Kenta Takahashi

Orcid: 0009-0008-6747-0222

According to our database1, Kenta Takahashi authored at least 54 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Egg-Laying Robot to Enhance Mind Perception of Children and Parents.
Proceedings of the Companion of the 2024 ACM/IEEE International Conference on Human-Robot Interaction, 2024

2023
Finger Region Estimation by Boundary Curve Modeling and Bezier Curve Learning.
Proceedings of the 12th International Conference on Pattern Recognition Applications and Methods, 2023

Eye Biometrics Combined with Periocular and Iris Recognition Using CNN.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

A Biometric Signature Scheme with Template Protection and Authenticated Sample Recoverability.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

IPFed: Identity protected federated learning for user authentication.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

2022
HandSegNet: Hand segmentation using convolutional neural network for contactless palmprint recognition.
IET Biom., 2022

2021
Toward Evaluating Re-identification Risks in the Local Privacy Model.
Trans. Data Priv., 2021

Template Protected Fingerprint Verification using Set Similarity-based Minutia Cylinder Code and MinHash.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021

Revisiting Fuzzy Signatures: Towards a More Risk-Free Cryptographic Authentication System based on Biometrics.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Template Protected Authentication based on Location History and b-Bit MinHash.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Communication Protocol Between Humans and Bank Server Secure Against Man-in-the-Browser Attacks.
Proceedings of the Intelligent Human Systems Integration 2020, 2020

New Secret Key Management Technology for Blockchains from Biometrics Fuzzy Signature.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020

2019
Cancelable indexing based on low-rank approximation of correlation-invariant random filtering for fast and secure biometric identification.
Pattern Recognit. Lett., 2019

Signature schemes with a fuzzy private key.
Int. J. Inf. Sec., 2019

Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions.
IACR Cryptol. ePrint Arch., 2019

Cancelable Permutation-Based Indexing for Secure and Efficient Biometric Identification.
IEEE Access, 2019

PDH : Probabilistic Deep Hashing Based on Map Estimation of Hamming Distance.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

Security and Efficiency of Biometric Template Protection for Identification.
Proceedings of the 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2019

Hand Segmentation for Contactless Palmprint Recognition.
Proceedings of the Pattern Recognition - 5th Asian Conference, 2019

2018
On the Security of Linear Sketch Schemes against Recovering Attacks.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Face/Fingerphoto Spoof Detection under Noisy Conditions by using Deep Convolutional Neural Network.
Proceedings of the 11th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2018), 2018

A Generalization of the Theory of Biometric System Entropy.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
Modality Selection Attacks and Modality Restriction in Likelihood-Ratio Based Biometric Score Fusion.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

A Secure and Practical Signature Scheme for Blockchain Based on Biometrics.
Proceedings of the Information Security Practice and Experience, 2017

2016
Optimal sequential fusion for multibiometric cryptosystems.
Inf. Fusion, 2016

Information-Theoretic Performance Evaluation of Multibiometric Fusion under Modality Selection Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

A Micro Biometric Authentication Mechanism Considering Minute Patterns of the Human Body: A Proposal and the First Attempt.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016

Evaluation method of fabrics by visual and tactile texture information using MEMS combo sensor.
Proceedings of the 2016 IEEE SENSORS, Orlando, FL, USA, October 30 - November 3, 2016, 2016

On restricting modalities in likelihood-ratio based biometric score fusion.
Proceedings of the 23rd International Conference on Pattern Recognition, 2016

Effective color correction pipeline for a noisy image.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

Secure Communication Protocol Between a Human and a Bank Server for Preventing Man-in-the-Browser Attacks.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016

Fuzzy Signatures: Relaxing Requirements and a New Construction.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Development of Microwave Kinetic Inductance Detector for Cosmological Observations.
IEICE Trans. Electron., 2015

Information-theoretic performance evaluation of likelihood-ratio based biometric score fusion under modality selection attacks.
Proceedings of the IEEE 7th International Conference on Biometrics Theory, 2015

A Signature Scheme with a Fuzzy Private Key.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
Toward Optimal Fusion Algorithms With Security Against Wolves and Lambs in Biometrics.
IEEE Trans. Inf. Forensics Secur., 2014

A measure of information gained through biometric systems.
Image Vis. Comput., 2014

A General Framework and Algorithms for Score Level Indexing and Fusion in Biometric Identification.
IEICE Trans. Inf. Syst., 2014

2013
Probabilistic enhancement of approximate indexing in metric spaces.
Inf. Syst., 2013

2012
Unconditionally provably secure cancellable biometrics based on a quotient polynomial ring.
IET Biom., 2012

Towards optimal countermeasures against wolves and lambs in biometrics.
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012

Evaluation of security for biometric guessing attacks in biometric cryptosystem using fuzzy commitment scheme.
Proceedings of the 2012 BIOSIG, 2012

2011
Cancelable Biometrics with Provable Security and Its Application to Fingerprint Verification.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Versatile probability-based indexing for approximate similarity search.
Proceedings of the Fourth International Conference on Similarity Search and Applications, 2011

Unconditionally provably secure cancelable biometrics based on a quotient polynomial ring.
Proceedings of the 2011 IEEE International Joint Conference on Biometrics, 2011

Fast and accurate biometric identification using score level indexing and fusion.
Proceedings of the 2011 IEEE International Joint Conference on Biometrics, 2011

Parameter management schemes for cancelable biometrics.
Proceedings of the 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management, 2011

2010
A metric of identification performance of biometrics based on information content.
Proceedings of the 11th International Conference on Control, 2010

2009
Accuracy improvement with high convenience in biometric identification using multihypothesis sequential probability ratio test.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

A Proposal of Efficient Remote Biometric Authentication Protocol.
Proceedings of the Advances in Information and Computer Security, 2009

Cancelable Biometrics with Perfect Secrecy for Correlation-Based Matching.
Proceedings of the Advances in Biometrics, Third International Conference, 2009

2007
A study on biometric key generation from fingerprints: Fingerprint-key generation from stable feature value.
Proceedings of the 2007 International Conference on Security & Management, 2007

2006
Mechanism-Based PKI - A Real-Time Key Generation from Fingerprints.
Proceedings of the 2006 International Conference on Security & Management, 2006

2004
A DoS-Vulnerability Analysis of L2TP-VPN.
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004


  Loading...