Thu, Jul 19 AM EMM 10:30 - 11:45 |
(1) EMM |
10:30-10:55 |
Reevaluation of Threshold Levels for Judging Complexity Boundary Using Distributions of Complexity in BPCS Steganography Technique ISEC2012-9 SITE2012-5 ICSS2012-11 EMM2012-1 |
Syouhei Harada, Seok Kang, Yuji Sakamoto (Hokkaido Univ.) |
(2) EMM |
10:55-11:20 |
Hybrid Additive-Multiplicative Watermarking for General Embedding Domains ISEC2012-10 SITE2012-6 ICSS2012-12 EMM2012-2 |
Seigo Ikeda, Maki Yoshida, Toru Fujiwara (Osaka Univ.) |
(3) EMM |
11:20-11:45 |
On Information Hiding Technologies Based on Complete Complementary Codes ISEC2012-11 SITE2012-7 ICSS2012-13 EMM2012-3 |
Tetsuya Kojima (Tokyo Natl. Coll. Tech.), Ryusuke Mayuzumi (Univ. of Electro-Comm.), Naoki Ohtani (NHK Media Tech.) |
|
11:45-13:05 |
Lunch Break ( 80 min. ) |
Thu, Jul 19 PM EMM 13:05 - 14:20 |
(4) EMM |
13:05-13:30 |
A data hiding method for binary images based on a pixel block feature and position of connected component ISEC2012-12 SITE2012-8 ICSS2012-14 EMM2012-4 |
Hiroo Iwanaga, Hirohisa Hioki (Kyoto Univ.) |
(5) EMM |
13:30-13:55 |
Performance evaluation of digital watermarking model with image restoration
-- image restoration using 2D Ising model -- ISEC2012-13 SITE2012-9 ICSS2012-15 EMM2012-5 |
Masaki Kawamura (Yamaguchi Univ.), Tatsuya Uezu (Nara Women's Univ.), Masato Okada (Univ. Tokyo) |
(6) EMM |
13:55-14:20 |
Design of a Realtime Watermarking FPGA ISEC2012-14 SITE2012-10 ICSS2012-16 EMM2012-6 |
Atsushi Katayama, Susumu Yamamoto, Shingo Ando, Ken Tsutsuguchi, Yukinobu Taniguchi (NTT) |
|
14:20-14:35 |
Break ( 15 min. ) |
Thu, Jul 19 PM EMM 14:35 - 16:15 |
(7) EMM |
14:35-15:00 |
A Hiding Technique of Copy-Disturbance Noises Based on Temporal Scrambling of Narrow-band Components
-- G-encoder Mark for COPY PROTECT -- ISEC2012-15 SITE2012-11 ICSS2012-17 EMM2012-7 |
Toshio Modegi, Shin'ichi Miyazaki (DNP), Goh Sekiguchi, Yuji Kosuda (DAC) |
(8) EMM |
15:00-15:25 |
Evaluation of a Visualization System to Assess the Risk of Websites ISEC2012-16 SITE2012-12 ICSS2012-18 EMM2012-8 |
Tomoko Kajiyama (Aoyama Gakuin Univ.), Isao Echizen (NII) |
(9) EMM |
15:25-15:50 |
Quantitative evaluation on effectiveness of privacy protection for facial images ISEC2012-17 SITE2012-13 ICSS2012-19 EMM2012-9 |
Yuta Nakashima (NAIST), Tomoaki Ikeno, Noboru Babaguchi (Osaka Univ.) |
(10) EMM |
15:50-16:15 |
A Possibility of Value Creation Based on Information Hiding ISEC2012-18 SITE2012-14 ICSS2012-20 EMM2012-10 |
Naofumi Aoki (Hokkaido Univ.) |
Thu, Jul 19 PM ICSS 13:05 - 14:20 |
(11) ICSS |
13:05-13:30 |
A Study on Cybersecurity Information Discovery Mechanisms over the Internet ISEC2012-19 SITE2012-15 ICSS2012-21 EMM2012-11 |
Takeshi Takahashi, Youki Kadobayashi, Yuuki Takano (NICT) |
(12) ICSS |
13:30-13:55 |
Identifying the Code to be Analyzed with Taint Tags ISEC2012-20 SITE2012-16 ICSS2012-22 EMM2012-12 |
Yuhei Kawakoya, Makoto Iwamura, Takeo Hariu (NTT) |
(13) ICSS |
13:55-14:20 |
An Efficient Certificate Management Method for Improving Traffic Flow of Certificates in Mobile Communications ISEC2012-21 SITE2012-17 ICSS2012-23 EMM2012-13 |
Norihito Yosaka, Tomoyuki Nagase (Hirosaki Univ.) |
|
14:20-14:35 |
Break ( 15 min. ) |
Thu, Jul 19 PM ICSS 14:35 - 16:15 |
(14) ICSS |
14:35-15:00 |
TSP Solution Based on Clustering nodes in Ad-hoc networks ISEC2012-22 SITE2012-18 ICSS2012-24 EMM2012-14 |
XIiaoji Li (DLUT), Tomoyuki Nagase (Hirosaki Uni.) |
(15) ICSS |
15:00-15:25 |
A Fast Privacy-Preserving Collaborative Filtering Scheme with Transferring Statistical Value ISEC2012-23 SITE2012-19 ICSS2012-25 EMM2012-15 |
Toru Nakamura, Shinsaku Kiyomoto, Ryu Watanabe, Yutaka Miyake (KDDI R&D Labs) |
(16) ICSS |
15:25-15:50 |
Detecting Invalid Control Flow with Pseudo-Dispersion of Program Code ISEC2012-24 SITE2012-20 ICSS2012-26 EMM2012-16 |
Eitaro Shioji, Yuhei Kawakoya, Makoto Iwamura, Takeo Hariu (NTT) |
(17) ICSS |
15:50-16:15 |
Architecture Design for Visualizing Risks and Implementing Adequate Security ISEC2012-25 SITE2012-21 ICSS2012-27 EMM2012-17 |
Shin'ichiro Matsuo, Akira Kanaoka, Takeshi Takahashi, Shinsuke Miwa, Tadashi Minowa (NICT) |
|
16:15-16:30 |
Break ( 15 min. ) |
Thu, Jul 19 PM 16:30 - 17:30 |
(18) |
16:30-17:30 |
[Invited Talk]
The Diversity of Color Vision and Its Applications to Communication ISEC2012-26 SITE2012-22 ICSS2012-28 EMM2012-18 |
Kazunori Asada |
Fri, Jul 20 AM ISEC&CSEC 09:00 - 10:15 |
(19) ISEC |
09:00-09:25 |
Keystroke Authentication Using the Technique of Quality engineering ISEC2012-27 SITE2012-23 ICSS2012-29 EMM2012-19 |
Hitoshi Osaka, Koya Yano (Nihon Univ.) |
(20) ISEC |
09:25-09:50 |
Spoofing detection in biometric authentication system ISEC2012-28 SITE2012-24 ICSS2012-30 EMM2012-20 |
Tomoaki Matsunami, Ken Kamakura (Fujitsu Lab.) |
(21) |
09:50-10:15 |
|
|
10:15-10:30 |
Break ( 15 min. ) |
Fri, Jul 20 AM ISEC 10:30 - 12:10 |
(22) ISEC |
10:30-10:55 |
An efficient variant of Rainbow without triangular matrix representation ISEC2012-29 SITE2012-25 ICSS2012-31 EMM2012-21 |
Takanori Yasuda (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (ISIT) |
(23) ISEC |
10:55-11:20 |
A New Higher Order Differential Property of Hierocrypt ISEC2012-30 SITE2012-26 ICSS2012-32 EMM2012-22 |
Tetsuhiro Takahashi, Toshinobu Kaneko (TUS) |
(24) ISEC |
11:20-11:45 |
A New Solving Algorithm for Attack Equation of Higher Order Differential Attack on AES (II) ISEC2012-31 SITE2012-27 ICSS2012-33 EMM2012-23 |
Yusuke Inoue, Akinobu Kitagawa, Toshinobu Kaneko (TUS) |
(25) ISEC |
11:45-12:10 |
How to purge imaginary path in truncate analysis ISEC2012-32 SITE2012-28 ICSS2012-34 EMM2012-24 |
Toshinobu Kaneko (TUS) |
|
12:10-13:30 |
Lunch Break ( 80 min. ) |
Fri, Jul 20 PM ISEC 13:30 - 15:10 |
(26) ISEC |
13:30-13:55 |
Privacy Preserving Data Processing with Collaboration of Paillier and RSA Public Key Cryptosystems
-- For Overcoming Contradiction of Protection and Utilization of Personal Data -- ISEC2012-33 SITE2012-29 ICSS2012-35 EMM2012-25 |
Shigeo Tsujii, Hiroshi Yamaguchi (Chuo Univ.), Hiroshi Doi (IISEC), Yukiyasu Tsunoo (NEC), Ryo Fujita (Chuo Univ.), Takahiko Syouji (YDK) |
(27) ISEC |
13:55-14:20 |
Rationality and Security in Oblivious Transfer ISEC2012-34 SITE2012-30 ICSS2012-36 EMM2012-26 |
Haruna Higo, Akihiro Yamada, Keisuke Tanaka (Tokyo Inst. of Tech.), Kenji Yasunaga (ISIT) |
(28) ISEC |
14:20-14:45 |
An Improved Algorithm for Approximate GCD Problems ISEC2012-35 SITE2012-31 ICSS2012-37 EMM2012-27 |
Atsushi Takayasu, Noboru Kunihiro (UT) |
(29) ISEC |
14:45-15:10 |
A Batch Mapping Algorithm for Secure Function Evaluation ISEC2012-36 SITE2012-32 ICSS2012-38 EMM2012-28 |
Koki Hamada, Dai Ikarashi, Koji Chida (NTT) |
|
15:10-15:25 |
Break ( 15 min. ) |
Fri, Jul 20 PM ISEC 15:25 - 16:40 |
(30) ISEC |
15:25-15:50 |
Efficient elliptic curve scalar multiplication using an elliptic net algorithm ISEC2012-37 SITE2012-33 ICSS2012-39 EMM2012-29 |
Naoki Kanayama, Yang Liu, Eiji Okamoto, Kazutaka Saito, Tadanori Teruya (Univ. of Tsukuba), Shigenori Uchiyama (Tokyo Metro Univ.) |
(31) ISEC |
15:50-16:15 |
Efficient Proofs for CNF Formulas on Attributes in Pairing-Based Anonymous Credential System ISEC2012-38 SITE2012-34 ICSS2012-40 EMM2012-30 |
Nasima Begum, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.) |
(32) ISEC |
16:15-16:40 |
Construction of the Tsujii-Shamir-Kasahara (TSK) Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization ISEC2012-39 SITE2012-35 ICSS2012-41 EMM2012-31 |
Shigeo Tsujii, Masahito Gotaishi (Chuo Univ.) |
Fri, Jul 20 AM SITE 09:00 - 10:15 |
(33) SITE |
09:00-09:25 |
A Proposal of Personal Authentication System using Cocktail Party Effect ISEC2012-40 SITE2012-36 ICSS2012-42 EMM2012-32 |
Kosei Taketa, Hiroyuki Inaba (KIT) |
(34) SITE |
09:25-09:50 |
A Recent Trend in Ethical and Legal Studies on Privacy ISEC2012-41 SITE2012-37 ICSS2012-43 EMM2012-33 |
Takushi Otani (Kibi Internationla Univ.) |
(35) SITE |
09:50-10:15 |
Proposal of Virtual Experimental System for Computer Virus Infection Situation ISEC2012-42 SITE2012-38 ICSS2012-44 EMM2012-34 |
Shun-ichi Kurino, Noriaki Yoshikai (Nihon Univ.), Toshio Takahshi (JEED) |
|
10:15-10:30 |
Break ( 15 min. ) |
Fri, Jul 20 AM CSEC 10:30 - 12:10 |
(36) |
10:30-10:55 |
|
(37) |
10:55-11:20 |
|
(38) |
11:20-11:45 |
|
(39) |
11:45-12:10 |
|
|
12:10-13:30 |
Lunch Break ( 80 min. ) |
Fri, Jul 20 PM CSEC 13:30 - 15:10 |
(40) |
13:30-13:55 |
|
(41) |
13:55-14:20 |
|
(42) |
14:20-14:45 |
|
(43) |
14:45-15:10 |
|
|
15:10-15:25 |
Break ( 15 min. ) |
Fri, Jul 20 PM SPT 15:25 - 17:05 |
(44) |
15:25-15:50 |
|
(45) |
15:50-16:15 |
|
(46) |
16:15-16:40 |
|
(47) |
16:40-17:05 |
|