Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Nobuyuki Teraura is active.

Publication


Featured researches published by Nobuyuki Teraura.


service oriented computing and applications | 2014

Evaluation of the Identity and Compatibility of Multi-valued Cells in Two-Dimensional Codes Using Smartphones

Nobuyuki Teraura; Kouichi Sakurai

Data is connected to the Internet with a sensor for understanding the property of the thing for which a two-dimensional code was used. Two-dimensional codes can play the role of connecting cyberspace to physical space, and can play a significant role in the so-called Internet of Things. Moreover, the advancement of machine vision is progressing with machine-to-machine communication. On the other hand, there is also private information, such as personal information, that should not be known by others. Current two-dimensional codes have become ubiquitous and express the cell using two colors: white and black. The cell expresses white or black in one bit, and there is no confidentiality available. In response to this, we propose an addition to the existing part that can be read with conventional equipment. We propose a secrecy part that cannot be read without a decryption key. Further, we propose a method for rendering these two-dimensional codes compatible with black-and-white codes. In order to generate the secrecy part, it is necessary to transform a cell into several bits. A multicolor method and a multiple-region method are used to transform the code into several bits. An evaluation of the multi-valued cells in the two-dimensional codes here proposed, with a read verification and compatibility along with the added secrecy part, was carried out using a smartphone with successful results.


new technologies, mobility and security | 2015

Proposal of multi-value cell structure for high-density two-dimensional codes and evaluation of readability using smartphones

Nobuyuki Teraura; Kouichi Sakurai

In the now-popular two-dimensional code, bits are expressed using white and two black colors in the cell, which forms the element. However, such codes do not have confidentiality. Since confidentiality may be needed according to the use, a large-capacity and high-density two-dimensional code with compatibility and confidentiality can be realized by adding a secrecy part in addition to the existing part. To enlarge capacity, it is necessary to form a cell using many bits, which requires a multicolor method. The read verification of the compatible area and the additional area was carried out using a smartphone, and the code was verified to confirm its practicality.


International Journal of Interactive Multimedia and Artificial Intelligence | 2013

Confidentiality of 2d code using infrared with cell-level error correction

Nobuyuki Teraura; Kouichi Sakurai

Optical information media printed on paper use printing materials to absorb visible light. There is a 2D code, which may be encrypted but also can possibly be copied. Hence, we envisage an information medium that cannot possibly be copied and thereby offers high security. At the surface, the normal 2D code is printed. The inner layers consist of 2D codes printed using a variety of materials, which absorb certain distinct wavelengths, to form a multilayered 2D code. Information can be distributed among the 2D codes forming the inner layers of the multiplex. Additionally, error correction at cell level can be introduced.


innovative mobile and internet services in ubiquitous computing | 2012

Preventing the Access of Fraudulent WEB Sites by Using a Special Two-Dimensional Code

Nobuyuki Teraura; Kouichi Sakurai

Mobile phone users are being increasingly directed to WEB sites through the identification of the WEB address from a two-dimensional code on the phone. However, incidents where mobile phones direct users to malicious WEB sites are also increasing. The direct lead mechanism, in which mobile phones directly send users to an uninspected WEB address, is the most common mechanism by which users are misdirected to fraudulent WEB sites. To address this issue, a registration server for inspecting WEB addresses and storing the corresponding registration IDs in the two-dimensional code format was established. Subsequently, the reliability of directing users to WEB sites only after verifying the registration ID of the target WEB address was examined. However, this approach was susceptible to phishing and camouflage when malicious software was used to rewrite the registration ID and the relationship of the WEB address on the registration server. Therefore, an approach that uses two-dimensional codes with a secret encrypted component was proposed.


ieee global conference on consumer electronics | 2012

Information hiding in subcells of a two-dimensional code

Nobuyuki Teraura; Kouichi Sakurai

In this paper, we present a method for hiding information in a conventional two-dimensional (2D) code that maintains backward compatibility with conventional 2D code readers. This is achieved by segmenting each cell into subcells that store confidential information.


innovative mobile and internet services in ubiquitous computing | 2017

Counterfeit Detection by Smartphone Using Double-Encoded Two-Dimensional Code

Nobuyuki Teraura

We propose a counterfeit detection system that uses a double-coding procedure to encode two-dimensional code. The system uses ordinary black ink, which absorbs infrared rays, and special black ink, which transmits infrared rays. Because special black is copied as ordinary black when replicated by a copying machine, the double-encoded data is lost, thereby enabling the item identified by the code to be identified as a counterfeit. The double-coded two-dimensional code is decoded by comparing the images obtained under white light and infrared radiation. If the data to be double-coded is encrypted, the counterfeiter cannot forge the double-coded two-dimensional code. Duplication can also be detected by using the data to be double-coded as encrypted data of the serial number.


international conference on rfid | 2015

Evaluation of gamma ray durability of RF tag and application to the radiation environment

Nobuyuki Teraura; Kunio Ito; Daisuke Kobayashi; Kouichi Sakurai

As for common RF tag, the circuitry operator part is formed with the semiconductor. Then, when radiation, such as a gamma ray, is irradiated, a recoverable soft error and unrecoverable hard error will occur. Therefore, it cannot be used depending on the exposure dose of radiation. However, a radiation-proof ability can be raised by incorporating a shielding and an error correction. Then, RF tag which covered was irradiated with the gamma ray originating in Cesium 137 or Cobalt 60 grade, and the durability was evaluated. The application which uses this radiation-proof RF tag under radiation environment is proposed. They are management of the radioactive component generated from radioactive waste or a decommissioning process to improve the traceability, etc. Moreover, the evaluation result of RF tag used for management of the medical relationship instrument which performs gamma sterilization is described.


international symposium on parallel and distributed processing and applications | 2012

Information Hiding of Two-dimensional Code by Multi-layer Optical

Nobuyuki Teraura; Kouichi Sakurai

Optical information media printed on paper use printing materials to absorb visible light. There is a two-dimensional code, which may be encrypted but also can possibly be copied. Hence, we envisage an information medium that cannot possibly be copied and thereby offers high security. At the surface, the normal two-dimensional code is printed. The inner layers consist of two-dimensional codes printed using a variety of materials, which absorb certain distinct wavelengths, to form a multilayered two-dimensional code. Information can be distributed among the two-dimensional codes forming the inner layers of the multiplex.


The Proceedings of the International Conference on Nuclear Engineering (ICONE) | 2015

ICONE23-1793 EVALUATION OF GAMMA RAY DURABILITY AND ITS APPLICATION OF SHIELDED RF TAGS

Nobuyuki Teraura; Kunio Ito; Daisuke Kobayashi; Kouichi Sakurai


Volume 1: Plant Operations, Maintenance, Engineering, Modifications, Life Cycle and Balance of Plant; Nuclear Fuel and Materials; Radiation Protection and Nuclear Technology Applications | 2013

The Development of Radiation-Resistant RF Tags for Use at Nuclear Power Plants

Nobuyuki Teraura; Kunio Ito; Naoki Takahashi; Kouichi Sakurai

Collaboration


Dive into the Nobuyuki Teraura's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Daisuke Kobayashi

Japan Atomic Energy Agency

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge