Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sanggyu Shin is active.

Publication


Featured researches published by Sanggyu Shin.


computer information systems and industrial management applications | 2015

Study of Cancelable Biometrics in Security Improvement of Biometric Authentication System

Sanggyu Shin; Yoichi Seto

Recently, there is a widespread use of biometric authentication systems. This is because biometric systems have become open and large scale and enrolment and authentication systems are separate. Many methods have been proposed for cancelable biometrics technology in biometric systems. However, the security criterion in such is indefinite in cancelable biometrics technology. Moreover, there is still no work on the systematic study of the safety of biometric authentication systems. In this paper, we consider the cancelable biometric techniques from the perspective of the safety of the system. In addition, we also verify the effect on the security precaution of the liveness detection techniques using Fault Tree Analysis, a risk evaluation method about data protection and spoofing prevention techniques.


computer information systems and industrial management applications | 2018

Proposal for a Privacy Impact Assessment Manual Conforming to ISO/IEC 29134:2017

Sanggyu Shin; Yoichi Seto; Kumi Hasegawa; Ryotaro Nakata

In this paper, we compared the requirements of previously developed manual and ISO/IEC 29134:2017 and analyzed the changes. As a result, there were no major differences in requirements. It is useful to conduct a privacy impact assessment (PIA) before actually operating the system to appropriately construct and operate a system that handles personal information. A manual (procedure manual) is necessary to implement PIA efficiently. In June 2017, ISO issued the ISO/IEC 29134:2017 as an international standard on PIA. Cause the past PIA manual developed based on ISO 22307:2008, development of a PIA manual conforming to ISO/IEC 29134:2017 was required. By our analysis, as a newly stated matter, ISO/IEC 29134:2017 explicitly indicated Due Diligence, stakeholder engagement, and risk countermeasures. Based on the analysis results, we propose a new PIA manual reflecting the requirements of ISO/IEC 29134:2017.


computer information systems and industrial management applications | 2017

Analysis of Specific Personal Information Protection Assessment in the Social Security and Tax Number System of Local Governments in Japan

Sanggyu Shin; Yoichi Seto; Mayumi Sasaki; Kei Sakamoto

A law in Japan has been established concerning the My Number system or the use of numbers for identifying specific individuals in administrative procedures in local governments. The law requires local governments to implement the specific personal implementation protection assessment for social security and tax number systems. In this paper, we analyzed the assessment reports of the specific personal information protection assessments conducted by local governments. We did the analysis in two directions: (1) adequacy of risk assessment and measures, and (2) reuse of the assessment report. Our analysis shows that there was a description of assessment on the risk assessment items, but there were many assessment reports with missing assessment on some operations.


Archive | 2017

Consideration of Privacy Risk Assessment of the My Number in the Financial Industry in Japan

Sanggyu Shin; Yoichi Seto; Kei Sakamoto; Mayumi Sasaki

In Sep. 2015, the Act on the Use of Numbers to Identify a Specific Individual in the Administrative Procedure was revised. It was decided to link personal numbers to deposit numbers of financial institutions. Currently, the Privacy Impact Assessment which is obliged to implement this law is required to implement safety control measures for the private sector. However, there is no system to conduct a risk assessment of the law. In the financial industry, which is a highly private sector of public nature, some privacy risk assessment is required because it has many individual numbers. In this paper, we propose a framework for privacy risk assessment on this law in the financial industry, using the privacy impact assessment prescribed as an international standard.


international conference on industrial technology | 2016

Educational system of physical motion based on 3D biomechanism evaluation

Kaoru Mitsuhashi; Sho Yokota; Hiroshi Hashimoto; Sanggyu Shin; Daisuke Chugo

This paper presents an educational support system of physical motion with body motion based on three-dimensional biomechanism evaluation. The difficult point of the physical motion with body motion is that human cannot attain the perfect copy or imitation of the reference skill motion because each skeleton size, functions and numbers of motor of human are different, we call it the imperfect imitation problem. The proposed system uses a human motion capture which observes and records the movement of human in real time, and extract a 3D (three dimensional) skeleton model from the observed movement data. So, our system is to support the judgment of the expert instructors. In our experiment to evaluate the effectiveness of the proposed system, some education of sports, such as crawl motion in swimming, darts throw motion, Karate defend motion are adopted. And, we certainly will show the useful results.


Archive | 2016

The Problem Analysis of Specific Personal Information Protection Assessment in Japan Case

Sanggyu Shin; Yoichi Seto; Mayumi Sasaki; Kei Sakamoto

In this paper, we analyze the total item assessment reports that have been published by municipalities for the mandated implementation of the specific personal information assessment in three perspectives. The three perspectives are (1) Adequacy of risk items, (2) Re-use of the assessment report, and (3) Classification of the assessment model. As a result, for example, in risk measures where there are many assessment reports, there is a description of the measures in the system but there are missing measures outside the system such as operation, etc.


international conference on computational science and its applications | 2015

Can Cancelable Biometrics Contribute to the Security Improvement of Biometric Authentication Systems

Sanggyu Shin; Yoichi Seto

Cancelable biometrics techniques are considered from the viewpoint of data protection in authentication systems. Though various methods are proposed for this technology, the security criterion is indefinite. Moreover, there is still no work on the systematic study of the safety of biometric authentication systems. In this paper, cancelable biometric techniques are considered from the perspective of the safety of the system. Furthermore, the effect on the security precaution of the liveness detection techniques is verified by using Fault Tree Analysis, a risk evaluation method about data protection and spoofing prevention techniques.


ieee region humanitarian technology conference | 2015

Education system of skill succession based on 3D evaluation and improvement in time series

Kaoru Mitsuhashi; Sho Yokota; Hiroshi Hashimoto; Sanggyu Shin; Daisuke Chugo

This paper presents an educational support system of skill succession with body motion based on 3D (three-dimensional) biomechanics evaluation. Skill succession using body motion seems different because human cannot attain the perfect copy or imitation of the reference skill motion. We call it the imperfect imitation problem. Then, we propose the 3D skeleton motion viewer and e-learning education system. The learner cannot move the expert motion, however, watching only 3D skeleton motion movie. So, our system supports learner using the judgment of the expert instructors (teacher). In experiment, to evaluate the effectiveness of the proposed system, some education of sports such as swimming, darts game and karate are adopted. The evaluation is a learners improvement and teachers satisfaction from the interview.


2015 International Conference on Computer Application Technologies | 2015

Storage and Reuse of Each Student's Personalized Documents Using a Non-structured Database

Sanggyu Shin; Hiroshi Hashimoto

Personalization in e-Learning systems is becoming increasingly important. However, most personalization research is focused on user groups with information collected from registration data and logs. We propose a method for the storage and reuse of each students personalized documents in an e-Learning system using a non-structured database like MongoDB. We create a document, which is serviced to the user as a short exam, and focus on analyzing the document itself using feedback from the user. Furthermore, we develop a system that automatically assembles test questions from a set of examples. We discuss how to store and reuse the documents and automatically assemble test questions, which are restructured for each user. Lastly, we discuss about how to combine each examples using user feedback.


international conference on industrial technology | 2014

Skill level evaluation of Taijiquan based on 3D body motion analysis — Via logalithm distribution diagram and phase analysis

Hiroshi Hashimoto; Mizuki Nakajima; Seiichi Kawata; Sanggyu Shin; Toshiyuki Murao

In this paper, we propose an objective skill level evaluation method for Taijiquan. The proposed skill level evaluation method utilizes a logarithmic distribution diagram of curvature for spiral arm motion and a cross-correlation for whole body motion. In order to demonstrate a possibility of the proposed method, we present experimental results with a Kinect sensor.

Collaboration


Dive into the Sanggyu Shin's collaboration.

Top Co-Authors

Avatar

Hiroshi Hashimoto

Advanced Institute of Industrial Technology

View shared research outputs
Top Co-Authors

Avatar

Yoichi Seto

Advanced Institute of Industrial Technology

View shared research outputs
Top Co-Authors

Avatar

Kaoru Mitsuhashi

Tokyo University of Technology

View shared research outputs
Top Co-Authors

Avatar

Kei Sakamoto

Advanced Institute of Industrial Technology

View shared research outputs
Top Co-Authors

Avatar

Mayumi Sasaki

Advanced Institute of Industrial Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Daisuke Chugo

Kwansei Gakuin University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ikuyo Yoshida

Advanced Institute of Industrial Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge