Isao Echizen

Last updated: Apr 26, 2016 at 16:20
 
Avatar
Name
Isao Echizen
E-mail
iechizennii.ac.jp
URL
http://research.nii.ac.jp/~iechizen/official/index-e.html

Awards & Honors

 
Mar 2016
Award for the Contribution to Culture of Security, Institute of Information Security
 
Oct 2014
DoCoMo Mobile Science Award, Mobile Communication Fund
 
Jun 2014
Best paper award, Information Processing Society of Japan
 
Nov 2012
Best Poster Award, the 7th International Workshop on Security (IWSEC12)
 
Nov 2011
Best Poster Award, International Workshop on Security (IWSEC) 2011
Winner: Takayuki Yamada, Seiichi Gohshi, and Isao Echizen
 
Jun 2011
IPSJ Nagao Special Researcher Award, Information Processing Society of Japan
 
Dec 2006
IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Best paper award
Winner: I. Echizen, T. Yamada, S. Tezuka, S. Singh, H. Yoshiura
 

Published Papers

 
Evaluation of matching accuracy of template-matching using a steganography algorithm
H. Ishizuka, K. Sakurai, I. Echizen, and K. Iwamura
International Workshop on Information and Communication Security (WICS2015), Proc. of the Third International Symposium on Computing and Networking (CANDAR15), 6 pages      Dec 2015   [Refereed]
Voice liveness detection for speaker verification based on a tandem single/double-channel pop noise detector
S. Shiota, F. Villavicencio, J. Yamagishi, N. Ono, I. Echizen, and Tomoko Matsui
Proc. of the Speaker and Language Recognition Workshop (Odyssey 2016)      Jun 2016   [Refereed]
Tradeoff between the price of distributing a database and its collusion resistance based on concatenated codes
T. Bui, T. Nguyen, N. Sonehara, and I. Echizen
Proc. of the 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2015), 8 pages      Nov 2015   [Refereed]
Error-Correcting Codes as Source for Decoding Ambiguity
S. Wohlgemuth, K. Takaragi, and I. Echizen
Proc. of the Conference: Multikonferenz Wirtschaftsinformatik (MKWI) 2016      Mar 2016   [Refereed]
Paraphrase Detection Based on Identical Phrase and Similar Word Matching
H.-Q. Nguyen-Son, Y. Miyao, I. Echizen
Proc. of the 29th Pacific Asia Conference on Language, Information and Computation (PACLIC 29), 10 pages      Oct 2015   [Refereed]
Privacy-preserving sound to degrade automatic speaker verification performance
Kei Hashimoto, Junichi Yamagishi, and Isao Echizen
Proceedings of 2016 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2016)   5500-5504   Mar 2016   [Refereed]
Discriminating between Computer-Generated Facial Images and Natural Ones Using Smoothness Property and Local Entropy
H. Nguyen, H-Q. Nguyen-Son, T. Nguyen, and I. Echizen
Proc. of the 14th International Workshop on Digital-Forensics and Watermarking (IWDW 2015), LNCS, 12 pages, Springer      Oct 2015   [Refereed]
Audio Watermarking Using Different Wavelet Filters
T. Ito, H. Kang, K. Iwamura, K. Kaneda, and I. Echizen
Proc. of the 14th International Workshop on Digital-Forensics and Watermarking (IWDW 2015), LNCS, 9 pages, Springer      Oct 2015   [Refereed]
Voice liveness detection algorithms based on pop noise caused by human breath for automatic speaker verification
S. Shiota, F. Villavicencio, J. Yamagishi, N. Ono, I. Echizen, and T. Matsui
Proc. the Interspeech 2015, 5 pages      Sep 2015   [Refereed]
Surveillance Camera System Balancing Privacy Protection and Effective Surveillance Image Use
K. Kobayashi, M. Inamura, K. Kaneda, K. Iwamura, and and I. Echizen
Proc. of the 12th International Conference on e-Business (ICE-B 2015), pp. 41-28      Jul 2015   [Refereed]
A Rule-Based Approach for Detecting Location Leaks of Short Text Messages
H-Q. Nguyen-Son, M-T. Tran, H. Yoshiura, N. Sonehara, and I. Echizen
Workshop on Privacy by Transparency in Data-Centric Services (PTDCS2015), Proc. of the 18th International Conference on Business Information Systems (BIS2015), Lecture Notes in Business Information Processing (LNBIP), no. 228, Springer, 12 pages      Jun 2015   [Refereed]
De-Anonymising Social Network Posts by Linking with R?sum?
Y. Ogawa, E. Hashimoto, M. Ichino, I. Echizen, and H. Yoshiura
Workshop on Privacy by Transparency in Data-Centric Services (PTDCS2015), Proc. of the 18th International Conference on Business Information Systems (BIS2015), Lecture Notes in Business Information Processing (LNBIP), no. 228, Springer, 12 pages      Jun 2015   [Refereed]
Error-Correcting Codes as Source for Decoding Ambiguity
A. Dabrowski, I. Echizen, and E. Weippl
Proc. of the Second Language-Theoretic Security Workshop (LangSec2015) at the IEEE Security & Privacy Symposium      May 2015   [Refereed]
Chaotic Chebyshev polynomials based remote user authentication scheme in client-server environment
T. Truong, M. Tran, A. Duong and I. Echizen
Proc. the IFIP TC-11 International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2015), to be published in the IFIP AICT series      May 2015   [Refereed]
An Educational System to Help Students Assess Website Features and Identify High-risk Website
T. Kajiyama and I. Echizen
Interactive Technology and Smart Education   12    Apr 2015   [Refereed]
Efficient authentication, traitor detection and privacy-preserving for the most common queries in two-tiered wireless sensor networks
T. Bui, T. Nguyen, N. Sonehara, and I. Echizen
Proc. of the 29th IEEE International Conference on Advanced Information Networking and Applications (AINA-2015)      Mar 2015   [Refereed]
Anonymizing Personal Text Messages Posted in Online Social Networks and Detecting Disclosures of Personal Information
H-Q. Nguyen-Son, A-T. Hoang, M-T. Tran, H. Yoshiura, N. Sonehara, and I. Echizen
IEICE Trans. on Information & Systems   E97-D(1)    Jan 2015   [Refereed]
IR Hiding: Use of Specular Reflection for Short-Wavelength-Pass-Filter Detection to Prevent Re-recording of Screen Images
I. Echizen, T. Yamada, S. Gohshi
Transactions on Data Hiding and Multimedia Security   10    2015   [Refereed]
Robust Fingerprinting Codes for Database
T. Bui, B. Nguyen, T. Nguyen, N. Sonehara, and I. Echizen
International Journal of Big Data Intelligence   2    2015   [Refereed]
Tag Detection for Preventing Unauthorized Face Image Processing
A. Jimenez, A. Dabrowski, J. Martinez, N. Sonehara and I. Echizen
Proc. of the 13th International Workshop on Digital-Forensics and Watermarking (IWDW 2014), LNCS      Oct 2014   [Refereed]

Books etc

 
Dual-plane Correlation-based Video Watermarking for Immunity to Rotation, Scale, Translation, and Random Distortion, in Artificial Intelligence in Multimedia Data Hiding
I. Echizen, Y. Atomori, S. Nakayama, and H. Yoshihura
Springer   Dec 2009   
Long-Term and Dynamical Aspects of Information Security "A. Schmidt, M. Kreutzer, and R. Accorsi, eds"
T. Yamada, I. Echizen, S. Tezuka
Nova Publishers   Oct 2007   ISBN:1600219128
Intelligent Multimedia Data Hiding "J. Pan, W. Fang, H. Huang, and L. Jain, eds"
I. Echizen, Y. Fujii, T. Yamada, S. Tezuka, and H. Yosihura
Springer-Verlag   Jun 2007   ISBN:3540711686

Conference Activities & Talks

 
第2回統一的評価基準に基づく電子透かしコンテスト〜チャレンジングな評価基準を超えられるか!〜 [Invited]
echizenisao   4 Sep 2013   
プライバシーバイザー:カメラの写り込みによるプライバシー侵害を防止する技術 [Invited]
13 Sep 2013   
Privacy Visor: Method for Preventing Privacy Invasion Through Face Recognition from Camera Images [Invited]
echizenisao   31 Oct 2013   
Privacy visor: Wearable device that transmits invisible noise signals for preventing face recognition from camera images [Invited]
18 Nov 2013   
サイバー/フィジカル境界におけるセキュリティ・プライバシー保護技術の研究 [Invited]
17 Feb 2015   
Security and privacy challenges at border between cyber and physical worlds [Invited]
echizenisao   28 Aug 2014