IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 5 of 5  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
15:45
Hokkaido San-Refure Hakodate Data authentication scheme suitable for broadcast in the sensor networks
Akihito Sakai, Yuichi Kaji, Minoru Ito (NAIST) ISEC2014-25 SITE2014-20 ICSS2014-29 EMM2014-25
Data broadcasting is often utilized in a sensor network system, but the authentication of the broadcast data is not a si... [more] ISEC2014-25 SITE2014-20 ICSS2014-29 EMM2014-25
pp.155-162
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-01
13:50
Aomori Hirosaki University Image Authentication with Access Control Based on Reversible Data Hiding
Kenta Watanabe, Masaaki Fujiyoshi, Hitoshi Kiya (Tokyo Metro. Univ.) ISEC2010-19 SITE2010-15 ICSS2010-25
This paper proposes an image authentication with access control based on reversible data hiding. The proposed method gen... [more] ISEC2010-19 SITE2010-15 ICSS2010-25
pp.81-86
WBS, IT, ISEC 2009-03-10
13:00
Hokkaido Hakodate Mirai Univ. A Note on the Security of Cryptographic Hash Functions
Shoichi Hirose (Univ. Fukui) IT2008-85 ISEC2008-143 WBS2008-98
This article discusses relationships between preimage resistance, second-preimage resistance and universal one-wayness o... [more] IT2008-85 ISEC2008-143 WBS2008-98
pp.267-271
SIP, IE 2008-04-17
09:00
Tokyo Kikai-Shinko-Kaikan Bldg. A Hierarchical Encryption Method for JPEG 2000 Coded Images with Sub-Resistance to Collusion Attacks
Noriaki Hashimoto (Tokyo Inst. of Tech.), Masaaki Fujiyoshi, Hitoshi Kiya (Tokyo Metro. Univ.) SIP2008-1 IE2008-1
This paper proposes an encryption method to enable hierarchical access
controls for JPEG 2000 codestreams. The proposed... [more]
SIP2008-1 IE2008-1
pp.1-6
WBS, SIP 2007-08-07
10:55
Kochi Green Hall (2nd fl.), Kochi Green-Kaikan On Applying Cipher to the Lossless Image Tamper Detection Method
Ryo Hosaka, Seungwu Han, Masaaki Fujiyoshi, Hitoshi Kiya (Tokyo Metro. Univ.) SIP2007-77 WBS2007-26
This paper improves the tamper detecting ability of the conventional lossless image tamper detection method by applying ... [more] SIP2007-77 WBS2007-26
pp.31-36
 Results 1 - 5 of 5  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan