IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   Prev SITE Conf / Next SITE Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 

===============================================
Technical Committee on Social Implications of Technology and Information Ethics (SITE)
Chair: Michio Nakanishi (Osaka Inst. of Tech.) Vice Chair: Noriaki Yoshikai (Nihon Univ.), Hitoshi Okada (NII)
Secretary: Kazuhiro Suzuki (Kanagawa Univ.), Norimasa Sugiyama (Osaka Inst. of Tech.)
Assistant: Daisuke Yamakata (Kagawa Univ.), Sumiko Miyama (Kanagawa Univ.)

===============================================
Technical Committee on Information Security (ISEC)
Chair: Tsutomu Matsumoto (Yokohama National Univ.)
Vice Chair: Toshiaki Tanaka (KDDI Labs.), Koichi Sakurai (Kyushu Univ.)
Secretary: Junji Shikata (Yokohama National Univ.), Tetsuya Izu (Fujitsu Labs.)
Assistant: Tetsu Iwata (Nagoya Univ.)

===============================================
Technical Committee on Information and Communication System Security (ICSS)
Chair: Masakatsu Morii (Kobe Univ.) Vice Chair: Hiroaki Kikuchi (Tokai Univ.), Shiho Moriai (Sony)
Secretary: Daisuke Inoue (NICT), Takashi Nishide (Kyushu Univ.)
Assistant: Yoshiaki Shiraishi (Nagoya Inst. of Tech.)

===============================================
Technical Committee on Enriched MultiMedia (EMM)
Chair: Noboru Babaguchi (Osaka Univ.)
Vice Chair: Akira Nishimura (Tokyo Univ. Info. Sci.), Michiharu Niimi (Kyushu Inst. of Tech.)
Secretary: Naofumi Aoki (Hokkaido Univ.), Hirohisa Hioki (Kyoto Univ.)
Assistant: Masashi Unoki (JAIST), Masaki Kawamura (Yamaguchi Univ.)

===============================================
Special Interest Group on Computer Security (IPSJ-CSEC)


===============================================
Special Interest Group on Security Psychology and Trust (IPSJ-SPT)


DATE:
Thu, Jul 19, 2012 10:30 - 17:30
Fri, Jul 20, 2012 09:00 - 17:05

PLACE:
Hokkaido Institute of Technology(http://www.hit.ac.jp/access/index.html)

TOPICS:
Security

----------------------------------------
Thu, Jul 19 AM EMM (10:30 - 11:45)
----------------------------------------

(1)/EMM 10:30 - 10:55
Reevaluation of Threshold Levels for Judging Complexity Boundary Using Distributions of Complexity in BPCS Steganography Technique
Syouhei Harada, Seok Kang, Yuji Sakamoto (Hokkaido Univ.)

(2)/EMM 10:55 - 11:20
Hybrid Additive-Multiplicative Watermarking for General Embedding Domains
Seigo Ikeda, Maki Yoshida, Toru Fujiwara (Osaka Univ.)

(3)/EMM 11:20 - 11:45
On Information Hiding Technologies Based on Complete Complementary Codes
Tetsuya Kojima (Tokyo Natl. Coll. Tech.), Ryusuke Mayuzumi (Univ. of Electro-Comm.), Naoki Ohtani (NHK Media Tech.)

----- Lunch Break ( 80 min. ) -----

----------------------------------------
Thu, Jul 19 PM EMM (13:05 - 14:20)
----------------------------------------

(4)/EMM 13:05 - 13:30
A data hiding method for binary images based on a pixel block feature and position of connected component
Hiroo Iwanaga, Hirohisa Hioki (Kyoto Univ.)

(5)/EMM 13:30 - 13:55
Performance evaluation of digital watermarking model with image restoration
-- image restoration using 2D Ising model --
Masaki Kawamura (Yamaguchi Univ.), Tatsuya Uezu (Nara Women's Univ.), Masato Okada (Univ. Tokyo)

(6)/EMM 13:55 - 14:20
Design of a Realtime Watermarking FPGA
Atsushi Katayama, Susumu Yamamoto, Shingo Ando, Ken Tsutsuguchi, Yukinobu Taniguchi (NTT)

----- Break ( 15 min. ) -----

----------------------------------------
Thu, Jul 19 PM EMM (14:35 - 16:15)
----------------------------------------

(7)/EMM 14:35 - 15:00
A Hiding Technique of Copy-Disturbance Noises Based on Temporal Scrambling of Narrow-band Components
-- G-encoder Mark for COPY PROTECT --
Toshio Modegi, Shin'ichi Miyazaki (DNP), Goh Sekiguchi, Yuji Kosuda (DAC)

(8)/EMM 15:00 - 15:25
Evaluation of a Visualization System to Assess the Risk of Websites
Tomoko Kajiyama (Aoyama Gakuin Univ.), Isao Echizen (NII)

(9)/EMM 15:25 - 15:50
Quantitative evaluation on effectiveness of privacy protection for facial images
Yuta Nakashima (NAIST), Tomoaki Ikeno, Noboru Babaguchi (Osaka Univ.)

(10)/EMM 15:50 - 16:15
A Possibility of Value Creation Based on Information Hiding
Naofumi Aoki (Hokkaido Univ.)

----------------------------------------
Thu, Jul 19 PM ICSS (13:05 - 14:20)
----------------------------------------

(11)/ICSS 13:05 - 13:30
A Study on Cybersecurity Information Discovery Mechanisms over the Internet
Takeshi Takahashi, Youki Kadobayashi, Yuuki Takano (NICT)

(12)/ICSS 13:30 - 13:55
Identifying the Code to be Analyzed with Taint Tags
Yuhei Kawakoya, Makoto Iwamura, Takeo Hariu (NTT)

(13)/ICSS 13:55 - 14:20
An Efficient Certificate Management Method for Improving Traffic Flow of Certificates in Mobile Communications
Norihito Yosaka, Tomoyuki Nagase (Hirosaki Univ.)

----- Break ( 15 min. ) -----

----------------------------------------
Thu, Jul 19 PM ICSS (14:35 - 16:15)
----------------------------------------

(14)/ICSS 14:35 - 15:00
TSP Solution Based on Clustering nodes in Ad-hoc networks
XIiaoji Li (DLUT), Tomoyuki Nagase (Hirosaki Uni.)

(15)/ICSS 15:00 - 15:25
A Fast Privacy-Preserving Collaborative Filtering Scheme with Transferring Statistical Value
Toru Nakamura, Shinsaku Kiyomoto, Ryu Watanabe, Yutaka Miyake (KDDI R&D Labs)

(16)/ICSS 15:25 - 15:50
Detecting Invalid Control Flow with Pseudo-Dispersion of Program Code
Eitaro Shioji, Yuhei Kawakoya, Makoto Iwamura, Takeo Hariu (NTT)

(17)/ICSS 15:50 - 16:15
Architecture Design for Visualizing Risks and Implementing Adequate Security
Shin'ichiro Matsuo, Akira Kanaoka, Takeshi Takahashi, Shinsuke Miwa, Tadashi Minowa (NICT)

----- Break ( 15 min. ) -----

----------------------------------------
Thu, Jul 19 PM (16:30 - 17:30)
----------------------------------------

(18) 16:30 - 17:30
[Invited Talk]
The Diversity of Color Vision and Its Applications to Communication
Kazunori Asada

----------------------------------------
Fri, Jul 20 AM ISEC&CSEC (09:00 - 10:15)
----------------------------------------

(19)/ISEC 09:00 - 09:25
Keystroke Authentication Using the Technique of Quality engineering
Hitoshi Osaka, Koya Yano (Nihon Univ.)

(20)/ISEC 09:25 - 09:50
Spoofing detection in biometric authentication system
Tomoaki Matsunami, Ken Kamakura (Fujitsu Lab.)

(21) 09:50 - 10:15


----- Break ( 15 min. ) -----

----------------------------------------
Fri, Jul 20 AM ISEC (10:30 - 12:10)
----------------------------------------

(22)/ISEC 10:30 - 10:55
An efficient variant of Rainbow without triangular matrix representation
Takanori Yasuda (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (ISIT)

(23)/ISEC 10:55 - 11:20
A New Higher Order Differential Property of Hierocrypt
Tetsuhiro Takahashi, Toshinobu Kaneko (TUS)

(24)/ISEC 11:20 - 11:45
A New Solving Algorithm for Attack Equation of Higher Order Differential Attack on AES (II)
Yusuke Inoue, Akinobu Kitagawa, Toshinobu Kaneko (TUS)

(25)/ISEC 11:45 - 12:10
How to purge imaginary path in truncate analysis
Toshinobu Kaneko (TUS)

----- Lunch Break ( 80 min. ) -----

----------------------------------------
Fri, Jul 20 PM ISEC (13:30 - 15:10)
----------------------------------------

(26)/ISEC 13:30 - 13:55
Privacy Preserving Data Processing with Collaboration of Paillier and RSA Public Key Cryptosystems
-- For Overcoming Contradiction of Protection and Utilization of Personal Data --
Shigeo Tsujii, Hiroshi Yamaguchi (Chuo Univ.), Hiroshi Doi (IISEC), Yukiyasu Tsunoo (NEC), Ryo Fujita (Chuo Univ.), Takahiko Syouji (YDK)

(27)/ISEC 13:55 - 14:20
Rationality and Security in Oblivious Transfer
Haruna Higo, Akihiro Yamada, Keisuke Tanaka (Tokyo Inst. of Tech.), Kenji Yasunaga (ISIT)

(28)/ISEC 14:20 - 14:45
An Improved Algorithm for Approximate GCD Problems
Atsushi Takayasu, Noboru Kunihiro (UT)

(29)/ISEC 14:45 - 15:10
A Batch Mapping Algorithm for Secure Function Evaluation
Koki Hamada, Dai Ikarashi, Koji Chida (NTT)

----- Break ( 15 min. ) -----

----------------------------------------
Fri, Jul 20 PM ISEC (15:25 - 16:40)
----------------------------------------

(30)/ISEC 15:25 - 15:50
Efficient elliptic curve scalar multiplication using an elliptic net algorithm
Naoki Kanayama, Yang Liu, Eiji Okamoto, Kazutaka Saito, Tadanori Teruya (Univ. of Tsukuba), Shigenori Uchiyama (Tokyo Metro Univ.)

(31)/ISEC 15:50 - 16:15
Efficient Proofs for CNF Formulas on Attributes in Pairing-Based Anonymous Credential System
Nasima Begum, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.)

(32)/ISEC 16:15 - 16:40
Construction of the Tsujii-Shamir-Kasahara (TSK) Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization
Shigeo Tsujii, Masahito Gotaishi (Chuo Univ.)

----------------------------------------
Fri, Jul 20 AM SITE (09:00 - 10:15)
----------------------------------------

(33)/SITE 09:00 - 09:25
A Proposal of Personal Authentication System using Cocktail Party Effect
Kosei Taketa, Hiroyuki Inaba (KIT)

(34)/SITE 09:25 - 09:50
A Recent Trend in Ethical and Legal Studies on Privacy
Takushi Otani (Kibi Internationla Univ.)

(35)/SITE 09:50 - 10:15
Proposal of Virtual Experimental System for Computer Virus Infection Situation
Shun-ichi Kurino, Noriaki Yoshikai (Nihon Univ.), Toshio Takahshi (JEED)

----- Break ( 15 min. ) -----

----------------------------------------
Fri, Jul 20 AM CSEC (10:30 - 12:10)
----------------------------------------

(36) 10:30 - 10:55


(37) 10:55 - 11:20


(38) 11:20 - 11:45


(39) 11:45 - 12:10


----- Lunch Break ( 80 min. ) -----

----------------------------------------
Fri, Jul 20 PM CSEC (13:30 - 15:10)
----------------------------------------

(40) 13:30 - 13:55


(41) 13:55 - 14:20


(42) 14:20 - 14:45


(43) 14:45 - 15:10


----- Break ( 15 min. ) -----

----------------------------------------
Fri, Jul 20 PM SPT (15:25 - 17:05)
----------------------------------------

(44) 15:25 - 15:50


(45) 15:50 - 16:15


(46) 16:15 - 16:40


(47) 16:40 - 17:05


# Information for speakers
General Talk will have 20 minutes for presentation and 5 minutes for discussion.


=== Technical Committee on Social Implications of Technology and Information Ethics (SITE) ===
# FUTURE SCHEDULE:

Wed, Oct 10, 2012: [Mon, Aug 13]

=== Technical Committee on Information Security (ISEC) ===
# FUTURE SCHEDULE:

Fri, Sep 21, 2012: Kikai-Shinko-Kaikan Bldg. [Fri, Jul 13]

# SECRETARY:
Tetsu Iwata (Nagoya University)
TEL +81-52-789-5722, FAX +81-52-789-5723
E-mail: ic-c (to ISEC secretaries)

=== Technical Committee on Information and Communication System Security (ICSS) ===

# SECRETARY:
Yutaka Miyake (KDDI R&D Laboratories, Inc.)
TEL: +81-49-278-7367, FAX: +81-49-278-7510
E-mail: is-qst

# ANNOUNCEMENT:
# Latest information will be presented on the homepage:
http://www.ieice.org/~icss/index.html

=== Technical Committee on Enriched MultiMedia (EMM) ===
# FUTURE SCHEDULE:

Mon, Aug 27, 2012 - Tue, Aug 28, 2012: [Wed, Jun 20]
Thu, Oct 4, 2012: Makuhari Messe [Mon, Jul 23], Topics: Frontier of multimedia privacy protection

=== Special Interest Group on Computer Security (IPSJ-CSEC) ===

=== Special Interest Group on Security Psychology and Trust (IPSJ-SPT) ===


Last modified: 2012-07-01 11:33:49


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to ISEC Schedule Page]   /   [Return to SITE Schedule Page]   /   [Return to ICSS Schedule Page]   /   [Return to EMM Schedule Page]   /   [Return to IPSJ-CSEC Schedule Page]   /   [Return to IPSJ-SPT Schedule Page]   /  
 
 Go Top  Go Back   Prev SITE Conf / Next SITE Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan