Thu, May 19 AM EMM (1) Chair: Kazuhiro Kono (Kansai Univ.) 10:15 - 11:30 |
(1) |
10:15-10:40 |
Additional Data Hiding Technique for Specified Regions of JPEG Image |
Yasutoshi Miura, Xuefei Li, Kang Seok, Yuji Sakamoto (Hokkaido Univ.) |
(2) |
10:40-11:05 |
Codestream Level Secure Identification for JPEG 2000 Images |
Kenta Iida, Hitoshi Kiya (Tokyo Metropolitan Univ.) |
(3) |
11:05-11:30 |
Evaluation of scanned image tolerance by using spread spectrum digital watermarking with regression analysis |
Jinjing Ma, Masaki Kawamura (Yamaguchi Univ.) |
|
11:30-13:15 |
Lunch Break ( 105 min. ) |
Thu, May 19 PM IT (1) Chair: Minoru Kuribayashi (Okayama Univ.) 13:15 - 14:30 |
(4) |
13:15-13:40 |
A Note on Support Recovery of Sparse Signals using Belief Propagation |
Shunsuke Horii, Toshiyasu Matsushima, Shigeichi Hirasawa (Waseda Univ.) |
(5) |
13:40-14:05 |
A Consideration on Relationships between Correlation of Information Stored on Nodes and Coding Efficiency for Cooperative Regenerating Codes |
Takahiro Yoshida (Yokohama College of Commerce), Toshiyasu Matsushima (Waseda Univ.) |
(6) |
14:05-14:30 |
An Optimal Construction of Visual Secret Sharing Schemes for General Access Structures Using Integer Programming and its Application |
Kuya Nishizumi, Hiroki Koga (Univ. Tsukuba) |
|
14:30-14:45 |
Break ( 15 min. ) |
Thu, May 19 PM EMM (2) Chair: Masaki Kawamura (Yamaguchi Univ.) 14:45 - 16:00 |
(7) |
14:45-15:10 |
Simulation of error-correcting code using LDPC code with Sum-Product method for a single-dot pattern method |
Kitahiro Kaneda (Osaka Prefecture Univ.), Yasuyuki Anezaki, Keiichi Iwamura (TUS), Isao Echizen (NII) |
(8) |
15:10-15:35 |
Study of Photo-realistic Face Moving Image Generation from the Text Using the Facial Feature |
Kazuki Sato, Takashi Nose, Akinori Ito (Tohoku Univ.) |
(9) |
15:35-16:00 |
Multimodal User Authentication Focusing on Long-term Heart Rate Sequences from Wearable Devices |
Takaaki Yoshida (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Babaguchi Noboru (Osaka Univ.) |
|
16:00-16:15 |
Break ( 15 min. ) |
Thu, May 19 PM Invited Talk Chair: Jun Muramatsu (NTT) 16:15 - 17:05 |
(10) |
16:15-17:05 |
[Invited Talk]
Data Compression for Computing Functions
-- An Approach from a Dichotomy of Functions -- |
Shigeaki Kuzuoka (Wakayama Univ.) |
Fri, May 20 AM IT (2) Chair: Tetsunao Matsuta (Tokyo Tech.) 10:15 - 11:30 |
(11) |
10:15-10:40 |
A Sharp Bound Between Two Arimoto's Conditional Renyi Entropies with Distinct Positive Orders |
Yuta Sakai, Ken-ichi Iwata (Univ. of Fukui) |
(12) |
10:40-11:05 |
A Grammar-Based Data Compression Algorithm Using Chomsky Normal Form of Context Free Grammar |
Mitsuharu Arimura (Shonan Inst. Tech.) |
(13) |
11:05-11:30 |
Construction of A Two-Step Universal VV Code Using a Sufficient Statistic Extracted from a VF Code |
Mitsuharu Arimura (Shonan Inst. Tech.), Hiroshi Nagaoka (Univ. of Electro-Communications) |
|
11:30-13:15 |
Lunch Break ( 105 min. ) |
Fri, May 20 PM EMM (3) Chair: Masaaki Fujiyoshi (Tokyo Metropolitan Univ.) 13:15 - 14:55 |
(14) |
13:15-13:40 |
A Novel Data Hiding Scheme into Musical Pieces by Utilizing Musical Characteristics |
Kan Kamada, Tetsuya Kojima (NIT, Tokyo College) |
(15) |
13:40-14:05 |
Improvement of the embedding capacity for audio watermarking method using non-negative matrix factorization |
Harumi Murata (Chukyo Univ.), Akio Ogihara (Kindai Univ.) |
(16) |
14:05-14:30 |
Technique for Reading Information Embedded Inside Gypsum Objects Fabricated With 3-D Printers |
Kosuke Nakamura, Masahiro Suzuki (Kanagawa Inst. Tech.), Youichi Takashima (NTT), Hideyuki Torii, Kazutake Uehira (Kanagawa Inst. Tech.) |
(17) |
14:30-14:55 |
Possibility of Pure Data for Multimedia Programming |
Naofumi Aoki, Keisuke Ai (Hokkaido Univ.) |
|
14:55-15:10 |
Break ( 15 min. ) |
Fri, May 20 PM IT (3) Chair: Shunsuke Horii (Waseda Univ.) 15:10 - 16:25 |
(18) |
15:10-15:35 |
Optimization for the average performance of five-state system with probabilistic transition |
Ken-ichi Iwata, Takato Kimura (Univ. of Fukui), Hirosuke Yamamoto (The Univ. of Tokyo) |
(19) |
15:35-16:00 |
Iterative Erasure Correcting Algorithm for q-ary Reed-Muller Codes base on Local Correctability |
Shinya Fukumoto, Tadashi Wadayama (NIT) |
(20) |
16:00-16:25 |
Analysis of Rank-Modulation Rewriting Codes by a Group Action |
Tomoharu Shibuya, Takeru Sudo (Sophia Univ.) |