IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 14 of 14  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
MBE, BioX 2018-07-27
14:00
Tottori   Biometric-bit-string generation from speech information on smart-phones
Aki Harada, Yasushi Yamazaki (The Univ. of Kitakyushu), Tetsushi Ohki (Shizuoka Univ.) BioX2018-18 MBE2018-26
Because smart-phones are in wide use, biometric authentication has attracted substantial attention as a user authenticat... [more] BioX2018-18 MBE2018-26
pp.63-68
BioX 2017-10-13
09:25
Okinawa Nobumoto Ohama Memorial Hall A study on biometric-bit-string generation from handwritten initials on smart phones
Ryo Yamagami, Yasushi Yamazaki, Takeru Miyazaki (Kitakyushu Univ.), Tetsushi Ohki (Shizuoka Univ.) BioX2017-32
As a means of user authentication on smart phones, biometric authentication using biometric information that can be obta... [more] BioX2017-32
pp.39-44
EMM, IE, LOIS, IEE-CMN, ITE-ME [detail] 2017-09-04
13:50
Kyoto Kyoto Univ. (Clock Tower Centennial Hall) Privacy-preserving SVM processing by using random unitary transformation
Takahiro Maekawa, Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya (Tokyo Metro.Univ.) LOIS2017-15 IE2017-36 EMM2017-44
In this paper,we propose a privacy-preserving SVM processing method with templates protected by using a random unitary t... [more] LOIS2017-15 IE2017-36 EMM2017-44
pp.13-18
MBE, BioX, NC 2016-10-22
16:55
Osaka Osaka Electro-Communication University A study on biometric-bit-string generation from touch panel on smart device
Suguru Sunada, Taiki Sowa, Yasushi Yamazaki, Takeru Miyazaki (Kitakyushu Univ.), Tetsushi Ohki (AIST.) BioX2016-30 MBE2016-44 NC2016-29
As a means of secure and convenient user authentication on
smart devices, such as smart-phones and tablet PCs,
biometr... [more]
BioX2016-30 MBE2016-44 NC2016-29
pp.73-76
VLD, CAS, MSS, SIP 2016-06-16
16:40
Aomori Hirosaki Shiritsu Kanko-kan A generation scheme of random unitary matrices for template protection
Yuko Saito, Sayaka Shiota, Hitoshi Kiya (Tokyo Metropolitan Univ.) CAS2016-14 VLD2016-20 SIP2016-48 MSS2016-14
Random unitary matrices-based template protection methods have been proposed as one of biometric template protection sch... [more] CAS2016-14 VLD2016-20 SIP2016-48 MSS2016-14
pp.73-78
ITS, IE, ITE-AIT, ITE-HI, ITE-ME, ITE-MMS, ITE-CE [detail] 2016-02-22
10:00
Hokkaido Hokkaido Univ. Secure classification based on kernel method using unitary transformation
Ibuki Nakamura, Yuko Saito, Sayaka Shiota, Hitoshi Kiya (Tokyo Metropolitan Univ.) ITS2015-59 IE2015-101
This study considers a template protection scheme based on an random unitary transformation, where the template consists... [more] ITS2015-59 IE2015-101
pp.17-22
IE, ITE-ME, IPSJ-AVM, ITE-CE [detail] 2015-08-03
10:55
Tokyo Tokyo Metropolitan Univ. A study of random unitary matrices for secure biometric authentication
Yuko Saito, Ibuki Nakamura, Sayaka Shiota (Tokyo Metro.Univ), Yoshihide Tonomura (NTT), Hitoshi Kiya (Tokyo Metro.Univ) IE2015-47
Random unitary transformation-based template protection methods have
been proposed as one of biometric template protec... [more]
IE2015-47
pp.7-12
EMM, IT 2015-05-21
14:30
Kyoto Kyoto International Community House Generating Protected Eigenface Templates Using an Unitary Transformaion
Ibuki Nakamura (Tokyo Metropolitan Univ.), Yoshihide Tonomura (NTT), Hitoshi Kiya (Tokyo Metropolitan Univ.) IT2015-7 EMM2015-7
This paper considers a template protection scheme based on an unitary transformation, where the template consists of the... [more] IT2015-7 EMM2015-7
pp.35-40
EMM 2015-03-12
14:10
Okinawa   [Poster Presentation] An extension of the unitary transformation-based template protection method for biometrics and its application
Yuko Saito, Ibuki Nakamura, Sayaka Shiota (Tokyo Metro. Univ.), Yoshihide Tonomura (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) EMM2014-81
Since biometric features are personal and irrevocable data, some schemes to protect the features (templates) extracted f... [more] EMM2014-81
pp.25-30
SIS, IPSJ-AVM 2014-09-11
10:25
Yamagata SHONAI INDUSTRIAL PROMOTION CENTER A Generation Scheme of Protected Templates Based on Orthogonal Transforms for Biometrics
Ibuki Nakamura, Takashi Kurakami (Tokyo Metropolitan Univ.), Yoshihide Tonomura (NTT), Hitoshi Kiya (Tokyo Metropolitan Univ.) SIS2014-52
Since biometric features are personal and irrevocable data, some schemes which protect the features (templates) extracte... [more] SIS2014-52
pp.7-12
BioX
(2nd)
2013-08-28
15:15
Osaka The Institute of Scientific and Industrial Research, Osaka Univ. Relations among Security Metrics for Template Protection Algorithms
Manabu Inuma (JU), Akira Otsuka (AIST)
This paper gives the formal definitions for security metrics proposed by Simoens et al. and Nagar et al., and analyze th... [more]
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-19
13:20
Hokkaido   A proposal of key binding technology using lattice masking
Yuka Sugimura, Masaya Yasuda, Shigefumi Yamada, Narishige Abe, Takashi Shinzaki (Fujitsu Lab.) ISEC2013-42 SITE2013-37 ICSS2013-47 EMM2013-44
Recently, the biometric template protection technology has been actively researched in biometrics.
In this technology, ... [more]
ISEC2013-42 SITE2013-37 ICSS2013-47 EMM2013-44
pp.297-304
ISEC, IT, WBS 2011-03-04
10:50
Osaka Osaka University A Method of Fingerprint Authentication Using KSS(I)
Hiroki Satomura, Tetsushi Ohki, Naohisa Komatsu (Waseda Univ.), Masao Kasahara (Osaka Gakuin Univ.) IT2010-121 ISEC2010-125 WBS2010-100
We propose a method of fingerprint authentication using KSS(I). KSS(I)
requires to recover user's biometric sample corr... [more]
IT2010-121 ISEC2010-125 WBS2010-100
pp.353-360
SIS 2008-06-13
11:25
Hokkaido   An Implementation of Privacy Protection using ROI Coding of JPEG2000 with Face Detection
Hitoshi Namba, Syuhei Odani, Yoshihiro Kitaura, Mitsuji Muneyasu (Kansai Univ.) SIS2008-19
In the use of a surveillance camera, the requirement of privacy protection may be considered. This paper proposes a new ... [more] SIS2008-19
pp.27-32
 Results 1 - 14 of 14  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan