Echizen Laboratory National Institute of Informatics (NII)

 

Department of Information and Communication Engineering,
Graduate School of Information Science and Technology, The University of Tokyo

 

Department of Informatics, School of Multidisciplinary Sciences,
The Graduate University For Advanced Studies (SOKENDAI)

Achievements(2012)

Refereed journal papers | Refereed conference papers | Books, book chapters, and research reports | Invited talks | Oral Presentation, Poster・demo | Media coverage(Press release/ News release) | Media coverage(Online articles) | Media coverage(TV / Radio) | Media coverage(Newspapers) | Media coverage(Others) | Patents | Awards | Others

Refereed journal papers

  1. T. Yamada, I. Echizen, and H. Yoshiura, "PC-Based Real-Time Video Watermark Embedding System Independent of Platform for Parallel Computing," Transactions on Data Hiding and Multimedia Security, vol. 7, pp. 15-33, Springer (March 2012)
  2. I. Echizen, T. Yamada, and S. Gohshi, "IR Hiding: Method for Preventing Illegal Recording of Videos Based on Differences in Sensory Perception between Humans and Devices," Transactions on Data Hiding and Multimedia Security, vol. 7, pp. 34-51, Springer (March 2012)
  3. T. Kajiyama and I. Echizen, "A Faceted Navigation System for Helping Children Understand Features of Risky Website," International Journal of Information Processing and Management, vol. 3, no. 2, pp. 35-44 (April 2012)

Refereed conference papers

  1. F. Murakami, K. Komoriya, R. Uda, S. Gohshi, and I. Echizen, "Preventing Surreptitious Filming by Saturation Irradiation of Infrared Rays," The Eighth International Symposium on Frontiers of Information Systems and Network Applications, Proc. of the 26th IEEE International Conference on Advanced Information Networking and Applications (AINA-2012), pp. 232-237 (March 2012)
  2. T. Yamada, S. Gohshi, and I. Echizen, "Enhancement of Method for Preventing Illegal Recording of Movies to Enable it to Detect Cameras with Attached Infrared-cut filter," Proc. of the 37th International Conference on Acoustics, Speech, and Signal Processing (ICASSP2012), pp.1825-1828 (March 2012)
  3. H. Nguyen-Son, Q. Nguyen, M. Tran, D. Nguyen, H. Yoshiura, and I. Echizen, "New Approach to Anonymity of User Information on Social Networking Services," The 6th International Symposium on Digital Forensics and Information Security (DFIS-12), Proc. of the 7th FTRA International Conference on Future Information Technology (FutureTech2012), Lecture Notes in Electrical Engineering, vol. 164, pp. 731-739, Springer (June 2012)
  4. H. Nguyen-Son, Q. Nguyen, M. Tran, D. Nguyen, H. Yoshiura, and I. Echizen, "Automatic Anonymization of Natural Languages Texts Posted on Social Networking Services and Automatic Detection of Disclosure," the 7th International Workshop on Frontiers in Availability, Reliability and Security (FARES 2012), Proc. of the International Conference on Availability, Reliability and Security (ARES 2012), pp. 358-364 (August 2012)
  5. T. Kajiyama and I. Echizen, "Evaluation of an Improved Visualization System for Helping Children Identify Risky Websites," the 2nd International Workshop on Resilience and IT-Risk in Social Infrastructures (RISI 2012), Proc. of the International Conference on Availability, Reliability and Security (ARES 2012), pp. 495-498 (August 2012)
  6. M. Hirose, T. Muraki, A. Utsumi, I. Echizen, and H. Yoshiura, "A Private Information Detector for Controlling Circulation of Private Information through Social Networks," the 2nd International Workshop on Resilience and IT-Risk in Social Infrastructures (RISI 2012), Proc. of the International Conference on Availability, Reliability and Security (ARES 2012), pp. 473-478 (August 2012)
  7. T. Hue, N. Luyen, D. Kha, S. Wohlgemuth, I. Echizen, N. Thuc, D. Thuy, "An Efficient Fine-grained Access Control Mechanism for Database Outsourcing Service," Proc. of the 2012 International Conference on Information Security and Intelligent Control (ISIC 2012), pp. 67-71, (August 2012)
  8. J. Munoz-Gama and I. Echizen, "Insuring Sensitive Processes through Process Mining," Proc. of the 9th IEEE International Conference on Autonomic and Trusted Computing (ATC 2012), pp. 447-454, (September 2012)
  9. H. Nishikawa, S. Kuse, K. Iwamura, and I. Echizen, "A method for resisting averaging attacks on digital watermarks and use of this method with digital watermarks," the third International Workshop on Trustworthy Computing, Proc. of the 15th International Conference on Network-Based Information Systems (NBiS-2012), pp. 777-781, (September 2012)
  10. T. Yamada, S. Gohshi, and I. Echizen, "Use of invisible noise signals to prevent privacy invasion through face recognition from camera images," Proc. of the ACM Multimedia 2012 (ACM MM 2012), pp.1315-1316, (October 2012)
  11. T. Yamada, S. Gohshi, and I. Echizen, “Enhancement of method for preventing unauthorized copying of displayed information using object surface reflection,” Proc. of the 11th International Workshop on Digital-Forensics and Watermarking (IWDW 2012), LNCS7809, pp. 184-197, Springer (October 2012)
  12. H. Nguyen-Son, Q. Nguyen, M. Tran, D. Nguyen, H. Yoshiura, and I. Echizen, “Automatic Anonymous Fingerprinting of Text Posted on Social Networking Services,” Proc. of the 11th International Workshop on Digital-Forensics and Watermarking (IWDW 2012), LNCS7809, pp. 410-424, Springer (October 2012)
  13. A-T. Hoang, M-T. Tran, A-D. Duong, and I. Echizen, " An Indexed Bottom-up Approach for Publishing Anonymized Data," Third International Workshop on Trustworthy Computing, Proc. of the 8th International Conference on Computational Intelligence and Security (CIS 2012), pp. 641-645, (November 2012)
  14. T. Yamada, S. Gohshi, and I. Echizen, “Privacy Visor: wearable device for privacy protection based on differences in sensory perception between humans and devices,” The 7th International Workshop on Security (IWSEC2012), (November 2012)
  15. T. Yamada, S. Gohshi, and I. Echizen, “Preventing unauthorized copying of displayed information by utilizing differences in spectral sensitivity between humans and imaging devices,” Proc. of the IEEE International Workshop on Information Forensics and Security (WIFS'12), pp. 145-150, (December 2012)

Books, book chapters, and research reports

  1. X. Huang, Y. Abe, and I. Echizen, "A Fast and Low-Distortion Capacity Adaptive Synchronized Acoustic-to-Acoustic Steganography Scheme," Recent Advances in Information Hiding and Applications (J. Pan, H. Huang, L. Jain, and Y. Zhao, eds.), Chapter 9, pp. 181-209, Springer (2012)

Invited talks

Oral Presentation, Poster・demo

Media coverage(Press release/ News release)

Media coverage(Online articles)

  1. NIKKEI.com, Device Fools Face Recognition System To Protect Privacy December 18, 2012

Media coverage(TV / Radio)

Media coverage(Newspapers)

Media coverage(Others)

Patents

  1. I. Echizen, T. Yamada, N. Miura, M. Maeta, T. Mizuno: Dynamic image content tamper detecting device and system, US Patent No. 8285998(Issued: October 9, 2012)

Awards

Others