Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
BioX, ITE-ME, ITE-IST |
2017-05-22 15:10 |
Ishikawa |
|
A study on system security for a smart device-based multifactor authentication system based on usage environment Yuki Nakao, Tomoaki Higashi, Yasushi Yamazaki (Kitakyushu Univ.), Tetsushi Ohki (Shizuoka Univ.) BioX2017-1 |
With the rapid spread of smart devices, such as smartphones
and tablet PCs, more secure and convenient user
authentica... [more] |
BioX2017-1 pp.17-22 |
MBE, BioX, NC |
2016-10-22 16:30 |
Osaka |
Osaka Electro-Communication University |
A study on improving authentication accuracy for a multifactor authentication system considering usage environment Tomoaki Higashi, Ryo Okabe, Yasushi Yamazaki (Kitakyushu Univ.), Tetsushi Ohki (AIST) BioX2016-29 MBE2016-43 NC2016-28 |
As a means of more secure and convenient user authentication for rapidly spreading smart devices, we have proposed a mul... [more] |
BioX2016-29 MBE2016-43 NC2016-28 pp.67-72 |
MBE, BioX, NC |
2016-10-22 16:55 |
Osaka |
Osaka Electro-Communication University |
A study on biometric-bit-string generation from touch panel on smart device Suguru Sunada, Taiki Sowa, Yasushi Yamazaki, Takeru Miyazaki (Kitakyushu Univ.), Tetsushi Ohki (AIST.) BioX2016-30 MBE2016-44 NC2016-29 |
As a means of secure and convenient user authentication on
smart devices, such as smart-phones and tablet PCs,
biometr... [more] |
BioX2016-30 MBE2016-44 NC2016-29 pp.73-76 |
BioX |
2016-08-19 11:45 |
Miyagi |
|
Brute-force Attacks against Biometric Authentication Systems Tetsushi Ohki, Akira Otsuka (AIST) BioX2016-16 |
In this paper, we proposed an efficient brute-force attack scheme for biometric authentication systems. We define the br... [more] |
BioX2016-16 pp.51-56 |
PRMU, BioX |
2016-03-24 13:00 |
Tokyo |
|
A smart device-based multifactor authentication system based on context awareness Ryo Okabe, Tomoaki Higashi, Yasushi Yamazaki (Kitakyushu Univ.), Tetsushi Ohki (AIST) BioX2015-47 PRMU2015-170 |
In user authentication on smart devices, such as
smart-phones and tablet PCs, it is difficult to maintain a
usage envi... [more] |
BioX2015-47 PRMU2015-170 pp.37-42 |
BioX |
2015-08-25 10:20 |
Hokkaido |
Otaru Port Marina |
Performance estimation based on artifact species (Part 2) Tetsushi Ohki, Akira Otsuka (AIST) BioX2015-20 |
[more] |
BioX2015-20 pp.39-44 |
BioX, ITE-ME, ITE-IST |
2015-06-30 10:30 |
Ishikawa |
Kanazawa University, Kakuma Campus |
Performance estimation based on artifact species Tetsushi Ohki, Akira Otsuka (AIST) BioX2015-10 |
Technology evaluation of biometric authentication systems is widely conducted based on public biometric databases especi... [more] |
BioX2015-10 pp.73-78 |
BioX |
2014-10-17 11:25 |
Okinawa |
Nobumoto Ohama Memorial Hall (Ishigaki) |
Evaluation of Liveness Detection Methods against Flat Panel-based Presentation Attack Tatsuya Takehisa (Nissin), Tetsushi Ohki, Akira Otsuka (AIST), Manabu Inuma (Josai Univ.) BioX2014-38 |
Recently, The presentation attack spoofing to the biometrics authentication system that use fake biometric samples are ... [more] |
BioX2014-38 pp.55-59 |
BioX (2nd) |
2013-08-28 14:45 |
Osaka |
The Institute of Scientific and Industrial Research, Osaka Univ. |
A Survey on Biometric Presentation Attack and It's Security Evaluation Method Tetsushi Ohki, Akira Otsuka, Kazuo Takaragi (AIST) |
[more] |
|
LOIS |
2013-03-08 11:40 |
Okinawa |
|
On influence of personal interests and attributes in travel behavior analysis
-- Analysis on location data of foreign tourists to Okinawa -- Seira Hidano, Tetsushi Ohki (Waseda Univ.) LOIS2012-95 |
Analysing large-scale travel behavior acquired from small terminal like smartphones to improve the service is now attrac... [more] |
LOIS2012-95 pp.149-154 |
BioX (2nd) |
2012-08-28 14:30 |
Tokyo |
Waseda Univ. Nishiwaseda Campus |
Wolf attack based on speech synthesis using LP-residual signal Shohei Hayashi, Tetsushi Ohki, Naohisa Komatsu, Jiro Katto (Waseda Univ.) |
In this paper, we suggest a method of creation of voice that allows the Wolf attack against speaker recognition system. ... [more] |
|
ISEC, IT, WBS |
2011-03-04 10:50 |
Osaka |
Osaka University |
A Method of Fingerprint Authentication Using KSS(I) Hiroki Satomura, Tetsushi Ohki, Naohisa Komatsu (Waseda Univ.), Masao Kasahara (Osaka Gakuin Univ.) IT2010-121 ISEC2010-125 WBS2010-100 |
We propose a method of fingerprint authentication using KSS(I). KSS(I)
requires to recover user's biometric sample corr... [more] |
IT2010-121 ISEC2010-125 WBS2010-100 pp.353-360 |
LOIS, IPSJ-CN |
2009-05-21 16:15 |
Tokyo |
Waseda Univ. Faculty of Science and Engineering,OkuboCamp. 55N Bldg |
Application of Biometric Encryption to Electric Near-field Communication System Tetsushi Ohki, Naohisa Komatsu (Waseda Univ.), Hideki Kawabe, Yasuhiro Hosoda (NTT) LOIS2009-5 |
Conventional electric near-field communication systems authenticate users only with card devices. If devices are lossed,... [more] |
LOIS2009-5 pp.79-84 |
ISEC, LOIS |
2007-11-21 17:05 |
Hyogo |
Kobe University |
Template Protection using Biometric Encryption for CELP Speaker Verification Shinya Takayama, Tetsushi Ohki (Waseda Univ.), Yasushi Yamazaki (The Univ. of Kitakyushu), Naohisa Komatsu (Waseda Univ.), Masao Kasahara (Osaka Gakuin Univ.) ISEC2007-97 OIS2007-69 |
As the application of biometric authentication technique has been advanced, countermeasures against threat, that the tem... [more] |
ISEC2007-97 OIS2007-69 pp.57-62 |