Minoru Kuribayashi

According to our database1, Minoru Kuribayashi authored at least 104 papers between 2000 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
A Proposal of Advanced Widgets Learning Topic for Interactive Application in Android Programming Learning Assistance System.
SN Comput. Sci., 2021

StealthPDF: Data hiding method for PDF file with no visual degradation.
J. Inf. Secur. Appl., 2021

Joint Optimization Method of Channel Assignment and Transmission Power for Concurrently Communicating Multiple Access-Points in Wireless Local-Area Network.
Int. J. Netw. Comput., 2021

A Throughput Drop Estimation Model for Concurrent Communications under Partially Overlapping Channels without Channel Bonding and Its Application to Channel Assignment in IEEE 802.11n WLAN.
IEICE Trans. Inf. Syst., 2021

Immunization of Pruning Attack in DNN Watermarking Using Constant Weight Code.
CoRR, 2021

An Implementation of Offline Answering Function for Code Completion Problem in PLAS.
Proceedings of the 3rd IEEE Global Conference on Life Sciences and Technologies, 2021

White-Box Watermarking Scheme for Fully-Connected Layers in Fine-Tuning Model.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

A Study of Throughput Drop Estimation Model for Concurrently Communicating Links Under Coexistence of Channel Bonding and Non-bonding in IEEE 802.11n WLAN.
Proceedings of the Complex, Intelligent and Software Intensive Systems, 2021

DISSIMILAR: Towards fake news detection using information hiding, signal processing and machine learning.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Near-Optimal Detection for Binary Tardos Code by Estimating Collusion Strategy.
IEEE Trans. Inf. Forensics Secur., 2020

A proposal of Android Programming Learning Assistant System with implementation of basic application learning.
Int. J. Web Inf. Syst., 2020

A proposal of calligraphy learning assistant system with letter portion practice function using projection mapping.
Int. J. Web Inf. Syst., 2020

A Generalized TCP Fairness Control Method for Multiple-Host Concurrent Communications in Elastic WLAN System Using Raspberry Pi Access Point.
Int. J. Mob. Comput. Multim. Commun., 2020

Transmission Power Optimization of Concurrently Communicating Two Access Points in Wireless Local Area Network.
Int. J. Mob. Comput. Multim. Commun., 2020

Survey on Decentralized Fingerprinting Solutions: Copyright Protection through Piracy Tracing.
Comput., 2020

A Calligraphy Learning Assistant System with Letter Portion Practice Function Using Projection Mapping.
Proceedings of the 2020 IEEE International Conference on Consumer Electronics (ICCE), 2020

A Generalization of Transmission Power Optimization Method for Concurrently Communicating Multiple Access-Points in Wireless Local-Area Network.
Proceedings of the Eighth International Symposium on Computing and Networking Workshops, 2020

A Proposal of Air-Conditioning Guidance System Using Discomfort Index.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2020

DeepWatermark: Embedding Watermark into DNN Model.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020

Classification of Video Recaptured from Display Device.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020

Detection of Adversarial Examples Based on Sensitivities to Noise Removal Filter.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020

2019
Efficiently Decodable Non-Adaptive Threshold Group Testing.
IEEE Trans. Inf. Theory, 2019

An Informative Test Code Approach in Code Writing Problem for Java Collections Framework in Java Programming Learning Assistant System.
J. Softw., 2019

Efficient (nonrandom) Construction and Decoding for Non-adaptive Group Testing.
J. Inf. Process., 2019

Throughput Measurement and Estimation Model for Concurrent Communications of Multiple Raspberry Pi Access-Points in Wireless Local-Area Network.
J. Commun., 2019

Enhancements of minimax access-point setup optimisation approach for IEEE 802.11 WLAN.
Int. J. Space Based Situated Comput., 2019

Advanced Searchable Encryption: An Adaptively Secure Keyword Search for Matrix-type Storages.
Int. J. Netw. Comput., 2019

Robust and Secure Data Hiding for PDF Text Document.
IEICE Trans. Inf. Syst., 2019

Detecting and Correcting Adversarial Images Using Image Processing Operations.
CoRR, 2019

Efficient and error-tolerant schemes for non-adaptive complex group testing and its application in complex disease genetics.
CoRR, 2019

Improved encoding and decoding for non-adaptive threshold group testing.
CoRR, 2019

Sublinear Decoding Schemes for Non-adaptive Group Testing with Inhibitors.
Proceedings of the Theory and Applications of Models of Computation, 2019

A Proposal of Recommendation Function for Solving Element Fill-in-Blank Problem in Java Programming Learning Assistant System.
Proceedings of the Advances in Networked-based Information Systems, 2019

Improved DM-QIM Watermarking Scheme for PDF Document.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

Reversible Data Hiding in PDF Document Exploiting Prefix Zeros in Glyph Coordinates.
Proceedings of the 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2019

Efficient Decentralized Tracing Protocol for Fingerprinting System with Index Table.
Proceedings of the 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2019

2018
Bias-Based Binary Fingerprinting Code Under Erasure Channel.
IEEE Signal Process. Lett., 2018

Reversible data hiding based compressible privacy preserving system for color image.
Multim. Tools Appl., 2018

Fingerprinting for multimedia content broadcasting system.
J. Inf. Secur. Appl., 2018

A throughput estimation model under two-link concurrent communications with partially overlapping channels and its application to channel assignment in IEEE 802.11n WLAN.
Int. J. Space Based Situated Comput., 2018

Dynamic Access-Point Configuration Approach for Elastic Wireless Local-Area Network System and Its Implementation Using Raspberry Pi.
Int. J. Netw. Comput., 2018

Universal Scoring Function Based on Bias Equalizer for Bias-Based Fingerprinting Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

A framework for generalized group testing with inhibitors and its potential application in neuroscience.
CoRR, 2018

Efficient Decoding Schemes for Noisy Non-Adaptive Group Testing when Noise Depends on Number of Items in Test.
CoRR, 2018

A Construction of a Keyword Search to Allow Partial Matching with a Block Cipher.
Proceedings of the Information Security Applications - 19th International Conference, 2018

Efficient Decoding Algorithm for Cyclically Permutable Code.
Proceedings of the IEEE Information Theory Workshop, 2018

Advanced Searchable Encryption: Keyword Search for Matrix-Type Storage.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

Estimation of Collusion Attack in Bias-based Binary Fingerprinting Code.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
Enabling public auditability for operation behaviors in cloud storage.
Soft Comput., 2017

A Minimax Approach for Access Point Setup Optimization in IEEE 802.11n Wireless Networks.
Int. J. Netw. Comput., 2017

Obfuscation in digital fingerprinting.
Int. J. Inf. Coding Theory, 2017

DCT-OFDM Watermarking Scheme Based on Communication System Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Aesthetic QR Code Based on Modified Systematic Encoding Function.
IEICE Trans. Inf. Syst., 2017

Information Hiding and Its Criteria for Evaluation.
IEICE Trans. Inf. Syst., 2017

Data Hiding for Text Document in PDF File.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017

Dynamic Access-Point Configuration Approach for Elastic Wireless Local-Area Network System.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017

Secure data management system with traceability against internal leakage.
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017

A Proposal of Software Architecture for Java Programming Learning Assistant System.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
An Active Access-Point Configuration Algorithm for Elastic Wireless Local-Area Network System Using Heterogeneous Devices.
Int. J. Netw. Comput., 2016

Simple Countermeasure to Non-Linear Collusion Attacks Targeted for Spread-Spectrum Fingerprinting Scheme.
IEICE Trans. Inf. Syst., 2016

Watermarking with Fixed Decoder for Aesthetic 2D Barcode.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Benchmarking of scoring functions for bias-based fingerprinting code.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

A Minimax Approach for Access-Point Setup Optimization Using Throughput Measurements in IEEE802.11n Wireless Networks.
Proceedings of the Fourth International Symposium on Computing and Networking, 2016

A proposal of three extensions in blank element selection algorithm for Java programming learning assistant system.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

A Proposal of Coding Rule Learning Function in Java Programming Learning Assistant System.
Proceedings of the 10th International Conference on Complex, 2016

2015
DCT-OFDM Based Watermarking Scheme Robust Against Clipping, Rotation, and Scaling Attacks.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

Enrichment of Visual Appearance of Aesthetic QR Code.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

Fingerprinting for Broadcast Content Distribution System.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

Image fingerprinting system based on collusion secure code and watermarking method.
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015

2014
Simplified MAP Detector for Binary Fingerprinting Code Embedded by Spread Spectrum Watermarking Scheme.
IEEE Trans. Inf. Forensics Secur., 2014

Countermeasure to non-linear collusion attacks on spread spectrum fingerprinting.
Proceedings of the International Symposium on Information Theory and its Applications, 2014

DCT-OFDM based watermarking scheme robust against clipping attack.
Proceedings of the 1st international workshop on Information hiding and its criteria for evaluation, 2014

2013
A simple tracing algorithm for binary fingerprinting code under averaging attack.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

2012
Interference Removal Operation for Spread Spectrum Fingerprinting Scheme.
IEEE Trans. Inf. Forensics Secur., 2012

Coded Spread Spectrum Watermarking Scheme.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

Analysis of binary fingerprinting codes under relaxed marking assumption.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

Bias Equalizer for Binary Probabilistic Fingerprinting Codes.
Proceedings of the Information Hiding - 14th International Conference, 2012

Adaptive iterative detection method for spread spectrum fingerprinting scheme.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

2011
Hierarchical Spread Spectrum Fingerprinting Scheme Based on the CDMA Technique.
EURASIP J. Inf. Secur., 2011

Effective Interference Reduction Method for Spread Spectrum Fingerprinting.
Proceedings of the SIGMAP 2011, 2011

A New Soft Decision Tracing Algorithm for Binary Fingerprinting Codes.
Proceedings of the Advances in Information and Computer Security, 2011

2010
Impact of Rounding Error on Spread Spectrum Fingerprinting Scheme.
IEEE Trans. Inf. Forensics Secur., 2010

Systematic Generation of Tardos's Fingerprint Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

On the Implementation of Spread Spectrum Fingerprinting in Asymmetric Cryptographic Protocol.
EURASIP J. Inf. Secur., 2010

Experimental Assessment of Probabilistic Fingerprinting Codes over AWGN Channel.
Proceedings of the Advances in Information and Computer Security, 2010

Reduction of Interference for CDMA-Based Fingerprinting Scheme Based on Random Permutation.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Tardos's Fingerprinting Code over AWGN Channel.
Proceedings of the Information Hiding - 12th International Conference, 2010

2009
A study of traceability of CDMA-based fingerprinting scheme.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

A Study of Rounding Error on CDMA-Based Fingerprinting Scheme.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

2008
Reversible Watermark with Large Capacity Based on the Prediction Error Expansion.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

On the systematic generation of Tardos's fingerprinting codes.
Proceedings of the International Workshop on Multimedia Signal Processing, 2008

Iterative Detection Method for CDMA-Based Fingerprinting Scheme.
Proceedings of the Information Hiding, 10th International Workshop, 2008

Effective detection method for CDMA-based fingerprinting scheme.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

On the implementation of asymmetric fingerprinting protocol.
Proceedings of the 2008 16th European Signal Processing Conference, 2008

2007
Collusion-Resistant Fingerprinting Scheme Based on the CDMA-Technique.
Proceedings of the Advances in Information and Computer Security, 2007

2006
How to Generate Cyclically Permutable Codes From Cyclic Codes.
IEEE Trans. Inf. Theory, 2006

Fingerprinting Protocol Based on Distributed Providers Using Oblivious Transfer.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Fingerprinting Protocol for On-Line Trade Using Information Gap between Buyer and Merchant.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

2005
Fingerprinting protocol for images based on additive homomorphic property.
IEEE Trans. Image Process., 2005

Reversible Watermark with Large Capacity Using the Predictive Coding.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

2003
Video Watermarking of Which Embedded Information Depends on the Distance between Two Signal Positions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

A Watermarking Scheme Applicable for Fingerprinting Protocol.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

2001
A New Anonymous Fingerprinting Scheme with High Enciphering Rate.
Proceedings of the Progress in Cryptology, 2001

2000
A Watermarking Scheme Based on the Characteristic of Addition among DCT Coefficients.
Proceedings of the Information Security, Third International Workshop, 2000


  Loading...