{"links":{},"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00226972","sets":["1164:3925:11156:11295"]},"path":["11295"],"owner":"44499","recid":"226972","title":["誤り訂正符号とデジタル署名を用いた斬新な画像認証スキーム"],"pubdate":{"attribute_name":"公開日","attribute_value":"2023-07-17"},"_buckets":{"deposit":"af171dbb-0ad1-492f-8e2e-45dc859b81a9"},"_deposit":{"id":"226972","pid":{"type":"depid","value":"226972","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"誤り訂正符号とデジタル署名を用いた斬新な画像認証スキーム","author_link":["603734","603733"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"誤り訂正符号とデジタル署名を用いた斬新な画像認証スキーム"},{"subitem_title":"Novel Image authentication scheme using error correction code and digital signature","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"EMM","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2023-07-17","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"合同会社QRテクノロジー"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"QR Technology LLC","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/226972/files/IPSJ-CSEC23102035.pdf","label":"IPSJ-CSEC23102035.pdf"},"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSEC23102035.pdf","filesize":[{"value":"1.4 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_login","version_id":"8215a372-a94e-4070-9e58-642e50add543","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2023 by the Institute of Electronics, Information and Communication Engineers This SIG report is only available to those in membership of the SIG."}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"先名, 健一"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Ken-ichi, Sakina","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8655","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"本研究では,リード・ソロモン符号と楕円曲線デジタル署名を用いた斬新な画像認証スキームを提案している.従来のデジタル署名を用いる画像認証スキームは,画像のハッシュ値,或いは,ハッシュ値を基にしたデジタル署名値の安定的な抽出に,ロケーションマップなどの付加情報を必要とする.そのため,付加情報の紛失や改ざんなどの問題を含んでいる.更に,従来の手法では署名自体を署名の対象にできないという本質的な課題を内包している.本研究で提案するスキームは,画像と署名の一体化や署名自体を署名の対象にすること,及び署名対象にメタ情報等を含めることも可能にする全く新しいアルゴリズムに基づいている.また,NFT 画像への応用についても簡単に議論している.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"We propose a novel image authentication scheme using Reed-Solomon codes and elliptic curve digital signatures. Conventional image authentication schemes using digital signatures require additional information such as location maps to stably extract the hash value of an image or a digital signature value based on the hash value. Therefore, it involves problems such as loss or tampering of the additional information. Furthermore, conventional methods have the intrinsic problem that the signature itself cannot be used as the signature target. The method proposed in this research is based on a completely new algorithm that not only integrates the image and the signature and allows the signature itself to be signed, but also allows meta-information and other information to be included in the signature. The application to NFT images is also discussed.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告コンピュータセキュリティ(CSEC)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2023-07-17","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"35","bibliographicVolumeNumber":"2023-CSEC-102"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"created":"2025-01-19T01:26:17.471121+00:00","updated":"2025-01-19T12:19:10.837536+00:00","id":226972}