Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM |
2024-01-17 09:55 |
Miyagi |
Tohoku Univ. (Primary: On-site, Secondary: Online) |
An encryption method of JPEG bitstreams for partially disclosing visual information Mare Hirose, Shoko Imaizumi (Chiba Univ.), Kiya Hitoshi (Tokyo Metropolitan Univ) EMM2023-85 |
In this paper, we propose an encryption method for JPEG codestreams in which the file size is invariant before and after... [more] |
EMM2023-85 pp.26-31 |
EMM |
2018-03-05 14:35 |
Kagoshima |
Naze Community Center (Amami-Shi, Kagoshima) |
[Poster Presentation]
A Block-Permutation-Based Image Encryption Allowing Hierarchical Decryption Yusuke Izawa, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metro. Univ.) EMM2017-77 |
This paper proposes a permutation-based image encryption scheme, which allows decrypting only a particular area in the e... [more] |
EMM2017-77 pp.1-6 |
ICSS, IPSJ-SPT |
2016-03-04 15:40 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Higher-order differential attack on the round-reduced variants of the block cipher Yusuke Takahashi, Yasutaka Igarashi, Toshinobu Kaneko (TUS) ICSS2015-73 |
Midori64 proposed by Banik et al. in 2015 is an SPN-type block cipher with 128-bit secret key. The designers have evalua... [more] |
ICSS2015-73 pp.159-164 |
CS |
2015-07-03 11:40 |
Okinawa |
Eef Information Plaza (Kumejima Is.) |
Privacy-preserving Biometric Authentication with Homomorphic Encryption by Comparing Partial Bio-information Takumi Matsunaga, Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2015-28 |
In recent years, the privacy-preserving biometric authentication executed on encrypted biometric information is getting ... [more] |
CS2015-28 pp.103-108 |
EMM |
2015-01-28 14:45 |
Miyagi |
Tohoku University |
Reversible data embedding method using HAM with encryption Hikaru Takeda, Shoko Imaizumi, Naokazu Aoki, Hiroyuki Kobayashi (Chiba Univ.) EMM2014-68 |
We propose a new embedding method with reversible data embedding method HAM(Histogram Association Mapping) in this paper... [more] |
EMM2014-68 pp.9-14 |
RECONF, VLD, CPSY, IPSJ-SLDM [detail] |
2011-01-18 10:20 |
Kanagawa |
Keio Univ (Hiyoshi Campus) |
Evaluation of switchable AES S-box circuit using dynamic and partial reconfiguration Naoko Yamada (Keio Univ.), Keisuke Iwai, Takakazu Kurokawa (NDA), Hideharu Amano (Keio Univ.) VLD2010-102 CPSY2010-57 RECONF2010-71 |
Recently, the threat of side channel attack to the hardware encryption circuits is increasing. In order
to cope with it... [more] |
VLD2010-102 CPSY2010-57 RECONF2010-71 pp.127-132 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 11:45 |
Aomori |
Hirosaki University |
On the Implementation of Pubilc-key Encryption with Partial Matching Keyword Search by Using Predicate Encryption Akira Nagai, Reo Yoshida, Gembu Morohashi (NTT Corp.) ISEC2010-29 SITE2010-25 ICSS2010-35 |
In this paper, we examine the Public-key Encryption with Partial Matching Keyword Search (PEPMKS), and report the result... [more] |
ISEC2010-29 SITE2010-25 ICSS2010-35 pp.147-152 |
RECONF |
2008-05-22 13:50 |
Fukushima |
The University of Aizu |
Bitstream encryption and authentication with AES-GCM in dynamically reconfigurable systems Yohei Hori, Akashi Satoh, Hirofumi Sakane, Kenji Toda (AIST) RECONF2008-3 |
A high-speed and secure dynamic partial reconfiguration (DPR) system is realized with AES-GCM that guarantees both confi... [more] |
RECONF2008-3 pp.13-18 |
CQ, LOIS, IE, IEE-CMN, ITE-ME |
2007-09-27 14:15 |
Tokushima |
The university of Tokushima |
Cryptanalysis JPEG 2000 partial scrambled images based on statistical character Shingo Hamaguchi, Akihiro Shimizu (Kochi Univ.of Tech.) CQ2007-46 OIS2007-36 IE2007-43 |
Users can recognize image outline and protect copyrights on digital images by partial-scrambling.
JPEG 2000 is suggest... [more] |
CQ2007-46 OIS2007-36 IE2007-43 pp.57-60 |
WBS, IT, ISEC |
2006-03-17 09:45 |
Aichi |
Nagoya Univ. |
An Encryption Method for Multiple Receivers with Different Roles Yasuo Hatano, Kunihiko Miyazaki (Hitachi) |
This paper discusses an applied cryptographic technique to disclose information selectively for multiple receivers who h... [more] |
IT2005-110 ISEC2005-167 WBS2005-124 pp.91-96 |