Updated on 2022/12/28

写真a

 
KURIBAYASHI Minoru
 
Organization
Faculty of Natural Science and Technology Associate Professor
Position
Associate Professor
External link

Degree

  • 博士(工学) ( 神戸大学 )

  • 修士(工学) ( 神戸大学 )

Research Interests

  • Multimedia Security

  • フェイクコンテンツ識別

  • Adversarial example

  • Multimedia Forensics

  • synthetic media

  • digital watermark

  • Collusion Secure Code

  • Signal Processing on Encrypted Domain

  • Traitor Tracing

  • Error Correcting Code

  • digital fingerprinting

Research Areas

  • Informatics / Database

  • Informatics / Information security

  • Informatics / Perceptual information processing

  • Informatics / Mathematical informatics

  • Informatics / Theory of informatics

Education

  • Kobe University   大学院自然科学研究科   博士課程後期課程(情報メディア科学専攻)退学

    2001.4 - 2002.3

      More details

  • Kobe University   大学院自然科学研究科   博士課程前期課程 (電気電子工学専攻)

    1999.4 - 2001.3

      More details

  • Kobe University   工学部   電気電子工学科

    1995.4 - 1999.3

      More details

Research History

  • Okayama University   The Graduate School of Natural Science and Technology, (Doctor Course) Division of Industrial Innovation Sciences   Associate Professor

    2015.10

      More details

  • Kobe University Graduate School of Engineering Department of Electrical and Electronic Engineering   Assistant Professor

    2007.4 - 2015.10

      More details

  • Kobe University   Faculty of Engineering   Research Assistant

    2002.4 - 2007.3

      More details

Professional Memberships

Committee Memberships

  • APSIPA, Multimedia Security and Forensics (MSF)   Chair  

    2022.12   

      More details

    Committee type:Academic society

    researchmap

  • APSIPA, Multimedia Security and Forensics (MSF)   Multimedia Security and Forensics Technical Committee, Chair  

    2022.12 - 2024.11   

      More details

    Committee type:Academic society

  • Journal of Imaging, Special Issue "Robust Deep Learning Techniques for Multimedia Forensics and Security"   Guest Editor  

    2022.10 - 2023.9   

      More details

    Committee type:Academic society

  • Journal of Imaging, Special Issue "Robust Deep Learning Techniques for Multimedia Forensics and Security"   Guest Editor  

    2022.10 - 2023.3   

      More details

    Committee type:Academic society

    researchmap

  • IEEE Signal Processing Letter   Associate Editor  

    2021.12 - 2023.12   

      More details

    Committee type:Academic society

    researchmap

  • IEEE Signal Processing Society, Information Forensics and Security   Technical Committee  

    2021.1   

      More details

    Committee type:Academic society

    researchmap

  • 電子情報通信学会 英文誌ED 「高機能マルチメディア」特集号   編集委員  

    2021.1 - 2024.1   

      More details

    Committee type:Academic society

    researchmap

  • 電子情報通信学会 英文誌EA 「情報理論とその応用」特集号   編集委員  

    2021.1 - 2024.1   

      More details

    Committee type:Academic society

    researchmap

  • Applied Science, Special Issue "Data Hiding and Its Applications: Digital Watermarking and Steganography"   Guest Editor  

    2021.1 - 2023.1   

      More details

    Committee type:Academic society

  • APSIPA, Multimedia Security and Forensics (MSF)   Vice Chair  

    2020.12 - 2022.11   

      More details

    Committee type:Academic society

    researchmap

  • 電子情報通信学会 英文誌ED   編集委員  

    2020.6 - 2024.5   

      More details

    Committee type:Academic society

    researchmap

  • MDPI Applied Sciences   Guest Editor  

    2020.1 - 2022.12   

      More details

    Committee type:Academic society

    researchmap

  • 電子情報通信学会 EMM研究会   専門委員  

    2019.6   

      More details

    Committee type:Academic society

    researchmap

  • Entropy Journal   Guest Editor  

    2019.1 - 2020.1   

      More details

    Committee type:Academic society

    researchmap

  • APSIPA, Multimedia Security and Forensics (MSF)   Secretary  

    2018.12 - 2020.11   

      More details

    Committee type:Academic society

    http://www.apsipa.org/TC/MSF.html

    researchmap

  • 電子情報通信学会 英文誌ED 「高機能マルチメディア」特集号   編集幹事  

    2018.1 - 2020.1   

      More details

    Committee type:Academic society

    researchmap

  • 電子情報通信学会 EMM研究会   副委員長  

    2017.6 - 2019.5   

      More details

    Committee type:Academic society

    researchmap

  • 電子情報通信学会 Fundamental Review   編集委員  

    2016.6 - 2018.5   

      More details

    Committee type:Academic society

    researchmap

  • 映像情報メディア学会   編集委員  

    2016.1 - 2016.12   

      More details

    Committee type:Academic society

    researchmap

  • 電子情報通信学会 IHC研究会   幹事  

    2015.6 - 2019.5   

      More details

    Committee type:Academic society

    researchmap

  • 電子情報通信学会 英文誌EA 「情報理論とその応用」特集号   編集委員  

    2015.1 - 2017.1   

      More details

    Committee type:Academic society

    researchmap

  • 電子情報通信学会 EMM研究会   幹事  

    2014.6 - 2015.5   

      More details

    Committee type:Academic society

    researchmap

  • Journal of Information Security and Applications   Associate Editor  

    2014.1 - 2021.12   

      More details

    Committee type:Academic society

    researchmap

  • 電子情報通信学会 英文誌ED 「高機能マルチメディア」特集号   編集委員  

    2014.1 - 2016.1   

      More details

    Committee type:Academic society

    researchmap

  • 電子情報通信学会 IT研究会   専門委員  

    2013.6 - 2019.5   

      More details

    Committee type:Academic society

    researchmap

  • 電子情報通信学会 EMM研究会   幹事補佐  

    2013.6 - 2014.5   

      More details

    Committee type:Academic society

    researchmap

  • 電子情報通信分野における萌芽的研究小特集   編集委員  

    2012.6 - 2014.5   

      More details

    Committee type:Academic society

    researchmap

  • 電子情報通信学会 IHC研究会   幹事  

    2011.6 - 2012.5   

      More details

    Committee type:Academic society

    researchmap

  • 電子情報通信学会 和文誌JA   編集委員  

    2010.6 - 2014.5   

      More details

    Committee type:Academic society

    researchmap

  • 電子情報通信学会 英文誌EA   編集委員  

    2010.6 - 2014.5   

      More details

    Committee type:Academic society

    researchmap

▼display all

 

Papers

  • DeepFake Detection for Human Face Images and Videos: A Survey. Reviewed International coauthorship

    Asad Malik, Minoru Kuribayashi, Sani M. Abdullahi, Ahmad Neyaz Khan

    IEEE Access   10   18757 - 18775   2022

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/ACCESS.2022.3151186

    researchmap

  • Near-Optimal Detection for Binary Tardos Code by Estimating Collusion Strategy. Reviewed

    Tatsuya Yasui, Minoru Kuribayashi, Nobuo Funabiki, Isao Echizen

    IEEE Trans. Inf. Forensics Secur.   15   2069 - 2080   2020

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electrical and Electronics Engineers ({IEEE})  

    A previously proposed optimal detector for bias-based fingerprinting codes such as Tardos and Nuida requires two kinds of important information: the number of colluders and the collusion strategy used to generate the pirated codeword. An estimator has now been derived for these two parameters. The bias in the pirated codeword is measured by observing the number of zeros and ones and compared with possible bias patterns calculated using information about the collusion strategy and number of colluders. Computer simulation demonstrated that the collusion strategy and number of colluders can be estimated with high probability and that the traceability of a detector using the proposed estimator is extremely close to being optimal.

    DOI: 10.1109/TIFS.2019.2956587

    Web of Science

    Scopus

    researchmap

  • Efficiently Decodable Non-Adaptive Threshold Group Testing. Reviewed

    Thach V. Bui, Minoru Kuribayashi, Mahdi Cheraghchi, Isao Echizen

    IEEE Trans. Inf. Theory   65 ( 9 )   5519 - 5528   2019

     More details

    Publishing type:Research paper (scientific journal)   Publisher:Institute of Electrical and Electronics Engineers ({IEEE})  

    DOI: 10.1109/TIT.2019.2907990

    researchmap

  • Bias-based binary fingerprinting code under erasure channel Reviewed

    Kuribayashi, M.

    IEEE Signal Processing Letters   25 ( 9 )   1423 - 1427   2018

     More details

    Publishing type:Research paper (scientific journal)   Publisher:Institute of Electrical and Electronics Engineers ({IEEE})  

    DOI: 10.1109/LSP.2018.2863034

    Web of Science

    Scopus

    researchmap

  • Simplified MAP detector for binary fingerprinting code embedded by spread spectrum watermarking scheme Reviewed

    Kuribayashi, M.

    IEEE Transactions on Information Forensics and Security   9 ( 4 )   610 - 623   2014

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC  

    When a binary fingerprinting codeword is embedded into multimedia content by using a spread-spectrum (SS) watermarking scheme, it is difficult for colluders to perform a symbol-wise attack using their codewords. As discussed in regard to SS fingerprinting schemes, averaging their copies is a cost-effective attack from the signal processing point of view. If the number of colluders is known, an optimal detector can be used against an averaging attack with added white Gaussian noise. The detector first estimates the variance of additive noise, and then calculates correlation scores using a log-likelihood-based approach. However, the number of colluders is not usually known in a real situation. In this paper, we simplify the optimal detector by making statistical approximations and using the characteristics of the parameters for generating codewords. After that, we propose an orthogonal frequency division multiplexing-based SS watermarking scheme to embed the fingerprinting codeword into multimedia content. In a realistic situation, the signal embedded as a fingerprint is in principle attenuated by lossy compression. Because the signal amplitude in a pirated codeword is attenuated, we should adaptively estimate the parameters before calculating the scores. Different from the optimal detector, the simplified detector can easily accommodate changes in signal amplitude by examining the distorted codeword extracted from a pirated copy. We evaluate the performance of the simplified detector through simulation using digital images as well as codewords.

    DOI: 10.1109/TIFS.2014.2305799

    Web of Science

    Scopus

    researchmap

  • Interference Removal Operation for Spread Spectrum Fingerprinting Scheme Reviewed

    Minoru Kuribayashi

    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY   7 ( 2 )   403 - 417   2012.4

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC  

    In digital fingerprinting schemes based on the spread spectrum technique, (quasi-) orthogonal sequences are assigned to users as their fingerprints, and they are embedded into digital contents prior to distribution. Owing to the (quasi-) orthogonality, we can uniquely identify the users from a pirated copy, even if dozens of users are involved in the collusion process. Because the number of users accommodated in a fingerprinting system is generally very large, the interference among the sequences involved in a pirated copy becomes non-negligible as the number of colluders increases. In this paper, we investigate the interference from the viewpoint of a communication channel, and we propose an effective removal operation to reduce the interference as far as possible. By iteratively operating the proposed detector, we can sequentially and successively detect colluders from a pirated copy. Furthermore, two kinds of thresholds are introduced in order to perform the removal operation adaptively for detected signals. Experimental results reveal a drastic improvement in the traceability and a reduction in the amount of interference by the removal operation.

    DOI: 10.1109/TIFS.2011.2170421

    Web of Science

    researchmap

  • Impact of Rounding Error on Spread Spectrum Fingerprinting Scheme Reviewed

    Minoru Kuribayashi, Hiroshi Kato

    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY   5 ( 4 )   670 - 680   2010.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC  

    In spread spectrum fingerprinting, it has been considered that the strength of the embedded signal is reduced to of its original value when copies are averaged by colluders. In this study, we analyze the model of the averaging attack by considering quantization that causes nonlinear changes in the fingerprint sequence. Our detailed analysis reveals that the attenuation of the signal energy strongly depends on the quantization performed during the embedding and averaging stages. We estimate the actual attenuation factor from the perspective of a stochastic model in the spatial domain and derive an attenuation factor that differs considerably from the conventional one. Our simulation result indicates that the actual attenuation factor is classified into the best and worst cases from the detector's perspective. Furthermore, we demonstrate that colluders can select the worst case by comparing their fingerprinted copies. A countermeasure for preventing the worst-case scenario is also proposed in this paper.

    DOI: 10.1109/TIFS.2010.2082535

    Web of Science

    researchmap

  • How to generate cyclically permutable codes from cyclic codes Reviewed

    Minoru Kuribayashi, Hatsukazu Tanaka

    IEEE TRANSACTIONS ON INFORMATION THEORY   52 ( 10 )   4660 - 4663   2006.10

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC  

    On the basis of the characteristics of cyclic codes, the codeword space can be partitioned into small subspaces where cyclically shifted codewords of a particular codeword occupy the same subspace. A cyclically permutable code generates codewords belonging to each subspace. However, no approach for the efficient construction of cyclically permutable code from binary cyclic codes has been proposed thus far. In this study, we propose an approach for the efficient and systematic construction of a cyclically permutable code from a cyclic code by utilizing an algebraic property. The proposed coding method improves the robustness of watermarking, particularly for video frames, against a clipping attack.

    DOI: 10.1109/TIT.2006.881834

    Web of Science

    researchmap

  • Fingerprinting protocol for images based on additive homomorphic property Reviewed

    M Kuribayashi, H Tanaka

    IEEE TRANSACTIONS ON IMAGE PROCESSING   14 ( 12 )   2129 - 2139   2005.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC  

    Homomorphic property of public-key cryptosystems is applied for several cryptographic protocols, such as electronic cash, voting system, bidding protocols, etc. Several fingerprinting protocols also exploit the property to achieve an asymmetric system. However, their enciphering rate is extremely low and the implementation of watermarking technique is difficult. In this paper, we propose a new fingerprinting protocol applying additive homomorphic property of Okamoto-Uchiyama encryption scheme. Exploiting the property ingenuously, the enciphering rate of our fingerprinting scheme can be close to the corresponding cryptosystem. We study the problem of implementation of watermarking technique and propose a successful method to embed an encrypted information without knowing the plain value. The security can also be protected for both a buyer and a merchant in our scheme.

    DOI: 10.1109/TIP.2005.859383

    Web of Science

    researchmap

  • Group Testing with Blocks of Positives and Inhibitors

    Thach V. Bui, Isao Echizen, Minoru Kuribayashi, Tetsuya Kojima, Thuc D. Nguyen

    Entropy   24 ( 11 )   1562 - 1562   2022.10

     More details

    Publishing type:Research paper (scientific journal)   Publisher:MDPI AG  

    The main goal of group testing is to identify a small number of specific items among a large population of items. In this paper, we consider specific items as positives and inhibitors and non-specific items as negatives. In particular, we consider a novel model called group testing with blocks of positives and inhibitors. A test on a subset of items is positive if the subset contains at least one positive and does not contain any inhibitors, and it is negative otherwise. In this model, the input items are linearly ordered, and the positives and inhibitors are subsets of small blocks (at unknown locations) of consecutive items over that order. We also consider two specific instantiations of this model. The first instantiation is that model that contains a single block of consecutive items consisting of exactly known numbers of positives and inhibitors. The second instantiation is the model that contains a single block of consecutive items containing known numbers of positives and inhibitors. Our contribution is to propose efficient encoding and decoding schemes such that the numbers of tests used to identify only positives or both positives and inhibitors are less than the ones in the state-of-the-art schemes. Moreover, the decoding times mostly scale to the numbers of tests that are significantly smaller than the state-of-the-art ones, which scale to both the number of tests and the number of items.

    DOI: 10.3390/e24111562

    researchmap

  • Coded DNN Watermark: Robustness against Pruning Models Using Constant Weight Code Reviewed International coauthorship

    Tatsuya Yasui, Takuro Tanaka, Asad Malik, Minoru Kuribayashi

    Journal of Imaging   8 ( 6 )   152 - 152   2022.5

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.3390/jimaging8060152

    researchmap

  • A Proposal of the Fingerprint Optimization Method for the Fingerprint-Based Indoor Localization System with IEEE 802.15.4 Devices

    Yuanzhi Huo, Pradini Puspitaningayu, Nobuo Funabiki, Kazushi Hamazaki, Minoru Kuribayashi, Kazuyuki Kojima

    Information   13 ( 5 )   211 - 211   2022.4

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.3390/info13050211

    researchmap

  • Architecture of a fake news detection system combining digital watermarking, signal processing, and machine learning.

    David Megías, Minoru Kuribayashi, Andrea Rosales, Krzysztof Cabaj, Wojciech Mazurczyk

    J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.   13 ( 1 )   33 - 55   2022

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.22667/JOWUA.2022.03.31.033

    researchmap

  • Implementations of Online Job Acceptance Functions in User-PC Computing System.

    Hein Htet, Nobuo Funabiki, Ariel Kamoyedji, Xudong Zhou, Yan Watequlis Syaifudin, Irin Tri Anggraini, Minoru Kuribayashi

    LifeTech   121 - 122   2022

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/LifeTech53646.2022.9754807

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/lifetech/lifetech2022.html#HtetFKZSAK22

  • A Proposal of Phrase Fill-in-blank Problem for Learning Recursive Function in C Programming.

    Xiqin Lu, Shixi Chen, Nobuo Funabiki, Minoru Kuribayashi, Kiyoshi Ueda

    LifeTech   123 - 124   2022

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/LifeTech53646.2022.9754593

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/lifetech/lifetech2022.html#LuCFKU22

  • Application of Fingerprint-based Indoor Localization System Using IEEE 802.15.4 to Two-Floors Environment.

    Pradini Puspitaningayu, Nobuo Funabiki, Yuan-Zhi Huo, Kazushi Hamazaki, Minoru Kuribayashi, Wen-Chung Kao

    LifeTech   239 - 240   2022

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/LifeTech53646.2022.9754790

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/lifetech/lifetech2022.html#PuspitaningayuF22

  • Effects of Image Processing Operations on Adversarial Noise and Their Use in Detecting and Correcting Adversarial Images. Reviewed International coauthorship

    Huy H. Nguyen, Minoru Kuribayashi, Junichi Yamagishi, Isao Echizen

    IEICE Trans. Inf. Syst.   105 ( 1 )   65 - 77   2022

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transinf.2021mup0005

    researchmap

  • A Throughput Fairness Control Method for Concurrent Communications in Wireless Local-Area Network with Multiple Access-Points.

    Md. Mahbubur Rahman, Nobuo Funabiki, Kwenga Ismael Munene, Sujan Chandra Roy, Minoru Kuribayashi, Wen-Chung Kao

    Journal of Communications   17 ( 8 )   592 - 599   2022

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.12720/jcm.17.8.592-599

    researchmap

  • A Fingerprint-Based Indoor Localization System Using IEEE 802.15.4 for Staying Room Detection.

    Pradini Puspitaningayu, Nobuo Funabiki, Yuan-Zhi Huo, Kazushi Hamazaki, Minoru Kuribayashi, Wen-Chung Kao

    Int. J. Mob. Comput. Multim. Commun.   13 ( 1 )   1 - 21   2022

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.4018/ijmcmc.301275

    researchmap

  • A Vision Transformer-Based Approach to Bearing Fault Classification via Vibration Signals.

    Abid Hasan Zim, Aeyan Ashraf, Aquib Iqbal, Asad Malik, Minoru Kuribayashi

    CoRR   abs/2208.07070   2022

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.48550/arXiv.2208.07070

    researchmap

  • Classification of Screenshot Image Captured in Online Meeting System. Reviewed

    Minoru Kuribayashi, Kodai Kamakari, Nobuo Funabiki

    International IFIP Cross Domain Conference for Machine Learning & Knowledge Extraction (CD-MAKE2022)   13480   244 - 255   2022

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1007/978-3-031-14463-9_16

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/cdmake/cdmake2022.html#KuribayashiKF22

  • Data Hiding and Its Applications: Digital Watermarking and Steganography

    David Megias, Wojciech Mazurczyk, Minoru Kuribayashi

    Applied Sciences   11 ( 22 )   2021.11

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.3390/app112210928

    researchmap

  • A Web-based Online Platform of Distribution, Collection, and Validation for Assignments in Android Programming Learning Assistance System

    Yan Watequlis Syaifudin, Nobuo Funabiki, Mustika Mentari, Habibie Ed Dien, Ikhlaashul Mu'aasyiqiin, Minoru Kuribayashi, Wen-Chung Kao

    ENGINEERING LETTERS   29 ( 3 )   2021.8

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:NEWSWOOD LTD  

    Currently, Android smartphones have dominated the distribution of mobile devices around the world. Then, with high demands for Android programming jobs, large numbers of schools, universities, and professional training institutions offer related courses. The Android Programming Learning Assistance System (APLAS) has been developed to accommodate independent and automatic assisting learning for students to learn Android programming by adopting test-driven development (TDD) method. APLAS offers learning materials to systematically study Android programming through solving topics with four stages and provides features for automatic validation of the student's answers by running given test codes. However, a platform to support various activities of teachers for handling a lot of students in the courses is not implemented yet, and it made their load become very high. This paper presents the proposal of online platform in APLAS for distributing the learning materials, collecting the student's answers, and validating them, based on a web application system. By using Gradle, a validator program was developed for running the test codes automatically in the server when a new answer is submitted. A comprehensive evaluation has been applied by asking 60 undergraduate students in an Indonesian university to use the online platform, solve three APLAS learning topics, and submit the answers. The results showed that the three functions worked properly, and the validation process of 183 submissions from all students delivered correct results on the server. The stability, robustness, effectiveness, performance, and security of the online platform were confirmed by analyzing the data of users' activities and validation results. The significant reduction in processing time on all three functions also confirmed its effectiveness and improvement. Finally, the students' feedback proved its usability.

    Web of Science

    researchmap

  • An Implementation of Offline Answering Function for Code Completion Problem in PLAS.

    Htoo Htoo Sandi Kyaw, Nobuo Funabiki, Minoru Kuribayashi

    2021 IEEE 3RD GLOBAL CONFERENCE ON LIFE SCIENCES AND TECHNOLOGIES (IEEE LIFETECH 2021)   162 - 165   2021

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    Currently, we are studying the Programming Learning Assistant System (PLAS) to assist self-studies of C/C++/Java/JavaScript/Python programming. Previously, we implemented the offline answering function on a Web browser for the element fill-in-blank problem (EFP) in PLAS. EFP requests filling in the blank elements in a given source code, where the correctness of any answer element is validated through string matching using the JavaScript program. The code completion problem (CCP) is the generalization of EFP for coding and debugging study. CCP requests completing the code that has missing elements, where the correctness of any statement is validated. In this paper, we implement the offline answering function for CCP by modifying the one for EFP. The two-level marking function is newly adopted to encourage students to be aware of the correct usage of tabs and spaces in the source code for readable code. We verify the correctness of the implementation through solving various CCP instances.

    DOI: 10.1109/LifeTech52111.2021.9391894

    Web of Science

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/lifetech/lifetech2021.html#KyawFK21

  • White-Box Watermarking Scheme for Fully-Connected Layers in Fine-Tuning Model. Reviewed

    Minoru Kuribayashi, Takuro Tanaka, Shunta Suzuki, Tatsuya Yasui, Nobuo Funabiki

    IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security(IH&MMSec)   165 - 170   2021

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:ACM  

    DOI: 10.1145/3437880.3460402

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/ih/ihmmsec2021.html#KuribayashiTSYF21

  • A Proposal of Advanced Widgets Learning Topic for Interactive Application in Android Programming Learning Assistance System.

    Yan Watequlis Syaifudin, Nobuo Funabiki, Minoru Kuribayashi, Wen-Chung Kao

    SN Comput. Sci.   2 ( 3 )   172 - 172   2021

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.1007/s42979-021-00580-1

    researchmap

  • Joint Optimization Method of Channel Assignment and Transmission Power for Concurrently Communicating Multiple Access-Points in Wireless Local-Area Network.

    Hendy Briantoro, Nobuo Funabiki, Md. Mahbubur Rahman, Kwenga Ismael Munene, Minoru Kuribayashi, Wen-Chung Kao

    Int. J. Netw. Comput.   11 ( 2 )   251 - 266   2021

     More details

    Publishing type:Research paper (scientific journal)  

    researchmap

    Other Link: https://dblp.uni-trier.de/db/journals/ijnc/ijnc11.html#BriantoroFRMKK21

  • A Throughput Drop Estimation Model for Concurrent Communications under Partially Overlapping Channels without Channel Bonding and Its Application to Channel Assignment in IEEE 802.11n WLAN.

    Kwenga Ismael Munene, Nobuo Funabiki, Hendy Briantoro, Md. Mahbubur Rahman, Fatema Akhter, Minoru Kuribayashi, Wen-Chung Kao

    IEICE Trans. Inf. Syst.   104-D ( 5 )   585 - 596   2021

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG  

    Currently, the IEEE 802.11n wireless local-area network (WLAN) has been extensively deployed world-wide. For the efficient channel assignment to access-points (APs) from the limited number of partially overlapping channels (POCs) at 2.4GHz band, we have studied the throughput drop estimation model for concurrently communicating links using the channel bonding (CB). However, non-CB links should be used in dense WLANs, since the CB links often reduce the transmission capacity due to high interferences from other links. In this paper, we examine the throughput drop estimation model for concurrently communicating links without using the CB in 802.11n WLAN, and its application to the POC assignment to the APs. First, we verify the model accuracy through experiments in two network fields. The results show that the average error is 9.946% and 6.285% for the high and low interference case respectively. Then, we verify the effectiveness of the POC assignment to the APs using the model through simulations and experiments. The results show that the model improves the smallest throughput of a host by 22.195% and the total throughput of all the hosts by 22.196% on average in simulations for three large topologies, and the total throughput by 12.89% on average in experiments for two small topologies.

    DOI: 10.1587/transinf.2020NTP0008

    Web of Science

    Scopus

    researchmap

    Other Link: https://dblp.uni-trier.de/db/journals/ieicetd/ieicetd104.html#MuneneFBRAKK21

  • Immunization of Pruning Attack in DNN Watermarking Using Constant Weight Code.

    Minoru Kuribayashi, Tatsuya Yasui, Asad Malik, Nobuo Funabiki

    CoRR   abs/2107.02961   2021

     More details

    Publishing type:Research paper (scientific journal)  

    researchmap

    Other Link: https://dblp.uni-trier.de/db/journals/corr/corr2107.html#abs-2107-02961

  • A Code Completion Problem in C Programming Learning Assistant System

    Htoo Htoo Sandi Kyaw, Ei Ei Htet, Nobuo Funabiki, Minoru Kuribayashi, Thandar Myint, Phyu Phyu Tar, Nandar Win Min, Hnin Aye Thant, Phyu Hnin Wai

    2021 9TH INTERNATIONAL CONFERENCE ON INFORMATION AND EDUCATION TECHNOLOGY (ICIET 2021)   34 - 40   2021

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    C programming has been the fundamental subject to a lot of university students for studying programming languages, algorithms, and computer architecture. Currently, we are developing C programming learning assistant system (CPLAS) for its self-study by extending our works of JPLAS for Java programming. JPLAS provides the code completion problem (CCP) to offer practical programming exercises. A CCP instance asks the completion of the given source code by filling in the missing elements. The correctness of the answer is marked through string matching by comparing each answer statement with the correct one. In this paper, we present the CCP by extending our works of the element fill-in-blank problem (EFP) in CPLAS. For evaluations, we generated 10 CCP instances and assigned them to 54 undergraduate students in Myanmar and Japan. Their solution results show that the CCP instances are generally suitable for C programming study by novice students, but those on pointer need improvements for better solutions.

    DOI: 10.1109/ICIET51873.2021.9419621

    Web of Science

    researchmap

  • StealthPDF: Data hiding method for PDF file with no visual degradation. Reviewed International coauthorship

    Minoru Kuribayashi, KokSheik Wong

    J. Inf. Secur. Appl.   61   102875 - 102875   2021

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/j.jisa.2021.102875

    Scopus

    researchmap

  • DISSIMILAR: Towards fake news detection using information hiding, signal processing and machine learning. Reviewed International coauthorship

    David Megías, Minoru Kuribayashi, Andrea Rosales, Wojciech Mazurczyk

    ARES 2021: The 16th International Conference on Availability, Reliability and Security(ARES)   66 - 9   2021

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:ACM  

    DOI: 10.1145/3465481.3470088

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/IEEEares/ares2021.html#MegiasKRM21

  • A Study of Throughput Drop Estimation Model for Concurrently Communicating Links Under Coexistence of Channel Bonding and Non-bonding in IEEE 802.11n WLAN.

    Kwenga Ismael Munene, Nobuo Funabiki, Hendy Briantoro, Md. Mahbubur Rahman, Sujan Chandra Roy, Minoru Kuribayashi

    COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS, CISIS-2021   278   700 - 714   2021

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:SPRINGER INTERNATIONAL PUBLISHING AG  

    Currently, the IEEE 802.11n wireless local-area network (WLAN) has been broadly deployed world-wide for flexible and high-speed Internet access communications. Since it uses the limited number of partially overlapping channels (POCs) at 2.4 GHz band, the throughput performance is often degraded by interferences from signals of other WLANs. Thus, we have studied throughput drop estimation models for concurrently communicating multiple links under interferences, where the 40 MHz channel bonding (CB) and 20 MHz non-CB are considered separately. We have observed that the simultaneous use of CB and non-CB can improve the performance by enhancing the channel capacity while reducing the interference. In this paper, we study the throughput drop estimation model for concurrently communicating links under coexistence of CB and non-CB in IEEE 802.11n WLAN. The model accuracy is verified by comparing the estimated throughput with the measured one under various network topologies.

    DOI: 10.1007/978-3-030-79725-6_71

    Web of Science

    Scopus

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/cisis/cisis2021.html#MuneneFBRRK21

  • An Implementation of Job Migration Function Using CRIU and Podman in Docker-based User-PC Computing System.

    Hein Htet, Nobuo Funabiki, Ariel Kamoyedji, Xudong Zhou, Minoru Kuribayashi

    ICCCM   92 - 97   2021

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:ACM  

    DOI: 10.1145/3479162.3479176

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/icccm/icccm2021.html#HtetFKZK21

  • Evaluations of Fingerprint-based Indoor Positioning System Using IEEE 802.15.4.

    Pradini Puspitaningayu, Nobuo Funabiki, Kazushi Hamazaki, Minoru Kuribayashi, Wen-Chung Kao

    IEEE International Conference on Consumer Electronics-Taiwan(ICCE-TW)   1 - 2   2021

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/ICCE-TW52618.2021.9603037

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/icce-tw/icce-tw2021.html#PuspitaningayuF21

  • Feature Extraction Based on Denoising Auto Encoder for Classification of Adversarial Examples. Reviewed International coauthorship

    Yuma Yamasaki, Minoru Kuribayashi, Nobuo Funabiki, Huy H. Nguyen, Isao Echizen

    Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC 2021)   1815 - 1820   2021

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    researchmap

    Other Link: https://dblp.uni-trier.de/rec/conf/apsipa/2021

  • A Proposal of Dynamic Job Scheduling Algorithm Considering CPU Core Utilization for User-PC Computing System.

    Ariel Kamoyedji, Nobuo Funabiki, Hein Htet, Minoru Kuribayashi

    CANDAR (Workshops)   268 - 271   2021

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/CANDARW53999.2021.00051

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/ic-nc/candar2021w.html#KamoyedjiFHK21

  • Detecting Deepfake Videos using Digital Watermarking. Reviewed International coauthorship

    Amna Qureshi, David Megías, Minoru Kuribayashi

    Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC 2021)   1786 - 1793   2021

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    researchmap

    Other Link: https://dblp.uni-trier.de/rec/conf/apsipa/2021

  • A study of privacy protection of photos taken by wide-angle surveillance camera Reviewed

    Koki Nakai, Minoru Kuribayashi, Nobuo Funabiki

    Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC 2021)   1865 - 1871   2021

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    Other Link: https://dblp.uni-trier.de/rec/conf/apsipa/2021

  • A study of feature extraction suitable for double JPEG compression analysis based on statistical bias observation of DCT coefficients Reviewed

    Daichi Takeshita, Minoru Kuribayashi, Nobuo Funabiki

    Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC 2021)   1808 - 1814   2021

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    Other Link: https://dblp.uni-trier.de/rec/conf/apsipa/2021

  • A proposal of Android Programming Learning Assistant System with implementation of basic application learning. Reviewed

    Yan Watequlis Syaifudin, Nobuo Funabiki, Minoru Kuribayashi, Wen-Chung Kao

    Int. J. Web Inf. Syst.   16 ( 1 )   115 - 135   2020

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:EMERALD GROUP PUBLISHING LTD  

    PurposeWith rapid increase of Android devices and application systems, there is a strong demand for Android application programmers. A lot of schools are offering Android programming courses to meet this demand. However, Android programming can be different from the conventional one because it needs interactive functions through interfaces with users, which makes the study more difficult. This paper aims to propose an Android Programming Learning Assistance System, namely, APLAS, to assist the Java-based Android programming study and education.Design/methodology/approachBy adopting the test-driven development method, APLAS is designed to achieve independent learning without the presence of teachers. Using JUnit and Robolectric, the answers from the students are automatically marked in APLAS. To cover extensive materials in Android programming, APLAS offers four stages where each stage involves several topics.FindingsTo evaluate the effectiveness of APLAS, we implemented the Unit Converter assignment that covers the first two topics, namely, Basic user interface in the first stage and basic activity in the second stage. Through solving the assignment, it is expected to learn basic application development. Forty novice students of an IT department in Indonesia were asked to solve both topics separately.Originality/valueThe results show that APLAS is useful and helpful for the self-study of Android programming, as they could complete codes with good execution performances.

    DOI: 10.1108/IJWIS-08-2019-0038

    Web of Science

    Scopus

    researchmap

  • A Generalized TCP Fairness Control Method for Multiple-Host Concurrent Communications in Elastic WLAN System Using Raspberry Pi Access Point. Reviewed

    Rahardhita Widyatra Sudibyo, Nobuo Funabiki, Minoru Kuribayashi, Kwenga Ismael Munene, Hendy Briantoro, Md. Manowarul Islam, Wen-Chung Kao

    Int. J. Mob. Comput. Multim. Commun.   11 ( 2 )   18 - 40   2020

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IGI GLOBAL  

    The IEEE802.11n wireless local-area network (WLAN) has been widely adopted due to the flexible coverage and lower installation cost. However, the TCP throughput unfairness was detected when multiple hosts concurrently communicate with a single access-point (AP). Previously, the authors proposed the TCP fairness control method for only two hosts in the elastic WLAN system using Raspberry Pi AP, which dynamically adapts the topology according to the traffic demand. The delay is introduced in the packet transmission to the faster host from the AP, which is optimized by the PI feedback control such that the measured throughput becomes equal between the hosts. In this paper, the authors proposed a generalization of this method for any number of hosts by newly introducing the target throughput as the equal goal among the hosts. It is dynamically updated using the measured throughputs. The effectiveness of the proposal is verified through experiments using the elastic WLAN system testbed with one AP and up to four hosts.

    DOI: 10.4018/IJMCMC.2020040102

    Web of Science

    Scopus

    researchmap

  • Improved DM-QIM Watermarking Scheme for PDF Document Reviewed International coauthorship

    Kuribayashi, M., Wong, K.S.

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   12022 LNCS   171 - 183   2020

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (scientific journal)   Publisher:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)  

    DOI: 10.1007/978-3-030-43575-2_14

    Scopus

    researchmap

  • A Proposal of Air-Conditioning Guidance System Using Discomfort Index. Reviewed

    Samsul Huda, Nobuo Funabiki, Minoru Kuribayashi, Rahardhita Widyatra Sudibyo, Nobuya Ishihara, Wen-Chun Kao

    Lecture Notes in Networks and Systems   159 LNNS   154 - 165   2020

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:Lecture Notes in Networks and Systems  

    DOI: 10.1007/978-3-030-61108-8_15

    Scopus

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/bwcca/bwcca2020.html#HudaFKSIK20

  • A proposal of recommendation function for solving element fill-in-blank problem in java programming learning assistant system Reviewed

    Funabiki, N., Matsumoto, S., Wint, S.S., Kuribayashi, M., Kao, W.-C.

    Advances in Intelligent Systems and Computing   1036   247 - 257   2020

     More details

    Publishing type:Research paper (scientific journal)   Publisher:Advances in Intelligent Systems and Computing  

    DOI: 10.1007/978-3-030-29029-0_23

    Scopus

    researchmap

  • Survey on Decentralized Fingerprinting Solutions: Copyright Protection through Piracy Tracing. Reviewed

    David Megías, Minoru Kuribayashi, Amna Qureshi

    Comput.   9 ( 2 )   26 - 26   2020

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:MDPI  

    Copyright protection is one of the most relevant challenges in the network society. This paper focuses on digital fingerprinting, a technology that facilitates the tracing of the source of an illegal redistribution, making it possible for the copyright holder to take legal action in case of copyright violation. The paper reviews recent digital fingerprinting solutions that are available for two particularly relevant scenarios: peer-to-peer distribution networks and broadcasting. After analyzing those solutions, a discussion is carried out to highlight the properties and the limitations of those techniques. Finally, some directions for further research on this topic are suggested.

    DOI: 10.3390/computers9020026

    Web of Science

    Scopus

    researchmap

  • A Calligraphy Learning Assistant System with Letter Portion Practice Function Using Projection Mapping. Reviewed

    Samsul Huda, Nobuo Funabiki, Minoru Kuribayashi, Wen-Chung Kao

    International Journal of Web Information Systems   1 - 2   2020

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/ICCE46568.2020.9043042

    Scopus

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/iccel/icce2020.html#HudaFKK20

  • A Generalization of Transmission Power Optimization Method for Concurrently Communicating Multiple Access-Points in Wireless Local-Area Network.

    Hendy Briantoro, Nobuo Funabiki, Kwenga Ismael Munene, Md. Mahbubur Rahman, Fatema Akhter, Wen-Chung Kao, Minoru Kuribayashi

    Eighth International Symposium on Computing and Networking Workshops   1 - 7   2020

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/CANDARW51189.2020.00015

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/ic-nc/candar2020w.html#BriantoroFMRAKK20

  • A proposal of calligraphy learning assistant system with letter portion practice function using projection mapping.

    Samsul Huda, Nobuo Funabiki, Minoru Kuribayashi, Wen-Chung Kao

    Int. J. Web Inf. Syst.   16 ( 2 )   137 - 149   2020

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.1108/IJWIS-07-2019-0032

    Scopus

    researchmap

  • DeepWatermark: Embedding Watermark into DNN Model. Reviewed

    Minoru Kuribayashi, Takuro Tanaka, Nobuo Funabiki

    Asia-Pacific Signal and Information Processing Association Annual Summit and Conference(APSIPA)   1340 - 1346   2020

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    researchmap

    Other Link: https://dblp.uni-trier.de/conf/apsipa/2020

  • Classification of Video Recaptured from Display Device. Reviewed

    Minoru Kuribayashi, Kodai Kamakari, Kento Kawata, Nobuo Funabiki

    Asia-Pacific Signal and Information Processing Association Annual Summit and Conference(APSIPA)   1381 - 1385   2020

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    researchmap

    Other Link: https://dblp.uni-trier.de/conf/apsipa/2020

  • Detection of Adversarial Examples Based on Sensitivities to Noise Removal Filter. Reviewed International coauthorship

    Akinori Higashi, Minoru Kuribayashi, Nobuo Funabiki, Huy H. Nguyen, Isao Echizen

    Asia-Pacific Signal and Information Processing Association Annual Summit and Conference(APSIPA)   1386 - 1391   2020

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    researchmap

    Other Link: https://dblp.uni-trier.de/conf/apsipa/2020

  • Transmission Power Optimization of Concurrently Communicating Two Access Points in Wireless Local Area Network.

    Hendy Briantoro, Nobuo Funabiki, Minoru Kuribayashi, Kwenga Ismael Munene, Rahardhita Widyatra Sudibyo, Md. Manowarul Islam, Wen-Chung Kao

    Int. J. Mob. Comput. Multim. Commun.   11 ( 4 )   1 - 25   2020

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.4018/IJMCMC.2020100101

    Scopus

    researchmap

  • An Implementation and Evaluation of Advanced Widgets Topic for Interactive Application Stage in Android Programming Learning Assistance System

    Yan Watequlis Syaifudin, Nobuo Funabiki, Minoru Kuribayashi

    ICIET 2020: 2020 8TH INTERNATIONAL CONFERENCE ON INFORMATION AND EDUCATION TECHNOLOGY   88 - 93   2020

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:ASSOC COMPUTING MACHINERY  

    With the growing popularity of smartphone devices, the demand for mobile application programmers has been increasing, particularly for the most popular mobile platform Android. Then, Android application programming has become one of the most important subjects that students should learn in professional schools and universities in IT departments. To assist self-studies of students, we have developed Android Programming Learning Assistance System (APLAS). To guide students to reach correct answers for given assignments, APLAS adopts the Test-Driven Development (TDD) method to validate student answers automatically using JUnit and Robolectric. The learning model for APLAS consists of four stages where each stage has several topics. In this paper, we implement Advanced Widgets as the second topic in the Interactive Application stage and evaluate it through applications to students in an IT department in Indonesia.

    DOI: 10.1145/3395245.3396198

    Web of Science

    researchmap

  • Detecting and Correcting Adversarial Images Using Image Processing Operations and Convolutional Neural Networks

    Huy H. Nguyen, Minoru Kuribayashi, Junichi Yamagishi, Isao Echizen

    ArXiv   2019.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Improved encoding and decoding for non-adaptive threshold group testing. Reviewed

    Thach V. Bui, Minoru Kuribayashi, Mahdi Cheraghchi, Isao Echizen

    CoRR   abs/1901.02283   2019

     More details

    Publishing type:Research paper (scientific journal)  

    researchmap

  • Detecting and Correcting Adversarial Images Using Image Processing Operations.

    Huy H. Nguyen, Minoru Kuribayashi, Junichi Yamagishi, Isao Echizen

    CoRR   abs/1912.05391   2019

     More details

    Publishing type:Research paper (scientific journal)  

    researchmap

  • Efficient Decentralized Tracing Protocol for Fingerprinting System with Index Table. Reviewed

    Minoru Kuribayashi, Nobuo Funabiki

    APSIPA Transactions on Signal and Information Processing   8   1595 - 1601   2019

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/APSIPAASC47483.2019.9023302

    Scopus

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/apsipa/apsipa2019.html#KuribayashiF19

  • An extension of throughput drop estimation model for three-link concurrent communications under partially overlapping channels and channel bonding in ieee 802.11n wlan Reviewed

    Munene, K.I., Funabiki, N., Islam, M.M., Kuribayashi, M., Al Mamun, M.S., Kao, W.-C.

    Advances in Science, Technology and Engineering Systems   4 ( 4 )   2019

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.25046/aj040411

    Scopus

    researchmap

  • A proposal of TCP fairness control method for two-host concurrent communications in elastic WLAN system using raspberry pi access-point Reviewed

    Sudibyo, R.W., Funabiki, N., Kuribayashi, M., Munene, K.I., Manowarul Islam, Md., Kao, W.-C.

    Advances in Science, Technology and Engineering Systems   4 ( 6 )   76 - 80   2019

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEEE  

    The IEEE802.11 wireless local-area network (WLAN) has been extensively deployed as inexpensive and flexible Internet access services. We have studied the elastic WLAN system that dynamically optimizes the network configuration depending on traffic demands. Our testbed experiments using Raspberry Pi revealed that concurrent TCP communications of multiple hosts with a single AP cause the unfairness in throughput performances. In this paper, we propose the TCP fairness control method for two-host concurrent communications. The delay is introduced in the AP at the packet transmissions to the faster host, to increase transmission opportunities with the slower host. The delay is initially estimated by the received signal strength (RSS) from each host, and then, is dynamically optimized using the PI controller. For evaluations, we implement the proposal in the elastic WLAN system testbed, and conduct extensive experiments, where the TCP throughput fairness is achieved.

    DOI: 10.25046/aj040602

    Web of Science

    Scopus

    researchmap

  • Reversible Data Hiding in PDF Document Exploiting Prefix Zeros in Glyph Coordinates. Reviewed

    Neelesh Nursiah, KokSheik Wong, Minoru Kuribayashi

    2019 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC)   1298 - 1302   2019

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    In the contemporary world of information technology, PDF (Portable Document Format) has become the de facto document standard which allows users to exchange and view electronic documents across various platforms. PDF is the most widely exchanged document format since Internet gained popularity. Although PDF has a good authenticity system by making use of digital signatures, the file format is still susceptible to copyright infringement as there are many libraries available on the Internet to bypass the digital signature of a PDF. Therefore, claiming ownership for PDF has become a paramount issue that needs to be addressed. This paper proposes the idea of hiding data in the glyph positioning coordinate value. To suppress bit stream size increment, the reverse zero-run length coding technique is adopted. Experiments are conducted to verify the basic performance of the proposed data hiding method. In the best case scenario, 0.62 bits of data can be embedded into each Byte of the PDF file. The injected leading zeros can be removed to restore the original PDF file.

    DOI: 10.1109/APSIPAASC47483.2019.9023310

    Web of Science

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/apsipa/apsipa2019.html#NursiahWK19

  • Throughput Measurement and Estimation Model for Concurrent Communications of Multiple Raspberry Pi Access-Points in Wireless Local-Area Network. Reviewed

    Mousumi Saha, Rahardhita Widyatra Sudibyo, Nobuo Funabiki, Minoru Kuribayashi, Sumon Kumar Debnath, Wen-Chung Kao

    J. Commun.   14 ( 11 )   1009 - 1009   2019

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.12720/jcm.14.11.1009-1016

    Scopus

    researchmap

  • A construction of a keyword search to allow partial matching with a block cipher Reviewed

    Kodera, Y., Kuribayashi, M., Kusaka, T., Nogami, Y.

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   11402 LNCS   2019

     More details

    Publishing type:Research paper (scientific journal)   Publisher:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)  

    DOI: 10.1007/978-3-030-17982-3_19

    Scopus

    researchmap

  • Advanced Searchable Encryption: An Adaptively Secure Keyword Search for Matrix-type Storages. Reviewed

    Yuta Kodera, Minoru Kuribayashi, Takuya Kusaka, Yasuyuki Nogami

    Int. J. Netw. Comput.   9 ( 2 )   171 - 187   2019

     More details

    Publishing type:Research paper (scientific journal)  

    researchmap

    Other Link: https://dblp.uni-trier.de/db/journals/ijnc/ijnc9.html#KoderaKKN19

  • Robust and Secure Data Hiding for PDF Text Document. Reviewed

    Minoru Kuribayashi, Takuya Fukushima, Nobuo Funabiki

    IEICE Trans. Inf. Syst.   102-D ( 1 )   41 - 47   2019

     More details

  • Efficient (nonrandom) Construction and Decoding for Non-adaptive Group Testing. Reviewed

    Thach V. Bui, Minoru Kuribayashi, Tetsuya Kojima, Roghayyeh Haghvirdinezhad, Isao Echizen

    J. Inf. Process.   27   245 - 256   2019

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.2197/ipsjjip.27.245

    Scopus

    researchmap

  • Enhancements of minimax access-point setup optimisation approach for IEEE 802.11 WLAN. Reviewed

    Kyaw Soe Lwin, Nobuo Funabiki, Sumon Kumar Debnath, Kwenga Ismael Munene, Rahardhita Widyatra Sudibyo, Minoru Kuribayashi, Wen-Chung Kao

    Int. J. Space Based Situated Comput.   9 ( 1 )   47 - 59   2019

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:INDERSCIENCE ENTERPRISES LTD  

    As a flexible and cost-efficient internet access network, the IEEE 802.11 wireless local-area network (WLAN) has been broadly deployed around the world. Previously, to improve the IEEE 802.11n WLAN performance, we proposed the four-step minimax access-point (AP) setup optimisation approach: 1) link throughputs between the AP and hosts in the network field are measured manually; 2) the throughput estimation model is tuned using the measurement results; 3) the bottleneck host suffering the least throughput is estimated using this model; 4) the AP setup is optimised to maximise the throughput of the bottleneck host. Unfortunately, this approach has drawbacks: 1) a lot of manual throughput measurements are necessary to tune the model; 2) the shift of the AP location is not considered; 3) IEEE 802.11ac devices at 5 GHz are not evaluated, although they can offer faster transmissions. In this paper, we present the three enhancements: 1) the number of measurement points is reduced while keeping the model accuracy; 2) the coordinate of the AP setup is newly adopted as the optimisation parameter; 3) the AP device with IEEE 802.11ac at 5 GHz is considered with slight modifications. The effectiveness is confirmed by extensive experiments in three network fields.

    DOI: 10.1504/IJSSC.2019.100017

    Web of Science

    researchmap

  • Sublinear decoding schemes for non-adaptive group testing with inhibitors Reviewed

    Bui, T.V., Kuribayashi, M., Kojima, T., Echizen, I.

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   11436 LNCS   93 - 113   2019

     More details

    Publishing type:Research paper (scientific journal)   Publisher:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)  

    DOI: 10.1007/978-3-030-14812-6_7

    Scopus

    researchmap

  • An Informative Test Code Approach in Code Writing Problem for Java Collections Framework in Java Programming Learning Assistant System. Reviewed

    Ei Ei Mon, Nobuo Funabiki, Minoru Kuribayashi, Wen-Chung Kao

    J. Softw.   14 ( 5 )   200 - 208   2019

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.17706/jsw.14.5.200-208

    researchmap

  • Efficient and error-tolerant schemes for non-adaptive complex group testing and its application in complex disease genetics. Reviewed

    Thach V. Bui, Minoru Kuribayashi, Mahdi Cheraghchi, Isao Echizen

    CoRR   abs/1904.00349   2019

     More details

    Publishing type:Research paper (scientific journal)  

    researchmap

  • Web-Server Implementation of Code Completion Problem for Java Programming Learning Assistant System

    Htoo Htoo Sandi Kyaw, Nobuo Funabiki, Nobuya Ishihara, Minoru Kuribayashi, Wen-Chung Kao

    2019 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TW)   2019

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    To advance Java programming educations, Java Programming Learning Assistant System (JPLAS) has been developed and used in universities in Japan and Myanmar. JPLAS offers several types of programming exercises to cover different learning levels, including the element fill-in-blank problem (EFP) and the code completion problem (CCP). In CCP, an incomplete source code made by removing some elements is given to a student, and its completion is requested by filling in the missing elements properly. The answer is marked by comparing each statement with the corresponding one in the original code. In contrast to EFP, CCP does not show the locations of missing elements. In the trial, CCP has been implemented on offline JPLAS. Data exchange between a teacher and students in a Java programming course is made using USB memories, which takes large loads. In this paper, we implement CCP on the Web server for online JPLAS by extending the implementation of EFP. As well, the evaluations have confirmed the effectiveness of this implementation.

    Web of Science

    researchmap

  • Efficient Decoding Algorithm for Cyclically Permutable Code. Reviewed

    Minoru Kuribayashi, Shodai Suma, Nobuo Funabiki

    IEEE Information Theory Workshop, ITW 2018, Guangzhou, China, November 25-29, 2018   1 - 5   2018

     More details

    Publisher:IEEE  

    DOI: 10.1109/ITW.2018.8613319

    researchmap

  • Advanced Searchable Encryption: Keyword Search for Matrix-Type Storage. Reviewed

    Yuta Kodera, Minoru Kuribayashi, Takuya Kusaka, Yasuyuki Nogami

    Sixth International Symposium on Computing and Networking, CANDAR Workshops 2018, Takayama, Japan, November 27-30, 2018   292 - 297   2018

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE Computer Society  

    DOI: 10.1109/CANDARW.2018.00061

    researchmap

  • Efficiently Decodable Non-Adaptive Threshold Group Testing. Reviewed

    Thach V. Bui, Minoru Kuribayashi, Mahdi Cheraghchi, Isao Echizen

    2018 IEEE International Symposium on Information Theory, ISIT 2018, Vail, CO, USA, June 17-22, 2018   2584 - 2588   2018

     More details

  • Efficient (nonrandom) construction and decoding of non-adaptive group testing.

    Thach V. Bui, Minoru Kuribayashi, Tetsuya Kojima, Roghayyeh Haghvirdinezhad, Isao Echizen

    CoRR   abs/1804.03819   2018

     More details

  • Efficient Decoding Schemes for Noisy Non-Adaptive Group Testing when Noise Depends on Number of Items in Test.

    Thach V. Bui, Tetsuya Kojima, Minoru Kuribayashi, Isao Echizen

    CoRR   abs/1803.06105   2018

     More details

  • Reversible data hiding based compressible privacy preserving system for color image Reviewed

    Joshi, V.B., Raval, M.S., Kuribayashi, M.

    Multimedia Tools and Applications   77 ( 13 )   16597 - 16622   2018

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.1007/s11042-017-5230-8

    Web of Science

    Scopus

    researchmap

  • Estimation of Collusion Attack in Bias-based Binary Fingerprinting Code. Reviewed

    Tatsuya Yasui, Minoru Kuribayashi, Nobuo Funabiki, Isao Echizen

    Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2018, Honolulu, HI, USA, November 12-15, 2018   1550 - 1555   2018

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    An optimal detector known as MAP detector has been proposed for the probabilistic fingerprinting codes such as Tardos and Nuida codes. However, it needs two kinds of important information. One is the collusion strategy which is used at the generation of a pirated codeword from colluders' codewords, and the other is the number of colluders. In this study, we propose an estimator which outputs these two parameters from a pirated codeword. At the estimation, we measure a bias in the pirated codeword by observing the number of symbols "0" and "1", and compare with possible bias patterns calculated from collusion strategies and number of colluders. As a result of computer simulation, it is confirmed that a collusion strategy and number of colluders can be estimated with high probability. In addition, it is revealed that the traceability of the detector using the proposed estimator is extremely close to the optimal detector.

    DOI: 10.23919/APSIPA.2018.8659681

    Web of Science

    researchmap

  • A framework for generalized group testing with inhibitors and its potential application in neuroscience.

    Thach V. Bui, Minoru Kuribayashi, Mahdi Cheraghchi, Isao Echizen

    CoRR   abs/1810.01086   2018

     More details

  • Sublinear decoding schemes for non-adaptive group testing with inhibitors.

    Thach V. Bui, Minoru Kuribayashi, Tetsuya Kojima, Isao Echizen

    CoRR   abs/1805.11748   2018

     More details

  • A throughput estimation model under two-link concurrent communications with partially overlapping channels and its application to channel assignment in IEEE 802.11n WLAN. Reviewed

    Kwenga Ismael Munene, Nobuo Funabiki, Minoru Kuribayashi, Rahardhita Widyatra Sudibyo, Wen-Chung Kao

    IJSSC   8 ( 3 )   123 - 137   2018

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.1504/IJSSC.2018.097286

    researchmap

  • Data hiding for text document in PDF file Reviewed

    Kuribayashi, M., Fukushima, T., Funabiki, N.

    Smart Innovation, Systems and Technologies   81   390 - 398   2018

     More details

    Publishing type:Research paper (scientific journal)   Publisher:Smart Innovation, Systems and Technologies  

    DOI: 10.1007/978-3-319-63856-0_47

    Web of Science

    Scopus

    researchmap

  • Fingerprinting for multimedia content broadcasting system Reviewed

    Kuribayashi, M., Funabiki, N.

    Journal of Information Security and Applications   41   52 - 61   2018

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/j.jisa.2018.06.002

    Web of Science

    Scopus

    researchmap

  • Dynamic Access-Point Configuration Approach for Elastic Wireless Local-Area Network System and Its Implementation Using Raspberry Pi. Reviewed

    Md. Manowarul Islam, Nobuo Funabiki, Minoru Kuribayashi, Sumon Kumar Debnath, Kwenga Ismael Munene, Kyaw Soe Lwin, Rahardhita Widyatra Sudibyo, Md. Selim Al Mamun

    Int. J. Netw. Comput.   8 ( 2 )   254 - 281   2018

     More details

    Publishing type:Research paper (scientific journal)  

    researchmap

  • Universal scoring function based on bias equalizer for bias-based fingerprinting codes Reviewed

    Kuribayashi, M., Funabiki, N.

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E101A ( 1 )   119 - 128   2018

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transfun.E101.A.119

    Web of Science

    Scopus

    researchmap

  • DCT-OFDM Watermarking Scheme Based on Communication System Model Reviewed

    Minoru Kuribayashi, Shogo Shigemoto, Nobuo Funabiki

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E100A ( 4 )   944 - 952   2017.4

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG  

    In conventional spread spectrum (SS) watermarking schemes, random sequences are used for the modulation of watermark information. However, because of the mutual interference among those sequences, it requires complicated removal operation to improve the performance. In this paper, we propose an efficient spread spectrum watermarking scheme by introducing the orthogonal frequency divisiion multiplexing (OFDM) technique at the modulation of watermark information. The SS sequences in the proposed method are the DCT basic vectors modulated by a pseudo-random number (PN) sequence. We investigate the SS-based method considering the host interference at the blind detection scenario and analyze the noise caused by attacks. Because every operation is invertible, the quantization index modulation (QIM)-based method is applicable for the OFDM modulated signals. We also consider the property of watermark extracting operation in SS-based and QIM-based method and formalize their models of noisy channel in order to employ an error correcting code. The performance of their methods with error correcting code is numerically evaluated under the constraints of same distortion level in watermarked content. The experimental results indicated a criteria for the selection of SS-based and QIM-based methods for given content, which is determined by the amount of host interference. In case that the host interference is 0.8 times smaller than a watermark signal, the SS-based method is suitable. When it is 1.0 times larger, the QIM-based method should be selected.

    DOI: 10.1587/transfun.E100.A.944

    Web of Science

    researchmap

  • Information Hiding and Its Criteria for Evaluation Reviewed

    Keiichi Iwamura, Masaki Kawamura, Minoru Kuribayashi, Motoi Iwata, Hyunho Kang, Seiichi Gohshi, Akira Nishimura

    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS   E100D ( 1 )   2 - 12   2017.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG  

    Within information hiding technology, digital watermarking is one of the most important technologies for copyright protection of digital content. Many digital watermarking schemes have been proposed in academia. However, these schemes are not used, because they are not practical; one reason for this is that the evaluation criteria are loosely defined. To make the evaluation more concrete and improve the practicality of digital watermarking, watermarking schemes must use common evaluation criteria. To realize such criteria, we organized the Information Hiding and its Criteria for Evaluation (IHC) Committee to create useful, globally accepted evaluation criteria for information hiding technology. The IHC Committee improves their evaluation criteria every year, and holds a competition for digital watermarking based on state-of-the-art evaluation criteria. In this paper, we describe the activities of the IHC Committee and its evaluation criteria for digital watermarking of still images, videos, and audio.

    DOI: 10.1587/transinf.2016MUI0001

    Web of Science

    researchmap

  • Secure data management system with traceability against internal leakage. Reviewed

    Minoru Kuribayashi, Takahiro Ueda, Nobuo Funabiki

    2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2017, Kuala Lumpur, Malaysia, December 12-15, 2017   1486 - 1494   2017

     More details

  • A Proposal of Software Architecture for Java Programming Learning Assistant System Reviewed

    Nobuya Ishihara, Nobuo Funabiki, Minoru Kuribayashi, Wen-Chung Kao

    2017 IEEE 31ST INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA)   64 - 70   2017

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    To improve Java programming educations, we have developed a Web-based Java Programming Learning System (JPLAS). To deal with students at different levels, JPLAS provides three levels of problems, namely, element fill-in-blank problems, statement fill-in-blank problems, and code writing problems. Unfortunately, since JPLAS has been implemented by various students who studied in our group at different years, the code has become complex and redundant, which makes further extensions of JPLAS extremely hard. In this paper, we propose the software architecture for JPLAS to avoid redundancy to the utmost at implementations of new functions that will be continued with this JPLAS project. Following the MVC model, our proposal basically uses Java for the model (M), JavaScript/CSS for the view (V), and JSP for the controller (C). For the evaluation, we implement JPLAS by this architecture and compare the number of code files with the previous implementation.

    DOI: 10.1109/AINA.2017.56

    Web of Science

    researchmap

  • Efficiently Decodable Non-Adaptive Threshold Group Testing.

    Thach V. Bui, Minoru Kuribayashi, Mahdi Cheraghchi, Isao Echizen

    CoRR   abs/1712.07509   2017

     More details

  • Dynamic Access-Point Configuration Approach for Elastic Wireless Local-Area Network System. Reviewed

    Md. Manowarul, Islam, Md. Selim Al Mamun, Nobuo Funabiki, Minoru Kuribayashi

    Fifth International Symposium on Computing and Networking, CANDAR 2017, Aomori, Japan, November 19-22, 2017   216 - 222   2017

     More details

    Publisher:IEEE Computer Society  

    DOI: 10.1109/CANDAR.2017.20

    Web of Science

    researchmap

  • Watermarking with Fixed Decoder for Aesthetic 2D Barcode Reviewed

    Minoru Kuribayashi, Ee-Chien Chang, Nobuo Funabiki

    DIGITAL FORENSICS AND WATERMARKING, IWDW 2016   10082   379 - 392   2017

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:SPRINGER INTERNATIONAL PUBLISHING AG  

    An aesthetic 2D-barcode, e.g. QR code, carries a given message in the payload and yet its visual appearance resembles another given logo image. The requirement of embedding a message in a "cover" image is similar to digital watermarking but with a crucial difference that, for the aesthetic 2D-barcode, the decoder is predetermined and fixed. Hence the designs and performances of the aesthetic 2D-barcode heavily rely on the predetermined decoder. In this paper, we focus on the underlying systematic encoding function in QR code. We first formulate a framework that optimizes the visual appearance of the codeword and yet meets the coding requirement. Since finding such an optimal codeword is computationally expensive, we next propose a heuristic to search for a feasible solution, and incorporate image processing operations to enhance the visual appearance. Although our method is designed for QR code, our approach can be applied to other 2D-barcodes that employ similar coding mechanisms of error correction code.

    DOI: 10.1007/978-3-319-53465-7_28

    Web of Science

    researchmap

  • Watermarking with Fixed Decoder for Aesthetic 2D Barcode Reviewed

    Minoru Kuribayashi, Ee-Chien Chang, Nobuo Funabiki

    DIGITAL FORENSICS AND WATERMARKING, IWDW 2016   10082   379 - 392   2017

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:SPRINGER INTERNATIONAL PUBLISHING AG  

    An aesthetic 2D-barcode, e.g. QR code, carries a given message in the payload and yet its visual appearance resembles another given logo image. The requirement of embedding a message in a "cover" image is similar to digital watermarking but with a crucial difference that, for the aesthetic 2D-barcode, the decoder is predetermined and fixed. Hence the designs and performances of the aesthetic 2D-barcode heavily rely on the predetermined decoder. In this paper, we focus on the underlying systematic encoding function in QR code. We first formulate a framework that optimizes the visual appearance of the codeword and yet meets the coding requirement. Since finding such an optimal codeword is computationally expensive, we next propose a heuristic to search for a feasible solution, and incorporate image processing operations to enhance the visual appearance. Although our method is designed for QR code, our approach can be applied to other 2D-barcodes that employ similar coding mechanisms of error correction code.

    DOI: 10.1007/978-3-319-53465-7_28

    Web of Science

    researchmap

  • A Minimax Approach for Access Point Setup Optimization in IEEE 802.11n Wireless Networks. Reviewed

    Kyaw Soe Lwin, Nobuo Funabiki, Chihiro Taniguchi, Khin Khin Zaw, Md. Selim Al Mamun, Minoru Kuribayashi, Wen-Chung Kao

    IJNC   7 ( 2 )   187 - 207   2017

     More details

    Language:English   Publisher:IJNC Editorial Committee  

    Recently, an IEEE 802.11n access point (AP) prevailed over the wireless local area network (WLAN) due to the high-speed data transmission using the multiple input multiple output (MIMO) technology. Unfortunately, the signal propagation from the 802.11n AP is not uniform in the circumferential and height directions because of the multiple antennas for MIMO. As a result, the data transmission speed between the AP and a host could be significantly affected by their relative setup conditions. In this paper, we propose a minimax approach for optimizing the 802.11n AP setup condition in terms of the angles and the height in an indoor environment using throughput measurements. First, we detect a bottleneck host that receives the weakest signal from the AP in the field using the throughput estimation model. To explore optimal values of parameters for this model, we adopt the versatile parameter optimization tool. Then, we optimize the AP setup by changing the angles and the height while measuring throughput. For evaluations, we verify the accuracy of the model using measurement results and confirm the throughput improvements for hosts in the field by our approach.

    DOI: 10.15803/ijnc.7.2_187

    CiNii Article

    researchmap

    Other Link: http://dblp.uni-trier.de/db/journals/ijnc/ijnc7.html#journals/ijnc/LwinFTZMKK17

  • Obfuscation in digital fingerprinting. Reviewed

    Hans Georg Schaathun, Minoru Kuribayashi

    IJICoT   4 ( 2/3 )   185 - 200   2017

  • Enabling public auditability for operation behaviors in cloud storage Reviewed

    Tian, H., Chen, Z., Chang, C.-C., Kuribayashi, M., Huang, Y., Cai, Y., Chen, Y., Wang, T.

    Soft Computing   21 ( 8 )   2175 - 2187   2017

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:SPRINGER  

    In this paper, we focus on auditing for users' operation behaviors, which is significant for the avoidance of potential crimes in the cloud and equitable accountability determination in the forensic. We first present a public model for operation behaviors in cloud storage, in which a trusted third party is introduced to verify the integrity of operation behavior logs to enhance the credibility of forensic results as well as alleviate the burden of the forensic investigator. Further, we design a block-based logging approach to support selective verification and a hash-chain-based structure for each log block to ensure the forward security and append-only properties for log entries. Moreover, to achieve the tamper resistance of log blocks and non-repudiation of auditing proofs, we employ Merkle hash tree (MHT) to record the hash values of the aggregation authentication block tags sequentially and publish the root of MHT to the public once a block has been appended. Meanwhile, using the authentication property of MHT, our scheme can provide log-less verification with privacy preservation. We formally prove the security of the proposed scheme and evaluate its performance on entry appending and verification by concrete experiments and comparisons with the state-of-the-art schemes. The results demonstrate that the proposed scheme can effectively achieve secure auditing for log files of operation behaviors in cloud storage and outperforms the previous ones in computation complexity and communication overhead.

    DOI: 10.1007/s00500-016-2311-y

    Web of Science

    Scopus

    researchmap

  • Aesthetic QR code based on modified systematic encoding function Reviewed

    Kuribayashi, M., Morii, M.

    IEICE Transactions on Information and Systems   E100D ( 1 )   42 - 51   2017

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG  

    Quick Response (QR) code is a two dimensional barcode widely used in many applications. A standard QR code consists of black and white square modules, and it appears randomized patterns. By modifying the modules using certain rule, it is possible to display a logo image on the QR code. Such a QR code is called an aesthetic QR code. In this paper, we change the encoding method of the Reed-Solomon (RS) code to produce an aesthetic QR code without sacrificing its error correcting capability. The proposed method randomly produces candidates of RS blocks and finds the best one during encoding. Considering an image to be displayed, we also introduce a weighting function during random selection that classifies the visually important regions in the image. We further investigate the shape of modules which represents the image and consider the trade-off between the visual quality and its readability. As a result, we can produce a beautiful aesthetic QR code, which still can be decoded by standard QR code reader.

    DOI: 10.1587/transinf.2016MUP0002

    Web of Science

    Scopus

    researchmap

  • Simple Countermeasure to Non-Linear Collusion Attacks Targeted for Spread-Spectrum Fingerprinting Scheme Reviewed

    Minoru Kuribayashi

    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS   E99D ( 1 )   50 - 59   2016.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG  

    Based upon the Kerckhoffs' principle, illegal users can get to know the embedding and detection algorithms except for a secret key. Then, it is possible to access to a host signal which may be selected from frequency components of a digital content for embedding watermark signal. Especially for a fingerprinting scheme which embeds user's information as a watermark, the selected components can be easily found by the observation of differently watermarked copies of a same content. In this scenario, it is reported that some non-linear collusion attacks will be able to remove/modify the embedded signal. In this paper, we study the security analysis of our previously proposed spread-spectrum (SS) fingerprinting scheme [1], [2] under the Kerckhoffs' principle, and reveal its drawback when an SS sequence is embedded in a color image. If non-linear collusion attacks are performed only to the components selected for embedding, the traceability is greatly degraded while the pirated copy keeps high quality after the attacks. We also propose a simple countermeasure to enhance the robustness against non-linear collusion attacks as well as possible signal processing attacks for the underlying watermarking method.

    DOI: 10.1587/transinf.2015MUP0005

    Web of Science

    researchmap

  • Fingerprinting for broadcast content distribution system Reviewed

    Kuribayashi, M.

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   9569   163 - 175   2016

     More details

    Publishing type:Research paper (scientific journal)   Publisher:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)  

    DOI: 10.1007/978-3-319-31960-5_14

    Scopus

    researchmap

  • DCT-OFDM based watermarking scheme robust against clipping, rotation, and scaling attacks Reviewed

    Hiroaki Ogawa, Minoru Kuribayashi, Motoi Iwata, Koichi Kise

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   9569   271 - 284   2016

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Springer Verlag  

    The digital watermark is used for copyright protection, and the methods should have the robustness against various attacks such as JPEG compression, clipping, rotation, and scaling attacks. Based on the DCT-OFDM based watermarking method presented at IWIHC2014, we propose a method enhancing the performance in this paper. There are two ideas in the proposed method. One idea is to reduce the computational costs required for the synchronization recovery. The other idea is to encode watermark information by error correcting code and to decode it by maximum likelihood algorithm. As the result, our method has high robustness against the IHC evaluation criteria with less degradation of quality and less computational costs.

    DOI: 10.1007/978-3-319-31960-5_23

    Scopus

    researchmap

  • Enrichment of visual appearance of aesthetic QR code Reviewed

    Minoru Kuribayashi, Masakatu Morii

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   9569   220 - 231   2016

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Springer Verlag  

    Quick Response (QR) code is a two dimensional barcode widely used in many applications. Similar to a visible watermarking technique, the visual appearance can be modified to display an image while a standard QR code reader can decode the data contained in such a QR code. In this paper, we consider the characteristic of images to be displayed on a QR code, and propose an effective method to produce a visually better aesthetic QR code without sacrificing its error correcting capability. We also investigate the shape of modules to represent the image to be displayed and consider the trade-off between the visual quality and its readability.

    DOI: 10.1007/978-3-319-31960-5_18

    Scopus

    researchmap

  • Throughput Measurements for Access-Point Installation Optimization in IEEE802.11n Wireless Networks Reviewed

    Nobuo Funabiki, Kyaw Soe Lwin, Minoru Kuribayashi, I-Wei Lai

    2016 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS-TAIWAN (ICCE-TW)   213 - 214   2016

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    Currently, high-speed IEEE802.11n interfaces using MIMO have become common in access points (APs) and personal computers (PCs) for wireless local-area networks (WLANs). This trend leads to further expand the application areas for WLANs. In this paper, we present throughput measurement results of IEEE802.11n devices with various placement orientations in indoor environments. They show that measured throughputs are strongly affected by the roll and yaw angles at the installation of AP due to the multiple antennas in MIMO, which should be considered in optimizing the installation of APs in indoor fields.

    Web of Science

    researchmap

  • Worker PC Performance Measurements Using Benchmarks for User-PC Computing System Reviewed

    Nobuo Funabiki, Yuki Aoyagi, Minoru Kuribayashi, Wen-Chun Kao

    2016 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS-TAIWAN (ICCE-TW)   277 - 278   2016

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    The User-PC computing system (UPC) has been studied to provide a parallel computing platform for members in a group using idling computing resources in personal computers (PCs) of them. UPC adopts the master-worker model where we have implemented the programs for the master on Linux and for the worker on Linux and Windows. However, the current job scheduling method does not consider the real performance of a worker PC. In this paper, we implement a function to measure the performance of a worker PC using two benchmark programs. The experiment results for six PCs in our group show that there are three times difference in the CPU performance and eight times difference in the disk performance.

    Web of Science

    researchmap

  • A Proposal of Three Extensions in Blank Element Selection Algorithm for Java Programming Learning Assistant System Reviewed

    Khin Khin Zaw, Nobuo Funabiki, Minoru Kuribayashi

    2016 IEEE 5TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS   1 - 3   2016

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    To assist Java programming educations, we have developed a Web-based Java Programming Learning Assistant System (JPLAS). JPLAS provides fill-in-blank problems to let students study Java grammar and basic programming skills by filling the blanked elements in a given Java code. To generate the feasible problems, we have proposed a blank element selection algorithm using the constraint graph to select as many blanks as possible such that they have grammatically correct and unique answers. In this paper, to further increase the number of blanks and control the difficulty of the generated problem, we extend this algorithm by 1) adding operators in conditional expressions for blank candidates, 2) improving the edge generation method in the constraint graph to increase the number of blanks, and 3) introducing two parameters to change the frequency of selecting blanks. To verify the effectiveness, we apply the extended algorithm to 55 Java codes for fundamental data structure or algorithms, and confirm that these extensions can increase the number of blanks and change the problem difficulty.

    DOI: 10.1109/GCCE.2016.7800312

    Web of Science

    researchmap

  • A Proposal of Coding Rule Learning Function in Java Programming Learning Assistant System Reviewed

    Nobuo Funabiki, Takuya Ogawa, Nobuya Ishihara, Minoru Kuribayashi, Wen-Chung Kao

    PROCEEDINGS OF 2016 10TH INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS (CISIS)   561 - 566   2016

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    Recently, Java has been educated in many universities and professional schools due to reliability, portability, and scalability. However, because of its limited time in Java programming courses, coding rules arc rarely educated. As a result, codes made by students become far from readable codes. In this paper, we propose a coding rule learning function using static code analyzers in Java Programming Learning Assistant System (JPLAS), targeting students who have accomplished the grammar learning and are going to write practical codes for final projects. Coding rules for this function consist of naming rules, coding styles, and potential problems. We evaluate the improvement of readability in four codes refined by this function and the usability of this function through the questionnaires completed by five students. In future studies, we expect that this function will be employed in Java programming courses.

    DOI: 10.1109/CISIS.2016.94

    Web of Science

    researchmap

  • BENCHMARKING OF SCORING FUNCTIONS FOR BIAS-BASED FINGERPRINTING CODE Reviewed

    Minoru Kuribayashi

    2016 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING PROCEEDINGS   2039 - 2043   2016

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    The study of universal detector for fingerprinting code is strongly dependent on the design of scoring function. The best detector is known as the MAP detector that calculates an optimal correlation score, but the number of colluders and their collusion strategy are inevitable. Although there are some scoring functions under some collusion strategies and asymptotic analyses, their numerical evaluation has not been done. In this study, their performance is evaluated for some typical collusion strategies using a discretized bias-based binary fingerprinting code. We also propose a simple but efficient scoring function based on a heuristic observation.

    DOI: 10.1109/ICASSP.2016.7472035

    Web of Science

    researchmap

  • A Minimax Approach for Access-Point Setup Optimization Using Throughput Measurements in IEEE802.11n Wireless Networks Reviewed

    Kyaw Soe Lwin, Nobuo Funabiki, Khin Khin Zaw, Md. Selim Al Mamun, Minoru Kuribayashi

    2016 FOURTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR)   311 - 317   2016

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    Recently, an IEEE802.11n access point (AP) has become common in the wireless local-area network (WLAN) due to the high-speed data transmission using the multiple input multiple output (MIMO) technology. However, the signal propagation from the 802.11n AP may not be uniform in the circumferential direction because of multiple antennas in MIMO, in addition to the height direction. As a result, the data transmission speed between the AP and a host can be significantly affected by their relative setup conditions. In this paper, we propose a minimax approach for optimizing the 802.11n AP setup condition in terms of the angles and the height in an indoor environment using throughput measurements. First, we detect a bottleneck host that receives the weakest signal from the AP in the field using the throughput estimation model. Then, we optimize the AP setup by changing the orientation and height while measuring throughputs. For evaluations, we confirm the accuracy of the model using measurement results and the throughput improvements at most hosts including the bottleneck one in the field by our approach.

    DOI: 10.1109/CANDAR.2016.37

    Web of Science

    researchmap

  • An Active Access-Point Configuration Algorithm for Elastic Wireless Local-Area Network System Using Heterogeneous Devices. Reviewed

    Md. Selim Al Mamun, Md. Ezharul Islam, Nobuo Funabiki, Minoru Kuribayashi, I-Wei Lai

    IJNC   6 ( 2 )   395 - 419   2016

  • IMAGE FINGERPRINTING SYSTEM BASED ON COLLUSION SECURE CODE AND WATERMARKING METHOD Reviewed

    Minoru Kuribayashi, Hans Georg Schaathun

    2015 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP)   2120 - 2124   2015

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    According to watermark security based on the Kerckhoffs' principle, we should mind that illegal users will be able to access to the host signal which is targeted for embedding in a fingerprinting system. In our system, each user's ID is encoded by a fingerprinting code, and then it is embedded into the host signal employing the obfuscation technique. Considering the operation in the obfuscation technique, we discover that the operation is equivalent to a simple spread spectrum (SS) watermarking method using longer sequences. Its effects are intensively evaluated by simulation in this paper.

    DOI: 10.1109/ICIP.2015.7351175

    Web of Science

    researchmap

  • DCT-OFDM Based Watermarking Scheme Robust against Clipping Attack Reviewed

    Masaki Hakka, Minoru Kuribayashi, Masakatu Morii

    IWIHC'14: Proceedings of the First ACM International Workshop on Information Hiding and its Criteria for Evaluation   18 - 24   2014

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:ASSOC COMPUTING MACHINERY  

    Robustness against various attacks involving lossy compression like JPEG and clipping is inevitable requirements for digital watermarking schemes. In this paper, we propose a watermarking scheme robust against the JPEG compression and a clipping attack using the DCT-OFDM based watermarking method. Robustness against the JPEG compression can be achieved by embedding watermark information into the low -frequency components. We employ the QIM method to the DCT-OFDM modulated signal. By embedding a synchronization signal, we attempt to recover the synchronization loss from a clipped image. In a preliminary experiment, we can detect the embedded synchronization signal around a correct synchronization point because the synchronization signal is mainly embedded into the low frequency components in a spread form. Then, we determine the center among the detected points as the correct synchronization point. We evaluate the performance of our method by computer simulation. It is revealed that our method satisfies the evaluation criteria determined by IHC Committee, while maintaining high image quality.

    DOI: 10.1145/2598908.2598914

    Web of Science

    researchmap

  • Proceedings of the 1st international workshop on Information hiding and its criteria for evaluation, IWIHC 2014, Kyoto, Japan, June 3, 2014 Reviewed

    IWIHC@ASIACCS 2014   2014

     More details

    Publisher:ACM  

    DOI: 10.1145/2598908

    researchmap

  • Countermeasure to Non-Linear Collusion Attacks on Spread Spectrum Fingerprinting Reviewed

    Minoru Kuribayashi

    2014 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA)   50 - 54   2014

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    In the spread spectrum (SS) fingerprinting technique, the averaging attack has been supposed to be the most damaging attack. It is because a number of nonlinear collusion strategies is supposed to be well approximated by averaging collusion plus additive noise. In this study, we intensively evaluate the conventional assumption, and reveal its drawbacks when a SS sequence is embedded in a digital image. Furthermore, we propose a simple and effective method to improve the drawbacks by introducing a spreading operation at the embedding. Our experimental results reveal that the damages caused by non-linear collusion strategies can be reduced in such a way that the host signal sampled from an image is kept secret.

    Web of Science

    researchmap

    Other Link: http://dblp.uni-trier.de/db/conf/isita/isita2014.html#conf/isita/Kuribayashi14

  • Coded spread spectrum watermarking scheme Reviewed

    Minoru Kuribayashi

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   7809   169 - 183   2013

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer-Verlag  

    In conventional spread spectrum watermarking schemes, random sequences are used for the modulation of watermark information. However, because of the mutual interference among those sequences, it requires complicated removal operation to improve the performance. In this paper, we propose an efficient spread spectrum watermarking scheme by introducing the CDMA technique at the modulation of watermark information. In order to control the energy assigned to spread spectrum sequences, we propose a coded method that encodes watermark information into a constant weight codeword. If the weight and its code-length are properly selected, the performance of the method could outperform the conventional methods. © 2013 Springer-Verlag.

    DOI: 10.1007/978-3-642-40099-5_15

    Scopus

    researchmap

  • Bias equalizer for binary probabilistic fingerprinting codes Reviewed

    Minoru Kuribayashi

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   7692   269 - 283   2013

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer-Verlag  

    In binary probabilistic fingerprinting codes, the number of symbols "0" and "1" is generally balanced because of the design of the codeword. After a collusion attack, the balance of symbols is not always assured in a pirated codeword. It is reported in [8] that if the number of symbols in a pirated codeword is unbalanced, then a tracing algorithm can be improved by equalizing the unbalanced symbols. In this study, such a bias equalizer is customized for probabilistic fingerprinting codes utilizing the encoding parameters. Although the proposed bias equalizer is highly dependent on collusion strategies, it can improve the performance of traceability for some typical strategies to which the conventional bias equalizer can not be applied. © 2013 Springer-Verlag.

    DOI: 10.1007/978-3-642-36373-3_18

    Scopus

    researchmap

  • A simple tracing algorithm for binary fingerprinting code under averaging attack Reviewed

    Minoru Kuribayashi

    IH and MMSec 2013 - Proceedings of the 2013 ACM Information Hiding and Multimedia Security Workshop   3 - 11   2013

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:ACM  

    When a binary fingerprinting codeword is embedded into digital contents using a spread-spectrum (SS) watermarking scheme, the marking assumption is not valid anymore because it is difficult for colluders to perform the symbol-wise attack for their codewords. As discussed in the SS-type fingerprinting schemes, veraging their copies is the cost-effective attack from the signal processing point of view. In this paper, we propose an optimal detector under the averaging attack and addition of white Gaussian noise. If the detector knows the number of colluders in advance, it first estimates the variance of additive noise, and then calculates the correlation scores using a log-likelihood-based approach. However, the number of colluders is not given in a real situation. We discover in this study that the characteristic of parameters for generating codewords enables us to eliminate the number of colluders as well as the estimation of the variance of noise at the calculation of correlation score, and propose a simplified detector by analyzing the scoring function in the optimal detector. We evaluate the performance of the simplified detector through simulation using not only codewords, but also a digital image. © 2013 ACM.

    DOI: 10.1145/2482513.2482521

    Scopus

    researchmap

  • Estimation of Noise Channel from Fingerprinting Codeword Reviewed

    KURIBAYASHI MINORU

    2013 IEEE International Workshop on Information Forensics and Security(WIFS2013)   2013

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Coded Spread Spectrum Watermarking Scheme. Reviewed

    Minoru Kuribayashi

    Digital Forensics and Watermaking - 11th International Workshop, IWDW 2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected Papers   169 - 183   2012

     More details

    Publisher:Springer  

    DOI: 10.1007/978-3-642-40099-5_15

    researchmap

  • Analysis of Binary Fingerprinting Codes under Relaxed Marking Assumption Reviewed

    Minoru Kuribayashi

    2012 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2012)   643 - 647   2012

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    There are many studies on the performance of binary fingerprinting codes under a well-known marking assumption. Among many fingerprinting codes, we focus on Tardos codes and Nuida's variants. From the signal processing point of view, the relaxation of the assumption is required for the analysis. In this paper, we consider the averaging attack which has been studied in the spread-spectrum-based fingerprinting schemes, and propose an optimal detector based on a maximum likelihood decoding. From our theoretical analysis about the effect on a pirated codeword caused by the averaging attack, it is revealed that the false-positive probability is strongly dependent on the number of colluders.

    Web of Science

    researchmap

    Other Link: http://dblp.uni-trier.de/db/conf/isita/isita2012.html#conf/isita/Kuribayashi12

  • ADAPTIVE ITERATIVE DETECTION METHOD FOR SPREAD SPECTRUM FINGERPRINTING SCHEME Reviewed

    Minoru Kuribayashi

    2012 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP)   pp.1777-1780   1777 - 1780   2012

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    The traceability of the spread spectrum fingerprinting has been improved by an iterative detection method combined with an interference removal operation. However, the false-positive probability is slightly increased when the length of fingerprint sequence is rather small. In this study, the iterative detection procedure is adaptively calibrated to maximize the effect of the interference removal operation.

    DOI: 10.1109/ICASSP.2012.6288244

    Web of Science

    researchmap

  • Hierarchical spread spectrum fingerprinting scheme based on the CDMA technique Reviewed

    Kuribayashi, M.

    Eurasip Journal on Information Security   2011   2011

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.1155/2011/502782

    Scopus

    researchmap

  • EFFECTIVE INTERFERENCE REDUCTION METHOD FOR SPREAD SPECTRUM FINGERPRINTING Reviewed

    Minoru Kuribayashi

    2011 PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND MULTIMEDIA APPLICATIONS (SIGMAP 2011)   pp.167-172   167 - 172   2011

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    The iterative detection method was proposed in IH2008 specified for the CDMA-based fingerprinting scheme which embedding procedure was additive watermarking method. Such a detection method is applicable for the multiplicative watermarking method that modulates a fingerprint using the characteristic of a content. In this study, we study the interference among fingerprints embedded in a content in the hierarchical version of Cox's scheme, and propose the effective detection method that iteratively detects colluders combined with a removal operation. By introducing two kinds of thresholds, the removal operation is adaptively performed to reduce the interference without causing serious false detection.

    Web of Science

    researchmap

  • A New Soft Decision Tracing Algorithm for Binary Fingerprinting Codes Reviewed

    Minoru Kuribayashi

    ADVANCES IN INFORMATION AND COMPUTER SECURITY   7038   1 - 15   2011

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:SPRINGER-VERLAG BERLIN  

    The performance of fingerprinting codes has been studied under the well-known marking assumption. In a realistic environment, however, a pirated copy will be distorted by an additional attack. Under the assumption that the distortion is modeled as AWGN, a soft decision method for a tracing algorithm has been proposed and the traceability has been experimentally evaluated. However, the previous soft decision method works directly with a received signal without considering the communication theory. In this study, we calculate the likelihood of received signal considering a posterior probability, and propose a soft decision tracing algorithm considering the characteristic of Gaussian channel. For the estimation of channel, we employ the expectation-maximization algorithm by giving constraints under the possible collusion strategies. We also propose an equalizer to give a proper weighting parameter for calculating a correlation score.

    DOI: 10.1007/978-3-642-25141-2_1

    Web of Science

    researchmap

  • Hierarchical Spread Spectrum Fingerprinting Scheme Based on the CDMA Technique. Reviewed

    Minoru Kuribayashi

    EURASIP J. Information Security   2011   16ages   2011

     More details

    Language:English   Publisher:Hindawi Publishing Corporation  

    DOI: 10.1155/2011/502782

    CiNii Article

    researchmap

  • Reduction of interference for CDMA-based fingerprinting scheme based on random permutation Reviewed

    Minoru Kuribayashi

    The sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2010)   pp.494-497   2010.10

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/IIHMSP.2010.126

    researchmap

  • Systematic Generation of Tardos's Fingerprint Codes Reviewed

    Minoru Kuribayashi, Masakatu Morii

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E93A ( 2 )   508 - 515   2010.2

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG  

    Digital fingerprinting is used to trace back illegal users. where unique ID known as digital fingerprints is embedded into a content before distribution. On the generation of such fingerprints, one of the important properties is collusion-resistance. Binary codes for fingerprinting with a code length of theoretically minimum order were proposed by Tardos, and the related works mainly focused on the reduction of the code length were presented. In this paper, we present a concrete and systematic construction of the Tardos's fingerprinting code using a chaotic map. Using a statistical model for correlation scores, the actual number of true-positive and false-positive detection is measured. The collusion-resistance of the generated fingerprinting codes is evaluated by a computer simulation.

    DOI: 10.1587/transfun.E93.A.508

    Web of Science

    researchmap

  • Reduction of interference for CDMA-based fingerprinting scheme based on random permutation Reviewed

    Minoru Kuribayashi

    Proceedings - 2010 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2010   494 - 497   2010

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE Computer Society  

    In the CDMA-based fingerprinting scheme, a fingerprint sequence is composed of two kinds of spread spectrum sequences generated from DCT basic vectors and PN sequences. In this study, the DCT basic vectors are randomly permuted in order to reduce the interference among colluders' fingerprint sequences, which effect is similar to the interleaver used in Turbo codes. Our experimental results reveal that the false-positive probability is reduced without degrading the traceability. © 2010 IEEE.

    DOI: 10.1109/IIHMSP.2010.126

    Scopus

    researchmap

  • On the implementation of spread spectrum fingerprinting in asymmetric cryptographic protocol Reviewed

    Minoru Kuribayashi

    Eurasip Journal on Information Security   2010   2010

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Hindawi Publishing Corporation  

    Digital fingerprinting of multimedia contents involves the generation of a fingerprint, the embedding operation, and the realization of traceability from redistributed contents. Considering a buyer's right, the asymmetric property in the transaction between a buyer and a seller must be achieved using a cryptographic protocol. In the conventional schemes, the implementation of a watermarking algorithm into the cryptographic protocol is not deeply discussed. In this paper, we propose the method for implementing the spread spectrum watermarking technique in the fingerprinting protocol based on the homomorphic encryption scheme. We first develop a rounding operation which converts real values into integer and its compensation, and then explore the tradeoff between the robustness and communication overhead. Experimental results show that our system can simulate Cox's spread spectrum watermarking method into asymmetric fingerprinting protocol. Copyright © 2010 Minoru Kuribayashi.

    DOI: 10.1155/2010/694797

    Scopus

    researchmap

  • Tardos's Fingerprinting Code over AWGN Channel Reviewed

    Minoru Kuribayashi

    INFORMATION HIDING   6387   103 - 117   2010

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:SPRINGER-VERLAG BERLIN  

    Binary fingerprinting codes with a length of theoretically minimum order were proposed by Tardos, and the traceability has been estimated under the well-known marking assumption. In this paper, we estimate the traceability and the false-positive probability of the fingerprinting code over AWGN channel, and propose a new accusation algorithm to catch more colluders with less innocent users. The design of our algorithm is based on the symmetric accusation algorithm proposed by Skorie et al. that focuses on the characteristic of the p.d.f. of the correlation scores. The proposed algorithm first estimates the strength of noise added to the code, and then calculates the specific correlation scores among candidate codewords using the characteristic of the noisy channel. The scores are finally classified into guilty and innocent by the threshold obtained from the p.d.f. The performance of the proposed tracing algorithm is evaluated by Monte Carlo simulation.

    DOI: 10.1007/978-3-642-16435-4_9

    Web of Science

    researchmap

  • On the Implementation of Spread Spectrum Fingerprinting in Asymmetric Cryptographic Protocol. Reviewed

    Minoru Kuribayashi

    EURASIP J. Information Security   2010   2010

  • Experimental Assessment of Probabilistic Fingerprinting Codes over AWGN Channel Reviewed

    Minoru Kuribayashi

    ADVANCES IN INFORMATION AND COMPUTER SECURITY   6434   117 - 132   2010

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:SPRINGER-VERLAG BERLIN  

    The estimation of the false-positive probability has been an important concern for fingerprinting codes, and the formula of the probability has been derived under a restricted assumption and statistic model. In this paper, we first analyze the statistic behavior of the value of score derived from the correlation between a pirated codeword and codewords of all users when some bits are flipped. Then, the derivation of the score is adaptively designed to consider the attack model such that a pirated codeword is distorted by additive white Gaussian noise. The traceability and probability of false-positive are estimated by Monte-Carlo simulation, and the validity of the Gaussian approximation for the distribution of score is evaluated for probabilistic fingerprinting codes.

    DOI: 10.1007/978-3-642-16825-3_9

    Web of Science

    researchmap

  • A study of traceability of CDMA-based fingerprinting scheme Reviewed

    Minoru Kuribayashi

    Int. Conf. on Interaction Sciences (ICIS2009)   pp.900-905   2009.11

     More details

    Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1145/1655925.1656089

    researchmap

  • A study of traceability of CDMA-based fingerprinting scheme Reviewed

    Minoru Kuribayashi

    ACM International Conference Proceeding Series   403   900 - 905   2009

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:ACM  

    We have proposed the CDMA-based fingerprinting scheme in IWSEC2007, and the detector is improved by reducing the interference among colluders' fingerprint signals in IH2008. In this study, we evaluate the false-positive detection when the number of colluders is more than 100, and show the bugs in the design of threshold for the determination of guilty. We fix the bugs and further improve the performance by adaptively calculating proper thresholds. Copyright © 2009 ACM.

    DOI: 10.1145/1655925.1656089

    Scopus

    researchmap

  • A study of rounding error on CDMA-based fingerprinting scheme Reviewed

    Minoru Kuribayashi, Hiroshi Kato, Masakatu Morii

    IIH-MSP 2009 - 2009 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing   1286 - 1289   2009

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE Computer Society  

    On the spread spectrum fingerprinting, it has been considered that the energy of embedded signal is dropped to 1/c of its original value when c copies are averaged. In this study, we analyze the effects of rounding error occurred at the embedding and averaging. The truncation of the number of decimals causes non-linear changes on the frequency components of fingerprint sequence. We estimate the actual attenuation factor through our simulation, and provide the best and worst case. In order to avoid the worst case, the countermeasure is proposed in this paper. © 2009 IEEE.

    DOI: 10.1109/IIH-MSP.2009.47

    Scopus

    researchmap

  • A study of rounding error on CDMA-based fingerprinting scheme Reviewed

    Minoru Kuribayashi, Hiroshi Kato, Masakatu Morii

    IIH-MSP 2009 - 2009 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing   pp.1286-1289   1286 - 1289   2009

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    On the spread spectrum fingerprinting, it has been considered that the energy of embedded signal is dropped to 1/c of its original value when c copies are averaged. In this study, we analyze the effects of rounding error occurred at the embedding and averaging. The truncation of the number of decimals causes non-linear changes on the frequency components of fingerprint sequence. We estimate the actual attenuation factor through our simulation, and provide the best and worst case. In order to avoid the worst case, the countermeasure is proposed in this paper. © 2009 IEEE.

    DOI: 10.1109/IIH-MSP.2009.47

    Scopus

    researchmap

  • On the implementation of asymmetric fingerprinting Protocol Reviewed

    Minoru Kuribayashi, Masakatu Morii

    16th European Signal Processing Conference (EUSIPCO 2008)   SS7-1   2008.8

     More details

    Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Reversible watermark with large capacity based on the prediction error expansion Reviewed

    Minoru Kuribayashi, Masakatu Morii, Hatsukazu Tanaka

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E91A ( 7 )   1780 - 1790   2008.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG  

    A reversible watermark algorithm with large capacity has been developed by applying the difference expansion of a generalized integer transform. In this algorithm, a watermark signal is inserted in the LSB of the difference values among pixels. In this paper, we apply the prediction errors calculated by a predictor in JPEG-LS for embedding watermark, which contributes to increase the amount of embedded information with less degradation. As one of the drawbacks. discovered in the above conventional method is the large size of the embedded location map introduced to make it reversible, we decrease the large size of the location map by vectorization, and then modify the composition of the map using the local characteristics. We also exclude the positions such that the modification in the embedding operation cannot increase the capacity but merely degrade the image quality, which can be applicable to the conventional methods.

    DOI: 10.1093/ietfec/e91-a.7.1780

    Web of Science

    researchmap

  • EFFECTIVE DETECTION METHOD FOR CDMA-BASED FINGERPRINTING SCHEME Reviewed

    Minoru Kuribayashi, Masakatu Morii

    2008 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-4   pp.349-352   349 - 352   2008

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    One of the serious problems in a fingerprinting system is the collusion attack such that several users combine their copies of a same content to modify/delete the embedded fingerprints. In IWSEC2007, we have proposed a collusion-resilient fingerprinting scheme based on the CDMA technique. In this paper, we formalize the model of collusion from the viewpoint of a communication channel, and design an effective detector considering the hierarchically embedded signals as a fingerprint.

    DOI: 10.1109/ICME.2008.4607443

    Web of Science

    researchmap

  • On the implementation of asymmetric fingerprinting protocol. Reviewed

    Minoru Kuribayashi, Masakatu Morii

    2008 16th European Signal Processing Conference, EUSIPCO 2008, Lausanne, Switzerland, August 25-29, 2008   1 - 5   2008

  • Iterative Detection Method for CDMA-Based Fingerprinting Scheme Reviewed

    Minoru Kuribayashi, Masakatu Morii

    INFORMATION HIDING   5284   357 - 371   2008

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:SPRINGER-VERLAG BERLIN  

    Digital fingerprinting of multimedia data involves embedding information in the content signal and offers the traceability of illegal users who distribute unauthorized copies. One potential threat to fingerprinting system is collusion, whereby a group of users combines their individual copies in an attempt to remove the underlying fingerprints. Hayashi et. al have proposed hierarchical fingerprinting scheme using the CDMA technique which designed a fingerprint signal by a combination of quasi-orthogonal sequences to increase the allowable number of users. In this paper, we formalize the model of collusion from the viewpoint of a communication channel, and propose a removal operation considering the interference among fingerprints. We also explore the characteristic of the proposed detector and the effects of the removal operation on a detection sequence. By introducing two kinds of thresholds for the determination of the presence of fingerprints, the performance of the proposed detector is enhanced effectively.

    DOI: 10.1007/978-3-540-88961-8-25

    DOI: 10.1007/978-3-540-88961-8_25

    Web of Science

    researchmap

  • On the Systematic Generation of Tardos's Fingerprinting Codes Reviewed

    Minoru Kuribayashi, Naoyuki Akashi, Masakatu Morii

    2008 IEEE 10TH WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, VOLS 1 AND 2   pp.748-753   752 - 757   2008

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    Digital fingerprinting is used to trace back illegal users, where unique ID known as digital fingerprints is embedded into a content before distribution. On the generation of such fingerprints, one of the important properties is collusion-resistance. Binary codes for fingerprinting with a code length of theoretically minimum order were proposed by Tardos, and the related works mainly focused on the reduction of the code length were presented. In this paper, we present a concrete and systematic construction of the Tardos's fingerprinting code using a chaotic map. Using a statistical model for correlation scores, a proper threshold for detecting colluders is calculated. Furthermore, for the reduction of computational costs required for the detection, a hierarchical structure is introduced on the codewords. The collusion-resistance of the generated fingerprinting codes is evaluated by a computer simulation.

    DOI: 10.1109/MMSP.2008.4665174

    Web of Science

    researchmap

  • Adaptive Reversible Data Hiding for JPEG Images Reviewed

    Hirofumi Sakai, Minoru Kuribayashi, Masakatu Morii

    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3   pp.870-875   870 - 875   2008

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    This paper presents an improved method of the reversible data hiding for JPEG images proposed by Xuan, et al. The conventional method embeds data into the JPEG quantized 8 x 8 block DCT coefficients. In this method, we found that the blocks, located in the noisy part of the image, are not suitable for embedding data. The proposed method can judge whether a block consisted of 8 x 8 DCT coefficients is located in smooth part of image by using the DC coefficient of neighboring blocks. Our method can avoid the noisy part for embedding. It results in a better performance in terms of capacity-distortion behavior.

    DOI: 10.1109/ISITA.2008.4895529

    Web of Science

    researchmap

  • Hierarchical Construction of Tardos Code Reviewed

    Naoyuki Akashi, Minoru Kuribayashi, Masakatu Morii

    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3   pp.683-699   683 - 688   2008

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    Tardos proposed binary codes for fingerprinting with a code length of theoretically minimum order, and the related works mainly focused on the reductio of the code length were presented. We presented a. concrete and systematic construction of the Tardos's fingerprinting code using a chaotic map. We also introduced a. hierarchical structure to the codewords for the reduction of computational costs. However, there were room for improvement of the code-length of this structure.
    In this paper, we present the optimized hierarchical structure considering appropriate parameters under the assumption that the distribution of correlation scores follows Gaussian. In a computer simulation, we evaluate the collusion-resistance of optimized Tardos code and that of original non-layered Tardos code under theoretically equal condition.

    DOI: 10.1109/ISITA.2008.4895496

    Web of Science

    researchmap

  • Effective Assignment of Fingerprints on CDMA-based Fingerprinting Scheme Reviewed

    Hiroshi Kato, Minoru Kuribayashi, Masakatu Morii

    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3   pp.694-699   694 - 699   2008

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    Digital fingerprinting is to embed information into multimedia contents in order to trace illegal users who distribute pirated copies. One of the serious problems in a fingerprinting system is collusion attack such that several users combine individual copies to remove/modify the embedded fingerprints. As a technique for resisting collusion attacks, Kuribayashi et. al have proposed hierarchical spread spectrum fingerprinting scheme based on the CDMA technique. In this paper, we focus on the number of IDs assigned to each layer, and adjust the assignment for each layer. By optimizing the number of IDs from the theoretical viewpoint, we can effectively decrease the number of elements to be examined, which result in the decrease of the number of false-positive detection without degrading collusion resistance.

    DOI: 10.1109/ISITA.2008.4895498

    Web of Science

    researchmap

  • 一方向性関数を用いた任意の有効期間設定が可能な時限付き鍵管理技術 Reviewed

    田中 敏也, 栗林 稔, 森井 昌克

    情報処理学会論文誌   vol.48, no.9, pp.3089-3098 ( 9 )   3089 - 3098   2007.9

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:Information Processing Society of Japan (IPSJ)  

    On a broadcast-type contents distribution, a time-limited key management scheme has been proposed, which enables a broadcaster to provide contents to each user with each period. In order to realize a long expiration date with a short bit-sequence, chaotic map based schemes must design the allowable period by discrete values and tree-structured schemes must allow a user for the access of extra period. In this paper, based on tree-structured scheme we propose a new time-limited key management scheme applying one-way function. In this scheme, we realize a long expiration date with a short bit-sequence, and make it possible to design arbitrary expiration date without redundancy unless a specific condition is satisfied.

    CiNii Article

    CiNii Books

    researchmap

    Other Link: http://id.nii.ac.jp/1001/00009831/

  • Collusion-resistant fingerprinting scheme based on the CDMA-technique Reviewed

    Naoki Hayashi, Minoru Kuribayashi, Masakatu Morii

    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS   4752   28 - +   2007

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:SPRINGER-VERLAG BERLIN  

    Digital fingerprinting is a scheme to insert user's own ID information into digital contents in order to identify illegal users who distribute unauthorized copy. One of the important problems is a collusion attack such that several users combine their copies of a same content to modify/delete the embedded fingerprint. In this paper, we propose a collusion-resilient fingerprinting scheme based on the CDMA technique. By combining spread spectrum sequence with orthogonal transform, we allocate the combination of spectrum components to users as their fingerprints. At a detector side, a threshold for the detection of colluded users is determined considering the false positive probability. We then estimate the parameters in the scheme for both optimal embedding and detection, and improve the accuracy of the detection of colluders. Experimental results show the effectiveness of proposed scheme.

    DOI: 10.1007/978-3-540-75651-4_3

    Web of Science

    researchmap

  • Sanitizable signature scheme applying reversible data hiding Reviewed

    Minoru Kuribayashi, Masakatu Morii

    Proc. of ISITA2006   pp.149-154   2006.11

     More details

    Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Fingerprinting protocol based on distributed providers using oblivious transfer Reviewed

    Urara Shinmyo, Minoru Kuribayashi, Masakatu Morii, Hatsukazu Tanaka

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E89A ( 10 )   2597 - 2602   2006.10

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG  

    For the construction of a large fingerprinting system, conventional protocols need many computations to provide each fingerprinted contents to each user. In order to reduce the computational cost, we introduce a new concept of distributed providers in the fingerprinting protocol. Before a sale. our practical fingerprinting protocol using a concept of secure oblivious transfer is performed between a contents supplier and each provider. Then each provider obtains fingerprinted contents such that each bit of fingerprinting information is embedded in each segment of the contents. When a user orders some contents to the supplier, each segment of the contents is distributed from each provider specified by the supplier. The selection of providers who distribute the segments of contents is executed based on the user's identity so that the sequence of embedded bits in the collected segments may indicate the user's identity.

    DOI: 10.1093/ietfec/e89-a.10.2597

    Web of Science

    researchmap

  • Fingerprinting protocol for on-line trade using information gap between buyer and merchant Reviewed

    M Kuribayashi, H Tanaka

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E89A ( 4 )   1108 - 1115   2006.4

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG  

    The homomorphic property of the public key cryptosystem has been exploited in order to achieve asymmetric fingerprinting such that only a buyer can obtain fingerprinted content. However, this requires many computations and a wide-band network channel because the entire uncompressed content must be encrypted based on the public key cryptosystem. In this paper, instead of the homomorphic property, we introduce the management of the enciphering keys for the symmetric cryptosystem. Based on a buyer's identity, a trusted center issues the buyer a partial sequence which is one of the two elements in the entire sequence. Although a merchant shares the entire sequence with the center, he cannot extract the buyer's key sequence from it. Such an information gap enables our protocol to be asymmetric and efficient. For each packet of content, the merchant produces two marked packets that contains a "0" or '"1" information bit, and they are enciphered using the two elements from the entire sequence. Subsequently, the buyer obtains the two ciphertexts (the encrypted marked packets) containing the information bits of his identity. Since the merchant does not know the ciphertext decrypted by the buyer, an asymmetric property is achieved. In our protocol, before trade between a buyer and a merchant, the merchant can produce and compress the marked packets; this enables the reduction of both the computational costs for the encryption and the amount of data for transmission. Since only the enciphering operation is performed by a merchant in the on-line protocol, real-time operation may be possible.

    DOI: 10.1093/ietfec/e89-a.4.1108

    Web of Science

    researchmap

  • Fingerprinting protocol for images based on additive homomorphic property Reviewed

    M Kuribayashi, H Tanaka

    IEEE TRANSACTIONS ON IMAGE PROCESSING   14 ( 12 )   2129 - 2139   2005.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC  

    Homomorphic property of public-key cryptosystems is applied for several cryptographic protocols, such as electronic cash, voting system, bidding protocols, etc. Several fingerprinting protocols also exploit the property to achieve an asymmetric system. However, their enciphering rate is extremely low and the implementation of watermarking technique is difficult. In this paper, we propose a new fingerprinting protocol applying additive homomorphic property of Okamoto-Uchiyama encryption scheme. Exploiting the property ingenuously, the enciphering rate of our fingerprinting scheme can be close to the corresponding cryptosystem. We study the problem of implementation of watermarking technique and propose a successful method to embed an encrypted information without knowing the plain value. The security can also be protected for both a buyer and a merchant in our scheme.

    DOI: 10.1109/TIP.2005.859383

    Web of Science

    researchmap

  • Improvement of watermark detection ability based on blockwise image compensation for geometrical distortions Reviewed

    Ryuji Hisanaga, Minoru Kuribayashi, Hatsukazu Tanaka

    IEICE Trans. Fundamentals   vol.J88-A, no.10, pp.1146-1153   2005.10

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • Reversible watermark with large capacity using the predictive coding Reviewed

    M Kuribayashi, M Morii, H Tanaka

    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS   3783   441 - 453   2005

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:SPRINGER-VERLAG BERLIN  

    A reversible watermarking algorithm with large capacity has been developed by applying the difference expansion of a generalized integer transform. In this algorithm, a watermark signal is inserted in the LSB of the difference values among pixels. In this paper, we apply the prediction errors calculated by a predictor in JPEG-LS for embedding a watermark signal, which contributes to increase the amount of embedded information with less degradation. As one of the drawbacks discovered in the above conventional method is a large size of the embedded location map introduced to make it reversible, we decrease the large size of the location map by vectorization, and then modify the composition of the map using the local characteristic in order to enhance the performance of JBIG2.

    DOI: 10.1007/11602897_37

    Web of Science

    researchmap

  • データハイディングの諸技術とその機能

    栗林 稔

    MAGE   26(34),3-8   2005

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • Reversible watermark with large capacity using the predictive coding Reviewed

    M Kuribayashi, M Morii, H Tanaka

    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS   3783   441 - 453   2005

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:SPRINGER-VERLAG BERLIN  

    A reversible watermarking algorithm with large capacity has been developed by applying the difference expansion of a generalized integer transform. In this algorithm, a watermark signal is inserted in the LSB of the difference values among pixels. In this paper, we apply the prediction errors calculated by a predictor in JPEG-LS for embedding a watermark signal, which contributes to increase the amount of embedded information with less degradation. As one of the drawbacks discovered in the above conventional method is a large size of the embedded location map introduced to make it reversible, we decrease the large size of the location map by vectorization, and then modify the composition of the map using the local characteristic in order to enhance the performance of JBIG2.

    DOI: 10.1007/11602897_37

    Web of Science

    researchmap

  • A Novel Fingerprinting Protocol Based on Key Management Reviewed

    KURIBAYASHI Minoru, TANAKA Hatsukazu

    Proceedings of ISITA2004   646-651   2004

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • A watermarking scheme applicable for fingerprinting protocol Reviewed

    M Kuribayashi, H Tanaka

    DIGITAL WATERMARKING   2939   532 - 543   2004

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:SPRINGER-VERLAG BERLIN  

    Fingerprinting protocol applies a watermarking techniques to embed a fingerprinting information in a digital content such as music, image, movie, etc.. The cryptographic protocol is studied by many researchers, but how to apply watermarking techniques is not remarked. In this paper, we study the problem to implement the watermarking techniques in the fingerprinting protocol, and then propose an ingenious method to embed a fingerprinting information in a digital image. The alteration of the embedded information is difficult for a hostile buyer in our scheme.

    DOI: 10.1007/978-3-540-24624-4_43

    Web of Science

    researchmap

  • A watermarking scheme applicable for fingerprinting protocol Reviewed

    M Kuribayashi, H Tanaka

    DIGITAL WATERMARKING   2939   532 - 543   2004

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:SPRINGER-VERLAG BERLIN  

    Fingerprinting protocol applies a watermarking techniques to embed a fingerprinting information in a digital content such as music, image, movie, etc.. The cryptographic protocol is studied by many researchers, but how to apply watermarking techniques is not remarked. In this paper, we study the problem to implement the watermarking techniques in the fingerprinting protocol, and then propose an ingenious method to embed a fingerprinting information in a digital image. The alteration of the embedded information is difficult for a hostile buyer in our scheme.

    Web of Science

    researchmap

  • Video watermarking of which embedded information depends on the distance between two signal positions Reviewed

    M Kuribayashi, H Tanaka

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E86A ( 12 )   3267 - 3275   2003.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG  

    One of the important topics of watermarking technique is a robustness against geometrical transformations. In the previous schemes, a template matching is performed or an additional signal is embedded for the recovery of a synchronization loss. However, the former requires the original template, and the latter degrades the quality of image because both a watermark and a synchronization signal must be embedded. In the proposed scheme only a synchronization signal is embedded for the recovery of both a watermark and a synchronization loss. Then the embedded information depends on the distance between two embedded signal positions. The distance is not changed seriously by random geometrical transformations like StirMark attack unless the embedded signal is disturbed. Therefore, a watermark can be extracted correctly from such geometrically transformed image if the synchronization signal can be recovered.

    Web of Science

    researchmap

  • Watermarking schemes using the addition property among DCT coefficients Reviewed

    M Kuribayashi, H Tanaka

    ELECTRONICS AND COMMUNICATIONS IN JAPAN PART III-FUNDAMENTAL ELECTRONIC SCIENCE   86 ( 5 )   11 - 23   2003

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:SCRIPTA TECHNICA-JOHN WILEY & SONS  

    In general, a signal embedded in the low-frequency components of an image is less likely to be affected by attack. However, there is a problem of substantial degradation of image quality. In particular, if each divided block is processed, the blocking effects generated between adjacent blocks is more easily perceived. In this paper, an embedding method without blocking effects is proposed, making effective use of the superposition of the low-frequency components in the two-dimensional DCT basis images. Due to the effect of superposition of the two-dimensional DCT bases, the watermark information is not detected directly from the block with embedding, but extraction is performed from the subblocks in the block. In the proposed method, in order to provide robustness against geometrical transformation, the synchronization is recovered prior to extracting the watermark information. The robustness can be further enhanced by means of error correcting code. (C) 2003 Wiley Periodicals, Inc.

    DOI: 10.1002/ecjc.10048

    Web of Science

    researchmap

  • A new digital watermarking scheme applying locally the wavelet transform Reviewed

    M Kuribayashi, H Tanaka

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E84A ( 10 )   2500 - 2507   2001.10

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG  

    Generally, the wavelet transform is applied for watermarking, where a whole image is transformed to the frequency domain. However, many schemes which adopt the wavelet transform are weak for StirMark attack designed to affect locally such as rotation, extension, reduction, etc. In this paper, we propose a new scheme which applies the wavelet transform locally and has a tolerance for StirMark attack. How to maintain the quality of the watermarked image is also shown.

    Web of Science

    researchmap

  • A New Anonymous Fingerprinting Scheme with High Enciphering Rate. Reviewed

    Minoru Kuribayashi, Hatsukazu Tanaka

    Progress in Cryptology - INDOCRYPT 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings   30 - 39   2001

     More details

  • A watermarking scheme based on the characteristic of addition among DCT coefficients Reviewed

    M Kuribayashi, H Tanaka

    INFORMATION SECURITY, PROCEEDINGS   1975   1 - 14   2001

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:SPRINGER-VERLAG BERLIN  

    Generally, low frequency domain may be useful to embed a watermark in an image. However, if a watermark is embedded into low frequency components, blocking effects may occur in the image. Then considering blocking effects, we study some characteristics among DCT coefficients and find some interesting mutual relations. Here, the robustness of many schemes based on the orthogonal transformations such as DCT may be doubtful against geometric transformations. For the distortions produced by some geometric transformations, we propose a searching protocol to find the watermarked block which is rotated and shifted. In the proposed scheme, a watermark can remain in the attacked image with very high probability in our scheme. Further, the watermark becomes more robust than the above scheme using error-correction.

    DOI: 10.1007/3-540-44456-4_1

    Web of Science

    researchmap

▼display all

Books

  • Data Hiding and Its Applications: Digital Watermarking and Steganography

    ( Role: Joint author)

    MDPI  2022.1  ( ISBN:9783036529370

     More details

  • Frontiers in Fake Media Generation and Detection

    ( Role: Contributor ,  Two Chapters: Adversarial Attacks, Defense Against Adversarial Attacks)

    Springer  2022  ( ISBN:9789811915246

     More details

  • Signal Processing - Chapter 10 Recent Fingerprinting Techniques with Cryptographic Protocol -

    Minoru Kuribayashi( Role: Joint author)

    In-Tech Publisher  2010.2 

     More details

    Language:English Book type:Scholarly book

    researchmap

MISC

  • 重み一定符号を用いたDNN電子透かしの検出法 International coauthorship

    安井達哉, Malik Asad, 栗林 稔

    第21回情報科学技術フォーラム(FIT2022)   2022.9

     More details

    Authorship:Last author   Language:Japanese  

  • 敵対的ノイズとJPEG圧縮由来の歪みの相関を用いた敵対的事例検出の研究

    角森健太, 山﨑裕真, 栗林稔, 舩曵信生, 越前功

    信学技報, EMM   2022.5

  • 顔識別回避のためのパッチ型敵対的事例の生成及び堅牢性の検証

    瀧脇大登, 栗林稔, 舩曵信生

    信学技報, EMM   2022.5

  • オンライン会議システム上の画面キャプチャによる情報漏洩の対策の一検討

    鎌苅康大, 栗林稔, 舩曵信生

    2022年暗号と情報セキュリティシンポジウム (SCIS2022)   2022.1

  • A Study on Convergency of DNN Watermarking Without Embedding Loss Function

    聴覚研究会資料 = Proceedings of the auditory research meeting   51 ( 7 )   393 - 398   2021.11

     More details

    Language:Japanese   Publisher:日本音響学会  

    CiNii Article

    CiNii Books

    researchmap

  • 複数のAuto Encoderに対する応答特性を用いた敵対的事例の検出法

    山﨑裕真, 栗林稔, 舩曵信生, グエン フイ ホン, 越前功

    信学技報, EMM   2021.5

  • DCT係数の統計的な偏り観測における二重JPEG圧縮履歴解析に適した特徴成分選出に関する考察

    竹下大地, 栗林稔, 舩曵信生

    信学技報, EMM   2021.5

  • 空調環境適正化ガイダンスシステムでの換気指示機能の実装

    坂上暢規, 霍元智, 舩曵信生, 栗林稔

    信学技報, LOIS   2021.5

  • プログラミング学習支援システムの解答分析機能の拡張

    西村一輝, 岩本晃司郎, H. H. S. Kyaw, 舩曵信生, 栗林稔

    信学技報, LOIS   2021.5

  • IEEE802.15.4プロトコルを用いた屋内位置検知システムの複数ユーザ対応のための拡張

    濵﨑和志, P. Puspitaningayu, 舩曵信生, 栗林稔

    信学技報, LOIS   2021.5

  • A study of parameter optimization method for fingerprint-based indoor localization system using IEEE 802.15.4 devices

    Y. Huo, P. Puspitaningayu, K. Hamazaki, N. Funabiki, M. Kuribayashi, K. Kojima

    Technical Report of IEICE, LOIS   2021.5

  • 監視カメラにおける映り込み領域に対する顔検出とプライバシ保護に関する考察

    中井康貴, 栗林稔, 舩曵信生, 藤井爽平, 石原洋之

    信学技報, EMM   2021.3

  • 複数のフィルタ強度によるCNN画像分類器の応答特性を用いた敵対的事例の検出法

    東亮憲, 栗林稔, 舩曵信生, Huy Hong Nguyen, 越前功

    信学技報, EMM   2021.3

  • 顔領域に注目してファインチューニングした事前学習済みCNNモデルに基づくディープフェイク動画検出

    河田健斗, 栗林稔, 舩曵信生

    2021年暗号と情報セキュリティシンポジウム (SCIS2021)   2021.1

  • An Implementation of Fingerprint-Based Indoor Positioning System Using IEEE 802.15.4

    P. Puspitaningayu, K. Hamazaki, N. Funabiki, H. Htet, M. Kuribayashi

    Technical Report of IEICE, LOIS   2021.1

  • Implementation and Performance Evaluation of Unit Testing in Android Programming Learning Assistance System

    Y. W. Syaifudin, N. Funabiki, M. Kuribayashi

    Technical Report of IEICE, LOIS   2021.1

  • An Implementation of Hint Function for Element Fill-in-Blank Problems at Offline Answering Function in Java Programming Learning Assistant System

    S.S. Wint, N. Funabiki, M. Kuribayashi

    Technical Report of IEICE, LOIS   2021.1

  • A Study of Code Completion Problem for C Programming Learning Assistant System

    H. H. S. Kyaw, N. Funabiki, M. Kuribayashi, T. Myint, H. A. Thant

    Technical Report of IEICE, LOIS   2021.1

  • Detection of Adversarial Examples in CNN Image Classifiers Using Features Extracted with Multiple Strengths of Filter

    東亮憲, 栗林稔, 舩曵信生, NGUYEN Huy Hong, 越前功

    電子情報通信学会技術研究報告(Web)   120 ( 418(EMM2020 67-79) )   2021

  • A Study of Face Detection and Its Privacy Protection in Photos Taken by Wide-Angle Surveillance Camera

    中井康貴, 栗林稔, 舩曳信生, 藤井爽平, 石原洋之

    電子情報通信学会技術研究報告(Web)   120 ( 418(EMM2020 67-79) )   1865 - 1871   2021

     More details

  • Extensions of Answer Analysis Function for Programming Learning Assistant System

    西村一輝, 岩本晃司郎, HTOO SANDI KYAW Htoo, 舩曵信生, 栗林稔

    電子情報通信学会技術研究報告(Web)   121 ( 12(LOIS2021 1-11) )   2021

  • An Extension of Indoor Localization System Using IEEE802.15.4 Protocol for Multiple Users

    濱崎和志, PUSPITANINGAYU Pradini, 舩曵信生, 栗林稔

    電子情報通信学会技術研究報告(Web)   121 ( 12(LOIS2021 1-11) )   2021

  • An Implementation of Ventilation Request Function in Air-Conditioning Guidance System

    坂上暢規, HUO Yuanzhi, 舩曵信生, 栗林稔

    電子情報通信学会技術研究報告(Web)   121 ( 12(LOIS2021 1-11) )   2021

  • A Study on Feature Extraction Suitable for Double JPEG Compression Analysis Based on Statistical Bias Observation of DCT Coefficients

    竹下大地, 栗林稔, 舩曵信生

    電子情報通信学会技術研究報告(Web)   121 ( 28(IT2021 1-14) )   1808 - 1814   2021

     More details

  • A Study of Detecting Adversarial Examples Using Sensitivities to Multiple Auto Encoders

    山崎裕真, 栗林稔, 舩曵信生, NGUYEN Huy HONG, 越前功

    電子情報通信学会技術研究報告(Web)   121 ( 28(IT2021 1-14) )   2021

  • Poster Presentation : Evaluation on JPEG Image Compression History Analysis Using Histogram of DCT Coefficients with Different Block Size

    聴覚研究会資料 = Proceedings of the auditory research meeting   50 ( 6 )   337 - 342   2020.11

     More details

    Language:Japanese   Publisher:日本音響学会  

    CiNii Article

    CiNii Books

    researchmap

  • ブロックサイズの違いがDCT係数の頻度分布を利用したJPEG画像圧縮履歴解析に与える影響

    中嶋直也, 栗林稔, 舩曵信生

    信学技報, EMM   2020.11

  • DM-QIMによるDNNモデルの全結合層に対する電子透かし法

    田中拓朗, 栗林稔, 舩曵信生

    信学技報, EMM   2020.9

  • An Implementation of Improved Recommendation Function for Element Fill-in-Blank Problem at Offline Answering Function in Java Programming Learning Assistant System

    S.S. Wint, N. Funabiki, M. Kuribayashi, Y. W. Syaifudin

    Technical Report of IEICE, KBSE   2020.9

  • A Study of Element Fill-in-blank Problem with Blank Element Selection Algorithm for C Programming Learning Assistant System

    H. H. S. Kyaw, N. Funabiki, M. Kuribayashi

    Technical Report of IEICE, ET   2020.9

  • A Study of Grammar-Concept Understanding Problem for Java Programming Learning Assistant System

    S. T. Aung, N. Funabiki, Y. W. Syaifudin, M. Kuribayashi

    Technical Report of IEICE, ET   2020.9

  • DM-QIM Watermarking for Fully Connected Layers of DNN Model

    映像情報メディア学会技術報告 = ITE technical report   44 ( 18 )   21 - 26   2020.9

     More details

    Language:Japanese   Publisher:映像情報メディア学会  

    CiNii Article

    CiNii Books

    researchmap

  • An Investigation of Fingerprint-based Room Detection Method Using IEEE 802.15.4 Wireless Network

    P. Puspitaningayu, N. Funabiki, R. W. Sudibyo, M. Kuribayashi

    Technical Report of IEICE, NS   2020.6

  • An Extension of Throughput Estimation Model for Three-Link Concurrent Communications under Partially Overlapping Channels without Channel Bonding in IEEE 802.11n WLAN

    I. M. Kwenga, N. Funabiki, H. Briantoro, M. M. Rahman, M. Kuribayashi

    Technical Report of IEICE, NS   2020.6

  • An Improvement of Air-Conditioning Guidance System with Outdoor Discomfort Index for Avoiding False Messages

    S. Huda, N. Funabiki, M. Kuribayashi, R. W. Sudibyo, N. Ishihara

    Technical Report of IEICE, NS   2020.6

  • Design and Implementation of Improved User-PC Computing System

    H. Htet, N. Funabiki, A. Kamoyedji, M. Kuribayashi

    Technical Report of IEICE, NS   2020.6

  • An Extension of Transmission Power Optimization Method for Two Concurrently Communicating Access-Points Associated with Multiple Hosts in Wireless Local-Area Network

    H. Briantoro, N. Funabiki, K. I. Munene, R. W. Sudibyo, M. M. Rahman, M. Kuribayashi

    Technical Report of IEICE, NS   2020.6

  • 非可逆圧縮の圧縮率の変化に伴う挙動解析に基づく敵対的事例の検知法

    東亮憲, 栗林稔, 舩曵信生, Huy Hong Nguyen, 越前功

    信学技報, EMM   2020.3

  • An Extension of Recommendation Function in Topic Coverage for Element Fill- in-Blank Problems in Java Programming Learning Assistant System

    S. S. Wint, N. Funabiki, M. Kuribayashi

    Technical Report of IEICE, ET   2020.3

  • Word文書ファイルの個別入力データ抽出法の提案

    李玥昊, 舩曵信生, 栗林稔, 石原信也

    信学技報, ET   2020.3

  • M‐QIMによるディープニューラルネットワークの重みに対する電子透かし法

    田中拓朗, 安井達哉, 栗林稔, 舩曵信生

    信学技報, EMM   2020.3

  • DCT係数のヒストグラムを利用したJPEG画像のCNNに基づく編集履歴解析

    小浦啓太郎, 栗林稔, 舩曵信生

    信学技報, EMM   2020.3

  • ビデオカメラを用いたディスプレイ再撮により作成された違法動画の検出法

    鎌苅康大, 河田健斗, 栗林稔, 舩曵信生

    信学技報, EMM   2020.3

  • Evaluation on JPEG Image Compression History Analysis Using Histogram of DCT Coefficients with Different Block Size

    中嶋直也, 栗林稔, 舩曵信生

    電子情報通信学会技術研究報告(Web)   120 ( 241(EA2020 21-45) )   2020

  • A Database-less Implementation for Portable Server of Java Programming Learning Assistant System

    岩本晃司郎, 舩曵信生, 石原信也, 栗林稔

    電気・情報関連学会中国支部連合大会講演論文集(CD-ROM)   71st   2020

  • DM-QIM Watermarking for Weights of Deep Neural Network

    田中拓朗, 安井達哉, 栗林稔, 舩曵信生

    電子情報通信学会技術研究報告   119 ( 463(EMM2019 102-129)(Web) )   2020

  • Study of CNN-based Analysis on Editing History of JPEG File Using Histogram of DCT Coefficients

    小浦啓太郎, 栗林稔, 舩曵信生

    電子情報通信学会技術研究報告   119 ( 463(EMM2019 102-129)(Web) )   2020

  • Detection of Illegal Movies Captured by Video Camera from Display Device

    鎌苅康大, 河田健斗, 栗林稔, 舩曵信生

    電子情報通信学会技術研究報告   119 ( 463(EMM2019 102-129)(Web) )   2020

  • A proposal of individual input data extraction method in Word document file

    LI Yuehao, 舩曵信生, 栗林稔, 石原信也

    電子情報通信学会技術研究報告   119 ( 468(ET2019 76-105)(Web) )   2020

  • DM-QIM Watermarking for Fully Connected Layers of DNN Model

    田中拓朗, 栗林稔, 舩曵信生

    電子情報通信学会技術研究報告(Web)   120 ( 151(EMM2020 29-35) )   2020

  • Detecting Adversarial Examples Based on Sensitivities to Lossy Compression Algorithms

    東亮憲, 栗林稔, 舩曵信生, NGUYEN Huy Hong, 越前功

    電子情報通信学会技術研究報告   119 ( 463(EMM2019 102-129)(Web) )   2020

  • A Proposal of Air Conditioner Overuse Alarm System Using Raspberry Pi

    HUDA Samsul, FUNABIKI Nobuo, KURIBAYASHI Minoru, SUDIBYO Rahardhita Widyatra, ISHIHARA Nobuya

    電子情報通信学会大会講演論文集(CD-ROM)   2020   2020

  • An Improvement of Air-Conditioning Guidance System with Outdoor Discomfort Index for Avoiding False Messages

    HUDA Samsul, FUNABIKI Nobuo, KURIBAYASHI Minoru, WIDYATRA SUDIBYO Rahardhita, ISHIHARA Nobuya

    電子情報通信学会技術研究報告(Web)   120 ( 69(NS2020 22-30) )   2020

  • Cyclically Permutable CodeとLDPC符号における同期回復と誤り訂正能力の比較

    須磨尚大, 栗林稔, 舩曵信生

    第42回情報理論とその応用シンポジウム (SITA2019)   2019.11

  • Detecting Adversarial Example Based on Changes of CNN Classification Results Caused by JPEG Compression

    コンピュータセキュリティシンポジウム2019論文集   2019 ( 2019 )   975 - 981   2019.10

     More details

    Language:Japanese  

    CiNii Article

    researchmap

  • Analysis on Editing History of JPEG File Based on the Bias in Histogram of DCT Coefficients

    コンピュータセキュリティシンポジウム2019論文集   2019 ( 2019 )   969 - 974   2019.10

     More details

    Language:Japanese  

    CiNii Article

    researchmap

  • Extraction of Characteristic Vectors and Its Dimension Reduction for Estimating Collusion Strategy in Fingerprinting Codes

    コンピュータセキュリティシンポジウム2019論文集   2019 ( 2019 )   982 - 989   2019.10

     More details

    Language:Japanese  

    CiNii Article

    researchmap

  • DCT係数のヒストグラムの偏りを利用したJPEG画像の編集履歴解析

    小浦啓太郎, 栗林稔, 舩曵信生

    コンピュータセキュリティシンポジウム (CSS2019)   2019.10

  • JPEG圧縮による画像分類器の識別結果の変動解析に基づく敵対的事例の検知法

    東亮憲, 栗林稔, 舩曵信生, Nguyen Huy H., 越前功

    コンピュータセキュリティシンポジウム (CSS2019)   2019.10

  • 電子指紋符号の結託攻撃パラメータ推定のための特徴ベクトル導出及びその次元削減

    安井達哉, 栗林稔, 舩曵信生

    コンピュータセキュリティシンポジウム (CSS2019)   2019.10

  • An Implementation of Letter Portion Practice Function in Calligraphy Learning Assistant System Using Projection Mapping

    H. Samsul, N. Funabiki, and M. Kuribayashi

    Forum of Information Technology (FIT2019)   2019.9

  • An Implementation and Evaluation of Basic Activity Topic for Interactive Application Stage in Android Programming Learning Assistance System

    W. S. Yan, N. Funabiki, and M. Kuribayashi

    Forum of Information Technology (FIT2019)   2019.9

  • An Implementation of Hint Function for Code Completion Problem in Java Programming Learning Assistant System

    H. H. S. Kyaw, N. Funabiki, and M. Kuribayashi

    Forum of Information Technology (FIT2019)   2019.9

  • Extension of Student Answer Analyzing Function to Five Problem Types in Desktop-version Java Programming Learning Assistant System

    E. E. Mon, W. S. Sandy, N. Funabiki, and M. Kuribayashi

    Forum of Information Technology (FIT2019)   2019.9

  • Investigations of Difficulty Level Update in Recommendation Function for Element Fill-in-Blank Problem in Java Programming Learning Assistant System

    S. S. Wint, N. Funabiki, and M. Kuribayashi

    Forum of Information Technology (FIT2019)   2019.9

  • Three Improvements of Code Correction Problem in Java Programming Learning Assistant System

    情報処理学会論文誌プログラミング(PRO)   12 ( 3 )   17 - 17   2019.7

     More details

    Language:Japanese  

    本グループでは,Javaプログラミング教育の高度化を狙いとして,Webを用いたJavaプログラミング学習支援システムJPLASを開発している.JPLASでは,学習者の作成した解答コードに対し,テストコードを用いたソフトウェアテストによる自動採点を行っている.その際,学習者は,テストコード中の情報(クラス,メソッド,変数の名称,アクセス修飾子,データ型など)を読み取り,解答コードに反映する必要がある.そのため,テストコードと誤りのある問題コードを与え,後者の修正を求める,コード修正問題を提案している.また,問題コード生成のために,ソースコードに誤りを施すアルゴリズムを提案している.本研究では,コード修正問題において,1)問題コードの多様化のための誤り情報の追加,2)テストコードを用いた問題コードの検証による正当性検証,3)問題コードの難易度の制御機能,の3つの改良を提案する.それらをJPLASに実装し,本学科Javaプログラミング授業での利用により,本提案の有効性を検証する.
    To enhance Java programming educations, we have developed the Web-based Java Programming Learning Assistant System (JPLAS). JPLAS automatically marks the answer code of a student through software test using the test code. Thus, a student has to extract the necessary information from the test code to implement the answer code. To help a novice student, we proposed the code correction problem in the previous study, where a source code with errors, called a problem code, is given to a student with a test code, and is requested to be corrected to pass the test. We also proposed the algorithm to generate the problem code by making errors in the source code. In this study, we propose three improvements in the code correction problem: 1) to allow additional code items for errors for variation of the problem code, 2) to verify the correctness of the problem code by testing it, and 3) to implement the problem difficulty control function. We verify the effectiveness through applications in the Java programing course in our department.

    CiNii Article

    CiNii Books

    researchmap

  • Implementations of Answering Status Visualization and Problem Recommendation Functions in Java Programming Learning Assistant System

    情報処理学会論文誌プログラミング(PRO)   12 ( 3 )   16 - 16   2019.7

     More details

    Language:Japanese  

    Javaは,可搬性,堅牢性,安全性に優れたプログラミング言語として,業務系システム,組み込みシステムなどに幅広く利用されており,そのプログラミング教育が重要である.そこで本研究室では,Webを用いたJavaプログラミング学習支援システムJPLAS(Java Programming Learning Assistant System)を開発し,授業での運用を行っている.現状のJPLASでは,教員がそれぞれの学生の問題解答状況を一覧で把握するための機能を有していない.また,全学生に同一の問題が出されており,個々の学生の学習レベルに適した問題が出題されていない.本発表では,以上の課題を解決するために,JPLASにおいて,エレメント補充問題を対象として,学生の解答状況の可視化機能,および,各学生に次に解くべき問題の推薦機能を実装する.特に後者では,これまでの学生の解答結果の分析により,各問題の難易度の算出法を提案し,各学生の解答履歴から,その学生に適した難易度の問題を次に解くべき問題として推薦する.評価として,教員に対して,解答状況可視化機能を用いたプログラミング演習を行ってもらう.また,学生に対して,問題推薦機能を用いた問題演習を行ってもらう.その後,アンケートの実施および解答結果の分析を行い,有効性を検証する.今後の課題として,問題難易度設定方法の再検討,エレメント補充問題以外の問題も対応可能な問題推薦機能への拡張があげられる.
    As a portable, solid, secure programming language, Java is used widely such as business system and embedded system, thus its programming education is important. Therefore, we have developed the Web-based Java Programming Learning Assistant System (JPLAS) and used it in the Java programming course. JPLAS has no function which teacher can follow answering status of problems for each student. Additionally, it set the same problems to all of students, thus, it doesn't set the suitable problems corresponding to learning level for each student. In this presentation, we implement the answering status visualization function for each student and the recommendation function which recommend problems each student should solve the next for element fill in blank problems in JPLAS. In particular in the latter one, according to analysis of students' answering results so far, we propose the calculation method of problem difficulty and the system recommend the suitable problem to solve the next with learning level and answering history of each student. As an evaluation, we apply the answering status visualization function to the teacher in the programming exercise. Furthermore, we inspect the effectiveness by conducting a questionnaire survey and analyzing the answering results after students solve some of problems using problem recommendation function. In the future works, revision of the way to set up the problem level of difficulty and extension of problem recommendation function to follow other type of problems are some important tips.

    CiNii Article

    CiNii Books

    researchmap

  • Improved DM-QIM Watermarking for PDF Document (情報理論)

    クリバヤシ ミノル, ウォン コックシェイク

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   119 ( 47 )   49 - 53   2019.5

     More details

    Language:English   Publisher:電子情報通信学会  

    CiNii Article

    CiNii Books

    researchmap

  • Improved DM-QIM watermarking for PDF document International coauthorship

    M. Kuribayashi and KokSheik Wong

    Technical Report of IEICE, EMM   2019.5

     More details

    Authorship:Lead author, Corresponding author   Language:English  

  • CNNを用いたCGと写真を識別するためのパッチサイズの考察

    河田健斗, 栗林稔, 舩曵信生

    信学技報, EMM   2019.3

  • 雑音環境における電子指紋符号に対する結託攻撃の攻撃戦略推定

    安井達哉, 栗林稔, 舩曵信生

    信学技報, EMM   2019.3

  • Optimal error correcting decoder with self-synchronization capability

    M. Kuribayashi and N. Funabiki

    Technical Report of IEICE, EMM   2019.1

     More details

    Authorship:Lead author, Corresponding author   Language:English  

  • Delegated tracing protocol for asymmetric fingerprinting

    M. Kuribayashi and N. Funabiki

    The 2019 Symp. on Cryptography and Information Security (SCIS2019)   2019.1

     More details

    Authorship:Lead author, Corresponding author   Language:English  

  • Cyclically Permutable codeとLDPC符号における同期回復と誤り訂正能力の比較

    須磨尚大, 栗林稔, 舩曵信生

    情報理論とその応用シンポジウム予稿集(CD-ROM)   42nd   2019

  • Estimation of Collusion Strategy for Fingerprinting Codes under Noisy Environment

    安井達哉, 栗林稔, 舩曵信生

    電子情報通信学会技術研究報告   118 ( 494(EMM2018 91-115)(Web) )   2019

  • A Study of Patch Size for Distinguishing CGs from Real Photos Using CNN

    河田健斗, 栗林稔, 舩曵信生

    電子情報通信学会技術研究報告   118 ( 494(EMM2018 91-115)(Web) )   2019

  • An Implementation of Letter Portion Practice Function in Calligraphy Learning Assistant System Using Projection Mapping

    HUDA Samsul, FUNABIKI Nobuo, KURIBAYASHI Minoru

    情報科学技術フォーラム講演論文集   18th   2019

  • An Evaluation of Calligraphy Learning Assistant System Using Projection Mapping

    HUDA Samsul, FUNABIKI Nobuo, KURIBAYASHI Minoru, KYAW Htoo Htoo Sandi

    電子情報通信学会大会講演論文集(CD-ROM)   2019   2019

  • A proposal of network configuration optimization algorithm for wireless local-area network with three Raspberry Pi access-points under concurrent communications

    M. Saha, N. Funabiki, R. W. Sudibyo, M. Kuribayashi, and W.-C. Kao

    Technical Report of IEICE, NS   2018.12

     More details

    Language:English  

  • A TCP fairness control method for concurrent communications in elastic WLAN system using Raspberry Pi access-point

    R. W. Sudibyo, N. Funabiki, M. Kuribayashi, K. I. Munene, M. M. Islam, and W.-C. Kao

    Technical Report of IEICE, NS   2018.12

     More details

    Language:English  

  • An extension of throughput drop estimation model for three-link concurrent communications under partially overlapping channels and channel bonding in IEEE 802.11n WLAN

    K. I. Munene, N. Funabiki, R. W. Sudibyo, M. M. Islam, M. Kuribayashi, and W.-C. Kao

    Technical Report of IEICE, NS   2018.12

     More details

    Language:English  

  • A proposal of transmission power minimization extension in active access-point configuration algorithm for elastic wireless local-area network system

    M. M. Islam, N. Funabiki, M. Kuribayashi, and W.-C. Kao

    Technical Report of IEICE, NS   2018.12

     More details

    Language:English  

  • Segment-Wise Watermarking Scheme for PDF Document File Considering The Applicability to Fingerprinting System

    聴覚研究会資料 = Proceedings of the auditory research meeting   48 ( 7 )   655 - 660   2018.11

     More details

    Language:Japanese   Publisher:日本音響学会  

    CiNii Article

    CiNii Books

    researchmap

  • Implementation and Evaluation of Fingerprinting System for Preventing Internal Leakage of Sensitive Data

    聴覚研究会資料 = Proceedings of the auditory research meeting   48 ( 7 )   661 - 666   2018.11

     More details

    Language:Japanese   Publisher:日本音響学会  

    CiNii Article

    CiNii Books

    researchmap

  • 組織内の情報漏洩を抑止するための電子指紋システムの実装評価

    上田貴大, 栗林稔, 舩曵信生

    信学技報, EMM   2018.11

     More details

    Language:Japanese  

  • PDF文書に対する電子指紋システムへの適用を考慮した行セグメント分割埋め込み法

    福島拓哉, 栗林稔, 舩曵信生

    信学技報, EMM   2018.11

  • Dynamic Estimation of Collusion Strategy for the Detection of Colluders in Fingerprinting Codes

    安井 達哉, 栗林 稔, 舩曵 信生, 越前 功

    映像情報メディア学会技術報告 = ITE technical report   42 ( 31 )   65 - 70   2018.9

     More details

    Language:Japanese   Publisher:映像情報メディア学会  

    CiNii Article

    CiNii Books

    researchmap

  • A proposal of calligraphy learning assistant system using projection mapping

    S. Huda, L. Xiqin, N. Funabiki, and M. Kuribayashi

    Technical Report of IEICE, MVE   2018.9

  • Implementations of automatic system software update and user authentication functions in elastic wireless local-area network system

    M. M. Islam, N. Funabiki, M. Kuribayashi, R. W. Sudibyo, and K. I. Munene

    Technical Report of IEICE, SRW   2018.8

     More details

    Language:English  

  • Modifications of throughput estimation model for concurrent communications of multiple Raspberry Pi access-points in wireless local-area network

    M. Saha, R. W. Sudibyo, N. Funabiki, and M. Kuribayashi

    Technical Report of IEICE, SRW   2018.8

     More details

    Language:English  

  • A study of channel bonding configuration and performance for Raspberry Pi access-point in wireless local-area network

    R. W. Sudibyo, K. S. Lwin, N. Funabiki, M. Saha, and M. Kuribayashi

    Technical Report of IEICE, SRW   2018.8

     More details

    Language:English  

  • A throughput estimation model for two concurrently communicating links under partially overlapping channels and channel bonding in IEEE 802.11n WLAN

    K. I. Munene, K. S. Lwin, N. Funabiki, and M. Kuribayashi

    Technical Report of IEICE, SRW   2018.8

     More details

    Language:English  

  • A Study on Synchronization and Error Correction for Cyclically Permutable Code

    須磨 尚大, 栗林 稔, 舩曵 信生

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   118 ( 31 )   13 - 18   2018.5

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    CiNii Books

    researchmap

  • A Study of Aesthetic QR Code Considering Local Characteristic of Image

    栗林 稔, 村上 元貴, 舩曵 信生

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   118 ( 31 )   19 - 24   2018.5

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    CiNii Books

    researchmap

  • Efficient schemes for encoding and decoding of non-adaptive group testing

    T. V. Bui, M. Kuribayashi, T. Kojima, and I. Echizen

    2018.5

     More details

    Language:English  

  • Poster Presentation : Estimation of Collusion Strategy for Fingerprinting Codes

    安井 達哉, 栗林 稔, 舩曵 信生

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   117 ( 476 )   17 - 22   2018.3

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    CiNii Books

    researchmap

  • Tutorial Lecture : Tolerance against Attacks in Data Hiding Technique : Robustness versus Security

    栗林 稔

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   117 ( 476 )   67 - 72   2018.3

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    CiNii Books

    researchmap

  • Poster Presentation : Analysis on History of JPEG Compression Considering the Characteristic of Quantization Table

    小浦 啓太郎, 栗林 稔, 舩曵 信生

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   117 ( 476 )   45 - 50   2018.3

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    CiNii Books

    researchmap

  • A Study of Tracing Algorithm for Fingerprinting Code Considering Erasure Symbols (マルチメディア情報ハイディング・エンリッチメント)

    栗林 稔, 舩曵 信生

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   117 ( 425 )   13 - 18   2018.1

     More details

    Language:English   Publisher:電子情報通信学会  

    CiNii Article

    researchmap

  • An Introduction of Source Code Management System for Java Programming Learning Assistant System : JPLAS

    松本 慎平, 舩曵 信生, 栗林 稔, 石原 信也

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   117 ( 381 )   167 - 172   2018.1

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    CiNii Books

    researchmap

  • A Proposal of Code Correction Problem for Test Code Study in Java Programming Learning Assistant System

    何 賽, 舩曵 信生, 栗林 稔, 石原 信也

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   117 ( 380 )   161 - 166   2018.1

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    CiNii Books

    researchmap

  • An Extension of Test Code Generation Support Tool Using Test Log to Java Method with Returning Value

    日下 涼太, 舩曵 信生, 栗林 稔, 石原 信也

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   117 ( 380 )   127 - 132   2018.1

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    CiNii Books

    researchmap

  • An Extension of Test Code Generation Support Tool Using Test Log to Java Method with Returning Value

    日下 涼太, 舩曵 信生, 栗林 稔, 石原 信也

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   117 ( 381 )   127 - 132   2018.1

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    CiNii Books

    researchmap

  • An Introduction of Source Code Management System for Java Programming Learning Assistant System : JPLAS

    松本 慎平, 舩曵 信生, 栗林 稔, 石原 信也

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   117 ( 380 )   167 - 172   2018.1

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    CiNii Books

    researchmap

  • A Proposal of Code Correction Problem for Test Code Study in Java Programming Learning Assistant System

    何 賽, 舩曵 信生, 栗林 稔, 石原 信也

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   117 ( 381 )   161 - 166   2018.1

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    CiNii Books

    researchmap

  • An Introduction of Source Code Management System for Java Programming Learning Assistant System: JPLAS

    松本慎平, 舩曵信生, 栗林稔, 石原信也

    電子情報通信学会技術研究報告   117 ( 380(MSS2017 47-76) )   167‐172   2018

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • A Proposal of Code Correction Problem for Test Code Study in Java Programming Learning Assistant System

    HE Sai, 舩曵信生, 栗林稔, 石原信也

    電子情報通信学会技術研究報告   117 ( 380(MSS2017 47-76) )   161‐166   2018

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • An Extension of Test Code Generation Support Tool Using Test Log to Java Method with Returning Value

    日下涼太, 舩曵信生, 栗林稔, 石原信也

    電子情報通信学会技術研究報告   117 ( 380(MSS2017 47-76) )   127‐132   2018

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • Estimation of Collusion Strategy for Fingerprinting Codes

    安井達哉, 栗林稔, 舩曵信生

    電子情報通信学会技術研究報告   117 ( 476(EMM2017 77-93) )   17‐22   2018

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • A Study of Aesthetic QR Code Considering Local Characteristic of Image

    栗林稔, 村上元貴, 舩曵信生

    電子情報通信学会技術研究報告   118 ( 31(IT2018 1-11) )   19‐24   2018

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • A Study on Synchronization and Error Correction for Cyclically Permutable Code

    須磨尚大, 栗林稔, 舩曵信生

    電子情報通信学会技術研究報告   118 ( 31(IT2018 1-11) )   13‐18   2018

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • Analysis on History of JPEG Compression Considering the Characteristic of Quantization Table

    小浦啓太郎, 栗林稔, 舩曵信生

    電子情報通信学会技術研究報告   117 ( 476(EMM2017 77-93) )   45‐50   2018

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • Tolerance against Attacks in Data Hiding Technique-Robustness versus Security-

    栗林稔

    電子情報通信学会技術研究報告   117 ( 476(EMM2017 77-93) )   67‐72   2018

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • Dynamic Estimation of Collusion Strategy for the Detection of Colluders in Fingerprinting Codes

    安井達哉, 栗林稔, 舩曵信生, 越前功

    電子情報通信学会技術研究報告   118 ( 223(IE2018 30-43)(Web) )   2018

  • Implementation and Evaluation of Fingerprinting System for Preventing Internal Leakage of Sensitive Data

    上田貴大, 栗林稔, 舩曵信生

    電子情報通信学会技術研究報告   118 ( 312(EA2018 63-80) )   43 - 48   2018

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    CiNii Books

    J-GLOBAL

    researchmap

  • Segment-Wise Watermarking Scheme for PDF Document File Considering The Applicability to Fingerprinting System

    福島拓哉, 栗林稔, 舩曵信生

    電子情報通信学会技術研究報告   118 ( 312(EA2018 63-80) )   37 - 42   2018

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    CiNii Books

    J-GLOBAL

    researchmap

  • A Proposal of Calligraphy Learning Assistant System using Projection Mapping

    HUDA Samsul, XIQIN Lu, FUNABIKI Nobuo, KURIBAYASHI Minoru

    電子情報通信学会技術研究報告   118 ( 211(MVE2018 12-24) )   2018

  • Compression-Friendly Reversible Data Hiding for Privacy Protection (マルチメディア情報ハイディング・エンリッチメント)

    栗林 稔, ジョシ バイブハブB, ラバル メイフィルS

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   117 ( 282 )   33 - 38   2017.11

     More details

    Language:English   Publisher:電子情報通信学会  

    CiNii Article

    researchmap

  • A study of obfuscation for the security enhancement of watermarking schemes

    山下 晃一郎, 栗林 稔, 舩曵 信生

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   117 ( 282 )   53 - 58   2017.11

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    researchmap

  • A Study of DCT-OFDM-Based Watermarking Scheme Assisted by Error Correcting Code

    重本 章吾, 栗林 稔, 舩曵 信生

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   117 ( 282 )   47 - 52   2017.11

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    researchmap

  • Making of Code Clone Elimination Problem Function for Java Programming Learning Assistant System

    石原 信也, 舩曵 信生, 栗林 稔

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   117 ( 248 )   25 - 30   2017.10

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    researchmap

  • Making of Code Clone Elimination Problem Function for Java Programming Learning Assistant System

    石原 信也, 舩曵 信生, 栗林 稔

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   117 ( 249 )   25 - 30   2017.10

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    CiNii Books

    researchmap

  • A software architecture for Java programming learning assistant system

    Ishihara Nobuya, Funabiki Nobuo, Kuribayashi Minoru, Kao Wen-Chung

    International Journal of Computer & Software Engineering   2 ( 1 )   116 - 116   2017.7

     More details

    Language:English   Publisher:Graphy Publications  

    For advancements of Java programming educations, we have developed a Web-based Java Programming Learning System (JPLAS). JPLAS provides four problems with different levels, namely, element fill-inblank problem, value trace problem, statement fill-in-blank problem, and code writing problem, to cover students at different learning stages. Unfortunately, since JPLAS has been implemented by a number of students who studied in our group at different years, the code has become complex and redundant, which makes further extensions of JPLAS extremely hard. In this paper, we propose a software architecture for JPLAS to avoid redundancy. Based on the MVC model, our proposal uses Java for the model (M), HTML/CSS/JavaScript for the view (V), and JSP for the controller (C). Besides, adopting a design pattern, the marking functions of the four problems are implemented uniformly. For evaluations, after JPLAS is implemented with this architecture, the number of code files is compared with that of the previous implementation, and the number of additional files is examined for two new functions.

    CiNii Article

    researchmap

  • A Proposal of Fingerprinting System for Protection of Sensitive Data from Internal Leakage

    上田 貴大, 栗林 稔, 舩曵 信生

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   117 ( 39 )   19 - 24   2017.5

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    researchmap

  • Watermarking Scheme with Large Capacity Considering the Internal Structure of PDF File

    福島 拓哉, 栗林 稔, 舩曵 信生

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   117 ( 40 )   13 - 18   2017.5

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    researchmap

  • Watermarking Scheme with Large Capacity Considering the Internal Structure of PDF File

    福島 拓哉, 栗林 稔, 舩曵 信生

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   117 ( 39 )   13 - 18   2017.5

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    researchmap

  • A Proposal of Fingerprinting System for Protection of Sensitive Data from Internal Leakage

    上田 貴大, 栗林 稔, 舩曵 信生

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   117 ( 40 )   19 - 24   2017.5

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    researchmap

  • An Improvement of Naming Rule Testing Tool for Java Programming Learning

    松本 慎平, 舩曵 信生, 栗林 稔, 石原 信也

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   116 ( 425 )   41 - 46   2017.1

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    CiNii Books

    researchmap

  • An Improvement of Naming Rule Testing Tool for Java Programming Learning

    松本 慎平, 舩曵 信生, 栗林 稔, 石原 信也

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   116 ( 426 )   41 - 46   2017.1

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    CiNii Books

    researchmap

  • A Proposal of Code Clone Deletion Problem for Java Programming Learning Assistant System

    石原 信也, 舩曵 信生, 栗林 稔

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   116 ( 425 )   47 - 52   2017.1

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    CiNii Books

    researchmap

  • A Proposal of Code Clone Deletion Problem for Java Programming Learning Assistant System

    石原 信也, 舩曵 信生, 栗林 稔

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   116 ( 426 )   47 - 52   2017.1

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    CiNii Books

    researchmap

  • A Proposal of Fingerprinting System for Protection of Sensitive Data from Internal Leakage

    上田貴大, 栗林稔, 舩曵信生

    電子情報通信学会技術研究報告   117 ( 39(IT2017 1-15) )   19‐24   2017

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • Making of Code Clone Elimination Problem Function for Java Programming Learning Assistant System

    石原信也, 舩曵信生, 栗林稔

    電子情報通信学会技術研究報告   117 ( 249(DC2017 20-32) )   25‐30   2017

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • A study of obfuscation for the security enhancement of watermarking schemes

    山下晃一郎, 栗林稔, 舩曵信生

    電子情報通信学会技術研究報告   117 ( 282(EMM2017 55-65) )   53‐58   2017

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • A Study of DCT-OFDM-Based Watermarking Scheme Assisted by Error Correcting Code

    重本章吾, 栗林稔, 舩曵信生

    電子情報通信学会技術研究報告   117 ( 282(EMM2017 55-65) )   47‐52   2017

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • A Proposal of Code Clone Deletion Problem for Java Programming Learning Assistant System

    石原信也, 舩曵信生, 栗林稔

    電子情報通信学会技術研究報告   116 ( 426(SS2016 36-59) )   47‐52   2017

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • An Improvement of Naming Rule Testing Tool for Java Programming Learning

    松本慎平, 舩曵信生, 栗林稔, 石原信也

    電子情報通信学会技術研究報告   116 ( 426(SS2016 36-59) )   41‐46   2017

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • A User-PC computing system as ultralow-cost computation platform for small groups

    Nobuo Funabiki, Kyaw Soe Lwin, Yuuki Aoyagi, Minoru Kuribayashi, Wen-Chung Kao

    Application and Theory of Computer Technology   2 ( 3 )   10 - 24   2017

     More details

  • Watermarking Scheme with Large Capacity Considering the Internal Structure of PDF File

    福島拓哉, 栗林稔, 舩曵信生

    電子情報通信学会技術研究報告   117 ( 39(IT2017 1-15) )   13‐18   2017

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • Javaプログラミング学習支援システムJPLASのステートメント補充問題のオフライン解答機能

    TANG Lewei, 舩曵信生, 石原信也, 栗林稔

    電気・情報関連学会中国支部連合大会講演論文集(CD-ROM)   68th   2017

  • A Development of Parameter Optimization Tool and Its Application to Throughput Estimation Model for Wireless LANs

    谷口 知弘, 舩曵 信生, 栗林 稔, Soe Lwin Kyaw, Sumon Kumar Debnath, Khin Zaw Khin

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   116 ( 382 )   89 - 94   2016.12

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    researchmap

  • Implementations of Problem Assignment and Offline Fill-in-blank Problem Learning Functions in Java Programming Learning Assistant System

    佐々木 伸, 舩曵 信生, 栗林 稔, 石原 信也

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   116 ( 351 )   33 - 38   2016.12

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    researchmap

  • Offline Answering Function for Code Writing Problem in Java Programming Learning Assistant System

    王 穎キン, 舩曵 信生, 栗林 稔, 石原 信也

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   116 ( 351 )   39 - 44   2016.12

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    researchmap

  • Development of Aesthetic QR Code Encoder for Arbitrary Image

    行地 将智, 栗林 稔, CHANG Ee-Chien, 舩曵 信生, 石原 信也

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   116 ( 302 )   49 - 54   2016.11

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    researchmap

  • Development of Aesthetic QR Code Encoder for Arbitrary Image

    行地 将智, 栗林 稔, CHANG Ee-Chien, 舩曵 信生, 石原 信也

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   116 ( 303 )   49 - 54   2016.11

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    researchmap

  • Throughput Measurements for Access-Point Setup Optimization in IEEE802.11n Wireless Networks (高信頼制御通信) -- (WDN特集セッション)

    ソウ ルウィン キョウ, 舩曵 信生, キン ゾウ キン, セリム アル マムン ムハマド, 栗林 稔

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   116 ( 145 )   45 - 50   2016.7

     More details

    Language:English   Publisher:電子情報通信学会  

    CiNii Article

    researchmap

  • Throughput Measurements for Access-Point Setup Optimization in IEEE802.11n Wireless Networks (知的環境とセンサネットワーク) -- (WDN特集セッション)

    ソウ ルウィン キョウ, 舩曵 信生, キン ゾウ キン, セリム アル マムン ムハマド, 栗林 稔

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   116 ( 149 )   27 - 32   2016.7

     More details

    Language:English   Publisher:電子情報通信学会  

    CiNii Article

    researchmap

  • Throughput Measurements for Access-Point Setup Optimization in IEEE802.11n Wireless Networks (スマート無線) -- (WDN特集セッション)

    ソウ ルウィン キョウ, 舩曵 信生, キン ゾウ キン, セリム アル マムン ムハマド, 栗林 稔

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   116 ( 148 )   45 - 50   2016.7

     More details

    Language:English   Publisher:電子情報通信学会  

    CiNii Article

    researchmap

  • Throughput Measurements for Access-Point Setup Optimization in IEEE802.11n Wireless Networks (無線通信システム) -- (WDN特集セッション)

    ソウ ルウィン キョウ, 舩曵 信生, キン ゾウ キン, セリム アル マムン ムハマド, 栗林 稔

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   116 ( 147 )   75 - 80   2016.7

     More details

    Language:English   Publisher:電子情報通信学会  

    CiNii Article

    CiNii Books

    researchmap

  • Throughput Measurements for Access-Point Setup Optimization in IEEE802.11n Wireless Networks (ネットワークシステム) -- (WDN特集セッション)

    ソウ ルウィン キョウ, 舩曵 信生, キン ゾウ キン, セリム アル マムン ムハマド, 栗林 稔

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   116 ( 146 )   27 - 32   2016.7

     More details

    Language:English   Publisher:電子情報通信学会  

    CiNii Article

    CiNii Books

    researchmap

  • A Study of Employment of Error Correcting Codes for the Watermarking Scheme Considering the Characteristic of Noise

    重本 章吾, 栗林 稔, 舩曵 信生

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   116 ( 129 )   1 - 6   2016.7

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    researchmap

  • Considerations of Some Obfuscated Operations on the Security of Watermarking Schemes under the Kerckhoffs' Principle

    山下 晃一郎, 栗林 稔, 舩曵 信生

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   116 ( 130 )   7 - 12   2016.7

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    researchmap

  • A Study of Employment of Error Correcting Codes for the Watermarking Scheme Considering the Characteristic of Noise

    重本 章吾, 栗林 稔, 舩曵 信生

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   116 ( 130 )   1 - 6   2016.7

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    researchmap

  • Considerations of Some Obfuscated Operations on the Security of Watermarking Schemes under the Kerckhoffs' Principle

    山下 晃一郎, 栗林 稔, 舩曵 信生

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   116 ( 131 )   7 - 12   2016.7

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    researchmap

  • A Study of Employment of Error Correcting Codes for the Watermarking Scheme Considering the Characteristic of Noise

    重本 章吾, 栗林 稔, 舩曵 信生

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   116 ( 131 )   1 - 6   2016.7

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    researchmap

  • Considerations of Some Obfuscated Operations on the Security of Watermarking Schemes under the Kerckhoffs' Principle

    山下 晃一郎, 栗林 稔, 舩曵 信生

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   116 ( 129 )   7 - 12   2016.7

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    researchmap

  • Considerations of Some Obfuscated Operations on the Security of Watermarking Schemes under the Kerckhoffs' Principle

    山下 晃一郎, 栗林 稔, 舩曵 信生

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   116 ( 132 )   7 - 12   2016.7

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    researchmap

  • A Study of Employment of Error Correcting Codes for the Watermarking Scheme Considering the Characteristic of Noise

    重本 章吾, 栗林 稔, 舩曵 信生

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   116 ( 132 )   1 - 6   2016.7

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    researchmap

  • A Proposal of Automatic Test Code Generation Tool for Java Programming Learning Assistant System

    日下 涼太, 舩曵 信生, 栗林 稔, 石原 信也

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   116 ( 85 )   41 - 46   2016.6

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    researchmap

  • A Proposal of Coding Rule for Java Programming Learning Assistant System Using MVC Model and Its Implementation

    石原 信也, 舩曵 信生, 栗林 稔

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   116 ( 85 )   47 - 52   2016.6

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    researchmap

  • BS-3-33 PERFORMANCE EVALUATIONS OF ELASTIC WLAN SYSTEM TESTBED(BS-3. Advanced Networking Technologies for Innovative Information Networks)

    Islam Ezharul, Funabiki Nobuo, Lwin Kyaw Soe, Mamun Md. Selim Al, Debnath Sumon Kumar, Kuribayashi Minoru

    Proceedings of the IEICE General Conference   2016 ( 2 )   "S - 76"-"S-77"   2016.3

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    The elastic wireless local-area network (WLAN) system has been proposed as an adaptive and elastic WLAN system to traffic load changes in the network. Using Linux PCs, we implemented a testbed for this system that collects necessary information for the Access-Point (AP) aggregation algorithm to determine the activation/deactivation of APs by using Linux commands. Then, it controls the active APs and the associations of hosts based on the algorithm output. In this paper, we present performance evaluations of this elastic WLAN system testbed in two network scenarios in our building.

    CiNii Article

    CiNii Books

    researchmap

  • A Study of Value Trace Problems for Graph Theory Algorithms in Java Programming Learning Assistant System (ソフトウェアサイエンス)

    キン ゾウ キン, 舩曵 信生, 栗林 稔

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   115 ( 420 )   159 - 164   2016.1

     More details

    Language:English   Publisher:電子情報通信学会  

    CiNii Article

    CiNii Books

    researchmap

  • A Proposal of Job Scheduling with Performance Measurements by Benchmarks for User PC Computing System

    青柳 有輝, 舩曵 信生, 栗林 稔

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   115 ( 419 )   153 - 158   2016.1

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    researchmap

  • A Proposal of Readable Code Learning Tool for Java Programming

    小川 卓也, 舩曵 信生, 栗林 稔

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   115 ( 419 )   35 - 40   2016.1

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    researchmap

  • A Study of Value Trace Problems for Graph Theory Algorithms in Java Programming Learning Assistant System (システム数理と応用)

    キン ゾウ キン, 舩曵 信生, 栗林 稔

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   115 ( 419 )   159 - 164   2016.1

     More details

    Language:English   Publisher:電子情報通信学会  

    CiNii Article

    researchmap

  • A Proposal of Job Scheduling with Performance Measurements by Benchmarks for User PC Computing System

    青柳 有輝, 舩曵 信生, 栗林 稔

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   115 ( 420 )   153 - 158   2016.1

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    researchmap

  • A Proposal of Readable Code Learning Tool for Java Programming

    小川 卓也, 舩曵 信生, 栗林 稔

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   115 ( 420 )   35 - 40   2016.1

     More details

    Language:Japanese   Publisher:電子情報通信学会  

    CiNii Article

    researchmap

  • Elastic WLAN System Model and Its Implementation on Linux-PC (ソフトウェアサイエンス)

    ISLAM Md. EZHARUL, FUNABIKI Nobuo, KURIBAYASHI Minoru

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   115 ( 420 )   147 - 152   2016.1

     More details

    Language:English   Publisher:電子情報通信学会  

    CiNii Article

    CiNii Books

    researchmap

  • Elastic WLAN System Model and Its Implementation on Linux-PC (システム数理と応用)

    ISLAM Md. EZHARUL, FUNABIKI Nobuo, KURIBAYASHI Minoru

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   115 ( 419 )   147 - 152   2016.1

     More details

    Language:English   Publisher:電子情報通信学会  

    CiNii Article

    researchmap

  • Technical Guide :Security Technologies on Image Information(9)Digital Watermark

    栗林 稔

    映像情報メディア学会誌 = The journal of the Institute of Image Information and Television Engineers   70 ( 1 )   135 - 141   2016.1

     More details

    Language:Japanese   Publisher:映像情報メディア学会  

    CiNii Article

    researchmap

  • A Proposal of Job Scheduling with Performance Measurements by Benchmarks for User PC Computing System

    青柳有輝, 舩曵信生, 栗林稔

    電子情報通信学会技術研究報告   115 ( 419(MSS2015 35-66) )   153‐158   2016

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • Development of Aesthetic QR Code Encoder for Arbitrary Image

    行地将智, 栗林稔, CHANG Ee-Chien, 舩曵信生, 石原信也

    電子情報通信学会技術研究報告   116 ( 302(EA2016 48-67) )   49‐54   2016

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • Implementations of Problem Assignment and Offline Fill-in-blank Problem Learning Functions in Java Programming Learning Assistant System

    佐々木伸, 舩曵信生, 栗林稔, 石原信也

    電子情報通信学会技術研究報告   116 ( 351(ET2016 66-77) )   33‐38   2016

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • Offline Answering Function for Code Writing Problem in Java Programming Learning Assistant System

    WANG Yingxin, 舩曵信生, 栗林稔, 石原信也

    電子情報通信学会技術研究報告   116 ( 351(ET2016 66-77) )   39‐44   2016

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • A Development of Parameter Optimization Tool and Its Application to Throughput Estimation Model for Wireless LANs

    谷口知弘, 舩曵信生, 栗林稔, SOE LWIN Kyaw, SUMON KUMAR Debnath, KHIN ZAW Khin

    電子情報通信学会技術研究報告   116 ( 382(NS2016 118-140) )   89‐94   2016

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • A Proposal of Coding Rule for Java Programming Learning Assistant System Using MVC Model and Its Implementation

    石原信也, 舩曵信生, 栗林稔

    電子情報通信学会技術研究報告   116 ( 85(ET2016 8-20) )   47‐52   2016

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • Considerations of Some Obfuscated Operations on the Security of Watermarking Schemes under the Kerckhoffs’ Principle

    山下晃一郎, 栗林稔, 舩曵信生

    電子情報通信学会技術研究報告   116 ( 130(SITE2016 7-31) )   7‐12   2016

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • A Proposal of Automatic Test Code Generation Tool for Java Programming Learning Assistant System

    日下涼太, 舩曵信生, 栗林稔, 石原信也

    電子情報通信学会技術研究報告   116 ( 85(ET2016 8-20) )   41‐46   2016

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • A Study of Employment of Error Correcting Codes for the Watermarking Scheme Considering the Characteristic of Noise

    重本章吾, 栗林稔, 舩曵信生

    電子情報通信学会技術研究報告   116 ( 130(SITE2016 7-31) )   1‐6   2016

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • A Proposal of Three Extensions in Blank Element Selection Algorithm for Java Programming Learning Assistant System

    Khin Khin Zaw, Nobuo Funabiki, Minoru Kuribayashi

    2016 IEEE 5TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS   116 ( 85 )   53 - 58   2016

     More details

    Language:English   Publisher:IEEE  

    To assist Java programming educations, we have developed a Web-based Java Programming Learning Assistant System (JPLAS). JPLAS provides fill-in-blank problems to let students study Java grammar and basic programming skills by filling the blanked elements in a given Java code. To generate the feasible problems, we have proposed a blank element selection algorithm using the constraint graph to select as many blanks as possible such that they have grammatically correct and unique answers. In this paper, to further increase the number of blanks and control the difficulty of the generated problem, we extend this algorithm by 1) adding operators in conditional expressions for blank candidates, 2) improving the edge generation method in the constraint graph to increase the number of blanks, and 3) introducing two parameters to change the frequency of selecting blanks. To verify the effectiveness, we apply the extended algorithm to 55 Java codes for fundamental data structure or algorithms, and confirm that these extensions can increase the number of blanks and change the problem difficulty.

    Web of Science

    CiNii Article

    researchmap

  • 映像情報メディア関連のセキュリティ〔第9回〕電子透かし

    栗林稔

    映像情報メディア学会誌   70 ( 1 )   135 - 141   2016

     More details

  • Digital Watermark

    Kuribayashi Minoru

    The Journal of The Institute of Image Information and Television Engineers   70 ( 1 )   135 - 141   2016

     More details

    Language:Japanese   Publisher:The Institute of Image Information and Television Engineers  

    CiNii Article

    researchmap

  • A Proposal of Readable Code Learning Tool for Java Programming

    小川卓也, 舩曵信生, 栗林稔, 石原信也, 天野憲樹

    電子情報通信学会技術研究報告   115 ( 419(MSS2015 35-66) )   35‐40   2016

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • Study on Collaboration of Collusion Secure Code and Watermarking Technique

    KURIBAYASHI Minoru

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   114 ( 424 )   57 - 62   2015.1

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    According to watermark security based on the Kerckhoffs' principle, we should mind that illegal users will be able to access to the host signal which is targeted for embedding in a fingerprinting system. In our system, each user's ID is encoded by a fingerprinting code, and then it is embedded into the host signal employing the obfuscation technique proposed in ISITA2014. Considering the operation in the obfuscation technique, we discover that the operation is equivalent to a simple spread spectrum watermarking method using longer sequences. Its effects are intensively evaluated by simulation in this paper.

    CiNii Article

    CiNii Books

    researchmap

  • Watermarking Security Based on Kerckhoffs' Principle

    KURIBAYASHI Minoru

    Technical report of IEICE. EA   114 ( 315 )   43 - 48   2014.11

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    The security of watermarking scheme has been intensively studied for the past 10 years based upon the Kerckhoffs' principle. Under the principle, adversaries know the embedding/detection algorithms except for a secret key, hence, it is possible to access to a host signal which may be sampled from frequency components of a digital content. Such a study is not always considered in domestic research workshops though the robustness against attacks based on signal processing technique has been actively discussed. In this paper, we review the trend of security analysis and discuss the current situation about the application for fingerprinting.

    CiNii Article

    CiNii Books

    researchmap

  • Watermarking Security Based on Kerckhoffs' Principle

    KURIBAYASHI Minoru

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   114 ( 316 )   43 - 48   2014.11

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    The security of watermarking scheme has been intensively studied for the past 10 years based upon the Kerckhoffs' principle. Under the principle, adversaries know the embedding/detection algorithms except for a secret key, hence, it is possible to access to a host signal which may be sampled from frequency components of a digital content. Such a study is not always considered in domestic research workshops though the robustness against attacks based on signal processing technique has been actively discussed. In this paper, we review the trend of security analysis and discuss the current situation about the application for fingerprinting.

    CiNii Article

    CiNii Books

    researchmap

  • Optimal Tracing Method for Fingerprinting Code

    KURIBAYASHI Minoru

    IEICE technical report. Information theory   114 ( 224 )   25 - 30   2014.9

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    G. Tardos has proposed a probabilistic fingerprinting code which has a length of theoretically minimal order with respect to the number of colluders. Theoretical analyses about the Tardos code yield more efficient probabilistic fingerprinting codes improving the traceability, code length, and so on. There are many directions on the study of fingerprinting code including the estimation of attack strategies from a received codeword and the design of optimal tracing algorithm utilizing the information derived from the estimation. Furthermore, the relaxation of attack assumption and the addition of noise should be assumed considering a realistic situation. In this paper, we introduce these studies.

    CiNii Article

    researchmap

  • Simplified Tracing Algorithm of Fingerprinting Code Against Averaging Attack

    KURIBAYASHI Minoru

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   113 ( 480 )   93 - 98   2014.3

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    When a binary fingerprinting codeword is embedded into digital contents using a robust spread-spectrum(SS) watermarking scheme, the averaging strategy plus addition of noise is one of cost-effective attacks. In the previous study, an optimal detector can be designed from the information theoretical point of view if the number of colluders and the attack strategy are known in advance. If the noise added to the pirated codeword is AWGN, the variance of the noise must be estimated in the optimal detector. In this paper, we simplify the optimal detector exploiting the characteristic of the discrete bias distribution of Nuida code. The proposed detector can calculate a correlation score directly from the distorted codeword without the estimation of the number of colluders as well as the variance of noise. Our experimental results reveal that the performance is very close to that of the optimal detector.

    CiNii Article

    CiNii Books

    researchmap

  • Optimal Tracing Method for Fingerprinting Code

    栗林稔

    電子情報通信学会技術研究報告   114 ( 224(IT2014 41-49) )   25 - 30   2014

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • DCT-OFDM Based Watermarking Scheme Robust against Clipping Attack

    HAKKA Masaki, KURIBAYASHI Minoru, MORII Masakatu

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   113 ( 291 )   107 - 112   2013.11

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Robustness against various attacks involving lossy compression like JPEG and clipping is inevitable requirements for digital watermarking schemes. In SCIS2013, we proposed the DCT-OFDM based watermarking scheme robust against JPEG compression by using the QIM method. In this paper, we propose a watermarking scheme robust against a clipping attack as well as JPEG compressions based on the DCT-OFDM based method. In the QIM variant of DCT-OFDM based method, the number of elements for embedding is much larger than that of watermark bit-sequence. By embedding a synchronization signal into the remained elements, we attempt to recover the synchronization loss from a clipped image. Because of the orthogonality among the elements obtained by the DCT-OFDM operation, there is no interference among the watermark signal and the synchronization signal. In addition, the synchronization signal also retains the similar robustness against JPEG compression. In a preliminary experiment, we observed that some synchronization points are detected around a correct synchronization point because the synchronization signal is mainly embedded into the low-frequency components in a spread form. Then, we determine the center point among them as the correct synchronization point. We evaluate the performance of our method by computer simulation. It is revealed that our method satisfies the evaluation criteria determined by IHC Committee, while maintaining high image quality.

    CiNii Article

    researchmap

  • DCT-OFDM Based Watermarking Scheme Robust against Clipping Attack

    HAKKA Masaki, KURIBAYASHI Minoru, MORII Masakatu

    Technical report of IEICE. EA   113 ( 290 )   107 - 112   2013.11

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Robustness against various attacks involving lossy compression like JPEG and clipping is inevitable requirements for digital watermarking schemes. In SCIS2013, we proposed the DCT-OFDM based watermarking scheme robust against JPEG compression by using the QIM method. In this paper, we propose a watermarking scheme robust against a clipping attack as well as JPEG compressions based on the DCT-OFDM based method. In the QIM variant of DCT-OFDM based method, the number of elements for embedding is much larger than that of watermark bit-sequence. By embedding a synchronization signal into the remained elements, we attempt to recover the synchronization loss from a clipped image. Because of the orthogonality among the elements obtained by the DCT-OFDM operation, there is no interference among the watermark signal and the synchronization signal. In addition, the synchronization signal also retains the similar robustness against JPEG compression. In a preliminary experiment, we observed that some synchronization points are detected around a correct synchronization point because the synchronization signal is mainly embedded into the low-frequency components in a spread form. Then, we determine the center point among them as the correct synchronization point. We evaluate the performance of our method by computer simulation. It is revealed that our method satisfies the evaluation criteria determined by IHC Committee, while maintaining high image quality.

    CiNii Article

    researchmap

  • Optimal Tracing Algorithm for Fingerprinting Code under Averaging Attack

    KURIBAYASHI Minoru

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   113 ( 66 )   25 - 30   2013.5

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    When a binary fingerprinting codeword is embedded into digital contents using a robust spread-spectrum (SS) watermarking scheme, the marking assumption is not valid anymore because it is difficult for colluders to perform the symbol-wise attack for their codewords. Under such a situation, one of the cost-effective attacks is averaging multiple copies as studied in SS fingerprinting schemes. In this paper, we propose an optimal detector for the Nuida code under the averaging attack and addition of white Gaussian noise. The performance is evaluated through simulation using the IHC standard images.

    CiNii Article

    CiNii Books

    researchmap

  • The First Competition of Image and Video by IHC

    GOHSHI Seiichi, KURIBAYASHI Minoru, TAKESHITA Hirohisa, ECHIZEN Isao, IWATA Motor, IWAMURA Keiichi

    電子情報通信学会技術研究報告 : 信学技報   112 ( 420 )   13 - 18   2013.1

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Information Hiding and its Criteria for evaluation (IHC) works for encouraging and for practical use of watermark technologies. In an effort to increase the activity in this particular research field IHC set up the evaluation standard for watermark technologies for image and video version 1. According to the standard IHC conducted its first competition. There were eight applicants and seven of them cleared the standard and received the certification. The award for the best image quality and the award for the highest tolerance were also granted from IHC In this paper the results of the competition, mainly about the best quality and the highest tolerance, are reported. IHC is discussing the standard version 2 that will require higher level requirements for watermark technologies. IHC also has plans to conduct the competitions every year until its purpose is achieved.

    CiNii Article

    researchmap

  • The First Competition of Image and Video by IHC

    合志清一, 栗林稔, 竹下寛久, 越前功, 岩田基, 岩村惠市

    電子情報通信学会技術研究報告   112 ( 420(EMM2012 91-106) )   13 - 18   2013

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • A Tutorial of Watermarking Technique for Students

    栗林 稔

    回路とシステムワークショップ論文集 Workshop on Circuits and Systems   26   414 - 419   2013

     More details

    Language:Japanese   Publisher:[電子情報通信学会]  

    CiNii Article

    J-GLOBAL

    researchmap

  • DCT-OFDM Based Watermarking Scheme Robust againsut Clipping Attack

    八家匡希, 栗林稔, 森井昌克

    電子情報通信学会技術研究報告   113 ( 290(EA2013 68-87) )   107 - 112   2013

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • OFDM-type Spread Spectrum Watermarking Scheme

    KURIBAYASHI Minoru, HAKKA Masaki, MORII masakatu

    電子情報通信学会技術研究報告. EMM, マルチメディア情報ハイディング・エンリッチメント = IEICE technical report. EMM, Enriched multimedia   112 ( 293 )   129 - 134   2012.11

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In conventional spread spectrum watermarking schemes, random sequences are used for the modulation of watermark information. However, because of the mutual interference among those sequences, it requires complicated removal operation to improve the performance. In this paper, we propose an efficient spread spectrum watermarking scheme by introducing the OFDM-type technique at the modulation of watermark information. No mutual interference exists among sequences in the proposed scheme, and the assistant of a fast algorithm reduces the computational cost at the detection of watermark information. By effectively remove the host-interference at the embedding stage, we can obtain a good distortion-robustness behavior under a blind-detection scenario.

    CiNii Article

    CiNii Books

    researchmap

  • OFDM-type Spread Spectrum Watermarking Scheme

    KURIBAYASHI Minoru, HAKKA Masaki, MORII masakatu

    Technical report of IEICE. EA   112 ( 292 )   129 - 134   2012.11

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In conventional spread spectrum watermarking schemes, random sequences are used for the modulation of watermark information. However, because of the mutual interference among those sequences, it requires complicated removal operation to improve the performance. In this paper, we propose an efficient spread spectrum watermarking scheme by introducing the OFDM-type technique at the modulation of watermark information. No mutual interference exists among sequences in the proposed scheme, and the assistant of a fast algorithm reduces the computational cost at the detection of watermark information. By effectively remove the host-interference at the embedding stage, we can obtain a good distortion-robustness behavior under a blind-detection scenario.

    CiNii Article

    CiNii Books

    researchmap

  • 重み一定符号化したスペクトル拡散型電子透かし

    八家匡希, 栗林稔, 森井昌克

    情報理論とその応用シンポジウム予稿集(CD-ROM)   35th   ROMBUNNO.9.4.2   2012

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • An Analysis of Quantization Error on Sprerad SpectrumFingerprinting

    加藤 寛史, 栗林 稔, 森井 昌克

    コンピュータセキュリティシンポジウム2009 (CSS2009) 論文集   2009   1 - 6   2011.10

     More details

    Language:Japanese  

    CiNii Article

    researchmap

  • The Performance of Fingerprinting Codes over AWGN Channel

    門田 宜也, 栗林 稔, 森井 昌克

    コンピュータセキュリティシンポジウム2009 (CSS2009) 論文集   2009   1 - 6   2011.10

     More details

    Language:Japanese  

    CiNii Article

    researchmap

  • Implementation of CDMA-Based Fingerprinting Schemein Asymmetric Fingerprinting Protocol

    栗林 稔, 森井 昌克

    コンピュータセキュリティシンポジウム2009 (CSS2009) 論文集   2009   1 - 6   2011.10

     More details

    Language:English  

    CiNii Article

    researchmap

  • O-006 Expansion of Image Displayable Area in Design QR Code and Its Applications

    Fujita Kazuaki, Kuribayashi Minoru, Morii Masakatu

    情報科学技術フォーラム講演論文集   10 ( 4 )   517 - 520   2011.9

     More details

    Language:English   Publisher:Forum on Information Technology  

    CiNii Article

    CiNii Books

    researchmap

  • Bias Equalizer for Tracing Algorithm of Binary Fingerprinting Codes

    栗林 稔

    研究報告情報セキュリティ心理学とトラスト(SPT)   2011 ( 3 )   1 - 6   2011.7

     More details

    Language:English  

    CiNii Article

    researchmap

  • Bias Equalizer for Tracing Algorithm of Binary Fingerprinting Codes

    KURIBAYASHI Minoru

    IEICE technical report   111 ( 126 )   13 - 18   2011.7

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    The performance of fingerprinting codes has been studied under the well-known marking assumption. If colluders get to know the binary sequence of their codewords, they will be able to employ more active collusion strategies. In this study, we analyze the balance between the number of "0" and "1" symbols in a pirated codeword and propose an equalizer to cancel the bias by giving weights on the calculation of correlation score. From our simulation results, it is revealed that the proposed detector can trace more colluders when the number of "0" and "1" symbols becomes imbalanced.

    CiNii Article

    researchmap

  • Bias Equalizer for Tracing Algorithm of Binary Fingerprinting Codes

    KURIBAYASHI Minoru

    IEICE technical report   111 ( 124 )   13 - 18   2011.7

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    The performance of fingerprinting codes has been studied under the well-known marking assumption. If colluders get to know the binary sequence of their codewords, they will be able to employ more active collusion strategies. In this study, we analyze the balance between the number of "0" and "1" symbols in a pirated codeword and propose an equalizer to cancel the bias by giving weights on the calculation of correlation score. From our simulation results, it is revealed that the proposed detector can trace more colluders when the number of "0" and "1" symbols becomes imbalanced.

    CiNii Article

    CiNii Books

    researchmap

  • Bias Equalizer for Tracing Algorithm of Binary Fingerprinting Codes

    KURIBAYASHI Minoru

    IEICE technical report   111 ( 123 )   13 - 18   2011.7

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    The performance of fingerprinting codes has been studied under the well-known marking assumption. If colluders get to know the binary sequence of their codewords, they will be able to employ more active collusion strategies. In this study, we analyze the balance between the number of "0" and "1" symbols in a pirated codeword and propose an equalizer to cancel the bias by giving weights on the calculation of correlation score. From our simulation results, it is revealed that the proposed detector can trace more colluders when the number of "0" and "1" symbols becomes imbalanced.

    CiNii Article

    researchmap

  • Bias Equalizer for Tracing Algorithm of Binary Fingerprinting Codes

    栗林 稔

    研究報告コンピュータセキュリティ(CSEC)   2011 ( 3 )   1 - 6   2011.7

     More details

    Language:English  

    電子指紋符号の性能評価はマーキング仮定に基づいた結託攻撃を想定して行われている.もし,結託者がなんらかの方法で符号語のバイナリ系列を得ることができた場合,さらに強い結託攻撃を行う可能性がある.本研究では,結託符号語の中の "0" シンボルの個数と "1" シンボルの個数の偏りを解析し,この偏りを打ち消すように重みを与えることで追跡アルゴリズムの性能を向上させる手法を提案する.シミュレーションにより,提案追跡アルゴリズムは符号語のシンボルに偏りがある場合にはより多くの不正者を追跡できることを確認した.The performance of fingerprinting codes has been studied under the well-known marking assumption. If colluders get to know the binary sequence of their codewords, they will be able to employ more active collusion strategies. In this study, we analyze the balance between the number of "0" and "1" symbols in a pirated codeword and propose an equalizer to cancel the bias by giving weights on the calculation of correlation score. From our simulation results, it is revealed that the proposed detector can trace more colluders when the number of "0" and "1" symbols becomes imbalanced.

    CiNii Article

    CiNii Books

    researchmap

  • Bias Equalizer for Tracing Algorithm of Binary Fingerprinting Codes

    KURIBAYASHI Minoru

    IEICE technical report   111 ( 125 )   13 - 18   2011.7

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    The performance of fingerprinting codes has been studied under the well-known marking assumption. If colluders get to know the binary sequence of their codewords, they will be able to employ more active collusion strategies. In this study, we analyze the balance between the number of "0" and "1" symbols in a pirated codeword and propose an equalizer to cancel the bias by giving weights on the calculation of correlation score. From our simulation results, it is revealed that the proposed detector can trace more colluders when the number of "0" and "1" symbols becomes imbalanced.

    CiNii Article

    CiNii Books

    researchmap

  • A study of image displayable design QR code

    FUJITA Kazuaki, KURIBAYASHI Minoru, MORII Masakatu

    IEICE technical report   110 ( 374 )   39 - 44   2011.1

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Recently, a lot of QR codes are shown in advertising booklets and Web pages to lead users to a particular site. In order to improve the visibility of QR codes, design QR codes have been invented. Some intentionally modify several bits of original QR code within the possible error correction capability, and the others change the pad codeword to produce a specific designed image on the QR code. However, the exploitation of error correction capability for design degrades the readability of design QR codes, and the possible area in which the designed image is embedded is restricted due to the standardized structure of QR code. The main restriction is the systematic encoding of Reed-Solomon code(RS). In this study, we focus on non-systematic encoding of Reed-Solomon code, and reduce the restriction. As the result,we can freely select the design area in a QR code and can embed a designed image without sacrificing the error correction capability of RS code. It is noteworthy that our designed QR code can be read by the QR code readers equipped in mobile phones.

    CiNii Article

    researchmap

  • A study of image displayable design QR code

    FUJITA Kazuaki, KURIBAYASHI Minoru, MORII Masakatu

    IEICE technical report   110 ( 375 )   39 - 44   2011.1

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Recently, a lot of QR codes are shown in advertising booklets and Web pages to lead users to a particular site. In order to improve the visibility of QR codes, design QR codes have been invented. Some intentionally modify several bits of original QR code within the possible error correction capability, and the others change the pad codeword to produce a specific designed image on the QR code. However, the exploitation of error correction capability for design degrades the readability of design QR codes, and the possible area in which the designed image is embedded is restricted due to the standardized structure of QR code. The main restriction is the systematic encoding of Reed-Solomon code(RS). In this study, we focus on non-systematic encoding of Reed-Solomon code, and reduce the restriction. As the result,we can freely select the design area in a QR code and can embed a designed image without sacrificing the error correction capability of RS code. It is noteworthy that our designed QR code can be read by the QR code readers equipped in mobile phones.

    CiNii Article

    researchmap

  • A study of image displayable design QR code

    藤田和謙, 栗林稔, 森井昌克

    電子情報通信学会技術研究報告   110 ( 374(ICM2010 33-53) )   39 - 44   2011

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • Proposal of Time-limited Key Management Scheme Using One-way Functions

    ISAWA Ryoichi, KURIBAYASHI Minoru, MORII Masakatu, TAKASUKA Sadako

    IEICE technical report   110 ( 266 )   11 - 15   2010.11

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Some time-limited key management schemes have been proposed. The existed methods have to decide the number of leaves before constructing a tree. We are difficult to give a forecast about the suitable number of leaves for the service. This problem has been overcome by using the public key cryptosystem. However such method can increase the computational complexity. In this paper, we propose a tree-structured scheme using only a one-way function. Our method creates the root node of tree applying a one-way function to solve it. Using our method the system can save a memory.

    CiNii Article

    researchmap

  • Systematic Generation of Tardos's Fingerprint Codes

    Kuribayashi Minoru, Morii Masakatu

    IEICE transactions on fundamentals of electronics, communications and computer sciencesSciences   93 ( 2 )   508 - 515   2010.2

     More details

  • Proposal of Time-limited Key Management Scheme Using One-way Functions

    伊沢亮一, 伊沢亮一, 栗林稔, 森井昌克, 高須賀禎子

    電子情報通信学会技術研究報告   110 ( 266(ICSS2010 44-55) )   11 - 15   2010

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • 電子指紋技術における量子化誤差が与える影響の解析

    加藤寛史, 栗林稔, 森井昌克

    情報処理学会シンポジウム論文集   2009 ( 11 )   63 - 68   2009

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • 結託耐性符号の雑音による影響解析

    門田宜也, 栗林稔, 森井昌克

    情報処理学会シンポジウム論文集   2009 ( 11 )   57 - 62   2009

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • An Optimization of Two-Layered Tardos Code from the Computational Perspective

    門田宜也, 栗林稔, 森井昌克

    情報処理学会シンポジウム論文集   2008 ( 8 )   917 - 922   2008.10

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • On the Implementation of Asymmetric Fingerprinting Protocol

    YAMANE Shinya, KURIBAYASHI Minoru, MORII Masakatu

    IEICE technical report   107 ( 209 )   91 - 98   2007.8

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Digital fingerprinting of multimedia contents involves the generation of a fingerprint, the embedding operation, and the realization of traceability from redistributed contents. Considering a buyer's right, the asymmetric property in the transaction between a buyer and a seller must be achieved using a cryptographic protocol, and the unbinding problem must be solved. In the conventional schemes, there is much redundancy in the protocol, and the implementation of a watermarking algorithm into the cryptographic protocol is not deeply discussed. In this paper, we study the property of fingerprinting protocol with the asymmetric property, and introduce digital cash system to construct an efficient protocol which can bind a transaction with fingerprint information. We also propose the method for implementing the spread spectrum watermarking technique in the fingerprinting protocol based on the homomorphic encryption scheme, and evaluate the performance by simulation.

    CiNii Article

    researchmap

  • A study on traitor tracing system using fingerprinting technique

    栗林稔

    旭硝子財団助成研究成果報告(Web)   2007   07B-3-56 (WEB ONLY)   2007

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • Time-limited Key Management Scheme with Arbitrary Expiration Date Using One-way Functions

    田中敏也, 栗林稔, 森井昌克

    情報処理学会論文誌   48 ( 9 )   3089 - 3098   2007

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • On the Implementation of Asymmetric Fingerprinting Protocol

    山根進也, 栗林稔, 森井昌克

    電子情報通信学会技術研究報告   107 ( 209(ISEC2007 74-88) )   91 - 98   2007

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • CDMA技術に基づく電子指紋方式のスペクトル系列構成法の検討

    林直樹, 栗林稔, 森井昌克

    情報理論とその応用シンポジウム予稿集(CD-ROM)   30th   ROMBUNNO.22.1   2007

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • JPEG圧縮における可逆データハイディング

    酒井宏誌, 栗林稔, 森井昌克

    情報理論とその応用シンポジウム予稿集(CD-ROM)   30th   ROMBUNNO.28.2   2007

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • 電子指紋技術を用いた不正者追跡システムに関する研究

    栗林稔

    旭硝子財団研究助成成果発表会   2007   18   2007

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • A study on traitor tracing system using fingerprinting technique

    栗林 稔

    旭硝子財団助成研究成果報告   1 - 6   2007

     More details

    Language:Japanese   Publisher:旭硝子財団  

    CiNii Article

    researchmap

  • On the Improvement of Collusion Secure Fingerprinting Scheme

    HAYASHI Naoki, KURIBAYASHI Minoru, MORII Masakatsu

    情報理論とその応用シンポジウム予稿集 = The proceedings of the Symposium on Information Theory and Its Applications   29 ( 2 )   561 - 564   2006.11

     More details

    Language:Japanese  

    CiNii Article

    researchmap

  • Reversible Watermark Based on Adaptive Embedding

    KURIBAYASHI Minoru, MORII Masakatu

    29 ( 2 )   573 - 576   2006.11

     More details

  • Video Watermark with Self-Synchronization Capability

    KURIBAYASHI Minoru, MORII Masakatu

    IEICE technical report   106 ( 352 )   13 - 18   2006.11

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    One of the most important requirements for digital watermarking is the robustness against desynchronization attack. Especially for the video file, the recovery of the synchronization over a series of segments is a serious problem because a video clip will be illegally distributed. In this study, we apply cyclically permutable code (CPC) for the encoding of watermark information in order to resynchronize it from a video clip. Then the codeword is iteratively embedded into the segments of a video file. By collecting the signal from an arbitrary successive series of segments, an error correction can be effectively performed in our scheme. Furthermore, when the spread spectrum technique is applied for the modulation of each element of the codeword, the applied PN-sequence is adaptively changed in order to embed the codeword hierarchically in a series of frames in a video file.

    CiNii Article

    CiNii Books

    researchmap

  • Video Watermark with Self-Synchronization Capability

    KURIBAYASHI Minoru, MORII Masakatu

    IEICE technical report   106 ( 354 )   13 - 18   2006.11

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    One of the most important requirements for digital watermarking is the robustness against desynchronization attack. Especially for the video file, the recovery of the synchronization over a series of segments is a serious problem because a video clip will be illegally distributed. In this study, we apply cyclically permutable code (CPC) for the encoding of watermark information in order to resynchronize it from a video clip. Then the codeword is iteratively embedded into the segments of a video file. By collecting the signal from an arbitrary successive series of segments, an error correction can be effectively performed in our scheme. Furthermore, when the spread spectrum technique is applied for the modulation of each element of the codeword, the applied PN-sequence is adaptively changed in order to embed the codeword hierarchically in a series of frames in a video file.

    CiNii Article

    CiNii Books

    researchmap

  • Fingerprinting Protocol Equipping Electronic Payment System

    YAMANE Shinya, KURIBAYASHI Minoru, MORII Masakatu

    IPSJ SIG Notes   2006 ( 81 )   329 - 336   2006.7

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    On digital contents distribution system fingerprinting protocols enable sellers to trace the buyer who redistributed a copy illegally. However, conventional fingerprinting protocols do not give much consideration to the payment for the charge of the contents. In this paper, we propose fingerprinting protocols which equip the function of digital cash managed by a trusted center for electronic payment. Using the digital cash, buyers can obtain fingerprinted contents and simultaneously pay the charge of the contents.

    CiNii Article

    researchmap

  • Fingerprinting Protocol Equipping Electronic Payment System

    YAMANE Shinya, KURIBAYASHI Minoru, MORII Masakatu

    IEICE technical report   106 ( 176 )   99 - 106   2006.7

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    On digital contents distribution system fingerprinting protocols enable sellers to trace the buyer who redistributed a copy illegally. However, conventional fingerprinting protocols do not give much consideration to the payment for the charge of the contents. In this paper, we propose fingerprinting protocols which equip the function of digital cash managed by a trusted center for electronic payment. Using the digital cash, buyers can obtain fingerprinted contents and simultaneously pay the charge of the contents.

    CiNii Article

    researchmap

  • Fingerprinting Protocol Equipping Electronic Payment System

    YAMANE Shinya, KURIBAYASHI Minoru, MORII Masakatu

    電子情報通信学会技術研究報告. ISEC, 情報セキュリティ   106 ( 176 )   99 - 106   2006.7

     More details

    Language:Japanese  

    CiNii Article

    researchmap

  • A Key Management Scheme for Time-Limited Service

    TANAKA Toshiya, KURIBAYASHI Minoru, MORII Masakatu

    IEICE technical report   105 ( 529 )   5 - 9   2006.1

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    On a broadcast-type contents distribution, a time-limited key management scheme has been proposed which enable a broadcaster to provide contents to each user with each predined period. We have proposed a time-limited key management scheme based on the property of chaotic map such that a user key is usable for the decryption of broadcasted contents as long as the time of key-updating operation is less than a certain threshold. However, in order to extend the expiration date of user key, the size of the key must be increased in a linear order, and hence the scheme is not practical. In this paper, we improve the key-updating operation to produce a small key with long expiration date. The basic idea is to vary the positions for extracting the keys dependent on the updating time. Since the expiration date is determined by the size of the error insulted in a user key and its effect for the upper bits in each updating operation, we control the effect by modifying the positions for extracting the keys and the iteration time of chaotic map required for each key-updating operation. We also show the security of our scheme and compare it with other schemes.

    CiNii Article

    CiNii Books

    researchmap

  • Fingerprinting Protocol Equipping Electronic Payment System

    山根進也, 栗林稔, 森井昌克

    電子情報通信学会技術研究報告   106 ( 176(ISEC2006 40-71) )   99 - 106   2006

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • Time-Limited Key Management Sechme with Arbitrary Expiration Date

    田中敏也, 栗林稔, 森井昌克

    情報処理学会シンポジウム論文集   2006 ( 11 )   31 - 36   2006

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • 結託耐性を考慮した電子指紋方式の検出率改善

    林直樹, 栗林稔, 森井昌克

    情報理論とその応用シンポジウム予稿集   29th ( Vol.2 )   561 - 564   2006

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • Time-Limited Key Management Sechme with Arbitrary Expiration Date

    田中敏也, 栗林稔, 森井昌克

    情報処理学会シンポジウム論文集   1B-2   2006

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • An Illegal Distribution Verifiable Fingerprinting Scheme Exploitting Decentralized Providers

    SHINMYO Urara, KURIBAYASHI Minoru, TANAKA Hatsukazu

    情報理論とその応用シンポジウム予稿集 = The proceedings of the Symposium on Information Theory and Its Applications   27 ( 2 )   503 - 506   2005.12

     More details

    Language:Japanese  

    CiNii Article

    researchmap

  • An Improvement Scheme for Watermark Detection Using Image Compensation against Geometrical Distortions

    HISANAGA Ryuji, KURIBAYASHI Minoru, TANAKA Hatsukazu

    情報理論とその応用シンポジウム予稿集 = The proceedings of the Symposium on Information Theory and Its Applications   27 ( 2 )   499 - 502   2005.12

     More details

    Language:Japanese  

    CiNii Article

    researchmap

  • On the Generation of Cyclic Sets from Cyclic Codes

    KURIBAYASHI Minoru, TANAKA Hatsukazu

    27 ( 2 )   475 - 478   2005.12

     More details

  • Reversible Watermark with Large Capacity Based on the Prediction Error

    KURIBAYASHI Minoru, NAKATA Tomohito, MORII Masakatu, TANAKA Hatsukazu

    Proc. 28th Symposium Inform. Theory & Applications, Onna, Okinawa, Nov. 2005   28 ( 2 )   467 - 470   2005.11

     More details

  • Key Updating Scheme for Time-Limited Service Using Chaotic Mapping

    TANAKA Toshiya, KURIBAYASHI Minoru, MORII Masakatu, TANAKA Hatsukazu

    情報理論とその応用シンポジウム予稿集 = The proceedings of the Symposium on Information Theory and Its Applications   28 ( 1 )   275 - 278   2005.11

     More details

    Language:Japanese  

    CiNii Article

    researchmap

  • A Study on the Improvement of the Embedding Capacity for the Revesible Watermark

    NAKATA Tomohito, KURIBAYASHI Minoru, MORII Masakatu, TANAKA Hatsukazu

    情報理論とその応用シンポジウム予稿集 = The proceedings of the Symposium on Information Theory and Its Applications   28 ( 2 )   471 - 474   2005.11

     More details

    Language:Japanese  

    CiNii Article

    researchmap

  • Fingerprinting Protocol Based on Distributed Providers Using Oblivious Transfer

    SHINMYO Urara, KURIBAYASHI Minoru, MORII Masakatsu, TANAKA Hatsukazu

    情報理論とその応用シンポジウム予稿集 = The proceedings of the Symposium on Information Theory and Its Applications   28 ( 2 )   705 - 708   2005.11

     More details

    Language:Japanese  

    CiNii Article

    researchmap

  • Improvement Scheme of Watermark Detection Ability Based on Blockwise Image Compensation for Geometrical Distortions

    HISANAGA Ryuji, KURIBAYASHI Minoru, TANAKA Hatsukazu

    The IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences (Japanese edition) A   88 ( 10 )   1146 - 1153   2005.10

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    電子透かし技術の重要な問題の一つとして, 幾何学的ひずみに対する耐性の問題がある. この問題はひずみによって埋込位置に関する同期が失われ, 透かし情報の検出が困難になるために生じる. 本論文では電子透かしの検出を目的として画像の特徴点に基づく幾何学的ひずみの補正法を提案する. 特徴点を用いた幾何学的ひずみの一般的な補正処理は, 特徴点の選出法などに偏りが生じ, ひずみの補正が正しくできない場合があった. 本方式では, フィルタ処理後の画像を領域に分割し, 各領域の極大値を計算することにより特徴点を求めている. これらの特徴点により各領域に応じた補正が可能となるため, 効率的な補正を行うことができる. 計算機シミュレーションを行い, 最適なフィルタ処理方式と補間方式を求め, 本方式の有効性を検証する.

    CiNii Article

    researchmap

  • A secure Reversible Watermark Using Predictive Coding

    KURIBAYASHI Minoru, MORII Masakatu, TANAKA Hatsukazu

    IPSJ SIG Notes   2005 ( 70 )   409 - 414   2005.7

     More details

    Language:English   Publisher:Information Processing Society of Japan (IPSJ)  

    The watermark that restores the exact original image from the watermarked one is called reversible watermark. Firstly, the LSB data embedding method had been proposed and the variants using integer transform and wavelet transform were proposed. In this paper, a watermark is embedded into prediction errors calculated using a predictive coding technique in JPEG-LS to increase the information to be embedded with less degradation. Since the predictor is strongly dependent on the previous pixel values, a tiny change in one pixel value propagates to the following prediction values. Based on the property, we propose a secure reversible watermarking scheme such that a watermark cannot be recovered without a secret key used at the embedding operation.

    CiNii Article

    CiNii Books

    researchmap

  • A Secure Reversible Watermark Using Predictive Coding

    KURIBAYASHI Minoru, MORII Masakatu, TANAKA Hatsukazu

    Technical report of IEICE. ISEC   105 ( 194 )   161 - 166   2005.7

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    The watermark that restores the exact original image from the watermarked one is called reversible watermark. Firstly, the LSB data embedding method had been proposed and the variants using integer transform and wavelet transform were proposed. In this paper, a watermark is embedded into prediction errors calculated using a predictive coding technique in JPEG-LS to increase the information to be embedded with less degradation. Since the predictor is strongly dependent on the previous pixel values, a tiny change in one pixel value propagates to the following prediction values. Based on the property, we propose a secure reversible watermarking scheme such that a watermark cannot be recovered without a secret key used at the embedding operation.

    CiNii Article

    CiNii Books

    researchmap

  • A-7-3 Watermarking Scheme Applying the Size of DCT Coefficients

    Fujii Takashi, Kuribayashi Minoru, Tanaka Hatsukazu

    Proceedings of the IEICE General Conference   2005   2005.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    researchmap

  • A-7-2 Fingerprinting Protocol Based on Key Management

    Kuribayashi Minoru, Tanaka Hatsukazu

    Proceedings of the IEICE General Conference   2005   177 - 177   2005.3

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • DCT係数の大きさに応じた電子透かし方式

    藤井隆志, 栗林稔, 田中初一

    電子情報通信学会大会講演論文集   2005   178   2005

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • カオス写像を利用した期間限定サービス用鍵更新方式

    田中敏也, 栗林稔, 森井昌克, 田中初一

    情報理論とその応用シンポジウム予稿集   28th ( Vol.1 )   275 - 278   2005

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • 可逆電子透かしにおける埋め込み容量の向上について

    中田智仁, 栗林稔, 森井昌克, 田中初一

    情報理論とその応用シンポジウム予稿集   28th ( Vol.2 )   471 - 474   2005

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • 分散サーバに基づくoblivious transferを用いた電子指紋技術

    新名麗, 栗林稔, 森井昌克, 田中初一

    情報理論とその応用シンポジウム予稿集   28th ( Vol.2 )   705 - 708   2005

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • Development of a Damage Prediction System Based on the Event Dependent Model on Time-Series Data

    野口大輔, 白石善明, 栗林稔, 桑門秀典, 森井昌克

    情報処理学会シンポジウム論文集   2005 ( 13,Vol.1 )   151 - 156   2005

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • Improvement Scheme of Watermark Detection Ability Based on Blockwise Image Compensation for Geometrical Distortions

    久永隆治, 栗林稔, 田中初一

    電子情報通信学会論文誌 A   J88-A ( 10 )   1146 - 1153   2005

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • A New Key Generation Method for Broadcasting System with Expiration Date

    KURIBAYASHI Minoru, TANAKA Hatsukazu

    Proc. of SITA2004   27 ( 1 )   323 - 326   2004.12

     More details

  • A-7-3 A Broadcasting System Based on the Watermarking

    Kuribayashi Minoru, Tanaka Hatsukazu

    Proceedings of the IEICE General Conference   2004   206 - 206   2004.3

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • 分散サーバを利用したコンテンツの不正配布立証可能な電子指紋方式

    新名麗, 栗林稔, 田中初一

    情報理論とその応用シンポジウム予稿集   27th ( Vol.2 )   503 - 506   2004

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • 幾何学的歪み補正を用いた電子透かし検出能力の改善法

    久永隆治, 栗林稔, 田中初一

    情報理論とその応用シンポジウム予稿集   27th ( Vol.2 )   499 - 502   2004

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • An Image Compensation Scheme against Geometrical Distortions for Watermark Extraction

    HISANAGA Ryuji, KURIBAYASHI Minoru, TANAKA Hatsukazu

    情報理論とその応用シンポジウム予稿集 = The proceedings of the Symposium on Information Theory and Its Applications   26 ( 1 )   321 - 324   2003.12

     More details

    Language:Japanese  

    CiNii Article

    researchmap

  • A New Content Broadcasting System Applying Watermarking Technique

    KURIBAYASHI Minoru, TANAKA Hatsukazu

    26 ( 2 )   497 - 500   2003.12

     More details

  • Video Watermarking of Which Embedded Information Depends on the Distance between Two Signal Positions

    Kuribayashi Minoru, Tanaka Hatsukazu

    IEICE transactions on fundamentals of electronics, communications and computer sciencesSciences   86 ( 12 )   3267 - 3275   2003.12

     More details

  • 電子透かし検出のための幾何学的歪み補正法

    久永隆治, 栗林稔, 田中初一

    情報理論とその応用シンポジウム予稿集   26th ( Vol.1 )   321 - 324   2003

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • An Efficient Protocol for Anonymous Fingerprinting

    Kuribayashi Minoru, Tanaka Hatsukazu

    Memoirs of the Faculty of Engineering, Kobe University   49   25 - 39   2002.11

     More details

    Language:English   Publisher:Kobe University  

    CiNii Article

    CiNii Books

    researchmap

  • Watermarking Schemes Using the Addition Property among DCT Coefficients

    KURIBAYASHI Minoru, TANAKA Hatsukazu

    The Transactions of the Institute of Electronics,Information and Communication Engineers. A   85 ( 3 )   322 - 333   2002.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    一般に,画像の低周波成分に埋め込まれた信号は攻撃による影響を受けにくいが,画質を大幅に劣化させる問題がある.特に分割したブロックごとに処理した場合には,隣接するブロック間に生じるブロックひずみが知覚されやすくなる.本論文では,2次元DCT基底画像の低周波成分の重ね合せによる効果を有効に利用することにより,ブロックひずみの生じない埋込み方法を提案する.2次元DCT基底の重ね合せの効果により,透かし情報は埋込みを行ったブロックから直接検出されずに,そのブロックの中にあるサブブロックから検出できることになる.また提案方式では,幾何学的な変換に耐性をもたせるため,透かし情報を検出する前に同期を回復する操作を行う.更に,誤り訂正符号を用いることにより耐性を向上させることができる.

    CiNii Article

    researchmap

  • Watermarking Schemes Using the Addition Property among DCT Coefficients

    栗林 稔, 田中 初一

    電子情報通信学会論文誌. A, 基礎・境界   85 ( 3 )   322 - 333   2002.3

     More details

    Language:Japanese   Publisher:社団法人電子情報通信学会  

    CiNii Article

    researchmap

  • Watermarking Schemes Using the Addition Property among DCT Coefficients.

    栗林稔, 田中初一

    電子情報通信学会論文誌 A   J85-A ( 3 )   322 - 333   2002

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • Watermarking schemes using the addition property among DCT coefficients

    KURIBAYASHI M., TANAKA Hatsukazu

    IEICE Trans. Fundamentals, A   729 - 729   2002

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Generally, a signal embedded in the low frequency domain is not affected seriously by attacks, but blocking effects which can be perceived easily may be occurred among adjoining blocks. In order to prevent the blocking effects, a watermark is embedded using the addition property among two-dimensional DCT basic matrices. For the addition property, a watermark is able to extracted not from the embedded block directly, but from the sub-block located in the central region of the block. Considering the distortions caused by the geometric transformations, we recover the synchronization loss before the extraction process. The robustness can also be improved by error-correction.

    CiNii Article

    CiNii Books

    researchmap

  • A New Digital Watermarking Scheme Applying Locally the Wavelet Transform

    KURIBAYASHI Minoru, TANAKA Hatsukazu

    IEICE transactions on fundamentals of electronics, communications and computer sciencesSciences   84 ( 10 )   2500 - 2507   2001.10

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Generally, the wavelet transform is applied for watermarking, where a whole image is transformed to the frequency domain. However, many schemes which adopt the wavelet transform are weak for StirMark attack designed to affect locally such as rotation, extension, reduction, etc. In this paper, we propose a new scheme which applies the wavelet transform locally and has a tolerance for StirMark attack. How to maintain the quality of the watermarked image is also shown.

    CiNii Article

    CiNii Books

    researchmap

  • A New Anonymous Fingerprinting Scheme Using Okamoto-Uchiyama Cryptosystem

    KURIBAYASHI Minoru, TANAKA Hatsukazu

    Technical report of IEICE. ISEC   101 ( 311 )   105 - 110   2001.9

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    We propose a new anonymous fingerprinting scheme using Okamoto-Uchiyama cryptosystem. In the previous schemes the enciphering rate is so small that it seems very difficult to implement for any applications. In order to improve the rate ingeniously, we have applied the Okamoto-Uchiyama cryptosystem for our fingerprinting protocel. As the results, a buyer can commit a fingerprint to a merchant being embedded in a digital content anonymously and efficiently, and then the amount of encrypted data is controlled in a reasonable size. The security can also be protected for both of a buyer and a merchant in our scheme.

    CiNii Article

    CiNii Books

    researchmap

  • A New Copyright Protection Scheme of Image Using ID-based Signature

    KURIBAYASHI Minoru, TANAKA Hatsukazu

    Technical report of IEICE. ISEC   99 ( 57 )   35 - 40   1999.5

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    A new copyright protection scheme of images has been proposed using ID-based signature. The scheme dose not bury any unrecognizable proper information like digital watermark but adds a signature for the data sampled based on ID-information to the bottom of image. The copyright transfer is possible by adding another new signature of the copyrightholder. The copyright transfer of the subimage is also possible. The security of the proposed scheme solely depends on that of the applied ID-based signature scheme.

    CiNii Article

    researchmap

  • A New Copyright Protection Scheme of Image Using ID-based Signature.

    栗林稔, 田中初一

    電子情報通信学会技術研究報告   99 ( 57(ISEC99 1-10) )   35 - 40   1999

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

▼display all

Presentations

  • Study on Collaboration of Collusion Secure Code and Watermarking Technique

    KURIBAYASHI MINORU

    Technical Report of IEICE, EMM  2015.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Study on Scoring Function of Binary Fingerprinting Codes

    KURIBAYASHI MINORU

    SCIS2015  2015.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Watermarking Security Based on Kerchhoffs' Principle

    KURIBAYASHI MINORU

    Technical Report of IEICE, EMM  2014.11 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 電子指紋符号の最適な検出法 Invited

    KURIBAYASHI MINORU

    IT研究会  2014.9 

     More details

    Language:Japanese   Presentation type:Oral presentation (invited, special)  

    researchmap

  • Simplified tracing algorithm of fingerprinting code against averaging attack

    KURIBAYASHI MINORU

    Technical Report of IEICE, EMM  2014.3 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Study of the Security on Spread Spectrum Fingerprinting

    KURIBAYASHI MINORU

    SCIS2014  2014.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Estimation of Noisy Channel from Distorted Fingerprinting Codeword

    KURIBAYASHI MINORU

    SITA2013  2013.11 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 電子指紋符号の研究紹介

    KURIBAYASHI MINORU

    第36回情報理論とその応用シンポジウム(SITA2013)ワークショップ  2013.11 

     More details

    Language:Japanese   Presentation type:Oral presentation (invited, special)  

    researchmap

  • 切り抜き攻撃に耐性を持つDCT-OFDM型電子透かし方式

    HAKKA MASAKI, KURIBAYASHI MINORU, MORII MASAKATU

    信学技法, EMM  2013.11 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 学生向け電子透かしチュートリアル

    KURIBAYASHI MINORU

    第26回回路とシステムワークショップ  2013.7 

     More details

    Language:Japanese   Presentation type:Oral presentation (invited, special)  

    researchmap

  • Optimal Tracing Algorithm for Fingerprinting Code under Averaging Attack

    KURIBAYASHI MINORU

    Technical Report of IEICE, EMM  2013.5 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • DCT-OFDMに基づく電子透かしの耐性向上

    HAKKA MASAKI, KURIBAYASHI MINORU, MORII MASAKATU

    2013 年暗号と情報セキュリティシン ポジウム(SCIS2013)  2013.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Collusion Secure Blind Fingerprinting Scheme

    KURIBAYASHI MINORU

    The 2013 Symposium on Cryptography and Information Security (SCIS2013)  2013.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 第1回画像・映像電子透かしコンテスト実施結果とその講評

    KURIBAYASHI MINORU

    電子情報通信学会マルチメディアエンリッチメント(EMM)研究会  2013.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 画像・映像信号用電子透かし評価基準2013の提案

    KURIBAYASHI MINORU

    2013 年暗号と情報セキュリティシン ポジウム(SCIS2013)  2013.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 重み一定符号化したスペクトル拡散型電子透かし

    HAKKA MASAKI, KURIBAYASHI MINORU, MORII MASAKATU

    第35 回情報理論とその応用シンポジ ウム(SITA2012)  2012.12 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Coded OFDM system with spreading operation

    KURIBAYASHI MINORU, MORII MASAKATU

    35th Symposium of Information Theory and its Applications (SITA2012)  2012.12 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • OFDM-type spread spectrum watermarkging scheme

    KURIBAYASHI MINORU, HAKKA MASAKI, MORII MASAKATU

    Technical Report of IEICE, EMM  2012.11 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • スペクトル拡散技術に基づく電子指紋方式

    栗林 稔

    科研費ワークショップ「相関特性に優れたスペクトル拡散系列に基づく安全性の高い情報ハイディング技術の開発」  2012.3 

     More details

    Language:Japanese   Presentation type:Oral presentation (invited, special)  

    researchmap

  • Bias equalizer for probabilistic fingerprinting codes considering encoding parameters

    Minoru Kuribayashi

    The 2012 Symposium on Cryptography and Information Security  2012.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 画像・映像用電子透かしの評価基準に関する検討

    合志 清一, 越前 功, 藤吉 正明, 岩田 基, 栗林 稔, 岩村 惠一

    2012年暗号と情報セキュリティシンポジウム  2012.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Adaptive interference removal operation for spread spectrum fingerprinting scheme

    Minoru Kuribayashi

    34th Symposium of Information Theory and its Applications  2011.12 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Expansion of image displayable area in design QR code and its applications

    Kazuaki Fujita, Minoru Kuribayashi, Masakatu Morii

    Forum on Information Technology 2011(FIT2011)  2011.9 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Bias equalizer for tracing algorithm of binary fingerprinting codes

    Minoru Kuribayashi

    Technical Report of IEICE, EMM  2011.7 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Hybrid Tracing Algorithm for Probabilistic Fingerprinting Code

    Minoru Kuribayashi

    2011年 暗号と情報セキュリティシンポジウム(SCIS2011)  2011.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:小倉  

    researchmap

  • QRコードへの画像埋め込みに関する検討と提案

    Kazuaki Fujita, Minoru Kuribayashi, Masakatu Morii

    LOIS研究会  2011.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:長崎  

    researchmap

  • Effect of Gaussian noise on the performance of binary fingerprinting code

    Minoru Kuribayashi

    The 33th Symp. on Information Theory and its Applications (SITA2010)  2010.12 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:長野  

    researchmap

  • 一方向性関数を用いた時限付き鍵管理技術の提案

    Ryoichi Isawa, Minoru Kuribayashi, Masakatu Morii, Sadako Takasuka

    ICSS研究会  2010.11 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:広島  

    researchmap

  • On the evaluation of spread spectrum fingerprinting

    Minoru Kuribayashi

    Computer Security Symposium 2010 (CSS2010)  2010.10 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:岡山  

    researchmap

  • 結託攻撃を受けたTardos符号からの攻撃法の判別

    門田 宜也, 栗林 稔, 森井 昌克

    SCIS2010  2010.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:香川県高松市  

    researchmap

  • Tardos's Fingerprinting Code over AWGN Channel

    Minoru Kuribayashi

    SCIS2010  2010.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:香川県高松市  

    researchmap

  • 電子指紋の結託耐性に有効な量子化方法の提案

    加藤 寛史, 栗林 稔, 森井 昌克

    SCIS2010  2010.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:香川県高松市  

    researchmap

  • スペクトル拡散技術と電子透かし

    栗林 稔

    SITA2009 ワークショップ  2009.12 

     More details

    Language:Japanese   Presentation type:Oral presentation (invited, special)  

    Venue:山口県湯田温泉  

    researchmap

  • Utilization of Interleaver for CDMA-Based Fingerprinting Scheme

    Minoru Kuribayashi

    SITA2009  2009.12 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:山口県湯田温泉  

    researchmap

  • 結託耐性符号の雑音による影響解析

    門田 宜也, 栗林 稔, 森井 昌克

    CSS2009  2009.10 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:富山  

    researchmap

  • 電子指紋技術における量子化誤差が与える影響の解析

    加藤 寛史, 栗林 稔, 森井 昌克

    CSS2009  2009.10 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:富山  

    researchmap

  • Implementation of CDMA-based fingerprinting scheme in asymmetric fingerprinting protocol

    Minoru Kuribayashi

    CSS2009  2009.10 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:富山  

    researchmap

  • A Study on the Traceability of CDMA-based Fingerprinting Scheme

    Minoru Kuribayashi, Masakatu Morii

    Symposimum on Cryptography and Information Security(SCIS2008)  2009.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:Shiga  

    researchmap

  • 計算量の観点による2階層Tardos符号の最適化

    門田 宣也, 栗林 稔, 森井 昌克

    コンピュータセキュリティシンポジウム(CSS2008)  2008.10 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:沖縄  

    researchmap

  • Tardos符号のトレーサビリティの評価

    明石 直之, 栗林 稔, 森井 昌克

    暗号と情報セキュリティシンポジウム  2008.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:宮崎 シーガイア  

    researchmap

  • On the Performance Analysis of Detection Method for CDMA-based Fingerprinting Scheme

    Minoru Kuribayashi, Masakatu morii

    暗号と情報セキュリティシンポジウム  2008.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:宮崎 シーガイア  

    researchmap

  • CDMA技術に基づく電子指紋方式の階層構造の拡大

    加藤 寛史, 栗林 稔, 森井 昌克

    暗号と情報セキュリティシンポジウム  2008.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:宮崎 シーガイア  

    researchmap

  • Effective Detection Method for CDMA-based Fingerprinting Scheme

    Minoru Kuribayashi, Naoki Hayashi, Masakatu Morii

    情報理論とその応用シンポジウム  2007.11 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:三重 賢島  

    researchmap

  • JPEG圧縮における可逆データハイディング

    酒井 宏誌, 栗林 稔, 森井 昌克

    情報理論とその応用シンポジウム  2007.11 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:三重 賢島  

    researchmap

  • 非対称電子指紋プロトコルの実装について

    山根 進也, 栗林 稔, 森井 昌克

    信学技報 ISEC  2007.9 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:機械振興会館  

    researchmap

  • Spread spectrum watermark with self-synchronization capability

    Minoru Kuribayashi, Masakatu Morii

    Proc. of the 2006 Symposium on Cryptography and Information Security  2007.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:Nagasaki  

    researchmap

  • 凖同型写像の性質に基づく非対称電子指紋プロトコルのための電子透かし

    Minoru Kuribayashi

    2006年暗号と情報セキュリティシンポジウム  2007.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:長崎  

    researchmap

  • CDMA技術に基づく電子指紋方式のスペクトル系列構成法の検討

    林 直樹, 栗林 稔, 森井 昌克

    情報理論とその応用シンポジウム  2007 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:三重 賢島  

    researchmap

  • Video watermark with self-synchronization capability

    Minoru Kuribayashi, Masakatu Morii

    IEICE Technical Report ISEC  2006.11 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:Tokyo  

    researchmap

  • 結託耐性を考慮した電子指紋方式の検出率改善

    林 直樹, 栗林 稔, 森井 昌克

    第29回情報理論とその応用シンポジウム  2006.11 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:北海道  

    researchmap

  • Reversible watermark based on adaptive embedding

    Minoru Kuribayashi, Masakatu Morii

    Reversible watermark based on adaptive embedding  2006.11 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:Hokkaido  

    researchmap

  • 任意の有効期間設定が可能な時限付き鍵管理方式

    田中 敏也, 栗林 稔, 森井 昌克

    コンピュータセキュリティシンポジウム2006  2006.10 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:京都  

    researchmap

  • 電子マネーの取引を利用した電子指紋プロトコル

    山根 進也, 栗林 稔, 森井 昌克

    信学技報 ISEC  2006.7 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:岡山  

    researchmap

  • 結託攻撃に対する耐性を考慮した電子指紋方式

    林 直樹, 栗林 稔, 森井 昌克

    第2回情報通信システムセキュリティ時限研究会  2006.4 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:徳島  

    researchmap

  • スペクトル拡散技術を用いた電子透かしに関する考察

    Takashi Fujii, Minoru Kuribayashi, Masakatu Morii, Hatsukazu Tanaka

    2006年暗号と情報セキュリティシンポジウム  2006.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:広島  

    researchmap

  • 時間限定サービスのための鍵管理技術

    Toshiya Tanaka, Minoru Kuribayashi, Masakatu Morii

    電子情報通信学会 OIS研究会  2006.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:大阪  

    researchmap

  • Tracing traitors from broadcasted contents

    Minoru Kuribayashi, Masakatu Morii, Hatsukazu Tanaka

    The 2006 Symp. on Cryptography and Information Security  2006.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:広島  

    researchmap

  • Reversible watermark with large capacity based on the prediction error

    Minoru Kuribayashi, Masakatu Morii, Hatsukazu Tanaka

    The 28th Symp. on Information Theory and its Applications  2005.11 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:沖縄  

    researchmap

  • 可逆電子透かしにおける埋め込み容量の向上について

    Tomohito Nakata, Minoru Kuribayashi, Masakatu Morii, Hatsukazu Tanaka

    The 28th Symp. on Information Theory and its Applications  2005.11 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:沖縄  

    researchmap

  • カオス写像を利用した期間限定サービス用鍵更新方式

    Toshiya Tanaka, Minoru Kuribayashi, Masakatu Morii, Hatsukazu Tanaka

    The 28th Symp. on Information Theory and its Applications  2005.11 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:沖縄  

    researchmap

  • 分散サーバに基づくoblivious transferを用いた電子指紋技術

    Urara Shinmyo, Minoru Kuribayashi, Masakatu Morii, Hatsukazu Tanaka

    The 28th Symp. on Information Theory and its Applications  2005.11 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:沖縄  

    researchmap

  • 時系列上でのイベント依存モデルに基づく被害予測システムの開発

    Daisuke Noguchi, Yoshiaki Shiraishi, Minoru Kuribayashi, Hidenori Kuwakado, Masakatu Morii

    コンピュータセキュリティシンポジウム2005  2005.10 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:愛媛  

    researchmap

  • A secure reversible watermark using predictive coding

    Minoru Kuribayashi, Masakatu Morii, Hatsukazu Tanaka

    Technical Report of IEICE  2005.7 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:岩手  

    researchmap

  • A broadcasting system based on the watermarking

    KURIBAYASHI Minoru, TANAKA Hatsukazu

    Proceedings of the 2005 IEICE Society Conference.  2005.3  電子情報通信学会

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:未記入  

    researchmap

  • Fingerprinting Protocol Based on Key Management

    KURIBAYASHI Minoru, TANAKA Hatsukazu

    2005 IEICE General Conference  2005.3  未記入

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:未記入  

    researchmap

  • DCT係数の大きさに応じた電子透かし方式

    Takashi Fujii, Minoru Kuribayashi, Hatsukazu Tanaka

    2005年情報通信学会総合大会  2005.3  電子情報通信学会

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:未記入  

    researchmap

  • Key Generation Scheme for Broadcast Encryption Exploiting Chaotic Sequences

    KURIBAYASHI Minoru, TANAKA Hatsukazu

    2005 Symposium on Cryptography and Information Security  2005.1  未記入

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:未記入  

    researchmap

  • On the Genaration of Cyclic Sets from Cyclic Codes

    KURIBAYASHI Minoru, TANAKA Hatsukazu

    27th Symposium on Information Theory and its Applications  2004.12  未記入

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:未記入  

    researchmap

  • A Key Generation Method for Broadcasting System with Expiration Date

    KURIBAYASHI Minoru, TANAKA Hatsukazu

    27th Symposium on Information Theory and its Applications  2004.12  未記入

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:未記入  

    researchmap

  • 分散サーバを利用したコンテンツの不正配布立証可能な電子指紋方式

    Urara Shinmyo, Minoru Kuribayashi, Hatsukazu Tanaka

    第27回情報理論とその応用シンポジウム  2004.12  情報理論とその応用学会

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:未記入  

    researchmap

  • A broadcasting system based on the watermarking

    KURIBAYASHI Minoru, TANAKA Hatsukazu

    Proceedings of the 2004 IEICE Society Conference.  2004.3  未記入

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:未記入  

    researchmap

  • 幾何学的歪み補正を用いた電子透かし検出能力の改善法

    Ryuji Hisanaga, Minoru Kuribayashi, Hatsukazu Tanaka

    第27回情報理論とその応用シンポジウム  2004  情報理論とその応用学会

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:未記入  

    researchmap

▼display all

Industrial property rights

  • ブロードキャスト型コンテンツ配信システム、及び同システムに適用されるユーザ鍵管理方法

    栗林 稔, 田中 初一

     More details

    Application no:特願2004-380584  Date applied:2004.12.28

    Patent/Registration no:特許4644799  Date issued:2010.12.17

    researchmap

Awards

  • FIT Funai Best Paper Award

    2022.12  

     More details

  • 2020年度 第6回EMM研究会 優秀学生発表賞

    2021.3   IEICE情報・システムソサイエティ(ISS) EMM研究会  

     More details

  • 学生研究賞

    2021.3   IEICE情報・システムソサイエティ(ISS) EMM研究会  

     More details

  • テレコムシステム技術学生賞 佳作

    2021.3   公益財団法人 電気通信普及財団  

     More details

  • 活動功労賞

    2020.6   IEICE情報・システムソサイエティ(ISS)  

     More details

  • Best Paper Award

    2019.11   18th Int. Workshop Digital-forensics and Watermarking (IWDW2019)   Improved DM-QIM watermarking scheme for PDF document

    Minoru Kuribayashi, KokSheik Wong

     More details

  • 第6回EMM研究会 優秀ポスター賞

    2019.3   IEICE情報・システムソサイエティ(ISS)  

     More details

  • IEICE基礎・境界ソサイエティ(ESS) 貢献賞(編集)

    2018.6  

    栗林 稔

     More details

  • 2017年度 EMM研究会 学生研究賞

    2018.5   IEICE情報・システムソサイエティ(ISS)  

     More details

  • 2017年度 第6回EMM研究会 優秀ポスター賞

    2018.3   IEICE情報・システムソサイエティ(ISS)  

     More details

  • The Thirteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2017) Excellent Paper Award

    2017.8   Data hiding for text document in PDF file

    Minoru Kuribayashi, Takuya Fukushima, Nobuo Funabiki

     More details

  • 2016年1月号学会誌 ベストオーサー賞

    2016.1   映像情報メディア学会  

    栗林 稔

     More details

  • T14th IWDW, International Workshop on Digital-forensics and Watermarking (IWDW 2015) Best Paper Award

    2015.10   Fingerprinting for broadcast content distribution system

    KURIBAYASHI MINORU

     More details

  • IEEE Kansai Section Young Professionals Award

    2015.2   IEEE Kansai Section   電子指紋技術に関する先駆的な研究成果

    KURIBAYASHI MINORU

     More details

    Award type:International academic award (Japan or overseas) 

    researchmap

  • IEICE基礎・境界ソサイエティ(ESS) 編集活動感謝状

    2014.6  

    栗林 稔

     More details

  • IEICE 情報・システムソサイエティIHC 研究会高画質賞

    2013.9   IEICE 情報・システムソサイエティIHC 研究会   スペクトル拡散技術に基づく電子透かし

     More details

    Award type:Award from Japanese society, conference, symposium, etc. 

    researchmap

  • IEICE情報・システムソサイエティ(ISS) EMM研究会 優秀ポスター賞

    2013.5  

    栗林 稔

     More details

  • IEICE情報・システムソサイエティ(ISS) IHC研究会 認定書

    2012.9  

    栗林 稔

     More details

  • IEICE基礎・境界ソサイエティ(ESS) 編集活動感謝状

    2012.6  

    栗林 稔

     More details

  • IEEE 関西支部メダル受賞

    2012.2   IEEE Kansai Section  

    KURIBAYASHI MINORU

     More details

    Award type:Award from international society, conference, symposium, etc. 

    IEEE Senior Memberに昇格

    researchmap

▼display all

Research Projects

  • 切り取り処理によるプロパガンダ戦略に対する防御技術基盤

    Grant number:22K19777  2022.06 - 2025.03

    日本学術振興会  科学研究費助成事業 挑戦的研究(萌芽)  挑戦的研究(萌芽)

    栗林 稔

      More details

    Grant amount:\6370000 ( Direct expense: \4900000 、 Indirect expense:\1470000 )

    researchmap

  • Detection of Fake News on Social Media Platforms (DISSIMILAR)

    2021.04 - 2024.03

    Japan Science and Technology Agency  EIG CONCERT-Japan within the Framework of the Strategic International Collaborative Research Program (SICORP) "ICT for Resilient, Safe and Secure Society” 

      More details

    Authorship:Principal investigator 

    researchmap

  • Multimedia Forensics for Classification of Fake Content

    Grant number:19K22846  2019.06 - 2022.03

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research Challenging Research (Exploratory)  Challenging Research (Exploratory)

    栗林 稔

      More details

    Grant amount:\6370000 ( Direct expense: \4900000 、 Indirect expense:\1470000 )

    researchmap

  • Protection against internal leakage of sensitive data using a time-bounded key management system

    Grant number:16K00185  2016.04 - 2019.03

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (C)  Grant-in-Aid for Scientific Research (C)

    Kuribayashi Minoru

      More details

    Authorship:Principal investigator  Grant type:Competitive

    Grant amount:\4550000 ( Direct expense: \3500000 、 Indirect expense:\1050000 )

    It is difficult to prevent a malicious user who has privilege in an organization from leaking sensitive data even if an encryption tool is used. In this study, we proposed a secure data management system which gives permission for users by access control technique based on cryptographic tools and allows a system manager to identify traitors from leaked file. The traceability is realized by embedding digital fingerprint of the user who access to the file. We proposed a method for embedding such a fingerprint into PDF document and implement on a management system. The fingerprint is encoded by a collusion secure code so as to tolerate a collusion attack by a coalition of traitors. We proposed an optimal detector by estimating the collusion strategy and the number of traitors from the information extracted from a pirated copy.

    researchmap

  • Practical Managemet System for Multimedia Content

    Grant number:24760299  2012.04 - 2015.03

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research Grant-in-Aid for Young Scientists (B)  Grant-in-Aid for Young Scientists (B)

    KURIBAYASHI MINORU

      More details

    Authorship:Principal investigator  Grant type:Competitive

    Grant amount:\4290000 ( Direct expense: \3300000 、 Indirect expense:\990000 )

    Fingerprinting technique enables us to identify illegal users from a pirated copy of multimedia content. In this study, I developed an efficient detector based on signal processing techniques involving a spread spectrum method. Even if more than 100 illegal users collude, the proposed detector can detect almost all of them with reasonable computational costs. The probability that innocent users are accused by chance is limited to be extremely small. I also developed an optimal detection algorithm for a collusion secure code under a realistic threat of collusion attack. Since the optimal algorithm requires the number of illegal users and their attack straregy in advance, it is difficult to realize in essense. In order to make it practical, I introduced a statistical analysis and approximations at the detection algorithm. As the results, I succeedded to realize a simplified detection algorithm which performance is remarkably close to the optimal one.

    researchmap

  • A Study of Traceability based on Digital Fingerprint

    Grant number:21760291  2009 - 2010

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research Grant-in-Aid for Young Scientists (B)  Grant-in-Aid for Young Scientists (B)

    KURIBAYASHI Minoru

      More details

    Authorship:Principal investigator  Grant type:Competitive

    Grant amount:\4420000 ( Direct expense: \3400000 、 Indirect expense:\1020000 )

    In this research, the actual traceability of spread-spectrum based fingerprinting scheme and collusion secure code with a constant and tiny false-positive probability has been analyzed both from the theoretical and experimental points of view. In the analysis, some constraints in attack strategies are relaxed to consider more realistic attack environment. Considering the effects caused by this attack, proper detectors that identify colluders involved in a pirated copy have been proposed to maximize the traceability. Furthermore, the procedure implementing the fingerprinting scheme in a cryptographic protocol has been proposed without seriously degrading the traceability and increasing the communication costs.

    researchmap

  • Digital fingerprinting system for the protection of the ownership of digital contents

    Grant number:19760254  2007 - 2008

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research Grant-in-Aid for Young Scientists (B)  Grant-in-Aid for Young Scientists (B)

    KURIBAYASHI Minoru

      More details

    Authorship:Principal investigator  Grant type:Competitive

    Grant amount:\3560000 ( Direct expense: \3200000 、 Indirect expense:\360000 )

    本研究では,スペクトル拡散技術に基づく電子指紋技術において,ディジタル画像を通信路と見立てて,埋め込む指紋信号を送受信するデータにモデル化し,通信路の周波数帯域を複数のユーザで共有できるCDMA技術を導入した.本システムでの指紋信号は,直交系列であるDCT基底ベクトルを特定のPN系列で変調させている.指紋信号を2成分に分けて更にPN系列の特性を利用して階層構造を与えることで,結託者の特定に要する計算量を従来法に比べて大幅に削減させた.この階層構造を与える手法を結託耐性符号の構成にも応用させて,従来では難しかった実時間内での検出を可能とさせた.結託人数の増加に伴い指紋信号間の干渉成分が増大するが,これらを理論的に考察し,効率良く干渉成分を削減する手法を提案した.その結果,従来手法に比べて結託耐性を向上させることに成功し,要する計算量を対数オーダーで削減できることが確認された.

    researchmap

  • ブロードキャスト型有料コンテンツ配信における鍵管理技術

    Grant number:17760307  2005 - 2006

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research Grant-in-Aid for Young Scientists (B)  Grant-in-Aid for Young Scientists (B)

    栗林 稔

      More details

    Authorship:Principal investigator  Grant type:Competitive

    Grant amount:\2800000 ( Direct expense: \2800000 )

    本研究では,放送型のコンテンツ配信を行うに際して,購入契約を結んだユーザのみが該当するコンテンツを正しく受信できる方式を考案した.従来の放送型暗号方式とは異なり,購入者を特定できる情報(電子指紋)が密かに埋め込まれたコンテンツが配信されるように鍵管理を工夫しており,不正コピーが流出した際には不正者を追跡できる.本手法は,会員登録を行った上で特定の期間のみ受信できる復号鍵を契約ユーザに与える方法であり,会員登録は一定期間(例えば1年)ごとに更新させる必要がある.このアイデアは会員制のビデオショップにおける会員登録とレンタル期間を基にしており,不正があれば会員登録した際の情報から不正者を特定させることでトレーサビリティを確保している.この登録期間内でユーザが不正コピーの再配布を行えば,放送者は期間内のコンテンツに対する損害をユーザに訴えることができる.このシステムを可能とする基盤技術が,鍵管理に基づく電子指紋プロトコルと時限付鍵管理方式であり,本研究にて実現させた.また,インターネットを介したコンテンツ配信にも適用させるために,分散サーバを用いるコンテンツ配信手法を考案した.更には,電子指紋の作成方法にも着目し,不正ユーザによりコンテンツから改ざんや除去されにくくするために専用の符号を考案し,その適用例をまとめた.

    researchmap

  • 放送型暗号通信システムにおけるグループ鍵管理方式に関する研究

    Grant number:16560338  2004 - 2006

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (C)  Grant-in-Aid for Scientific Research (C)

    田中 初一, 桑門 秀典, 栗林 稔

      More details

    Grant amount:\2800000 ( Direct expense: \2800000 )

    本研究では,グループ鍵共有という極めて困難な問題を包含する放送型暗号通信システムにおけるグループ鍵管理方式を実現するために,公開鍵リストが不要なID情報に基づく暗号系に着眼した.またユーザのID情報の集合に樹構造(tree structure)を導入することにより,秘密鍵の個数が指数関数的爆発を生じることなくユーザのグループを指定して,ID暗号系によりグループの共通鍵を配送するという独創的な発想に基づき,上記の極めて困難な問題の解決を試みる.
    まず本年度は,結託閾値がなくセンタの計算負荷の軽い理想的なID情報に基づく鍵共有法の研究を行った.素因数分解問題の困難さを安全性の根拠とし,多項式オーダーの時間で容易に解ける離散対数問題を2回解いて,それらの解を合成することにより各ユーザの秘密情報が容易に生成できて,またユーザ間の共通鍵の生成はただ1回の冪乗演算で実行できるという,画期的なID情報に基づく鍵共有法と暗号系の実現法の開発に成功した.
    実現法の詳細はつぎの通りである.まずp,qを大きな素数とし,n=pq,L=1cm{p-1,q-1},L_1=L/(p-1),L_2=L/(q-1)とおく.ただし,p-1=αγ,q-1=βδと素因数分解され,α,βは大きな素数で,γ,δは大きな素因数を含まない合成数とする.次に方程式ID^α_l=g^<αx_l>(mod p)及びID^β_l=g^<βy_l>(mod q)をx_l及びy_lについて解いて,ID_lに対応するユーザlの秘密情報をd_l=αL_1x_l+βL_2y_l(mod L)とし,各ユーザlに秘密哩に配布する.最後に任意の二人のユーザをA,Bとして,AB間の鍵共有はK_<AB>=ID^<d_A>_B=ID^<d_B>_A=g^<αL_1x_Ax_B+βL^2y_Ay_B>(mod n)により容易に実行できる.

    researchmap

▼display all

 

Class subject in charge

  • Advanced Content Protection Technologies (2022academic year) Late  - 火5,火6

  • Seminar in Distributed System Design (2022academic year) Year-round  - その他

  • Advanced Information Hiding Techniques (2022academic year) Prophase  - その他

  • Engineering English (2022academic year) Late  - その他

  • Image Engineering (2022academic year) Third semester  - 火1~2,金5~6

  • Stochastic and Statistical Theory (2022academic year) Second semester  - 月7~8,木1~2

  • Specific Research of Electronics and Information Systems Engineering (2022academic year) Year-round  - その他

  • Object-oriented Programming (2021academic year) Third semester  - 月5,月6,木3,木4

  • Advanced Content Protection Technologies (2021academic year) Late  - 火5,火6

  • Programming Language Exercise II (2021academic year) Third semester  - 月5,月6,木3,木4

  • Seminar in Distributed System Design (2021academic year) Year-round  - その他

  • Advanced Information Hiding Techniques (2021academic year) Prophase  - その他

  • Engineering English (2021academic year) Late  - その他

  • Linear Algebra (2021academic year) 1st and 2nd semester  - 金5,金6

  • Linear Algebra (2021academic year) 1st and 2nd semester  - 金5,金6

  • Linear Algebra (2021academic year) 1st and 2nd semester  - 金5,金6

  • Linear Algebra (2021academic year) 1st and 2nd semester  - 金5,金6

  • Linear Algebra (2021academic year) 1st and 2nd semester  - 金5,金6

  • Linear Algebra (2021academic year) 1st and 2nd semester  - 金5,金6

  • Linear Algebra (2021academic year) 1st and 2nd semester  - [第1学期]金5,金6, [第2学期]火1,火2

  • Linear Algebra (2021academic year) 1st and 2nd semester  - 金5,金6

  • Linear Algebra (2021academic year) 1st and 2nd semester  - 金5,金6

  • Linear Algebra (2021academic year) 1st and 2nd semester  - 金5,金6

  • Linear Algebra (2021academic year) 1st and 2nd semester  - 金5,金6

  • Linear Algebra (2021academic year) 1st and 2nd semester  - 金5,金6

  • Linear Algebra (2021academic year) 1st and 2nd semester  - 金5,金6

  • Linear Algebra (2021academic year) 1st and 2nd semester  - 金5,金6

  • Linear Algebra (2021academic year) 1st and 2nd semester  - 金5,金6

  • Linear Algebra (2021academic year) 1st and 2nd semester  - 火1,火2

  • Linear Algebra (2021academic year) 1st and 2nd semester  - 金5,金6

  • Linear Algebra (2021academic year) 1st and 2nd semester  - 金5,金6

  • Linear Algebra 1 (2021academic year) 1st semester  - 金5,金6

  • Linear Algebra 1 (2021academic year) 1st semester  - 火1,火2

  • Linear Algebra 1 (2021academic year) 1st semester  - 金5,金6

  • Linear Algebra 1 (2021academic year) 1st semester  - 金5,金6

  • Linear Algebra 1 (2021academic year) 1st semester  - 金5,金6

  • Linear Algebra 1 (2021academic year) 1st semester  - 金5,金6

  • Linear Algebra 1 (2021academic year) 1st semester  - 金5,金6

  • Linear Algebra 1 (2021academic year) 1st semester  - 金5,金6

  • Linear Algebra 1 (2021academic year) 1st semester  - 金5,金6

  • Linear Algebra 2 (2021academic year) Second semester  - 金5,金6

  • Linear Algebra 2 (2021academic year) Second semester  - 火1,火2

  • Linear Algebra 2 (2021academic year) Second semester  - 金5,金6

  • Linear Algebra 2 (2021academic year) Second semester  - 金5,金6

  • Linear Algebra 2 (2021academic year) Second semester  - 金5,金6

  • Linear Algebra 2 (2021academic year) Second semester  - 金5,金6

  • Linear Algebra 2 (2021academic year) Second semester  - 金5,金6

  • Linear Algebra 2 (2021academic year) Second semester  - 金5,金6

  • Linear Algebra 2 (2021academic year) Second semester  - 金5,金6

  • Specific Research of Electronics and Information Systems Engineering (2021academic year) Year-round  - その他

  • Object-oriented Programming (2020academic year) Third semester  - 月5,月6,木3,木4

  • Advanced Content Protection Technologies (2020academic year) Late  - 火5,火6

  • Programming Language Exercise II (2020academic year) Third semester  - 月5,月6,木3,木4

  • Seminar in Distributed System Design (2020academic year) Year-round  - その他

  • Advanced Information Hiding Techniques (2020academic year) Prophase  - その他

  • Engineering English (2020academic year) Late  - その他

  • Linear Algebra (2020academic year) 1st and 2nd semester  - 金5,金6

  • Linear Algebra 1 (2020academic year) 1st semester  - 金5,金6

  • Linear Algebra 2 (2020academic year) Second semester  - 金5,金6

  • Communication Network Engineering Exercises III (2020academic year) 3rd and 4th semester  - その他

  • Specific Research of Electronics and Information Systems Engineering (2020academic year) Year-round  - その他

▼display all

 

Media Coverage

  • 「ディープフェイク」見破る技術、日本でも開発進む…難問でAI特訓・音声に検知信号 Newspaper, magazine

    読売新聞 

     More details

    Author:Other