Cancelable permutation-based indexing for secure and efficient biometric identification T Murakami, R Fujita, T Ohki, Y Kaga, M Fujio, K Takahashi IEEE Access 7, 45563-45582, 2019 | 39 | 2019 |
A secure and practical signature scheme for blockchain based on biometrics Y Kaga, M Fujio, K Naganuma, K Takahashi, T Murakami, T Ohki, ... Information Security Practice and Experience: 13th International Conference …, 2017 | 30 | 2017 |
Optimal sequential fusion for multibiometric cryptosystems T Murakami, T Ohki, K Takahashi Information fusion 32, 93-108, 2016 | 27 | 2016 |
Evaluation of security for biometric guessing attacks in biometric cryptosystem using fuzzy commitment scheme S Hidano, T Ohki, K Takahashi 2012 BIOSIG-Proceedings of the International Conference of Biometrics …, 2012 | 20 | 2012 |
Ransomware Detection Considering User's Document Editing T Honda, K Mukaiyama, T Shirai, T Ohki, M Nishigaki 2018 IEEE 32nd International Conference on Advanced Information Networking …, 2018 | 19 | 2018 |
Cancelable indexing based on low-rank approximation of correlation-invariant random filtering for fast and secure biometric identification T Murakami, T Ohki, Y Kaga, M Fujio, K Takahashi Pattern Recognition Letters 126, 11-20, 2019 | 15 | 2019 |
Security performance evaluation for biometric template protection techniques Y Isobe, T Ohki, N Komatsu International Journal of Biometrics 5 (1), 53-72, 2013 | 15 | 2013 |
Face/Fingerphoto Spoof Detection under Noisy Conditions by using Deep Convolutional Neural Network. M Fujio, Y Kaga, T Murakami, T Ohki, K Takahashi BIOSIGNALS 2, 54-62, 2018 | 13 | 2018 |
Improved post-quantum-secure face template protection system based on packed homomorphic encryption H Tamiya, T Isshiki, K Mori, S Obana, T Ohki 2021 International Conference of the Biometrics Special Interest Group …, 2021 | 10 | 2021 |
On biometric encryption using fingerprint and it's security evaluation S Hidano, T Ohki, N Komatsu, M Kasahara 2008 10th International Conference on Control, Automation, Robotics and …, 2008 | 10 | 2008 |
Direct: Disaster response coordination with trusted volunteers M Jahanian, T Hasegawa, Y Kawabe, Y Koizumi, A Magdy, M Nishigaki, ... 2019 International Conference on Information and Communication Technologies …, 2019 | 7 | 2019 |
Efficient spoofing attack detection against unknown sample using end-to-end anomaly detection T Ohki, V Gupta, M Nishigaki 2019 Asia-Pacific Signal and Information Processing Association Annual …, 2019 | 7 | 2019 |
A micro biometric authentication mechanism considering minute patterns of the human body: a proposal and the first attempt M Fujita, Y Mano, T Kaneko, K Takahashi, M Nishigaki 2016 19th International Conference on Network-Based Information Systems …, 2016 | 7 | 2016 |
A consideration on a common template-based biometric cryptosystem using on-line signatures Y Goubaru, Y Yamazaki, T Miyazaki, T Ohki 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE), 131-135, 2014 | 7 | 2014 |
Model-free template reconstruction attack with feature converter M Akasaka, S Maeda, Y Sato, M Nishigaki, T Ohki 2022 International Conference of the Biometrics Special Interest Group …, 2022 | 6 | 2022 |
A metric of identification performance of biometrics based on information content S Hidano, T Ohki, N Komatsu, K Takahashl 2010 11th International Conference on Control Automation Robotics & Vision …, 2010 | 6 | 2010 |
Unsupervised biometric anti-spoofing using generative adversarial networks V Gupta, M Nishigaki, T Ohki International Journal of Informatics Society 11 (1), 5, 2019 | 5 | 2019 |
Security evaluation of a finger vein authentication algorithm against wolf attack A Otsuka, T Ohki, R Morita, M Inuma, H Imai 37th IEEE symposium on security and privacy, San Jose, CA, 2016 | 5 | 2016 |
New Security Definitions for Biometric Authentication with Template Protection: Toward covering more threats against authentication systems T Isshiki, T Araki, K Mori, S Obana, T Ohki, S Sakamoto 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG …, 2013 | 5 | 2013 |
Evaluation of wolf attack for classified target on speaker verification systems T Ohki, S Hidano, T Takehisa 2012 12th International Conference on Control Automation Robotics & Vision …, 2012 | 5 | 2012 |