IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 13 of 13  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM 2019-03-13
15:15
Okinawa TBD [Poster Presentation] Estimation of Collusion Strategy for Fingerprinting Codes under Noisy Environment
Tatsuya Yasui, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) EMM2018-107
In fingerprinting code against collusion attack, the optimal detector which detect colluders has been proposed. However,... [more] EMM2018-107
pp.83-88
IT, ISEC, WBS 2019-03-08
11:15
Tokyo University of Electro-Communications A Lower Bound of the Joint Capacity of Digital Fingerprinting Codes against a Mixed Attack
Tatsuya Sekine, Hiroki Koga (U. Tsukuba) IT2018-119 ISEC2018-125 WBS2018-120
Digital fingerprinting codes are embedded in digital contents for protecting copyrights of the digital contents against m... [more] IT2018-119 ISEC2018-125 WBS2018-120
pp.269-274
IT, ISEC, WBS 2016-03-10
13:15
Tokyo The University of Electro-Communications Improvement in detection performance of Tardos's fingerprinting code using detailed score distribution
Ryo Inoue, Kazuhiko Yamaguchi (UEC) IT2015-113 ISEC2015-72 WBS2015-96
Tardos proposed c-secure code based on randomness with certain distribution (Tardos’s code). The code is shorter than Bo... [more] IT2015-113 ISEC2015-72 WBS2015-96
pp.75-80
EMM 2015-01-29
14:15
Miyagi Tohoku University Study on Collaboration of Collusion Secure Code and Watermarking Technique
Minoru Kuribayashi (Kobe Univ.) EMM2014-76
According to watermark security based on the Kerckhoffs' principle, we should mind that illegal users will be able to ac... [more] EMM2014-76
pp.57-62
IT 2012-07-19
14:15
Aichi Toyota Technological Institute A Tracing Algorithm for the Boneh-Shaw Code under a Probabilistic Attack Model
Kouhei Kanai, Hiroki Koga (Tsukuba Univ) IT2012-10
Illegal copies of digital contents is spreading due to the development of the Internet.A digital finger- printing code p... [more] IT2012-10
pp.7-12
NS, IN
(Joint)
2012-03-08
10:10
Miyazaki Miyazaki Seagia Proposal of Collusion Attack Detection Method in OLSR
Soichiro Sakamoto, Toyofumi Takenaka (Nihon Univ) NS2011-205
A collusion attack is a serious problem in ad hoc networks. In this attack, a pair of attackers prevent a
specific node... [more]
NS2011-205
pp.143-148
IT 2010-01-08
14:50
Overseas Univ. of Hawaii Performance analysis of the blacklist scheme for collusion-secure code
Yoshinobu Iriguchi, Brian Kurkoski, Kazuhiko Yamaguchi (Univ. of Electro-Comm.) IT2009-68
We have proposed a scheme for collusion-secure code which utilizes a blacklist of colluders in order to improve efficien... [more] IT2009-68
pp.93-98
IT 2008-07-24
15:40
Chiba University of Tokyo, Kashiwa Campus A usage of collusion-secure codes to enhance their trace back rates
Yoshinobu Iriguchi, Kazuhiko Yamaguchi (UEC) IT2008-14
Collusion-secure codes are one of countermeasures against collusion attacks, a severe problem in digital fingerprinting.... [more] IT2008-14
pp.33-38
ISEC, SITE, IPSJ-CSEC 2008-07-25
14:15
Fukuoka Fukuoka Institute of System LSI Design Industry Traitor Tracing from ID based Broadcast Encryption
Ryuichi Sakai (OECU) ISEC2008-48
ID based broadcast encryption scheme based on the key setting of Mitsunari-Ssakai-Kasahara
traitor tracing has several... [more]
ISEC2008-48
pp.95-100
SIP, IE 2008-04-17
09:00
Tokyo Kikai-Shinko-Kaikan Bldg. A Hierarchical Encryption Method for JPEG 2000 Coded Images with Sub-Resistance to Collusion Attacks
Noriaki Hashimoto (Tokyo Inst. of Tech.), Masaaki Fujiyoshi, Hitoshi Kiya (Tokyo Metro. Univ.) SIP2008-1 IE2008-1
This paper proposes an encryption method to enable hierarchical access
controls for JPEG 2000 codestreams. The proposed... [more]
SIP2008-1 IE2008-1
pp.1-6
IT 2007-05-18
16:15
Yamagata Denkoku-No-Mori (Yonezawa) Shortened and concatenated collusion-secure codes for digital fingerprinting
Hideki Yagi, Toshiyasu Matsushima, Shigeichi Hirasawa (Waseda Univ.) IT2007-6
Digital fingerprinting, which is employed in contents distribution systems to deter illegal use of digital contents, is ... [more] IT2007-6
pp.31-36
IT 2006-05-24
14:50
Nara Nara-ken new public hall A New Class of Traceability Codes for Digital Fingerprinting
Hideki Yagi, Toshiyasu Matsushima, Shigeichi Hirasawa (Waseda Univ.)
In this paper, we discuss collusion-secure traceability codes for digital fingerprinting which is a technique for copyri... [more] IT2006-9
pp.13-18
ISEC 2005-09-16
15:45
Tokyo Kikai-Shinko-Kaikan Bldg. Precise Tardos Bound for Fingerprinting Codes
Taichi Isogai, Hirofumi Muratani (Toshiba)
``Fingerprinting'' is a technique that user's ID is embedded in digital contents. This technique is used for finding a m... [more] ISEC2005-85
pp.67-72
 Results 1 - 13 of 13  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan