{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00233809","sets":["1164:6389:11481:11634"]},"path":["11634"],"owner":"44499","recid":"233809","title":["長距離化に適するレーザ照射を利用した偽装QRコードの探索手法"],"pubdate":{"attribute_name":"公開日","attribute_value":"2024-03-14"},"_buckets":{"deposit":"15181c92-c028-48d1-a6bd-a76ab83d7fc2"},"_deposit":{"id":"233809","pid":{"type":"depid","value":"233809","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"長距離化に適するレーザ照射を利用した偽装QRコードの探索手法","author_link":["635914","635910","635921","635915","635922","635923","635918","635912","635916","635917","635920","635913","635919","635911"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"長距離化に適するレーザ照射を利用した偽装QRコードの探索手法"},{"subitem_title":"A Search Method for Fake QR Codes Suitable for Long-Distance Attack Using Laser Irradiation","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"ICSS(6)","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2024-03-14","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"東海大学"},{"subitem_text_value":"東海大学"},{"subitem_text_value":"東海大学"},{"subitem_text_value":"東海大学"},{"subitem_text_value":"東海大学"},{"subitem_text_value":"東海大学"},{"subitem_text_value":"東海大学"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Tokai University","subitem_text_language":"en"},{"subitem_text_value":"Tokai University","subitem_text_language":"en"},{"subitem_text_value":"Tokai University","subitem_text_language":"en"},{"subitem_text_value":"Tokai University","subitem_text_language":"en"},{"subitem_text_value":"Tokai University","subitem_text_language":"en"},{"subitem_text_value":"Tokai University","subitem_text_language":"en"},{"subitem_text_value":"Tokai University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/233809/files/IPSJ-SPT24054038.pdf","label":"IPSJ-SPT24054038.pdf"},"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-SPT24054038.pdf","filesize":[{"value":"1.6 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_login","version_id":"d7e520e1-2aa8-4f65-ab6b-164c4d42f470","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2024 by the Institute of Electronics, Information and Communication Engineers This SIG report is only available to those in membership of the SIG."}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"板倉, 大"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"真鍋, 泰河"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"鎌田, 悠希"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"奥, 彩菜"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"山本, 宙"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"高山, 佳久"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"大東, 俊博"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Dai, Itakura","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Taiga, Manabe","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yuki Kamata","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Ayana, Oku","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hiroshi, Yamamoto","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yoshihisa, Takayama","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Toshihiro, Ohigashi","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12628305","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8671","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"本稿ではレーザ照射による QR コードの長距離偽装操作に適した QR コードを探索するための手法を提案する.我々は CSS2023 にてレーザ照射によって 100m 離れた場所から QR コードの偽装操作が可能なことを示した.本稿ではさらなる長距離化に伴い,レーザの回折限界に対応するため,レーザ照射を容易にする QR コードの条件を示し,探索手法を提案する.具体的には,挙動が変化しない範囲での URL の改変やマスクパターンの変更によって,探索範囲を拡大した網羅的な探索を行う.さらに,実験により長距離化に適した偽装 QR コードが発見できることを示す.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"In this paper, we propose a search method for fake QR codes suitable for long-distance attack using laser irradiation. We achieved that fake QR codes through laser irradiation could manipulate at distances of 100 meters at CSS2023. For further long-distance attack, at first, we show the conditions for fake QR codes to cope with laser diffraction-limit. Next, we present a search method of the fake QR codes for long-distance attack by increasing the number of candidates of QR codes by changing parameters of URL or mask patterns without changing the behavior. In addition, we demonstrate that it is possible to find fake QR codes for long-distance attack by experiments.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"7","bibliographic_titles":[{"bibliographic_title":"研究報告セキュリティ心理学とトラスト(SPT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2024-03-14","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"38","bibliographicVolumeNumber":"2024-SPT-54"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":233809,"updated":"2025-01-19T09:58:41.951013+00:00","links":{},"created":"2025-01-19T01:35:24.189640+00:00"}