生体認証システムにおける人工物を用いた攻撃に対するセキュリティ評価手法の確立に向けて
|
|
- ゆたか ふじた
- 5 years ago
- Views:
Transcription
1 ATM 2016 ATM IC... / /
2 1. ATM Automated Tellers Machine IC ATM ATM ATM False Accept Rate: FAR ISO International Organization for Standardization IEC International Electrotechnical Commission ISO and IEC [2006] ICB 2015 International Conference on Biometrics IC ATM /
3 Tome et al. [2015] presentation attack ISO/IEC Common Criteria ISO/IEC OKI 2015,
4 ID 2 ID ID ATM 2009 IC ATM ATM... 2 ATM ID IC 1 IC 3 58 /
5 ISO/IEC ISO and IEC [2009] ATM , IC IC IC 59
6 A Tome, Vanoni, and Marcel [2014] B C B D 95 B C E D /
7 2006. Matsumoto et al. [2002] 2007,
8 Busch [2014] /
9 2 Idiap Research Institute BEAT Biometrics Evaluation and Testing 2012 BEAT 63
10 . 2 OHP OKI D 11 Li et al. [2014] 64 /
11 D OKI 2015 OKI 2015, 2016 OKI OKI
12 attack potential ISO/IEC Common Evaluation Methodology: CEMCommon Criteria Maintenance Board [2012] 66 /
13 1999 ISO/IEC Security Target: ST ISO/IEC Protection Profile: PP IT Japan Information Technology Security Evaluation and Certification Scheme: JISEC JISEC Federal Office for Information Security [2013] Morpho [2013] 17 67
14 Yamada [2015] ISO/IEC ISO/IEC ISO/IEC ISO/IEC ISO/IEC ISO/IEC JTC1/SC37 Busch [2014] ISO/IEC Presentation Attack Detection ISO/IEC /
15 APCER Attack Presentation Classification Error Rate 19 ISO/IEC ISO/IEC JTC1/SC27 ISO/IEC A presentation attack detection subsystem B A data capture subsystem C B comparison subsystem 3 19 APCER APCER 69
16 ISO/IEC ISO/IEC ISO/IEC ATM 70 /
17 Android ios Bank of America [2015] FIDO Fast IDentity Online JISEC b
18 5 5 A J /
19 5 ST ST A B Introduction C ST D ST Conformance Claims E Security F Problem Definition G E H Security Objectives I H J Extended Component Definition Security Requirements, TOE Summary Specifications Morpho [2013] 73
20 Matsumoto et al. [2002] 74 /
21 BioX No ISO/IEC IT 2015 a IT CCM-02-A 2015 b SC37 Biometrics WG3 Biometric Data Interchange Formats JAISA IC OKI
22 Vol. 44 No Vol. 106 No SC27 JAISA 2015 Bank of America, Bank of America Introduces Fingerprint and Touch ID Sign-in for its Mobile Banking App, Bank of America Newsroom, September 15, Busch, Christoph, Related Standards, Handbook of Biometric Anti-Spoofing, Springer- Verlag, 2014, pp Common Criteria Maintenance Board, Common Criteria Evaluation Methodology for IT Security Evaluation, Version 3.1, Federal Office for Information Security, Certification Report BSI-DSZ-CC for MorphoSmart Optic 301, Version 1.0, Future of Identity in the Information Society (FIDIS), D6.1: Forensic Implications of Identity Management Systems, International Organization for Standardization (ISO), and International Electrotechnical Commission (IEC), ISO/IEC Information Technology Security Techniques Security Evaluation of Biometrics, ISO, 2009., and, ISO/IEC Information Technology Biometric Performance Testing and Reporting Part 1: Principles and Framework, ISO, Li, Stan Z., Javier Galbally, Andre Anjos, and Sébastien Marcel, Evaluation Databases, 76 /
23 Handbook of Biometric Anti-Spoofing, Springer-Verlag, 2014, pp Matsumoto, Tsutomu, Hiroyuki Matsumoto, Koji Yamada, and Satoshi Hoshino, Impact of Artificial Gummy Fingers on Fingerprint Systems, Optical Security and Counterfeit Deterrence Techniques IV, Proceeding of SPIE, Vol. 4677, SPIE, 2002, pp Miura, Naoto, Akio Nagasaka, and Takafumi Miyatake, Extraction of Finger-Vein Patterns Using Maximum Curvature Points in Image Profiles, Proceedings of IAPR Conference on Machine Vision Applications, IAPR, 2005, pp Morpho, MorphoSmart Optic 301 Public Security Target SSE , Raghavendra, Ramachandra, Manasa Avinash, Sébastien Marcel, and Christoph Busch, Finger vein Liveness Detection Using Motion Magnification, Proceedings of the 7th IEEE International Conference on Biometrics: Theory, Applications and Systems (BATS), IEEE, 2015., Kiran B. Raja, Jayachander Surbiryala, and Christoph Busch, A Low-cost Multimodal Biometric Sensor to Capture Finger Vein and Fingerprint, Proceedings of International Joint Conference on Biometrics, IJCB, 2014, pp Tome, Pedro, and Sébastien Marcel, On the Vulnerability of Palm Vein Recognition to Spoofing Attacks, Proceedings of IAPR International Conference on Biometrics 2015, IAPR, 2015., Ramachandra Raghavendra, Christoph Busch, Santosh Tirunagari, Norman Poh, B. H. Shekar, Diego Gragnaniello, Carlo Sansone, Luisa Verdoliva, and Sébastien Marcel, The 1st Competition on Counter Measures to Finger Vein Spoofing Attacks, Proceedings of IAPR International Conference on Biometrics 2015, IAPR, 2015., Matthias Vanoni, and Sébastien Marcel, On the Vulnerability of Finger Vein Recognition to Spoofing, Proceedings of IEEE International Conference of the Biometrics Special Interest Group 2014, IEEE, Ton, Bram, Vascular Pattern of the Finger: Biometric of the Future? Sensor Design, Data Collection and Performance Verification, Master Thesis, University of Twente, Une, Masashi, Akira Otsuka, and Hideki Imai, Wolf Attack Probability: A Theoretical Security Measure in Biometrics-Based Authentication Systems, IEICE Trans. Inf. & Syst., Vol. E91-D, No. 5, IEICE, 2008, pp Wang, Yiding, and Zhanyong Zhao, Liveness Detection of Dorsal Hand Vein Based on the Analysis of Fourier Spectral, Biometric Recognition, Springer International Publishing, 2013, pp Yamada, Asahiko, Protection Profile for Biometric Verification Products (BVPPP), Version 1.0, Zhou, Yingbo, and Ajay Kumar, Human Identification Using Palm-Vein Images, IEEE 77
24 Transactions on Information Forensics and Security, Vol. 6, No. 4, 2011, pp /
25 ISO/IEC A A
26 /
27 2. 81
28 1 A 2 Tome, Vanoni, and Marcel [2014] Miura, Nagasaka, and Miyatake [2005] Ton [2012] /
29 A 2 Tome et al. [2015] A B 220 A B 4 A B
30 A 2 Raghavendra et al. [2015] Raghavendra et al. [2014] /
31 A Miura, Nagasaka, and Miyatake [2005] Une, Otsuka, and Imai [2008] OHP OHP 85
32 2 A 4 Tome and Marcel [2015] Zhou and Kumar [2011] /
33 3. OKI basic enhanced-basic moderate high beyond high A 5 87
34 A 5 Future of Identity in the Information Society [2006] 1 7 basic proficient 1 standard Wang and Zhao [2013] Tome, Vanoni, and Marcel OHP 8 basic proficient 2 1 [2014] 2014 OHP standard 13 enhanced-basic 2006 proficient 1 2 specialized OKI /
35 a A Protection Profile: PP PP PP ISO/IEC PP PP ISO/IEC PP PP ISO/IEC ISO/IEC B PP Security Target: ST ST 89
36 PP ISO/IEC ST PP PP ST ISO/IEC C International Laboratory Accreditation Cooperation: ILAC IT ECSEC Laboratory TÜV Informationstechnik GmbH Evaluation Body for IT-Security D PP ST ST E /
生体認証システムにおける情報漏洩対策技術の研究動向
ATM 1 IC ATM ATM IC IC ATM E-mail: masataka.suzuki@boj.or.jp E-mail: inuma.manabu@aist.go.jp E-mail: a-otsuka@aist.go.jp //2010.4 229 1. 2004 ATM PC ATM FISC FISC [2009] FISC [2009] 35-1 ATM IC ATM ATM
More informationリテール・バンキング・システムのICカード対応に関する現状とその課題
IC IC IC ATM IC IC ATM IC IC IC IC E-mail: yuuko.tamura@boj.or.jp E-mail: hirokawa@imes.boj.or.jp IC IC MS IC IC IC IC IC IC IC MS IC IC IC IC IC ICIC ICATM ATMIC IC IC ATMMS IC MS IC IC IC IC ATM IC ICIC
More informationCopyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved. 1
Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved. 1 ISO/IEC 15408 ISO/IEC 15408 Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved.
More informationuntitled
TOE 21 7 22 IT 9053 C0217 TOE bizhub C652 / bizhub C552 / ineo + 652 / ineo + 552 / VarioLink 6522c / VarioLink 5522c bizhub C652 / bizhub C552 / ineo + 652 / ineo + 552 / VarioLink 6522c / VarioLink 5522c
More information5005-toku3.indd
3 1 CMMICMM Capability Maturity Model ISO : International Organization for Standardization IEC : International Electrotechnical CommissionJTC1 : Joint Technical Committee 1SC7 : Sub Committee 7 SC7 WG
More information橡セキュリティポリシー雛形策定に関する調査報告書
13 2 KM 12 7 10 ISO/IEC TR 13335 Techniques for the Management of IT Security ISO/IEC 15408 Evaluation Criteria for IT Security BS7799 A Code of Practice for Information Security Management RFC2196 Site
More informationInformation Security Management System ISMS Copyright JIPDEC ISMS,
ISMS Copyright JIPDEC ISMS, 2005 1 Copyright JIPDEC ISMS, 2005 2 Copyright JIPDEC ISMS, 2005 3 Copyright JIPDEC ISMS, 2005 4 ISO JIS JIS ISO JIS JIS JIS ISO JIS JIS 22 23 ISO SC27 ISO SC27 ISO/IEC 17799
More informationJIS Z 9001:1998JIS Z 9002:1998 ISO/IEC 17025ISO/IEC Guide 25
JIS Q 17025 IDT, ISO/IEC 17025 IT JIS Z 9001:1998JIS Z 9002:1998 ISO/IEC 17025ISO/IEC Guide 25 JIS Q 17025 IDT, ISO/IEC 17025 IT IT JIS Q 17025ISO/IEC 17025 (2) JIS Z 9358 ISO/IEC Guide 58 (3) testing
More information2006/6/16 2006/9/1 2007/11/9 () 2011/4/21 2005 2006 3 (2005 12 ())2005 12 13 2011 4 21 2011 4 ii
2011 4 2006/6/16 2006/9/1 2007/11/9 () 2011/4/21 2005 2006 3 (2005 12 ())2005 12 13 2011 4 21 2011 4 ii 1 2 A 3 B C IT NISD-K304-101 NISD-K305-101 iii ST ST DM6-08-101 2011 4 ST ST NISD-K304-101 NISD-K305-101
More informationCopyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved. 1
Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved. 1 ISO/IEC 15408 ISO/IEC 15408 Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved.
More informationCIA+
ECOM 200511 e ECOM CIA+ Integrity Confidentiality Availability Phishing fishing http://www.nikkeibp.co.jp/ http://www.nikeibp.co.jp/ DoSDenial of Service DoS IT IT ROI 1/2 2/2 DMZ IT TESEC( Common
More information<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F5F A815B FD B A5F E646F63>
2008 年度版リストガイド ( メッセージ認証コード ) 平成 21 年 3 月 独立行政法人情報通信研究機構独立行政法人情報処理推進機構 1 1 1.1............................. 1 1.1.1............................ 1 1.1.2....................... 1 1.1.3...........................
More information幹部会、幹部懇談会の話題
生体認証における セキュリティ評価と国際標準化 2016 年 11 月 17 日 産業技術総合研究所 山田朝彦 1 本講演での 生体認証 Biometric verification(1:1) Biometric identification(1:n) は含まない 2 本講演での セキュリティ評価 セキュリティ評価とは 誰 ( 甲 ) のためのか A) 特定の組織 B) 不特定であるが目的 用途を同一とする組織
More informationuntitled
TOE TOE PP 20 3 25 (IT 8210) C0220 Hitachi Adaptable Modular Storage 2300 0862/ A-M EAL2 TOE 21 6 29 IT Common Criteria for Information Technology Security Evaluation Version 2.3 Common Methodology for
More information2-工業会活動.indd
工業会活動 ~SAE(Society of Automotive Engineers) 委員会参加報告 ~ 1. はじめに SAE RTCA Radio Technical Commission for Aeronautics ARINC Aeronautical Radio, Incorporated SAE RTCA ARINC FAA Federal Aviation Administration
More informationuntitled
2001 9 11 5 () IC ICAO(ICAO-TR) (GSC-IS) / ISO/IEC CD 19794-5 5 8 ICAO-NTWG SC17/WG3 16 3 31 Personal ID Documents 1 ------------------------------------------------------------------ 3 2 ---------------------------------------------------------------------
More information1 Kinect for Windows M = [X Y Z] T M = [X Y Z ] T f (u,v) w 3.2 [11] [7] u = f X +u Z 0 δ u (X,Y,Z ) (5) v = f Y Z +v 0 δ v (X,Y,Z ) (6) w = Z +
3 3D 1,a) 1 1 Kinect (X, Y) 3D 3D 1. 2010 Microsoft Kinect for Windows SDK( (Kinect) SDK ) 3D [1], [2] [3] [4] [5] [10] 30fps [10] 3 Kinect 3 Kinect Kinect for Windows SDK 3 Microsoft 3 Kinect for Windows
More information(a) (b) (c) Canny (d) 1 ( x α, y α ) 3 (x α, y α ) (a) A 2 + B 2 + C 2 + D 2 + E 2 + F 2 = 1 (3) u ξ α u (A, B, C, D, E, F ) (4) ξ α (x 2 α, 2x α y α,
[II] Optimization Computation for 3-D Understanding of Images [II]: Ellipse Fitting 1. (1) 2. (2) (edge detection) (edge) (zero-crossing) Canny (Canny operator) (3) 1(a) [I] [II] [III] [IV ] E-mail sugaya@iim.ics.tut.ac.jp
More information...i A
...i A 1....2 1.1...2 1.2...2 1.3...2 2....3 2.1...4 2.1.1...4 2.1.2...4 2.1.3...6 2.1.4...7 2.1.5...7 2.1.6...8 2.2...8 2.2.1...8 2.2.2...9 2.3...10 3.... 11 3.1...12 3.2...12 3.2.1...13 3.2.2...18 3.2.3...20
More information研究レポート表紙.PDF
No.118 November 2001 ISO ISO takeishi@fri.fujitsu.co.jp ISO14001 CEAR A4823 1. ISO14000 ISO14000 ISO14001 2. ISO ISO. ISO14001 ISO9000 OHSAS18001 18002 ISO14001 ISO IEC13335 ISO10006. ISO ISO14001 ISO9000
More informationKey Words: probabilisic scenario earthquake, active fault data, Great Hanshin earthquake, low frequency-high impact earthquake motion, seismic hazard map 3) Cornell, C. A.: Engineering Seismic
More informationFig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels).
Fig. 1 The scheme of glottal area as a function of time Fig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels). Fig, 4 Parametric representation
More informationJapanese.PDF
2002 11 2 3 Part I 4 5 6 3.1WTO/TBT 2 3 6 3.2ISO/IEC 7 3.3 7 3.4 7 3.5 8 3.6 8 9 4.1 9 4.2 9 4.3 10 12 Part II 13 1.1 13 1.2 13 1.3 14 1.4 14 1.5 14 2 14 3 15 3.1 15 3.2 16 3.3 17 3.4 17 3.5 18 3.6 18
More information第 1 回バイオメトリクス研究会 ( 早稲田大学 ) THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS Proceedings of Biometrics Workshop,169
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS Proceedings of Biometrics Workshop,169-8555 3-4-1,169-8555 3-4-1 E-mail: s hayashi@kom.comm.waseda.ac.jp, ohki@suou.waseda.jp Wolf
More information2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055
1 1 1 2 DCRA 1. 1.1 1) 1 Tactile Interface with Air Jets for Floating Images Aya Higuchi, 1 Nomin, 1 Sandor Markon 1 and Satoshi Maekawa 2 The new optical device DCRA can display floating images in free
More informationMicrosoft PowerPoint _JAISA_SC37標準化セミナー_WG3_V8最終 [互換モード]
JAISA BSC 委員会主催第 11 回 SC37 関係最新動向セミナー 2014 年 10 月 7 日 SC37 Biometrics 標準化報告 WG3 Biometric Data Interchange Formats SC37WG3 国内小委員会主査新崎卓 (( 株 ) 富士通研究所 ) Biometric Data Interchange Formats システム間でバイオメトリクスデータを受け渡すフォーマットの標準化
More information(a) 1 (b) 3. Gilbert Pernicka[2] Treibitz Schechner[3] Narasimhan [4] Kim [5] Nayar [6] [7][8][9] 2. X X X [10] [11] L L t L s L = L t + L s
1 1 1, Extraction of Transmitted Light using Parallel High-frequency Illumination Kenichiro Tanaka 1 Yasuhiro Mukaigawa 1 Yasushi Yagi 1 Abstract: We propose a new sharpening method of transmitted scene
More information顔画像を用いた個人認証システムの性能検討に関する研究
12 Research on performance examination of individual attestation system using face image 1010429 2001 2 5 1997 FaceIt The age using various biometrics for the attestation with the computer to attest the
More information001†`032 (Page 1)
ISO の国際標準化専門委員会 2 International Organization for Standardization (ISO) CASCO COPOLCO DEVCO INFCO General Assembly Member Bodies Correspondent Members Subscriber Members Council Technical Management
More informationxx/xx Vol. Jxx A No. xx 1 Fig. 1 PAL(Panoramic Annular Lens) PAL(Panoramic Annular Lens) PAL (2) PAL PAL 2 PAL 3 2 PAL 1 PAL 3 PAL PAL 2. 1 PAL
PAL On the Precision of 3D Measurement by Stereo PAL Images Hiroyuki HASE,HirofumiKAWAI,FrankEKPAR, Masaaki YONEDA,andJien KATO PAL 3 PAL Panoramic Annular Lens 1985 Greguss PAL 1 PAL PAL 2 3 2 PAL DP
More informationIPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for
1 2 3 3 1 Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for Mobile Terminals Kaoru Wasai 1 Fumio Sugai 2 Yosihiro Kita 3 Mi RangPark 3 Naonobu
More informationVol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A
Vol. 45 No. 8 Aug. 2004, 1999 11 (1) (2) (3) 2003 7 Digital Evidence Enhancement for the Japanese Official Gazette Data Providing Services Atsuko Umezawa,, Hiroyuki Ueno, Yukio Miyata, Yasuharu Saikawa,
More informationGaze Head Eye (a) deg (b) 45 deg (c) 9 deg 1: - 1(b) - [5], [6] [7] Stahl [8], [9] Fang [1], [11] Itti [12] Itti [13] [7] Fang [1],
1 1 1 Structure from Motion - 1 Ville [1] NAC EMR-9 [2] 1 Osaka University [3], [4] 1 1(a) 1(c) 9 9 9 c 216 Information Processing Society of Japan 1 Gaze Head Eye (a) deg (b) 45 deg (c) 9 deg 1: - 1(b)
More information2007/8 Vol. J90 D No. 8 Stauffer [7] 2 2 I 1 I 2 2 (I 1(x),I 2(x)) 2 [13] I 2 = CI 1 (C >0) (I 1,I 2) (I 1,I 2) Field Monitoring Server
a) Change Detection Using Joint Intensity Histogram Yasuyo KITA a) 2 (0 255) (I 1 (x),i 2 (x)) I 2 = CI 1 (C>0) (I 1,I 2 ) (I 1,I 2 ) 2 1. [1] 2 [2] [3] [5] [6] [8] Intelligent Systems Research Institute,
More information(MIRU2008) HOG Histograms of Oriented Gradients (HOG)
(MIRU2008) 2008 7 HOG - - E-mail: katsu0920@me.cs.scitec.kobe-u.ac.jp, {takigu,ariki}@kobe-u.ac.jp Histograms of Oriented Gradients (HOG) HOG Shape Contexts HOG 5.5 Histograms of Oriented Gradients D Human
More informationDEIM Forum 2012 E Web Extracting Modification of Objec
DEIM Forum 2012 E4-2 670 0092 1 1 12 E-mail: nd11g028@stshse.u-hyogo.ac.jp, {dkitayama,sumiya}@shse.u-hyogo.ac.jp Web Extracting Modification of Objects for Supporting Map Browsing Junki MATSUO, Daisuke
More informationインドシナ産業基板基礎調査団報告書
J R 01-08 ABBREVIATlON AOAC APEC APLAC APLMP APMP ASEAN ASTM BIPM BNM BOA BPS BS CBWM CGPM CMS CNLA CNS CSIR CSIRO DOE DOM DOST DSMQC DSN DSS DTI EMC ETL FAO GDP Association of Official Analytical Chemists
More information10_08.dvi
476 67 10 2011 pp. 476 481 * 43.72.+q 1. MOS Mean Opinion Score ITU-T P.835 [1] [2] [3] Subjective and objective quality evaluation of noisereduced speech. Takeshi Yamada, Shoji Makino and Nobuhiko Kitawaki
More information1(a) (b),(c) - [5], [6] Itti [12] [13] gaze eyeball head 2: [time] [7] Stahl [8], [9] Fang [1], [11] 3 -
Vol216-CVIM-22 No18 216/5/12 1 1 1 Structure from Motion - 1 8% Tobii Pro TX3 NAC EMR ACTUS Eye Tribe Tobii Pro Glass NAC EMR-9 Pupil Headset Ville [1] EMR-9 [2] 1 Osaka University Gaze Head Eye (a) deg
More informationComputer Security Symposium October ,a) 1,b) Microsoft Kinect Kinect, Takafumi Mori 1,a) Hiroaki Kikuchi 1,b) [1] 1 Meiji U
Computer Security Symposium 017 3-5 October 017 1,a) 1,b) Microsoft Kinect Kinect, Takafumi Mori 1,a) Hiroaki Kikuchi 1,b) 1. 017 5 [1] 1 Meiji University Graduate School of Advanced Mathematical Science
More information.,,, [12].,, [13].,,.,, meal[10]., [11], SNS.,., [14].,,.,,.,,,.,,., Cami-log, , [15], A/D (Powerlab ; ), F- (F-150M, ), ( PC ).,, Chart5(ADIns
Cami-log: 1,a) 1,b) 1,c) 1,d),,,.,,.,,,.,, Cami-log,. Cami-log : Proposal of Application to Improve Daily Chewing Activities using Myoelectric Information Hiroki Kurosawa 1,a) Sho Mitarai 1,b) Nagisa Munekata
More informationIPSJ SIG Technical Report GPS LAN GPS LAN GPS LAN Location Identification by sphere image and hybrid sensing Takayuki Katahira, 1 Yoshio Iwai 1
1 1 1 GPS LAN GPS LAN GPS LAN Location Identification by sphere image and hybrid sensing Takayuki Katahira, 1 Yoshio Iwai 1 and Hiroshi Ishiguro 1 Self-location is very informative for wearable systems.
More information& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us
1,a) 1 1 1 1 2 2 2011 8 10, 2011 12 2 1 Bluetooth 36 2 3 10 70 34 A Health Management Service by Cell Phones and Its Usability Evaluation Naofumi Yoshida 1,a) Daigo Matsubara 1 Naoki Ishibashi 1 Nobuo
More information情報セキュリティの現状と課題
443 IT IT 1 1 2 3 4 1 OECD( 1992 Confidentiality Integrity Availability 2 2000.2. http://www.npa.go.jp/hightech/sec_taikei/taikei.htm 3 2000.12. http://www.kantei.go.jp/jp/it/security/taisaku/2000_1215/1215actionplan.html
More informationIPSJ SIG Technical Report Vol.2010-CVIM-170 No /1/ Visual Recognition of Wire Harnesses for Automated Wiring Masaki Yoneda, 1 Ta
1 1 1 1 2 1. Visual Recognition of Wire Harnesses for Automated Wiring Masaki Yoneda, 1 Takayuki Okatani 1 and Koichiro Deguchi 1 This paper presents a method for recognizing the pose of a wire harness
More information04.™ƒ”R/’Ô”�/’Xfl©
Digicashecash PC IC AI LicenseCoin License Pk A L Pk A W Rc C Coin License Okamoto and Ohta Okamoto and Ohta IC Digicashecash TTP Trusted Third Party TTP TTP TTP TTP: Trusted Third Party TTPTTP TTP TTP
More information2
Copyright 2008 Nara Institute of Science and Technology / Osaka University 2 Copyright 2008 Nara Institute of Science and Technology / Osaka University CHAOS Report in US 1994 http://www.standishgroup.com/sample_research/
More information人工物メトリクスの評価における現状と課題
E-mail: h.matsumoto@nhkspg.co.jp E-mail: masashi.une@boj.or.jp E-mail: tsutomu@mlab.jks.ynu.ac.jp E-mail: iwashita@imes.boj.or.jp E-mail: sugahara@nhkspg.co.jp artifact-metrics biometrics artifact-metric
More information3.1 Thalmic Lab Myo * Bluetooth PC Myo 8 RMS RMS t RMS(t) i (i = 1, 2,, 8) 8 SVM libsvm *2 ν-svm 1 Myo 2 8 RMS 3.2 Myo (Root
1,a) 2 2 1. 1 College of Information Science, School of Informatics, University of Tsukuba 2 Faculty of Engineering, Information and Systems, University of Tsukuba a) oharada@iplab.cs.tsukuba.ac.jp 2.
More informationVol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m
Vol.55 No.1 2 15 (Jan. 2014) 1,a) 2,3,b) 4,3,c) 3,d) 2013 3 18, 2013 10 9 saccess 1 1 saccess saccess Design and Implementation of an Online Tool for Database Education Hiroyuki Nagataki 1,a) Yoshiaki
More information位相限定相関法と そのバイオメトリクス認証への応用
1 バイオメトリクスの最新動向 ~IJCB2011 学会報告 ~ 東北大学大学院情報科学研究科 伊藤康一 本発表の目的 2 パターン認識やセキュリティの研究者に世界の最新の研究動向を紹介したい 国際会議で日本の研究者による発表が少ないので, 世界で研究成果をアピールしてもらいたい 私見が多分に含まれていますので, 一意見として参考にしていただければ幸いです. 発表手順 3 国際会議にみる最近の研究動向
More information特集_03-07.Q3C
3-7 Error Detection and Authentication in Quantum Key Distribution YAMAMURA Akihiro and ISHIZUKA Hirokazu Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution
More informationFig. 2 Signal plane divided into cell of DWT Fig. 1 Schematic diagram for the monitoring system
Study of Health Monitoring of Vehicle Structure by Using Feature Extraction based on Discrete Wavelet Transform Akihisa TABATA *4, Yoshio AOKI, Kazutaka ANDO and Masataka KATO Department of Precision Machinery
More informationIPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-
1 3 5 4 1 2 1,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-View Video Contents Kosuke Niwa, 1 Shogo Tokai, 3 Tetsuya Kawamoto, 5 Toshiaki Fujii, 4 Marutani Takafumi,
More information3 2 2 (1) (2) (3) (4) 4 4 AdaBoost 2. [11] Onishi&Yoda [8] Iwashita&Stoica [5] 4 [3] 3. 3 (1) (2) (3)
(MIRU2012) 2012 8 820-8502 680-4 E-mail: {d kouno,shimada,endo}@pluto.ai.kyutech.ac.jp (1) (2) (3) (4) 4 AdaBoost 1. Kanade [6] CLAFIC [12] EigenFace [10] 1 1 2 1 [7] 3 2 2 (1) (2) (3) (4) 4 4 AdaBoost
More information1 Web DTN DTN 2. 2 DTN DTN Epidemic [5] Spray and Wait [6] DTN Android Twitter [7] 2 2 DTN 10km 50m % %Epidemic 99% 13.4% 10km DTN [8] 2
DEIM Forum 2014 E7-1 Web DTN 112 8610 2-1-1 UCLA Computer Science Department 3803 Boelter Hall, Los Angeles, CA 90095-1596, USA E-mail: yuka@ogl.is.ocha.ac.jp, mineo@cs.ucla.edu, oguchi@computer.org Web
More information2.R R R R Pan-Tompkins(PT) [8] R 2 SQRS[9] PT Q R WQRS[10] Quad Level Vector(QLV)[11] QRS R Continuous Wavelet Transform(CWT)[12] Mexican hat 4
G-002 R Database and R-Wave Detecting System for Utilizing ECG Data Takeshi Nagatomo Ikuko Shimizu Takeshi Ikeda Akio Sashima Koichi Kurumatani R R MIT-BIH R 90% 1. R R [1] 2 24 16 Tokyo University of
More informationIPSJ SIG Technical Report Vol.2017-ARC-225 No.12 Vol.2017-SLDM-179 No.12 Vol.2017-EMB-44 No /3/9 1 1 RTOS DefensiveZone DefensiveZone MPU RTOS
1 1 RTOS DefensiveZone DefensiveZone MPU RTOS RTOS OS Lightweight partitioning architecture for automotive systems Suzuki Takehito 1 Honda Shinya 1 Abstract: Partitioning using protection RTOS has high
More informationIPSJ SIG Technical Report Vol.2009-CVIM-167 No /6/10 Real AdaBoost HOG 1 1 1, 2 1 Real AdaBoost HOG HOG Real AdaBoost HOG A Method for Reducing
Real AdaBoost HOG 1 1 1, 2 1 Real AdaBoost HOG HOG Real AdaBoost HOG A Method for Reducing number of HOG Features based on Real AdaBoost Chika Matsushima, 1 Yuji Yamauchi, 1 Takayoshi Yamashita 1, 2 and
More information4. C i k = 2 k-means C 1 i, C 2 i 5. C i x i p [ f(θ i ; x) = (2π) p 2 Vi 1 2 exp (x µ ] i) t V 1 i (x µ i ) 2 BIC BIC = 2 log L( ˆθ i ; x i C i ) + q
x-means 1 2 2 x-means, x-means k-means Bayesian Information Criterion BIC Watershed x-means Moving Object Extraction Using the Number of Clusters Determined by X-means Clustering Naoki Kubo, 1 Kousuke
More informationST作成の手引
7 3 1.2 1 ST ST ST ST ST CC TOE TOE TOE IT TOE TOE TOE IT TOE TOE TOE PP PP PP PP PP 2 ISO/IEC 15408( 1999) Evaluation Criteria for IT SecurityCC JIS X5070(2000) ST CC ST ST CC ST ST CC IT CCCommon Criteria
More informationTaro12-認定-部門-ASG101-06
JIS Q 17025(ISO/IEC 17025(IDT)) JIS Q17025(ISO/IEC 17025(IDT)) --- --- JNLA JCSS ISO/IEC 17025 JIS Q 17025 IAJapan ILAC APLAC JIS Q17011 ISO/IEC 17011 MRA ILACAPLAC MRA IAJapan (3) JNLAJCSS (4) testing
More informationProfile 39% 9,311 33% 7,846 28% 6,853 2
1 Profile 39% 9,311 33% 7,846 28% 6,853 2 Message 3 Vision 4 5 Executive Summary 6 7 Management Systems 8 9 Management Systems 10 11 Design for Environment 12 3R 3R 3R 3R 13 14 Design for Environment P
More information21 Key Exchange method for portable terminal with direct input by user
21 Key Exchange method for portable terminal with direct input by user 1110251 2011 3 17 Diffie-Hellman,..,,,,.,, 2.,.,..,,.,, Diffie-Hellman, i Abstract Key Exchange method for portable terminal with
More informationIPSJ SIG Technical Report iphone iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Proc
iphone 1 1 1 iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Processing Unit)., AR Realtime Natural Feature Tracking Library for iphone Makoto
More information14) Ogihara ATM 15) ATM 10 16) 17),18) 1 4) 1 8),9) 10) 12) realadaboost 13) % 12) 2. 3 Gluhchev 19) 1 19) 2 10) 12) 3. 2 ID 1 8) 9),20) 2 2
1, 1 2 1 33 realadaboost 30 4.1% Biometric Person Authentication Method Using Pen Holding Feature Daigo Muramats, 1, 1 Yuki Hashimoto 1 and Hiroyuki Ogata 1 We focus on a biometric person authentication
More information情報分野のアクセシビリティ標準について
情報分野のアクセシビリティ標準について 経済産業省国際電気標準課 小出啓介 Agenda 1. 障害者白書 2. JTC 1/SC 35 で開発しているアクセシビリティ関連規格の紹介 3. 映像字幕事業 (ISO/IEC 20071-23) の取り組みの紹介 4. JIS X 8341-3 の改正について 5. Web Accessibility, BSI Code of Practice 規格の開発と国内対応について
More information内閣官房情報セキュリティセンター(NISC)
( ) ...1 1.1.1...1 (1)..1 (2)...1 (3)...1 1.1.2...2 (1)...2 (2)...2 (3)...2 (4)...3 (5)...3 (6)...3 1.1.3...4...10 2.1...10 2.1.1...10...10...10 (1)...10 (2)... 11 (3)... 11 (4)...12 (5)...13 (6)...13
More informationICカード利用システムにおいて新たに顕現化した中間者攻撃とその対策
IC IC EMV EMV ICIC IC IC EMV IC EMV IC... E-mail: masataka.suzuki@boj.or.jp E-mail: katsuhisa.hirokawa@boj.or.jp E-mail: k-kobara@aist.go.jp //2012.7 107 1 IC EMV 1 EMV EMVCo IC 36% 10 IC 65% 1,540 2009
More information12 NEC 2003/3/6 Copy ight (C) NEC Corporation 1
12 NEC 2003/3/6 Copy ight (C) NEC Corporation 1 Biometrics Biometrics 01.9.11 2003/3/6 Copy ight (C) NEC Corporation 2 AFIS Internet ID(PID) 2003/3/6 Copy ight (C) NEC Corporation 3 2003/3/6 Copy ight
More informationguideline_1_0.dvi
Version 1.0 ( 22 5 ) cflkanta Matsuura Laboratory 2010, all rights reserved. I 3 1 3 2 3 3 4 II 8 4 8 5 9 5.1......................... 9 5.2......................... 10 5.3......................... 10
More information2012 JAB JABLAS 4 JABLAS JABLAS JABLAS 2012 5 16 2012 3 31 107 91 198 1 7 11 4 JABLAS JABLAS 1
2012 4 1 2012 1 JAB 2 ISO/IEC 17025 ISO/IEC 17025 11 JABLAS 15 15 17 19 2012 JAB JABLAS 4 JABLAS JABLAS JABLAS 2012 5 16 2012 3 31 107 91 198 1 7 11 4 JABLAS JABLAS 1 JABLAS JABLAS NEWS 42 20 JABLAS 5.
More information28 Horizontal angle correction using straight line detection in an equirectangular image
28 Horizontal angle correction using straight line detection in an equirectangular image 1170283 2017 3 1 2 i Abstract Horizontal angle correction using straight line detection in an equirectangular image
More informationNo.7, (2006) 2 Electronic Funds Transfer as the Foundation of the Monetary Value of Electronic Money - A Study on the JBA 1 Integrated Circuit
No.7,321-332 (2006) 2 Electronic Funds Transfer as the Foundation of the Monetary Value of Electronic Money - A Study on the JBA 1 Integrated Circuit Cash Card Standard Specifications (Second Edition)
More information08医療情報学22_1_水流final.PDF
22 (1), 702002: 59 59- The Problem of Nursing Common Language for the Information Sharing in Clinical Practice The fact-finding in regard to the correspondence between name and content of nursing action
More informationHASC2012corpus HASC Challenge 2010,2011 HASC2011corpus( 116, 4898), HASC2012corpus( 136, 7668) HASC2012corpus HASC2012corpus
HASC2012corpus 1 1 1 1 1 1 2 2 3 4 5 6 7 HASC Challenge 2010,2011 HASC2011corpus( 116, 4898), HASC2012corpus( 136, 7668) HASC2012corpus HASC2012corpus: Human Activity Corpus and Its Application Nobuo KAWAGUCHI,
More information(4) ω t(x) = 1 ω min Ω ( (I C (y))) min 0 < ω < C A C = 1 (5) ω (5) t transmission map tmap 1 4(a) 2. 3 2. 2 t 4(a) t tmap RGB 2 (a) RGB (A), (B), (C)
(MIRU2011) 2011 7 890 0065 1 21 40 105-6691 1 1 1 731 3194 3 4 1 338 8570 255 346 8524 1836 1 E-mail: {fukumoto,kawasaki}@ibe.kagoshima-u.ac.jp, ryo-f@hiroshima-cu.ac.jp, fukuda@cv.ics.saitama-u.ac.jp,
More informationIPSJ SIG Technical Report 1,a) 1,b) 1,c) 1,d) 2,e) 2,f) 2,g) 1. [1] [2] 2 [3] Osaka Prefecture University 1 1, Gakuencho, Naka, Sakai,
1,a) 1,b) 1,c) 1,d) 2,e) 2,f) 2,g) 1. [1] [2] 2 [3] 1 599 8531 1 1 Osaka Prefecture University 1 1, Gakuencho, Naka, Sakai, Osaka 599 8531, Japan 2 565 0871 Osaka University 1 1, Yamadaoka, Suita, Osaka
More information1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2
CHLAC 1 2 3 3,. (CHLAC), 1).,.,, CHLAC,.,. Suspicious Behavior Detection based on CHLAC Method Hideaki Imanishi, 1 Toyohiro Hayashi, 2 Shuichi Enokida 3 and Toshiaki Ejima 3 We have proposed a method for
More information独立行政法人情報通信研究機構 Development of the Information Analysis System WISDOM KIDAWARA Yutaka NICT Knowledge Clustered Group researched and developed the infor
独立行政法人情報通信研究機構 KIDAWARA Yutaka NICT Knowledge Clustered Group researched and developed the information analysis system WISDOM as a research result of the second medium-term plan. WISDOM has functions that
More informationuntitled
17 9 15 IT 5061 C0047 TOE imagio D DataOverwriteSecurity Unit Type C Software TOE V0.04 PP EAL2 TOE TOE 18 3 24 IT Common Criteria for Information Technology Security Evaluation Version 2.1 Common Methodology
More informationuntitled
2007 55 2 235 254 c 2007 1 2 3 3 2007 6 12 2007 11 1 20 8 2 1. 2004 Sakata et al. 2004 1 610 0394 1 3 2 176 8525 2 42 1 3 525 8577 1 1 1 236 55 2 2007 2003 2004 Camurri et al. 1999 2002 2005 CG 1987 1
More informationICカード利用システムにおいて新たに顕現化したPre-play attackとその対策
IC Pre-play attack IC IC IC EMV EMV 1 IC IC Pre-play attack ATM Pre-play attack Pre-play attack IC EMV Pre-play attack... E-mail: hidemitsu.izawa@boj.or.jp E-mail: katsuhisa.hirokawa@boj.or.jp / /2015.10
More informationUnknown
Journal of Breast and Thyroid Sonology Journal of Breast and Thyroid Sonology Vol.2, No.3 July 2013 Report The 30 th Meeting of Japan Association of Breast and Thyroid Sonology... 1 Department of Organ
More information27 AR
27 AR 28 2 19 12111002 AR AR 1 3 1.1....................... 3 1.1.1...................... 3 1.1.2.................. 4 1.2............................ 4 1.2.1 AR......................... 5 1.2.2......................
More information"CAS を利用した Single Sign On 環境の構築"
CAS 2 Single Sign On 1,3, 2,3, 2, 2,3 1 2 3 May 31, 2007 ITRC p. 1/29 Plan of Talk Brief survey of Single Sign On using CAS Brief survey of Authorization Environment using CAS 2 Summary May 31, 2007 ITRC
More informationNo. 3 Oct The person to the left of the stool carried the traffic-cone towards the trash-can. α α β α α β α α β α Track2 Track3 Track1 Track0 1
ACL2013 TACL 1 ACL2013 Grounded Language Learning from Video Described with Sentences (Yu and Siskind 2013) TACL Transactions of the Association for Computational Linguistics What Makes Writing Great?
More information20mm 63.92% ConstantZoom U 5
29 30 2 13 16350926 20mm 63.92% ConstantZoom U 5 1 3 1.1...................................... 3 1.2................................. 4 2 8 2.1............... 8 2.2............................ 8 2.3..
More informationSEJulyMs更新V7
1 2 ( ) Quantitative Characteristics of Software Process (Is There any Myth, Mystery or Anomaly? No Silver Bullet?) Zenya Koono and Hui Chen A process creates a product. This paper reviews various samples
More information25 3 26 2 14 12350917 3 Cyclesports USBhostAPI Arduino 3 LED LED LED Cyclesports Cyclesports 1 4 1.1...................................... 4 1.2................. 5 1.3.................................
More informationReal AdaBoost HOG 2009 3 A Graduation Thesis of College of Engineering, Chubu University Efficient Reducing Method of HOG Features for Human Detection based on Real AdaBoost Chika Matsushima ITS Graphics
More information"CAS を利用した Single Sign On 環境の構築"
CAS 2 SSO Authorization 1,3, 2,3, 2, 2,3 1 2 3 Central Authentication and Authorization Service (CAS 2 ) Web Application Single Sign On Authorization CAS 2 SSO/AuthZ Jan. 30 2007, p. 1/40 Plan of Talk
More informationuntitled
22 2 ii 20 10 iii iv 1...1 1.1....1 1.2....2 1.3....3 2...10 2.1....10 2.1.1....10 2.1.1.1.... 11 2.1.1.2....13 2.1.2....16 2.1.3....18 2.1.3.1....18 2.1.3.2....21 2.1.3.3....22 2.2....25 3...29 3.1....29
More information非営利組織における純資産と負債の区分
IMES DISCUSSION PAPER SERIES Discussion Paper No. 2009-J-11 INSTITUTE FOR MONETARY AND ECONOMIC STUDIES BANK OF JAPAN 103-8660 2-1-1 http://www.imes.boj.or.jp IMES Discussion Paper Series 2009-J-11 2009
More information会社法制上の資本制度の変容と企業会計上の資本概念について
IMES DISCUSSION PAPER SERIES Discussion Paper No. 2006-J-1 INSTITUTE FOR MONETARY AND ECONOMIC STUDIES BANK OF JAPAN 103-8660 30 http://www.imes.boj.or.jp IMES Discussion Paper Series 2006-J-1 2006 1
More informationIPSJ SIG Technical Report Vol.2014-DPS-158 No.27 Vol.2014-CSEC-64 No /3/6 1,a) 2,b) 3,c) 1,d) 3 Cappelli Bazen Cappelli Bazen Cappelli 1.,,.,.,
1,a),b) 3,c) 1,d) 3 Cappelli Bazen Cappelli Bazen Cappelli 1.,,,,,.,,,,.,,.,,,,.,, 1 Department of Electrical Electronic and Communication Engineering Faculty of Science and Engineering Chuo University
More informationuntitled
IT E- IT http://www.ipa.go.jp/security/ CERT/CC http://www.cert.org/stats/#alerts IPA IPA 2004 52,151 IT 2003 12 Yahoo 451 40 2002 4 18 IT 1/14 2.1 DoS(Denial of Access) IDS(Intrusion Detection System)
More informationIPSJ SIG Technical Report Vol.2014-MBL-70 No.49 Vol.2014-UBI-41 No /3/15 2,a) 2,b) 2,c) 2,d),e) WiFi WiFi WiFi 1. SNS GPS Twitter Facebook Twit
2,a) 2,b) 2,c) 2,d),e) WiFi WiFi WiFi 1. SNS GPS Twitter Facebook Twitter Ustream 1 Graduate School of Information Science and Technology, Osaka University, Japan 2 Cybermedia Center, Osaka University,
More information01-全体表紙.PDF
1 2005 11 26 1 1 5 15 18 1 1. 2005 11 26 09 00 1245 12 45 18207 2. 1,000 2,000 3. 4,000 2,000 5,000 4. 10,000 2,000 30,000 5. 1 20 10 1300 17 00 1500 1700 6. 7. TEL 047-372-4111 821 FAX 047-373-9901 E-MailAPI-jimu@cuc.ac.jp
More informationRun-Based Trieから構成される 決定木の枝刈り法
Run-Based Trie 2 2 25 6 Run-Based Trie Simple Search Run-Based Trie Network A Network B Packet Router Packet Filtering Policy Rule Network A, K Network B Network C, D Action Permit Deny Permit Network
More information