Hiroshi Yoshiura

Emeritus Professor etc.Emeritus Professor

Degree

  • Doctor of Science, The University of Tokyo

Research Keyword

  • Privacy enhancement
  • Information security

Field Of Study

  • Informatics, Information security

Career

  • Apr. 2021 - Present
    The University of Electro-Communications
  • Apr. 2021 - Mar. 2023
    Kyoto Tachibana University, Faculty of Engineering Department of Information and Computer Science, 教授,工学部長
  • 01 Apr. 2010
    Department of Informatics, Graduate School of Informatics and Engineering, Professor
  • 01 Oct. 2005
    Department of Electro-Communications, The University of Electro-Communications, Professor
  • Apr. 2003 - Sep. 2003
    The University of Electro-Communications, Faculty of Electro-Communications, 助教授
  • Apr. 1981 - Mar. 2003
    Hitachi, Ltd.,, システム開発研究所

Educational Background

  • Jan. 1997
    The University of Tokyo, 博士(理学)
  • 1981
    The University of Tokyo, Faculty of Science, Department of Information Science

Member History

  • Jan. 2022 - Present
    審査委員, 辻井重男セキュリティ論文賞, Others
  • Mar. 2020 - Present
    プログラム委員, 2020-2022 IEEE International Workshop on Cyber Forensics in Software, Society
  • Jun. 2018 - Present
    プログラム委員, 2018-2023 International Workshop on Informatics (IWIN), Society
  • Jun. 2018 - Present
    マルチメディア情報ハイディング・エンリッチメント研究専門委員会 専門委員, 電子情報通信学会, Society
  • Apr. 2017 - Present
    専門委員, 情報処理学会コンピュータセキュリティ研究会
  • Jun. 2016 - Present
    フェロー, 情報処理学会, Society
  • Apr. 2015 - Present
    専門委員, セキュリティ心理学とトラスト研究会, Society
  • Oct. 2008 - Present
    プログラム委員, 3rd-16th International Workshop on Advances in Information Security(WAIS), Society
  • Apr. 2023 - Mar. 2024
    フェロー選定委員会委員長, 情報処理学会
  • Aug. 2022 - Mar. 2023
    フェロー選定委員会委員, 情報処理学会
  • Mar. 2018 - Sep. 2022
    プログラム委員, 17th-21th IFIP Conference on e-Business, e-Services, and e-Society(I3E), Society
  • Jun. 2021 - Mar. 2022
    ゲストエディタ, International Journal of Informatics Society(IJIS), Vol.13, No.3, Society
  • Nov. 2021 - Feb. 2022
    テニュア付与中間評価委員会 中間審査外部委員, 東京農工大学, Others
  • Sep. 2007 - Mar. 2021
    編集部会委員, 日本セキュリティ・マネジメント学会, Society
  • Apr. 2019 - Oct. 2019
    International Conference on Awareness Science and Technology (iCAST) Program committee member, IEEE
  • 03 Sep. 2018 - 23 Aug. 2019
    論文誌特集号「ユーザブルセキュリティ」編集委員, 情報処理学会, Society
  • 01 Aug. 2017 - 01 Jul. 2019
    特別研究員等審査会専門委員,卓越研究員候補者選考委員会書面審査員及び国際事業委員会書面審査員・書面評価員, 日本学術振興会, Government, 公正・公平な審査への貢献者として表彰された.
  • 01 Jun. 2016 - 31 May 2019
    査読委員, 情報処理学会 デジタルプラクティス 査読委員会, Society
  • Nov. 2018 - Jan. 2019
    工学研究院 テニュアトラック教員公募選考委員会 外部選考委員, 東京農工大学, Others
  • Sep. 2017 - Dec. 2018
    論文誌特集号「セキュリティ人材と技術で目指す信頼できる社会基盤の実現に向けて」, 情報処理学会, Society
  • Jan. 2016 - Dec. 2018
    委員, 情報処理学会プライバシーワークショップ実行委員会, Society
  • May 2017 - Sep. 2018
    論文誌特集号「超スマート社会を支えるコンピュータセキュリティ技術」編集委員会委員, 情報処理学会, Society
  • Jun. 2016 - Jul. 2018
    理事, 日本セキュリティ・マネジメント学会, Society
  • Jun. 2014 - 06 Jun. 2018
    マルチメディア情報ハイディング・エンリッチメント研究専門委員会 専門委員, 電子情報通信学会, Society
  • 12 Sep. 2017 - Mar. 2018
    外部委員, 東京農工大学テニュアトラック最終審査
  • Sep. 2016 - Dec. 2017
    論文誌特集号「私たちを取り巻く情報の信頼性とライフタイムを意識した安全な社会基盤の確立に向けて」編集委員会委員, 情報処理学会, Society
  • Oct. 2016 - Oct. 2017
    博士学位審査委員会 審査外部委員, 防衛大学校理工学研究科電子情報工学系専攻
  • May 2016 - May 2017
    論文誌「高度化するサイバー攻撃に対応するコンピュータセキュリティ技術」特集号 編集委員, 情報処理学会, Society
  • 07 Nov. 2016 - Mar. 2017
    委員, 辻井重男セキュリティ論文賞運営委員会, Others
  • Jan. 2016 - Mar. 2017
    国立大学教育研究評価委員会 専門委員, 独立行政法人大学評価・学位授与機構, Government
  • Apr. 2013 - Mar. 2017
    コンピュータセキュリティ研究会運営委員, 情報処理学会, Society
  • Apr. 2004 - Mar. 2017
    委託研究評価委員会 専門委員, 情報通信研究機構, Others
  • Sep. 2015 - Dec. 2016
    論文誌特集号「ヒトとモノを中心としたセキュアで信頼できる社会に向けて」, 情報処理学会, Society
  • May 2015 - Sep. 2016
    論文誌「社会の変革に挑戦するセキュリティ技術とプライバシー保護技術」編集委員会委員, 情報処理学会, Society
  • Aug. 2012 - Sep. 2016
    プログラム委員, 12th-15th IFIP Conference on e-Business, e-Services, and e-Society(I3E), Society
  • Jun. 2012 - Jun. 2016
    編集部会長, 日本セキュリティ・マネジメント学会, Society
  • Jun. 2012 - Jun. 2016
    常任理事, 日本セキュリティ・マネジメント学会, Society
  • 19 Nov. 2015 - Mar. 2016
    委員長, 辻井重男セキュリティ論文賞 審査委員会, Society
  • Nov. 2015 - Mar. 2016
    委員, 辻井重男セキュリティ論文賞 運営委員会, Others
  • Jan. 2014 - Mar. 2016
    コンピュータセキュリティシンポジウム2015実行委員長, 情報処理学会, Society
  • Sep. 2014 - Dec. 2015
    論文誌特集号「ヒューマンファクタを考慮したセキュリティとプライバシ」編集委員会委員, 情報処理学会, Society
  • Jul. 2015 - Nov. 2015
    テニュア付与中間評価委員会 外部委員, 東京農工大学
  • 02 Jun. 2014 - Sep. 2015
    情報処理学会論文誌特集号「社会に浸透していくコンピュータセキュリティ技術」編集委員会委員, 情報処理学会, Society
  • Nov. 2009 - Sep. 2015
    プログラム委員, 5th-11th IEEE International Conference on Intelligent Information Hiding and Multimedia, Society
  • Apr. 2011 - Mar. 2015
    セキュリティ心理学とトラスト研究会 運営委員, 情報処理学会, Society
  • Dec. 2012 - Nov. 2014
    科学研究費補助金審査委員会 第1段審査委員, 科学技術振興機構
  • May 2013 - Sep. 2014
    情報処理学会論文誌特集号「増大する脅威に対抗するコンピュータセキュリティ技術」編集委員, 情報処理学会, Society
  • Oct. 2006 - Aug. 2014
    プログラム委員,2nd IWSECでは表彰委委員長を兼任, 2nd-9th IEICE&IPSJ International Workshop on Security (IWSEC), Society
  • Mar. 2013 - Jun. 2013
    学会論文賞審査委員, 日本セキュリティ・マネジメント学会, Society
  • Jun. 2012 - May 2013
    論文誌「未来を切り開くコンピュータセキュリティ技術」特集号 編集委員, 論文誌「未来を切り開くコンピュータセキュリティ技術」特集号 編集委員会, Society
  • Jun. 2012 - May 2013
    論文誌「未来を切り開くコンピュータセキュリティ技術」特集号 編集委員, 情報処理学会, Society
  • May 2007 - 31 Mar. 2013
    コンピュータセキュリティ研究会専門委員, 情報処理学会, Society
  • Apr. 2011 - Mar. 2013
    高機能マルチメディア研究専門委員会 専門委員, 電子情報通信学会, Society
  • May 2011 - Sep. 2012
    情報処理学会論文誌特集号「スマートな社会を実現するコンピュータセキュリティ技術」編集委員, 情報処理学会, Society
  • Aug. 2011 - Jul. 2012
    マルチメディア、分散、協調とモバイルシンポジウム(DICOMO2012) プログラム委員長, 情報処理学会, Society
  • Feb. 2012 - Jun. 2012
    学会論文賞審査委員, 日本セキュリティ・マネジメント学会, Society
  • Jul. 2011 - Jun. 2012
    平成24年度全国大会実行委員長, 日本セキュリティ・マネジメント学会, Society
  • Sep. 2010 - May 2012
    編集部会 副部会長, 日本セキュリティ・マネジメント学会, Society
  • Jun. 2008 - May 2012
    理事, 日本セキュリティ・マネジメント学会, Society
  • Mar. 2011 - Mar. 2012
    プログラム委員, 26th IEEE International Conference on Advanced Information Networking and Applications, Society
  • Dec. 2009 - Nov. 2011
    科学研究費補助金審査委員会 第1段審査委員, 日本学術振興会
  • Jun. 2010 - Sep. 2011
    情報処理学会論文誌 特集 「人と共存するコンピュータセキュリティ技術」 編集委員会委員, 情報処理学会, Society
  • Jun. 2010 - Jun. 2011
    戦略的国際科学技術協力推進事業日本-アメリカ研究交流 事後評価委員, 科学技術振興機構, Government
  • Apr. 2010 - Mar. 2011
    会誌「情報処理」モニタ, 情報処理学会, Society
  • Nov. 2006 - Mar. 2011
    マルチメディア情報ハイディング時限研究専門委員会 専門委員, 電子情報通信学会, Society
  • Jul. 2009 - Sep. 2010
    情報処理学会論文誌特集号「人と組織の社会貢献を支えるコンピュータセキュリティ技術」編集委員, 情報処理学会, Society
  • Jun. 2007 - Sep. 2010
    プログラム委員,8th I3Eでは広報委員長を兼任, 8th-10th IFIP Conference on e-Business, e-Services, and e-Society (I3E), Society
  • May 2008 - May 2009
    情報処理学会論文誌「社会を活性化するコンピュータセキュリティ技術」特集号 編集委員長, 情報処理学会, Society
  • Oct. 2007 - Oct. 2008
    コンピュータセキュリティシンポジウム(CSS2008) プログラム委員長, 情報処理学会, Society
  • May 2007 - Sep. 2008
    論文誌特集号「安心・安全な社会基盤を実現するコンピュータセキュリティ技術」提案者 兼 編集委員, 情報処理学会, Society
  • Oct. 2007 - Jul. 2008
    運営委員会委員(Steering committee member), IEICE & IPSJ International Workshop on Security(IWSEC), Society
  • Jun. 2007 - Jun. 2008
    情報処理学会論文誌 特集 「ユビキタスコンピューティングシステム」 編集委員, 情報処理学会, Society
  • Sep. 2007 - May 2008
    情報処理学会平成19年度論文賞委員会委員, 情報処理学会, Society
  • Jun. 2007 - May 2008
    知識ベース3群8編委員会編幹事, 電子情報通信学会, Society
  • Sep. 2004 - May 2008
    論文賞委員会 委員, 情報処理学会
  • May 2002 - May 2008
    ソサイエティ論文誌編集委員会 査読委員, 電子情報通信学会
  • May 2004 - Apr. 2008
    論文誌編集委員, 情報処理学会, Society
  • May 2002 - Apr. 2008
    ソサイエティ論文誌編集委員会査読委員, 電子情報通信学会, Society
  • Oct. 2007 - Mar. 2008
    プログラム委員, 22nd IEEE International Conference on Advanced Information Networking and Applications (AINA), Society
  • Apr. 2007 - Mar. 2008
    代表会員, 情報処理学会, Society
  • May 2007 - Jan. 2008
    情報処理学会論文誌特集「産学連携論文」編集委員会委員, 情報処理学会, Society
  • Nov. 2006 - Jul. 2007
    連続セミナー2007・第3回「ビジネスと生活を結ぶセキュリティ」 コーディネータ, 情報処理学会, Society
  • Sep. 2006 - May 2007
    情報処理学会平成18年度論文賞委員会委員, 情報処理学会, Society
  • Jun. 2006 - May 2007
    論文誌編集委員会 副査(ネットワーク分野), 情報処理学会, Society
  • May 2006 - May 2007
    情報処理学会論文誌特集号「情報システムを支えるコンピュータセキュリティ技術の再考」編集委員, 情報処理学会, Society
  • May 2003 - May 2007
    コンピュータセキュリティ研究会運営委員, 情報処理学会, Society
  • Sep. 2005 - Aug. 2006
    プログラム委員長, 1st IEICE&IPSJ International Workshop on Security (IWSEC), Society
  • Sep. 2005 - May 2006
    情報処理学会平成17年度論文賞委員会委員, 情報処理学会, Society
  • Jun. 2005 - May 2006
    論文誌特集号「ユビキタス社会を支える コンピュータセキュリティ技術 」提案者、編集幹事、編集委員兼任, 情報処理学会, Society
  • Feb. 2003 - May 2006
    Program committee member, 19th-22nd IFIP International Information Security Conference (SEC), Society
  • May 2002 - Apr. 2006
    電子化知的財産 ・社会基盤研究会運営委員, 情報処理学会, Society
  • Nov. 2004 - Mar. 2005
    電子透かし技術の評価手法の標準化に関する調査研究委員会 委員, デジタルコンテンツ協会
  • May 2002 - May 2004
    地域情報化基本策定委員会地域情報環境とネットワーク利用に関する課題検討ワーキンググループ 委員, 調布市, Autonomy
  • 2003 - 2004
    情報科学技術フォーラム担当委員, 情報処理学会, Society
  • 1998 - 2002
    英文論文誌D編集委員, 電子情報通信学会, Society
  • Oct. 2001 - Dec. 2001
    情報家電インターネット推進協議会著作権ワーキンググループ 委員, 総務省, Government
  • Feb. 2001 - Jul. 2001
    デジタルコンテンツのネットワーク流通市場形成に向けた研究 構成員, 総務省, Government
  • May 2001 - Jun. 2001
    アドホック技術3-著作権保護技術ワーキンググループ 共同主査, 光サービスアーキテクチャコンソーシアム, Others
  • 1996 - 2000
    総務委員, 人工知能学会, Society
  • Jul. 1998 - Mar. 1999
    著作物の流通に関する技術委員会 委員, ソフトウェア流通センター
  • Apr. 1989 - Mar. 1990
    エキスパートシステム評価研究委員 委員, 日本情報処理開発協会(JIPDEC), Others

Award

  • Feb. 2023
    電子情報通信学会マルチメディア情報ハイディング・エンリッチメント(EMM)研究専門委員会
    目周辺領域の熱画像および可視光画像から抽出した特徴を用いる個人認証手法
    EMM研究会学生研究賞(共同研究の学生が受賞), 中村匠;吉浦裕;市野将嗣
  • Dec. 2021
    デジタルフォレンジック研究会
    背景知識を用いて移動履歴から個人を特定する確率モ デルの提案と評価
    デジタルフォレンジック優秀若手研究者賞(指導大学院生が在学時に投稿した論文が卒業後に受賞)
  • Dec. 2020
    情報処理学会
    対象者の人数と対象者間の関 係に制約のない 移動履歴とソーシャルネットワークの照合方式
    論文誌ジャーナル/JIP特選論文, 松本瞬;大岡拓斗;市野将嗣;吉浦裕
  • Jun. 2020
    情報処理学会
    匿名加工をともなう2パーティ秘匿クロス集計の完全準同型暗号による実現と性能比較
    論文誌ジャーナル/JIP特選論文, 片山源太郎;吉浦裕
  • 23 Oct. 2019
    情報処理学会コンピュータセキュリティ(CSEC)研究会, 情報処理学会コンピュータセキュリティ(CSEC)研究会の発表論文の10%以内を表彰
    対象者の人数と人間関係に制約のない移動履歴とSNSアカウントの照合
    CSEC優秀研究賞, 大岡拓斗;松本瞬;市野将嗣;緑川耀一;吉井英樹;吉浦裕
    Japan society, Japan
  • 23 Oct. 2019
    情報処理学会コンピュータセキュリティ(CSEC)研究会, 情報処理学会コンピュータセキュリティ(CSEC)研究会の発表論文の10%以内を表彰
    匿名加工を伴う2パーティ秘匿クロス集計の性能比較
    CSEC優秀研究賞, 片山源太郎;吉浦裕
    Japan society
  • 23 Oct. 2019
    情報処理学会プライバシーワークショップ(PWS)実行委員会, 参加21チーム中1位
    PWSカップ・リスク評価(トレース推定部門)1位表彰, 片山源太郎;吉田健太郎;松本瞬;大岡拓斗;阿波拓海;岩崎雅史;草野理沙;山口高康;緑川耀一
    Others
  • Sep. 2019
    Informatics Society
    Linking Anonymous SNS Accounts and Real-World People through Profiling
    Excellent paper award, 13th International Workshop on Informatics (IWIN2019), Eina Hashimoto;Masatsugu Ichino;Hiroshi Yoshiura
    International society
  • Jun. 2019
    独立行政法人 日本学術振興会
    平成30年度特別研究員等審査会専門委員(書面担当)及び国 際事業委員会書面審査員の表彰 「有意義な審査意見を付していただいた専門委員等」
  • 09 Mar. 2019
    辻井賞審査委員会(日本セキュリティ・マネジメント学会等より選任)
    虹彩および目の周辺の分割画像を用いた個人認証
    辻井重男セキュリティ論文賞 特別賞
    Japan society
  • 15 Sep. 2018
    情報処理学会
    虹彩および目の周辺の分割画像を用いた個人認証
    情報処理学会論文誌ジャーナル/JIP特選論文(英文名称:Specially Selected Paper), 白川功浩;吉浦 裕;市野将嗣
    Official journal
  • 17 Mar. 2018
    日本セキュリティ・マネジメント学会
    ソーシャルネットワークの発言者を特定するシステムの提案と予備評価
    日本セキュリティ・マネジメント学会論文賞, 小川陽平;市野将嗣;久保山哲二;吉浦裕
    Japan society
  • Sep. 2017
    Informatics Society
    A Strategy for Mitigating Information Loss in Anonymization by Using Nature of Personal Data
    Best Paper Award, 11th International Workshop on Informatics 2017, Takayasu Yamaguchi;Hiroshi Yoshiura
    International society
  • Sep. 2016
    IFIP, 指導大学院生が受賞
    Breaking Anonymity of Social Network Accounts by Using Coordinated and Extensible Classifiers based on Machine Learning
    15th IFIP Conference on e-Business, e-Services and e-Society, Best Paper Award, Eina Hashimoto;Masatsugu Ichino;Tetsuji Kuboyama;Isao Echizen;Hiroshi Yoshiura
    International society
  • Jun. 2016
    日本セキュリティ・マネジメント学会
    Text Indicated Speaker Recognition Using Separate Models of Lip Movement
    日本セキュリティ・マネジメント学会論文賞, Matatsugu Ichino;Hiroshi Yoshiura
    Japan society
  • 21 Jun. 2014
    日本セキュリティ・マネジメント学会
    ソーシャルネットワークから注目者の発言を特定するシステムの提案と予備評価
    日本セキュリティ・マネジメント学会 論文奨励賞(指導大学院生が受賞), 片岡春乃;奥野智孝;木村聡一;内海彰;吉浦裕
    Official journal
  • Jul. 2013
    情報処理学会 DICOMO(マルチメディア,分散,協調とモバイルシンポジウム)シンポジウム
    スマートフォンの気圧センサと気象情報を用いた高度推定手法
    情報処理学会DICOMOシンポジウム(マルチメディア,分散,協調とモバイルシンポジウム)2013 優秀プレゼンテーション賞(指導大学院生が受賞), 並木渉
  • Nov. 2012
    情報処理学会 マルウェア対策研究人材育成ワークショップ(MWS)実行委員会
    マルウェア感染検知のためのトラヒックデータにおけるペイロード情報の特徴量評価
    MWS2012学生論文賞(指導大学院生が受賞), 大月 優輔;市野 将嗣;川元 研治;畑田 充弘;吉浦 裕
  • Aug. 2012
    1st International Workshop on Data Mining for Info-Communication Service and its Diffusion (DMICSiD2012)
    Evaluation of Secular Changes in Statistical Features of Traffic for the Purpose of Malware Detection
    Selected Outstanding Paper, Kenji Kawamoto;Masatsugu Ichino;Mitsuhiro Hatada;Yusuke Otsuki;Hiroshi Yoshiura;Jiro Katto
  • 25 Jun. 2011
    日本セキュリティマネジメント学会
    SNS上のテキストからプライバシー情報を検知するシステムの構想と予備評価
    日本セキュリティマネジメント学会論文賞, 渡辺夏樹;片岡春乃;内海彰;吉浦裕
    Japan society
  • Jun. 2011
    情報処理学会
    秘密分散データベースの構造演算を可能にするマルチパーティプ ロトコルを用いた関係代数演算
    情報処理学会論文賞, 志村正則;宮﨑邦彦;西出隆志;吉浦裕
  • Mar. 2011
    日本セキュリティ・マネジメント学会
    模倣コンテンツの特性に基づくフィッシング検知方式の誤検知防止
    辻井重男セキュリティ学生論文賞 情報セキュリティ部門 奨励賞(指導大学院生が受賞), 中山心太
  • Feb. 2011
    日本セキュリティ・マネジメント学会
    取り調べの可視化における技術課題の明確化とシステムの提案
    辻井重男セキュリティマネジメント学生論文賞 セキュリティマネジメント部門 努力賞(指導大学院生が受賞), 高間浩樹
  • Aug. 2010
    情報処理学会DICOMOシンポジウム実行委員会
    ITリスク対策に関する社会的合意形成支援システムSocial-MRCの開発構想
    情報処理学会DICOMOシンポジウム(マルチメディア,分散,協調とモバイルシンポジウム)2010 最優秀論文賞, 佐々木良一;杉本尚子;矢島敬士;増田英孝;吉浦裕;鮫島正;樹;船橋誠寿
  • Mar. 2009
    電子情報通信学会
    カラー画像の二つの色成分の関係に基づいてランダムゆがみとアフィン変形に対応する画像電子透かし方式
    電子情報通信学会 学術奨励賞(指導大学院生が受賞), 後森裕介
  • Dec. 2006
    IEEE
    Improved Video Verification Method Using Digital Watermarking
    Best paper award, IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Isao Echizen;Takaaki Yamada;Satoru Tezuka;Stephan Singh;Hiroshi Yoshiura
    United States
  • May 2005
    システム制御情報学会
    電子透かしを用いたWebサイト認定マークの実用シス テム開発と評価
    システム制御情報学会産業技術賞, 青島弘和;吉浦裕;洲崎誠一;本城信輔
  • May 2005
    情報処理学会
    電子透かし検出に適した誤り訂正符号の拡張方式
    情報処理学会論文賞, 藤井康広;越前功;山田隆亮;手塚悟;吉浦裕
  • Dec. 2000
    株式会社 日立製作所
    電子データを認証するための方法
    日立製作所社長知的所有権賞金賞, 吉浦裕;洲崎誠一;宝木和夫;佐々木良一;鍛忠司;永井康彦
  • Dec. 2000
    株式会社 日立製作所
    電子透かし及びそれを応用したWebサイト認証技術(インターネット・マーク)
    日立製作所社長技術賞, 吉浦裕;洲崎誠一;青島弘和;越前功;安細康介;佐々木良一
  • Dec. 1998
    株式会社 日立製作所
    電子透かしとその応用
    日立評論優秀論文賞, 吉浦裕;金野千里;黒須豊
  • Sep. 1990
    情報処理学会
    Case-Based Reasoningによるエキスパートシステムの知識獲 得の容易化(1):事例利用方式
    情報処理学会学術奨励賞, 吉浦裕;橋本和広

Paper

  • Authentication for Periocular Region in Thermal and Visible Light Images by using CNN
    Shusuke Kawamura; Hiroshi Yoshiura; Masatsugu Ichino
    Journal of Information Processing, May 2024
    Scientific journal
  • Androidマルウェア検知器に対するSHAP値を用いた学習による回避攻撃
    嶋田康太; 畑田充弘; 吉浦裕; 市野 嗣
    情報処理学会論文誌, 65, 2, 588-601, Feb. 2024, Peer-reviwed
    Scientific journal, Japanese
  • Cross-Spectral Periocular Recognition by Translating Thermal Images Into Visible Light Images
    Shusuke Kawamura; Hiroshi Yoshiura; Masatsugu Ichino
    IEEE 12th Global Conference on Consumer Electronics (GCCE 2023), 654-655, Oct. 2023, Peer-reviwed
    International conference proceedings
  • Androidマルウェア分類器に対するパッキングを用いた効果的な回避攻撃
    古川和祈,畑田充弘,吉浦裕,市野将嗣
    情報処理学会論文誌, 63, 9, 1440-1457, Sep. 2022, Peer-reviwed
    Scientific journal
  • Reliability-Disguised Attacks on Social Network to Accelerate Fake News Dissemination
    Kento Yoshikawa; Takumi Awa; Masatsugu Ichino; Hiroshi Yoshiura
    IEEE International Workshop in Cyber Forensics, Security, and E-discovery (CFSE 2021), 841-848, Dec. 2021, Peer-reviwed
    International conference proceedings, English
  • Periocular Recognition Based on Features from Thermal and Visible-Light Images
    Takumi Nakamura; Hiroshi Yoshiura; Masatsugu Ichino
    IEEE 10th Global Conference on Consumer Electronics (GCCE 2021), 980-981, Oct. 2021, Peer-reviwed
    International conference proceedings
  • Maintaining soundness of social network by understanding fake news dissemination and people's belief
    Risa Kusano; Kento Yoshikawa; Hiroyuki Sato; Masatsugu Ichino; Hiroshi Yoshiura
    15th International Workshop on Informatics (IWIN2021), Sep. 2021, Peer-reviwed
  • Modeling Malicious Behaviors and Fake News Dissemination on Social Networks.
    Kento Yoshikawa; Masatsugu Ichino; Hiroshi Yoshiura
    20th IFIP Conference e-Business, e-Services, and e-Society (I3E2021), LNCS 12896, 643-655, Sep. 2021, Peer-reviwed
    English
  • 背景知識を用いて移動履歴から個人を特定する確率モデルの提案と評価
    松本瞬; 大岡拓斗; 市野将嗣; 吉浦裕
    情報処理学会論文誌, 62, 8, 1415-1425, Aug. 2021, Peer-reviwed
    Scientific journal, Japanese
  • Time-aware multi-resolutional approach to re-identifying location histories by using social networks
    Takuto Ohka; Shun Matsumoto; Masatsugu Ichino; Hiroshi Yoshiura
    IEEE International Workshop on Cyber Forensics in Software Engineering (CFSE 2020), 176-183, 11 Dec. 2020, Peer-reviwed
    International conference proceedings, English
  • A Fake News Dissemination Model Based on Updating Reliability and Doubt among Individuals
    Kento Yoshikawa; Takumi Awa; Risa; Kusano; Hiroyuki Sato; Masatsugu Ichino; Hiroshi Yoshiura
    11th IEEE International Conference on Awareness Science and Technology (iCAST2020), 8 pages, Dec. 2020, Peer-reviwed
  • スマートフォンの通話に着目した音声と耳介による個人照合
    郷間愛美; 大木哲史; 吉浦裕; 市野将嗣
    情報処理学会論文誌, 61, 12, 1881-1891, Dec. 2020, Peer-reviwed
    Scientific journal, Japanese
  • 対象者の人数と対象者間の関係に制約のない移動履歴とソーシャルネットワークの照合方式
    松本瞬; 大岡拓斗; 市野将嗣; 吉浦裕
    61, 12, 1814-1830, Dec. 2020, Peer-reviwed
    Scientific journal, Japanese
  • XGBoostによる複数特徴量を用いた虹彩と目の周辺と強膜の個人認証
    上野山大介; 吉浦裕; 市野将嗣
    情報処理学会論文誌, 61, 9, 1552-1566, Sep. 2020, Peer-reviwed
    Scientific journal
  • Detection of Malware Infection based on the Similarity between Malware Infected Traffic
    M. Ichino; Y. Mori; M. Hatada; H. Yoshiura
    International Journal of Informatics Society (IJIS), Informatics Society, 11, 3, 149-157, 15 Jul. 2020, Peer-reviwed
    Scientific journal, English
  • 匿名加工を伴う2パーティ秘匿クロス集計の完全準同型暗号による実現と性能比較
    片山源太郎; 吉浦裕
    情報処理学会論文誌, 61, 6, 1175-1189, 15 Jun. 2020, Peer-reviwed
    Scientific journal, Japanese
  • Re-identifying people from anonymous histories of their activities
    Hiroshi Yoshiura
    10th International Conference on Awareness Science and Technology (iCAST 2019), 1-5, 23 Oct. 2019, Invited
    International conference proceedings, English
  • Personal Authentication of Iris and Periocular Recognition Using XGBoos
    Daisuke Uenoyama; Hiroshi Yoshiura; Masatsugu Ichino
    2019 IEEE 8th Global Conference on Consumer Electronics (GCCE 2019), 188-189, 15 Oct. 2019, Peer-reviwed
    International conference proceedings, English
  • A Re-Identification Strategy Using Machine Learning that Exploits Better Side Data
    Eina Hashimoto; Masatsugu Ichino; Hiroshi Yoshiura
    10th International Conference on Awareness Science and Technology (iCAST 2019), 221-228, 13 Oct. 2019, Peer-reviwed
    International conference proceedings, English
  • 通信量を削減した浮動小数点演算のためのマルチパーティ計算
    天田拓磨; 西出隆志; 吉浦裕
    情報処理学会論文誌, 60, 9, 1433-1447, 15 Sep. 2019, Peer-reviwed
    Scientific journal, Japanese
  • Linking anonymous SNS accounts and real-world people through profiling
    Eina Hashimoto; Masatsugu Ichino; Hiroshi Yoshiura
    2019 International Workshop on Informatics, 107-114, 10 Sep. 2019
    International conference proceedings, English
  • Maintaining Information in Differential Privacy by Using Insensitive Relationships between Personal Attributes
    Takayasu Yamaguchi; Hiroshi Yoshiura
    International Journal of Informatics Society, 10, 2, 53-61, 19 Nov. 2018, Peer-reviwed
    Scientific journal, English
  • 虹彩および目の周辺の分割画像を用いた個人認証
    白川 功浩; 吉浦 裕; 市野 将嗣
    情報処理学会論文誌, 59, 9, 1726-1738, 15 Sep. 2018, Peer-reviwed
    Scientific journal, Japanese
  • Detection of Malware Infection Using Traffic Models based on the Similarity between Malware Samples
    Masatsugu Ichino, Yuuki Mori, Mitsuhiro Hatada, Hiroshi Yoshiura
    International Workshop on Informatics (IWIN2018), Sep. 2018
  • Personal identification by integrating a number of features from iris and periocular region using AdaBoost
    Masatsugu Ichino; Hiroshi Yoshiura
    Journal of Information Processing, 26, 4, 1882-7764, 15 Jul. 2018, Peer-reviwed
    Scientific journal, English
  • Estimating Nationality from Behavioural Data
    Yoichi Midorikawa; Masatsugu Ichino; Hideki Yoshii; Hiroshi Yoshiura
    2018 International Conference on Business and Information - Winter Session -, 1, 685-686, 25 Jan. 2018, Peer-reviwed
    International conference proceedings, English
  • Utility of Anonymized Location Histories - Experiments Using Large-Scale Real-World Data -
    Fumito Nakazawa; Masatsugu Ichino; Hideki Yoshii; Hiroshi Yoshiura
    2018 International Conference on Business and Information - Winter Session -, 1, 687-688, 24 Jan. 2018, Peer-reviwed
    International conference proceedings, English
  • 機械学習を用いたソーシャルネットワークと履歴書の照合方式の提案
    橋本英奈; 宮崎夏美; 市野将嗣; 久保山哲二; 越前功 吉浦裕
    情報処理学会論文誌, 情報処理学会, 58, 12, 1863-1874, 15 Dec. 2017, Peer-reviwed
    Scientific journal, Japanese
  • 秘密計算を用いた時系列情報の安全な集計方法
    奈良 成泰; 天田 拓磨; 西出 隆志; 土井 洋; 吉浦 裕
    情報処理学会論文誌, 58, 9, 1464-1482, 15 Sep. 2017, Peer-reviwed, 個人や組織の活動にともなって時系列的に発生する情報をサーバで安全に集計することは実世界で大きなニーズがある.この集計において,サーバは受け取る時系列情報の範囲をあらかじめ予想できないため,情報の受取りにともなって集計表の値の加算だけではなく,集計表の拡張を行う必要がある.本論文では,時系列情報の安全な集計問題を新たに定義したうえで,秘密分散によって時系列情報を秘匿しながらマルチパーティ計算によって集計する方式を検討する.まず,秘密分散とマルチパーティ計算によって個々の値を秘匿しても,アクセスパターンを通じて集計表の推定が可能になることを示す.表の全探索によって値の加算と表の拡張を行う方法を提案し,アクセスパターンは秘匿できるが通信量が大きいという問題点を明らかにする.この分析に基づいて,全探索を避けながらアクセスパターンを秘匿するために,再帰的Path ORAMを用いる手法を提案し,通信量のオーダーレベルの削減効果を明らかにする.People often need to use servers to count on time-series information that is generated during activities of people and organizations. In this counting, because a server cannot predict range of information to accept in future, a server needs not only to add values on the counting table but also to extend the table. This paper provides new definition of secure counting on time-series information. Based on this definition, the paper describes methods that hide time-series information by secret sharing and that count on it by multiparty computation. It is shown that tabulated values can be estimated on the bases of observed access patterns even if each value is hidden by secret sharing and multiparty computation. A method that accesses the table exhaustively to update and extend the table is proposed and evaluated to show its confidentiality against access pattern observation while showing its problem of a large communication amount. Based on these analyses, a method that uses recursive Path ORAM to hide access patterns while avoiding exhaustive accesses is proposed and evaluated to show its effects on reducing communication amounts in the order level.
    Scientific journal, Japanese
  • A Strategy for Mitigating Information Loss in Anonymization by Using Nature of Personal Data
    Takayasu Yamaguchi; Hiroshi Yoshiura
    International Workshop on Informatics (IWIN2017), 1, 255-260, 04 Sep. 2017
    International conference proceedings, English
  • Privacy-Preserving Recommender System Based on Mining Large-Scale Data Distributed among Organizations
    Takayasu Yamaguchi; Hiroshi Yoshiura
    International Conference on Business and Information, 188-204, 04 Jul. 2017, Peer-reviwed
    International conference proceedings, English
  • 匿名化規準に関する欧米公的文書7選の考察
    千田浩司; 吉浦裕; 島岡 政基
    コンピュータセキュリティシンポジウム2016論文集, 2016, 2, 158-165, Oct. 2016
    Symposium, Japanese
  • ソーシャルネットワークの発言者を特定するシステムの提案と予備評価
    小川陽平; 市野将嗣; 久保山哲二; 吉浦裕
    日本セキュリティ・マネジメント学会誌, 日本セキュリティ・マネジメント学会, 30, 2, 3-19, 30 Sep. 2016, Peer-reviwed
    Scientific journal, Japanese
  • Breaking Anonymity of Social Network Accounts by Using Coordinated and Extensible Classifiers Based on Machine Learning
    Eina Hashimoto; Masatsugu Ichino; Tetsuji Kuboyama; Isao Echizen; Hiroshi Yoshiura
    IFIP Conference on e-Business, e-Services and e-Society (Springer LNCS 9844), SPRINGER INT PUBLISHING AG, 455-470, Sep. 2016, Peer-reviwed, A method for de-anonymizing social network accounts is presented to clarify the privacy risks of such accounts as well as to deter their misuse such as by posting copyrighted, offensive, or bullying contents. In contrast to previous de-anonymization methods, which link accounts to other accounts, the presented method links accounts to resumes, which directly represent identities. The difficulty in using machine learning for de-anonymization, i.e. preparing positive examples of training data, is overcome by decomposing the learning problem into subproblems for which training data can be harvested from the Internet. Evaluation using 3 learning algorithms, 2 kinds of sentence features, 238 learned classifiers, 2 methods for fusing scores from the classifiers, and 30 volunteers' accounts and resumes demonstrated that the proposed method is effective. Because the training data are harvested from the Internet, the more information that is available on the Internet, the greater the effectiveness of the presented method.
    International conference proceedings, English
  • Score Level Fusion for Network Traffic Application Identification
    Masatsugu Ichino; Hiroaki Maeda; Hiroshi Yoshiura
    IEICE TRANSACTIONS ON COMMUNICATIONS, IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG, E99B, 6, 1341-1352, Jun. 2016, Peer-reviwed, A method based on score level fusion using logistic regression has been developed that uses packet header information to classify Internet applications. Applications are classified not on the basis of the individual flows for each type of application but on the basis of all the flows for each type of application, i.e., the "overall traffic flow." The overall traffic flow is divided into equal time slots, and the applications are classified using statistical information obtained for each time slot. Evaluation using overall traffic flow generated by five types of applications showed that its true and false positive rates are better than those of methods using feature level fusion.
    Scientific journal, English
  • テキスト指定型話者認識のための音声個人認証方式
    市野将嗣; 吉浦裕
    電子情報通信学会論文誌A, J98-A, 12, 632-645, Dec. 2015, Peer-reviwed
    Scientific journal, Japanese
  • Text indicated speaker recognition using separate models of lip movement
    Masatsugu Ichino; Hiroshi Yoshiura
    Security Management, 日本セキュリティ・マネジメント学会, 29, 2, 3-21, 01 Sep. 2015, Peer-reviwed
    Scientific journal, English
  • Evaluating header information features for malware infection detection
    Masatsugu Ichino; Kenji Kawamoto; Toru Iwano; Mitsuhiro Hatada; HiroshiYoshiura
    Journal of Information Processing, 23, 5, 603-612, Sep. 2015, Peer-reviwed
    Scientific journal, English
  • LPCケプストラム分析を利用したマルウェアの感染検知
    岩野 透; 吉浦 裕; 畑田充弘; 市野将嗣
    情報処理学会論文誌, 56, 9, 1716-1729, Sep. 2015, Peer-reviwed
    Scientific journal, Japanese
  • Speaker Verification Method for Operation System of Consumer Electronic Devices
    Masatsugu Ichino; Yasushi Yamazaki; Hiroshi Yoshiura
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 61, 1, 96-102, Feb. 2015, Peer-reviwed, A system is proposed that can remotely operate consumer electronic devices by voice. It uses the mobile phone as a controller. And it uses the CELP(code excited linear prediction) parameters that are used for speech coding in mobile phones. A speaker verification function protects private information and separates the user's voice from that of people nearby who are also speaking. A CELP-based speaker verification method is used to match the audio stream by comparing the trajectories of continuous phonemes. Experimental evaluation of the speaker verification method demonstrated the effectiveness of the proposed verification method.(1).
    Scientific journal, English
  • Transportation Means Identification of Content Delivery System for Consumer Electronic Device
    Masatsugu Ichino; Hiroshi Yoshiura; Jiro Katto
    13th International Conference on Consumer Electronics(ICCE2015),, 129-130, Jan. 2015, Peer-reviwed
    International conference proceedings, English
  • Fusion of Iris and Periocular User Authentication by AdaBoost for Mobile Device
    Shintaro Oishi; Masatsugu Ichino; Hiroshi Yoshiura
    International Conference on Consumer Electronics(ICCE2015),, 453-454, Jan. 2015, Peer-reviwed
    International conference proceedings, English
  • A SYSTEM FOR ANONYMIZING TEMPORAL PHRASES OF MESSAGE POSTED IN ONLINE SOCIAL NETWORKS AND FOR DETECTING DISCLOSURE
    Hoang-Quoc Nguyen-Son; Minh-Triet Tran; Hiroshi Yoshiura; Sonehara Noboru; Isao Echizen
    2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), IEEE, 455-460, 2015, Peer-reviwed, Time-related information in message posted on-line is one type of sensitive information targeted by attackers, one reason that sharing information online can be risky. Therefore, time information should be anonymized before it is posted in online social networks (OSNs). One approach to reducing the risk is to anonymize the personal information by removing temporal phrases, but this makes the anonymous message loses too much information. We have proposed a system for creating anonymous fingerprints about temporal phrases to cover most of potential cases of OSN disclosure. The fingerprints not only anonymize time-related information but also can be used to identify a person who has disclosed information about the user. In experiment with 16,647 different temporal phrases extracted from about 16 million tweets, the average number of fingerprints created for an OSN message is 526.05 fingerprints. This is significantly better than the 409.58 fingerprints of the state-of-the-art previous detection temporal phrases algorithm. Fingerprints are quantified using a modified normalized certainty penalty metric to ensure that an appropriate level of information anonymity is used for each user's friend. The algorithm works well not only for temporal phrases in message posted on social networks but also for other types of phrases (such as location and objective ones) or other areas (religion, politics, military, etc.).
    International conference proceedings, English
  • Effects of External Information on Anonymity and Role of Transparency with Example of Social Network De-anonymisation
    Haruno Kataoka; Yohei Ogawa; Isao Echizen; Tetsuji Kuboyama; Hiroshi Yoshiura
    2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), IEEE, 461-467, 2015, Peer-reviwed, Personal data to be used for sophisticated data-centric services is typically anonymized to ensure the privacy of the underlying individuals. However, the degree of protection against de-anonymization is uncertain because deanonymization has not been explicitly modelled for scientific analysis and because the information that attackers might use is not well defined given that they can use a wide variety of external information sources such as publically accessible information on the web. We have developed a system that deanonymizes anonymous posts on social networks with a considerably high precision rate. We analysed this system and its behaviour and, on the basis of our findings, we clarified a de-anonymization model and used it to clarify the effects of external information on anonymity. We also identified the limitation of anonymization under conditions of external information being available and clarified the role of transparency can play in controlling the use of personal data.
    International conference proceedings, English
  • Controlling Tradeoff between Security and Usability in Anonymizing Face Images
    村木友哉; 内田貴之; 市野将嗣; 越前功; 吉浦裕
    日本セキュリティ・マネジメント学会誌, 日本セキュリティ・マネジメント学会, 28, 3, 3-16, Jan. 2015, Peer-reviwed
    Scientific journal, Japanese
  • Anonymizing Personal Text Messages Posted in Online Social Networks and Detecting Disclosures of Personal Information
    Hoang-Quoc Nguyen-Son; Minh-Triet Tran; Hiroshi Yoshiura; Noboru Sonehara; Isao Echizen
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG, E98D, 1, 78-88, Jan. 2015, Peer-reviwed, While online social networking is a popular way for people to share information, it carries the risk of unintentionally disclosing personal information. One way to reduce this risk is to anonymize personal information in messages before they are posted. Furthermore, if personal information is somehow disclosed, the person who disclosed it should be identifiable. Several methods developed for anonymizing personal information in natural language text simply remove sensitive phrases, making the anonymized text message unnatural. Other methods change the message by using synonymization or structural alteration to create fingerprints for detecting disclosure, but they do not support the creation of a sufficient number of fingerprints for friends of an online social network user. We have developed a system for anonymizing personal information in text messages that generalizes sensitive phrases. It also creates a sufficient number of fingerprints of a message by using synonyms so that, if personal information is revealed online, the person who revealed it can be identified. A distribution metric is used to ensure that the degree of anonymization is appropriate for each group of friends. A threshold is used to improve the naturalness of the fingerprinted messages so that they do not catch the attention of attackers. Evaluation using about 55,000 personal tweets in English demonstrated that our system creates sufficiently natural fingerprinted messages for friends and groups of friends. The practicality of the system was demonstrated by creating a web application for controlling messages posted on Facebook.
    Scientific journal, English
  • Transportation Means Identification of Content Delivery System for Consumer Electronic Devices
    Masatsugu Ichino; Hiroshi Yoshiura; Jiro Katto
    2015 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), IEEE, 118-119, 2015, Peer-reviwed, A system is proposed that uses content-centric networking to deliver content to mobile users. It uses sensor data obtained from the device they are using to identify their means of transport. The content is then delivered in a manner that best matches that means. The means of transport is identified using a combination of features: average magnetic quantity, average value and standard deviation of acceleration, vehicle speed, and maximum power spectrum of acceleration.
    International conference proceedings, English
  • Fusion of Iris and Periocular User Authentication by AdaBoost for Mobile Devices
    Shintaro Oishi; Masatsugu Ichino; Hiroshi Yoshiura
    2015 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), IEEE, 428-429, 2015, Peer-reviwed, Today's mobile devices are likely to store various kinds of personal information, making it important to authenticate mobile device users. Since various types of mobile devices now have cameras, there has been growing interest in authentication based on images of the areas surrounding the eye due to the case of combing with iris and periocular from an image. We propose a method for authenticating mobile device users that uses AdaBoost to derive a fusion score from iris and periocular authentication scores. The use of AdaBoost provides better performance than the use of the weighted sum of the two authentication scores.
    International conference proceedings, English
  • A Rule-Based Approach for Detecting Location Leaks of Short Text Messages
    Hoang-Quoc Nguyen-Son; Minh-Triet Tran; Hiroshi Yoshiura; Noboru Sonehara; Isao Echizen
    BUSINESS INFORMATION SYSTEMS WORKSHOPS, BIS 2015, SPRINGER-VERLAG BERLIN, 228, 199-210, 2015, Peer-reviwed, As of today, millions of people share messages via online social networks, some of which probably contain sensitive information. An adversary can collect these freely available messages and specifically analyze them for privacy leaks, such as the users' location. Unlike other approaches that try to detect these leaks using complete message streams, we put forward a rule-based approach that works on single and very short messages to detect location leaks. We evaluated our approach based on 2817 tweets from the Tweets2011 data set. It scores significantly better (accuracy = 84.95 %) on detecting whenever a message reveals the user's location than a baseline using machine learning and three extensions using heuristic. Advantages of our approach are not only to apply for online social network messages but also to extend for other areas (such as email, military, health) and for other languages.
    International conference proceedings, English
  • De-anonymising Social Network Posts by Linking with Resume
    Yohei Ogawa; Eina Hashimoto; Masatsugu Ichino; Isao Echizen; Hiroshi Yoshiura
    BUSINESS INFORMATION SYSTEMS WORKSHOPS, BIS 2015, SPRINGER-VERLAG BERLIN, 228, 248-260, 2015, Peer-reviwed, We have developed a system for identifying the person who posted posts of interest. It calculates the similarity between the posts of interest and the resume of each candidate person and then identifies the resume with the highest similarity as that of the posting person. Identification accuracy was improved by using the posts of persons other than the target person. Evaluation using 30 student volunteers who permitted the use of their resumes and sets of tweets showed that using information from tweets of other persons dramatically improved identification accuracy. Identification accuracy was 0.36 and 0.53 when the number of other persons was 4 and 9, respectively. Those that the target person can be limited in 10 % of the candidates were 0.72 both with 4 and 9 such employees.
    International conference proceedings, English
  • 部分的に小さな法を用いたマルチパーティ計算のビット演算効率化
    加藤遼; 西出隆志; 吉浦裕
    情報処理学会論文誌, 情報処理学会, 55, 9, 1971-1991, 15 Sep. 2014, Peer-reviwed, マルチパーティ計算(MPC)の1つの問題点は参加者間で膨大な通信を必要とする点である.MPCの通信量は,シェアのビット数,つまり秘密分散の法pのビット数に比例することから,小さな法を用いることで通信量を低減する手法を提案する.大小比較や等号判定など多くのプロトコルがビットの状態の演算(ビット演算)を多用している点に着目し,これらのビット演算の共通パターンを見い出す.そして,プロトコルの入出力データの法pおよびそのビット数lpに対して,このビット演算パターンをp' > max(T',「√lp〓 + 1,n)となるような法p'で実行し,元のプロトコルの機能と安全を維持しながら,通信量を削減する.ただし,T'はビット演算における秘密値の上限であり,nはMPCにおける参加者数である.この手法により,(2,3)閾値法で法pが64ビットの場合,大小比較,等号判定,区間判定の通信量を各々80パーセント,70パーセント,80パーセント程度削減できる.The problem with secure multi-party computation (MPC) is that the parties have to transfer a large amount of data to each other. The amount of data transferred is proportional to the number of bits of shares, i.e., the number of bits of the prime p that is used in secret sharing. A scheme is presented here that reduces the amount of data transferred by partially using a small prime. Common patterns of bit calculations are found in many MPC protocols such as comparison and equality testing. Bit-wise calculation of any of these patterns can maintain the correctness and security of the original protocol by using a prime p' that satisfies p' > max(T',「√lp〓 + 1,n), where lp is the number of bits of the prime p used for the original protocol, T' is the upper bound of secret values in the bit-wise calculation, and n is the number of parties. For Shamir's (2,3) secret sharing with a prime of 64bits, the amount of data transferred in comparison, equality-testing, and interval-testing protocols can be reduced by 80, 70, and 80% respectively.
    Scientific journal, Japanese
  • A System for Anonymizing Temporal Phrases of Message Posted in Online Social Networks and for Detecting Disclosure
    Hoang-Quoc Nguyen-Son; Minh-Triet Tran; Hiroshi Yoshiura; Noboru Sonehara; Isao Echizen
    Proc. The Fourth International Workshop on Resilience and IT-Risk in Social Infrastructures (RISI 2014 ), 1, 459-465, 08 Sep. 2014, Peer-reviwed
    International conference proceedings, English
  • ソーシャルネット ワークから注目者の発言を特定するシステムの提案と予備評価
    片岡春乃; 奥野智孝; 木村聡一; 内海彰; 吉浦裕
    日本セキュリティ・マネジメント学会誌, 日本セキュリティ・マネジメント学会, 27, 3, 13-28, Jan. 2014, Peer-reviwed
    Scientific journal, Japanese
  • Evaluating payload features for malware infection detection
    Yusuke Otsuki; Masatsugu Ichino; Soichi Kimura; Mitsuhiro Hatada; Hiroshi Yoshiura
    Journal of Information Processing, Information Processing Society of Japan, 22, 2, 376-387, 2014, Peer-reviwed, Analysis of malware-infected traffic data revealed the payload features that are the most effective for detecting infection. The traffic data was attack traffic using the D3M2012 dataset and CCC DATAsets 2009, 2010, and 2011. Traffic flowing on an intranet at two different sites was used as normal traffic data. Since the type of malware (worm, Internet connection confirmation, etc.) affects the type of traffic generated, the malware was divided into three types-worm, Trojan horse, and file-infected virus-and the most effective features were identified for each type. © 2014 Information Processing Society of Japan.
    Scientific journal, English
  • Altitude Estimation Using Mobile Terminal's Pressure Sensor and External Weather Information
    Wataru Namiki; Masatsugu Ichino; Hiroshi Yoshiura
    18TH IEEE INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS (ISCE 2014), IEEE, 1, 116-118, 2014, Peer-reviwed, We investigated ways to apply the ICAO standard atmosphere to altitude estimation using the atmospheric pressure sensor in mobile terminal. Two error factors in particular were found to affect estimation accuracy. We tested an estimation method that corrects for the current sea-level pressure and current sea-level temperature by using external weather information. We were able to estimate altitude with an average error of 1-2 m by using highly reliable and accurate atmospheric pressure measured at a distance at long intervals and less reliable atmospheric pressure measured nearby at short intervals.
    International conference proceedings, English
  • Anonymizing Temporal Phrases in Natural Language Text to Be Posted on Social Networking Services
    Hoang-Quoc; Nguyen-Son; Anh-Tu Hoang; Minh-Trie; Tran; Hiroshi Yoshiura; Noboru; Sonehara; Isao Echizen
    12th International Workshop on Digital-forensics and Watermarking (IWDW, Springer LNCS 8389), SPRINGER-VERLAG BERLIN, 437-451, Nov. 2013, Peer-reviwed, Time-related information in text posted on-line is one type of personal information targeted by attackers, one reason that sharing information online can be risky. Therefore, time information should be anonymized before it is posted on social networking services. One approach to anonymizing information is to replace sensitive phrases with anonymous phrases, but attackers can usually spot such anonymization due to its unnaturalness. Another approach is to detect temporal passages in the text, but removal of these passages can make the meaning of the text unnatural. We have developed an algorithm that can be used to anonymize time-related personal information by removing the temporal passages when doing so will not change the natural meaning of the message. The temporal phrases are detected by using machine-learned patterns, which are represented by a subtree of the sentence parsing tree. The temporal phrases in the parsing tree are distinguished from other parts of the tree by using temporal taggers integrated into the algorithm. In an experiment with 4008 sentences posted on a social network, 84.53% of them were anonymized without changing their intended meaning. This is significantly better than the 72.88% rate of the best previous temporal phrase detection algorithm. Of the learned patterns, the top ten most common ones were used to detect 87.78% the temporal phrases. This means that only some of the most common patterns can be used to the anonymize temporal phrases in most messages to be posted on an SNS. The algorithm works well not only for temporal phrases in text posted on social networks but also for other types of phrases (such as location and objective ones), other areas (religion, politics, military, etc.), and other languages.
    International conference proceedings, English
  • Securing a B+tree for Use with Secret-Shared Databases
    Yutaka Nishiwaki; Ryo Kato; Hiroshi Yoshiura
    8th International Workshop on Databases in Networked Information Systems (DNIS, Springer LNCS 7813), 246-261, 2013, Peer-reviwed, Information revelations from databases may result not only from intrusions by external attackers but also from malicious actions by employees and even database administrators. A promising new approach to solving this problem is the use of secret-shared databases. In this approach, information is divided into unreadable snippets, and the snippets are stored in separate subdatabases, thereby making it difficult for external and internal attackers to steal the original information. A secret-shared database is secure unless k or more database administrators collude, where k is a predefined threshold. Any query that is executable for a conventional database is executable for the corresponding secret-shared database. However, retrieval (i.e., selection) of a record from a secret-shared database has a time complexity of O(m), where m is the number of records stored in the database. We used a B+tree, which is a standard data structure for efficiently retrieving data from conventional databases, to develop a secret-shared B+tree that enables data retrieval from secret-shared databases with O(logm) time complexity while maintaining the security provided by secret sharing. © 2013 Springer-Verlag Berlin Heidelberg.
    International conference proceedings, English
  • Ineluctable background checking on social networks: Linking job seeker's résumé and posts
    Tomotaka Okuno; Akira Utsumi; Masatsugu Ichino; Hiroshi Yoshiura; Isao Echizen
    2013 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2013, 273-278, 2013, Peer-reviwed, A growing source of concern is that the privacy of individuals can be violated by linking information from multiple sources. For example, the linking of a person's anonymized information with other information about that person can lead to de-anonymization of the person. To investigate the social risks of such linking, we investigated the use of social networks for background checking, which is the process of evaluating the qualifications of job seekers, and evaluated the risk posed by the linking of information the employer already has with information on social networks. After clarifying the risk, we developed a system that links information from different sources: information extracted from a job seeker's résumé and anonymous posts on social networks. The system automatically calculates the similarity between information in the résumé and in the posts, and identifies the job seeker's social network accounts even though the profiles may have been anonymized. As a part of our system, we developed a novel method for quantifying the implications of terms in a résumé by using the posts on social networks. In an evaluation using the résumés of two job seekers and the tweets of 100 users, the system identified the accounts of both job seekers with reasonably good accuracy (true positive rate of 0.941 and true negative rate of 0.999). These findings reveal the real social threat of linking information from different sources. Our research should thus form the basis for further study of the relationship between privacy in social networks and the freedom to express opinions. © 2013 IEEE.
    International conference proceedings, English
  • Anonymizing face images by using similarity-based metric
    Tomoya Muraki; Shintaro Oishi; Masatsugu Ichino; Isao Echizen; Hiroshi Yoshiura
    Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013, 517-524, 2013, Peer-reviwed, Vast numbers of face images are posted and circulated daily on social network and photo-sharing sites. Some face images are linked to the person's name, like those on user profile pages, while others are anonymized due to privacy concerns. If an anonymized face image is linked to a named one, that person's privacy is infringed. One way to overcome this privacy problem is to anonymize face images when they are posted on social networks. However, current face anonymization methods fail to meet two key requirements: being provably secure against de-anonymization and enabling users to control the trade-off between security and usability (similarity to the original face) of the anonymized face images. We are developing a similarity-based method for face anonymization that meets both requirements in those cases where a new face image of a person is to be posted when many face images including those of that person are already posted. The basic idea is to hide the new face image in s face images that are equally similar to the face image of the same person. We theoretically demonstrated that the probability of an attacker correctly linking the anonymized face image to an image of the same person is less than 1/s. We also showed theoretically and confirmed experimentally, with 150 sample face images, that the larger the s, the less usable the anonymized face image. The security of our method holds in spite of future improvements in face recognition tools. © 2013 IEEE.
    International conference proceedings, English
  • Detection of malware infection using score level fusion with Kernel Fisher Discriminant Analysis
    Masatsugu Ichino; Yusuke Ohtsuki; Mitsuhiro Hatada; Hiroshi Yoshiura
    2013 IEEE 2nd Global Conference on Consumer Electronics, GCCE 2013, 536-537, 2013, Peer-reviwed, The malware attack is increasing in both breadth and depth, and damage from botnets, whose activities are unabated, and infections from the Web have recently increased. We therefore studied the malware infection detection method by comparing malware traffic with normal traffic. We propose the malware infection detection using score level feature fusion with Kernel Fisher Discriminant Analysis. © 2013 IEEE.
    International conference proceedings, English
  • PC-based real-time video watermark embedding system independent of platform for parallel computing
    Takaaki Yamada; Isao Echizen; Hiroshi Yoshiura
    LNCS Transactions on Data Hiding and Multimedia (LNCS7110), 7110, 15-33, Nov. 2012, Peer-reviwed, An improved system is described for embedding watermarks into video frames in real time using software running on an ordinary personal computer and that is independent of the parallel-computing platform. It uses standard video I/O and is separate from the encoding process, so it can be incorporated into various types of encoding and distribution systems, which makes it well suited for distributing live content. Real-time processing is achieved by making the watermark-pattern generation process common to every frame a pre-process and by reusing the watermark pattern output from this pre-process. It is also achieved by storing the watermarked video frames into video memory on the video I/O board, thereby eliminating the need for storing them in buffers on hard disk. Testing of a prototype system for standard-definition video demonstrated the validity of this approach. Copyrighty © 2012 Springer-Verlag Berlin Heidelberg.
    Scientific journal, English
  • Automatic Anonymous Fingerprinting of Text Posted on Social Networking Services
    Hoang-Quoc Nguyen-Son; Minh-Triet Tran; DungTran; Hiroshi Yoshiura; Isao Echizen
    11th International Workshop on Digital-forensics and Watermarking (IWDW, Springer LNCS 7809), 7809, 410-424, Nov. 2012, Peer-reviwed, Social networking services (SNSs) support communication among people via the Internet. However, sensitive information about a user can be disclosed by the user's SNS friends. This makes it unsafe for a user to share information with friends in different groups. Moreover, a friend who has disclosed a user's information is difficult to identify. One approach to overcoming this problem is to anonymize the sensitive information in text to be posted by generalization, but most methods proposed for this approach are for information in a database. Another approach is to create different fingerprints for certain sensitive information by using various synonyms. However, the methods proposed for doing this do not anonymize the information. We have developed an algorithm for automatically creating enough anonymous fingerprints to cover most cases of SNSs containing sensitive phrases. The fingerprints are created using both generalization and synonymization. A different fingerprinted version of sensitive information is created for each friend that will receive the posted text. The fingerprints not only anonymize a user's sensitive information but also can be used to identify a person who has disclosed sensitive information about the user. Fingerprints are quantified using a modified discernability metric to ensure that an appropriate level of privacy is used for each group to receive the posted text. The use of synonyms ensures that an appropriate level of privacy is used for each group to receive the posted text. Moreover, a fingerprint cannot be converted by an attacker into one that causes the algorithm to incorrectly identify a person who has revealed sensitive information. The algorithm was demonstrated by using it in an application for controlling the disclosure of information on Facebook. © 2013 Springer-Verlag.
    International conference proceedings, English
  • Batch Logical Protocols for Efficient Multi-Party Computation
    Naoto Kiribuchi; Ryo Kato; Tsukasa Endo; Takashi Nishide; Hiroshi Yoshiura
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG, E95A, 10, 1718-1728, Oct. 2012, Peer-reviwed, It is becoming more and more important to make use of personal or classified information while keeping it confidential. A promising tool for meeting this challenge is secure multi-party computation (MPC). It enables multiple parties, each given a snippet of a secret s, to compute a function f(s) by communicating with each other without revealing s. However, one of the biggest problems with MPC is that it requires a vast amount of communication. Much research has gone into making each protocol (equality testing, interval testing, etc.) more efficient. In this work, we make a set of multiple protocols more efficient by transforming them into their equivalent batch processing form and propose two protocols: "Batch Logical OR" and "Batch Logical AND." Using proposed protocols recursively, we also propose "Batch Logical OR-AND" and "Batch Logical AND-OR," and show arbitrary formula consisting of Boolean protocols, OR gates, and AND gates can be batched. Existing logical OR and logical AND protocols consisting of t equality testing invocations have a communication complexity of O(lt), where l is the bit length of the secrets. Our batched versions of these protocols reduce it to O(l+t). For t interval testing invocations, they reduce both communication and round complexity. Thus they can make the queries on a secret shared database more efficient. For example, the use of the proposed protocols reduces the communication complexity for a query consisting of equality testing and interval testing by approximately 70% compared to the use of the corresponding existing protocols. The concept of the proposed protocols is versatile and can be applied to logical formulae consisting of protocols other than equality testing and interval testing, thereby making them more efficient as well.
    Scientific journal, English
  • Identifying Anonymous Posts of Job Seekers
    Tomotaka Okuno; Hiroshi Yoshiura
    21st USENIX Security Symposium (USENIX Security '12), poster session, Web掲載, Aug. 2012, Peer-reviwed
    International conference proceedings, English
  • Virtualizing Secret-Shared Database System
    Yutaka Nishiwaki; Hiroshi Yoshiura
    21st USENIX Security Symposium (USENIX Security '12), poster session, Web掲載, Aug. 2012, Peer-reviwed
    International conference proceedings, English
  • Automatic Anonymization of Natural Languages Texts Posted on Social Networking Services and Automatic Detection of Disclosure
    Hoang-Quoc Nguyen-Son; Quoc-Binh Nguyen; Minh-Triet Tran; Dinh-Thuc Nguyen; Hiroshi Yoshiura; Isao Echizen
    2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), IEEE COMPUTER SOC, 358-364, Aug. 2012, Peer-reviwed, One approach to overcoming the problem of too much information about a user being disclosed on social networking services (by the user or by the user's friends) through natural language texts (blogs, comments, status updates, etc.) is to anonymize the texts. However, determining which information is sensitive and should thus be anonymized is a challenging problem. Sensitive information is any information about a user that could be used to identify the user. We have developed an algorithm that anonymizes sensitive information in text to be posted by generalization. Synonyms for the anonymized information are used as fingerprints for detecting a discloser of the information. The fingerprints are quantified using the modified discernability metric to enable an appropriate level of anonymity to be used for each group of the user's friends. The fingerprints cannot be converted into another one to incorrectly identify a person who has revealed sensitive information. Use of the algorithm to control the disclosure of information on Facebook demonstrated that it works well not only in social networking but also in other areas (health, religion, politics, military, etc.) that store sensitive information.
    International conference proceedings, English
  • Evaluation of Secular Changes in Statistical Features of Traffic for the Purpose of Malware Detection
    Kenji Kawamoto; Masatsugu Ichino; Mitsuhiro Hatada; Yusuke Otsuki; Hiroshi Yoshiura; Jiro Katto
    1st International Workshop on Data Mining for Info-Communication Service and its Diffusion (DMICSiD2012), Springer Verlag, 443, 1-11, Aug. 2012, Peer-reviwed, Applications and malware affecting them are dramatically changing. It isn't certain whether the currently used features can classify normal traffic or malware traffic correctly. In this paper, we evaluated the features used in previous studies while taking into account secular changes to classify normal traffic into the normal category and anomalous traffic into the anomalous category correctly. A secular change in this study is a difference in a feature between the date the training data were caputred and the date the test data were captured in the same circumstance. The evaluation is based on the Euclidean distance between the normal codebook or anomalous codebook made by vector quantization and the test data. We report on what causes these secular changes and which features with little or no secular change are effective for malware detection. © 2013 Springer-Verlag Berlin Heidelberg.
    International conference proceedings, English
  • Batching multiple protocols to improve efficiency of multi-party computation
    Naoto Kiribuchi; Ryo Kato; Takashi Nishide; Hiroshi Yoshiura
    7th International Conference on InformationSecurit y and Cryptology (Inscrypt, Springer LNCS 7537), 289-308, 2012, Peer-reviwed, It is becoming more and more important to make use of personal or classified information while keeping it confidential. A promising tool for meeting this challenge is secure multi-party computation (MPC). It enables multiple parties, each given a snippet of a secret s, to compute a function f(s) by communicating with each other without revealing s. However, one of the biggest problems with MPC is that it requires a vast amount of communication. Much research has gone into making each protocol (equality testing, interval testing, etc.) more efficient. In this work, we make a set of multiple protocols more efficient by transforming these protocols to be batched and propose four protocols: ''Batch Logical OR, ''Batch Logical AND, ''Batch Logical OR-AND, and ''Batch Logical AND-OR. Existing logical OR and logical AND protocols consisting of t equality testing invocations have a communication complexity of O(?t), where is the bit length of the secret. Our batched versions of these protocols reduce it to O(∈+∈t). For t interval testing invocations, they reduce both communication complexity and round complexity. Thus they can make the queries on a secret shared database more efficient. For example, the use of the proposed protocols reduces the communication complexity for a query consisting of equality testing and interval testing by approximately 70% compared to the use of the corresponding existing protocols. The concept of the proposed protocols is versatile and can be applied to logical formulas consisting of protocols other than equality testing and interval testing, thereby making them more efficient as well. © 2012 Springer-Verlag Berlin Heidelberg.
    International conference proceedings, English
  • New approach to anonymity of user information on social networking services
    Hoang-Quoc Nguyen-Son; Quoc-Binh Nguyen; Minh-Triet Tran; Dinh-Thuc Nguyen; Hiroshi Yoshiura; Isao Echizen
    Lecture Notes in Electrical Engineering, 164, 1, 731-739, 2012, Peer-reviwed, Users often share same text information for friends in different level groups on social networking services (SNSs). Moreover, it does not identify a person who has revealed the text. Some approaches overcome this problem by using anonymity text, but most methods for doing this has focused on databases. However, information about a user in SNSs is generally conveyed in sensitive phrases. Therefore, we developed the algorithm for automatically generalizing sensitive phrases. The generalized phrases are quantified by a precision metric to ensure that an appropriate level of privacy is used for each group. The algorithm then automatically creates synonyms for the generalized phrases for use in detecting disclosure. An application using the algorithm was implemented for controlling the posting of information on Facebook. © Springer Science+Business Media Dortdrecht 2012.
    International conference proceedings, English
  • A Private Information Detector for Controlling Circulation of Private Information through Social Networks
    Midori Hirose; Akira Utsumi; Isao Echizen; Hiroshi Yoshiura
    2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), IEEE COMPUTER SOC, 473-478, 2012, Peer-reviwed, A "private information detector (PID)" is described that helps control the circulation of a user's private information through a social network. It checks texts to be posted by the user on a social network and detects potential revelations of private information so that it warns the user or modifies the texts automatically. It can cope with a wide variety of expressions that might be revealing by using public information accessible through the Internet rather than a large knowledge base. Evaluation using about 7000 blog sentences showed that it has reasonably good performance in terms of true and false detection rates.
    International conference proceedings, English
  • Reducing communication complexity of random number bitwise-sharing for efficient multi-party computation
    Naoto Kiribuchi; Ryo Kato; Takashi Nishide; Tsukasa Endo; Hiroshi Yoshiura
    Journal of Information Processing, 20, 4, 861-870, 2012, Peer-reviwed, It is becoming more and more important to make use of personal or classified information while keeping it confidential. A promising tool for meeting this challenge is secure multi-party computation (MPC). However, one of the biggest problems with MPC is that it requires a vast amount of communication. We analyzed existing MPC protocols and found that the random number bitwise-sharing protocol used by many of them is notably inefficient. By devising a representation of the truth values and using special form prime numbers, we propose efficient random number bitwise-sharing protocols, dubbed "Extended-Range I and II," which reduce the communication complexity to approximately 1/6th that of the best of the existing such protocol. We reduced the communication complexity to approximately 1/26th by reducing the abort probability, thereby making previously necessary backup computation unnecessary. Using our improved protocol, "Lightweight Extended-Range II," we reduced the communication complexities of equality testing, comparison, interval testing, and bit-decomposition, all of which use the random number bitwise-sharing protocol, by approximately 91, 79, 67, and 23% (for 32-bit data), respectively. We also reduce the communication complexity of private exponentiation by about 70% (for 32-bit data and five parties). © 2012 Information Processing Society of Japan.
    Scientific journal, English
  • ITリスク対策に関する社会的合意形成支援システムSocial-MRCの開発構想
    佐々木良一; 杉本尚子; 矢島敬士; 増田英孝; 吉浦裕; 鮫島正樹; 船橋誠寿
    情報処理学会論文誌, 52, 9, 2562-2574, Sep. 2011, Peer-reviwed
    Scientific journal, Japanese
  • Large-scale evaluation and improvement of content-based phishing detection
    加藤慧; 小宮山功一朗; 瀬古敏智; 一瀬友祐; 河野耕平; 中山心太; 吉浦裕
    Security management, 日本セキュリティ・マネジメント学会, 25, 2, 42-56, Sep. 2011, Peer-reviwed
    Scientific journal, Japanese
  • Accelerating Multiparty Computation by Efficient Random Number Bitwise-Sharing Protocols
    Naoto Kiribuchi; Takashi Nishide; Tsukasa Endo; Hiroshi Yoshiura
    12th International Workshop on Information Security Applications (WISA, Springer LNCS 7115), 7115, 187-200, Aug. 2011, Peer-reviwed, It is becoming more and more important to make use of personal or classified information while keeping it confidential. A promising tool for meeting this challenge is multiparty computation (MPC), which enables multiple parties, each given a snippet of a secret s, to compute a function f(s) by communicating with each other without revealing s. However, one of the biggest problems with MPC is that it requires a vast amount of communication and thus a vast amount of processing time. We analyzed existing MPC protocols and found that the random number bitwise-sharing protocol used by many of them is notably inefficient. We proposed efficient random number bitwise-sharing protocols, dubbed ''Extended-Range I and II," by devising a representation of the truth values that reduces the communication complexity to approximately 1/6th that of the best of the existing such protocol. We reduced the communication complexity to approximately 1/26th by reducing the abort probability, thereby making previously necessary backup computation unnecessary. Using our improved protocols, ''Lightweight Extended-Range II," we reduced the communication complexities of equality testing, comparison, interval testing, and bit-decomposition, all of which use the random number bitwise-sharing protocol, by approximately 91, 79, 67, and 23% (for 32-bit data) respectively. Our protocols are fundamental to sharing random number r ∈ ℤ p in binary form and can be applicable to other higher level protocols © 2012 Springer-Verlag Berlin Heidelberg.
    International conference proceedings, English
  • Proposal for a social-MRC: Social consensus formation support system concerning it risk countermeasures
    Ryoichi Sasaki; Shoko Sugimoto; Hiroshi Yajima; Hidetaka Masuda; Hiroshi Yoshiura; Masaki Samejima
    International Journal of Information Processing and Management, 2, 2, 48-58, 2011, Peer-reviwed, The problem of multiple risks is that a measure to reduce one risk can increase other risks. To address this problem, a system to support social consensus formation is needed to mitigate the IT risks such as those involved in information filtering to protect children. In cases in which the number of people necessary for consensus formation is low, such as forming a consensus within an organization, the Multiple Risk Communicator (MRC) developed by the authors offers a possible solution to this problem. However, the MRC cannot be applied to problems in which the number of stakeholders exceeds several thousand, and thus an innovative solution was considered necessary. Accordingly, the authors modified and expanded the MRC and developed the concept "Social-MRC" to comprehensively support risk communication on two levels: communication among opinion leaders and communication allowing the participation of ordinary stakeholders. By introducing this two-level approach, we are able to achieve consensus formation even in cases in which there are several thousand or more stakeholders.
    Scientific journal, English
  • SNS上のテキストからプライバシー情報を検知するシステムの構想と予備評価
    渡辺夏樹; 片岡春乃; 内海彰; 吉浦裕
    日本セキュリティマネジメント学会誌, 日本セキュリティ・マネジメント学会, 24, 3, 15-30, Jan. 2011, Peer-reviwed
    Scientific journal, Japanese
  • Content-based de-anonymisation of tweets
    Tomotaka Okuno; Masatsugu Ichino; Tetsuji Kuboyama; Hiroshi Yoshiura
    Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011, 53-56, 2011, Peer-reviwed, Various types of personal information are accessible through the Web, and they can be accessed in number of ways. Linking of the personal information obtained with other personal information can lead to a serious violation of privacy. To address this problem, we developed a method that matches the information individuals place in a profile to the information they post on social media sites. It uses an algorithm we developed for quantifying the correlation between a word and a document even if the word itself does not appear in document. © 2011 IEEE.
    International conference proceedings, English
  • Measuring Accumulated Revelations of Private Information by Multiple Media
    Komei Kamiyama; Tran; Hong Ngoc; Isao Echizen; Hiroshi; Yoshiura
    10th IFIP Conference on e-Business, e-Services, and e-Society (I3E2010)), SPRINGER-VERLAG BERLIN, 341, 70-80, Nov. 2010, Peer-reviwed, A metric has been developed for measuring privacy degradation when various types of media reveal private information about a person. The metric, which is based on joint entropy, quantifies accumulated revelations of information about various personal attributes. Application of this metric to entries posted on a social networking service and to leaks from a company database containing personal information showed that it is effective; that is, it can quantify accumulated revelations of information about multiple attributes and can cope with cases in which the attributes affect each other.
    International conference proceedings, English
  • 秘密分散データベースの構造演算を可能にするマルチパーティプロトコルを用いた関係代数演算
    志村正則; 宮﨑邦彦; 西出隆; 吉浦裕
    情報処理学会論文誌, 情報処理学会, 51, 9, 1563-1578, Sep. 2010, Peer-reviwed
    Scientific journal, Japanese
  • 取り調べの可視化における技術課題の明確化とシステムの提案
    高間弘樹; 吉浦裕; 越前功; 佐々木良一
    日本セキュリティ・マネジメント学会誌, 日本セキュリティ・マネジメント学会, 24, 2, 3-12, Sep. 2010, Peer-reviwed
    Scientific journal, Japanese
  • PICTURE WATERMARKS SURVIVING GENERAL AFFINE TRANSFORMATION AND RANDOM DISTORTION
    Yusuke Atomori; Isao Echizen; Hiroshi Yoshiura
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, ICIC INT, 6, 3B, 1289-1304, Mar. 2010, Peer-reviwed, Surviving geometric transformation is essential for picture watermarks because geometric transformation is common during legitimate content distribution and is easily done by illegal copiers However, no previous method of watermarking works against both of affine transformation and random distortion, which are common and easy to perform No method works against combinations of these transformations This paper describes a method that creates picture watermarks that can survive general affine transformation, random distortion and their combinations as well as a clipping attack The effectiveness of the proposed method was demonstrated by experimental evaluation
    Scientific journal, English
  • DCNL: Disclosure Control of Natural Language Information to Enable Secure and Enjoyable E-Communications
    Haruno Kataoka; Natsuki Watanabe; Keiko Mizutani; Hiroshi Yoshiura
    International Journal of u- and e- Service, Science and Technology, 3, 1, 1-10, Mar. 2010, Peer-reviwed, Invited
    Scientific journal, English
  • Disclosure Control of Natural Language Information to Enable Secure and Enjoyable Communication over the Internet (Transcript of Discussion)
    Hiroshi Yoshiura
    SECURITY PROTOCOLS, SPRINGER-VERLAG BERLIN, 5964, 189-190, 2010, Peer-reviwed
    International conference proceedings, English
  • New Approach to Quantification of Privacy on Social Network Sites
    Tran Hong Ngoc; Isao Echizen; Kamiyama Komei; Hiroshi Yoshiura
    2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), IEEE COMPUTER SOC, 556-564, 2010, Peer-reviwed, Users may unintentionally reveal private information to the world on their blogs on social network sites (SNSs). Information hunters can exploit such disclosed sensitive information for the purpose of advertising, marketing, spamming, etc. We present a new metric to quantify privacy, based on probability and entropy theory. Simply by relying on the total leaked privacy value calculated with our metric, users can adjust the amount of information they reveal on SNSs. Previous studies focused on quantifying privacy for purposes of data mining and location finding. The privacy metric in this paper deals with unintentional leaks of information from SNSs. Our metric helps users of SNSs find how much privacy can be preserved after they have published sentences on their SNSs. It is simple, yet precise, which is proved through an experimental evaluation.
    International conference proceedings, English
  • Experiment on video watermark detection system using degraded original images
    Takaaki Yamada; Yoshiyasu Takahashi; Ryu Ebisawa; Isao Echizen; Hiroshi Yoshiura
    IEEE International Conference on Industrial Informatics (INDIN), 454-459, 2010, Peer-reviwed, Watermarks often have to be detected from videos that have experienced such severe image processing as combinations of re-encoding and resizing in real applications. To improve watermark detection performance, this paper proposes a new method consisting of the following four steps: (a) estimate the image processing the watermarked images experienced, (b) apply the estimated image processing to the original images, (c) subtract the degraded original images from the watermarked images, and (d) detect watermarks from the difference images. Under the redistributing threat model, experimental evaluations show that the proposed method yields a detection ratio 34.4- percentage points higher than that yielded by the conventional method M1, which does not use original images. © 2010 IEEE.
    International conference proceedings, English
  • Unified metric for measuring anonymity and privacy with application to online social network
    Komei Kamiyama; Tran Hong Ngoc; Isao Echizen; Hiroshi Yoshiura
    Proceedings - 2010 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2010, 506-509, 2010, Peer-reviwed, Online social networks are used by more and more people. While they enable rich communication, posting information on such networks can degrade one's privacy and anonymity. A metric based on probability and entropy has been developed for measuring the degree of information revelation caused by posting to social networks. It can be used to measure the loss of privacy as well as the loss of anonymity. © 2010 IEEE.
    International conference proceedings, English
  • Detecting revelation of private information on online social networks
    Natsuki Watanabe; Hiroshi Yoshiura
    Proceedings - 2010 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2010, 1, 502-505, 2010, Peer-reviwed, Online social networks are being used by more and more people. While they enable rich communication, they cause privacy problems. One problem that has not been previously researched is the revelation of private information on blogs and comment parts of online social networks. This paper describes a new disclosure control system for natural language information that automatically checks blogs and comments uploaded onto online social networks, detects words that might reveal private information, and modifies the text by replacing the problematic words with more abstract words so that it no longer reveals the private information. The granularity of the proposed disclosure control is not the text but each word in it. Consequently, it is not tiresome for the user and balances the protection of privacy with the enjoyment of communication. © 2010 IEEE.
    International conference proceedings, English
  • In-depth Evaluation of Content-Based Phishing Detection to Clarify Its Strengths and Limitations
    Koichiro Komiyama; Toshinori Seko; Yusuke Ichinose; Kei Kato; Kohei Kawano; Hiroshi Yoshiura
    U- AND E-SERVICE, SCIENCE AND TECHNOLOGY (Springer CCIS 124), SPRINGER-VERLAG BERLIN, 95-106, 2010, Peer-reviwed, Zhang et al. proposed a method for content-based phishing detection (CBD) and reported its high performance in detecting phishing sites written in English. However, the evaluations of the CBD method performed by Zhang et al. and others were small-scale and simply measured the detection and error rates, i.e, they did not analyze the causes of the detection errors. Moreover, the effectiveness of the CBD method with non-English sites, such as Japanese and Chinese language sites, has never been tested. This paper reports our in-depth evaluation and analysis of the CBD method using 843 actual phishing sites (including 475 English and 368 Japanese sites), and explains both the strengths of the CBD method and its limitations. Our work provides a base for using the CBD method in the real world.
    International conference proceedings, English
  • Approach to Privacy-Preserve Data in Two-Tiered Wireless Sensor Network Based on Linear System and Histogram
    Van H. Dang; Sven Wohlgemuth; Hiroshi Yoshiura; Thuc D. Nguyen; Isao Echizen
    U- AND E-SERVICE, SCIENCE AND TECHNOLOGY, SPRINGER-VERLAG BERLIN, 124, 17-+, 2010, Peer-reviwed, Wireless sensor network (WSN) has been one of key technologies for the future with broad applications from the military to everyday life [1,2,3,4,5]. There are two kinds of WSN model models with sensors for sensing data and a sink for receiving and processing queries from users; and models with special additional nodes capable of storing large amounts of data from sensors and processing queries from the sink. Among the latter type, a two-tiered model [6,7] has been widely adopted because of its storage and energy saving benefits for weak sensors, as proved by the advent of commercial storage node products such as Stargate [8] and RISE. However, by concentrating storage in certain nodes, this model becomes more vulnerable to attack. Our novel technique, called zip-histogram, contributes to solving the problems of previous studies [6.7] by protecting the stored data's confidentiality and integrity (including data from the sensor and queries from the sink) against attackers who might target storage nodes in two-tiered WSNs.
    International conference proceedings, English
  • 模倣コンテンツの特性に基づくフィッシング検知方式の誤検知防止
    中山心太; 吉浦裕
    情報処理学会論文誌, 50, 9, 2034-2047, Sep. 2009, Peer-reviwed
    Scientific journal, Japanese
  • Preventing false positives in content-based phishing detection
    Shinta Nakayama; Hiroshi Yoshiura; Isao Echizen
    IIH-MSP 2009 - 2009 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 48-51, Sep. 2009, Peer-reviwed, Content-based phishing detection extracts keywords from a target Web page, uses these keywords to retrieve the corresponding legitimate site, and detects phishing when the domain of the target page does not match that of the retrieved site. It often misidentifies a legitimate target site as a phishing site, however, because the extracted keywords do not charecterize the legitimate site with sufficient accuracy. Two methods are described for extracting keywords: domain keyword extraction, which extracts keywords from not only the page on the browser but also from pages linked from this page, and time-invariant keyword extraction, which extracts keywords from the page and previous versions of the page. Experiments using 172 legitimate sites demonstrated a reduction in the false detection rate from 14.0% to 7.6%, while experiments using 172 phishing sites demonstrated no change in the rate of overlooking phishing pages. © 2009 IEEE.
    International conference proceedings, English
  • Dual-plane correlation-based video watermarking for immunity to rotation, scale, translation, and random distortion
    Isao Echizen; Yusuke Atomori; Shinta Nakayama; Hiroshi Yoshiura
    Studies in Computational Intelligence, 227, 21-46, 2009, Peer-reviwed, A robust video watermarking method is described that can embed watermarks immune to not only rotation, scaling, and clipping and translation but also random geometric distortion and any of their combinations. It can detect watermarks without any search for canceling the effect of random distortion. Rotation, scale, and translation are canceled by searching for the angle, size, and origin of the original picture. The search for the angle and size is combinatorial and independent of the search for the origin. That is, the angle and size of the target picture can be restored without necessarily restoring the picture's origin. Furthermore, the search for the origin is divided into horizontal and vertical searches that can be carried out independently. The number of searches is thus drastically reduced, making the processing time short enough for practical application. Watermark strength is controlled using an improved human visual system model for processing color information. This is done in the L*u*v* space, where human-perceived degradation of picture quality can be measured in terms of Euclidean distance. The watermarks are actually embedded and detected in the YUV space, where watermarks can be detected more reliably than that in the L*u*v* space. Experimental evaluation using actual video samples demonstrated that the proposed method can embed watermarks immune to rotation, scaling, clipping and translation, random distortion, and combinations thereof while maintaining picture quality. © 2009 Springer-Verlag Berlin Heidelberg.
    Scientific journal, English
  • Integrity verification method for video content using robust watermarking
    Takaaki Yamada; Yoshiyasu Takahashi; Yasuhiro Fujii; Ryu Ebisawa; Hiroshi Yoshiura; Isao Echizenc
    International Journal of Knowledge-Based and Intelligent Engineering Systems, 13, 3-4, 141-153, 2009, Peer-reviwed, A method is described for verifying video content integrity by checking the continuity of timecodes embedded as digital watermarks. Conventional verification methods using digital signatures and fragile watermarking are unable to distinguish between attacks and regular modifications and thus are unable to protect against threats to content. The proposed verification method distinguishes attacks against video content from regular modifications by detecting timecodes embedded in consecutive frames of the content and then checking their continuity. A prototype implementation showed that the method is more effective than conventional ones and that it can be used by a variety of applications using video content. © 2009 - IOS Press and the authors.
    Scientific journal, English
  • Evaluation and Improvement of Digital Watermarking Algorithm Based on Cryptographic Security Models
    Satoshi Kaneko; Isao; Echizen; Hiroshi Yoshiura
    7th International Workshop on Digital Watermarking (IWDW, Springer LNCS 5450), SPRINGER-VERLAG BERLIN, 5450, 401-418, Nov. 2008, Peer-reviwed, The security of digital watermarking methods is based on the assmuption that. their embedding and detection algorithms are kept secret. They are thus inconvenient for public review and widespread use. A watermarking algorithm that, can be open while remaining secure is thus needed. Twelve models that are analogous to cryptanalysis models are described for evaluating the security of digital watermarking. They were used to evaluate the, patchwork-based watermarking algorithm and identify its weakness. Two scenarios were then developed that strengthen this algorithm. The use of these models will further the development of an open secure algorithm.
    International conference proceedings, English
  • 多重リスクコミュニケータの開発と適用
    佐々木良一; 日高悠; 守谷; 谷山,矢島; 八重樫; 川島; 吉浦裕
    情報処理学会論文誌, 49, 9, Sep. 2008, Peer-reviwed
    Scientific journal, Japanese
  • Evaluation of Integrity Verification System for Video Content Using Digital Watermarking
    Takaaki Yamada; Yoshiyasu Takahashi; Yasuhiro Fujii; Ryu Ebisawa; Hiroshi Yoshiura; Isao Echizen
    Symposium on Intelligent Interactive Multimedia Systems and Services, SPRINGER, 363-372, Jul. 2008, Invited, The effectiveness of a previously proposed system for verifying video content integrity was investigated using a prototype system. Unlike conventional verification systems using digital signatures and fragile watermarking, the proposed verification system embeds timecodes in consecutive frames of the content, extracts them some time later, and checks their continuity to distinguish attacks from regular modifications. Testing demonstrated that the system maintained picture quality, that the watermarks were robust against regular modifications, and that attacks could be detected reliably and be distinguished from regular modifications. This integrity verification system is thus well suited for a variety of applications using video content.
    International conference proceedings, English
  • Evaluation of PC-based real-time watermark embedding system for Standard-Definition video stream
    T.Yamada; Y.Takahashi; H.Yoshiura; I.Echizen
    International Symposium on Intelligent Interactive Multimedia Systems and Services, SPRINGER, 142, 331-+, Jul. 2008, Peer-reviwed, Invited, The effectiveness of a previously proposed system for embedding watermarks into video frames in real time using software on an ordinary personal computer was evaluated. The proposed system uses standard-definition(SD) video I/O and is separate from the encoding process, so it can be incorporated into various types of encoding and distribution systems, which makes it well suited for distributing live content. The evaluation results with regard to watermark visibility and survivability, resource consumption, and feasibility show that this system is applicable to various practical uses.
    International conference proceedings, English
  • Development and applications of a multiple risk communicator
    R. Sasaki; Y. Hidaka; T. Moriya; M. Taniyama; H. Yajima; K. Yaegashi; Y. Kawashima; H. Yoshiura
    6th International Conference in Computer Simulation Risk Analysis and Hazard Mitigation, WIT PRESS/COMPUTATIONAL MECHANICS PUBLICATIONS, 401-418, May 2008, Peer-reviwed, Businesses and society face various risks, and measures to reduce one risk often cause another risk. Thus, obtaining the optimal combination of measures to reduce one risk while considering other risks has become a major issue. Because risk decisions involve multiple participants, such as a manager, customer, and employee, communication between all decision makers is important for reaching an agreement on the necessary risk measures. Moreover, due to opposing factors such as security, privacy, and development cost, it is not always easy to find the optimal combination of measures that reduce the risk and are agreeable to all decision makers. Therefore, this situation would benefit from the development of a "multiple risk communicator" (MRC) with the following functions: (1) a model of the support role of the risk specialist, (2) an optimization engine, and (3) a display of the computed results for viewing by the decision makers. In this paper, we propose a design for developing the MRC program and present an example implementation. Then, we apply the results to problems of personal information leakage, illegal copying, and internal control.
    International conference proceedings, English
  • Robust Video Watermarking based on Dual-plane Correlation for Immunity to Rotation, Scale,Translation, and Random Distortion
    Yusuke Atomori; Isao Echizen; Masanori Dainaka; Shinta Nakayama; Hiroshi Yoshiura
    Journal of Digital Information Management, 6, 2, 161-167, Apr. 2008, Peer-reviwed
    Scientific journal, English
  • Use of human visual system to improve video watermarking for immunity to rotation, scale, translation, and random distortion
    Isao Echizen; Yusuke Atomori; Shinta Nakayama; Hiroshi Yoshiura
    CIRCUITS SYSTEMS AND SIGNAL PROCESSING, BIRKHAUSER BOSTON INC, 27, 2, 213-227, Apr. 2008, Peer-reviwed, A video watermarking method is described that takes into account the human visual system for processing color information to maintain picture quality better than a previously reported watermarking method. The improved method determines the watermark strength in the L*u*v* space, where human-perceived degradation of picture quality can be measured in terms of Euclidean distance, and embeds and detects watermarks in the YUV space, where detection is more reliable than that in the original method. Experimental evaluation using actual video samples showed that the improved method causes less degradation in picture quality and that, for the same picture quality, it enables up to 81% more watermarks to be embedded. Detection reliability was better for all evaluated transformations: random distortion, rotation, scaling, clipping and translation, and combinations thereof. This improved treatment of geometric transformations while maintaining picture quality will enable increased use of video watermarking.
    Scientific journal, English
  • カラー画像の2つの色成分の関係に基づいて多様な幾何変形に対応する画像電子透かし方式
    大中雅憲; 中山心太; 後守裕介; 越前功; 吉浦裕
    情報処理学会論文誌, Information Processing Society of Japan (IPSJ), 49, 3, 1387-1401, Mar. 2008, Peer-reviwed, Digital watermarking has a problem that it is weak to the geometrical transformations-Rotation, Scaling, Clipping, and Random Distortion. We propose a watermarking method that treats the four geometrical transformations and their combinations by adding Rotation, Scaling and Clipping tolerance to our previous method that had distortion tolerance. By experiment evaluations, we obtained the prospect that our method can detect embedded data, after these transformations.
    Scientific journal, Japanese
  • 暗号学的安全性モデルに基づく電子透かしアルゴリズムの評価と改良
    金子聡; 吉浦裕
    情報処理学会論文誌, 49, 3, 1402-1413, Mar. 2008, Peer-reviwed
    Scientific journal, Japanese
  • Electronic voting scheme to maintain anonymity in small-scale election by hiding the number of votes
    Tsukasa Endo; Isao Echizen; Hiroshi Yoshiura
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, IEEE COMPUTER SOC, 1287-+, Mar. 2008, Peer-reviwed, Loss of anonymity, bribery, and coercion are more serious in small-scale voting than in large-scale voting. This paper shows that the entropy of each vote can be decreased, i.e., the anonymity of voting can be compromised, if the number of votes for each candidate is disclosed. It gives two strict definitions of anonymity instead of the previous definition and, based on the new definitions, proposes a new electronic voting scheme that keeps the number of votes secret. The security of the proposed scheme is equivalent to that of an existing multiparty protocol.
    International conference proceedings, English
  • Novel Criterion Based on Log Inflation for Fraudulent Audit Log Preservation
    Yasuo Hatano; Kunihiko Miyazaki; Mutsuru Iwamura; Tsutomu Matsumoto; Ryoichi Sasaki; Hiroshi Yoshiura; Yoshinori Honda; Satoru Tezuka
    Proc. 4th International Conference on Digital Forensics (ICDF), 387-392, Jan. 2008, Peer-reviwed
    International conference proceedings, English
  • Picture watermarks surviving general affine transformation and random distortion
    Yusuke Atomori; Isao Echizen; Hiroshi Yoshiura
    2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, IEEE COMPUTER SOC, 6, 3, 315-+, 2008, Peer-reviwed, We have extended a previously reported method immune to random distortion to make it immune to affine transformation as well. Although affine transformation consists of four geometric transformations (scaling, rotation, translation, and shearing), the proposed method requires only scale and rotation searching. Experimental evaluation showed that it can detect each geometric transformation. It can thus be used to create picture watermarks that are immune to a wide variety of geometric transformations.
    International conference proceedings, English
  • Secure Generation of Digital Signature on Compromised Computer
    H. Tanaka; S. Sasaki; I. Echizen; H. Yoshiura
    Proc. of IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2007), 12-15, Nov. 2007, Peer-reviwed
    International conference proceedings, English
  • HVS-based robust video watermarking with dual-plane correlation
    Isao Echizen; Yusuke Atomori; Shinta Nakayama; Hiroshi Yoshiura
    2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, IEEE COMPUTER SOC, 2, 20-24, Nov. 2007, Peer-reviwed, This video watermarking method uses human vision models of color information to control watermark strength and has immunity to rotations, scale changes, translations, and random distortion. It determines the watermark strength in L*u*v* space, where human-perceived degradations of picture quality can be measured in terms of Euclidian distance, but embeds and detects watermarks in YUV space, where the detection is more reliable than the robust watermarking scheme we previously proposed. An experimental evaluation using actual video samples demonstrated that the method can embed more watermarks while keeping the same picture quality and can detect them reliably in watermarked pictures that had gone through all four types of transformations. The method can be used in various watermarking schemes.
    International conference proceedings, English
  • Evaluation of PC-based real-time watermarking system for long-term video preservation
    Takaaki Yamada; Isao Echizen; Satoru Tezuka; Hiroshi Yoshiura; Norihisa Komoda
    LONG-TERM AND DYNAMICAL ASPECTS OF INFORMATION SECURITY: EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, NOVA SCIENCE PUBLISHERS, INC, 73-85, Jul. 2007, Peer-reviwed, New business opportunities of digital video such as IP-based inspection require for preserving the data during long teen. Digital watermarks remain in the content and provide supplementary evidence of integrity. For them to become practical, a means is needed for processing them in real time on PCs. We previously proposed system architecture and a method to shorten watermarking time by reusing the estimated watermark imperceptibility among neighboring frames. They enable real time processing in a series of captured analog video signals: watermarking the video, encoding it into MPEG4 (QGVA, 1Mbps, 30fps), and storing the video for 12 hours in maximum. We have now evaluated the validity of the system as a software application.
    International conference proceedings, English
  • Disclosure control of natural language information to enable secure and enjoyable communication over the Internet
    Haruno Kataoka; Akira Utsumi; Yuki Hirose; Hiroshi Yoshiura
    Proc. of the 15th International Workshop on Security Protocols (Springer LNCS 5964)), 136-147, Apr. 2007, Peer-reviwed, Invited
    International conference proceedings, English
  • Adaptive embedding and detection for improved video watermarking
    Isao Echizen; Yasuhiro Fujii; Takaaki Yamada; Satoru Tezuka; Hiroshi Yoshiura
    Studies in Computational Intelligence, 58, 157-187, 2007, Peer-reviwed, Video watermarks must maintain picture quality and withstand video processing. Resolving the tradeoff between these conflicting requirements has been one of the central problems of video watermarking. Previous video watermarking methods, however, have trouble satisfying these conflicting quality and survivability requirements because they utilize the watermarking methods for still picture and neglect the properties of motion pictures. To resolve this tradeoff, we describe adaptive video embedding and detection techniques that utilize the properties of motion pictures. Motion-adaptive embedding can allocate watermarks to picture areas which are adaptively based on motion properties of video and, statistically adaptive detection can control the accumulation of watermarks based on the statistical properties of video to prevent degradation in the watermark signal by video processing. Experimental evaluations using actual motion pictures have shown that these techniques can be effective for resolving the tradeoff and can be widely used in the pixel-based watermarking. © Springer-Verlag Berlin Heidelberg 2007.
    Scientific journal, English
  • Dual-plane watermarking for Color Pictures Immune to Rotation, Scale, Translation, and Random Bending
    M. Dainaka; S. Nakayama; I. Echizen; H. Yoshiura
    Proc. of IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2006), 93-96, Dec. 2006, Peer-reviwed
    International conference proceedings, English
  • Improved video verification method using digital watermarking
    Isao Echizen; Takaaki Yamada; Satoru Tezuka; Stephan Singh; Hiroshi Yoshiura
    IIH-MSP: 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Proceedings, IEEE COMPUTER SOC, 445-448, Dec. 2006, Peer-reviwed, A method is described that verifies video content integrity by checking the continuity of embedded timecodes used as digital watermarks. Conventional verification methods using digital signatures and fragile watermarking are unable to distinguish between attacks and regular modifications due and thus are unable to protect against threats to content. The proposed verification method distinguishes attacks against video content from regular modifications by extracting timecodes embedded in consecutive frames of the content and then checking their continuity. A prototype implementation showed that the method is more effective than conventional ones and that it can be used by a variety of applications using video content.
    International conference proceedings, English
  • PC-based real-time watermark embedding system with standard video interface
    Isao Echizen; Koichi Tanimoto; Takaaki Yamada; Masanori Dainaka; Satoru Tezuka; Hiroshi Yoshiura
    2006 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-6, PROCEEDINGS, IEEE, 267-271, Oct. 2006, Peer-reviwed, An improved system is described for embedding watermarks into video frames in real time using software on an ordinary personal computer. It uses standard video I/O and is separate from the encoding process, so it can be incorporated into various encoding and distributing systems, which makes it well suited for distributing live content. Real-time processing is achieved by making a watermark-pattern generation process common to every frame a pre-process and shortening the watermark embedding time by reusing the watermark pattern output from this pre-process. It is also achieved by storing the ivatermarked video frames into the video memory on the video I/O board, thereby eliminating the need for storing them in buffers on hard disk. Testing of a prototype system demonstrated the validity of this approach.
    International conference proceedings, English
  • 普及モデルPC上のソフトウェアによるリアルタイム動画電子透かし埋め込みシステム
    山田隆亮; 越前功; 手塚悟; 吉浦裕
    電気学会論文誌C, The Institute of Electrical Engineers of Japan, 126-C, 9, 1127-1137, Sep. 2006, Peer-reviwed, Emerging broadband networks and high performance of PCs provide new business opportunities of the live video streaming services for the Internet users in sport events or in music concerts. Digital watermarking for video helps to protect the copyright of the video content and the real-time processing is an essential requirement. For the small start of new business, it should be achieved by flexible software without special equipments. This paper describes a novel real-time watermarking system implemented on a commodity PC. We propose the system architecture and methods to shorten watermarking time by reusing the estimated watermark imperceptibility among neighboring frames. A prototype system enables real time processing in a series of capturing NTSC signals, watermarking the video, encoding it to MPEG4 in QGVA, 1Mbps, 30fps style and storing the video for 12 hours in maximum
    Scientific journal, Japanese
  • Use of Statistically Adaptive Accumulation to Improve Video Watermarking Detection
    Isao Echizen; Takaaki Yamada; Satoru Tezuka; Hiroshi Yoshiura
    情報処理学会論文誌, 47, 8, 2440-2453, Aug. 2006, Peer-reviwed
    Scientific journal, English
  • Maintaining picture quality and improving robustness of color watermarking by using human vision models
    H Yoshiura; Echizen, I
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG, E89D, 1, 256-270, Jan. 2006, Peer-reviwed, Digital watermarks on pictures are more useful when they are better able tosurvive image processing operations and when they cause less degradation of picture quality. Random geometric distortion is one of the most difficult kinds of image processing for watermarks to survive because of the difficulty of synchronizing the expected watermark patterns to the watermarks embedded in pictures. This paper proposes three methods to improve a previous method that is not affected by this difficulty but that is insufficient in maintaining picture quality and treating other problems in surviving image processing. The first method determines the watermark strength in L*u*v* space, where human-perceived degradation of picture quality can be measured in terms of Euclidian distance, but embeds and detects watermarks in YUV space, where the detection is more reliable. The second method, based on the knowledge of image quantization, uses the messiness of color planes to hide watermarks. The third method reduces detection noises by preprocessing the watermarked image with orientation-sensitive image filtering, which is especially effective in picture portions where pixel values change drastically. Subjective evaluations have shown that these methods improved the picture quality of the previous method by 0.5 point of the mean evaluation score at the representative example case. On the other hand, the watermark strength of the previous method could be increased by 30% through 60% while keeping the same picture quality. Robustness to image processing has been evaluated for random geometric distortion, JPEG compression, Gaussian noise addition, and median filtering and it was clarified that these methods reduced the detection error ratio to 1/10 through 1/4. These methods can be applied not only to the previous method but also to other types of pixel-domain watermarking such as the Patchwork watermarking method and, with modification, to frequency-domain watermarking.
    Scientific journal, English
  • Development concept for and trial application of a "mulutiplex risk communicator"
    R Sasaki; S Ishii; Y Hidaka; H Yajima; H Yoshiura; Y Murayama
    Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government, SPRINGER, 189, 607-621, Oct. 2005, Peer-reviwed, Risk has increased with the development of an Internet-oriented society, and to what extent that risk can be reduced has become a major issue. Thus, risk communication has become crucial for the formation of a consensus among decision-makers such as citizens. Dealing with risk, however, requires the reduction of risks based on conflicting concepts such as security, privacy, and development costs; obtaining the consensus of individuals involved and determining optimal combinations of the measures are not easy. A "multiplex risk communicator (MRC)" with (1) a simulator, (2) an optimization engine, and (3) displays for the formation of a consensus is needed in order to resolve such problems. This paper describes the features an MRC should have, a simple prototype program to support it, and results of its trial application.
    International conference proceedings, English
  • Real-time video watermark embedding system using software on personal computer
    Echizen, I; T Yamada; Y Fujii; S Tezuka; H Yoshiura
    INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOL 1-4, PROCEEDINGS, IEEE, 3369-3373, Oct. 2005, Peer-reviwed, Wide use of broadband networks and high-efficiency personal computers facilitates distribution of live video content through the Internet. Digital watermarking for video helps protect the copyright of the video content, making real-time watermark embedding an essential requirement for content distribution. This paper describes a real-time embedding system suitable for live content distribution that uses software on an ordinary personal computer. Real-time processing is achieved by combining all the processes related to watermark embedding, and by shortening the watermark embedding time by reusing the estimated watermark imperceptibility among neighboring frames. A prototype system demonstrated the validity of the proposed system.
    International conference proceedings, English
  • Improved Video Watermarking Detection Using Statistically-Adaptive Accumulation
    Isao Echizen; Yasuhiro Fujii; Takaaki Yamada; Satoru Tezuka; Hiroshi Yoshiura
    2005 International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES, Springer LNCS 3684), SPRINGER-VERLAG BERLIN, 3684, 300-308, Sep. 2005, Peer-reviwed, Redundant coding is a basic method that embeds watermarks repeatedly in every frame or region and thus can prevent errors by the accumulation of the frames or the regions in watermark detection. It would not always be effective, however, because many kinds of image processing would remove watermarks from specific frames or regions and then remaining watermarks would be attenuated by the accumulation procedure of the frames or the regions from which watermarks were removed. We therefore propose a detection method preventing this attenuation by estimating bit-error rate from each watermarked region and selecting the regions so that the region accumulating the selected regions has the mimimal bit-error rate. Experimental evaluations have shown that the new method can improve watermark survivability after MPEG encoding by an average of 15.5% and can be widely used in statistically based watermarking.
    Scientific journal, English
  • 2階層電子透かしの有効性評価
    石井真之; 鹿志村浩史; 佐々木良一; 吉浦裕; 伊藤信治
    情報処理学会論文誌, 46, 8, 2053-2067, Aug. 2005, Peer-reviwed
    Scientific journal, Japanese
  • 多重リスクコミュニケータの開発構想と試適用
    佐々木良一; 石井真之; 日高悠; 矢島敬士; 吉浦裕; 村山優子
    情報処理学会論文誌, 46, 8, 2120-2128, Aug. 2005, Peer-reviwed
    Scientific journal, Japanese
  • 交渉ゲームにおける鍵自己暴露攻撃戦略のインパクト~電子署名技術の利用に係る新たな課題~
    宮崎邦彦; 岩村充; 松本勉; 佐々木良一; 吉浦裕; 松木武; 秦野康生; 手塚悟; 今井秀樹
    情報処理学会論文誌, Information Processing Society of Japan (IPSJ), 46, 8, 1871-1879, Aug. 2005, Peer-reviwed, In application of digital signature technology, a signer needs to manage his/her private key safely. Keeping the private key safely is seemingly profit for the signer him/herself, but this may not true in certain situation. In this paper, the case where the signer is an obligor who is almost crushed by debt is mentioned as an example and we point out that self-compromising the signing private key by the obligor serves as an attack on a creditor. Furthermore, we analyze how it affects on the debt curtailment bargaining between a creditor and an obligor that the obligor has private key self-compromising, and show examples for countermeasure.
    Scientific journal, Japanese
  • Correlation-based model of color picture watermarking against random geometric distortion
    Echizen, I; Y Fujii; T Yamada; S Tezuka; H Yoshiura
    2005 IEEE International Conference on Multimedia and Expo (ICME), Vols 1 and 2, IEEE, 213-216, Jul. 2005, Peer-reviwed, Random geometric distortion is one of the most difficult kinds of image processing to survive and has been a noted problem in watermarking research. Previous methods for dealing with random geometric distortion, however, are accompanied by large computational overhead or by operational inconvenience. This paper therefore proposes a method based on embedding watermark. patterns in two of the three color planes constituting a color picture so that these two planes, have a specific correlation less subject to random geometric distortion. Experimental evaluations using StirMark confirmed that information of over 100 bits embedded in 256 X 256-pixel pictures can be correctly detected without using searches or special patterns.
    International conference proceedings, English
  • Error Correction of Statistically Unstable Signals in Consumer Wireless Network
    Y. Fujii; I. Echizen; T. Yamada; S. Tezuka; H. Yoshiura
    Proc. of 2005 IEEE International Conference on Consumer Electronics (ICCE 2005), 171-172, Jan. 2005, Peer-reviwed
    International conference proceedings, English
  • Perceptually Adaptive Video Watermarking for MPEG Encoders
    I. Echizen; Y. Fujii; T. Yamada; S. Tezuka; H. Yoshiura
    International Journal of Image and Graphics, 5, 1, 89-109, Jan. 2005, Peer-reviwed
    Scientific journal, English
  • Digitally signed document sanitizing scheme with disclosure condition control
    K Miyazaki; M Iwamura; T Matsumoto; R Sasaki; H Yoshiura; S Tezuka; H Imai
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG, E88A, 1, 239-246, Jan. 2005, Peer-reviwed, A digital signature does not allow any alteration of the document to which it is attached. Appropriate alteration of some signed documents, however, should be allowed because there are security requirements other than that for the integrity of the document. In the disclosure of official information, for example, sensitive information such as personal information or national secrets is masked when an official document is sanitized so that its nonsensitive information can be disclosed when it is demanded by a citizen. If this disclosure is done digitally by using the current digital signature schemes. the citizen cannot verify the disclosed information correctly because the information has been altered to prevent the leakage of sensitive information. That is, with current digital signature schemes, the confidentiality of official information is incompatible with the integrity of that information. This is called the digital document sanitizing problem, and some solutions such as digital document sanitizing schemes and content extraction signatures have been proposed. In this paper, we point out that the conventional digital signature schemes are vulnerable to additional sanitizing attack and show how this vulnerability can be eliminated by using a new digitally signed document sanitizing scheme with disclosure condition control.
    Scientific journal, English
  • Error correction of statistically unstable signals in consumer wireless networks
    Y Fujii; Echizen, I; T Yamada; S Tezuka; H Yoshiura
    ICCE: 2005 INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, DIGEST OF TECHNICAL PAPERS, IEEE, 171-172, 2005, Peer-reviwed
    International conference proceedings, English
  • Use of inferential statistics to estimate error probability of video watermarks
    Echizen, I; H Yoshiura; Y Fujii; T Yamada; S Tezuka
    SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents, SPIE-INT SOC OPTICAL ENGINEERING, 5681, 391-399, Jan. 2005, Peer-reviwed, Errors in video watermark detection can cause serious problems, such as erroneous indication of illegal copying and erroneous copy control. These errors could not, however, be eliminated because watermarked pictures are subjected to wide varieties of image processing such as compression, resizing, filtering, or D/A or A/D conversion. Estimating errors of video watermarks is therefore an essential requirement for electric equipment that is to use copyright and copy-control information properly. This paper proposes a video watermarking method that estimates error probability from each watermarked frame at hand after image processing by using the expectation-maximization algorithm from inferential statistics. The paper also proposes a reliable detection system of video watermarks by using the proposed method. Experimental evaluations have shown that the new method can be used reliably with the margin factor and can be widely used in electric equipment as well as content-distribution systems.
    International conference proceedings, English
  • メディアプロセッサを用いたリアルタイム動画電子透かし装置
    寺田光一; 藤川義文; 藤井由紀夫; 越前功; 吉浦裕; 西岡清和; 坂東忠秋
    映像情報メディア学会誌(査読論文), The Institute of Image Information and Television Engineers, 58, 12, 1820-1827, Dec. 2004, Peer-reviwed, We have developed two types of real-time video watermarking systems using a VLIW-based media processor. One is an embedding system for HDTV (High-Definition TV), and the other is an embedding system for standard TV. These systems preserve the picture quality of each video frame by using motion estimation and contour detection that optimizes the strength of the watermark. We have developed a watermarking module that incorporates three MAPCAs (media accelerated processors for comsumer appliances) as art of a real-time embedding system for standard TV. For HDTV, we have developed a watermarking system with seven watermarking modules. The system divides an HDTV video into seven segments so that the seven independent modules work in parallel.
    Scientific journal, Japanese
  • Evaluation of Total Cost in Hysteresis Sigature Systems
    Yusuke Ueda; Ryoichi Sasaki; Hiroshi Yoshiura; Seichi Susaki; Kunihiko Miyazaki
    Proc. of International Workshop for Applied PKI (IWAP2004), 60-71, Oct. 2004, Peer-reviwed
    International conference proceedings, English
  • Color picture watermarking correlating two constituent planes for immunity to random geometric distortion
    H Yoshiura; Echizen, I
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG, E87D, 9, 2239-2252, Sep. 2004, Peer-reviwed, Digital watermarks on pictures must have the ability to survive various image processing operations while not causing degradation of picture quality. Random geometric distortion is one of the most difficult kinds of image processing for a watermark to survive, and this problem has become a central issue in watermarking research. Previous methods for dealing with random geometric distortion have been based on searches, special water-mark patterns, learning, or additional data such as original pictures. Their use, however, is accompanied by large computational overhead or by operational inconvenience. This paper therefore proposes a method based on embedding watermark patterns in two of the three color planes constituting a color picture so that these two planes have a specific covariance. The detection of the embedded information is based on the covariance between these two planes. Random geometric distortion distorts all the constituent color planes of a picture in the same way and thus does not affect the covariance between any two. The covariance-based detection is therefore immune to the distortion. The paper clarifies that detection error would occur whenever the inherent covariance (the covariance in the original picture) overrides the covariance made by watermarking. The two constituent planes having the minimum inherent covariance are therefore selected and their inherent covariance is reduced by shifting one of them and using a noise-reduction preprocess. Experimental evaluations using StirMark confirmed that 64 bits embedded in 256 x 256-pixel pictures can be correctly detected without using searches, special patterns, learning, or additional data.
    Scientific journal, English
  • An improvement of Error Correction Coding for Digital Watermarking
    藤井康広; 越前功; 山田隆亮; 手塚悟; 吉浦裕
    情報処理学会論文誌, Information Processing Society of Japan (IPSJ), 45, 8, 1980-1997, Aug. 2004, Peer-reviwed, Error correction coding is necessary for detection of digital watermarking because some bits of information embedded into digital contents are apt to be eliminated by media processes. The number of error bits, however, exceeds the error correction bound because large number of bits, especially check bits for correcting, can not be embedded into digital contents. This paper proposes a detection method of watermarking with higher bound and lower probability of error decoding by making use of the number of times that each information is decoded by the soft-decoding. Experimental evaluation showed that the error correction bound of the proposed method was improved to be 13.92 bits at average and the probability of error decoding achieved below 10〜30 for (127,64,21) BCH code with 64 bits information and 10 bits bound.
    Scientific journal, Japanese
  • Evaluation Method Supposing Data Loss for Hysteresis Signature Systems
    上田祐輔; 佐々木良一; 吉浦裕; 洲崎誠一; 宮崎邦彦
    情報処理学会論文誌, 45, 8, 1966-1976, Aug. 2004, Peer-reviwed
    Scientific journal, Japanese
  • Combinatorial optimization of countermeasures against illegal copying
    R Sasaki; H Yoshiura; S Itoh
    10th Cambridge International Workshop on Security Protocols (Springer LNCS 2845), SPRINGER-VERLAG BERLIN, 128-143, Apr. 2004, Peer-reviwed, Invited, The growth of the Internet has lead to an increase in the distribution on digital contents, such as music, still pictures, and motion pictures through networks. However, it has also lead to an increase in illegal copying without permission from the copyright holder. Although a number of countermeasures against illegal copying have been developed including watermarking and contents capsulation, it is impossible to find one perfect countermeasure. A method is needed that would allow for an optimal combination of different countermeasures to substantially reduce the probability of illegal copying. We propose such a method based on combinatorial optimization and fault-tree analysis. We use this method for a number of cases and show the actual optimal combinations for each case, as well as a flow chart for selecting a proper combination of countermeasures depending on the situation.
    International conference proceedings, English
  • Legally authorized and unauthorized digital evidence
    H Yoshiura; K Miyazaki; S Itoh; K Takaragi; R Sasaki
    10th Cambridge International Workshop on Security Protocols (Springer LNCS 2845), SPRINGER-VERLAG BERLIN, 67-70, Apr. 2004, Peer-reviwed, Invited
    International conference proceedings, English
  • Improved video watermarking for MPEG encoders using motion analysis
    Isao Echizen; Hiroshi Yoshiura; Kousuke Anzai; Jun'ichi Taguchi; Kazunori Nakano; Satoru Tezuka
    Kyokai Joho Imeji Zasshi/Journal of the Institute of Image Information and Television Engineers, Inst. of Image Information and Television Engineers, 58, 2, 233-242, 2004, Peer-reviwed, Maintaining picture quality is an essential requirement for video watermarking, and this paper shows that watermarks are less perceptible when they are embedded where picture contents are moving. It also describes a new watermarking method that uses motion detection to preferentially allocate watermarks to macro-blocks containing motion. As well it presents the results of experimental evaluations which demonstrate that this method significantly reduces degradation in picture quality. Further it shows that, for the same picture quality after MPEG encoding and decoding, 30% more watermarks can be embedded than with the previous method. This new method would be most effective when implemented in MPEG encoders, which already have the necessary motion analysis functions
    it can also be used in content-distribution systems.
    Scientific journal, English
  • 電子透かしを用いたWebサイト認定マークの実用システム開発と評価
    青島弘和; 吉浦裕; 洲崎誠一; 本城信輔
    システム制御情報学会誌(査読論文), 16, 12, 616-627, Dec. 2003, Peer-reviwed
    Scientific journal, Japanese
  • Use of motion estimation to improve video watermarking for MPEG encoders
    Echizen, I; H Yoshiura; Y Fujii; S Tezuka
    2nd International Workshop on Digital Watermarking (IWDW, Springer LNCS 2939), SPRINGER-VERLAG BERLIN, 184-199, Oct. 2003, Peer-reviwed, Maintaining picture quality is an essential requirement for video watermarking, and this paper proposes a new method that uses motion estimation (block-matching techniques) to preferentially allocate watermarks to picture contents with motion based on our criterion for estimating watermark imperceptibility that takes motion into account. Experimental evaluations have shown that the new method significantly reduces degradation in picture quality and that, for the same picture quality after MPEG encoding and decoding, 30% more watermarks can be embedded than with the previous method. This new method would be most effective when implemented in MPEG encoders, which already have the necessary motion estimation functions.
    Scientific journal, English
  • 放送コンテンツの著作権保護における電子透かしの利用方法
    山田隆亮; 吉浦裕; 越前功; 小川一人; 室田逸郎; 大竹剛; 合志清一
    映像情報メディア学会誌(査読論文), 57, 9, 1155-1167, Sep. 2003, Peer-reviwed
    Scientific journal, Japanese
  • 第三者機関への依存度に基づく長期利用向け電子署名技術評価手法の提案
    宮崎邦彦; 吉浦裕; 岩村充; 松本勉; 佐々木良一
    情報処理学会論文誌, Information Processing Society of Japan (IPSJ), 44, 8, 1955-1969, Aug. 2003, Peer-reviwed, Digital signature is used as a technology which assures authenticity of digital documents. No one can issue a digital signature without a private-key, so if the private-key is kept secret for everyone except the signer, the document signed by him must be his document. However, it might not adequate for long-term usage that only signer knows the private-key. Then some technologies are proposed for long-term usage, that is, time-stamping, hysteresis signature, signature extension server, and so on. In this paper, we notice that each technology requires some third parties implicitly or explicitly. We clarify what kinds of third parties are required by each technology. In addition, we clarify how much each third party, especially existance assure party, is required by introducing the concept of trustworthiness of third party.
    Scientific journal, Japanese
  • 局所特徴量を用いた二値画像用電子透かしの画質維持方式
    藤井康広; 中野和典; 越前功; 吉浦裕
    情報処理学会論文誌, 44, 8, 1872-1882, Aug. 2003, Peer-reviwed
    Scientific journal, Japanese
  • Development of Network-attached Real-time Watermarking System Using Media Processor
    TERADA Koichi; FUJIKAWA Yoshifumi; FUJII Yukio; ECHIZEN Isao; YOSHIURA Hiroshi; NISHIOKA Kiyokazu
    ITE Technical Report, The Institute of Image Information and Television Engineers, 27, 18, 39-44, Mar. 2003, Peer-reviwed, We have developed a network-attached real-time watermarking system for Standard TV using VLIW-based media processor. The transmitter part of the system embeds watermarks to a picture, encodes it with MPEG, then transfers it to the receiver part via network. The receiver part decodes MPEG stream, and detects watermarks from the decoded picture. This watermarking system can be built into an on-line video delivery system with the broadband network.
    Symposium, Japanese
  • Watermarking Applications for Broadcast Content Copyright Protection
    Takaaki Yamada; Hiroshi Yoshiura; Isao Echizen; Kazuto Ogawa; Itsuro Murota; Go Ohtake; Seiichi Gohshi
    Kyokai Joho Imeji Zasshi/Journal of the Institute of Image Information and Television Engineers, Inst. of Image Information and Television Engineers, 57, 9, 1155-1167, 2003, Peer-reviwed, Copyright protection of broadcast content has become an issue of great concern because digital broadcasting is increasingly used to deliver high quality visual and audio content. We analyze the existing copyright protection technologies and clarify why they cannot prevent illegal copies from being created through the analogue output of broadcast receivers. Illegally copied content can thus be re-digitized and distributed through the Internet and portable media. Digital watermarking that survives analogue processes effectively complements existing technologies. Four methods of using watermarking to detect illegal copies, copiers, and distributors are described and compared with respect to their implementation cost, detection ability, and ease of deployment. The technical requirements of the watermarking used in these methods are also clarified with respect to survivability against analogue processes, maintenance of image quality, and quantity of embedded information.
    Scientific journal, Japanese
  • Reliable detection of video watermarks using infefential statistics
    H Yoshiura; Echizen, I; K Anzai; K Nakano; Y Fujii
    ICCE: 2003 INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, DIGEST OF TECHNICAL PAPERS, IEEE, 60-61, 2003, Peer-reviwed, Errors in watermark detection can cause serious problems, such as erroneous copy control and misindication of illegal copying. This paper proposes a new watermark method, which prevents detection errors by using the expectation-maximization algorithm from inferential statistics. Experimental evaluations have confirmed its reliability.
    International conference proceedings, English
  • 動画コンテンツの著作権保護技術
    吉浦裕; 藤井由紀夫; 幸田恵理子
    日立評論, 日立評論社, 84, 10, 23-28, Oct. 2002, Invited
    Research institution, Japanese
  • 動き検出に基づく動画用電子透かしの画質維持方式
    越前功; 吉浦裕; 田口順一; 中野和典; 佐々木良一
    情報処理学会論文誌, Information Processing Society of Japan (IPSJ), 43, 8, 2529-2541, Aug. 2002, Peer-reviwed, Compatibility between maintenance of image quality and robustness of image processing is an essential requirement for watermark embedding. Therefore, it is necessary to embed watermarks into the contents as much as possible without visual degradation. Because watermark is inconspicuous on moving objects among frames, there is the possibility of increasing watermark strength by considering the properties of the motion. Previous methods, however, embedded watermarks into each frame independently. This paper proposes a method that controls watermark strength based on motion vectors and variations in the motion detection. Experimental evaluations show that new method enables us to raise the embed information as much as 30% with the same quality as the previous method and improve the survivability of MPEG2 encoding.
    Scientific journal, Japanese
  • 不正コピー対策の最適組み合わせに関する考察
    佐々木良一; 吉浦裕; 伊藤信治
    情報処理学会論文誌, 43, 8, 2435-2446, Aug. 2002, Peer-reviwed
    Scientific journal, Japanese
  • A multi-OS approach to trusted computer systems (position paper and transcription of discussion)
    H Yoshiura; K Miyazaki; S Itoh; K Takaragi; R Sasaki
    9th International Workshop on Security Protocols (Springer LNCS 2467), SPRINGER-VERLAG BERLIN, 107-118, Apr. 2002, Peer-reviwed, Invited, Trusted computer systems are becoming increasingly important in private sectors such as banking and insurance, but those currently available are inconvenient in private sectors because they were developed for use by government agencies and the military. This paper describes how a trusted system can be made from an ordinary OS for daily use and a secure OS monitoring that OS. This configuration is implemented by using the multi-OS control technique. Analysis of an example system confirms the feasibility of the proposed method and even implies that a trusted system can be implemented by having two ordinary OSs that monitor each other.
    Scientific journal, English
  • Improved video watermarking for MPEG encoders using motion analysis
    H Yoshiura; Echizen, I; K Anzai; J Taguchi; K Nakano
    2002 INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, DIGEST OF TECHNICAL PAPERS, IEEE, 14-15, 2002, Peer-reviwed, This paper proposes a new watermarking method, which uses motion analysis to allocate watermarks where they will be less perceptible and thus improves their transparency. The proposed method would be most effective when incorporated into MPEG encoders and could be widely used in consumer electronics.
    International conference proceedings, English
  • Estimating the Bit-Error-Rate in Digital Watermarking Using Inferential Statistics
    越前功; 吉浦裕; 安細康介; 佐々木良
    Transaction of Information Processing Society of Japan, Information Processing Society of Japan (IPSJ), 42, 8, 2006-2016, Aug. 2001, Peer-reviwed, Bit-errors in detecting digital watermarks could cause critical failures because the detected bits are used to identify persons who illegally copied the digital contents and to control equipment that copy and playback the contents. It is difficult, however, to prevent bit-error completely. Estimating the ratio with that the detected bits are not correct is therefore important to use these bits appropriately and to avoid critical failures. This paper proposes a method for this estimation. The proposed method can be applied to statistic-based watermark methods. The method takes statistical values corresponding to the detected bits to infer Gaussian model that exists behind these values. It then estimates the ratio based on this model. Experimental evaluations have shown that the actual error ratio divided by the estimated ratio is 2.2 in the worst case and that the method can be reliably used with this margin.
    Scientific journal, Japanese
  • Digital camera for taking evidential photographic images
    H Morito; K Anzai; D Watanabe; H Yoshiura; Y Seto
    ICCE: 2001 INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, DIGEST OF TECHNICAL PAPERS, IEEE, 118-119, Jun. 2001, Peer-reviwed, This paper describes a system for taking evidential photographs by using digital watermarks and digital signatures and also describes a prototype camera demonstrating the feasibility of the system.
    International conference proceedings, English
  • A Multi-OS Approach to Trusted Computer Systems.
    Hiroshi Yoshiura; Kunihiko Miyazaki; Shinji Itoh; Kazuo Takaragi; Ryôichi Sasaki
    Security Protocols, Springer, 107-114, 2001
    International conference proceedings
  • Webサイトの真正性を確認可能とするインターネット・マークの提案
    洲崎誠一; 吉浦裕; 永井康彦; 豊島久; 佐々木良一; 手塚悟
    情報処理学会論文誌, 41, 8, 2198-2207, Aug. 2000, Peer-reviwed
    Japanese
  • 輪郭保存に基づく電子透かしの画質維持方式
    越前功; 吉浦裕; 安細康介; 田口順一; 黒須 豊; 佐々木良一; 手塚悟
    情報処理学会論文誌, 41, 6, 1828-1839, Jun. 2000, Peer-reviwed
    Scientific journal, Japanese
  • Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks
    H. Yoshiura; T. Shigematsu; S. Susaki; T. Saitoh; H. Toyoshima; C. Kurita; S. Tezuka; R. Sasaki
    8th Cambridge International Workshop on Security Protocols (Springer LNCS 2133), 178-184, Apr. 2000, Peer-reviwed, Invited
    International conference proceedings, English
  • Internet-marks: The secure seal for WWW site authentication
    S Honjo; S Susaki; H Yoshiura; H Aoshima; S Tezuka; R Sasaki; T Saito; H Toyoshima
    SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS: WORKSHOPS, PROCEEDINGS, IEEE COMPUTER SOC, 393-398, 2000, Peer-reviwed, This paper describes a seal that is secure enough that both the seal and the Web page contents are protected from forgery It also enables the copying of the Web contents to an unauthorized site To be detected This paper explains the Internet-Marks and compares their security and speed with those of conventional seal methods.
    International conference proceedings, English
  • General quality maintenance module for motion picture watermarking
    Echizen, I; H Yoshiura; T Arai; H Kimura; T Takeuchi
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 45, 4, 1150-1158, Nov. 1999, Peer-reviwed, Because the picture quality of watermarked motion pictures must not be degraded by the watermarking, this paper describes a new module that controls watermarking processes, The module uses a new human sight model to optimize watermark strength for each frame of a motion picture, and it prevents flickering by limiting the frame-to-frame change in watermark strength. Another advantage of this module is that it can be used in a wide range of watermarking systems, The effectiveness of the proposed module has been demonstrated in five watermarking systems.
    Scientific journal, English
  • Digital Watermarking Techniques for Contents Distribution (Invited)
    H. Yoshiura
    Symposium on Internet Services and Mobility, 5, Oct. 1999
    International conference proceedings, English
  • General Quality Maintenance Module for Motion Picture Watermarking
    Hiroshi Yoshiura; Isao Echizen; Takao Arai; Hiroyuki; Kimura; Toshifumi Takeuchi
    1999 IEEE International Conference on Consumer Electronics, 98-99, Jun. 1999, Peer-reviwed
    International conference proceedings
  • ディジタルコンテンツのセキュリティおよび著作権保護とその応用
    原野紳一郎; 吉浦裕; 小辰信夫; 森藤元; 黒須豊
    日立評論, 日立評論社, 81, 6, 426-432, Jun. 1999, Invited
    Research institution, Japanese
  • INTERNET-MARKs: Clear, secure, and portable visual marks for the cyber worlds
    H Yoshiura; S Susaki; Y Nagai; T Saitoh; H Toyoshima; R Sasaki; S Tezuka
    "7th International Workshop on Security Protocols (Springer LNCS Science 1796), SPRINGER-VERLAG BERLIN, 195-202, Apr. 1999, Peer-reviwed, Invited, Visual marks play critical roles in the physical world, but their use in the cyber world is limited because there they are easy to forge, tamper with and copy onto unauthorized data. This paper therefore describes a new type of visual marks that are secure because digital signatures are embedded in them and that can be used with a wide variety of cyber-world systems. It also shows the effectiveness of these marks by describing their application to WWW site authentication.
    International conference proceedings, English
  • Internet-marks: Reliable visual marks for the Web site authentication
    S Susaki; H Yoshiura; Y Nagai; H Toyoshima; R Sasaki; S Tezuka
    DIGITAL CONVERGENCE FOR CREATIVE DIVERGENCE, VOL I, INT COUNCIL COMPUTER COMMUNICATION, 466-472, 1999, Peer-reviwed, Various visual marks are attached to Web pages on WWW system. These marks are useful to convey much information briefly because Web page visitors can expand various images based on their knowledge once visitors recognize marks. However these marks are unsecured because it is easy to forge, tamper with and copy into unauthorized Web page. In this paper, we propose Internet-Marks: reliable visual marks for the Web site authentication. Internet-Marks enable to detect illegal acts by the combination of traditional digital signature and digital watermarking techniques. We also show the effectiveness of Internet-Marks by describing their application to Web site filtering and search.
    International conference proceedings, English
  • 電子透かしとその応用
    吉浦裕; 金野千里; 黒須豊
    日立評論, 80, 7, 511-516, Jul. 1998, Invited
    Research institution, Japanese
  • VSP: A Digital Watermark Method for Motion Picture Copyright Protection
    H. Yoshiura; I. Echizen; T. Arai; H. Kimura; T. Takeuchi
    IEEE International Conference on Consumer Electronics, 338-339, Jun. 1998, Peer-reviwed
    International conference proceedings, English
  • Secure fingerprinting using public-key cryptography
    H Yoshiura; R Sasaki; K Takaragi
    6th International Workshop on Security Protocols (Springer LNCS 1550), SPRINGER-VERLAG BERLIN, 83-94, Apr. 1998, Peer-reviwed, Invited, Fingerprinting is a process that embeds identifiers of the buyers of data into the data. It enables buyers who copied and redistributed data illegally to be identified from the redistributed data. An essential requirement for fingerprinting is the prevention of false accusations, i.e., honest buyers not be accused even when fraud has been committed by merchants and third parties. Previous fingerprinting methods either could not meet this requirement or met it at a high cast, such as that associated with the use of independent servers for fingerprinting.
    This paper proposes to embed buyers' digital signatures into data and to identify illegal buyers by verifying signatures in the redistributed data. The security of the signature verification is discussed assuming that the redistributed data have been modified by the illegal buyers. The paper shows that the proposed method can prevent false accusations at an acceptable cost.
    International conference proceedings, English
  • An Evaluation Point Culling Algorithm for Radio Propagation Simulation based on the Imaging Method
    S. Takahashi; K. Ishida; H. Yoshiura; A. Nakagoshi
    Virginia Tech's 5th Symposium on Wireless Personal Communications, 1-11, May 1995, Peer-reviwed
    International conference proceedings, English
  • A Case-Based Reasoning Method Using Parially Similar Cases by Decomposing Problem and Cases
    吉浦裕
    Transactions of Information Processing Society of Japan, 32, 5, 626-634, May 1991, Peer-reviwed
    Scientific journal, Japanese
  • マルチパラダイム型知識処理言語における対立概念の融合方式
    中所武司; 増位庄一; 芳賀博英; 吉浦裕
    人工知能学会誌(査読論文), 4, 1, 77-87, Jan. 1989, Peer-reviwed, A language supporting multiparadigms is required for development of expert systems because various models of inference processes and various representation of knowledge are necessary to describe expertise as naturally as experts use. In the language design, however, it is difficult to amalgamate conflicting concepts among paradigms without metamorphosing pure semantics of these paradigms. This paper presents a solution of this problem. First, a two-layer model is lntroduced for describing expertise. In the upper layer, a global structure of a system is described in an object-oriented paradigm. In the lower layer, expertise is modularized and represented in such paradigms as frame, production system and predicate logic. This two-layer model is effective to keep pure semantics of each paradigm. Secondly, conflicting concepts between an object-oriented paradigm and other paradigms are amalgamated as follows: (1) For introducing a frame paradigm, slots and methods are equalized. They become visible and are inherited to descendant objects only by declaring as public. (2) For introducing a production system paradigm, a cooperative inference system with a data-driven model and a message-driven model is built while limiting data-driven inference to a virtual sub-world called a meeting room. (3) For introducing a predicate logic paradigm, closed world assumption is kept by inheriting a group of methods written in Prolog as a closed Prolog database. This language was developed as an expert system building tool (ES/X90) and runs on Hitachi workstation 2050. It has already been applied to development of several expert systems.
    Scientific journal, Japanese
  • 日本語質問応答システムにおける質問のあいまい性を解消する意味解析方式
    吉浦裕; 片山恭紀; 中西邦夫; 平沢宏太郎
    情報処理学会論文誌, Information Processing Society of Japan (IPSJ), 27, 3, 321-329, Mar. 1986, Peer-reviwed, 我々は 情報システムの操作法を 自然言語で問い合わせることのできる負問応答システムを開発した.本論文は この質問応答システムの日本語処理方式について述べる本研究に先だって ユーザの質問例を分析した結果 情報システムに実在する文書や画像等の具体的な操作法を問う質問のほか 情報システムのコマンドに関する一般的な質問が見いだされた.前者の質問では 文中の語句は実在する事物を指示するのに対し 後者では 架空の事物を指示する場合がある.したがって 日本語処理においては 少なくとも2種類の指示関係を扱う必要がある.ところが 従来の日本語処理方式は 基本的に 実在物を指示する場合しか対応できない.我々は 語句と事物との指示関係を分析し 工学的立場から これを七つのタイプに分類した.また 各タイプの関係が現れるための条件を見いだした.さらに この条件を用いて 質問文中の語句の指示物を決定する方式を開発した.これにより 前記の課題をほぼ解決することができた.指示関係のタイプ およびタイプ出現の条件が質問の対象となる情報システムに依存しないことから本方式は様々な質問応答システムに適用可能である"
    Scientific journal, Japanese
  • ワークステーションの操作法を自然な日本語で問い合わせる知的ガイダンスシステム
    片山恭紀; 平沢宏太郎; 中西邦夫; 吉浦裕
    日立評論,, 日立評論社, 67, 12, 57-60, Dec. 1985
    Research institution, Japanese
  • TOP-DOWN CONSTRUCTION OF 3-D MECHANICAL OBJECT SHAPES FROM ENGINEERING DRAWINGS
    H YOSHIURA; K FUJIMURA; TL KUNII
    COMPUTER, IEEE COMPUTER SOC, 17, 12, 32-40, 1984, Peer-reviwed
    Scientific journal, English

MISC

  • より多くの学生にセキュリティ業界に進んでもらうには
    吉浦裕
    日本ネットワークセキュリティ協会, 31 May 2019, 日本ネットワークセキュリティ協会(JNSA)会報誌JNSAPress(巻頭言), 46, 1-1, Japanese, Invited, Others
  • ユビキタス情報社会のプライバシーとその保護技術
    吉浦裕; 越前功
    Sep. 2010, 情報処理学会誌, 51, 9, 1136-1143, Japanese, Invited, Introduction other
  • 通信・配信技術とビジネスモデル
    吉浦裕; 佐々木良一
    ディジタルコンテンツの配信ビジネスは,配信にかかわる技術及び著作権保護などの関連技術に大きく依存する.そこで本稿では,配信技術の例としてP2Pを取り上げ,コンテンツ配信における技術とビジネスの関係について解説する.最初に,P2Pネットワークの参加者が何を提供するかという視点からP2P技術を分類し,ビジネスへの影響を分析する.次に,著作権保護の観点から,P2P技術の問題点を明らかにし,サービス管理者が存在する場合と存在しない場合について,可能な対策を論じる., The Institute of Electronics, Information and Communication Engineers, Feb. 2007, 電子情報通信学会誌, 90, 2, 95-100, Japanese, Invited, Introduction other, 0913-5693, 110006163314, AN1001339X
  • 著作権保護-不正コピー防止技術を中心として-
    越前功; 吉浦裕
    Feb. 2003, 月刊バーコード, 16, 2, 62-67, Japanese, Invited, Introduction other
  • 正当性の検証が可能な図形マークとそのWebサイト認証への応用
    吉浦裕
    The Institute of Image Electronics Engineers of Japan, May 2001, 画像電子学会誌, 30, 3, 306-312, Japanese, Invited, Introduction other, 130004437238
  • 電子透かし
    吉浦裕
    Apr. 2001, 計測自動制御学会誌, 40, 4, 328-328, Japanese, Invited, Introduction other, 0453-4662, 10006393966, AN00072406
  • 電子透かし技術の現状と課題
    吉浦裕
    Jun. 2000, INTEROP 2000 Tokyo Conference, 409-411, Japanese, Invited, Introduction other, 10012283164
  • 事例ベース推論
    吉浦裕
    The Institute of Electrical Engineers of Japan, Dec. 1992, 電気学会誌, 112, 12, 989-992, Japanese, Invited, Introduction other, 0020-2878, 10006734493, AN00151717
  • 計算機室のレイアウト
    吉浦裕
    Jul. 1992, 人工知能学会誌, 7, 4, 592-596, Japanese, Invited, Introduction other, 0912-8085, 110002807602, AN10067140
  • 自然な日本語でワークステーションの操作法を尋ねられる質問応答システム
    片山恭紀; 中西邦夫; 吉浦裕; 平沢宏太郎
    日経BP社, Sep. 1985, 日経エレクトロニクス, 377, 225-243, Japanese, Introduction other, 0385-1680, 40002803227, AN0018467X
  • 機械翻訳,自然言語インターフェース
    吉浦裕
    情報処理学会, May 1985, コンピュートロール:Computer and application’s mook, 2, 10, 第4部第5章, Japanese, Introduction other, 20000806158

Books and other publications

  • ネットワークセキュリティ
    佐々木良一; 安田なお; 吉浦裕
    Scholarly book, Japanese, Editor, オーム社, Mar. 2014
  • セキュリティマネジメント学~理論と事例~
    吉浦裕
    Scholarly book, Japanese, Contributor, 第2章 工学的アプローチ, 共立出版, Jul. 2011
  • Studies in Computational Intelligence
    I. Echizen; Y. Atomori; S. Nakayama; H. Yoshihura
    English, Joint work, Dual-plane Correlation-based Video Watermarking for Immunity to Rotation, Scale, Translation, and Random Distortion, Springer, Jul. 2009
  • Long-Term and Dynamical Aspects of Information Security: Emerging Trends in Information and Communication Security
    Takaaki Yamada; Isao Echizen; Satoru Tezuka; Hiroshi Yoshiura; Norihisa Komoda
    English, Joint work, Evaluation of PC-based Real-Time Watermarking System for Long-Term Video Preservation, Nova Science Publishers, Dec. 2007
  • Intelligent Multimedia Data Hiding
    Isao Echizen; Yasuhiro Fujii; Takaaki Yamada; Satoru Tezuka; Hiroshi Yoshiura
    English, Joint work, Adaptive embedding and detection for improved video watermarking, Springer, Jun. 2007
  • Advances in Information and Computer Security (Proceedings of 1st International Workshop on Security))
    Hiroshi Yoshiura; Kouichi Sakurai; Kai Rannenberg; Yuko Murayama; Shinici Kawamura
    English, Editor, Springer, Oct. 2006
  • Security and Privacy in the Age of Ubiquitous Computing (Proceedings of 20th International Information Security Conference)
    Ryoichi Sasaki; Shihan Qing; Eiji Okamoto; Hiroshi Yoshiura
    English, Editor, Springer, May 2005
  • 情報セキュリティハンドブック(分担執筆:4編5章「不正コピー対策」担当)
    吉浦裕
    Japanese, Contributor, オーム社, Nov. 2004
  • Networked Consumer Electronics and Technologies
    吉浦裕
    Japanese, Contributor, セキュリティpp.69-94, Shokabo, Oct. 2002
  • Information Security in Internet Era
    佐々木良一; 吉浦裕; 手塚悟; 三島久典
    Japanese, Joint work, 4章 コピーを防止する電子透かし技術, Kyoritsu Publising, Sep. 2000
  • Internet Commerce
    吉浦裕
    Japanese, Contributor, 不正コピーを防止する電子透かし技術pp.83-91、消費者保 護のためのインターネット・マークpp.92-100, Kyoritsu Publishing, Feb. 2000
  • Expert System Evaluation Manual
    吉浦裕
    Japanese, Contributor, 知識ベースの保守性評価pp.89-96、利用形態別評価項目pp.144-152、海外文献調査報告pp.280-281, Ohmsha, Jun. 1992

Lectures, oral presentations, etc.

  • 機械学習をプライバシーへの攻撃に用いたら何ができるか ~ モデルおよび移動履歴とSNSを対象とする評価実験 ~
    吉浦裕
    電子情報通信学会 第160回PRMU研究会・第56回BioX研究会合同研究会, Invited
    18 Mar. 2019
  • A study on the infected traffic detection method focused on the similarity between malware samples (poster session)
    Ayaka Samejima; Mitsuhiro Hatada; Hiroshi Yoshiura; Masatsugu Ichino
    Poster presentation, English, International Workshop on Security, IPSJ and IEICE, Tokyo, International conference
    12 Sep. 2016
  • ソーシャルネットワークのプライバシーと個人の特定
    吉浦 裕
    Invited oral presentation, Japanese, 平成25年度第5回EMM研究会, Invited, 電子情報通信学会 マルチメディア情報ハイディング・エンリッチメント(EMM)研究会, Domestic conference
    27 Jan. 2014
  • Effect of External Information on Anonymity and Transparency
    Hiroshi Yoshiura
    Invited oral presentation, English, Invited, National Institute of Informatics, Hayama, International conference
    07 Aug. 2013
  • 工学的アプローチ(25周年記念出版講演の部)
    吉浦裕
    Invited oral presentation, Japanese, 学術講演会, Invited, 日本セキュリティ・マネジメント学会
    Nov. 2011
  • 自然言語文からのプライバシー情報検知システム-自然言語情報の開示制御技術DCNLの実現(1)-
    渡辺夏樹; 池上未希; 片岡春乃; 吉浦裕
    Oral presentation, Japanese, 情報処理学会研究報告2009-CSEC-44
    2009
  • プライバシー情報検知のための知識の準備と学習-自然言語情報の開示制御技術DCNLの実現(2)―
    水谷桂子; 片岡春乃; 吉浦裕
    Oral presentation, Japanese, 情報処理学会研究報告2009-CSEC-44
    2009
  • 自然言語情報の開示制御技術の実現に向けて-プライバシー情報検知手法-
    片岡春乃; 渡辺夏樹; 水谷桂子; 吉浦裕
    Oral presentation, Japanese, 情報処理学会コンピュータセキュリティ研究報告2008-CSEC-40
    2008
  • 模倣コンテンツの特性に基づくフィッシング検知方式の実装と評価
    中山心太; 内海彰; 吉浦裕
    Oral presentation, Japanese, 情報処理学会研究報告,2008-CSEC-40
    2008
  • ビジネスと生活を結ぶセキュリティ
    吉浦裕
    Invited oral presentation, Japanese, 連続セミナー2007・第3回「ビジネスと生活を結ぶセキュリティ」, Invited, 情報処理学会
    Jul. 2007
  • 意味と面白さを維持する自然言語情報の開示制御技術の提案
    片岡春乃; 内海彰; 広瀬友紀; 吉浦裕
    Oral presentation, Japanese, 情報処理学会研究報告2007-CSEC-36
    2007
  • 電子透かし検出に適した誤り訂正符号の拡張方式
    藤井康広; 越前功; 山田隆亮; 手塚悟; 吉浦裕
    Oral presentation, Japanese, 電子情報通信学会 暗号と情報セキュリティシンポジウム, 神戸
    Jan. 2005
  • Impact of the key self-compromise strategy in a bargaining game
    宮崎邦彦; 岩村充; 松本勉; 佐々木良一; 吉浦裕; 松木武; 秦野康生
    Oral presentation, Japanese, 情報処理学会コンピュータセキュリティシンポジウム'04
    Oct. 2004
  • 開示条件を制御可能な電子文書墨塗り技術
    宮崎邦彦; 岩村充; 松本勉; 佐々木良一; 吉浦裕; 手塚悟; 今井秀樹
    Oral presentation, Japanese, 電子情報通信学会 暗号と情報セキュリティシンポジウム, 仙台
    Jan. 2004
  • 電子文書墨塗り問題
    宮崎邦彦; 洲崎誠一; 岩村充; 松本勉; 佐々木良一; 吉浦裕
    Others, Japanese, 情報処理学会コンピュータセキュリティ研究会, 2003-CSEC-22
    Jul. 2003
  • 電子透かし技術とそのブロードバンドサービスへの応用
    吉浦裕
    Invited oral presentation, Japanese, Invited, 電子情報通信学会・通信方式研究会・第14回情報伝送と信号処理ワークショップ
    Nov. 2001
  • コンテンツ流通サービスの技術課題
    吉浦裕
    Invited oral presentation, Japanese, Invited, 情報処理学会・連続セミナー・第3回「コンテンツ流通サービス」
    Oct. 2001
  • 情報セキュリティ技術の動向-セキュアな次世代情報システムに向けて-
    吉浦裕
    Invited oral presentation, Japanese, Invited, 電子情報通信学会・第12回データ工学ワークショップ
    Mar. 2001
  • 電子透かしとその応用
    吉浦裕
    Invited oral presentation, Japanese, Invited, 計測自動制御学会・第17回産業システムシンポジウム「日本の優れたIT技術」
    Sep. 2000
  • 電子透かし
    吉浦裕
    Others, Japanese, 関西情報センター,EC(電子商取引)先端技術の実用化に関する調査研究委員会
    Mar. 2000
  • Digital Watermarking Techniques for Contents Distribution (Invited)
    H. Yoshiura
    Invited oral presentation, English, 3th Symposium on Internet Services and Mobility, International conference
    Oct. 1999
  • 著作権保護機能つきディジタルカメラの試作
    森藤元; 安細康介; 吉浦裕; 金野千里
    Others, Japanese, 情報処理学会コンピュータセキュリティシンポジウム'99
    Oct. 1999
  • Internet-Marks: Clear, Secure, and Portable Visual Marks for the Cyber Worlds (Invited)
    H. Yoshiura; S. Susaki; Y. Nagai; T. Saitoh; H. Toyoshima; S. Tezuka; R. Sasaki
    Invited oral presentation, English, 7th Cambridge International Workshop on Security Protocols (LNCS 1796), 7th Cambridge International Workshop on Security Protocols (LNCS 1796), International conference
    Apr. 1999
  • 日立の電子透かしについて
    吉浦裕
    Others, Japanese, ソフトウェア流通センター(文化庁),著作物の円滑な権利処理システム構築の推進方策に関する調査研究委員会
    Mar. 1999
  • 輪郭保存に基づく電子透かしの画質向上方式
    吉浦裕; 越前功; 安細康介; 田口順一; 佐々木良一; 黒須豊
    Others, Japanese, 情報処理学会コンピュータセキュリティ研究会99-CSEC-4
    Mar. 1999
  • エッジ保存型電子透かし方式
    越前功; 吉浦裕; 田口順一; 佐々木良一
    Others, Japanese, 情報処理学会コンピュータセキュリティシンポジウム'98
    Oct. 1998
  • Secure Fingerprinting Using Public-Key Cryptography (Invited)
    H. Yoshiura; R. Sasaki; K. Takaragi
    Invited oral presentation, English, 6th Cambridge International Workshop on Security Protocols (LNCS1550), International conference
    Apr. 1998
  • 公開鍵暗号に基づくセキュア電子透かしシステム
    吉浦裕; 宝木和夫; 佐々木良一
    Others, Japanese, 電子情報通信学会1997年基礎・境界ソサイエティ大会シンポジウム
    Sep. 1997
  • イメージ法を用いた電波伝播シミュレーションの高速化
    高橋賢; 石田和人; 吉浦裕
    Others, Japanese, 電子情報通信学会交換システム研究会
    Nov. 1994
  • 幾何学的推論を用いた無線基地局の屋内配置システム
    吉浦裕; 広沢誠; 水原登; 苗村幹也
    Others, Japanese, 電子情報通信学会交換システム・情報ネットワーク合同研究会
    Apr. 1994
  • 事例ベース推論を用いた計算機室レイアウト用エキスパートシステム
    吉浦裕
    Oral presentation, Japanese, 日本機械学会第2回設計工学・システム部門講演会
    Dec. 1992
  • 計算機室のレイアウト
    吉浦裕
    Invited oral presentation, Japanese, 人工知能学会・人工知能セミナー「事例ベース推論」, International conference
    Apr. 1992
  • 計算機室のレイアウト
    吉浦裕
    Invited oral presentation, Japanese, 人工知能学会・人工知能セミナー「事例ベース推論」, International conference
    Apr. 1992
  • 部分問題間の干渉解析に基づく事例ベース推論方式
    吉浦裕
    Oral presentation, Japanese, 計測自動制御学会知能システムシンポジウム
    Mar. 1992
  • 部分問題間の干渉解析に基づく事例ベース推論方式
    吉浦裕
    Oral presentation, Japanese, 計測自動制御学会知能システムシンポジウム, 計測自動制御学会知能システムシンポジウム
    Mar. 1992
  • 知識ベースの保守性評価,利用形態別評価項目
    吉浦裕
    Others, Japanese, 日本情報処理開発協会(通商産業省),エキスパートシステム評価ガイドラインの研究開発報告書
    Mar. 1990

Courses

  • コミュニケーションネットワーク
    電気通信大学
  • 総合コミュニケーション科学
    電気通信大学
  • 学域特別講義B(融合領域の最新動向B)
    電気通信大学
  • 暗号・情報セキュリティ
    The University of Electro-Communications
  • セキュリティ情報学実験
    The University of Electro-Communications
  • コンテンツセキュリティ特論
    The University of Electro-Communications
  • コンテンツセキュリティ
    The University of Electro-Communications
  • メディアネットワーク
    The University of Electro-Communications

Affiliated academic society

  • Japan Society of Artificial Intelligence
  • システム制御情報学会
  • IEEE
  • Japan Society of Security Management
  • The Institute of Electronics, Information and Communication Engineers
  • Information Processing Society of Japan

Research Themes

  • Detecting, predicting, and deterring fake news using information-sharing models
    吉浦 裕; 佐藤 寛之
    Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research, Kyoto Tachibana University, Grant-in-Aid for Scientific Research (C), 情報共有モデルを用いたフェイクニュース対策に関し,下記の成果を得た. (1)誤り情報の存在を前提として,ネットワークのユーザによる情報共有をシミュレーションするモデルAAT(Autonomous Adaptive Tuning)を取り上げ,単なる誤りではなく意図的な嘘の存在を前提とするモデルFDM(Fake News Dissemination Model)を検討した.具体的には,ユーザ間の不信度の導入,信頼度と不信度のユーザペア毎の設定,悪意のあるユーザによる信頼度と不信度の詐称,影響力のあるユーザへのなりすましとアカウント乗っ取りによる誤り情報の意図的な発信をAATに追加し,それらの影響をシミュレーションにより調査した.その結果,ユーザの信頼性が真に低いことよりも信頼性の低さを高く詐称することの影響が大きいこと,なりすましの方が乗っ取りよりも容易かつ効果的な攻撃であり,1%のユーザがなりすまされることで80%のユーザがニュースの真偽を判断不能になることを明らかにした. (2)上記のFDMを用いて,フェイクニュースを検知すると同時に,各ユーザiがニュースを信じる度合(Pi),他ユーザを信じる度合(ti),疑う度合(di)を推定する手法を提案した.提案法は,Pi, ti, diおよび各ニュースの真偽をパラメータとしてAATを実行したときのシミュレーション結果が実データに最も近くなるようにこれらのパラメータを最適化する.FDMと実データの差が最小となる時のパラメータ値が,ニュースの真偽およびユーザの内面の推定値となる. (3)正しいニュース1件とフェイクニュース1件の実データを用いて,提案法の予備評価を行い,これらの例ではフェイクニュースを正しく検知できた.また,フェイクニュースの共有時には,ニュースを信じる度合,友人を信じる度合,疑う度合のユーザ間分散が大きいことを明らかにした., 21K11883
    01 Apr. 2021 - 31 Mar. 2024
  • 機械学習による企業行動構造の分析の研究
    白田由香利; 吉浦裕
    基盤研究(B), Coinvestigator
    Apr. 2020 - Mar. 2024
  • 匿名加工情報データセット間の統合利用手法に係る調査
    吉浦裕
    Principal investigator
    Apr. 2022 - Mar. 2023
  • 匿名加工情報データセット間の統合利用手法に係る調査
    吉浦裕
    Principal investigator
    Apr. 2021 - Mar. 2022
  • 匿名化技術への体系的な個人特定攻撃および防御手法の研究
    Hiroshi Yoshiura
    電気通信大学, 基盤研究(C), Principal investigator, 個人情報の活用とプライバシーの保護を両立する手段として、匿名化が期待されている。しかし、匿名性の保証範囲、すなわち、どのような条件下でどこまで匿名性が維持できるかは明らかでない。その原因は、匿名性を破る攻撃の研究とそれに対する防御の研究が共に少なく、匿名化技術の安全性が充分に分析されていない点にある。本提案では、匿名化技術の安全性分析の基礎として、匿名情報から個人を特定する攻撃の研究を中心課題とし、その知見に基づいて、個人特定の防止手法をさらに研究する。個人特定攻撃は、実データを用いて、匿名情報と実名情報の照合の観点から手法を開拓する。個人特定の防止は、この照合を困難にする観点から検討する。
    Apr. 2014 - Mar. 2017
  • 情報を保護しながら活用する秘匿計算の研究ープログラム変換を用いた計算の効率化ー
    吉浦裕
    電気事業普及財団, 研究助成, Principal investigator, 個人情報の活用による高度な電気通信サービスや企業情報を遠隔サーバに預けるクラウドサービスが発展する一方、これらの情報の保護が問題になっている。この問題を解決する技術として、情報を秘匿したままの状態で情報処理を行う秘匿計算が期待されているが、処理効率が低く、特殊なプログラミングを必要とするため、実用化に至っていない。そこで、秘匿計算の特殊性を考慮せずに開発したプログラムを効率的な秘匿計算プログラムに自動変換する技術を研究し、効率と開発容易性の向上を目指す。
    01 Apr. 2014 - 31 Mar. 2016

Industrial Property Rights

  • Digital signal recording/reproducing apparatus, receiving apparatus (登録番号・日付は、本表の右端の列に記載。以下同様)
    Patent right, Toru Matsumura, Hiroshi Yoshiura, Hiroo Okamoto, Hiroyuki Kimura, 11/400,675, Date applied: 07 Apr. 2006, 8,346,061, Date issued: 01 Jan. 2013
  • Reproducing apparatus, recording apparatus and display apparatus (本表では、日米以外の登録情報は充分にメンテできておりません。)
    Patent right, Osamu Kawamae, Toshifumi Takeuchi, Hiroyuki Kimura, Takao Arai, Hiroshi Yoshiura, 13/307,110, Date applied: 30 Nov. 2011, 8,311,219, Date issued: 13 Nov. 2012
  • 認証方法、記録装置及び再生装置 (登録番号・日付は、本表の右端の列に記載。以下同様)
    Patent right, 川前治, 竹内敏文, 荒井孝雄, 木村寛之, 吉浦裕, 特願2011-005399, Date applied: 14 Jan. 2011, 特開2011-138601, Date announced: 14 Jul. 2011, P5083420, Date issued: 14 Sep. 2012
  • Reproducing apparatus, recording apparatus and display apparatus (本表では、日米以外の登録情報は充分にメンテできておりません。)
    Patent right, Osamu Kawamae, Toshifumi Takeuchi, Hiroyuki Kimura, Takao Arai, Hiroshi Yoshiura, 12/840,726, Date applied: 21 Jul. 2010, 8,074,071, Date issued: 06 Dec. 2011
  • 暗号化署名付きデジタルデータの有効性を回復する方法とシステム
    Patent right, 宮崎邦彦, 吉浦裕, 洲崎誠一, 佐々木良一, 宝木和夫, 豊島久, 松木武, 特願2008-035457, Date applied: 18 Feb. 2008, 特開2008-136247, Date announced: 12 Jun. 2008, P4853479, Date issued: 04 Nov. 2011
  • 認証方法
    Patent right, 川前治, 竹内敏文, 荒井孝雄, 木村寛之, 吉浦裕, 特願2009-276002, Date applied: 04 Dec. 2009, 特開2010-146692, Date announced: 01 Jul. 2010, P4770977, Date issued: 01 Jul. 2011
  • 認証方法、再生方法及びデータ処理装置
    Patent right, 川前治, 竹内敏文, 荒井孝雄, 木村寛之, 吉浦裕, 特願2009-051470, Date applied: 05 Mar. 2009, 特開2009-134860, Date announced: 18 Jun. 2009, P4645748, Date issued: 17 Dec. 2010
  • Reproducing apparatus, recording apparatus and display apparatus
    Patent right, Osamu Kawamae, Toshifumi Takeuchi, Hiroyuki Kimura, Takao Arai, Hiroshi Yoshiura, 11/968,883, Date applied: 03 Jan. 2008, 7,779,256, Date issued: 17 Aug. 2010
  • Method and a device for sterilizing downloaded files
    Patent right, Kazuo Takaragi, Seiichi Domyo, Hiroshi Yoshiura, 11/514,161, Date applied: 01 Sep. 2006, 7,711,714, Date issued: 04 May 2010
  • Method and system for recovering the validity of cryptographically signed digital data
    Patent right, Kunihiko Miyazaki, Hiroshi Yoshiura, Seiichi Susaki, Ryoichi Sasaki, Kazuo Takaragi, Hisashi Toyoshima, Takeshi Matsuki, 11/199,615, Date applied: 08 Aug. 2005, 7,694,126, Date issued: 06 Apr. 2010
  • 電子透かし情報の検出方法
    Patent right, 安細康介, 越前功, 吉浦裕, 特願2002-114803, Date applied: 17 Apr. 2002, 特開2003-309826, Date announced: 31 Oct. 2003, P4344504, Date issued: 17 Jul. 2009
  • 記録再生方法及び記録再生装置
    Patent right, 松村透, 吉浦裕, 岡本宏夫, 木村寛之, 特願2000-179374, Date applied: 09 Jun. 2000, 特開2002-010189, Date announced: 11 Jan. 2002, P4332284, Date issued: 26 Jun. 2009
  • Electronic document authenticity assurance method and electronic document disclosure system(米国特許7,526,645)
    Patent right, Miyazaki, Kunihiko (Yokohama, JP, Iwamura, Mitsuru (Tokyo, JP, Matsumoto, Tsutomu (Yokohama, JP), Sasaki, Ryoichi (Fujisawa, JP), Yoshiura, Hiroshi (Tokyo, JP), Aoshima, Hirokazu (Sagamihara, JP), Noyama, Hideo (Yokohama, JP), Susaki, Seiichi (Yokohama, JP), Matsuki, Takeshi (Musashino, J, 10/787,262, Date applied: 27 Feb. 2004, 7,526,645, Date issued: 28 Apr. 2009
  • Method of watermarking for binary images(米国特許7,499,565)
    Patent right, Fujii, Yasuhiro (Fujisawa, JP), Nakano, Kazunori (Fuji, JP), Echizen, Isao (Yokohama, JP), Yoshiura, Hiroshi (Tokyo, J, 10/841,842, Date applied: 10 May 2004, 7,499,565, Date issued: 03 Mar. 2009
  • 電子文書およびこれの印刷媒体の真正性管理方法およびシステム、ならびにプログラム、記録媒体
    Patent right, 猪股宏文, 松木武, 吉浦裕, 野山英郎, 特願2002-268080, Date applied: 13 Sep. 2002, 特開2004-109172, Date announced: 08 Apr. 2004, P4245883, Date issued: 16 Jan. 2009
  • Method and System for Content Control(米国特許7,478,432)
    Patent right, Echizen, Isao, Yoshiura, Hiroshi, Miyazaki, Kunihiko Anzai, Kousuke, Taguchi, Jun'ichi, Nakano, Kazunori, Okeya, Katsuyuki, 10/066,713, Date applied: 06 Feb. 2002, 7,478,432, Date issued: 13 Jan. 2009
  • 有効性を確認可能なログエントリを生成するシステム,および,ログエントリの有効性を確認するシステム
    Patent right, 宮崎邦彦, 吉浦裕, 洲崎誠一, 佐々木良一, 宝木和夫, 豊島久, 松木武, 特願2002-059674, Date applied: 06 Mar. 2002, 特開2002-335241, Date announced: 22 Nov. 2002, P4206674, Date issued: 31 Oct. 2008
  • Method for verifying a digital signature(米国特許7441115)
    Patent right, Miyazaki Kunihiko, Omoto Narihiro, Itoh Shinji, Tanimoto Kouichi, Yoshiura Hiroshi, -, 7441115, Date issued: 21 Oct. 2008
  • 二値画像用電子透かし方法,P4193665
    Patent right, 藤井康広, 中野和典, 越前功, 吉浦裕, 特願2003-343917, Date applied: 02 Oct. 2003, 特開2004-289783, Date announced: 14 Oct. 2004, P4193665, Date issued: 03 Oct. 2008
  • 電子文書の非開示処理システム
    Patent right, 宮崎邦彦, 岩村充, 松本勉, 佐々木良一, 吉浦裕, 青島弘和, 野山英郎, 洲崎誠一, 松木武, P2007-5300, Date applied: 15 Jan. 2007, P2007-143184A, Date announced: 07 Jun. 2007, P4144645, Date issued: 27 Jun. 2008
  • Reproducing apparatus, recording apparatus and display apparatus(米国特許7379547)
    Patent right, Osamu Kawamae, Toshifumi Takeuchi, Hiroyuki Kimura, Takao Arai, Hiroshi Yoshiura, -, 7379547, Date issued: 27 May 2008
  • 計算機システム
    Patent right, 宮崎邦彦, 伊東信治, 吉浦裕, 宝木和夫, 荒井正人, 豊島久, P2001-125224, Date applied: 24 Apr. 2001, P4089171, Date issued: 07 Mar. 2008
  • Data transmission method for embedded data, data transmitting and reproducing apparatuses and information recording medium therefore(米国特許7317738)
    Patent right, Osamu Kawamae, Toshifumi Takeuchi, Hiroshi Yoshiura, Takao Arai, -, 7317738, Date issued: 08 Jan. 2008
  • 電子クーポンシステムおよび電子クーポン発券・検証方法
    Patent right, 10-133550, Date applied: 15 May 1998, P4055873, Date issued: 21 Dec. 2007
  • Method of detecting digital watermark information(米国特許7310428)
    Patent right, Kousuke Anzai, Isao Echizen, Hiroshi Yoshiura, -, 7310428, Date issued: 18 Dec. 2007
  • Method and apparatus for using contents(米国特許7293294)
    Patent right, Hiromi Ukai, Shigeki Hirasawa, Kousuke Anzai, Isao Echizen, Hiroshi Yoshiura, Masataka Okayama, Shuichi Tago, -, 7293294, Date issued: 06 Nov. 2007
  • Data transmission method for embedded data, data transmitting and reproducing apparatuses and information recording medium therefore(米国特許7248607)
    Patent right, Osamu Kawamae, Toshifumi Takeuchi, Hiroshi Yoshiura, Takao Arai, -, 7248607, Date issued: 24 Jul. 2007
  • 認定システムおよび認証方法
    Patent right, P2001-332701, Date applied: 30 Oct. 2001, 3987710, Date issued: 20 Jul. 2007
  • データ処理方法、データ処理装置
    Patent right, P2001-8431, Date applied: 17 Jan. 2001, P3984792, Date issued: 13 Jul. 2007
  • 認証方法、データ処理装置
    Patent right, 川前治, 竹内敏文, 荒井孝雄, 木村寛之, 吉浦裕, 平11-102153, Date applied: 09 Apr. 1999, P3984749, Date issued: 13 Jul. 2007
  • ハイパーメディアドキュメントの提示方法、ブラウザ装置およびハイパーメディアドキュメント作成支援装置
    Patent right, 青島弘和, 宮崎邦彦, 吉浦裕, 鎌田英一, 上村一也, P2001-229149, Date applied: 30 Jul. 2001, P3979049, Date issued: 06 Jul. 2007
  • コンテンツ配信システム、コンテンツ再生装置、コンテンツ配信装置および記憶媒体
    Patent right, 越前功, 吉浦裕, 佐々木良一, 原野紳一郎, 永川忍, P2000-205511, Date applied: 06 Jul. 2000, P3973346, Date issued: 22 Jun. 2007
  • Electronic document, genuineness management method for print medium thereof, genuineness management system, program, and program recording medium (米国特許7224820)
    Patent right, Hirofumi Inomata, Takeshi Matsuki, Hiroshi Yoshiura, Hideo Noyama, -, 7224820, Date issued: 29 May 2007
  • Trusted computer system (米国特許7210043)
    Patent right, Kunihiko Miyazaki, Shinji Itoh, Hiroshi Yoshiura, Kazuo Takaragi, Masato Arai, Toshiaki Arai, Takeshi Matsuki, Hisashi Toyoshima, -, 7210043, Date issued: 24 Apr. 2007
  • Time stamp generating system (米国特許7200682)
    Patent right, Kunihiko Miyazaki, Seiichi Susaki, Kazuo Takaragi, Hiroshi Yoshiura, Takeshi Matsuki, Hisashi Toyoshima, Mitsuru Iwamura, Tsutomu Matsumoto, Ryoichi Sasaki, -, 7200682, Date issued: 03 Apr. 2007
  • 電子データの検索システムおよび方法(日本国特許3923247)
    Patent right, 吉浦裕, 青島弘和, -, 3923247, Date issued: 02 Mar. 2007
  • データ重畳方式とデータ再生方法,及び,情報埋め込み方法と情報読みだし方法(日本国特許3902863)
    Patent right, 越前功, 吉浦裕, 中村雅文, 荒井孝雄, -, 3902863, Date issued: 12 Jan. 2007
  • Method and apparatus for temporarily giving copy permission for reproducing digital signals (米国特許7151888)
    Patent right, Tooru Matsumura, Hiroshi Yoshiura, Hiroo Okamoto, Hiroyuki Kimura, -, 7151888, Date issued: 19 Dec. 2006
  • Method and a Device for Managing a Computer Network (米国特許7139759)
    Patent right, -, 7139759, Date issued: 21 Nov. 2006
  • Method and system for recovering the validity of cryptographically signed digital data (米国特許7134021)
    Patent right, Kunihiko Miyazaki, Hiroshi Yoshiura, Seiichi Susaki, Ryoichi Sasaki, Kazuo Takaragi, Hisashi Toyoshima, Takeshi Matsuki, -, 7134021, Date issued: 07 Nov. 2006
  • デジタル情報複製制限方法,デジタル情報複製制限装置およびデジタル情報記録装置(日本国特許3868643)
    Patent right, 吉浦裕, 木村寛之, 荻野晃, 守山義明, 菅谷和実, -, 3868643, Date issued: 20 Oct. 2006
  • Watermark information detection method (米国特許7113613)
    Patent right, -, 7113613, Date issued: 26 Sep. 2006
  • コンピュータネットワークシステムの管理方法(日本国特許3848684)
    Patent right, 宝木和夫, 道明誠一, 吉浦裕, -, 3848684, Date issued: 01 Sep. 2006
  • Method for Embedding Information and Extracting the Same (米国特許7065226)
    Patent right, Kousuke Anzai, Isao Echizen, Hiroshi Yoshiura, Shinobu Eikawa, -, 7065226, Date issued: 20 Jun. 2006
  • 電子透かし情報の埋め込み方法,および,電子透かし情報の埋め込み可能性分析方法(日本国特許3809323)
    Patent right, 越前功, 吉浦裕, 佐々木良一, 原野紳一郎, -, 3809323, Date issued: 26 May 2006
  • Digital Watermark Data Embedding Method, and Digital Watermark Data Embeddability Analyzing Method (米国特許7047412、欧州特許1170938号)
    Patent right, Isao Echizen, Hiroshi Yoshiura, Ryoichi Sasaki, Shinichiro Harano, Shinobu Eikawa, 09/798,928, Date applied: 06 Jul. 2000, 7047412, Date issued: 16 May 2006
  • Reproducing Apparatus, Recording Apparatus and Display Apparatus (米国特許7043645)
    Patent right, Osamu Kawamae, Toshifumi Takeuchi, Hiroyuki Kimura, Takao Arai, Hiroshi Yoshiura, -, 7043645, Date issued: 09 May 2006
  • 画像への情報添付方法および画像からの情報抽出方法(日本国特許3770732)
    Patent right, 吉浦裕, 洲崎誠一, 永井康彦, 篠田隆志, -, 3770732, Date issued: 17 Feb. 2006
  • Method and apparatus for restricting copy of digital information, and apparatus for recording ditigal informaition (米国特許6990584)
    Patent right, Hiroshi Yoshiura, Hiroyuki Kimura, Akira Ogino, Yoshiaki Moriyama, Kazumi Sugaya, 453710, Date applied: 03 Dec. 1999, 6990584, Date issued: 24 Jan. 2006
  • データの暗号化装置(日本国特許3746098)
    Patent right, 吉浦裕, 宝木和夫, 清水麻由子, -, 3746098, Date issued: 02 Dec. 2005
  • Method for extracting digital watermark information and method for judging bit value of digital watermark information (米国特許6970575)
    Patent right, Isao Echizen, Hiroshi Yoshiura, Yutaka Kurosu, Kousuke Anzai, 665020, Date applied: 22 Sep. 2003, 6970575, Date issued: 29 Nov. 2005
  • Method of judging digital watermark information (米国特許6959101)
    Patent right, Hiroshi Yoshiura, Kousuke Anzai, Yutaka Kurosu, 733293, Date applied: 12 Dec. 2003, 6959101, Date issued: 25 Oct. 2005
  • Additional Information Embedding Method, Additional Information Detecting Method, Additional Information Embedding Apparatus and Additional Information Detecting Apparatus (米国特許6954856号)
    Patent right, Takashi Kohashi, Akira Ogino, Hiroyuki Kimura, Hiroshi Yoshiura, Yoshiaki Moriyama, Kazumi Sugaya, -, 6954856, Date issued: 11 Oct. 2005
  • 電子透かし情報の埋め込み方法および抽出方法(日本国特許3706766)
    Patent right, 安細康介, 越前功, 吉浦裕, 永川忍, -, 3706766, Date issued: 05 Aug. 2005
  • コンテンツの配信方法(日本国特許3701148)
    Patent right, 吉浦裕, 佐々木良一, -, 3701148, Date issued: 22 Jul. 2005
  • 情報埋込み方法および装置(日本国特許3698901)
    Patent right, 吉浦裕, 越前功, 荒井孝雄, 木村寛之, -, 3698901, Date issued: 15 Jul. 2005
  • 電子透かし情報の抽出方法および電子透かし情報のビット値判定方法(日本国特許3678084)
    Patent right, 越前功, 吉浦裕, 安細康介, 黒須豊, -, 3678084, Date issued: 20 May 2005
  • Method and System for Distributing Multimedia Data with Management Information (米国特許6889211)
    Patent right, Hiroshi Yoshiura, Ryoichi Sasaki, -, 6889211, Date issued: 03 May 2005
  • コンテンツへの情報挿入及び検出方法(日本国特許3671723)
    Patent right, 安細康介, 越前功, 吉浦裕, 永川忍, -, 3671723, Date issued: 28 Apr. 2005
  • System and Method of Searching for Electronic Data (米国特許6879978)
    Patent right, Hiroshi Yoshiura, Horokazu Aoshima, Eiichi Kamada, Atsushi Kikuta, -, 6879978, Date issued: 12 Apr. 2005
  • 電子透かしを用いた情報埋め込み方法および抽出方法(日本国特許3656728)
    Patent right, 吉浦裕, 佐々木良一, 本城信輔, 高嶋洋一, 小川宏, 中村高雄, 佐野睦夫, -, 3656728, Date issued: 18 Mar. 2005
  • Copy Protection Apparatus and Method (米国特許6865553)
    Patent right, Hajime Morito, Hiroshi Yoshiura, Michael Roe, -, 6865553, Date issued: 08 Mar. 2005
  • Contents Rendering Control Method, Contents Reproducing Equipment, and Contents Distribution Equipment (米国特許6865677)
    Patent right, Isao Echizen, Hiroshi Yoshiura, Ryoici Sasaki, Shin-ichiro Harano, Shinobu Eikawa, -, 6865677, Date issued: 08 Mar. 2005
  • 付加情報重畳方法,付加情報検出方法, 付加情報重畳装置および付加情報検出装置 (日本特許3636915)
    Patent right, 小橋貴志, 荻野晃, 木村寛之, 吉浦裕, 守山義明, 菅谷和美, -, Date applied: 22 Feb. 1999, P3636915, Date issued: 14 Jan. 2005
  • 電子透かし情報の判定方法(日本国特許3630026)
    Patent right, 安細康介, 吉浦裕, 黒須豊, -, Date applied: 12 Aug. 1999, P3630026, Date issued: 24 Dec. 2004
  • Method and system for embedding information into contents(米国特許6826291号、欧州特許0901274号、韓国特許332033)
    Patent right, 10/073,010, Date applied: 03 Sep. 1997, 6826291, Date issued: 30 Nov. 2004
  • Method for Physical Individual Authentication and System Using the Same (米国特許6775775号)
    Patent right, -, 6775775,6775775, Date issued: 10 Aug. 2004
  • コンテンツデータ提供方法及びシステム及びコンテンツデータ提供プログラムを格納した記憶媒体(日本国特許3574074)
    Patent right, -, 3574074,3574074, Date issued: 09 Jul. 2004
  • 電子透かし画像処理方法(日本国特許3570213号)
    Patent right, -, 3570213,3570213, Date issued: 02 Jul. 2004
  • 画像処理方法およびそのプログラムが記憶された記憶媒体(日本国特許3570236)
    Patent right, -, 3570236,3570236, Date issued: 02 Jul. 2004
  • コンテンツ検索方法,その装置及びそのプログラムを格納した記憶媒体(日本国特許3565498)
    Patent right, -, 3565498,3565498, Date issued: 18 Jun. 2004
  • 電子透かし画像の認証方法(日本国特許3563270号)
    Patent right, -, 3563270,3563270, Date issued: 11 Jun. 2004
  • コンテンツ管理方法,その装置およびそのプログラム記録媒体(日本国特許3554529)
    Patent right, 佐々木良一, 吉浦裕, 本城信輔, 小川宏, -, 3554529, Date issued: 14 May 2004
  • Water-Mark Embedding Method and System(米国特許6728408号)
    Patent right, 144467,144467, Date applied: 01 Sep. 1998, 6728408,6728408, Date issued: 27 Apr. 2004
  • Control Method and Apparatus for Embedding Information in Data(米国特許6711276号、豪州特許735422号、カナダ特許2291383号、ロシア特許2219582号、韓国特許384959号、台湾特許455759号)
    Patent right, 09/453,578, Date applied: 03 Dec. 1998, 6711276, Date issued: 23 Mar. 2004
  • Steganographic System, Method, Program and Storage Medium Therefor(米国特許6707927号)
    Patent right, 542295,542295, Date applied: 04 Apr. 2000, 6707927,6707927, Date issued: 16 Mar. 2004
  • Method and Apparatus for Recording and Reproducing Electronic Watermark Information, and Recodring Medium(米国特許6690813号)
    Patent right, 150939,150939, Date applied: 21 May 2002, 6690813,6690813, Date issued: 10 Feb. 2004
  • Method and Apparatus for Recording and Reproducing Electronic Watermark Information, and Recording Medium(米国特許6519351号)
    Patent right, -, 6519351,6519351, Date issued: 10 Feb. 2004
  • Method of Judging Digital Watermarking Information(米国特許6665417号)
    Patent right, 452467,452467, Date applied: 02 Dec. 1999, 6665417,6665417, Date issued: 16 Dec. 2003
  • Recording Device(米国特許6658135号)
    Patent right, 432796,432796, Date applied: 03 Nov. 1999, 6658135,6658135, Date issued: 02 Dec. 2003
  • Method of Extracting Digital Watermark Information and Method of Judging Bit Value of Digital Watermark Information (米国特許6650763)
    Patent right, Isao Echizen, Hiroshi Yoshiura, Yutaka Kurosu, Kosuke Anzai, -, 6650763, Date issued: 18 Nov. 2003
  • Digital Watermark Image Processing Method (米国特許6584210)
    Patent right, Jun-ichi Taguchi, Hiroshi Yoshiura, Isao Echizen, Akira Maeda, Takao Arai, Toshifumi Takeuchi, -, 6584210, Date issued: 24 Jun. 2003
  • Method and Apparatus for Recording and Reproducing Electronic Watermark Information, and Recording Medium(米国特許6519351)
    Patent right, Hiroyuki Kimura, Takao Arai, Toshifumi Takeuchi, Hiroshi Yoshiura, -, 6519351, Date issued: 11 Feb. 2003
  • Method of Extracting Digital Watermark Information and Method of Judging Bit Value of Digital Watermark Information(米国特許6650763号)
    Patent right, 252415,252415, Date applied: 24 Sep. 2002, 6650763,6650763, Date issued: 18 Nov. 2002
  • Webページの真正性確認システム(日本国特許3184868号)
    Patent right, 2000-26118, Date applied: 16 Apr. 1998, 3184868, Date announced: 15 Aug. 2000, P2000-227756A, Date published: 15 Aug. 2000, 3184868, Date issued: 27 Apr. 2001
  • Method and Apparatus for Encrypting Data(米国特許6157720号,オーストラリア特許693733号,シンガポール特許79936号)
    Patent right, 6157720, Date applied: 26 Feb. 1997, 6157720, Date issued: 05 Dec. 2000
  • Digital Data Authentication Method (米国特許6131162号)
    Patent right, 6131162, Date applied: 04 Jun. 1998, 6131162, Date issued: 10 Oct. 2000
  • Data Compressio/Encryption Method and System(米国特許6122378号)
    Patent right, 6122378, Date applied: 13 Sep. 1995, 6122378, Date issued: 2000
  • Method of and Apparatus for Compressing and Decompressing Data and Data Processing Apparatus and Network System Using the Same(米国特許5872530号)
    Patent right, Seiichi Domyo, Hiroshi Yoshiura, Yoshiaki Hattori, Yutaka Ohtsu, Hiromasa Murakami, -, 5872530, Date issued: 16 Feb. 1999
  • 推論処理方法(日本国特許2827458号)
    Patent right, -, Date applied: 15 Jun. 1990, 2827458, Date announced: 20 Feb. 1992, 2827458, Date issued: 18 Sep. 1998