Our research fields are information security and information theory.
Information security is a field related to a wide range of fields such as mathematics, information theory, cryptography, computer science, and network theory. As a general rule, 4th grade graduation research begins with finding a theme for yourself through meetings in the laboratory. In order to actually proceed with research, it is necessary to develop programming, networking, computer science, mathematics, and other skills.
Regarding education, I am in charge of 1st grade logic mathematics, 2nd grade programming language theory, information theory, automata and theory of computation, and information science programming 1st and 3rd grade network security.
Faculty name/Affiliation | Takuo Mori / Department of Information and Electronic Engineering, Faculty of Science and Engineering |
---|---|
Specialized Fields | Information theory, coding theory, information security |
Research theme | Software protection, digital content protection, personal authentication method, visual cryptography and its applications, application of virtualization technology |
Research keywords | Software protection, copyright protection, visual cryptography |
Faculty introduction URL | https://www3.med.teikyo-u.ac.jp/profile/ja.344f0c40d231b3e9.html |
In current software development, the ratio of those that use intermediate languages such as Java and C #, or scripting languages such as Perl, Python, and Ruby is increasing. For intermediate languages, decompiling makes it easy to get the source code, and for scripting languages, the source code is formally executed as is. It is difficult to protect the intellectual property rights of software in such a situation. In our laboratory, we are researching a method of embedding a digital watermark in an intermediate language executable file or a method of obfuscating the source code of a script language.
Currently, the leakage of personal information due to unauthorized access is a social problem. Personal authentication technology represented by password authentication is one of the countermeasures against unauthorized access. It is recommended to use a random string of sufficient length for the password, and to use different passwords for different services, but due to the limited memory of human beings, it is not possible to satisfy all. It's a difficult situation. Sheng Lab proposes a method using QR code, a method using AR technology, etc. as a highly secure authentication that does not place an excessive burden on human memory.
Title | Society name | Laboratory | Contents |
---|---|---|---|
Introducing flipped classroom and rubric self-assessment in university programming education | Education System Information Society National convention | Mori Takuo Laboratory | detail |
Introducing group guidance by senior students to university programming education in flipped classroom | Information Processing Society of Japan Computer and Education Study Group CE136 | Mori Takuo Laboratory | detail |
Discover the fascinating and untold stories behind the cutting-edge research being conducted by our esteemed professors. Get an in-depth look at the motivations and passions driving their work, and learn how their findings are making a real impact on society. Don't miss the opportunity to gain a deeper understanding of the amazing work being done right here at our laboratory!