Achievements(2018)
Refereed journal papers | Refereed conference papers | Books, book chapters, and research reports | Invited talks | Oral Presentation, Poster・demo | Media coverage(Press release/ News release) | Media coverage(Online articles) | Media coverage(TV / Radio) | Media coverage(Newspapers) | Media coverage(Others) | Patents | Awards | Others
Refereed journal papers
- I. Echizen and T. Ogane, “BiometricJammer: Method to prevent acquisition of biometric information by surreptitious photography on fingerprints,” IEICE Trans. on Information & Systems, Vol.E101-D, No.1,pp.2-12, (January 2018) [Invited paper]
Refereed conference papers
- F. Fang, J. Yamagishi, I. Echizen, and J. Lorenzo-Trueba, “High-quality nonparallel voice conversion based on cycle-consistent adversarial network,” Proc. of the 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP),pp.5279-5283, (April 2018)
- J. Lorenzo-Trueba, F. Fang, X. Wang, I. Echizen, J. Yamagishi, and T. Kinnunen, "Can we steal your vocal identity from the Internet?: Initial investigation of cloning Obama’s voice using GAN, WaveNet and low-quality found data,” Proc. of the Speaker and Language Recognition Workshop (Odyssey 2018), pp.240-247, (June 2018)
- T. Bui, M. Kuribayashi, M. Cheraghchi, and I. Echizen, "Efficiently Decodable Non-Adaptive Threshold Group Testing," Proc. of the IEEE International Symposium on Information Theory (ISIT 2018), pp.2584-2588, (June 2018)
- H. H. Nguyen, T. N.-D. Tieu, H.-Q. Nguyen-Son, J. Yamagishi, and I. Echizen, “Transformation on Computer-Generated Facial Image to Avoid Detection by Spoofing Detector,” Proc. of the IEEE International Conference on Multimedia and Expo (ICME) 2018,pp.1-6, (July 2018) [top 15% papers]
- H. H. Nguyen, T. N.-D. Tieu, H.-Q. Nguyen-Son, V. Nozick, J. Yamagishi, and I. Echizen, “Modular Convolutional Neural Network for Discriminating between Computer-Generated Images and Photographic Images,” Proc. of the 13th International Conference on Availability, Reliability and Security (ARES 2018),pp.1-10, (August 2018) [full paper]
- T. Ogane and I. Echizen, “BiometricJammer: Use of pseudo fingerprint to prevent fingerprint extraction from camera images without inconveniencing users,” Proc. of the 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC2018), 7 pages, (October 2018)
- T. B. Le and I. Echizen, “Lightweight Collaborative Semantic Scheme for Generating an Obfuscated Region to Ensure Location Privacy,” Proc. of the 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC2018), pp.2825-2831, (October 2018)
- N. Noguchi, K. Kaneda, K. Iwamura, and I. Echizen, "New Approach for Embedding Secret Information into Fiber Materials," Proc. of the 7th IEEE Global Conference on Consumer Electronics (GCCE 2018), 2 pages, (October 2018)
- T. Yasui, M. Kuribayashi, N. Funabiki, and I. Echizen, "Estimation of Collusion Attack in Bias-based Binary Fingerprinting Code," Proc. of the AsiaPacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC 2018), 6 pages, (November 2018)
- H.-Q. Nguyen, N.-P. Tran, N.-V. Pham, M.-T. Tran, and I. Echizen, " Vietnamese Paraphrase Identification Using Matching Duplicate Phrases and Similar Words," Proc. of the 5th International Conference on Future Data and Security Engineering (FDSE 2018),pp.172-182, November 2018
- D. Afchar, V. Nozick, J. Yamagishi, and I. Echizen, " MesoNet: a Compact Facial Video Forgery Detection Network, " Proc. of the IEEE International Workshop on Information Forensics and Security (WIFS 2018), pp.1-7, December 2018
- F. Fang, J. Yamagishi, I. Echizen, MD Sahidullah , T. Kinnunen, "Transforming acoustic characteristics to deceive playback spoofing countermeasures of speaker verification systems, " Proc. of the IEEE International Workshop on Information Forensics and Security (WIFS 2018), 8 pages, December 2018
- H.-Q. Nguyen-Son, H. H. Nguyen, N.-D. Tieu, J. Yamagishi, and I. Echizen, "Identifying Computer-Translated Paragraphs using Coherence Features," Proc. of the 32nd Pacific Asia Conference on Language, Information and Computation (PACLIC 32), 8 pages, December 2018
Books, book chapters, and research reports
Invited talks
Oral Presentation, Poster・demo
Media coverage(Press release/ News release)
Media coverage(Online articles)
- Canaltech-Tecnologia 4 maneiras de enganar sistemas de identificação facial March 29, 2018
- numerama Un dealer arrêté à cause d’une photo envoyée sur WhatsApp qui montrait ses empreintes digitalesApril 16, 2018
- EL ECONOMISTA Compartir fotos del voto con tu huella puede vulnerar tu seguridadJuly 1, 2018
- EuroZprávy.CZ Co když vy nejste vy? Krádež identity je lehčí, než se zdá. Stačí k tomu jediná věcSeptember 9, 2018
- NHK WORLD JAPANE Researchers: Vein authentication can be deceivedNovember 1, 2018
- 蘋果即時 日本研究發現 數位照片可破解手指靜脈認證November 2, 2018
- EurekAlert! Technique for preventing extraction of finger vein patterns from photographs November 8, 2018
- ScienceDaily Technique for preventing extraction of finger vein patterns from photographs November 8, 2018
- BIOMETRIC UPDATE.COM Deep fake technology outpacing security countermeasures December 11, 2018
- The Asahi Shimbun Method formed to prevent thefts of ID-verifying vein patterns November 30, 2018
- Knack 'Meer Privacy in 2019? Hier zijn 9 hapklare tips om jezelf beter te beschermen' December 18, 2018