Echizen Laboratory National Institute of Informatics (NII)

 

Department of Information and Communication Engineering,
Graduate School of Information Science and Technology, The University of Tokyo

 

Department of Informatics, School of Multidisciplinary Sciences,
The Graduate University For Advanced Studies (SOKENDAI)

Achievements(2011)

Refereed journal papers | Refereed conference papers | Books, book chapters, and research reports | Invited talks | Oral Presentation, Poster・demo | Media coverage(Press release/ News release) | Media coverage(Online articles) | Media coverage(TV / Radio) | Media coverage(Newspapers) | Media coverage(Others) | Patents | Awards | Others

Refereed journal papers

  1. S. Haas, S. Wohlgemuth, I. Echizen, N. Sonehara and G. Mueller, “Aspects of Privacy for Electronic Health Records”, International Journal of Medical Informatics, Special Issue: Security in Health Information Systems 80(2), pp.e26-e31, Elsevier, http://dx.doi.org/10.1016/j.ijmedinf.2010.10.001 (February 2011)
  2. M. Tran, T. Nguyen, A. Duong, and I. Echizen, “Pool-Based Anonymous Communication Framework for High Performance Computing,” Journal of Supercomputing, Volume 55, Issue 2, pp.246-268, Springer (February 2011)
  3. N. Sonehara, I. Echizen, and S. Wohlgemuth, “Isolation in Cloud Computing und Mechanismen zum Schutz der Privatsphäre. Schwerpunktheft Nachhaltiges Computing in Clouds der Zeitschrift,” WIRTSCHAFTSINFORMATIK, vol. 53, no. 3, Gabler, pp. 151-158, (June 2011)
  4. N. Sonehara, I. Echizen, and S. Wohlgemuth, “Isolation in Cloud Computing and Privacy-Enhancing Technologies: Suitability of Privacy-Enhancing Technologies for Separating Data Usage in Business Processes,” Business Information Systems Engineering (BISE)/WIRTSCHAFTSINFORMATIK", vol. 3, no. 3, pp. 155-162, Gabler (June 2011)
  5. S. Wohlgemuth, I. Echizen, N. Sonehara, and Gunter Muller, “On Privacy-compliant Disclosure of Personal Data to Third Parties using Digital Watermarking,” Journal of Information Hiding and Multimedia Signal Processing, Vol. 2, No. 2, pp. 269-280 (July 2011)
  6. P. Hue, S. Wohlgemuth, I. Echizen, N. Thuc, and D. Thuy, “An Experimental Evaluation for a New Column ? Level Access Control Mechanism for Electronic Health Record Systems,” International Journal of u- and e- Service, Science and Technology, vol. 4, no. 3, pp. 73-86 (September 2011)

Refereed conference papers

  1. P. Hue, T. Nguyen, D. Thuc, I. Echizen, and T. Dinh, “A Mutual and Pseudo Inverse Matrix - Based Authentication Mechanism for Outsourcing Service,” Proc. of the 3rd Asian Conference on Intelligent Information and Database Systems (ACIIDS 2011), LNAI 6591, pp.119-128, Springer (April 2011)
  2. K. Rechert, S, Wohlgemuth, and I. Echizen, “User Centric Privacy in Mobile Communication Scenarios,” Proc. of the 11th IEEE/IPSJ International Symposium on Applications and the Internet (SAINT 2011), pp. 202-207 (July 2011)
  3. S. Schrittwieser, P. Kieseberg, I. Echizen, S. Wohlgemuth, and N. Sonehara. “Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of Disasters,” In International Workshop on Resilience and IT-Risk in Social Infrastructures (RISI 2011), Proc. of the 6th ARES conference (ARES 2011), IEEE Computer Society, pp. 645-649 (August 2011)
  4. T. Yamada, S. Gohshi, and I. Echizen, “Countermeasure of re-recording prevention against attack with short wavelength pass filter,” Proc. of the 2011 IEEE 18th International Conference on Image Processing (ICIP2011), pp. 2753-2756 (September 2011).
  5. P. Dhar and I. Echizen, “Robust FFT Based Watermarking Scheme for Copyright Protection of Digital Audio,” Proc. of the 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2011), pp. 181-184 (October 2011)
  6. M. Salfer, S. Wohlgemuth, S. Schrittwieser, B. Bauer, and I. Echizen, “Data Provenance with Watermarks for Usage Control Monitors at Disaster Recovery” International Workshop on Resilience and ICT for Secure Open Cities (ReISOC) 2011, Proc. of the 4th IEEE International Conference on Cyber, Physical and Social Computing, pp. 514-519  (October 2011)
  7. S. Schrittwieser, P. Kieseberg, I. Echizen, S. Wohlgemuth, N. Sonehara, and E. Weippl, “An Algorithm for k-anonymity-based Fingerprinting,” Proc. of the 10th International Workshop on Digital-Forensics and Watermarking (IWDW 2011), LNCS 7128, pp. 439-452, Springer (October 2011)
  8. T. Yamada, S. Gohshi, and I. Echizen, “IR Hiding: Method to Prevent Re-recording Screen Image Built in Short Wavelength Pass Filter Detection Method using Specular Reflection,” Proc. of the 10th International Workshop on Digital-Forensics and Watermarking (IWDW 2011), LNCS 7128, pp. 111-125, Springer (October 2011)
  9. T. Yamada, S. Gohshi, and I. Echizen, “Method for preventing illegal recording of displayed content based on differences in sensory perception between humans and devices,” The 6th International Workshop on Security ( IWSEC2011), (November 2011)
  10. T. Yamada, S. Gohshi, and I. Echizen, “iCabinet: Stand-alone implementation of a method for preventing illegal recording of displayed content by adding invisible noise signals,” Proc. of the ACM Multimedia 2011 (ACM MM 2011), pp. 771-772 (November 2011)
  11. T. Kajiyama and I. Echizen, “A Faceted Navigation System for Helping Children Understand Features of Risky Websites,” Proc. of the 2nd International Conference on Advancements in Computing Technology, 6 pages (November 2011)

Books, book chapters, and research reports

Invited talks

Oral Presentation, Poster・demo

Media coverage(Press release/ News release)

Media coverage(Online articles)

Media coverage(TV / Radio)

Media coverage(Newspapers)

Media coverage(Others)

  1. G. Mueller, N. Sonehara, I. Echizen, and S. Wohlgemuth (eds.), “Sustainable Cloud Computing,” Special Issue 3/2011 of the international journal Business & Information Systems Engineering (BISE) and the German journal WIRTSCHAFTSINFORMATIK, Gabler (June 2011)

Patents

Awards

Others