International Conference

S. Huda, N. Funabiki, M. Kuribayashi, W.C. Kao,
"A calligraphy learning assistant system with letter portion practice function using projection mapping,"
Proc. 2020 IEEE International Conference on Consumer Electronics (ICCE2020), 2020.

N. Nursiah, K. S. Wong, and M. Kuribayashi,
"Reversible Data Hiding in PDF Document Exploiting Prefix Zeros in Glyph Coordinates,"
AsiaPacific Signal and Information Processing Association Anual Sumit and Conf. (APSIPA ASC 2019), pp.12981302, 2019.

M. Kuribayashi N. Funabiki,
"Efficient decentralized tracing protocol for fingerprinting system with index table,"
AsiaPacific Signal and Information Processing Association Anual Sumit and Conf. (APSIPA ASC 2019), pp.15951601, 2019.

M. Kuribayashi and K. S. Wong,
"Improved DMQIM watermarking scheme for PDF document,"
18th Int. Workshop Digitalforensics and Watermarking (IWDW2019), LNCS 12022, pp.171183, SpringerVerlag, 2019. Best Paper Award

N. Funabiki, S. Matsumoto, S. S. Wint, M. Kuribayashi, and W.C. Kao,
"A proposal of recommendation function for solving element fillinblank problem in Java programming learning assistant system,"
NBiS 2019, pp.247257, 2019.

T. V. Bui, M. Kuribayashi, T. Kojima, and I. Echizen,
"Sublinear decoding schemes for nonadaptive group testing with inhibitors,"
15th Annual Conf. Theory and Applications of Models of Computation, (TAMC 2019), LNCS 11436, pp.93113, SpringerVerlag, 2019.

M. Kuribayashi, S. Suma, and N. Funabiki,
"Efficient decoding algorithm for cyclically permutable code,"
2018 IEEE Information Theory Workshop (ITW2018), pp.310314, 2018.

T. Yasui, M. Kuribayashi, N. Funabiki, and I. Echizen,
"Estimation of collusion attack in biasbased binary fingerprinting code,"
AsiaPacific Signal and Information Processing Association Anual Sumit and Conf. (APSIPA ASC 2018), 2018.

Y. Kodera, M. Kuribayashi, T. Kusaka, and Y. Nogami,
"Advanced searchable encryption: keyword search for matrixtype storage,"
The 6th Int. Symp. Computing and Networking (CANDAR2018) workshops, pp.292297, 2018.

Y. Kodera, M. Kuribayashi, T. Kusaka, and Y. Nogami,
"A construction of a keyword search to allow partial matching with a block cipher,"
The 19th World Conf. Information Security Applications (WISA2018), LNCS 11402, pp.241252, SpringerVerlag, 2018.

T. V. Bui, M. Kuribayashi, M. Cheraghchi, and I. Echizen,
"Efficiently decodable nonadaptive threshold group testing,"
The 2018 IEEE Int. Symp. Information Theory (ISIT2018), pp.25842588, 2018.

M. Kuribayashi, T. Ueda, and N. Funabiki,
"Secure data management system with traceability against internal leakage,"
AsiaPacific Signal and Information Processing Association Anual Sumit and Conf. (APSIPA ASC 2017), pp.14861494, 2017.

M. M. Islam, M. S. A. Mamun, N. Funabiki, and M. Kuribayashi,
"Dynamic accesspoint configuration approach for elastic wireless localarea network system,"
The 5th Int. Symp. Computing and Networking (CANDAR2017), pp.216222, 2017.

T. Ueda, M. Kuribayashi, and N. Funabiki,
"Fingerprinting system for secure manegement of sensitive data,"
The 12th Int. Workshop on Security (IWSEC2017), Poster Session, 2017.

T. Fukushima, M. Kuribayashi, and N. Funabiki,
"Imperceptible watermarking scheme with large capacity considering the internal structure of PDF file,"
The 12th Int. Workshop on Security (IWSEC2017), Poster Session, 2017.

M. Kuribayashi, T. Fukushima, and N. Funabiki,
"Data hiding for text document in PDF file,"
The 13th Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2017), pp.390398, 2017. Excellent Paper Award

N. Ishihara, N. Funabiki, M. Kuribayashi, and W.C. Kao,
"A proposal of software architecture for Java programming learning assistant system,"
The 31st IEEE Int. Conf. Advanced Information Networking and Applications (AINA2017), pp.6470, 2017.

K. S. Lwin, N. Funabiki, K. K. Zaw, M. S. A. Mamun, M. Kuribayashi,
"A minimax approach for accesspoint setup optimization using throughput measurements in IEEE802.11n wireless networks,"
The 4th Int. Symp. Computing and Networking (CANDAR2016), pp.311317, 2016.
 K. K. Zaw, N. Funabiki, and M. Kuribayashi,
"A proposal of three extensions in blank element selection algorithm for Java programming learning assistant system,"
The 5th IEEE Global Conf. Consumer Electronics (GCCE2016), pp.35, 2016.

M. Kuribayashi, E.C. Chang and N. Funabiki,
"Watermarking with fixed decoder for aesthetic 2D barcode,"
15th Int. Workshop Digitalforensics and Watermarking (IWDW2016), LNCS 10082, pp.379392, SpringerVerlag, 2017.

N. Funabiki, T. Ogawa, N. Ishihara, M. Kuribayashi, and W.C. Kao,
"A proposal of coding rule learning function in Java programming learning assistant system,"
The 8th Int. Workshop Virtual Environment and NetworkOriented Applications (VENOA2016), pp.561566, 2016.

N. Funabiki, Y. Aoyagi, M. Kuribayashi, and W.C. Kao,
"Worker PC performance measurements using benchmarks for userPC computing system,"
2016 IEEE Int. Conf. Consumer Electronics (ICCETW 2016), pp.282283, 2016.

N. Funabiki, K. S. Lwin, M. Kuribayashi, and IW. Lai,
"Throughput measurements for accesspoint installation optimization in IEEE802.11n wireless networks,"
2016 IEEE Int. Conf. Consumer Electronics (ICCETW 2016), pp.218219, 2016.

M. Kuribayashi,
"Benchmarking of scoring functions for biasbased fingerprinting code,"
The 41st IEEE Int. Conf. Acoustics, Speech and Signal Processing (ICASSP2016), pp.20392043, 2016.

N. Funabiki, K. K. Zaw, M. Kuribayashi, and W.C. Kao,
"Value trace problems for graph theory algorithms in Java programming learning assistant system,"
2016 5th Int. Conf. Educational and Information Technology (ICEIT 2016), 2016.

M. Kuribayashi,
"Fingerprinting for broadcast content distribution system,"
14th Int. Workshop Digitalforensics and Watermarking (IWDW2015), LNCS 9569, SpringerVerlag, pp.163175, 2015. Best Paper Award

M. Kuribayashi and M. Morii,
"Enrichment of visual appearance of aesthetic QR code,"
14th Int. Workshop Digitalforensics and Watermarking (IWDW2015),
LNCS 9569, SpringerVerlag, pp.220231, 2015.

H. Ogawa, M. Kuribayashi, M. Iwata, and K. Kise,
"DCTOFDM based watermarking scheme robust against clipping, rotation, and scaling attacks,"
14th Int. Workshop Digitalforensics and Watermarking (IWDW2015), LNCS 9569, SpringerVerlag, pp.271284, 2015.

M. Kuribayashi and H. G. Schaathun, "Image fingerprinting system based
on collusion secure code and watermarking method," IEEE
Int. Conf. Image Processing (ICIP2015), pp.21202124, 2015.

M. Kuribayashi,
"Countermeasure to nonlinear collusion attacks on spread spectrum fingerprinting," 2014 Int. Symp. on Information Theory and its Applications(ISITA2014), pp.5054, 2014.

M. Hakka, M. Kuribayashi, M. Morii,
"DCTOFDM based watermarking scheme robust against clipping attack,"
1st Int. Workshop on Information Hiding and its evaluation Criteria(IWIHC2014), pp.1824, 2014.

M. Kuribayashi,
"Estimation of noise channel from fingerprinting codeword,"
2013 IEEE Int. Workshop on Information Forensics and Security(WIFS2013), 2013.

M. Kuribayashi,
"A simple tracing algorithm for binary fingerprinting code under averaging attack,"
1st ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec'13), pp.311, 2013.

M. Kuribayashi,
"Coded spread spectrum watermarking scheme,"
11th Int. Workshop on Digitalforensics and Watermarking (IWDW2012), LNCS 7809, SpringerVerlag, pp.169183, 2013.

M. Kuribayashi,
"Analysis of binary fingerprinting codes under relaxed marking assumption,"
2012 Int. Symp. on Information Theory and its Applications (ISITA2012), pp.643647, 2012.

M. Kuribayashi,
"Bias equalizer for binary probabilistic fingerprinting codes,"
14th Information Hiding Conf. (IH2012) LNCS 7692, SpringerVerlag, pp.269283, 2012.

M. Kuribayashi,
"Adaptive iterative detection method for spread spectrum fingerprinting scheme,"
Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing (ICASSP2012), pp.17771780, 2012.

M. Kuribayashi,
"A new soft decision tracing algorithm for binary fingerprinting codes,"
6th Int. Workshop on Security (IWSEC2011), LNCS 7038, SpringerVerlag, pp.115, 2011.

M. Kuribayashi,
"Effective interference reduction method for spread spectrum fingerprinting,"
Int. Conf. on Signal Processing and Multimedia Applications (SIGMAP2011), pp.167172, 2011.

M. Kuribayashi,
"Experimental assessment of probabilistic fingerprinting codes over
AWGN channel,"
5th Int. Workshop on Security (IWSEC2010), LNCS 6434, SpringerVerlag, pp.117132, 2010.

M. Kuribayashi,
"Reduction of interference for CDMAbased fingerprinting scheme based
on random permutation,"
The sixth Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2010), pp.494497, 2010.

M. Kuribayashi,
"Tardos's fingerprinting code over AWGN channel,"
12th Information Hiding Conf. (IH2010), LNCS 6387, SpringerVerlag, pp.103117, 2010.
(Kobe Univ. Repository)

M. Kuribayashi,
"A study of traceability of CDMAbased fingerprint scheme,"
Int. Conf. Interaction Sciences (ICIS2009), pp.900905, 2009.

M. Kuribayashi, H. Kato, and M. Morii,
"A study of rounding error on CDMAbased fingerprinting scheme,"
The Fifth Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2009), pp.12861289, 2009.

H. Sakai, M. Kuribayashi, and M. Morii,
"Adaptive reversible data hiding for JPEG images,"
2008 Int. Symp. on Information Theory and its Applications (ISITA2008), pp.870875, 2008.

H. Kato, M. Kuribayashi, and M. Morii,
"Effective assignment of fingerprints on CDMAbased fingerprinting scheme,"
2008 Int. Symp. Information Theory and its Applications (ISITA2008), pp.694699, 2008.

N. Akashi, M. Kuribayashi, and M. Morii,
"Hierarchical construction of Tardos code,"
2008 Int. Symp. Information Theory and its Applications (ISITA2008), pp.683688, 2008.

M. Kuribayashi, N. Akashi, and M. Morii,
"On the systematic generation of Tardos's fingerprinting codes,"
IEEE Signal Processing Society, 2008 Int. Workshop on Multimedia Signal Processing (MMSP2008), pp.748753, 2008.

M. Kuribayashi and M. Morii,
"On the implementation of asymmetric fingerprinting protocol,"
16th European Signal Processing Conf. (EUSIPCO2008), SS71, 2008.

M. Kuribayashi and M. Morii,
"Effective detection method for CDMAbased fingerprinting scheme,"
2008 IEEE Int. Conf. Multimedia & Expo (ICME2008), pp.349352, 2008.

M. Kuribayashi and M. Morii,
"Iterative detection method for CDMAbased fingerprinting scheme,"
10th Information Hiding Conf. (IH'08), LNCS 5284, pp.357371, SpringerVerlag, 2008.
(Kobe Univ. Repository)

N. Hayashi, M. Kuribayashi, and M. Morii,
"Collusionresistant fingerprinting scheme based on the CDMAtechnique,"
2nd Int. Workshop on Security (IWSEC2007), LNCS 4752, pp.2843, SpringerVerlag, 2007.

M. Kuribayashi and M. Morii,
"Sanitizable signature scheme applying reversible data hiding,"
The 2006 Int. Symp. Information Theory and its Applications (ISITA2006), pp.149154, 2006.

M. Kuribayashi, M. Morii, and H. Tanaka,
"Tracing traitors from broadcasted contents,"
The 4th Int. Conf. Applied Cryptography and Network Security (ACNS2006), Industrial Track, pp.130142, 2006.

M. Kuribayashi, M. Morii, and H. Tanaka,
"Reversible watermark with large capacity using the predictive coding,"
The 7th Int. Conf. Information and Communications Security (ICICS2005), LNCS 3783, SpringerVerlag, pp.441453, 2005.
(Kobe Univ. Repository)

M. Kuribayashi and H. Tanaka,
"A novel fingerprinting protocol based on key management,"
The 2004 Int. Symp. Information Theory and its Applications (ISITA2004), pp.646651, 2004.

M. Kuribayashi and H. Tanaka,
"A watermarking scheme applicable for fingerprinting protocol,"
Int. Workshop on Digital Watermarking (IWDW2003), LNCS 2939, SpringerVerlag, pp.532543, 2004.
(Kobe Univ. Repository)

M. Kuribayashi and H. Tanaka,
"Simplified Paillier cryptosystem with additive homomorphic property,"
The 2002 Int. Symp. Information Theory and its Applications (ISITA2002), s674, pp.807810, 2002.

M. Kuribayashi and H. Tanaka,
"A new anonymous fingerprinting scheme with high enciphering rate,"
The Progress in Cryptology, Second Int. Conf. (INDOCRYPT2001), LNCS 2247, SpringerVerlag, pp.3039, 2001.
(Kobe Univ. Repository)

M. Kuribayashi and H. Tanaka,
"A watermarking scheme based on the characteristic of addition among DCT coefficients,"
The Information Security, Third Int. Workshop (ISW2000), LNCS 1975, SpringerVerlag, pp.114, 2000.
(Kobe Univ. Repository)