DBLP Bibliography
Google Scholar


著書

  1. M. Kuribayashi, "Signal Processing, Edited by Sebastian Miron," In-Tech Publisher, ISBN: 978-953-7619-91-6, Feb. 2010.


学術論文リスト

  1. T. V. Bui, M. Kuribayashi, M. Cheraghchi, and I. Echizen, "Efficiently decodable non-adaptive threshold group testing" IEEE Trans. Inform. Theory, vol., no., pp., 2019. (download)(accepted)

  2. E. E. Mon, N. Funabiki, M. Kuribayashi, W.-C. Kao, "An informative test code approach in code writing problem for Java collections framework in Java programming learning assistant system," J. Software, vol.14, no.5, pp.200-208, 2019. (download)

  3. T. V. Bui, M. Kuribayashi, T. Kojima, R. Haghvirdinezhad, and I. Echizen, "Efficient (nonrandom) construction and decoding for non-adaptive group testing," JIP, vol.27, pp.245-256, 2019. (download)

  4. K. S. Lwin, N. Funabiki, S. K. Debnath, K. I. Munene, R. W. Sudibyo, M. Kuribayashi, W.-C. Kao, "Enhancements of minimax access-point setup optimisation approach for IEEE 802.11 WLAN," Int. J. Space-Based and Situated Computing, vol.9, no.1, pp.47-59, 2019.(download)

  5. M. Kuribayashi and N. Funabiki, "Decentralized tracing protocol for fingerprinting system," APSIPA Trans. Signal and Information Processing, vol.8, 8 pages, 2019. (download)

  6. M. Kuribayashi, T. Fukushima, and N. Funabiki, "Robust and secure data hiding for PDF text document," IEICE Trans. Information and Systems, vol.E102-D, no.1, pp.41-47, 2019 (download).

  7. I. M. Kwenga, N. Funabiki, M. Kuribayashi and R. W. Sudibyo, "A throughput estimation model under two-link concurrent communications with partially overlapping channels and its application to channel assignment in IEEE 802.11n WLAN," Int. J. Space-Based and Situated Computing, vol.8, no.3, pp.123-137, 2018.

  8. M. Kuribayashi, "Bias-based binary fingerprinting code under erasure channel," IEEE Signal Processing Letters, vol.25, no.9, pp.1423-1427, 2018. (download)

  9. M. Kuribayashi and N. Funabiki, "Fingerprinting for multimedia content broadcasting system," Elsevier J. Information Security and Applications, vol.41, pp.52-61, 2018. (download)

  10. M. Manowarul Islam, N. Funabiki, M. Kuribayashi, S. K. Debnath, K. I. Munene, K. S. Lwin, R. W. Sudibyo, and M. Selim A. Mamun, "Dynamic access-point configuration approach for elastic wireless local-area network system and its implementation using Raspberry Pi," Int. J. Networking and Computing, vol.8, no.2, pp.254-281, 2018.

  11. M. Kuribayashi and N. Funabiki, "Universal scoring function based on bias equalizer for bias-based fingerprinting codes," IEICE Trans. Fundamentals, vol.E101-A, no.1, pp.119-128, 2018. (download)

  12. V. B. Joshi, M. S. Raval, and M. Kuribayashi, "Reversible data hiding based compressible privacy preserving system for color image," Springer Multimedia Tools and Applications, vol.77, no.13, pp.16597-16622, 2018. (download)

  13. N. Ishihara, N. Funabiki, M. Kuribayashi, and W.-C. Kao, "A software architecture for Java programming learning assistant system," Int. J. Computer & Software Engineering, vol.2, no.1, 2017. (download)

  14. K. S. Lwin, N. Funabiki, C. Taniguchi, K. K. Zaw, M. S. A. Mamun, M. Kuribayashi, and W.-C. Kao, "A minimax approach for access point setup optimization in IEEE 802.11n wireless networks," Int. J. Networking and Computing, vol.7, no.2, pp.187-207, 2017. (download)

  15. N. Funabiki, K. S. Lwin, Y. Aoyagi, M. Kuribayashi, and W.-C. Kao, "A user-PC computing system as ultralow-cost computation platform for small groups," Application and Theory of Computer Technology, vol.2, no.3, pp.10-24, 2017. (download)

  16. H. G. Schaathun and M. Kuribayashi, "Obfuscation in digital fingerprinting," Int. J. Information and Coding Theory, vol.4, no.2/3, pp.185-200, 2017. (download)

  17. M. Kuribayashi, S. Shigemoto, and N. Funabiki, "DCT-OFDM watermarking scheme based on communication system model," IEICE Trans. Fundamentals, vol.E100-A, no.4, pp.944-952, 2017. (download)

  18. H. Tian, Z. Chen, C.-C. Chang, M. Kuribayashi, Y. Huang, Y. Cai, Y. Chen, and T. Wang, "Enabling public auditability for operation behaviors in cloud storage," Soft Computing, vol.21, no.8, pp.2175-2187, 2017. (download)

  19. M. Kuribayashi and M. Morii, "Aesthetic QR code based on modified systematic encoding function," IEICE Trans. Information and Systems, vol.E100-D, no.1, pp.42-51, 2017. (download)

  20. K. Iwamura, M. Kawamura, M. Kuribayashi, M. Iwata, H. Kang, S. Gohshi, and A. Nishimura, "Information hiding and its criteria for evaluation," IEICE Trans. Information and Systems, vol.E100-D, no.1, pp.2-12, 2017. (download)

  21. M. S. A. Mamun, M. E. Islam, N. Funabiki, M. Kuribayashi, and I-W. Lai, "An active access-point configuration algorithm for elastic wireless local-area network system using heterogeneous devices," IJNC, vol.2, no.2, pp.395-419, 2016. (download)

  22. M. Kuribayashi, "Simple countermeasure to non-linear collusion attacks targeted for spread-spectrum fingerprinting scheme," IEICE Trans. Information and Systems, vol.E99-D, no.1, pp.50-59, 2016. (download)

  23. M. Kuribayashi, "Simplified MAP detector for binary fingerprinting code embedded by spread spectrum watermarking scheme," IEEE Trans. Information Forensics and Security, vol.9, no.4, pp.610-623, 2014. (download)

  24. M. Kuribayashi, "Interference removal operation for spread spectrum fingerprinting scheme," IEEE Trans. Information Forensics and Security, vol.7, no.2, pp.403-417, 2012. (download)

  25. M. Kuribayashi, "Hierarchical spread spectrum fingerprinting scheme based on the CDMA technique," EURASIP Journal on Information Security, vol.2011, Article ID 502782, 16 pages, 2011. (download)

  26. M. Kuribayashi and H. Kato, "Impact of rounding error on spread spectrum fingerprinting scheme," IEEE Trans. Information Forensics and Security, vol.5, no.4, pp.670-680, 2010. (download) (Kobe Univ. Repository)

  27. M. Kuribayashi, "On the implementation of spread spectrum fingerprinting in asymmetric cryptographic protocol," EURASIP Journal on Information Security, vol. 2010, Article ID 694797, 11 pages, 2010. (download)

  28. M. Kuribayashi and M. Morii, "Systematic generation of Tardos's fingerprinting codes," IEICE Trans. Fundamentals, vol.E93-A, no.2, pp.508-515, 2010. (download) (Kobe Univ. Repository)

  29. M. Kuribayashi, M. Morii, and H. Tanaka, "Reversible watermark with large capacity based on the prediction error expansion," IEICE Trans. Fundamentals, vol.E91-A, no.7, pp.1780-1790, 2008. (download) (Kobe Univ. Repository)

  30. 田中敏也,栗林稔,森井昌克, "一方向性関数を用いた任意の有効期間設定が可能な時限付き鍵管理技術," 情報処理学会論文誌, vol.48, no.9, pp.3089-3098, 2007. (download)

  31. M. Kuribayashi and H. Tanaka, "How to generate cyclically permutable code from cyclic codes," IEEE Trans. Inform. Theory, vol.52, no.10, pp.4660-4663, 2006. (download) (Kobe Univ. Repository)

  32. U. Shinmyo, M. Kuribayashi, M. Morii and H. Tanaka, "Fingerprinting protocol based on distributed providers using oblivious transfer," IEICE Trans. Fundamentals, vol.E89-A, no.10, pp.2597-2602, 2006. (download)

  33. M. Kuribayashi and H. Tanaka, "Fingerprinting protocol for on-line trade using information gap between buyer and merchant," IEICE Trans. Fundamentals, vol.E89-A, no.4, pp.1108-1115, 2006. (download) (Kobe Univ. Repository)

  34. M. Kuribayashi and H. Tanaka, "Fingerprinting protocol for images based on additive homomorphic property," IEEE Trans. Image Processing, vol.14, no.12, pp.2129-2139, 2005. (download) (Kobe Univ. Repository)

  35. 久永隆治,栗林稔, 田中初一, "幾何学的歪みの局所的な補正による電子透かし検出能力の改善," 電子情報通信学会論文誌, vol.J88-A, no.10, pp.1146-1153, 2005. (download)

    R. Hisanaga, M. Kuribayashi, and H. Tanaka, "Improvement of watermark detection ability based on blockwise image compensation for geometrical distortions," Wiley, Electronics and Communications in Japan, PartIII: Fundamental Electronic Science, vol.89, no.12, pp.1-9, 2006. (download)

  36. M. Kuribayashi and H. Tanaka, "Video watermarking of which embedded information depends on the distance between two signal positions," IEICE Trans. Fundamentals, vol.E86-A, no.12, pp.3267-3275, 2003. (download) (Kobe Univ. Repository)

  37. 栗林稔, 田中初一, "DCT係数間の加法特性に基づく電子透かし," 電子情報通信学会論文誌, vol.J85-A, no.3, pp.322-333, 2002. (download) (Kobe Univ. Repository)

    M. Kuribayashi and H. Tanaka, "Watermarking schemes using the addition property among DCT coefficients," Wiley, Electronics and Communications in Japan, PartIII: Fundamental Electronic Science, vol.86, no.5, pp.11-23, 2003. (download)

  38. M. Kuribayashi and H. Tanaka, "A new digital watermarking scheme applying locally the wavelet transform," IEICE Trans. Fundamentals, vol.E84-A, no.10, pp.2500-2507, 2001. (download) (Kobe Univ. Repository)


国際会議予稿リスト

  1. T. V. Bui, M. Kuribayashi, T. Kojima, and I. Echizen, "Sublinear decoding schemes for non-adaptive group testing with inhibitors," 15th Annual Conf. Theory and Applications of Models of Computation, (TAMC 2019), LNCS 11436, pp.93-113, Springer-Verlag, 2019.

  2. M. Kuribayashi, S. Suma, N. Funabiki, "Efficient decoding algorithm for cyclically permutable code," 2018 IEEE Information Theory Workshop (ITW2018), pp.310-314, 2018.

  3. T. Yasui, M. Kuribayashi, N. Funabiki, and I. Echizen, "Estimation of collusion attack in bias-based binary fingerprinting code," Asia-Pacific Signal and Information Processing Association Anual Sumit and Conf. (APSIPA ASC 2018), 2018.

  4. Y. Kodera, M. Kuribayashi, T. Kusaka, and Y. Nogami, "Advanced searchable encryption: keyword search for matrix-type storage," The 6th Int. Symp. Computing and Networking (CANDAR2018) workshops, pp.292-297, 2018.

  5. Y. Kodera, M. Kuribayashi, T. Kusaka, and Y. Nogami, "A construction of a keyword search to allow partial matching with a block cipher," The 19th World Conf. Information Security Applications (WISA2018), LNCS 11402, pp.241-252, Springer-Verlag, 2018.

  6. T. V. Bui, M. Kuribayashi, M. Cheraghchi, and I. Echizen, "Efficiently decodable non-adaptive threshold group testing," The 2018 IEEE Int. Symp. Information Theory (ISIT2018), pp.2584-2588, 2018.

  7. M. Kuribayashi, T. Ueda, and N. Funabiki, "Secure data management system with traceability against internal leakage," Asia-Pacific Signal and Information Processing Association Anual Sumit and Conf. (APSIPA ASC 2017), pp.1486-1494, 2017.

  8. M. M. Islam, M. S. A. Mamun, N. Funabiki, and M. Kuribayashi, "Dynamic access-point configuration approach for elastic wireless local-area network system," The 5th Int. Symp. Computing and Networking (CANDAR2017), pp.216-222, 2017.

  9. T. Ueda, M. Kuribayashi, and N. Funabiki, "Fingerprinting system for secure manegement of sensitive data," The 12th Int. Workshop on Security (IWSEC2017), Poster Session, 2017.

  10. T. Fukushima, M. Kuribayashi, and N. Funabiki, "Imperceptible watermarking scheme with large capacity considering the internal structure of PDF file," The 12th Int. Workshop on Security (IWSEC2017), Poster Session, 2017.

  11. M. Kuribayashi, T. Fukushima, and N. Funabiki, "Data hiding for text document in PDF file," The 13th Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2017), pp.390-398, 2017. Excellent Paper Award受賞

  12. N. Ishihara, N. Funabiki, M. Kuribayashi, and W.-C. Kao, "A proposal of software architecture for Java programming learning assistant system," The 31st IEEE Int. Conf. Advanced Information Networking and Applications (AINA2017), pp.64-70, 2017.

  13. K. S. Lwin, N. Funabiki, K. K. Zaw, M. S. A. Mamun, M. Kuribayashi, "A minimax approach for access-point setup optimization using throughput measurements in IEEE802.11n wireless networks," The 4th Int. Symp. Computing and Networking (CANDAR2016), pp.311-317, 2016.

  14. K. K. Zaw, N. Funabiki, and M. Kuribayashi, "A proposal of three extensions in blank element selection algorithm for Java programming learning assistant system," The 5th IEEE Global Conf. Consumer Electronics (GCCE2016), pp.3-5, 2016.

  15. M. Kuribayashi, E.-C. Chang and N. Funabiki, "Watermarking with fixed decoder for aesthetic 2D barcode," 15th Int. Workshop Digital-forensics and Watermarking (IWDW2016), LNCS 10082, pp.379-392, Springer-Verlag, 2017.

  16. N. Funabiki, T. Ogawa, N. Ishihara, M. Kuribayashi, and W.-C. Kao, "A proposal of coding rule learning function in Java programming learning assistant system," The 8th Int. Workshop Virtual Environment and Network-Oriented Applications (VENOA-2016), pp.561-566, 2016.

  17. N. Funabiki, Y. Aoyagi, M. Kuribayashi, and W.-C. Kao, "Worker PC performance measurements using benchmarks for user-PC computing system," 2016 IEEE Int. Conf. Consumer Electronics (ICCE-TW 2016), pp.282-283, 2016.

  18. N. Funabiki, K. S. Lwin, M. Kuribayashi, and I-W. Lai, "Throughput measurements for access-point installation optimization in IEEE802.11n wireless networks," 2016 IEEE Int. Conf. Consumer Electronics (ICCE-TW 2016), pp.218-219, 2016.

  19. M. Kuribayashi, "Benchmarking of scoring functions for bias-based fingerprinting code," The 41st IEEE Int. Conf. Acoustics, Speech and Signal Processing (ICASSP2016), pp.2039-2043, 2016.

  20. N. Funabiki, K. K. Zaw, M. Kuribayashi, and W.-C. Kao, "Value trace problems for graph theory algorithms in Java programming learning assistant system," 2016 5th Int. Conf. Educational and Information Technology (ICEIT 2016), 2016.

  21. M. Kuribayashi, "Fingerprinting for broadcast content distribution system," 14th Int. Workshop Digital-forensics and Watermarking (IWDW2015), LNCS 9569, Springer-Verlag, pp.163-175, 2015. Best Paper Award受賞

  22. M. Kuribayashi and M. Morii, "Enrichment of visual appearance of aesthetic QR code," 14th Int. Workshop Digital-forensics and Watermarking (IWDW2015), LNCS 9569, Springer-Verlag, pp.220-231, 2015.

  23. H. Ogawa, M. Kuribayashi, M. Iwata, and K. Kise, "DCT-OFDM based watermarking scheme robust against clipping, rotation, and scaling attacks," 14th Int. Workshop Digital-forensics and Watermarking (IWDW2015), LNCS 9569, Springer-Verlag, pp.271-284, 2015.

  24. M. Kuribayashi and H. G. Schaathun, "Image fingerprinting system based on collusion secure code and watermarking method," IEEE Int. Conf. Image Processing (ICIP2015), pp.2120-2124, 2015.

  25. M. Kuribayashi, "Countermeasure to non-linear collusion attacks on spread spectrum fingerprinting," 2014 Int. Symp. on Information Theory and its Applications(ISITA2014), pp.50-54, 2014.

  26. M. Hakka, M. Kuribayashi, M. Morii, "DCT-OFDM based watermarking scheme robust against clipping attack," 1st Int. Workshop on Information Hiding and its evaluation Criteria(IWIHC2014), pp.18-24, 2014.

  27. M. Kuribayashi, "Estimation of noise channel from fingerprinting codeword," 2013 IEEE Int. Workshop on Information Forensics and Security(WIFS2013), 2013.

  28. M. Kuribayashi, "A simple tracing algorithm for binary fingerprinting code under averaging attack," 1st ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec'13), pp.3-11, 2013.

  29. M. Kuribayashi, "Coded spread spectrum watermarking scheme," 11th Int. Workshop on Digital-forensics and Watermarking (IWDW2012), LNCS 7809, Springer-Verlag, pp.169-183, 2013.

  30. M. Kuribayashi, "Analysis of binary fingerprinting codes under relaxed marking assumption," 2012 Int. Symp. on Information Theory and its Applications (ISITA2012), pp.643-647, 2012.

  31. M. Kuribayashi, "Bias equalizer for binary probabilistic fingerprinting codes," 14th Information Hiding Conf. (IH2012) LNCS 7692, Springer-Verlag, pp.269-283, 2012.

  32. M. Kuribayashi, "Adaptive iterative detection method for spread spectrum fingerprinting scheme," Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing (ICASSP2012), pp.1777-1780, 2012.

  33. M. Kuribayashi, "A new soft decision tracing algorithm for binary fingerprinting codes," 6th Int. Workshop on Security (IWSEC2011), LNCS 7038, Springer-Verlag, pp.1-15, 2011.

  34. M. Kuribayashi, "Effective interference reduction method for spread spectrum fingerprinting," Int. Conf. on Signal Processing and Multimedia Applications (SIGMAP2011), pp.167-172, 2011.

  35. M. Kuribayashi, "Experimental assessment of probabilistic fingerprinting codes over AWGN channel," 5th Int. Workshop on Security (IWSEC2010), LNCS 6434, Springer-Verlag, pp.117-132, 2010.

  36. M. Kuribayashi, "Reduction of interference for CDMA-based fingerprinting scheme based on random permutation," The sixth Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2010), pp.494-497, 2010.

  37. M. Kuribayashi, "Tardos's fingerprinting code over AWGN channel," 12th Information Hiding Conf. (IH2010), LNCS 6387, Springer-Verlag, pp.103-117, 2010. (Kobe Univ. Repository)

  38. M. Kuribayashi, "A study of traceability of CDMA-based fingerprint scheme," Int. Conf. Interaction Sciences (ICIS2009), pp.900-905, 2009.

  39. M. Kuribayashi, H. Kato, and M. Morii, "A study of rounding error on CDMA-based fingerprinting scheme," The Fifth Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2009), pp.1286-1289, 2009.

  40. H. Sakai, M. Kuribayashi, and M. Morii, "Adaptive reversible data hiding for JPEG images," 2008 Int. Symp. on Information Theory and its Applications (ISITA2008), pp.870-875, 2008.

  41. H. Kato, M. Kuribayashi, and M. Morii, "Effective assignment of fingerprints on CDMA-based fingerprinting scheme," 2008 Int. Symp. Information Theory and its Applications (ISITA2008), pp.694-699, 2008.

  42. N. Akashi, M. Kuribayashi, and M. Morii, "Hierarchical construction of Tardos code," 2008 Int. Symp. Information Theory and its Applications (ISITA2008), pp.683-688, 2008.

  43. M. Kuribayashi, N. Akashi, and M. Morii, "On the systematic generation of Tardos's fingerprinting codes," IEEE Signal Processing Society, 2008 Int. Workshop on Multimedia Signal Processing (MMSP2008), pp.748-753, 2008.

  44. M. Kuribayashi and M. Morii, "On the implementation of asymmetric fingerprinting protocol," 16th European Signal Processing Conf. (EUSIPCO2008), SS7-1, 2008.

  45. M. Kuribayashi and M. Morii, "Effective detection method for CDMA-based fingerprinting scheme," 2008 IEEE Int. Conf. Multimedia & Expo (ICME2008), pp.349-352, 2008.

  46. M. Kuribayashi and M. Morii, "Iterative detection method for CDMA-based fingerprinting scheme," 10th Information Hiding Conf. (IH'08), LNCS 5284, pp.357-371, Springer-Verlag, 2008. (Kobe Univ. Repository)

  47. N. Hayashi, M. Kuribayashi, and M. Morii, "Collusion-resistant fingerprinting scheme based on the CDMA-technique," 2nd Int. Workshop on Security (IWSEC2007), LNCS 4752, pp.28-43, Springer-Verlag, 2007.

  48. M. Kuribayashi and M. Morii, "Sanitizable signature scheme applying reversible data hiding," The 2006 Int. Symp. Information Theory and its Applications (ISITA2006), pp.149-154, 2006.

  49. M. Kuribayashi, M. Morii, and H. Tanaka, "Tracing traitors from broadcasted contents," The 4th Int. Conf. Applied Cryptography and Network Security (ACNS2006), Industrial Track, pp.130-142, 2006.

  50. M. Kuribayashi, M. Morii, and H. Tanaka, "Reversible watermark with large capacity using the predictive coding," The 7th Int. Conf. Information and Communications Security (ICICS2005), LNCS 3783, Springer-Verlag, pp.441-453, 2005. (Kobe Univ. Repository)

  51. M. Kuribayashi and H. Tanaka, "A novel fingerprinting protocol based on key management," The 2004 Int. Symp. Information Theory and its Applications (ISITA2004), pp.646-651, 2004.

  52. M. Kuribayashi and H. Tanaka, "A watermarking scheme applicable for fingerprinting protocol," Int. Workshop on Digital Watermarking (IWDW2003), LNCS 2939, Springer-Verlag, pp.532-543, 2004. (Kobe Univ. Repository)

  53. M. Kuribayashi and H. Tanaka, "Simplified Paillier cryptosystem with additive homomorphic property," The 2002 Int. Symp. Information Theory and its Applications (ISITA2002), s6-7-4, pp.807-810, 2002.

  54. M. Kuribayashi and H. Tanaka, "A new anonymous fingerprinting scheme with high enciphering rate," The Progress in Cryptology, Second Int. Conf. (INDOCRYPT2001), LNCS 2247, Springer-Verlag, pp.30-39, 2001. (Kobe Univ. Repository)

  55. M. Kuribayashi and H. Tanaka, "A watermarking scheme based on the characteristic of addition among DCT coefficients," The Information Security, Third Int. Workshop (ISW2000), LNCS 1975, Springer-Verlag, pp.1-14, 2000. (Kobe Univ. Repository)


紀要リスト

  1. M. Kuribayashi and H. Tanaka, "An efficient protocol for anonymous fingerprinting," Memoirs of the Faculty of Engineering, Kobe Univ., no.49, pp.25-39, 2002.