Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Nobuyuki Teraura.
service oriented computing and applications | 2014
Nobuyuki Teraura; Kouichi Sakurai
Data is connected to the Internet with a sensor for understanding the property of the thing for which a two-dimensional code was used. Two-dimensional codes can play the role of connecting cyberspace to physical space, and can play a significant role in the so-called Internet of Things. Moreover, the advancement of machine vision is progressing with machine-to-machine communication. On the other hand, there is also private information, such as personal information, that should not be known by others. Current two-dimensional codes have become ubiquitous and express the cell using two colors: white and black. The cell expresses white or black in one bit, and there is no confidentiality available. In response to this, we propose an addition to the existing part that can be read with conventional equipment. We propose a secrecy part that cannot be read without a decryption key. Further, we propose a method for rendering these two-dimensional codes compatible with black-and-white codes. In order to generate the secrecy part, it is necessary to transform a cell into several bits. A multicolor method and a multiple-region method are used to transform the code into several bits. An evaluation of the multi-valued cells in the two-dimensional codes here proposed, with a read verification and compatibility along with the added secrecy part, was carried out using a smartphone with successful results.
new technologies, mobility and security | 2015
Nobuyuki Teraura; Kouichi Sakurai
In the now-popular two-dimensional code, bits are expressed using white and two black colors in the cell, which forms the element. However, such codes do not have confidentiality. Since confidentiality may be needed according to the use, a large-capacity and high-density two-dimensional code with compatibility and confidentiality can be realized by adding a secrecy part in addition to the existing part. To enlarge capacity, it is necessary to form a cell using many bits, which requires a multicolor method. The read verification of the compatible area and the additional area was carried out using a smartphone, and the code was verified to confirm its practicality.
International Journal of Interactive Multimedia and Artificial Intelligence | 2013
Nobuyuki Teraura; Kouichi Sakurai
Optical information media printed on paper use printing materials to absorb visible light. There is a 2D code, which may be encrypted but also can possibly be copied. Hence, we envisage an information medium that cannot possibly be copied and thereby offers high security. At the surface, the normal 2D code is printed. The inner layers consist of 2D codes printed using a variety of materials, which absorb certain distinct wavelengths, to form a multilayered 2D code. Information can be distributed among the 2D codes forming the inner layers of the multiplex. Additionally, error correction at cell level can be introduced.
innovative mobile and internet services in ubiquitous computing | 2012
Nobuyuki Teraura; Kouichi Sakurai
Mobile phone users are being increasingly directed to WEB sites through the identification of the WEB address from a two-dimensional code on the phone. However, incidents where mobile phones direct users to malicious WEB sites are also increasing. The direct lead mechanism, in which mobile phones directly send users to an uninspected WEB address, is the most common mechanism by which users are misdirected to fraudulent WEB sites. To address this issue, a registration server for inspecting WEB addresses and storing the corresponding registration IDs in the two-dimensional code format was established. Subsequently, the reliability of directing users to WEB sites only after verifying the registration ID of the target WEB address was examined. However, this approach was susceptible to phishing and camouflage when malicious software was used to rewrite the registration ID and the relationship of the WEB address on the registration server. Therefore, an approach that uses two-dimensional codes with a secret encrypted component was proposed.
ieee global conference on consumer electronics | 2012
Nobuyuki Teraura; Kouichi Sakurai
In this paper, we present a method for hiding information in a conventional two-dimensional (2D) code that maintains backward compatibility with conventional 2D code readers. This is achieved by segmenting each cell into subcells that store confidential information.
innovative mobile and internet services in ubiquitous computing | 2017
Nobuyuki Teraura
We propose a counterfeit detection system that uses a double-coding procedure to encode two-dimensional code. The system uses ordinary black ink, which absorbs infrared rays, and special black ink, which transmits infrared rays. Because special black is copied as ordinary black when replicated by a copying machine, the double-encoded data is lost, thereby enabling the item identified by the code to be identified as a counterfeit. The double-coded two-dimensional code is decoded by comparing the images obtained under white light and infrared radiation. If the data to be double-coded is encrypted, the counterfeiter cannot forge the double-coded two-dimensional code. Duplication can also be detected by using the data to be double-coded as encrypted data of the serial number.
international conference on rfid | 2015
Nobuyuki Teraura; Kunio Ito; Daisuke Kobayashi; Kouichi Sakurai
As for common RF tag, the circuitry operator part is formed with the semiconductor. Then, when radiation, such as a gamma ray, is irradiated, a recoverable soft error and unrecoverable hard error will occur. Therefore, it cannot be used depending on the exposure dose of radiation. However, a radiation-proof ability can be raised by incorporating a shielding and an error correction. Then, RF tag which covered was irradiated with the gamma ray originating in Cesium 137 or Cobalt 60 grade, and the durability was evaluated. The application which uses this radiation-proof RF tag under radiation environment is proposed. They are management of the radioactive component generated from radioactive waste or a decommissioning process to improve the traceability, etc. Moreover, the evaluation result of RF tag used for management of the medical relationship instrument which performs gamma sterilization is described.
international symposium on parallel and distributed processing and applications | 2012
Nobuyuki Teraura; Kouichi Sakurai
Optical information media printed on paper use printing materials to absorb visible light. There is a two-dimensional code, which may be encrypted but also can possibly be copied. Hence, we envisage an information medium that cannot possibly be copied and thereby offers high security. At the surface, the normal two-dimensional code is printed. The inner layers consist of two-dimensional codes printed using a variety of materials, which absorb certain distinct wavelengths, to form a multilayered two-dimensional code. Information can be distributed among the two-dimensional codes forming the inner layers of the multiplex.
The Proceedings of the International Conference on Nuclear Engineering (ICONE) | 2015
Nobuyuki Teraura; Kunio Ito; Daisuke Kobayashi; Kouichi Sakurai
Volume 1: Plant Operations, Maintenance, Engineering, Modifications, Life Cycle and Balance of Plant; Nuclear Fuel and Materials; Radiation Protection and Nuclear Technology Applications | 2013
Nobuyuki Teraura; Kunio Ito; Naoki Takahashi; Kouichi Sakurai