Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Seiichi Susaki is active.

Publication


Featured researches published by Seiichi Susaki.


international conference on vehicular electronics and safety | 2008

A study on user authentication infrastructure for next generation telematics

Katsuyuki Umezawa; Seiichi Susaki; Masamori Kashiyama; Satoru Tezuka

To receive a telematics service, it must first be authenticated, and each automobile (or car navigation system) has typically been linked to a particular vehicle owner who could authenticate such services. However, an increasing number of drivers use cars that are rented, leased, or obtained through a car-sharing program; in such cases, the present form of car authentication is insufficient. A better system would authenticate the individual who is using a car at a particular time, but is not necessarily the owner. In this paper, we propose a personal authentication infrastructure for next-generation telematics. Specifically, we propose personal authentication into that (1) between the person and the terminal, (2) between the terminal and the center.


international workshop on security | 1999

INTERNET-MARKs: Clear, Secure, and Portable Visual Marks for the Cyber Worlds

Hiroshi Yoshiura; Seiichi Susaki; Yasuhiko Nagai; Tsukasa Saitoh; Hisashi Toyoshima; Ryoichi Sasaki; Satoru Tezuka

Visual marks play critical roles in the physical world, but their use in the cyber world is limited because there they are easy to forge, tamper with and copy onto unauthorized data. This paper therefore describes a new type of visual marks that are secure because digital signatures are embedded in them and that can be used with a wide variety of cyber-world systems. It also shows the effectiveness of these marks by describing their application to WWW site authentication.


information integration and web-based applications & services | 2008

Third-party approach to controlling digital copiers

Yasuhiro Fujii; Ryu Ebisawa; Yumiko Togashi; Takaaki Yamada; Yoshinori Honda; Seiichi Susaki

Information leakage through paper documents is not to be overlooked because it accounts for 43.8% of all the leakage in Japan. Most vendors of digital copiers are therefore offering new models equipped with additional security functions. Third-parties wanting to add security functions to copiers already used in their offices, however, need to know the copier specifications that the copier manufactures want to keep secret. In this paper we introduce our idea that enables a third party to control digital copiers. An application that enables us to monitor copying is also described.


international workshop on security | 2000

Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks - A Practical Analysis

Hiroshi Yoshiura; Takaaki Shigematsu; Seiichi Susaki; Tsukasa Saitoh; Hisashi Toyoshima; Chikako Kurita; Satoru Tezuka; Ryoichi Sasaki

Authenticating Web-based virtual shops is a critical problem in establishing electronic commerce as a social infrastructure. One solution is to use guarantee marks pasted on the Web pages of the virtual shops. However, its effectiveness depends on the reliability of the marks. This paper proposes a verifiable mark system in which digital signatures are embedded in the marks. A prototype authentication system based on this mark system was implemented and evaluated from practical viewpoints. The results show its feasibility.


intelligent information hiding and multimedia signal processing | 2009

Evaluation of Audio Watermark System Using Short Detection Time Frame

Takaaki Yamada; Yoshiyasu Takahashi; Ryu Ebisawa; Yoshinori Sato; Seiichi Susaki

Assumed applications of copyright protection for music and synthesized voice are discussed. We developed a prototype audio watermark system combining the results of previous studies based on the patchwork algorithm, modifying the amplitude in the time-domain of voiced audio data, and using a reference signal. The results of experimental evaluation show that this our system can detect watermarks in a time frame as short as 2 s.


pacific-asia workshop on computational intelligence and industrial application | 2008

The Estimation of the New Feature Extracting Method for Tamper Detection in Printed Documents

Yoshiyasu Takahashi; Takaaki Yamada; Seiichi Susaki

In this paper, we report the experimental result of the estimation of our proposed technique to extract the feature of the printed documents for tamper detection. We have compared the proposed technique which uses median points as a feature and the existing technique which uses the area of the black dots as a feature. As an experiment, we calculated the median point of alphabets and numbers, and printed and scanned to see the probability of the collision, the uniformity of the distribution, invariability during D/A and A/D transform, and the invariability during the ordinal change of paper of our feature extracting method. For the probability of the collision, the proposed method showed lower probability of the collision than the existing one. For the uniformity of the distribution, the proposed method showed a half skew of the existing one. For the invariability during D/A and A/D transform, the proposed method showed the invariability of about a thirtieth of the one of the existing one. For the invariability during the ordinal change of paper, the proposed method showed an eighteenth invariability of the existing one. From the above results, we have concluded that as a feature extracting method, our proposed method is better than the existing one.


international conference on its telecommunications | 2008

A study on an authentication infrastructure between terminal and asp for next generation telematics

Katsuyuki Umezawa; Seiichi Susaki; Masamori Kashiyama; Satoru Tezuka

To receive a telematics service, it must first be authenticated, and each automobile (or car navigation system) has typically been linked to a particular vehicle owner who could authenticate such services. However, an increasing number of drivers use cars that are rented, leased, or obtained through a car-sharing program; in such cases, the present form of car authentication is insufficient. A better system would authenticate the individual who is using a car at a particular time, but is not necessarily the owner. In this paper, we propose a personal authentication infrastructure for next-generation telematics. Specifically, we propose authentication infrastructure between the terminal and the service provider (ASP).


Archive | 1998

Digital data authentication method

Hiroshi Yoshiura; Kazuo Takaragi; Ryoichi Sasaki; Seiichi Susaki; Hisashi Toyoshima; Tsukasa Saito


Archive | 1993

Electronic document processing system and method of forming digital signature

Hiroshi Matsumoto; Kazuo Takaragi; Seiichi Susaki; Hiroyuki Maezawa; Shinobu Koizumi


Archive | 2004

Electronic document authenticity assurance method and electronic document disclosure system

Kunihiko Miyazaki; Mitsuru Iwamura; Tsutomu Matsumoto; Ryoichi Sasaki; Hiroshi Yoshiura; Hirokazu Aoshima; Hideo Noyama; Seiichi Susaki; Takeshi Matsuki

Collaboration


Dive into the Seiichi Susaki's collaboration.

Researchain Logo
Decentralizing Knowledge