Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
LOIS, ICM |
2023-01-19 15:00 |
Fukuoka |
Kitakyushu International Conference Center (Primary: On-site, Secondary: Online) |
Study of similarity calculation method personal authentication method using changeable granularity living areas based on GPS data Daisuke Toyama, Sunao Hara, Masanobu Abe (Okayama Univ.) ICM2022-35 LOIS2022-35 |
In this study, we study personal authentication using the living areas based on GPS data.The latitude and longitude of t... [more] |
ICM2022-35 LOIS2022-35 pp.25-30 |
NC, MBE (Joint) |
2021-03-04 15:25 |
Online |
Online |
Examination of measurement method and feature of biometrics identification with eye movement Yudai Niitsu, Minoru Nakayama (Tokyo Tech) MBE2020-49 |
Biometric identification using eye movement has been attracting attention as a highly secure identification method with ... [more] |
MBE2020-49 pp.44-47 |
ET |
2020-12-12 12:50 |
Online |
Online |
Development of a Gaze Information Collecting System in e-Testing for Examinee Authentication and Its Evaluation Toru Tokunaga, Toru Kano, Takako Akakura (TUS) ET2020-38 |
Today, with the development of communication technology, distance learning has improved to a point where it is comparabl... [more] |
ET2020-38 pp.23-28 |
IBISML |
2020-03-10 15:25 |
Kyoto |
Kyoto University (Cancelled but technical report was issued) |
Multi-modal Personal Authentication System Using CNN with Voice and Aerial Signature Shogo Takaoka, Takeshi Yoshida, Takuya Kitamura (NIT, Toyama College) IBISML2019-38 |
In this paper, we propose multi-modal personal authentication system using convolution neural network(CNN) with voice an... [more] |
IBISML2019-38 pp.37-43 |
IBISML |
2020-03-10 15:50 |
Kyoto |
Kyoto University (Cancelled but technical report was issued) |
Improvement of Personal Authentication by Aerial Signature Takeshi Yoshida, Takuya Kitamura (NITT) IBISML2019-39 |
In personal authentication by aerial signature, it was confirmed that suitable feature is different by each person. Ther... [more] |
IBISML2019-39 pp.45-50 |
HCGSYMPO (2nd) |
2019-12-11 - 2019-12-13 |
Hiroshima |
Hiroshima-ken Joho Plaza (Hiroshima) |
Examination of biometrics using eye movement characteristics during writing action Yudai Niitsu, Minoru Nakayama (Tokyo Tech) |
Unlike biometric authentication using physical features such as fingerprint and face, behavioral features such as eye mo... [more] |
|
BioX |
2019-10-03 14:45 |
Okinawa |
|
[Short Paper]
A Study on biometric information effective for user authentication using gesture pattern Daiki Izumoto, Yasushi Yamazaki (Kitakyushu Univ.) BioX2019-57 |
Pattern lock, which is one of the personal authentication methods using a touch panel of a smartphone, is convenient and... [more] |
BioX2019-57 pp.17-18 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 13:45 |
Kochi |
Kochi University of Technology |
3 Layers Public Key Cryptosystem with a Short Tandem Repeat DNA for Ultimate Personal Identification
-- Introduction of Short Tandem Repeat Coupled with Mai Nanbaa and its Application -- Shigeo Tsujii, Toshiaki Saisho, Masao Yamasawa, Ko Shikata (Chuo Univ.), Koji Sasaki, Nobuharu Suzuki (Ad.) ISEC2019-52 SITE2019-46 BioX2019-44 HWS2019-47 ICSS2019-50 EMM2019-55 |
Considering the current situation, where personal verification with digital authentication is becoming important in the ... [more] |
ISEC2019-52 SITE2019-46 BioX2019-44 HWS2019-47 ICSS2019-50 EMM2019-55 pp.341-346 |
MBE, NC (Joint) |
2018-11-22 13:55 |
Kyoto |
|
Individuality Extraction from Flick Action Trajectory for Personal Identification on Smartphones Masashi Sekikawa, Yuta Ozawa, Kohei Minemura, Masaki Kyoso (TCU) MBE2018-43 |
Latest smartphones which have many functions deal with many personal information. Therefore, advanced security measures ... [more] |
MBE2018-43 pp.35-39 |
BioX |
2018-10-12 10:00 |
Okinawa |
Nobumoto Ohama Memorial Hall |
Evaluation for individuality of intermediate output from CNN-based gait classification network Kousuke Moriwaki, Daigo Muramatsu, Noriko Takemura, Yasushi Yagi (Osaka Univ.) BioX2018-27 |
In personal authentication using convolutional neural network, we often use attribute information besides input's person... [more] |
BioX2018-27 pp.45-49 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 15:50 |
Hokkaido |
Sapporo Convention Center |
A Study on Public Wi-Fi Authentication Method with Anonymity and Traceability Using Blockchain Tomoyuki Sanda, Hiroyuki Inaba (Kyoto Inst. of Tech.) ISEC2018-26 SITE2018-18 HWS2018-23 ICSS2018-29 EMM2018-25 |
Recently, Wi-Fi access points have been installed in public places, with increasing demand for Internet access by mobile... [more] |
ISEC2018-26 SITE2018-18 HWS2018-23 ICSS2018-29 EMM2018-25 pp.137-142 |
SWIM |
2018-05-19 14:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A proposal of peer 2 peer economic activity platform Nobuhiro Kataoka (IL), Akira Horimai (Figio), Masahiko Kubota (MIND), Kenji Saotome (Housei Univ.), Shoei Komatsu (APSOM) SWIM2018-3 |
Advances in digital infrastructure have brought about major changes in economic activity. Individuals can carry out econ... [more] |
SWIM2018-3 pp.9-13 |
PRMU, BioX |
2018-03-19 11:15 |
Tokyo |
|
Personal Authentication by Pen-Holding Style using Image Taken from Bottom Minako Sato, Takao Yamanaka (Sophia Univ.) BioX2017-60 PRMU2017-196 |
In this paper, a novel personal authentication method is proposed by using images of pen-holding style taken from the bo... [more] |
BioX2017-60 PRMU2017-196 pp.145-150 |
PRMU, IBISML, IPSJ-CVIM [detail] |
2017-09-16 11:15 |
Tokyo |
|
[Short Paper]
Research on Person Recognition from Human Activity Takayuki Yoshida, Basabi Chakraborty (Iwate Pref. Univ.) PRMU2017-57 IBISML2017-29 |
Currently, motion sensors are equipped as standard equipment in mobile terminals, list band type lifelog devices have al... [more] |
PRMU2017-57 IBISML2017-29 pp.159-160 |
EMM, IT |
2017-05-23 11:30 |
Yamagata |
Yamagata University(Yonezawa Campus) |
Digital signature type QR code with personal identification function Ken-ichi Sakina (QR Tech.) IT2017-11 EMM2017-11 |
In this study, we propose a digital signature type QR code (DSQR code) that incorporates an elliptic curve digital signa... [more] |
IT2017-11 EMM2017-11 pp.61-66 |
IE, IMQ, MVE, CQ (Joint) [detail] |
2016-03-07 10:00 |
Okinawa |
|
A Study on the Personal Authentication Using the Drawing by Eye Gaze Hiroto Mukai, Takefumi Ogawa (UTokyo) IMQ2015-31 IE2015-130 MVE2015-58 |
We have previously proposed a personal identification method based on the trajectory of eye gaze. Eye gaze information c... [more] |
IMQ2015-31 IE2015-130 MVE2015-58 pp.25-30 |
IE, IMQ, MVE, CQ (Joint) [detail] |
2016-03-07 15:20 |
Okinawa |
|
[Poster Presentation]
A Study on Similarity between Recorded Voice and Synthesized Voice based on Multidimensional Scaling Method Kohei Yoshida, Kenko Ota, Ken'ya Jinno (NIT) CQ2015-131 |
This study focuses on the difference in the audibility between recorded voice and synthesized voice uttered by the same ... [more] |
CQ2015-131 pp.131-136 |
LOIS |
2016-03-04 11:00 |
Okinawa |
Central Community Center, Miyakojima-City |
A study on personalized selection methods for authentication elements and algorithms Fumiaki Kudo, Kenichiro Muto, Hideki Kawabe, Takahiro Yamamoto (NTT) LOIS2015-86 |
Modern smartphones and wearable devices comprise a multitude of sensors which can be utilized to measure a variety of us... [more] |
LOIS2015-86 pp.133-138 |
LOIS |
2016-03-04 11:20 |
Okinawa |
Central Community Center, Miyakojima-City |
A study on data protection requirements for an authentication system using personal data Miho Ikeda, Kenichiro Muto, Hideki Kawabe, Fumiaki Kudo, Takahiro Yamamoto (NTT) LOIS2015-87 |
We have been researching new authentication which identifies users by analyzing personal characteristics of human behavi... [more] |
LOIS2015-87 pp.139-144 |
PRMU |
2015-12-22 11:40 |
Nagano |
|
Development and comparing of personal authentication systems by signature in the air Daiki Yamada, Takuya Kitamura (NIT) PRMU2015-110 |
In late years biological distinction has been used for security systems because it has high reliabiliby. Biometric featu... [more] |
PRMU2015-110 pp.105-110 |