Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM |
2019-03-13 15:15 |
Okinawa |
TBD |
[Poster Presentation]
Estimation of Collusion Strategy for Fingerprinting Codes under Noisy Environment Tatsuya Yasui, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) EMM2018-107 |
In fingerprinting code against collusion attack, the optimal detector which detect colluders has been proposed. However,... [more] |
EMM2018-107 pp.83-88 |
IT, ISEC, WBS |
2019-03-08 11:15 |
Tokyo |
University of Electro-Communications |
A Lower Bound of the Joint Capacity of Digital Fingerprinting Codes against a Mixed Attack Tatsuya Sekine, Hiroki Koga (U. Tsukuba) IT2018-119 ISEC2018-125 WBS2018-120 |
Digital fingerprinting codes are embedded in digital contents for protecting copyrights of the digital contents against m... [more] |
IT2018-119 ISEC2018-125 WBS2018-120 pp.269-274 |
IT, ISEC, WBS |
2016-03-10 13:15 |
Tokyo |
The University of Electro-Communications |
Improvement in detection performance of Tardos's fingerprinting code using detailed score distribution Ryo Inoue, Kazuhiko Yamaguchi (UEC) IT2015-113 ISEC2015-72 WBS2015-96 |
Tardos proposed c-secure code based on randomness with certain distribution (Tardos’s code). The code is shorter than Bo... [more] |
IT2015-113 ISEC2015-72 WBS2015-96 pp.75-80 |
EMM |
2015-01-29 14:15 |
Miyagi |
Tohoku University |
Study on Collaboration of Collusion Secure Code and Watermarking Technique Minoru Kuribayashi (Kobe Univ.) EMM2014-76 |
According to watermark security based on the Kerckhoffs' principle, we should mind that illegal users will be able to ac... [more] |
EMM2014-76 pp.57-62 |
IT |
2012-07-19 14:15 |
Aichi |
Toyota Technological Institute |
A Tracing Algorithm for the Boneh-Shaw Code under a Probabilistic Attack Model Kouhei Kanai, Hiroki Koga (Tsukuba Univ) IT2012-10 |
Illegal copies of digital contents is spreading due to the development of the Internet.A digital finger- printing code p... [more] |
IT2012-10 pp.7-12 |
NS, IN (Joint) |
2012-03-08 10:10 |
Miyazaki |
Miyazaki Seagia |
Proposal of Collusion Attack Detection Method in OLSR Soichiro Sakamoto, Toyofumi Takenaka (Nihon Univ) NS2011-205 |
A collusion attack is a serious problem in ad hoc networks. In this attack, a pair of attackers prevent a
specific node... [more] |
NS2011-205 pp.143-148 |
IT |
2010-01-08 14:50 |
Overseas |
Univ. of Hawaii |
Performance analysis of the blacklist scheme for collusion-secure code Yoshinobu Iriguchi, Brian Kurkoski, Kazuhiko Yamaguchi (Univ. of Electro-Comm.) IT2009-68 |
We have proposed a scheme for collusion-secure code which utilizes a blacklist of colluders in order to improve efficien... [more] |
IT2009-68 pp.93-98 |
IT |
2008-07-24 15:40 |
Chiba |
University of Tokyo, Kashiwa Campus |
A usage of collusion-secure codes to enhance their trace back rates Yoshinobu Iriguchi, Kazuhiko Yamaguchi (UEC) IT2008-14 |
Collusion-secure codes are one of countermeasures against collusion attacks, a severe problem in digital fingerprinting.... [more] |
IT2008-14 pp.33-38 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 14:15 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Traitor Tracing from ID based Broadcast Encryption Ryuichi Sakai (OECU) ISEC2008-48 |
ID based broadcast encryption scheme based on the key setting of Mitsunari-Ssakai-Kasahara
traitor tracing has several... [more] |
ISEC2008-48 pp.95-100 |
SIP, IE |
2008-04-17 09:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Hierarchical Encryption Method for JPEG 2000 Coded Images with Sub-Resistance to Collusion Attacks Noriaki Hashimoto (Tokyo Inst. of Tech.), Masaaki Fujiyoshi, Hitoshi Kiya (Tokyo Metro. Univ.) SIP2008-1 IE2008-1 |
This paper proposes an encryption method to enable hierarchical access
controls for JPEG 2000 codestreams. The proposed... [more] |
SIP2008-1 IE2008-1 pp.1-6 |
IT |
2007-05-18 16:15 |
Yamagata |
Denkoku-No-Mori (Yonezawa) |
Shortened and concatenated collusion-secure codes for digital fingerprinting Hideki Yagi, Toshiyasu Matsushima, Shigeichi Hirasawa (Waseda Univ.) IT2007-6 |
Digital fingerprinting, which is employed in contents distribution systems to deter illegal use of digital contents, is ... [more] |
IT2007-6 pp.31-36 |
IT |
2006-05-24 14:50 |
Nara |
Nara-ken new public hall |
A New Class of Traceability Codes for Digital Fingerprinting Hideki Yagi, Toshiyasu Matsushima, Shigeichi Hirasawa (Waseda Univ.) |
In this paper, we discuss collusion-secure traceability codes for digital fingerprinting which is a technique for copyri... [more] |
IT2006-9 pp.13-18 |
ISEC |
2005-09-16 15:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Precise Tardos Bound for Fingerprinting Codes Taichi Isogai, Hirofumi Muratani (Toshiba) |
``Fingerprinting'' is a technique that user's ID is embedded in digital contents. This technique is used for finding a m... [more] |
ISEC2005-85 pp.67-72 |