Isao Echizen

J-GLOBAL         Last updated: Apr 10, 2019 at 17:03
 
Avatar
Name
Isao Echizen
E-mail
iechizennii.ac.jp
URL
http://research.nii.ac.jp/~iechizen/official/index-e.html

Academic & Professional Experience

 
Apr 2019
 - 
Today
Professor, Department of Information and Communication Engineering, Graduate School of Information Science and Technology, The University of Tokyo
 
Apr 2018
 - 
Today
Deputy Director General, National Institute of Informatics
 
Apr 2017
 - 
Today
Professor, Information and Society Research Division, National Institute of Informatics
 

Awards & Honors

 
Dec 2017
An Approach for Gait Anonymization using Deep Learning, Best paper award, the 9th IEEE International Workshop on Information Forensics and Security 2017 (WIFS2017)
Winner: N. Tieu, H. Nguyen, H. Nguyen-Son, J. Yamagishi, and I. Echizen
 
Nov 2017
PrivacyTag: A Community-based Method for Protecting Privacy of Photographed Subjects in Online Social Networks, Best paper award, the 16th IFIP Conference on e-Business, e-Services and e-Society (IFIP I3E2017)
Winner: S. Machida, A. Dabrowski, E. Weippl, and Isao Echizen
 
Sep 2016
Best paper award, the 15th IFIP Conference on e-Business, e-Services and e-Society (IFIP I3E2016)
 
Mar 2016
Award for the Contribution to Culture of Security, Institute of Information Security
 
Oct 2014
DoCoMo Mobile Science Award, Mobile Communication Fund
 
Jun 2014
Best paper award, Information Processing Society of Japan
 
Nov 2012
Best Poster Award, the 7th International Workshop on Security (IWSEC12)
 
Nov 2011
Best Poster Award, International Workshop on Security (IWSEC) 2011
Winner: Takayuki Yamada, Seiichi Gohshi, and Isao Echizen
 
Jun 2011
IPSJ Nagao Special Researcher Award, Information Processing Society of Japan
 
Dec 2006
IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Best paper award
Winner: I. Echizen, T. Yamada, S. Tezuka, S. Singh, H. Yoshiura
 

Published Papers

 
Audiovisual speaker conversion: jointly and simultaneously transforming facial expression and acoustic characteristics,
Fuming Fang, Xin Wang, Junichi Yamagishi, and Isao Echizen,
Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 5 pages, (May 2019)      May 2019   [Refereed]
Capsule-forensics: using capsule networks to detect forged images and videos,
Huy H. Nguyen, Junichi Yamagishi, and Isao Echizen,
Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 5 pages, (May 2019)      May 2019   [Refereed]
Sublinear decoding schemes for non-adaptive group testing with inhibitors,
T. V. Bui, M. Kuribayashi, T. Kojima, and I. Echizen,
Proc. of the Theory and Applications of Models of Computation (TAMC 2019) , 20 pages, (April 2019)      Apr 2019   [Refereed]
Efficiently Decodable Non-Adaptive Threshold Group Testing,
Thach V. Bui, Minoru Kuribayashi, Mahdi Cheraghchi, and Isao Echizen,
IEEE Transactions on Information Theory, 15 pages, 2019      2019   [Refereed]
Spatio-temporal generative adversarial network for gait anonymization,
Ngoc-Dung T. Tieu, Huy H. Nguyen, Hoang-Quoc Nguyen-Son, Junichi Yamagishi, and Isao Echizen,
Journal of Information Security and Applications, 13 pages, 2019      2019   [Refereed]
Efficient (nonrandom) construction and decoding for non-adaptive group testing,
Thach V. Bui, Minoru Kuribayashi, Tetsuya Kojima, Roghayyeh Haghvirdinezhad, Isao Echizen,
Journal of Information Processing, 13 pages, 2019      2019   [Refereed]
MesoNet: a Compact Facial Video Forgery Detection Network,
D. Afchar, V. Nozick, J. Yamagishi, and I. Echizen,
Proc. of the IEEE International Workshop on Information Forensics and Security (WIFS 2018), 7 pages, December 2018      Dec 2018   [Refereed]
Transforming acoustic characteristics to deceive playback spoofing countermeasures of speaker verification systems,
F. Fang, J. Yamagishi, I. Echizen, MD Sahidullah , T. Kinnunen,
   Dec 2018   [Refereed]
Identifying Computer-Translated Paragraphs using Coherence Features,
H.-Q. Nguyen-Son, H. H. Nguyen, N.-D. Tieu, J. Yamagishi, and I. Echizen,
Proc. of the 32nd Pacific Asia Conference on Language, Information and Computation (PACLIC 32), 8 pages, December 2018      Dec 2018   [Refereed]
Estimation of Collusion Attack in Bias-based Binary Fingerprinting Code,
T. Yasui, M. Kuribayashi, N. Funabiki, and I. Echizen
Proc. of the AsiaPacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC 2018), 6 pages,      Nov 2018   [Refereed]
Vietnamese Paraphrase Identification Using Matching Duplicate Phrases and Similar Words,
H.-Q. Nguyen, N.-P. Tran, N.-V. Pham, M.-T. Tran, and I. Echizen,
Proc. of the 5th International Conference on Future Data and Security Engineering (FDSE 2018), 12 pages, November 2018      Nov 2018   [Refereed]
New Approach for Embedding Secret Information into Fiber Materials
N. Noguchi, K. Kaneda, K. Iwamura, and I. Echizen
Proc. of the 7th IEEE Global Conference on Consumer Electronics (GCCE 2018), 2 pages,      Oct 2018   [Refereed]
Transformation on Computer-Generated Facial Image to Avoid Detection by Spoofing Detector
1. H. H. Nguyen, T. N.-D. Tieu, H.-Q. Nguyen-Son, J. Yamagishi, and I. Echizen
Proc. of the IEEE International Conference on Multimedia and Expo (ICME) 2018, 6 pages, [top 15% papers]      Jul 2018   [Refereed]
Efficiently Decodable Non-Adaptive Threshold Group Testing
3. T. Bui, M. Kuribayashi, M. Cheraghchi, and I. Echizen
Proc. of the IEEE International Symposium on Information Theory (ISIT 2018), 5 pages      Jun 2018
Can we steal your vocal identity from the Internet?: Initial investigation of cloning Obama’s voice using GAN, WaveNet and low-quality found data
2. J. Lorenzo-Trueba, F. Fang, X. Wang, I. Echizen, J. Yamagishi, and T. Kinnunen
Proc. of the Speaker and Language Recognition Workshop (Odyssey 2018), 8 pages,      Jun 2018   [Refereed]
2. 富田若南,野口直哉,金田北洋,岩村惠市,越前 功
電気学会論文誌C,Vol. 138(2018),No. 4   435-440   Apr 2018   [Refereed]
High-quality nonparallel voice conversion based on cycle-consistent adversarial network
• F. Fang, J. Yamagishi, I. Echizen, and J. Lorenzo-Trueba
Proc. of the 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 5 pages      Apr 2018   [Refereed]
I. Echizen and T. Ogane
IEICE Trans. on Information & Systems   E101-D(1) 2-12   Jan 2018   [Refereed][Invited]
Modelling Traffic Analysis in Home Automation Systems
F. Mollers, S. Vogelgesang, J. Kruger, I. Echizen, and C. Sorge
Proc. of the 16th International Conference on Cryptology And Network Security (CANS2017), 10 pages      Dec 2017   [Refereed]
H.-Q. Nguyen-Son, T. T. Ngoc Dung, H. H. Nguyen, J. Yamagishi, and I. Echizen
Proc. of the AsiaPacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC 2017),   1504-1511   Dec 2017   [Refereed]
N. Rahmouni, V. Nozick, J. Yamagishi, and I. Echizen
Proc of the 9th IEEE International Workshop on Information Forensics and Security 2017 (WIFS2017),   1-6   Dec 2017   [Refereed]
N. Tieu, H. Nguyen, H. Nguyen-Son, J. Yamagishi, and I. Echizen
Proc. of the 9th IEEE International Workshop on Information Forensics and Security 2017 (WIFS2017),   1-6   Dec 2017   [Refereed]
PrivacyTag: A Community-based Method for Protecting Privacy of Photographed Subjects in Online Social Networks
S. Machida, A. Dabrowski, E. Weippl, and Isao Echizen
Proc. of , The 16th IFIP Conference on e-Business, e-Services and e-Society (I3E2017)   261-275   Nov 2017   [Refereed]
T. Ogane and I. Echizen
Proc of the International Joint Conference on Biometrics 2017 (IJCB2017),   253-260   Oct 2017   [Refereed]
Mix-ORAM: Using Delegated Shuffles
R. Toledo G. Danezis I. Echizen
Proc. of the 2017 on Workshop on Privacy in the Electronic Society (WPES2017, held in conjunction with the ACM CCS conference)   55-61   Oct 2017   [Refereed]
Provable identity based user authentication scheme on ECC in multi-server environment
T. Truong, T. Tran, D. Duong, and I. Echizen
Wireless Personal Communications, vol. 92, Springer (2017)   2785-2801   Aug 2017   [Refereed]
Detecting Computer-Generated Text Using Fluency and Noise Features
H.-Q. Nguyen-Son and I. Echizen
Proc. of the 2017 Conference of the Pacific Association for Computational Linguistics (Pacling2017),   288-300   Aug 2017   [Refereed]
Reversible Audio Information Hiding for Tampering Detection and Localization Using Sample Scanning Method
X. Huang, N. Ono, A. Nishimura, I. Echizen,
Journal of Information Processing (JIP)   58(7) 469-476   Jul 2017   [Refereed]
O. Mwambe and I. Echizen
Proc. of the 31st IEEE International Conference on Advanced Information Networking and Applications (AINA-2017),   74-81   Mar 2017   [Refereed]
Study of an information extraction method using a single-dot pattern method with clear ink
Y. Matsue, K. Kaneda, K. Iwamura, and I. Echizen
Proc. of the 5th IIEEJ International Workshop on Image Electronics and Visual Computing (IEVC2017), 4 pages   -echizenisao   Mar 2017   [Refereed]
Expanding Information Hiding Scheme using Artificial Fiber (AF) Pattern into Katagami Patterns with A Low-resolution Web Camera
W. Tomita, K. Kaneda, K. Iwamura, and I. Echizen
Proc. of the 5th IIEEJ International Workshop on Image Electronics and Visual Computing (IEVC2017),   1-4   Mar 2017   [Refereed]
L. Barua, P. Dhar, L. Alam, and I. Echizen
Proc. of the International Conference on Electrical, Computer and Communication Engineering (ECCE2017),   855-859   Feb 2017   [Refereed]
An Asymmetric Key Based Encryption and Decryption Algorithm for Secured Data Transfer
A. Islam, P. Dhar, M. Haque, and I. Echizen
Proc. of the International Conference on Electrical, Computer and Communication Engineering (ECCE2017), 4 pages   -echizenisao   Feb 2017   [Refereed]
Efficiently Decodable Defective Items Detected by New Model of Noisy Group Testing
T. Bui, T. Kojima, I. Echizen
Proc. of the International Symposium on Information Theory and Its Applications (ISITA2016), 5 pages   -echizenisao   Oct 2016   [Refereed]
Y. Kusama, H. Kang, K. Iwamura, I. Echizen
Proc. of the IEEE Global Conference on Consumer Electronics,   1-2   Oct 2016   [Refereed]
Y. Yan, H. Kang, K. Iwamura, I. Echizen
Proc. of the IEEE Global Conference on Consumer Electronics,   9569 1-3   Oct 2016   [Refereed]
N. Kokui, H. Kang, K. Iwamura, I. Echizen
Proc. of the IEEE Global Conference on Consumer Electronics,   1-3   Oct 2016   [Refereed]
Breaking Anonymity of Social Network Accounts by Using Coordinated and Extensible Classifiers Based on Machine Learning," Proc. of the IFIP Conference on e-Business
E. Hashimoto, M. Ichino, T. Kuboyama, I. Echizen, H. Yoshiura
e-Services and e-Society (I3E 2016)   -echizenisao   Sep 2016   [Refereed]
時間領域へのウェー ブレットフィルタの加減算による音響電子透かしの提案
Isao Echizen
情報処理学会論文誌, Vol.57, No. 9, pp. 1911-1920   -echizenisao   Sep 2016   [Refereed]
ステガノグラフィ(ANGO)の特 性とテンプレートマッチングへの応用に関する研究
石塚 裕一 , 越前 功 , 岩村 惠市 , 櫻井 幸一
情報処理学会論文誌, Vol.57, No. 9, pp. 1921-1932   -echizenisao   Sep 2016   [Refereed]
T. Truong, D. Phan, M. Tran, A. Duong, I. Echizen
(ARES 2016), 7 pages   -echizenisao   Aug 2016   [Refereed]
Voice liveness detection for speaker verification based on a tandem single/double-channel pop noise detector
S. Shiota, F. Villavicencio, J. Yamagishi, N. Ono, I. Echizen, and Tomoko Matsui
Proc. of the Speaker and Language Recognition Workshop (Odyssey 2016)      Jun 2016   [Refereed]
Kei Hashimoto, Junichi Yamagishi, and Isao Echizen
Proceedings of 2016 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2016)   5500-5504   Mar 2016   [Refereed]
S. Wohlgemuth, K. Takaragi, and I. Echizen
Proc. of the Conference: Multikonferenz Wirtschaftsinformatik (MKWI) 2016      Mar 2016   [Refereed]
H. Ishizuka, K. Sakurai, I. Echizen, and K. Iwamura
International Workshop on Information and Communication Security (WICS2015), Proc. of the Third International Symposium on Computing and Networking (CANDAR15), 6 pages      Dec 2015   [Refereed]
Tradeoff between the price of distributing a database and its collusion resistance based on concatenated codes
T. Bui, T. Nguyen, N. Sonehara, and I. Echizen
Proc. of the 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2015), 8 pages      Nov 2015   [Refereed]
Audio Watermarking Using Different Wavelet Filters
T. Ito, H. Kang, K. Iwamura, K. Kaneda, and I. Echizen
Proc. of the 14th International Workshop on Digital-Forensics and Watermarking (IWDW 2015), LNCS, 9 pages, Springer      Oct 2015   [Refereed]
Discriminating between Computer-Generated Facial Images and Natural Ones Using Smoothness Property and Local Entropy
H. Nguyen, H-Q. Nguyen-Son, T. Nguyen, and I. Echizen
Proc. of the 14th International Workshop on Digital-Forensics and Watermarking (IWDW 2015), LNCS, 12 pages, Springer      Oct 2015   [Refereed]
Paraphrase Detection Based on Identical Phrase and Similar Word Matching
H.-Q. Nguyen-Son, Y. Miyao, I. Echizen
Proc. of the 29th Pacific Asia Conference on Language, Information and Computation (PACLIC 29), 10 pages      Oct 2015   [Refereed]
Voice liveness detection algorithms based on pop noise caused by human breath for automatic speaker verification
S. Shiota, F. Villavicencio, J. Yamagishi, N. Ono, I. Echizen, and T. Matsui
Proc. the Interspeech 2015, 5 pages      Sep 2015   [Refereed]
Surveillance Camera System Balancing Privacy Protection and Effective Surveillance Image Use
K. Kobayashi, M. Inamura, K. Kaneda, K. Iwamura, and and I. Echizen
Proc. of the 12th International Conference on e-Business (ICE-B 2015), pp. 41-28      Jul 2015   [Refereed]
Y. Ogawa, E. Hashimoto, M. Ichino, I. Echizen, and H. Yoshiura
Workshop on Privacy by Transparency in Data-Centric Services (PTDCS2015), Proc. of the 18th International Conference on Business Information Systems (BIS2015), Lecture Notes in Business Information Processing (LNBIP), no. 228, Springer, 12 pages      Jun 2015   [Refereed]
H-Q. Nguyen-Son, M-T. Tran, H. Yoshiura, N. Sonehara, and I. Echizen
Workshop on Privacy by Transparency in Data-Centric Services (PTDCS2015), Proc. of the 18th International Conference on Business Information Systems (BIS2015), Lecture Notes in Business Information Processing (LNBIP), no. 228, Springer, 12 pages      Jun 2015   [Refereed]
Chaotic Chebyshev polynomials based remote user authentication scheme in client-server environment
T. Truong, M. Tran, A. Duong and I. Echizen
Proc. the IFIP TC-11 International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2015), to be published in the IFIP AICT series      May 2015   [Refereed]
A. Dabrowski, I. Echizen, and E. Weippl
Proc. of the Second Language-Theoretic Security Workshop (LangSec2015) at the IEEE Security & Privacy Symposium      May 2015   [Refereed]
T. Kajiyama and I. Echizen
Interactive Technology and Smart Education   12    Apr 2015   [Refereed]
T. Bui, T. Nguyen, N. Sonehara, and I. Echizen
Proc. of the 29th IEEE International Conference on Advanced Information Networking and Applications (AINA-2015)      Mar 2015   [Refereed]
H-Q. Nguyen-Son, A-T. Hoang, M-T. Tran, H. Yoshiura, N. Sonehara, and I. Echizen
IEICE Trans. on Information & Systems   E97-D(1)    Jan 2015   [Refereed]
Robust Fingerprinting Codes for Database
T. Bui, B. Nguyen, T. Nguyen, N. Sonehara, and I. Echizen
International Journal of Big Data Intelligence   2    2015   [Refereed]
I. Echizen, T. Yamada, S. Gohshi
Transactions on Data Hiding and Multimedia Security   10    2015   [Refereed]
Evaluation of a zero-watermarking-type steganography
H. Ishizuka, I. Echizen, K. Iwamura and K. Sakurai
Proc. of the 13th International Workshop on Digital-Forensics and Watermarking (IWDW 2014), LNCS      Oct 2014   [Refereed]
Definition of Private Information for Image Sharing in Social Networking Services
E. Chaussy, S. Machida, N. Sonehara and I. Echizen
Proc. of the 13th International Workshop on Digital-Forensics and Watermarking (IWDW 2014), LNCS      Oct 2014   [Refereed]
Tag Detection for Preventing Unauthorized Face Image Processing
A. Jimenez, A. Dabrowski, J. Martinez, N. Sonehara and I. Echizen
Proc. of the 13th International Workshop on Digital-Forensics and Watermarking (IWDW 2014), LNCS      Oct 2014   [Refereed]
H-Q. Nguyen-Son, M-T. Tran, H. Yoshiura, N. Sonehara, and I. Echizen
The 4th International Workshop on Resilience and IT-Risk in Social Infrastructures (RISI), Proc. of the 9th International Conference on Availability, Reliability and Security (ARES)   455-460   Sep 2014   [Refereed]
SNSにおけるセンシティブデータの漏洩 検知に基づく公開範囲の設定方式
町田史門,梶山朋子,嶋田 茂,越前 功
情報処理学会論文誌   55(9) 2092-2103   Sep 2014   [Refereed]
K. Kaneda, H. Kitazawa, K. Iwamura, and I. Echizen
Proc. of the 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2014)   497-501   Aug 2014   [Refereed]
K. Kaneda, T. Inui, K. Iwamura, and I. Echizen
Proc. of the 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2014)   502-506   Aug 2014   [Refereed]
K. Kaneda, K. Kawabata, K. Iwamura, and I. Echizen
Proc. of the 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2014)   507-511   Aug 2014   [Refereed]
T. Bui, B. Nguyen, V. Nguyen, T. Nguyen, I. Echizen, and T. Nguyen
Proc. of the 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2014)   520-523   Aug 2014   [Refereed]
T. Ito, R. Sugiyama, H. Kang, K. Iwamura, K. Kaneda, and I. Echizen
Proc. of the 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2014)   455-458   Aug 2014   [Refereed]
H. Ishizuka, I. Echizen, K. Iwamura, and K. Sakurai
Proc. of the 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2014)   459-462   Aug 2014   [Refereed]
K. Kobayashi, K. Iwamura, K. Kaneda, and I. Echizen
Proc. of the 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2014)   463-466   Aug 2014   [Refereed]
S. Machida, T. Kajiyama, S. Shimada, and I. Echizen
Proc. of the 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2014)   471-474   Aug 2014   [Refereed]
Adaptive Disclosure Control System Using Detection of Sensitive Information in SNSs
S. Machida, T. Kajiyama, S. Shimada, and I. Echizen
Symposium On Usable Privacy and Security 2014 (SOUPS 2014)      Jul 2014   [Refereed]
P. Kieseberg, S. Schrittwieser, M. Mulazzani, I. Echizen, and E. Weippl
Electronic Markets   24 113-124   Jun 2014   [Refereed]
S. Gohshi, T. Hiroi, and I. Echizen
EURASIP Journal on Image and Video Processing   2014    Mar 2014   [Refereed]
P. Kieseberg, S. Schrittwieser, M. Mulazzani, I. Echizen
Electronic Markets      2014   [Refereed]
Robust Fingerprinting Codes for Database
T. Bui, B. Nguyen, T. Nguyen, N. Sonehara, and I. Echizen
Proc. of the 13th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP-2013)   LNCS(Springer)    Dec 2013   [Refereed]
S. Machida, S. Shimada, and I. Echizen
Workshop on Dependable and Trustworthy Web and Distributed System (DTWD2013), Proc. of the 9th International Conference on Signal Image Technology & Internet Based Systems (SITIS2013)      Dec 2013   [Refereed]
T. Bui, B. Nguyen, T. Nguyen, N. Sonehara, and I. Echizen
Workshop on Dependable and Trustworthy Web and Distributed System (DTWD2013), Proc. of the 9th International Conference on Signal Image Technology & Internet Based Systems (SITIS2013)      Dec 2013   [Refereed]
A Color Extraction Method from Text for Use in Creating a Book Cover Image that Reflects Reader Impressions
T. Iida, T. Kajiyama, N. Ouchi, and I. Echizen
7th Workshop “Emotion and Computing -Current Research and Future Impact, Proc. of the 8th International Conference on Knowledge, Information and Creativity Support Systems (KICSS2013)   LNCS(Springer)    Nov 2013   [Refereed]
A. Dabrowski, E. Weippl, and I. Echizen
Proc. of the 2013 IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC 2013)      Oct 2013   [Refereed]
T. Yamada, S. Gohshi, and I. Echizen
Proc. of the 2013 IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC 2013)      Oct 2013   [Refereed]
Evaluation of privacy visor for preventing face recognition from camera images
T. Yamada, S. Gohshi, and I. Echizen
Proc. of the 2013 International Workshop on Smart Info-Media Systems in Asia (SISA2013)   128-133   Oct 2013   [Refereed]
Reversible audio watermarking based on integer DCT coefficients with adaptive hiding locations
Xuping Huang, Nobutaka Ono, Isao Echizen and Akira Nishimura
Proc. of the 12th International Workshop on Digital-Forensics and Watermarking (IWDW 2013)   LNCS(Springer)    Oct 2013   [Refereed]
Detecting Traitors in Re-Publishing Updated Datasets
A-T. Hoang, H-Q. Nguyen-Son, M-T. Tran, and I. Echizen
Proc. of the 12th International Workshop on Digital-Forensics and Watermarking (IWDW 2013)   LNCS(Springer)    Oct 2013   [Refereed]
Anonymizing Temporal Phrases in Natural Language Text to be Posted on Social Networking Services
H-Q. Nguyen-Son, A-T. Hoang, M-T. Tran, H. Yoshiura, N. Sonehara, and I. Echizen
Proc. of the 12th International Workshop on Digital-Forensics and Watermarking (IWDW 2013)   LNCS(Springer)    Oct 2013   [Refereed]
T. Muraki, S. Oishi, M. Ichino, I. Echizen, and H. Yoshiura
the 3rd International Workshop on Resilience and IT-Risk in Social Infrastructures (RISI 2013)   517-524   Sep 2013   [Refereed]
Securing Access to Complex Digital Artifacts - Towards a Controlled Processing Environment for Digital Research Data
J. Latocha, K. Rechert, and I. Echizen
Proc. of the 17th International Conference on Theory and Practice of Digital Libraries (TPDL 2013)      Sep 2013   [Refereed]
T. Yamada, S. Gohshi, and I. Echizen
Proc. of the 14th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security (CMS 2013)   short paper(LNCS 8099) 152-161   Sep 2013   [Refereed]
T. Bui, V. Dang, I. Echizen, and T. Nguyen
Proc. of the 7th International Conference on Next Generation Mobile Apps, Services and Technologies (NGMAST 2013)   Proc. of the 7th International Conference on Next Generation Mobile Apps, Services and Technologies (NGMAST 2013)    Sep 2013   [Refereed]
Limitations of Super Resolution Image Reconstruction and How to Overcome them for a Single Image
S. Gohshi and I. Echizen
Proc. of the 10th International Conference on Signal Processing and Multimedia Applications (SIGMAP 2013)      Jul 2013   [Refereed]
S. Shimada and I. Echizen
Proc. of The 37th Annual International Computer Software & Applications Conference      Jul 2013   [Refereed]
K. Rechert, K. Meier, R. Zahoransky, D. Wehrle, D. Suchodoletz, B. Greschbach, S. Wohlgemuth, and I. Echizen
IEEE Systems Journal   7(2) 211-222   Jun 2013   [Refereed]
A User Privacy Protection Technique for Executing SQL over Encrypted Data in Database Outsourcing Service
6.T. Hue, D. Thuy, N. Thuc, I. Echizen, and S. Wohlgemuth
Proc. of The 12th IFIP Conference on e-Business, e-Services, e-Society (I3E 2013)      Apr 2013   [Refereed]
Coupons as Monetary Incentives in Participatory Sensing
I. Krontiris, A. Albers, N. Sonehara, and I. Echizen
Proc. of The 12th IFIP Conference on e-Business, e-Services, e-Society (I3E 2013)      Apr 2013   [Refereed]
T. Hue, N. Thuc, D. Thuy, I. Echizen, and S. Wohlgemuth
Proc. of the 9th International Symposium on Frontiers of Information Systems and Network Applications      Mar 2013   [Refereed]
H. Nishikawa, Y. Kakizaki, K. Iwamura, I. Echizen
Proc. of the 9th International Symposium on Frontiers of Information Systems and Network Applications      Mar 2013   [Refereed]
Ineluctable Background Checking on Social Networks: Linking Job Seeker's Résumé and Posts
T. Okuno, M. Ichino, I. Echizen, A. Utsumi, and H. Yoshiura
Proc. of the 5th IEEE International Workshop on. Security and Social Networking (SESOC 2013)      Mar 2013   [Refereed]
Privacy visor: wearable device for preventing privacy invasion through face recognition from camera images
T. Yamada, S. Gohshi, and I. Echizen
Proc. of the 2013 International Workshop on Advanced Image Technology 2013 (IWAIT2013)      Jan 2013   [Refereed]

Books etc

 
Dual-plane Correlation-based Video Watermarking for Immunity to Rotation, Scale, Translation, and Random Distortion, in Artificial Intelligence in Multimedia Data Hiding
I. Echizen, Y. Atomori, S. Nakayama, and H. Yoshihura
Springer   Dec 2009   
Long-Term and Dynamical Aspects of Information Security "A. Schmidt, M. Kreutzer, and R. Accorsi, eds"
T. Yamada, I. Echizen, S. Tezuka
Nova Publishers   Oct 2007   ISBN:1600219128
Intelligent Multimedia Data Hiding "J. Pan, W. Fang, H. Huang, and L. Jain, eds"
I. Echizen, Y. Fujii, T. Yamada, S. Tezuka, and H. Yosihura
Springer-Verlag   Jun 2007   ISBN:3540711686

Conference Activities & Talks

 
"Efficiently Decodable Non-Adaptive Threshold Group Testing,"
T. Bui, M. Kuribayashi, M. Cheraghchi, and I. Echizen,
Proc. of the Speaker and Language Recognition Workshop (Odyssey 2018),   Jun 2018   
"Can we steal your vocal identity from the Internet?: Initial investigation of cloning Obama’s voice using GAN, WaveNet and low-quality found data,”
J. Lorenzo-Trueba, F. Fang, X. Wang, I. Echizen, J. Yamagishi, and T.
Proc. of the Speaker and Language Recognition Workshop (Odyssey 2018)   Jun 2018   
第2回統一的評価基準に基づく電子透かしコンテスト〜チャレンジングな評価基準を超えられるか!〜 [Invited]
echizenisao   4 Sep 2013   
プライバシーバイザー:カメラの写り込みによるプライバシー侵害を防止する技術 [Invited]
13 Sep 2013   
Privacy Visor: Method for Preventing Privacy Invasion Through Face Recognition from Camera Images [Invited]
echizenisao   31 Oct 2013   
Privacy visor: Wearable device that transmits invisible noise signals for preventing face recognition from camera images [Invited]
18 Nov 2013   
サイバー/フィジカル境界におけるセキュリティ・プライバシー保護技術の研究 [Invited]
17 Feb 2015   
Security and privacy challenges at border between cyber and physical worlds [Invited]
echizenisao   28 Aug 2014