Isao Echizen

Last updated: Jan 8, 2016 at 15:47
 
Avatar
Name
Isao Echizen
E-mail
iechizennii.ac.jp
URL
http://research.nii.ac.jp/~iechizen/official/index-e.html

Awards & Honors

 
Nov 2012
Best Poster Award, the 7th International Workshop on Security (IWSEC12)
 
Nov 2011
Best Poster Award, International Workshop on Security (IWSEC) 2011
Winner: Takayuki Yamada, Seiichi Gohshi, and Isao Echizen
 
Dec 2006
IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Best paper award
Winner: I. Echizen, T. Yamada, S. Tezuka, S. Singh, H. Yoshiura
 

Published Papers

 
Evaluation of matching accuracy of template-matching using a steganography algorithm
H. Ishizuka, K. Sakurai, I. Echizen, and K. Iwamura
International Workshop on Information and Communication Security (WICS2015), Proc. of the Third International Symposium on Computing and Networking (CANDAR15), 6 pages      Dec 2015   [Refereed]
Tradeoff between the price of distributing a database and its collusion resistance based on concatenated codes
T. Bui, T. Nguyen, N. Sonehara, and I. Echizen
Proc. of the 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2015), 8 pages      Nov 2015   [Refereed]
Paraphrase Detection Based on Identical Phrase and Similar Word Matching
H.-Q. Nguyen-Son, Y. Miyao, I. Echizen
Proc. of the 29th Pacific Asia Conference on Language, Information and Computation (PACLIC 29), 10 pages      Oct 2015   [Refereed]
Discriminating between Computer-Generated Facial Images and Natural Ones Using Smoothness Property and Local Entropy
H. Nguyen, H-Q. Nguyen-Son, T. Nguyen, and I. Echizen
Proc. of the 14th International Workshop on Digital-Forensics and Watermarking (IWDW 2015), LNCS, 12 pages, Springer      Oct 2015   [Refereed]
Audio Watermarking Using Different Wavelet Filters
T. Ito, H. Kang, K. Iwamura, K. Kaneda, and I. Echizen
Proc. of the 14th International Workshop on Digital-Forensics and Watermarking (IWDW 2015), LNCS, 9 pages, Springer      Oct 2015   [Refereed]
Voice liveness detection algorithms based on pop noise caused by human breath for automatic speaker verification
S. Shiota, F. Villavicencio, J. Yamagishi, N. Ono, I. Echizen, and T. Matsui
Proc. the Interspeech 2015, 5 pages      Sep 2015   [Refereed]
Surveillance Camera System Balancing Privacy Protection and Effective Surveillance Image Use
K. Kobayashi, M. Inamura, K. Kaneda, K. Iwamura, and and I. Echizen
Proc. of the 12th International Conference on e-Business (ICE-B 2015), pp. 41-28      Jul 2015   [Refereed]
A Rule-Based Approach for Detecting Location Leaks of Short Text Messages
H-Q. Nguyen-Son, M-T. Tran, H. Yoshiura, N. Sonehara, and I. Echizen
Workshop on Privacy by Transparency in Data-Centric Services (PTDCS2015), Proc. of the 18th International Conference on Business Information Systems (BIS2015), Lecture Notes in Business Information Processing (LNBIP), no. 228, Springer, 12 pages      Jun 2015   [Refereed]
De-Anonymising Social Network Posts by Linking with R?sum?
Y. Ogawa, E. Hashimoto, M. Ichino, I. Echizen, and H. Yoshiura
Workshop on Privacy by Transparency in Data-Centric Services (PTDCS2015), Proc. of the 18th International Conference on Business Information Systems (BIS2015), Lecture Notes in Business Information Processing (LNBIP), no. 228, Springer, 12 pages      Jun 2015   [Refereed]
Error-Correcting Codes as Source for Decoding Ambiguity
A. Dabrowski, I. Echizen, and E. Weippl
Proc. of the Second Language-Theoretic Security Workshop (LangSec2015) at the IEEE Security & Privacy Symposium      May 2015   [Refereed]
Chaotic Chebyshev polynomials based remote user authentication scheme in client-server environment
T. Truong, M. Tran, A. Duong and I. Echizen
Proc. the IFIP TC-11 International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2015), to be published in the IFIP AICT series      May 2015   [Refereed]
An Educational System to Help Students Assess Website Features and Identify High-risk Website
T. Kajiyama and I. Echizen
Interactive Technology and Smart Education   12    Apr 2015   [Refereed]
Efficient authentication, traitor detection and privacy-preserving for the most common queries in two-tiered wireless sensor networks
T. Bui, T. Nguyen, N. Sonehara, and I. Echizen
Proc. of the 29th IEEE International Conference on Advanced Information Networking and Applications (AINA-2015)      Mar 2015   [Refereed]
Anonymizing Personal Text Messages Posted in Online Social Networks and Detecting Disclosures of Personal Information
H-Q. Nguyen-Son, A-T. Hoang, M-T. Tran, H. Yoshiura, N. Sonehara, and I. Echizen
IEICE Trans. on Information & Systems   E97-D(1)    Jan 2015   [Refereed]
IR Hiding: Use of Specular Reflection for Short-Wavelength-Pass-Filter Detection to Prevent Re-recording of Screen Images
I. Echizen, T. Yamada, S. Gohshi
Transactions on Data Hiding and Multimedia Security   10    2015   [Refereed]
Robust Fingerprinting Codes for Database
T. Bui, B. Nguyen, T. Nguyen, N. Sonehara, and I. Echizen
International Journal of Big Data Intelligence   2    2015   [Refereed]
Tag Detection for Preventing Unauthorized Face Image Processing
A. Jimenez, A. Dabrowski, J. Martinez, N. Sonehara and I. Echizen
Proc. of the 13th International Workshop on Digital-Forensics and Watermarking (IWDW 2014), LNCS      Oct 2014   [Refereed]
Definition of Private Information for Image Sharing in Social Networking Services
E. Chaussy, S. Machida, N. Sonehara and I. Echizen
Proc. of the 13th International Workshop on Digital-Forensics and Watermarking (IWDW 2014), LNCS      Oct 2014   [Refereed]
Evaluation of a zero-watermarking-type steganography
H. Ishizuka, I. Echizen, K. Iwamura and K. Sakurai
Proc. of the 13th International Workshop on Digital-Forensics and Watermarking (IWDW 2014), LNCS      Oct 2014   [Refereed]
SNSにおけるセンシティブデータの漏洩 検知に基づく公開範囲の設定方式
町田史門,梶山朋子,嶋田 茂,越前 功
情報処理学会論文誌   55(9) 2092-2103   Sep 2014   [Refereed]

Books etc

 
Dual-plane Correlation-based Video Watermarking for Immunity to Rotation, Scale, Translation, and Random Distortion, in Artificial Intelligence in Multimedia Data Hiding
I. Echizen, Y. Atomori, S. Nakayama, and H. Yoshihura
Springer   Dec 2009   
Long-Term and Dynamical Aspects of Information Security "A. Schmidt, M. Kreutzer, and R. Accorsi, eds"
T. Yamada, I. Echizen, S. Tezuka
Nova Publishers   Oct 2007   ISBN:1600219128
Intelligent Multimedia Data Hiding "J. Pan, W. Fang, H. Huang, and L. Jain, eds"
I. Echizen, Y. Fujii, T. Yamada, S. Tezuka, and H. Yosihura
Springer-Verlag   Jun 2007   ISBN:3540711686

Conference Activities & Talks

 
第2回統一的評価基準に基づく電子透かしコンテスト〜チャレンジングな評価基準を超えられるか!〜 [Invited]
echizenisao   4 Sep 2013   
プライバシーバイザー:カメラの写り込みによるプライバシー侵害を防止する技術 [Invited]
13 Sep 2013   
Privacy Visor: Method for Preventing Privacy Invasion Through Face Recognition from Camera Images [Invited]
echizenisao   31 Oct 2013   
Privacy visor: Wearable device that transmits invisible noise signals for preventing face recognition from camera images [Invited]
18 Nov 2013   
サイバー/フィジカル境界におけるセキュリティ・プライバシー保護技術の研究 [Invited]
17 Feb 2015   
Security and privacy challenges at border between cyber and physical worlds [Invited]
echizenisao   28 Aug 2014