Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT, ISEC, RCC, WBS |
2022-03-11 12:00 |
Online |
Online |
Optical Fingerprint Positioning System for VN-CSK Type Parallel Transmission Using RGB-LED Koki Taruishi, Daisuke Ogawa, Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.) IT2021-119 ISEC2021-84 WBS2021-87 RCC2021-94 |
A variable N-parallel code shift keying system has been proposed as realizing the multiple-access function, the dimming ... [more] |
IT2021-119 ISEC2021-84 WBS2021-87 RCC2021-94 pp.216-220 |
EMM |
2019-03-13 15:15 |
Okinawa |
TBD |
[Poster Presentation]
Estimation of Collusion Strategy for Fingerprinting Codes under Noisy Environment Tatsuya Yasui, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) EMM2018-107 |
In fingerprinting code against collusion attack, the optimal detector which detect colluders has been proposed. However,... [more] |
EMM2018-107 pp.83-88 |
IT, ISEC, WBS |
2019-03-08 11:15 |
Tokyo |
University of Electro-Communications |
A Lower Bound of the Joint Capacity of Digital Fingerprinting Codes against a Mixed Attack Tatsuya Sekine, Hiroki Koga (U. Tsukuba) IT2018-119 ISEC2018-125 WBS2018-120 |
Digital fingerprinting codes are embedded in digital contents for protecting copyrights of the digital contents against m... [more] |
IT2018-119 ISEC2018-125 WBS2018-120 pp.269-274 |
IEE-CMN, EMM, LOIS, IE, ITE-ME [detail] |
2018-09-28 13:15 |
Oita |
Beppu Int'l Convention Ctr. aka B-CON Plaza |
Dynamic Estimation of Collusion Strategy for the Detection of Colluders in Fingerprinting Codes Tatsuya Yasui, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.), Isao Echizen (NII) LOIS2018-19 IE2018-39 EMM2018-58 |
An optimal detector known as MAP detector has been proposed for the probabilistic fingerprinting
code. It needs two kin... [more] |
LOIS2018-19 IE2018-39 EMM2018-58 pp.65-70 |
EMM |
2018-03-05 14:35 |
Kagoshima |
Naze Community Center (Amami-Shi, Kagoshima) |
[Poster Presentation]
Estimation of Collusion Strategy for Fingerprinting Codes Tatsuya Yasui, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) EMM2017-80 |
An optimal detector is known as MAP detector has been proposed for the probabilistic fingerprinting codes such as Tardo... [more] |
EMM2017-80 pp.17-22 |
EMM |
2018-01-29 15:05 |
Miyagi |
Tohoku Univ. (Aobayama Campus) |
A study of tracing algorithm for fingerprinting code considering erasure symbols Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) EMM2017-68 |
The robustness against collusion attack has been measured under the marking assumption in fingerprinting codes. In some ... [more] |
EMM2017-68 pp.13-18 |
EMM |
2017-01-30 16:15 |
Miyagi |
Tohoku University (Miyagi) |
On Some Variations of Information Hiding Strategies Based on Complete Complementary Codes Tetsuya Kojima (NIT, Tokyo College) EMM2016-79 |
Complete complementary code (CCC) is a spread spectrum sequence family with good correlation properties. Information hid... [more] |
EMM2016-79 pp.31-36 |
IT, ISEC, WBS |
2016-03-10 13:15 |
Tokyo |
The University of Electro-Communications |
Improvement in detection performance of Tardos's fingerprinting code using detailed score distribution Ryo Inoue, Kazuhiko Yamaguchi (UEC) IT2015-113 ISEC2015-72 WBS2015-96 |
Tardos proposed c-secure code based on randomness with certain distribution (Tardos’s code). The code is shorter than Bo... [more] |
IT2015-113 ISEC2015-72 WBS2015-96 pp.75-80 |
EMM |
2015-01-29 14:15 |
Miyagi |
Tohoku University |
Study on Collaboration of Collusion Secure Code and Watermarking Technique Minoru Kuribayashi (Kobe Univ.) EMM2014-76 |
According to watermark security based on the Kerckhoffs' principle, we should mind that illegal users will be able to ac... [more] |
EMM2014-76 pp.57-62 |
IT |
2014-09-19 10:50 |
Chiba |
|
[Invited Talk]
Optimal Tracing Method for Fingerprinting Code Minoru Kuribayashi (Kobe Univ.) IT2014-45 |
G. Tardos has proposed a probabilistic fingerprinting code which has a length of theoretically minimal order with respec... [more] |
IT2014-45 pp.25-30 |
ICSS, IPSJ-SPT |
2014-03-27 13:55 |
Okinawa |
Meio Univiersity |
An Investigation of Malicious JavaScript Code used in Drive-by Download Yuta Takata, Mitsuaki Akiyama, Takeo Hariu (NTT) ICSS2013-72 |
Malicious website contains JavaScript code that exploits vulnerabilities in the browser or the browser's plugins.Researc... [more] |
ICSS2013-72 pp.59-64 |
ISEC, IT, WBS |
2014-03-11 15:40 |
Aichi |
Nagoya Univ., Higashiyama Campus |
On the Performance of Probabilistic Digital Fingerprinting Codes Generated from Nonstationary Distribution Kouhei Kanai, Hiroki Koga (Univ. of Tsukuba) IT2013-94 ISEC2013-123 WBS2013-83 |
Illegal copies of digital contents are spreading due to the development
of the Internet. Digital fingerprinting codes p... [more] |
IT2013-94 ISEC2013-123 WBS2013-83 pp.255-260 |
EMM |
2014-03-08 11:30 |
Ishikawa |
JAIST |
Simplified Tracing Algorithm of Fingerprinting Code Against Averaging Attack Minoru Kuribayashi (Kobe Univ.) EMM2013-115 |
When a binary fingerprinting codeword is embedded into digital contents using a robust spread-spectrum(SS) watermarking ... [more] |
EMM2013-115 pp.93-98 |
EMM |
2013-05-24 14:00 |
Kochi |
Kochijyo Hall |
Optimal Tracing Algorithm for Fingerprinting Code under Averaging Attack Minoru Kuribayashi (Kobe Univ.) EMM2013-5 |
When a binary fingerprinting codeword is embedded into digital contents using a robust spread-spectrum (SS) watermarking... [more] |
EMM2013-5 pp.25-30 |
IT |
2012-07-19 14:15 |
Aichi |
Toyota Technological Institute |
A Tracing Algorithm for the Boneh-Shaw Code under a Probabilistic Attack Model Kouhei Kanai, Hiroki Koga (Tsukuba Univ) IT2012-10 |
Illegal copies of digital contents is spreading due to the development of the Internet.A digital finger- printing code p... [more] |
IT2012-10 pp.7-12 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 11:20 |
Hokkaido |
|
On Information Hiding Technologies Based on Complete Complementary Codes Tetsuya Kojima (Tokyo Natl. Coll. Tech.), Ryusuke Mayuzumi (Univ. of Electro-Comm.), Naoki Ohtani (NHK Media Tech.) ISEC2012-11 SITE2012-7 ICSS2012-13 EMM2012-3 |
Complete complemenary code (CCC) is a spread spectrum sequence family with good correlation properties. A digital waterm... [more] |
ISEC2012-11 SITE2012-7 ICSS2012-13 EMM2012-3 pp.17-22 |
IT, ISEC, WBS |
2010-03-05 13:50 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
Traitor Tracing system with Constant-size Public-key and Ciphertext using q-ary fingerprinting codes Ying Zhang (Chuo Univ.), Takashi Kitagawa (Univ. of Tokyo.), Nuttapong Attrapadung (AIST), Hideki Imai (Chuo Univ/AIST) IT2009-110 ISEC2009-118 WBS2009-89 |
A traitor tracing system enables a publisher to trace a pirate decryption box to one of the secret keys used to create t... [more] |
IT2009-110 ISEC2009-118 WBS2009-89 pp.255-260 |
IT |
2010-01-08 14:50 |
Overseas |
Univ. of Hawaii |
Performance analysis of the blacklist scheme for collusion-secure code Yoshinobu Iriguchi, Brian Kurkoski, Kazuhiko Yamaguchi (Univ. of Electro-Comm.) IT2009-68 |
We have proposed a scheme for collusion-secure code which utilizes a blacklist of colluders in order to improve efficien... [more] |
IT2009-68 pp.93-98 |
ISEC |
2008-05-16 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Integrating Fingerprint and Cryptosystem for Internet-Based Live Pay-TV System Shuhui Hou, Tetsutaro Uehara (Kyoto Univ.), Takashi Satoh (Univ. of Kitakyushu), Yoshitaka Morimura, Michihiko Minoh (Kyoto Univ.) ISEC2008-12 |
In the last few years, live pay-TV system via internet has come to be established with the development of broadband netw... [more] |
ISEC2008-12 pp.77-84 |
IT |
2007-05-18 16:15 |
Yamagata |
Denkoku-No-Mori (Yonezawa) |
Shortened and concatenated collusion-secure codes for digital fingerprinting Hideki Yagi, Toshiyasu Matsushima, Shigeichi Hirasawa (Waseda Univ.) IT2007-6 |
Digital fingerprinting, which is employed in contents distribution systems to deter illegal use of digital contents, is ... [more] |
IT2007-6 pp.31-36 |