16 17:10 |
Aichi |
Nagoya Univ. |
An Algorithm for Computing the Hiding Capacity of Information Hiding Kensuke Yasui, Tota Suko, Toshiyasu Matsushima (Waseda Univ.) |
There are digital watermarking and fingerprinting (generically calling information hiding) as technique to protect illeg... [more] |
IT2005-94 ISEC2005-151 WBS2005-108 pp.177-182 |
ISEC |
2005-09-16 15:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Precise Tardos Bound for Fingerprinting Codes Taichi Isogai, Hirofumi Muratani (Toshiba) |
``Fingerprinting'' is a technique that user's ID is embedded in digital contents. This technique is used for finding a m... [more] |
ISEC2005-85 pp.67-72 |
SR |
2005-07-29 17:05 |
Kanagawa |
Yokosuka Research Park |
Development of the radio identification prototype system using FM analysis algorithm Naoki Kitagawa, Shoichiro Kawamura, Toshimitsu Higuchi, Hiroyuki Kakinuma, Hiroyuki Ishii (NEC Corp.) |
We developed a novel algorithm for Radio Monitoring Systems which can identify the each radio terminal by analyzing the ... [more] |
SR2005-39 pp.125-129 |