Echizen Laboratory National Institute of Informatics (NII)

 

Department of Information and Communication Engineering,
Graduate School of Information Science and Technology, The University of Tokyo

 

Department of Informatics, School of Multidisciplinary Sciences,
The Graduate University For Advanced Studies (SOKENDAI)

Achievements(2018)

Refereed journal papers | Refereed conference papers | Books, book chapters, and research reports | Invited talks | Oral Presentation, Poster・demo | Media coverage(Press release/ News release) | Media coverage(Online articles) | Media coverage(TV / Radio) | Media coverage(Newspapers) | Media coverage(Others) | Patents | Awards | Others

Refereed journal papers

  1. I. Echizen and T. Ogane, “BiometricJammer: Method to prevent acquisition of biometric information by surreptitious photography on fingerprints,” IEICE Trans. on Information & Systems, Vol.E101-D, No.1,pp.2-12, (January 2018) [Invited paper]

Refereed conference papers

  1. F. Fang, J. Yamagishi, I. Echizen, and J. Lorenzo-Trueba, “High-quality nonparallel voice conversion based on cycle-consistent adversarial network,” Proc. of the 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP),pp.5279-5283, (April 2018)
  2. J. Lorenzo-Trueba, F. Fang, X. Wang, I. Echizen, J. Yamagishi, and T. Kinnunen, "Can we steal your vocal identity from the Internet?: Initial investigation of cloning Obama’s voice using GAN, WaveNet and low-quality found data,” Proc. of the Speaker and Language Recognition Workshop (Odyssey 2018), pp.240-247, (June 2018)
  3. T. Bui, M. Kuribayashi, M. Cheraghchi, and I. Echizen, "Efficiently Decodable Non-Adaptive Threshold Group Testing," Proc. of the IEEE International Symposium on Information Theory (ISIT 2018), pp.2584-2588, (June 2018)
  4. H. H. Nguyen, T. N.-D. Tieu, H.-Q. Nguyen-Son, J. Yamagishi, and I. Echizen, “Transformation on Computer-Generated Facial Image to Avoid Detection by Spoofing Detector,” Proc. of the IEEE International Conference on Multimedia and Expo (ICME) 2018,pp.1-6, (July 2018) [top 15% papers]
  5. H. H. Nguyen, T. N.-D. Tieu, H.-Q. Nguyen-Son, V. Nozick, J. Yamagishi, and I. Echizen, “Modular Convolutional Neural Network for Discriminating between Computer-Generated Images and Photographic Images,” Proc. of the 13th International Conference on Availability, Reliability and Security (ARES 2018),pp.1-10, (August 2018) [full paper]
  6. T. Ogane and I. Echizen, “BiometricJammer: Use of pseudo fingerprint to prevent fingerprint extraction from camera images without inconveniencing users,” Proc. of the 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC2018), 7 pages, (October 2018)
  7. T. B. Le and I. Echizen, “Lightweight Collaborative Semantic Scheme for Generating an Obfuscated Region to Ensure Location Privacy,” Proc. of the 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC2018), pp.2825-2831, (October 2018)
  8. N. Noguchi, K. Kaneda, K. Iwamura, and I. Echizen, "New Approach for Embedding Secret Information into Fiber Materials," Proc. of the 7th IEEE Global Conference on Consumer Electronics (GCCE 2018), 2 pages, (October 2018)
  9. T. Yasui, M. Kuribayashi, N. Funabiki, and I. Echizen, "Estimation of Collusion Attack in Bias-based Binary Fingerprinting Code," Proc. of the AsiaPacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC 2018), 6 pages, (November 2018)
  10. H.-Q. Nguyen, N.-P. Tran, N.-V. Pham, M.-T. Tran, and I. Echizen, " Vietnamese Paraphrase Identification Using Matching Duplicate Phrases and Similar Words," Proc. of the 5th International Conference on Future Data and Security Engineering (FDSE 2018),pp.172-182, November 2018
  11. D. Afchar, V. Nozick, J. Yamagishi, and I. Echizen, " MesoNet: a Compact Facial Video Forgery Detection Network, " Proc. of the IEEE International Workshop on Information Forensics and Security (WIFS 2018), pp.1-7, December 2018
  12. F. Fang, J. Yamagishi, I. Echizen, MD Sahidullah , T. Kinnunen, "Transforming acoustic characteristics to deceive playback spoofing countermeasures of speaker verification systems, " Proc. of the IEEE International Workshop on Information Forensics and Security (WIFS 2018), 8 pages, December 2018
  13. H.-Q. Nguyen-Son, H. H. Nguyen, N.-D. Tieu, J. Yamagishi, and I. Echizen, "Identifying Computer-Translated Paragraphs using Coherence Features," Proc. of the 32nd Pacific Asia Conference on Language, Information and Computation (PACLIC 32), 8 pages, December 2018

Books, book chapters, and research reports

Invited talks

Oral Presentation, Poster・demo

Media coverage(Press release/ News release)

Media coverage(Online articles)

  1. Canaltech-Tecnologia 4 maneiras de enganar sistemas de identificação facial March 29, 2018
  2. numerama Un dealer arrêté à cause d’une photo envoyée sur WhatsApp qui montrait ses empreintes digitalesApril 16, 2018
  3. EL ECONOMISTA Compartir fotos del voto con tu huella puede vulnerar tu seguridadJuly 1, 2018
  4. EuroZprávy.CZ Co když vy nejste vy? Krádež identity je lehčí, než se zdá. Stačí k tomu jediná věcSeptember 9, 2018
  5. NHK WORLD JAPANE Researchers: Vein authentication can be deceivedNovember 1, 2018
  6. 蘋果即時 日本研究發現 數位照片可破解手指靜脈認證November 2, 2018
  7. EurekAlert! Technique for preventing extraction of finger vein patterns from photographs November 8, 2018
  8. ScienceDaily Technique for preventing extraction of finger vein patterns from photographs November 8, 2018
  9. BIOMETRIC UPDATE.COM Deep fake technology outpacing security countermeasures December 11, 2018
  10. The Asahi Shimbun Method formed to prevent thefts of ID-verifying vein patterns November 30, 2018
  11. Knack 'Meer Privacy in 2019? Hier zijn 9 hapklare tips om jezelf beter te beschermen' December 18, 2018

Media coverage(TV / Radio)

Media coverage(Newspapers)

Media coverage(Others)

Patents

Awards

Others