IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 23  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IT, ISEC, RCC, WBS 2022-03-11
12:00
Online Online Optical Fingerprint Positioning System for VN-CSK Type Parallel Transmission Using RGB-LED
Koki Taruishi, Daisuke Ogawa, Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.) IT2021-119 ISEC2021-84 WBS2021-87 RCC2021-94
A variable N-parallel code shift keying system has been proposed as realizing the multiple-access function, the dimming ... [more] IT2021-119 ISEC2021-84 WBS2021-87 RCC2021-94
pp.216-220
EMM 2019-03-13
15:15
Okinawa TBD [Poster Presentation] Estimation of Collusion Strategy for Fingerprinting Codes under Noisy Environment
Tatsuya Yasui, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) EMM2018-107
In fingerprinting code against collusion attack, the optimal detector which detect colluders has been proposed. However,... [more] EMM2018-107
pp.83-88
IT, ISEC, WBS 2019-03-08
11:15
Tokyo University of Electro-Communications A Lower Bound of the Joint Capacity of Digital Fingerprinting Codes against a Mixed Attack
Tatsuya Sekine, Hiroki Koga (U. Tsukuba) IT2018-119 ISEC2018-125 WBS2018-120
Digital fingerprinting codes are embedded in digital contents for protecting copyrights of the digital contents against m... [more] IT2018-119 ISEC2018-125 WBS2018-120
pp.269-274
IEE-CMN, EMM, LOIS, IE, ITE-ME [detail] 2018-09-28
13:15
Oita Beppu Int'l Convention Ctr. aka B-CON Plaza Dynamic Estimation of Collusion Strategy for the Detection of Colluders in Fingerprinting Codes
Tatsuya Yasui, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.), Isao Echizen (NII) LOIS2018-19 IE2018-39 EMM2018-58
An optimal detector known as MAP detector has been proposed for the probabilistic fingerprinting
code. It needs two kin... [more]
LOIS2018-19 IE2018-39 EMM2018-58
pp.65-70
EMM 2018-03-05
14:35
Kagoshima Naze Community Center (Amami-Shi, Kagoshima) [Poster Presentation] Estimation of Collusion Strategy for Fingerprinting Codes
Tatsuya Yasui, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) EMM2017-80
An optimal detector is known as MAP detector has been proposed for the probabilistic fingerprinting codes such as Tardo... [more] EMM2017-80
pp.17-22
EMM 2018-01-29
15:05
Miyagi Tohoku Univ. (Aobayama Campus) A study of tracing algorithm for fingerprinting code considering erasure symbols
Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) EMM2017-68
The robustness against collusion attack has been measured under the marking assumption in fingerprinting codes. In some ... [more] EMM2017-68
pp.13-18
EMM 2017-01-30
16:15
Miyagi Tohoku University (Miyagi) On Some Variations of Information Hiding Strategies Based on Complete Complementary Codes
Tetsuya Kojima (NIT, Tokyo College) EMM2016-79
Complete complementary code (CCC) is a spread spectrum sequence family with good correlation properties. Information hid... [more] EMM2016-79
pp.31-36
IT, ISEC, WBS 2016-03-10
13:15
Tokyo The University of Electro-Communications Improvement in detection performance of Tardos's fingerprinting code using detailed score distribution
Ryo Inoue, Kazuhiko Yamaguchi (UEC) IT2015-113 ISEC2015-72 WBS2015-96
Tardos proposed c-secure code based on randomness with certain distribution (Tardos’s code). The code is shorter than Bo... [more] IT2015-113 ISEC2015-72 WBS2015-96
pp.75-80
EMM 2015-01-29
14:15
Miyagi Tohoku University Study on Collaboration of Collusion Secure Code and Watermarking Technique
Minoru Kuribayashi (Kobe Univ.) EMM2014-76
According to watermark security based on the Kerckhoffs' principle, we should mind that illegal users will be able to ac... [more] EMM2014-76
pp.57-62
IT 2014-09-19
10:50
Chiba   [Invited Talk] Optimal Tracing Method for Fingerprinting Code
Minoru Kuribayashi (Kobe Univ.) IT2014-45
G. Tardos has proposed a probabilistic fingerprinting code which has a length of theoretically minimal order with respec... [more] IT2014-45
pp.25-30
ICSS, IPSJ-SPT 2014-03-27
13:55
Okinawa Meio Univiersity An Investigation of Malicious JavaScript Code used in Drive-by Download
Yuta Takata, Mitsuaki Akiyama, Takeo Hariu (NTT) ICSS2013-72
Malicious website contains JavaScript code that exploits vulnerabilities in the browser or the browser's plugins.Researc... [more] ICSS2013-72
pp.59-64
ISEC, IT, WBS 2014-03-11
15:40
Aichi Nagoya Univ., Higashiyama Campus On the Performance of Probabilistic Digital Fingerprinting Codes Generated from Nonstationary Distribution
Kouhei Kanai, Hiroki Koga (Univ. of Tsukuba) IT2013-94 ISEC2013-123 WBS2013-83
Illegal copies of digital contents are spreading due to the development
of the Internet. Digital fingerprinting codes p... [more]
IT2013-94 ISEC2013-123 WBS2013-83
pp.255-260
EMM 2014-03-08
11:30
Ishikawa JAIST Simplified Tracing Algorithm of Fingerprinting Code Against Averaging Attack
Minoru Kuribayashi (Kobe Univ.) EMM2013-115
When a binary fingerprinting codeword is embedded into digital contents using a robust spread-spectrum(SS) watermarking ... [more] EMM2013-115
pp.93-98
EMM 2013-05-24
14:00
Kochi Kochijyo Hall Optimal Tracing Algorithm for Fingerprinting Code under Averaging Attack
Minoru Kuribayashi (Kobe Univ.) EMM2013-5
When a binary fingerprinting codeword is embedded into digital contents using a robust spread-spectrum (SS) watermarking... [more] EMM2013-5
pp.25-30
IT 2012-07-19
14:15
Aichi Toyota Technological Institute A Tracing Algorithm for the Boneh-Shaw Code under a Probabilistic Attack Model
Kouhei Kanai, Hiroki Koga (Tsukuba Univ) IT2012-10
Illegal copies of digital contents is spreading due to the development of the Internet.A digital finger- printing code p... [more] IT2012-10
pp.7-12
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
11:20
Hokkaido   On Information Hiding Technologies Based on Complete Complementary Codes
Tetsuya Kojima (Tokyo Natl. Coll. Tech.), Ryusuke Mayuzumi (Univ. of Electro-Comm.), Naoki Ohtani (NHK Media Tech.) ISEC2012-11 SITE2012-7 ICSS2012-13 EMM2012-3
Complete complemenary code (CCC) is a spread spectrum sequence family with good correlation properties. A digital waterm... [more] ISEC2012-11 SITE2012-7 ICSS2012-13 EMM2012-3
pp.17-22
IT, ISEC, WBS 2010-03-05
13:50
Nagano Nagano-Engineering Campus, Shinshu University Traitor Tracing system with Constant-size Public-key and Ciphertext using q-ary fingerprinting codes
Ying Zhang (Chuo Univ.), Takashi Kitagawa (Univ. of Tokyo.), Nuttapong Attrapadung (AIST), Hideki Imai (Chuo Univ/AIST) IT2009-110 ISEC2009-118 WBS2009-89
A traitor tracing system enables a publisher to trace a pirate decryption box to one of the secret keys used to create t... [more] IT2009-110 ISEC2009-118 WBS2009-89
pp.255-260
IT 2010-01-08
14:50
Overseas Univ. of Hawaii Performance analysis of the blacklist scheme for collusion-secure code
Yoshinobu Iriguchi, Brian Kurkoski, Kazuhiko Yamaguchi (Univ. of Electro-Comm.) IT2009-68
We have proposed a scheme for collusion-secure code which utilizes a blacklist of colluders in order to improve efficien... [more] IT2009-68
pp.93-98
ISEC 2008-05-16
15:20
Tokyo Kikai-Shinko-Kaikan Bldg. Integrating Fingerprint and Cryptosystem for Internet-Based Live Pay-TV System
Shuhui Hou, Tetsutaro Uehara (Kyoto Univ.), Takashi Satoh (Univ. of Kitakyushu), Yoshitaka Morimura, Michihiko Minoh (Kyoto Univ.) ISEC2008-12
In the last few years, live pay-TV system via internet has come to be established with the development of broadband netw... [more] ISEC2008-12
pp.77-84
IT 2007-05-18
16:15
Yamagata Denkoku-No-Mori (Yonezawa) Shortened and concatenated collusion-secure codes for digital fingerprinting
Hideki Yagi, Toshiyasu Matsushima, Shigeichi Hirasawa (Waseda Univ.) IT2007-6
Digital fingerprinting, which is employed in contents distribution systems to deter illegal use of digital contents, is ... [more] IT2007-6
pp.31-36
 Results 1 - 20 of 23  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan