Echizen Laboratory National Institute of Informatics (NII)

 

Department of Information and Communication Engineering,
Graduate School of Information Science and Technology, The University of Tokyo

 

Department of Informatics, School of Multidisciplinary Sciences,
The Graduate University For Advanced Studies (SOKENDAI)

Achievements(2017)

Refereed journal papers | Refereed conference papers | Books, book chapters, and research reports | Invited talks | Oral Presentation, Poster・demo | Media coverage(Press release/ News release) | Media coverage(Online articles) | Media coverage(TV / Radio) | Media coverage(Newspapers) | Media coverage(Others) | Patents | Awards | Others

Refereed journal papers

  1. T. Truong, T. Tran, D. Duong, and I. Echizen, "Provable identity based user authentication scheme on ECC in multi-server environment," Wireless Personal Communications, vol. 92,pp.2785–2801, Springer (2017)
  2. X. Huang, N. Ono, A. Nishimura, I. Echizen, "Reversible Audio Information Hiding for Tampering Detection and Localization Using Sample Scanning Method," Journal of Information Processing (JIP), vol. 58, no. 7, pp. 469-476 (July 2017)

Refereed conference papers

  1. L. Barua, P. Dhar, L. Alam, and I. Echizen, “Bangla Text Compression Based on Modified Lempel-Ziv-Welch Algorithm,” Proc. of the International Conference on Electrical, Computer and Communication Engineering (ECCE2017), pp.855-859,(February 2017)
  2. A. Islam, P. Dhar, M. Haque, and I. Echizen, “An Asymmetric Key Based Encryption and Decryption Algorithm for Secured Data Transfer,” Proc. of the International Conference on Electrical, Computer and Communication Engineering (ECCE2017), 4 pages, (February 2017)
  3. Y. Matsue, K. Kaneda, K. Iwamura, and I. Echizen, “Study of an information extraction method using a single-dot pattern method with clear ink,” Proc. of the 5th IIEEJ International Workshop on Image Electronics and Visual Computing (IEVC2017),pp.1-4, (March 2017)
  4. W. Tomita, K. Kaneda, K. Iwamura, and I. Echizen, “Expanding Information Hiding Scheme using Artificial Fiber (AF) Pattern into Katagami Patterns with A Low-resolution Web Camera,” Proc. of the 5th IIEEJ International Workshop on Image Electronics and Visual Computing (IEVC2017), 4 pages, (March 2017)
  5. O. Mwambe and I. Echizen, "Security Oriented Malicious Activity Diagrams to Support Information Systems Security," The 13th International Symposium on Frontiers of Information Systems and Network Applications (FINA-2017), Proc. of the 31st IEEE International Conference on Advanced Information Networking and Applications (AINA-2017),pp.74-81, (March 2017)
  6. H.-Q. Nguyen-Son and I. Echizen, "Detecting Computer-Generated Text Using Fluency and Noise Features," Proc. of the 2017 Conference of the Pacific Association for Computational Linguistics (Pacling2017),pp.288-300 , (August 2017)
  7. R. Toledo G. Danezis I. Echizen, "Mix-ORAM: Using Delegated Shuffles," Proc. of the 2017 on Workshop on Privacy in the Electronic Society (WPES2017, held in conjunction with the ACM CCS conference), pp.51-61 (October 2017)
  8. T. Ogane and I. Echizen, "BiometricJammer: Preventing surreptitious fingerprint photography without inconveniencing users," Proc of the International Joint Conference on Biometrics 2017 (IJCB2017),pp.253-260,(October 2017)
  9. S. Machida, A. Dabrowski, E. Weippl, and Isao Echizen, "PrivacyTag: A Community-based Method for Protecting Privacy of Photographed Subjects in Online Social Networks," Proc. of , The 16th IFIP Conference on e-Business, e-Services and e-Society (I3E2017),pp,261-275, (November 2017) [Best Paper Award]
  10. N. Tieu, H. Nguyen, H. Nguyen-Son, J. Yamagishi, and I. Echizen, "An Approach for Gait Anonymization using Deep Learning," Proc. of the 9th IEEE International Workshop on Information Forensics and Security 2017 (WIFS2017), ,pp.1-6, (December 2017) [Best Paper Award]
  11. N. Rahmouni, V. Nozick, J. Yamagishi, and I. Echizen, "Distinguishing Computer Graphics from Natural Images Using Convolution Neural Networks," Proc of the 9th IEEE International Workshop on Information Forensics and Security 2017 (WIFS2017), pp.1-6, (December 2017)
  12. H.-Q. Nguyen-Son, T. T. Ngoc Dung, H. H. Nguyen, J. Yamagishi, and I. Echizen, "Identifying Computer-Generated Text Using Statistical Analysis," Proc. of the AsiaPacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC 2017), pp.1504-1511, (December 2017)
  13. F. Mollers, S. Vogelgesang, J. Kruger, I. Echizen, and C. Sorge, "Modelling Traffic Analysis in Home Automation Systems," Proc. of the 16th International Conference on Cryptology And Network Security (CANS2017), pp .526-536,(December 2017)

Books, book chapters, and research reports

Invited talks

Oral Presentation, Poster・demo

Media coverage(Press release/ News release)

Media coverage(Online articles)

  1. Naked Security, Designer launches fabric to bamboozle facial recognition January 4, 2017
  2. QUARTZ, New “camouflage” seeks to make you unrecognizable to facial-recognition technologyJanuary 6, 2017
  3. PHYS ORG
    Japan researchers warn of fingerprint theft from 'peace' sign January 11, 2017
  4. The Japan Times, Researchers warn of fingerprint theft from ‘peace’ sign January 12 , 2017
  5. The Telegraph, Peace sign selfies could let hackers copy your fingerprints Jan. 12, 2017
  6. The Times, Photos are a giveaway for fingerprint fraudsters Jan. 13, 2017
  7. Financial Times, Fingerprint theft points to digital danger Jan. 16, 2017
  8. Reuters,'Peace' signs risk fingerprint theft, says Japanese study Jan. 16, 2017
  9. REUTERS Mail Online WIRES,Researchers say fingerprint data vulnerable in "peace" photos Jan. 16, 2017
  10. FALA BRASIL,Digitais podem ser copiadas e fotos e usadas em golpes Jan. 19, 2017
  11. Business Journal, あなたの指紋がネットで盗まれる? 自撮りピース画像から乗っ取りや金銭被害に!March 8, 2017
  12. Slate, The Surprising Things Algorithms Can Glean About You From PhotosMarch 10, 2017
  13. Newsweek, HOW FLASHING A PEACE SIGN COULD GET YOU HACKEDMarch 18, 2017
  14. vocativ, Facial Recognition Is Everywhere — But So Are Tools To Defeat ItMay 3, 2017
  15. KASHMIR READER, The Hidden Aspects of AadhaarMay 3, 2017
  16. beritateknologi, Ternyata Sidik Jarimu Bisa Dilacak, Jika Berpose Foto Seperti Ini di Media Sosial!May 12, 2017
  17. kabarbisnis, Awas! Berpose foto seperti ini di medsos, sidik jari Anda bisa dilacakMay 14, 2017
  18. Web 東奥, 天地人May 28, 2017
  19. BirminghamMail, Why making a peace sign in a selfie could let hackers STEAL your fingerprintsJune 9, 2017
  20. arabnews, Peace signs: not as cool as you think, they can expose you to fraudJune 11, 2017
  21. berkabar, Jangan Berpose Seperti Ini, Jika Tidak Ingin Jadi Korban Kejahatan!June 11, 2017
  22. NIKKEI ASIAN REVIEW, Small Japanese city crowdfunding privacy eyewear What looks like a pair of glasses confuses facial-recognition softwareAugust 6, 2017
  23. asianet newsable, Fingerprint scanners to facial recognition: Your phone can be easily fooledSeptember 6, 2017
  24. syracuse com, iPhone X facial recognition: Can convenience and privacy coexist?September 29, 2017

Media coverage(TV / Radio)

Media coverage(Newspapers)

Media coverage(Others)

Patents

Awards

Others