The search functionality is under construction.

Author Search Result

[Author] Youichi TAKASHIMA(6hit)

1-6hit
  • Improved Digital Watermark Robustness against Translation and/or Cropping of an Image Area

    Takao NAKAMURA  Hiroshi OGAWA  Atsuki TOMIOKA  Youichi TAKASHIMA  

     
    PAPER

      Vol:
    E83-A No:1
      Page(s):
    68-76

    Watermarking methods that employ orthogonal transformations are very robust against non-geometrical modifications such as lossy compression, but attaining robustness against image translation or cropping is difficult. This report describes a watermarking method that increases robustness against geometrical modifications such as image translation and cropping by embedding watermark data in the frequency component of an image and detecting that data by considering the phase difference of the coefficients that results from translation of the image. Experimental results demonstrate the robustness of this method against both non-geometrical image changes and image translation and cropping.

  • On Seeking Smart Public-Key-Distribution Systems

    Tsutomu MATSUMOTO  Youichi TAKASHIMA  Hideki IMAI  

     
    PAPER-Information and Communication Theory

      Vol:
    E69-E No:2
      Page(s):
    99-106

    To utilize the common-key encryption foe the message protection in a communication network, it is desired to settle the problem of how to distribute the common keys. This paper discusses a sort of schemes (the direct schemes, we call) that smartly provide different keys in different communications. Such a property has not attained via the basic scheme for the public key distribution systems proposed by Diffie and Hellman. This paper shows that the recently introduced five direct schemes are classified into three sets (called sequences) of infinite schemes, and points out that there are some tight relations among the sequences. And it is clarified which is the best in the three sequences by a systematic evaluation of the complexities for the normal update and for the deliberate forgery of the shared common keys.

  • Number of Detectable Gradations in X-Ray Photographs of Cavities Inside 3-D Printed Objects

    Masahiro SUZUKI  Piyarat SILAPASUPHAKORNWONG  Youichi TAKASHIMA  Hideyuki TORII  Kazutake UEHIRA  

     
    LETTER-Information Network

      Pubricized:
    2017/03/02
      Vol:
    E100-D No:6
      Page(s):
    1364-1367

    We evaluated a technique for protecting the copyright of digital data for 3-D printing. To embed copyright information, the inside of a 3-D printed object is constructed from fine domains that have different physical characteristics from those of the object's main body surrounding them, and to read out the embedded information, these fine domains inside the objects are detected using nondestructive inspections such as X-ray photography or thermography. In the evaluation, copyright information embedded inside the 3-D printed object was expressed using the depth of fine cavities inside the object, and X-ray photography were used for reading them out from the object. The test sample was a cuboid 46mm wide, 42mm long, and 20mm deep. The cavities were 2mm wide and 2mm long. The difference in the depths of the cavities appeared as a difference in the luminance in the X-ray photographs, and 21 levels of depth could be detected on the basis of the difference in luminance. These results indicate that under the conditions of the experiment, each cavity expressed 4 to 5bits of information with its depth. We demonstrated that the proposed technique had the possibility of embedding a sufficient volume of information for expressing copyright information by using the depths of cavities.

  • E2--A New 128-Bit Block Cipher

    Masayuki KANDA  Shiho MORIAI  Kazumaro AOKI  Hiroki UEDA  Youichi TAKASHIMA  Kazuo OHTA  Tsutomu MATSUMOTO  

     
    PAPER

      Vol:
    E83-A No:1
      Page(s):
    48-59

    This paper describes the design principles, the specification, and evaluations of a new 128-bit block cipher E2, which was proposed to the AES (Advanced Encryption Standard) candidates. This algorithm supports 128-bit, 192-bit, and 256-bit secret keys. The design philosophy of E2 is highly conservative; the structure uses 12-round Feistel as its main function whose round function is constructed with 2-round SPN structure, and initial/final transformational functions. E2 has practical security against differential attack, linear attack, cryptanalysis with impossible differential, truncated differential attack, and so on. Furthermore, E2 can be implemented efficiently and flexibly on various platforms because the primitive operations involve byte length processing.

  • A Prototype KPS and Its Application--IC Card Based Key Sharing and Cryptographic Communication--

    Tsutomu MATSUMOTO  Youichi TAKASHIMA  Hideki IMAI  Minoru SASAKI  Hiroharu YOSHIKAWA  Shin-ichiro WATANABE  

     
    PAPER-Applications

      Vol:
    E73-E No:7
      Page(s):
    1111-1119

    This paper demonstrates and confirms that a large-network-oriented key sharing method called the key predistribution system (KPS) is really practical and useful for supporting end-to-end cryptographic communication, by presenting a prototype implementation of KPS using special IC cards and its application to facsimile systems. This prototype can build a secure channel over any ordinary facsimile network using the following types of equipments: (1) an IC card implementing a linear scheme for KPS and the DES algorithm, (2) an adaptor-type interface device between the IC card and a facsimile terminal with no cryptographic function, and (3) a device for each managing center of KPS.

  • Digital Watermarking Technique for Motion Pictures Based on Quantization

    Hiroshi OGAWA  Takao NAKAMURA  Atsuki TOMIOKA  Youichi TAKASHIMA  

     
    PAPER

      Vol:
    E83-A No:1
      Page(s):
    77-89

    A quantization-based watermarking system for motion pictures is proposed. In particular, methods for improving the image quality of watermarked video, the watermarking data tolerance, and the accuracy of watermark data detection are described. A quantitative evaluation of the reliability of watermarked data, which has not generally been discussed up to now, is also performed.