生体認証システムにおける人工物を用いた攻撃に対するセキュリティ評価手法の確立に向けて

Size: px
Start display at page:

Download "生体認証システムにおける人工物を用いた攻撃に対するセキュリティ評価手法の確立に向けて"

Transcription

1 ATM 2016 ATM IC... / /

2 1. ATM Automated Tellers Machine IC ATM ATM ATM False Accept Rate: FAR ISO International Organization for Standardization IEC International Electrotechnical Commission ISO and IEC [2006] ICB 2015 International Conference on Biometrics IC ATM /

3 Tome et al. [2015] presentation attack ISO/IEC Common Criteria ISO/IEC OKI 2015,

4 ID 2 ID ID ATM 2009 IC ATM ATM... 2 ATM ID IC 1 IC 3 58 /

5 ISO/IEC ISO and IEC [2009] ATM , IC IC IC 59

6 A Tome, Vanoni, and Marcel [2014] B C B D 95 B C E D /

7 2006. Matsumoto et al. [2002] 2007,

8 Busch [2014] /

9 2 Idiap Research Institute BEAT Biometrics Evaluation and Testing 2012 BEAT 63

10 . 2 OHP OKI D 11 Li et al. [2014] 64 /

11 D OKI 2015 OKI 2015, 2016 OKI OKI

12 attack potential ISO/IEC Common Evaluation Methodology: CEMCommon Criteria Maintenance Board [2012] 66 /

13 1999 ISO/IEC Security Target: ST ISO/IEC Protection Profile: PP IT Japan Information Technology Security Evaluation and Certification Scheme: JISEC JISEC Federal Office for Information Security [2013] Morpho [2013] 17 67

14 Yamada [2015] ISO/IEC ISO/IEC ISO/IEC ISO/IEC ISO/IEC ISO/IEC JTC1/SC37 Busch [2014] ISO/IEC Presentation Attack Detection ISO/IEC /

15 APCER Attack Presentation Classification Error Rate 19 ISO/IEC ISO/IEC JTC1/SC27 ISO/IEC A presentation attack detection subsystem B A data capture subsystem C B comparison subsystem 3 19 APCER APCER 69

16 ISO/IEC ISO/IEC ISO/IEC ATM 70 /

17 Android ios Bank of America [2015] FIDO Fast IDentity Online JISEC b

18 5 5 A J /

19 5 ST ST A B Introduction C ST D ST Conformance Claims E Security F Problem Definition G E H Security Objectives I H J Extended Component Definition Security Requirements, TOE Summary Specifications Morpho [2013] 73

20 Matsumoto et al. [2002] 74 /

21 BioX No ISO/IEC IT 2015 a IT CCM-02-A 2015 b SC37 Biometrics WG3 Biometric Data Interchange Formats JAISA IC OKI

22 Vol. 44 No Vol. 106 No SC27 JAISA 2015 Bank of America, Bank of America Introduces Fingerprint and Touch ID Sign-in for its Mobile Banking App, Bank of America Newsroom, September 15, Busch, Christoph, Related Standards, Handbook of Biometric Anti-Spoofing, Springer- Verlag, 2014, pp Common Criteria Maintenance Board, Common Criteria Evaluation Methodology for IT Security Evaluation, Version 3.1, Federal Office for Information Security, Certification Report BSI-DSZ-CC for MorphoSmart Optic 301, Version 1.0, Future of Identity in the Information Society (FIDIS), D6.1: Forensic Implications of Identity Management Systems, International Organization for Standardization (ISO), and International Electrotechnical Commission (IEC), ISO/IEC Information Technology Security Techniques Security Evaluation of Biometrics, ISO, 2009., and, ISO/IEC Information Technology Biometric Performance Testing and Reporting Part 1: Principles and Framework, ISO, Li, Stan Z., Javier Galbally, Andre Anjos, and Sébastien Marcel, Evaluation Databases, 76 /

23 Handbook of Biometric Anti-Spoofing, Springer-Verlag, 2014, pp Matsumoto, Tsutomu, Hiroyuki Matsumoto, Koji Yamada, and Satoshi Hoshino, Impact of Artificial Gummy Fingers on Fingerprint Systems, Optical Security and Counterfeit Deterrence Techniques IV, Proceeding of SPIE, Vol. 4677, SPIE, 2002, pp Miura, Naoto, Akio Nagasaka, and Takafumi Miyatake, Extraction of Finger-Vein Patterns Using Maximum Curvature Points in Image Profiles, Proceedings of IAPR Conference on Machine Vision Applications, IAPR, 2005, pp Morpho, MorphoSmart Optic 301 Public Security Target SSE , Raghavendra, Ramachandra, Manasa Avinash, Sébastien Marcel, and Christoph Busch, Finger vein Liveness Detection Using Motion Magnification, Proceedings of the 7th IEEE International Conference on Biometrics: Theory, Applications and Systems (BATS), IEEE, 2015., Kiran B. Raja, Jayachander Surbiryala, and Christoph Busch, A Low-cost Multimodal Biometric Sensor to Capture Finger Vein and Fingerprint, Proceedings of International Joint Conference on Biometrics, IJCB, 2014, pp Tome, Pedro, and Sébastien Marcel, On the Vulnerability of Palm Vein Recognition to Spoofing Attacks, Proceedings of IAPR International Conference on Biometrics 2015, IAPR, 2015., Ramachandra Raghavendra, Christoph Busch, Santosh Tirunagari, Norman Poh, B. H. Shekar, Diego Gragnaniello, Carlo Sansone, Luisa Verdoliva, and Sébastien Marcel, The 1st Competition on Counter Measures to Finger Vein Spoofing Attacks, Proceedings of IAPR International Conference on Biometrics 2015, IAPR, 2015., Matthias Vanoni, and Sébastien Marcel, On the Vulnerability of Finger Vein Recognition to Spoofing, Proceedings of IEEE International Conference of the Biometrics Special Interest Group 2014, IEEE, Ton, Bram, Vascular Pattern of the Finger: Biometric of the Future? Sensor Design, Data Collection and Performance Verification, Master Thesis, University of Twente, Une, Masashi, Akira Otsuka, and Hideki Imai, Wolf Attack Probability: A Theoretical Security Measure in Biometrics-Based Authentication Systems, IEICE Trans. Inf. & Syst., Vol. E91-D, No. 5, IEICE, 2008, pp Wang, Yiding, and Zhanyong Zhao, Liveness Detection of Dorsal Hand Vein Based on the Analysis of Fourier Spectral, Biometric Recognition, Springer International Publishing, 2013, pp Yamada, Asahiko, Protection Profile for Biometric Verification Products (BVPPP), Version 1.0, Zhou, Yingbo, and Ajay Kumar, Human Identification Using Palm-Vein Images, IEEE 77

24 Transactions on Information Forensics and Security, Vol. 6, No. 4, 2011, pp /

25 ISO/IEC A A

26 /

27 2. 81

28 1 A 2 Tome, Vanoni, and Marcel [2014] Miura, Nagasaka, and Miyatake [2005] Ton [2012] /

29 A 2 Tome et al. [2015] A B 220 A B 4 A B

30 A 2 Raghavendra et al. [2015] Raghavendra et al. [2014] /

31 A Miura, Nagasaka, and Miyatake [2005] Une, Otsuka, and Imai [2008] OHP OHP 85

32 2 A 4 Tome and Marcel [2015] Zhou and Kumar [2011] /

33 3. OKI basic enhanced-basic moderate high beyond high A 5 87

34 A 5 Future of Identity in the Information Society [2006] 1 7 basic proficient 1 standard Wang and Zhao [2013] Tome, Vanoni, and Marcel OHP 8 basic proficient 2 1 [2014] 2014 OHP standard 13 enhanced-basic 2006 proficient 1 2 specialized OKI /

35 a A Protection Profile: PP PP PP ISO/IEC PP PP ISO/IEC PP PP ISO/IEC ISO/IEC B PP Security Target: ST ST 89

36 PP ISO/IEC ST PP PP ST ISO/IEC C International Laboratory Accreditation Cooperation: ILAC IT ECSEC Laboratory TÜV Informationstechnik GmbH Evaluation Body for IT-Security D PP ST ST E /

生体認証システムにおける情報漏洩対策技術の研究動向

生体認証システムにおける情報漏洩対策技術の研究動向 ATM 1 IC ATM ATM IC IC ATM E-mail: masataka.suzuki@boj.or.jp E-mail: inuma.manabu@aist.go.jp E-mail: a-otsuka@aist.go.jp //2010.4 229 1. 2004 ATM PC ATM FISC FISC [2009] FISC [2009] 35-1 ATM IC ATM ATM

More information

リテール・バンキング・システムのICカード対応に関する現状とその課題

リテール・バンキング・システムのICカード対応に関する現状とその課題 IC IC IC ATM IC IC ATM IC IC IC IC E-mail: yuuko.tamura@boj.or.jp E-mail: hirokawa@imes.boj.or.jp IC IC MS IC IC IC IC IC IC IC MS IC IC IC IC IC ICIC ICATM ATMIC IC IC ATMMS IC MS IC IC IC IC ATM IC ICIC

More information

Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved. 1

Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved. 1 Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved. 1 ISO/IEC 15408 ISO/IEC 15408 Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved.

More information

untitled

untitled TOE 21 7 22 IT 9053 C0217 TOE bizhub C652 / bizhub C552 / ineo + 652 / ineo + 552 / VarioLink 6522c / VarioLink 5522c bizhub C652 / bizhub C552 / ineo + 652 / ineo + 552 / VarioLink 6522c / VarioLink 5522c

More information

5005-toku3.indd

5005-toku3.indd 3 1 CMMICMM Capability Maturity Model ISO : International Organization for Standardization IEC : International Electrotechnical CommissionJTC1 : Joint Technical Committee 1SC7 : Sub Committee 7 SC7 WG

More information

橡セキュリティポリシー雛形策定に関する調査報告書

橡セキュリティポリシー雛形策定に関する調査報告書 13 2 KM 12 7 10 ISO/IEC TR 13335 Techniques for the Management of IT Security ISO/IEC 15408 Evaluation Criteria for IT Security BS7799 A Code of Practice for Information Security Management RFC2196 Site

More information

Information Security Management System ISMS Copyright JIPDEC ISMS,

Information Security Management System ISMS Copyright JIPDEC ISMS, ISMS Copyright JIPDEC ISMS, 2005 1 Copyright JIPDEC ISMS, 2005 2 Copyright JIPDEC ISMS, 2005 3 Copyright JIPDEC ISMS, 2005 4 ISO JIS JIS ISO JIS JIS JIS ISO JIS JIS 22 23 ISO SC27 ISO SC27 ISO/IEC 17799

More information

JIS Z 9001:1998JIS Z 9002:1998 ISO/IEC 17025ISO/IEC Guide 25

JIS Z 9001:1998JIS Z 9002:1998 ISO/IEC 17025ISO/IEC Guide 25 JIS Q 17025 IDT, ISO/IEC 17025 IT JIS Z 9001:1998JIS Z 9002:1998 ISO/IEC 17025ISO/IEC Guide 25 JIS Q 17025 IDT, ISO/IEC 17025 IT IT JIS Q 17025ISO/IEC 17025 (2) JIS Z 9358 ISO/IEC Guide 58 (3) testing

More information

2006/6/16 2006/9/1 2007/11/9 () 2011/4/21 2005 2006 3 (2005 12 ())2005 12 13 2011 4 21 2011 4 ii

2006/6/16 2006/9/1 2007/11/9 () 2011/4/21 2005 2006 3 (2005 12 ())2005 12 13 2011 4 21 2011 4 ii 2011 4 2006/6/16 2006/9/1 2007/11/9 () 2011/4/21 2005 2006 3 (2005 12 ())2005 12 13 2011 4 21 2011 4 ii 1 2 A 3 B C IT NISD-K304-101 NISD-K305-101 iii ST ST DM6-08-101 2011 4 ST ST NISD-K304-101 NISD-K305-101

More information

Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved. 1

Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved. 1 Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved. 1 ISO/IEC 15408 ISO/IEC 15408 Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved.

More information

CIA+

CIA+ ECOM 200511 e ECOM CIA+ Integrity Confidentiality Availability Phishing fishing http://www.nikkeibp.co.jp/ http://www.nikeibp.co.jp/ DoSDenial of Service DoS IT IT ROI 1/2 2/2 DMZ IT TESEC( Common

More information

<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F5F A815B FD B A5F E646F63>

<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F5F A815B FD B A5F E646F63> 2008 年度版リストガイド ( メッセージ認証コード ) 平成 21 年 3 月 独立行政法人情報通信研究機構独立行政法人情報処理推進機構 1 1 1.1............................. 1 1.1.1............................ 1 1.1.2....................... 1 1.1.3...........................

More information

幹部会、幹部懇談会の話題

幹部会、幹部懇談会の話題 生体認証における セキュリティ評価と国際標準化 2016 年 11 月 17 日 産業技術総合研究所 山田朝彦 1 本講演での 生体認証 Biometric verification(1:1) Biometric identification(1:n) は含まない 2 本講演での セキュリティ評価 セキュリティ評価とは 誰 ( 甲 ) のためのか A) 特定の組織 B) 不特定であるが目的 用途を同一とする組織

More information

untitled

untitled TOE TOE PP 20 3 25 (IT 8210) C0220 Hitachi Adaptable Modular Storage 2300 0862/ A-M EAL2 TOE 21 6 29 IT Common Criteria for Information Technology Security Evaluation Version 2.3 Common Methodology for

More information

2-工業会活動.indd

2-工業会活動.indd 工業会活動 ~SAE(Society of Automotive Engineers) 委員会参加報告 ~ 1. はじめに SAE RTCA Radio Technical Commission for Aeronautics ARINC Aeronautical Radio, Incorporated SAE RTCA ARINC FAA Federal Aviation Administration

More information

untitled

untitled 2001 9 11 5 () IC ICAO(ICAO-TR) (GSC-IS) / ISO/IEC CD 19794-5 5 8 ICAO-NTWG SC17/WG3 16 3 31 Personal ID Documents 1 ------------------------------------------------------------------ 3 2 ---------------------------------------------------------------------

More information

1 Kinect for Windows M = [X Y Z] T M = [X Y Z ] T f (u,v) w 3.2 [11] [7] u = f X +u Z 0 δ u (X,Y,Z ) (5) v = f Y Z +v 0 δ v (X,Y,Z ) (6) w = Z +

1 Kinect for Windows M = [X Y Z] T M = [X Y Z ] T f (u,v) w 3.2 [11] [7] u = f X +u Z 0 δ u (X,Y,Z ) (5) v = f Y Z +v 0 δ v (X,Y,Z ) (6) w = Z + 3 3D 1,a) 1 1 Kinect (X, Y) 3D 3D 1. 2010 Microsoft Kinect for Windows SDK( (Kinect) SDK ) 3D [1], [2] [3] [4] [5] [10] 30fps [10] 3 Kinect 3 Kinect Kinect for Windows SDK 3 Microsoft 3 Kinect for Windows

More information

(a) (b) (c) Canny (d) 1 ( x α, y α ) 3 (x α, y α ) (a) A 2 + B 2 + C 2 + D 2 + E 2 + F 2 = 1 (3) u ξ α u (A, B, C, D, E, F ) (4) ξ α (x 2 α, 2x α y α,

(a) (b) (c) Canny (d) 1 ( x α, y α ) 3 (x α, y α ) (a) A 2 + B 2 + C 2 + D 2 + E 2 + F 2 = 1 (3) u ξ α u (A, B, C, D, E, F ) (4) ξ α (x 2 α, 2x α y α, [II] Optimization Computation for 3-D Understanding of Images [II]: Ellipse Fitting 1. (1) 2. (2) (edge detection) (edge) (zero-crossing) Canny (Canny operator) (3) 1(a) [I] [II] [III] [IV ] E-mail sugaya@iim.ics.tut.ac.jp

More information

...i A

...i A ...i A 1....2 1.1...2 1.2...2 1.3...2 2....3 2.1...4 2.1.1...4 2.1.2...4 2.1.3...6 2.1.4...7 2.1.5...7 2.1.6...8 2.2...8 2.2.1...8 2.2.2...9 2.3...10 3.... 11 3.1...12 3.2...12 3.2.1...13 3.2.2...18 3.2.3...20

More information

研究レポート表紙.PDF

研究レポート表紙.PDF No.118 November 2001 ISO ISO takeishi@fri.fujitsu.co.jp ISO14001 CEAR A4823 1. ISO14000 ISO14000 ISO14001 2. ISO ISO. ISO14001 ISO9000 OHSAS18001 18002 ISO14001 ISO IEC13335 ISO10006. ISO ISO14001 ISO9000

More information

Key Words: probabilisic scenario earthquake, active fault data, Great Hanshin earthquake, low frequency-high impact earthquake motion, seismic hazard map 3) Cornell, C. A.: Engineering Seismic

More information

Fig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels).

Fig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels). Fig. 1 The scheme of glottal area as a function of time Fig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels). Fig, 4 Parametric representation

More information

Japanese.PDF

Japanese.PDF 2002 11 2 3 Part I 4 5 6 3.1WTO/TBT 2 3 6 3.2ISO/IEC 7 3.3 7 3.4 7 3.5 8 3.6 8 9 4.1 9 4.2 9 4.3 10 12 Part II 13 1.1 13 1.2 13 1.3 14 1.4 14 1.5 14 2 14 3 15 3.1 15 3.2 16 3.3 17 3.4 17 3.5 18 3.6 18

More information

第 1 回バイオメトリクス研究会 ( 早稲田大学 ) THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS Proceedings of Biometrics Workshop,169

第 1 回バイオメトリクス研究会 ( 早稲田大学 ) THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS Proceedings of Biometrics Workshop,169 THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS Proceedings of Biometrics Workshop,169-8555 3-4-1,169-8555 3-4-1 E-mail: s hayashi@kom.comm.waseda.ac.jp, ohki@suou.waseda.jp Wolf

More information

2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055

2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055 1 1 1 2 DCRA 1. 1.1 1) 1 Tactile Interface with Air Jets for Floating Images Aya Higuchi, 1 Nomin, 1 Sandor Markon 1 and Satoshi Maekawa 2 The new optical device DCRA can display floating images in free

More information

Microsoft PowerPoint _JAISA_SC37標準化セミナー_WG3_V8最終 [互換モード]

Microsoft PowerPoint _JAISA_SC37標準化セミナー_WG3_V8最終 [互換モード] JAISA BSC 委員会主催第 11 回 SC37 関係最新動向セミナー 2014 年 10 月 7 日 SC37 Biometrics 標準化報告 WG3 Biometric Data Interchange Formats SC37WG3 国内小委員会主査新崎卓 (( 株 ) 富士通研究所 ) Biometric Data Interchange Formats システム間でバイオメトリクスデータを受け渡すフォーマットの標準化

More information

(a) 1 (b) 3. Gilbert Pernicka[2] Treibitz Schechner[3] Narasimhan [4] Kim [5] Nayar [6] [7][8][9] 2. X X X [10] [11] L L t L s L = L t + L s

(a) 1 (b) 3. Gilbert Pernicka[2] Treibitz Schechner[3] Narasimhan [4] Kim [5] Nayar [6] [7][8][9] 2. X X X [10] [11] L L t L s L = L t + L s 1 1 1, Extraction of Transmitted Light using Parallel High-frequency Illumination Kenichiro Tanaka 1 Yasuhiro Mukaigawa 1 Yasushi Yagi 1 Abstract: We propose a new sharpening method of transmitted scene

More information

顔画像を用いた個人認証システムの性能検討に関する研究

顔画像を用いた個人認証システムの性能検討に関する研究 12 Research on performance examination of individual attestation system using face image 1010429 2001 2 5 1997 FaceIt The age using various biometrics for the attestation with the computer to attest the

More information

001†`032 (Page 1)

001†`032 (Page 1) ISO の国際標準化専門委員会 2 International Organization for Standardization (ISO) CASCO COPOLCO DEVCO INFCO General Assembly Member Bodies Correspondent Members Subscriber Members Council Technical Management

More information

xx/xx Vol. Jxx A No. xx 1 Fig. 1 PAL(Panoramic Annular Lens) PAL(Panoramic Annular Lens) PAL (2) PAL PAL 2 PAL 3 2 PAL 1 PAL 3 PAL PAL 2. 1 PAL

xx/xx Vol. Jxx A No. xx 1 Fig. 1 PAL(Panoramic Annular Lens) PAL(Panoramic Annular Lens) PAL (2) PAL PAL 2 PAL 3 2 PAL 1 PAL 3 PAL PAL 2. 1 PAL PAL On the Precision of 3D Measurement by Stereo PAL Images Hiroyuki HASE,HirofumiKAWAI,FrankEKPAR, Masaaki YONEDA,andJien KATO PAL 3 PAL Panoramic Annular Lens 1985 Greguss PAL 1 PAL PAL 2 3 2 PAL DP

More information

IPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for

IPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for 1 2 3 3 1 Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for Mobile Terminals Kaoru Wasai 1 Fumio Sugai 2 Yosihiro Kita 3 Mi RangPark 3 Naonobu

More information

Vol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A

Vol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A Vol. 45 No. 8 Aug. 2004, 1999 11 (1) (2) (3) 2003 7 Digital Evidence Enhancement for the Japanese Official Gazette Data Providing Services Atsuko Umezawa,, Hiroyuki Ueno, Yukio Miyata, Yasuharu Saikawa,

More information

Gaze Head Eye (a) deg (b) 45 deg (c) 9 deg 1: - 1(b) - [5], [6] [7] Stahl [8], [9] Fang [1], [11] Itti [12] Itti [13] [7] Fang [1],

Gaze Head Eye (a) deg (b) 45 deg (c) 9 deg 1: - 1(b) - [5], [6] [7] Stahl [8], [9] Fang [1], [11] Itti [12] Itti [13] [7] Fang [1], 1 1 1 Structure from Motion - 1 Ville [1] NAC EMR-9 [2] 1 Osaka University [3], [4] 1 1(a) 1(c) 9 9 9 c 216 Information Processing Society of Japan 1 Gaze Head Eye (a) deg (b) 45 deg (c) 9 deg 1: - 1(b)

More information

2007/8 Vol. J90 D No. 8 Stauffer [7] 2 2 I 1 I 2 2 (I 1(x),I 2(x)) 2 [13] I 2 = CI 1 (C >0) (I 1,I 2) (I 1,I 2) Field Monitoring Server

2007/8 Vol. J90 D No. 8 Stauffer [7] 2 2 I 1 I 2 2 (I 1(x),I 2(x)) 2 [13] I 2 = CI 1 (C >0) (I 1,I 2) (I 1,I 2) Field Monitoring Server a) Change Detection Using Joint Intensity Histogram Yasuyo KITA a) 2 (0 255) (I 1 (x),i 2 (x)) I 2 = CI 1 (C>0) (I 1,I 2 ) (I 1,I 2 ) 2 1. [1] 2 [2] [3] [5] [6] [8] Intelligent Systems Research Institute,

More information

(MIRU2008) HOG Histograms of Oriented Gradients (HOG)

(MIRU2008) HOG Histograms of Oriented Gradients (HOG) (MIRU2008) 2008 7 HOG - - E-mail: katsu0920@me.cs.scitec.kobe-u.ac.jp, {takigu,ariki}@kobe-u.ac.jp Histograms of Oriented Gradients (HOG) HOG Shape Contexts HOG 5.5 Histograms of Oriented Gradients D Human

More information

DEIM Forum 2012 E Web Extracting Modification of Objec

DEIM Forum 2012 E Web Extracting Modification of Objec DEIM Forum 2012 E4-2 670 0092 1 1 12 E-mail: nd11g028@stshse.u-hyogo.ac.jp, {dkitayama,sumiya}@shse.u-hyogo.ac.jp Web Extracting Modification of Objects for Supporting Map Browsing Junki MATSUO, Daisuke

More information

インドシナ産業基板基礎調査団報告書

インドシナ産業基板基礎調査団報告書 J R 01-08 ABBREVIATlON AOAC APEC APLAC APLMP APMP ASEAN ASTM BIPM BNM BOA BPS BS CBWM CGPM CMS CNLA CNS CSIR CSIRO DOE DOM DOST DSMQC DSN DSS DTI EMC ETL FAO GDP Association of Official Analytical Chemists

More information

10_08.dvi

10_08.dvi 476 67 10 2011 pp. 476 481 * 43.72.+q 1. MOS Mean Opinion Score ITU-T P.835 [1] [2] [3] Subjective and objective quality evaluation of noisereduced speech. Takeshi Yamada, Shoji Makino and Nobuhiko Kitawaki

More information

1(a) (b),(c) - [5], [6] Itti [12] [13] gaze eyeball head 2: [time] [7] Stahl [8], [9] Fang [1], [11] 3 -

1(a) (b),(c) - [5], [6] Itti [12] [13] gaze eyeball head 2: [time] [7] Stahl [8], [9] Fang [1], [11] 3 - Vol216-CVIM-22 No18 216/5/12 1 1 1 Structure from Motion - 1 8% Tobii Pro TX3 NAC EMR ACTUS Eye Tribe Tobii Pro Glass NAC EMR-9 Pupil Headset Ville [1] EMR-9 [2] 1 Osaka University Gaze Head Eye (a) deg

More information

Computer Security Symposium October ,a) 1,b) Microsoft Kinect Kinect, Takafumi Mori 1,a) Hiroaki Kikuchi 1,b) [1] 1 Meiji U

Computer Security Symposium October ,a) 1,b) Microsoft Kinect Kinect, Takafumi Mori 1,a) Hiroaki Kikuchi 1,b) [1] 1 Meiji U Computer Security Symposium 017 3-5 October 017 1,a) 1,b) Microsoft Kinect Kinect, Takafumi Mori 1,a) Hiroaki Kikuchi 1,b) 1. 017 5 [1] 1 Meiji University Graduate School of Advanced Mathematical Science

More information

.,,, [12].,, [13].,,.,, meal[10]., [11], SNS.,., [14].,,.,,.,,,.,,., Cami-log, , [15], A/D (Powerlab ; ), F- (F-150M, ), ( PC ).,, Chart5(ADIns

.,,, [12].,, [13].,,.,, meal[10]., [11], SNS.,., [14].,,.,,.,,,.,,., Cami-log, , [15], A/D (Powerlab ; ), F- (F-150M, ), ( PC ).,, Chart5(ADIns Cami-log: 1,a) 1,b) 1,c) 1,d),,,.,,.,,,.,, Cami-log,. Cami-log : Proposal of Application to Improve Daily Chewing Activities using Myoelectric Information Hiroki Kurosawa 1,a) Sho Mitarai 1,b) Nagisa Munekata

More information

IPSJ SIG Technical Report GPS LAN GPS LAN GPS LAN Location Identification by sphere image and hybrid sensing Takayuki Katahira, 1 Yoshio Iwai 1

IPSJ SIG Technical Report GPS LAN GPS LAN GPS LAN Location Identification by sphere image and hybrid sensing Takayuki Katahira, 1 Yoshio Iwai 1 1 1 1 GPS LAN GPS LAN GPS LAN Location Identification by sphere image and hybrid sensing Takayuki Katahira, 1 Yoshio Iwai 1 and Hiroshi Ishiguro 1 Self-location is very informative for wearable systems.

More information

& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us

& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us 1,a) 1 1 1 1 2 2 2011 8 10, 2011 12 2 1 Bluetooth 36 2 3 10 70 34 A Health Management Service by Cell Phones and Its Usability Evaluation Naofumi Yoshida 1,a) Daigo Matsubara 1 Naoki Ishibashi 1 Nobuo

More information

情報セキュリティの現状と課題

情報セキュリティの現状と課題 443 IT IT 1 1 2 3 4 1 OECD( 1992 Confidentiality Integrity Availability 2 2000.2. http://www.npa.go.jp/hightech/sec_taikei/taikei.htm 3 2000.12. http://www.kantei.go.jp/jp/it/security/taisaku/2000_1215/1215actionplan.html

More information

IPSJ SIG Technical Report Vol.2010-CVIM-170 No /1/ Visual Recognition of Wire Harnesses for Automated Wiring Masaki Yoneda, 1 Ta

IPSJ SIG Technical Report Vol.2010-CVIM-170 No /1/ Visual Recognition of Wire Harnesses for Automated Wiring Masaki Yoneda, 1 Ta 1 1 1 1 2 1. Visual Recognition of Wire Harnesses for Automated Wiring Masaki Yoneda, 1 Takayuki Okatani 1 and Koichiro Deguchi 1 This paper presents a method for recognizing the pose of a wire harness

More information

04.™ƒ”R/’Ô”�/’Xfl©

04.™ƒ”R/’Ô”�/’Xfl© Digicashecash PC IC AI LicenseCoin License Pk A L Pk A W Rc C Coin License Okamoto and Ohta Okamoto and Ohta IC Digicashecash TTP Trusted Third Party TTP TTP TTP TTP: Trusted Third Party TTPTTP TTP TTP

More information

2

2 Copyright 2008 Nara Institute of Science and Technology / Osaka University 2 Copyright 2008 Nara Institute of Science and Technology / Osaka University CHAOS Report in US 1994 http://www.standishgroup.com/sample_research/

More information

人工物メトリクスの評価における現状と課題

人工物メトリクスの評価における現状と課題 E-mail: h.matsumoto@nhkspg.co.jp E-mail: masashi.une@boj.or.jp E-mail: tsutomu@mlab.jks.ynu.ac.jp E-mail: iwashita@imes.boj.or.jp E-mail: sugahara@nhkspg.co.jp artifact-metrics biometrics artifact-metric

More information

3.1 Thalmic Lab Myo * Bluetooth PC Myo 8 RMS RMS t RMS(t) i (i = 1, 2,, 8) 8 SVM libsvm *2 ν-svm 1 Myo 2 8 RMS 3.2 Myo (Root

3.1 Thalmic Lab Myo * Bluetooth PC Myo 8 RMS RMS t RMS(t) i (i = 1, 2,, 8) 8 SVM libsvm *2 ν-svm 1 Myo 2 8 RMS 3.2 Myo (Root 1,a) 2 2 1. 1 College of Information Science, School of Informatics, University of Tsukuba 2 Faculty of Engineering, Information and Systems, University of Tsukuba a) oharada@iplab.cs.tsukuba.ac.jp 2.

More information

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF   a m Vol.55 No.1 2 15 (Jan. 2014) 1,a) 2,3,b) 4,3,c) 3,d) 2013 3 18, 2013 10 9 saccess 1 1 saccess saccess Design and Implementation of an Online Tool for Database Education Hiroyuki Nagataki 1,a) Yoshiaki

More information

位相限定相関法と そのバイオメトリクス認証への応用

位相限定相関法と そのバイオメトリクス認証への応用 1 バイオメトリクスの最新動向 ~IJCB2011 学会報告 ~ 東北大学大学院情報科学研究科 伊藤康一 本発表の目的 2 パターン認識やセキュリティの研究者に世界の最新の研究動向を紹介したい 国際会議で日本の研究者による発表が少ないので, 世界で研究成果をアピールしてもらいたい 私見が多分に含まれていますので, 一意見として参考にしていただければ幸いです. 発表手順 3 国際会議にみる最近の研究動向

More information

特集_03-07.Q3C

特集_03-07.Q3C 3-7 Error Detection and Authentication in Quantum Key Distribution YAMAMURA Akihiro and ISHIZUKA Hirokazu Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution

More information

Fig. 2 Signal plane divided into cell of DWT Fig. 1 Schematic diagram for the monitoring system

Fig. 2 Signal plane divided into cell of DWT Fig. 1 Schematic diagram for the monitoring system Study of Health Monitoring of Vehicle Structure by Using Feature Extraction based on Discrete Wavelet Transform Akihisa TABATA *4, Yoshio AOKI, Kazutaka ANDO and Masataka KATO Department of Precision Machinery

More information

IPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-

IPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi- 1 3 5 4 1 2 1,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-View Video Contents Kosuke Niwa, 1 Shogo Tokai, 3 Tetsuya Kawamoto, 5 Toshiaki Fujii, 4 Marutani Takafumi,

More information

3 2 2 (1) (2) (3) (4) 4 4 AdaBoost 2. [11] Onishi&Yoda [8] Iwashita&Stoica [5] 4 [3] 3. 3 (1) (2) (3)

3 2 2 (1) (2) (3) (4) 4 4 AdaBoost 2. [11] Onishi&Yoda [8] Iwashita&Stoica [5] 4 [3] 3. 3 (1) (2) (3) (MIRU2012) 2012 8 820-8502 680-4 E-mail: {d kouno,shimada,endo}@pluto.ai.kyutech.ac.jp (1) (2) (3) (4) 4 AdaBoost 1. Kanade [6] CLAFIC [12] EigenFace [10] 1 1 2 1 [7] 3 2 2 (1) (2) (3) (4) 4 4 AdaBoost

More information

1 Web DTN DTN 2. 2 DTN DTN Epidemic [5] Spray and Wait [6] DTN Android Twitter [7] 2 2 DTN 10km 50m % %Epidemic 99% 13.4% 10km DTN [8] 2

1 Web DTN DTN 2. 2 DTN DTN Epidemic [5] Spray and Wait [6] DTN Android Twitter [7] 2 2 DTN 10km 50m % %Epidemic 99% 13.4% 10km DTN [8] 2 DEIM Forum 2014 E7-1 Web DTN 112 8610 2-1-1 UCLA Computer Science Department 3803 Boelter Hall, Los Angeles, CA 90095-1596, USA E-mail: yuka@ogl.is.ocha.ac.jp, mineo@cs.ucla.edu, oguchi@computer.org Web

More information

2.R R R R Pan-Tompkins(PT) [8] R 2 SQRS[9] PT Q R WQRS[10] Quad Level Vector(QLV)[11] QRS R Continuous Wavelet Transform(CWT)[12] Mexican hat 4

2.R R R R Pan-Tompkins(PT) [8] R 2 SQRS[9] PT Q R WQRS[10] Quad Level Vector(QLV)[11] QRS R Continuous Wavelet Transform(CWT)[12] Mexican hat 4 G-002 R Database and R-Wave Detecting System for Utilizing ECG Data Takeshi Nagatomo Ikuko Shimizu Takeshi Ikeda Akio Sashima Koichi Kurumatani R R MIT-BIH R 90% 1. R R [1] 2 24 16 Tokyo University of

More information

IPSJ SIG Technical Report Vol.2017-ARC-225 No.12 Vol.2017-SLDM-179 No.12 Vol.2017-EMB-44 No /3/9 1 1 RTOS DefensiveZone DefensiveZone MPU RTOS

IPSJ SIG Technical Report Vol.2017-ARC-225 No.12 Vol.2017-SLDM-179 No.12 Vol.2017-EMB-44 No /3/9 1 1 RTOS DefensiveZone DefensiveZone MPU RTOS 1 1 RTOS DefensiveZone DefensiveZone MPU RTOS RTOS OS Lightweight partitioning architecture for automotive systems Suzuki Takehito 1 Honda Shinya 1 Abstract: Partitioning using protection RTOS has high

More information

IPSJ SIG Technical Report Vol.2009-CVIM-167 No /6/10 Real AdaBoost HOG 1 1 1, 2 1 Real AdaBoost HOG HOG Real AdaBoost HOG A Method for Reducing

IPSJ SIG Technical Report Vol.2009-CVIM-167 No /6/10 Real AdaBoost HOG 1 1 1, 2 1 Real AdaBoost HOG HOG Real AdaBoost HOG A Method for Reducing Real AdaBoost HOG 1 1 1, 2 1 Real AdaBoost HOG HOG Real AdaBoost HOG A Method for Reducing number of HOG Features based on Real AdaBoost Chika Matsushima, 1 Yuji Yamauchi, 1 Takayoshi Yamashita 1, 2 and

More information

4. C i k = 2 k-means C 1 i, C 2 i 5. C i x i p [ f(θ i ; x) = (2π) p 2 Vi 1 2 exp (x µ ] i) t V 1 i (x µ i ) 2 BIC BIC = 2 log L( ˆθ i ; x i C i ) + q

4. C i k = 2 k-means C 1 i, C 2 i 5. C i x i p [ f(θ i ; x) = (2π) p 2 Vi 1 2 exp (x µ ] i) t V 1 i (x µ i ) 2 BIC BIC = 2 log L( ˆθ i ; x i C i ) + q x-means 1 2 2 x-means, x-means k-means Bayesian Information Criterion BIC Watershed x-means Moving Object Extraction Using the Number of Clusters Determined by X-means Clustering Naoki Kubo, 1 Kousuke

More information

ST作成の手引

ST作成の手引 7 3 1.2 1 ST ST ST ST ST CC TOE TOE TOE IT TOE TOE TOE IT TOE TOE TOE PP PP PP PP PP 2 ISO/IEC 15408( 1999) Evaluation Criteria for IT SecurityCC JIS X5070(2000) ST CC ST ST CC ST ST CC IT CCCommon Criteria

More information

Taro12-認定-部門-ASG101-06

Taro12-認定-部門-ASG101-06 JIS Q 17025(ISO/IEC 17025(IDT)) JIS Q17025(ISO/IEC 17025(IDT)) --- --- JNLA JCSS ISO/IEC 17025 JIS Q 17025 IAJapan ILAC APLAC JIS Q17011 ISO/IEC 17011 MRA ILACAPLAC MRA IAJapan (3) JNLAJCSS (4) testing

More information

Profile 39% 9,311 33% 7,846 28% 6,853 2

Profile 39% 9,311 33% 7,846 28% 6,853 2 1 Profile 39% 9,311 33% 7,846 28% 6,853 2 Message 3 Vision 4 5 Executive Summary 6 7 Management Systems 8 9 Management Systems 10 11 Design for Environment 12 3R 3R 3R 3R 13 14 Design for Environment P

More information

21 Key Exchange method for portable terminal with direct input by user

21 Key Exchange method for portable terminal with direct input by user 21 Key Exchange method for portable terminal with direct input by user 1110251 2011 3 17 Diffie-Hellman,..,,,,.,, 2.,.,..,,.,, Diffie-Hellman, i Abstract Key Exchange method for portable terminal with

More information

IPSJ SIG Technical Report iphone iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Proc

IPSJ SIG Technical Report iphone iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Proc iphone 1 1 1 iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Processing Unit)., AR Realtime Natural Feature Tracking Library for iphone Makoto

More information

14) Ogihara ATM 15) ATM 10 16) 17),18) 1 4) 1 8),9) 10) 12) realadaboost 13) % 12) 2. 3 Gluhchev 19) 1 19) 2 10) 12) 3. 2 ID 1 8) 9),20) 2 2

14) Ogihara ATM 15) ATM 10 16) 17),18) 1 4) 1 8),9) 10) 12) realadaboost 13) % 12) 2. 3 Gluhchev 19) 1 19) 2 10) 12) 3. 2 ID 1 8) 9),20) 2 2 1, 1 2 1 33 realadaboost 30 4.1% Biometric Person Authentication Method Using Pen Holding Feature Daigo Muramats, 1, 1 Yuki Hashimoto 1 and Hiroyuki Ogata 1 We focus on a biometric person authentication

More information

情報分野のアクセシビリティ標準について

情報分野のアクセシビリティ標準について 情報分野のアクセシビリティ標準について 経済産業省国際電気標準課 小出啓介 Agenda 1. 障害者白書 2. JTC 1/SC 35 で開発しているアクセシビリティ関連規格の紹介 3. 映像字幕事業 (ISO/IEC 20071-23) の取り組みの紹介 4. JIS X 8341-3 の改正について 5. Web Accessibility, BSI Code of Practice 規格の開発と国内対応について

More information

内閣官房情報セキュリティセンター(NISC)

内閣官房情報セキュリティセンター(NISC) ( ) ...1 1.1.1...1 (1)..1 (2)...1 (3)...1 1.1.2...2 (1)...2 (2)...2 (3)...2 (4)...3 (5)...3 (6)...3 1.1.3...4...10 2.1...10 2.1.1...10...10...10 (1)...10 (2)... 11 (3)... 11 (4)...12 (5)...13 (6)...13

More information

ICカード利用システムにおいて新たに顕現化した中間者攻撃とその対策

ICカード利用システムにおいて新たに顕現化した中間者攻撃とその対策 IC IC EMV EMV ICIC IC IC EMV IC EMV IC... E-mail: masataka.suzuki@boj.or.jp E-mail: katsuhisa.hirokawa@boj.or.jp E-mail: k-kobara@aist.go.jp //2012.7 107 1 IC EMV 1 EMV EMVCo IC 36% 10 IC 65% 1,540 2009

More information

12 NEC 2003/3/6 Copy ight (C) NEC Corporation 1

12 NEC 2003/3/6 Copy ight (C) NEC Corporation 1 12 NEC 2003/3/6 Copy ight (C) NEC Corporation 1 Biometrics Biometrics 01.9.11 2003/3/6 Copy ight (C) NEC Corporation 2 AFIS Internet ID(PID) 2003/3/6 Copy ight (C) NEC Corporation 3 2003/3/6 Copy ight

More information

guideline_1_0.dvi

guideline_1_0.dvi Version 1.0 ( 22 5 ) cflkanta Matsuura Laboratory 2010, all rights reserved. I 3 1 3 2 3 3 4 II 8 4 8 5 9 5.1......................... 9 5.2......................... 10 5.3......................... 10

More information

2012 JAB JABLAS 4 JABLAS JABLAS JABLAS 2012 5 16 2012 3 31 107 91 198 1 7 11 4 JABLAS JABLAS 1

2012 JAB JABLAS 4 JABLAS JABLAS JABLAS 2012 5 16 2012 3 31 107 91 198 1 7 11 4 JABLAS JABLAS 1 2012 4 1 2012 1 JAB 2 ISO/IEC 17025 ISO/IEC 17025 11 JABLAS 15 15 17 19 2012 JAB JABLAS 4 JABLAS JABLAS JABLAS 2012 5 16 2012 3 31 107 91 198 1 7 11 4 JABLAS JABLAS 1 JABLAS JABLAS NEWS 42 20 JABLAS 5.

More information

28 Horizontal angle correction using straight line detection in an equirectangular image

28 Horizontal angle correction using straight line detection in an equirectangular image 28 Horizontal angle correction using straight line detection in an equirectangular image 1170283 2017 3 1 2 i Abstract Horizontal angle correction using straight line detection in an equirectangular image

More information

No.7, (2006) 2 Electronic Funds Transfer as the Foundation of the Monetary Value of Electronic Money - A Study on the JBA 1 Integrated Circuit

No.7, (2006) 2 Electronic Funds Transfer as the Foundation of the Monetary Value of Electronic Money - A Study on the JBA 1 Integrated Circuit No.7,321-332 (2006) 2 Electronic Funds Transfer as the Foundation of the Monetary Value of Electronic Money - A Study on the JBA 1 Integrated Circuit Cash Card Standard Specifications (Second Edition)

More information

08医療情報学22_1_水流final.PDF

08医療情報学22_1_水流final.PDF 22 (1), 702002: 59 59- The Problem of Nursing Common Language for the Information Sharing in Clinical Practice The fact-finding in regard to the correspondence between name and content of nursing action

More information

HASC2012corpus HASC Challenge 2010,2011 HASC2011corpus( 116, 4898), HASC2012corpus( 136, 7668) HASC2012corpus HASC2012corpus

HASC2012corpus HASC Challenge 2010,2011 HASC2011corpus( 116, 4898), HASC2012corpus( 136, 7668) HASC2012corpus HASC2012corpus HASC2012corpus 1 1 1 1 1 1 2 2 3 4 5 6 7 HASC Challenge 2010,2011 HASC2011corpus( 116, 4898), HASC2012corpus( 136, 7668) HASC2012corpus HASC2012corpus: Human Activity Corpus and Its Application Nobuo KAWAGUCHI,

More information

(4) ω t(x) = 1 ω min Ω ( (I C (y))) min 0 < ω < C A C = 1 (5) ω (5) t transmission map tmap 1 4(a) 2. 3 2. 2 t 4(a) t tmap RGB 2 (a) RGB (A), (B), (C)

(4) ω t(x) = 1 ω min Ω ( (I C (y))) min 0 < ω < C A C = 1 (5) ω (5) t transmission map tmap 1 4(a) 2. 3 2. 2 t 4(a) t tmap RGB 2 (a) RGB (A), (B), (C) (MIRU2011) 2011 7 890 0065 1 21 40 105-6691 1 1 1 731 3194 3 4 1 338 8570 255 346 8524 1836 1 E-mail: {fukumoto,kawasaki}@ibe.kagoshima-u.ac.jp, ryo-f@hiroshima-cu.ac.jp, fukuda@cv.ics.saitama-u.ac.jp,

More information

IPSJ SIG Technical Report 1,a) 1,b) 1,c) 1,d) 2,e) 2,f) 2,g) 1. [1] [2] 2 [3] Osaka Prefecture University 1 1, Gakuencho, Naka, Sakai,

IPSJ SIG Technical Report 1,a) 1,b) 1,c) 1,d) 2,e) 2,f) 2,g) 1. [1] [2] 2 [3] Osaka Prefecture University 1 1, Gakuencho, Naka, Sakai, 1,a) 1,b) 1,c) 1,d) 2,e) 2,f) 2,g) 1. [1] [2] 2 [3] 1 599 8531 1 1 Osaka Prefecture University 1 1, Gakuencho, Naka, Sakai, Osaka 599 8531, Japan 2 565 0871 Osaka University 1 1, Yamadaoka, Suita, Osaka

More information

1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2

1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2 CHLAC 1 2 3 3,. (CHLAC), 1).,.,, CHLAC,.,. Suspicious Behavior Detection based on CHLAC Method Hideaki Imanishi, 1 Toyohiro Hayashi, 2 Shuichi Enokida 3 and Toshiaki Ejima 3 We have proposed a method for

More information

独立行政法人情報通信研究機構 Development of the Information Analysis System WISDOM KIDAWARA Yutaka NICT Knowledge Clustered Group researched and developed the infor

独立行政法人情報通信研究機構 Development of the Information Analysis System WISDOM KIDAWARA Yutaka NICT Knowledge Clustered Group researched and developed the infor 独立行政法人情報通信研究機構 KIDAWARA Yutaka NICT Knowledge Clustered Group researched and developed the information analysis system WISDOM as a research result of the second medium-term plan. WISDOM has functions that

More information

untitled

untitled 17 9 15 IT 5061 C0047 TOE imagio D DataOverwriteSecurity Unit Type C Software TOE V0.04 PP EAL2 TOE TOE 18 3 24 IT Common Criteria for Information Technology Security Evaluation Version 2.1 Common Methodology

More information

untitled

untitled 2007 55 2 235 254 c 2007 1 2 3 3 2007 6 12 2007 11 1 20 8 2 1. 2004 Sakata et al. 2004 1 610 0394 1 3 2 176 8525 2 42 1 3 525 8577 1 1 1 236 55 2 2007 2003 2004 Camurri et al. 1999 2002 2005 CG 1987 1

More information

ICカード利用システムにおいて新たに顕現化したPre-play attackとその対策

ICカード利用システムにおいて新たに顕現化したPre-play attackとその対策 IC Pre-play attack IC IC IC EMV EMV 1 IC IC Pre-play attack ATM Pre-play attack Pre-play attack IC EMV Pre-play attack... E-mail: hidemitsu.izawa@boj.or.jp E-mail: katsuhisa.hirokawa@boj.or.jp / /2015.10

More information

Unknown

Unknown Journal of Breast and Thyroid Sonology Journal of Breast and Thyroid Sonology Vol.2, No.3 July 2013 Report The 30 th Meeting of Japan Association of Breast and Thyroid Sonology... 1 Department of Organ

More information

27 AR

27 AR 27 AR 28 2 19 12111002 AR AR 1 3 1.1....................... 3 1.1.1...................... 3 1.1.2.................. 4 1.2............................ 4 1.2.1 AR......................... 5 1.2.2......................

More information

"CAS を利用した Single Sign On 環境の構築"

CAS を利用した Single Sign On 環境の構築 CAS 2 Single Sign On 1,3, 2,3, 2, 2,3 1 2 3 May 31, 2007 ITRC p. 1/29 Plan of Talk Brief survey of Single Sign On using CAS Brief survey of Authorization Environment using CAS 2 Summary May 31, 2007 ITRC

More information

No. 3 Oct The person to the left of the stool carried the traffic-cone towards the trash-can. α α β α α β α α β α Track2 Track3 Track1 Track0 1

No. 3 Oct The person to the left of the stool carried the traffic-cone towards the trash-can. α α β α α β α α β α Track2 Track3 Track1 Track0 1 ACL2013 TACL 1 ACL2013 Grounded Language Learning from Video Described with Sentences (Yu and Siskind 2013) TACL Transactions of the Association for Computational Linguistics What Makes Writing Great?

More information

20mm 63.92% ConstantZoom U 5

20mm 63.92% ConstantZoom U 5 29 30 2 13 16350926 20mm 63.92% ConstantZoom U 5 1 3 1.1...................................... 3 1.2................................. 4 2 8 2.1............... 8 2.2............................ 8 2.3..

More information

SEJulyMs更新V7

SEJulyMs更新V7 1 2 ( ) Quantitative Characteristics of Software Process (Is There any Myth, Mystery or Anomaly? No Silver Bullet?) Zenya Koono and Hui Chen A process creates a product. This paper reviews various samples

More information

25 3 26 2 14 12350917 3 Cyclesports USBhostAPI Arduino 3 LED LED LED Cyclesports Cyclesports 1 4 1.1...................................... 4 1.2................. 5 1.3.................................

More information

Real AdaBoost HOG 2009 3 A Graduation Thesis of College of Engineering, Chubu University Efficient Reducing Method of HOG Features for Human Detection based on Real AdaBoost Chika Matsushima ITS Graphics

More information

"CAS を利用した Single Sign On 環境の構築"

CAS を利用した Single Sign On 環境の構築 CAS 2 SSO Authorization 1,3, 2,3, 2, 2,3 1 2 3 Central Authentication and Authorization Service (CAS 2 ) Web Application Single Sign On Authorization CAS 2 SSO/AuthZ Jan. 30 2007, p. 1/40 Plan of Talk

More information

untitled

untitled 22 2 ii 20 10 iii iv 1...1 1.1....1 1.2....2 1.3....3 2...10 2.1....10 2.1.1....10 2.1.1.1.... 11 2.1.1.2....13 2.1.2....16 2.1.3....18 2.1.3.1....18 2.1.3.2....21 2.1.3.3....22 2.2....25 3...29 3.1....29

More information

非営利組織における純資産と負債の区分

非営利組織における純資産と負債の区分 IMES DISCUSSION PAPER SERIES Discussion Paper No. 2009-J-11 INSTITUTE FOR MONETARY AND ECONOMIC STUDIES BANK OF JAPAN 103-8660 2-1-1 http://www.imes.boj.or.jp IMES Discussion Paper Series 2009-J-11 2009

More information

会社法制上の資本制度の変容と企業会計上の資本概念について

会社法制上の資本制度の変容と企業会計上の資本概念について IMES DISCUSSION PAPER SERIES Discussion Paper No. 2006-J-1 INSTITUTE FOR MONETARY AND ECONOMIC STUDIES BANK OF JAPAN 103-8660 30 http://www.imes.boj.or.jp IMES Discussion Paper Series 2006-J-1 2006 1

More information

IPSJ SIG Technical Report Vol.2014-DPS-158 No.27 Vol.2014-CSEC-64 No /3/6 1,a) 2,b) 3,c) 1,d) 3 Cappelli Bazen Cappelli Bazen Cappelli 1.,,.,.,

IPSJ SIG Technical Report Vol.2014-DPS-158 No.27 Vol.2014-CSEC-64 No /3/6 1,a) 2,b) 3,c) 1,d) 3 Cappelli Bazen Cappelli Bazen Cappelli 1.,,.,., 1,a),b) 3,c) 1,d) 3 Cappelli Bazen Cappelli Bazen Cappelli 1.,,,,,.,,,,.,,.,,,,.,, 1 Department of Electrical Electronic and Communication Engineering Faculty of Science and Engineering Chuo University

More information

untitled

untitled IT E- IT http://www.ipa.go.jp/security/ CERT/CC http://www.cert.org/stats/#alerts IPA IPA 2004 52,151 IT 2003 12 Yahoo 451 40 2002 4 18 IT 1/14 2.1 DoS(Denial of Access) IDS(Intrusion Detection System)

More information

IPSJ SIG Technical Report Vol.2014-MBL-70 No.49 Vol.2014-UBI-41 No /3/15 2,a) 2,b) 2,c) 2,d),e) WiFi WiFi WiFi 1. SNS GPS Twitter Facebook Twit

IPSJ SIG Technical Report Vol.2014-MBL-70 No.49 Vol.2014-UBI-41 No /3/15 2,a) 2,b) 2,c) 2,d),e) WiFi WiFi WiFi 1. SNS GPS Twitter Facebook Twit 2,a) 2,b) 2,c) 2,d),e) WiFi WiFi WiFi 1. SNS GPS Twitter Facebook Twitter Ustream 1 Graduate School of Information Science and Technology, Osaka University, Japan 2 Cybermedia Center, Osaka University,

More information

01-全体表紙.PDF

01-全体表紙.PDF 1 2005 11 26 1 1 5 15 18 1 1. 2005 11 26 09 00 1245 12 45 18207 2. 1,000 2,000 3. 4,000 2,000 5,000 4. 10,000 2,000 30,000 5. 1 20 10 1300 17 00 1500 1700 6. 7. TEL 047-372-4111 821 FAX 047-373-9901 E-MailAPI-jimu@cuc.ac.jp

More information

Run-Based Trieから構成される 決定木の枝刈り法

Run-Based Trieから構成される  決定木の枝刈り法 Run-Based Trie 2 2 25 6 Run-Based Trie Simple Search Run-Based Trie Network A Network B Packet Router Packet Filtering Policy Rule Network A, K Network B Network C, D Action Permit Deny Permit Network

More information