|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
VLD, CAS, MSS, SIP |
2016-06-16 16:40 |
Aomori |
Hirosaki Shiritsu Kanko-kan |
A generation scheme of random unitary matrices for template protection Yuko Saito, Sayaka Shiota, Hitoshi Kiya (Tokyo Metropolitan Univ.) CAS2016-14 VLD2016-20 SIP2016-48 MSS2016-14 |
Random unitary matrices-based template protection methods have been proposed as one of biometric template protection sch... [more] |
CAS2016-14 VLD2016-20 SIP2016-48 MSS2016-14 pp.73-78 |
ITS, IE, ITE-AIT, ITE-HI, ITE-ME, ITE-MMS, ITE-CE [detail] |
2016-02-22 10:00 |
Hokkaido |
Hokkaido Univ. |
Secure classification based on kernel method using unitary transformation Ibuki Nakamura, Yuko Saito, Sayaka Shiota, Hitoshi Kiya (Tokyo Metropolitan Univ.) ITS2015-59 IE2015-101 |
This study considers a template protection scheme based on an random unitary transformation, where the template consists... [more] |
ITS2015-59 IE2015-101 pp.17-22 |
IE, ITE-ME, IPSJ-AVM, ITE-CE [detail] |
2015-08-03 10:55 |
Tokyo |
Tokyo Metropolitan Univ. |
A study of random unitary matrices for secure biometric authentication Yuko Saito, Ibuki Nakamura, Sayaka Shiota (Tokyo Metro.Univ), Yoshihide Tonomura (NTT), Hitoshi Kiya (Tokyo Metro.Univ) IE2015-47 |
Random unitary transformation-based template protection methods have
been proposed as one of biometric template protec... [more] |
IE2015-47 pp.7-12 |
EMM |
2015-03-12 14:10 |
Okinawa |
|
[Poster Presentation]
An extension of the unitary transformation-based template protection method for biometrics and its application Yuko Saito, Ibuki Nakamura, Sayaka Shiota (Tokyo Metro. Univ.), Yoshihide Tonomura (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) EMM2014-81 |
Since biometric features are personal and irrevocable data, some schemes to protect the features (templates) extracted f... [more] |
EMM2014-81 pp.25-30 |
SIS, IPSJ-AVM |
2014-09-11 10:45 |
Yamagata |
SHONAI INDUSTRIAL PROMOTION CENTER |
A method of perceptual encryption and its efficient key management for JPEG/Motion JPEG images Kenta Kurihara, Yuko Saito (Tokyo Metropolitan Univ.), Shoko Imaizumi (Chiba Univ.), Sayaka Shiota, Hitoshi Kiya (Tokyo Metropolitan Univ.) SIS2014-53 |
In this paper, we propose a method of perceptual encryption and its efficient key management for images presupposing JPE... [more] |
SIS2014-53 pp.13-18 |
MI |
2005-01-22 13:00 |
Okinawa |
Univ. of the Ryukus |
Recognition of lung nodules in CT images considering normal structures Kensuke Ikemoto, Mayuko Saito, Junichi Katayama (Toyohashi Univ. of Tech.), Tsutomu Matsumoto, Gentarou Fukano (NIRS), Shinji Mizuno, Hotaka Takizawa, Shinji Yamamoto (Toyohashi Univ. of Tech.), Tohru Matsumoto (NIRS), Shusuke Sone (Niigata Univ.), Fumiyoshi Takayama, Masahiro Koyama (Azumi general hosp.), Shinichi Wada (Niigata Univ.) |
[more] |
MI2004-91 pp.59-64 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|