Achievements(2017)
Refereed journal papers | Refereed conference papers | Books, book chapters, and research reports | Invited talks | Oral Presentation, Poster・demo | Media coverage(Press release/ News release) | Media coverage(Online articles) | Media coverage(TV / Radio) | Media coverage(Newspapers) | Media coverage(Others) | Patents | Awards | Others
Refereed journal papers
- T. Truong, T. Tran, D. Duong, and I. Echizen, "Provable identity based user authentication scheme on ECC in multi-server environment," Wireless Personal Communications, vol. 92,pp.2785–2801, Springer (2017)
- X. Huang, N. Ono, A. Nishimura, I. Echizen, "Reversible Audio Information Hiding for Tampering Detection and Localization Using Sample Scanning Method," Journal of Information Processing (JIP), vol. 58, no. 7, pp. 469-476 (July 2017)
Refereed conference papers
- L. Barua, P. Dhar, L. Alam, and I. Echizen, “Bangla Text Compression Based on Modified Lempel-Ziv-Welch Algorithm,” Proc. of the International Conference on Electrical, Computer and Communication Engineering (ECCE2017), pp.855-859,(February 2017)
- A. Islam, P. Dhar, M. Haque, and I. Echizen, “An Asymmetric Key Based Encryption and Decryption Algorithm for Secured Data Transfer,” Proc. of the International Conference on Electrical, Computer and Communication Engineering (ECCE2017), 4 pages, (February 2017)
- Y. Matsue, K. Kaneda, K. Iwamura, and I. Echizen, “Study of an information extraction method using a single-dot pattern method with clear ink,” Proc. of the 5th IIEEJ International Workshop on Image Electronics and Visual Computing (IEVC2017),pp.1-4, (March 2017)
- W. Tomita, K. Kaneda, K. Iwamura, and I. Echizen, “Expanding Information Hiding Scheme using Artificial Fiber (AF) Pattern into Katagami Patterns with A Low-resolution Web Camera,” Proc. of the 5th IIEEJ International Workshop on Image Electronics and Visual Computing (IEVC2017), 4 pages, (March 2017)
- O. Mwambe and I. Echizen, "Security Oriented Malicious Activity Diagrams to Support Information Systems Security," The 13th International Symposium on Frontiers of Information Systems and Network Applications (FINA-2017), Proc. of the 31st IEEE International Conference on Advanced Information Networking and Applications (AINA-2017),pp.74-81, (March 2017)
- H.-Q. Nguyen-Son and I. Echizen, "Detecting Computer-Generated Text Using Fluency and Noise Features," Proc. of the 2017 Conference of the Pacific Association for Computational Linguistics (Pacling2017),pp.288-300 , (August 2017)
- R. Toledo G. Danezis I. Echizen, "Mix-ORAM: Using Delegated Shuffles," Proc. of the 2017 on Workshop on Privacy in the Electronic Society (WPES2017, held in conjunction with the ACM CCS conference), pp.51-61 (October 2017)
- T. Ogane and I. Echizen, "BiometricJammer: Preventing surreptitious fingerprint photography without inconveniencing users," Proc of the International Joint Conference on Biometrics 2017 (IJCB2017),pp.253-260,(October 2017)
- S. Machida, A. Dabrowski, E. Weippl, and Isao Echizen, "PrivacyTag: A Community-based Method for Protecting Privacy of Photographed Subjects in Online Social Networks," Proc. of , The 16th IFIP Conference on e-Business, e-Services and e-Society (I3E2017),pp,261-275, (November 2017) [Best Paper Award]
- N. Tieu, H. Nguyen, H. Nguyen-Son, J. Yamagishi, and I. Echizen, "An Approach for Gait Anonymization using Deep Learning," Proc. of the 9th IEEE International Workshop on Information Forensics and Security 2017 (WIFS2017), ,pp.1-6, (December 2017) [Best Paper Award]
- N. Rahmouni, V. Nozick, J. Yamagishi, and I. Echizen, "Distinguishing Computer Graphics from Natural Images Using Convolution Neural Networks," Proc of the 9th IEEE International Workshop on Information Forensics and Security 2017 (WIFS2017), pp.1-6, (December 2017)
- H.-Q. Nguyen-Son, T. T. Ngoc Dung, H. H. Nguyen, J. Yamagishi, and I. Echizen, "Identifying Computer-Generated Text Using Statistical Analysis," Proc. of the AsiaPacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC 2017), pp.1504-1511, (December 2017)
- F. Mollers, S. Vogelgesang, J. Kruger, I. Echizen, and C. Sorge, "Modelling Traffic Analysis in Home Automation Systems," Proc. of the 16th International Conference on Cryptology And Network Security (CANS2017), pp .526-536,(December 2017)
Books, book chapters, and research reports
Invited talks
Oral Presentation, Poster・demo
Media coverage(Press release/ News release)
Media coverage(Online articles)
- Naked Security, Designer launches fabric to bamboozle facial recognition January 4, 2017
- QUARTZ, New “camouflage” seeks to make you unrecognizable to facial-recognition technologyJanuary 6, 2017
- PHYS ORG
Japan researchers warn of fingerprint theft from 'peace' sign January 11, 2017 - The Japan Times, Researchers warn of fingerprint theft from ‘peace’ sign January 12 , 2017
- The Telegraph, Peace sign selfies could let hackers copy your fingerprints Jan. 12, 2017
- The Times, Photos are a giveaway for fingerprint fraudsters Jan. 13, 2017
- Financial Times, Fingerprint theft points to digital danger Jan. 16, 2017
- Reuters,'Peace' signs risk fingerprint theft, says Japanese study Jan. 16, 2017
- REUTERS Mail Online WIRES,Researchers say fingerprint data vulnerable in "peace" photos Jan. 16, 2017
- FALA BRASIL,Digitais podem ser copiadas e fotos e usadas em golpes Jan. 19, 2017
- Business Journal, あなたの指紋がネットで盗まれる? 自撮りピース画像から乗っ取りや金銭被害に!March 8, 2017
- Slate, The Surprising Things Algorithms Can Glean About You From PhotosMarch 10, 2017
- Newsweek, HOW FLASHING A PEACE SIGN COULD GET YOU HACKEDMarch 18, 2017
- vocativ, Facial Recognition Is Everywhere — But So Are Tools To Defeat ItMay 3, 2017
- KASHMIR READER, The Hidden Aspects of AadhaarMay 3, 2017
- beritateknologi, Ternyata Sidik Jarimu Bisa Dilacak, Jika Berpose Foto Seperti Ini di Media Sosial!May 12, 2017
- kabarbisnis, Awas! Berpose foto seperti ini di medsos, sidik jari Anda bisa dilacakMay 14, 2017
- Web 東奥, 天地人May 28, 2017
- BirminghamMail, Why making a peace sign in a selfie could let hackers STEAL your fingerprintsJune 9, 2017
- arabnews, Peace signs: not as cool as you think, they can expose you to fraudJune 11, 2017
- berkabar, Jangan Berpose Seperti Ini, Jika Tidak Ingin Jadi Korban Kejahatan!June 11, 2017
- NIKKEI ASIAN REVIEW, Small Japanese city crowdfunding privacy eyewear What looks like a pair of glasses confuses facial-recognition softwareAugust 6, 2017
- asianet newsable, Fingerprint scanners to facial recognition: Your phone can be easily fooledSeptember 6, 2017
- syracuse com, iPhone X facial recognition: Can convenience and privacy coexist?September 29, 2017