IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 25  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
CS, IE, IPSJ-AVM, ITE-BCT [detail] 2022-11-24
14:05
Aichi Nagoya Institute of Technology
(Primary: On-site, Secondary: Online)
Video watermarking method of embedding multiplexed watermark information and tampering detection patterns
Eri Odaira (TUS), Naoto Kawamura (Kawamura Techno Lab.), Hyunho Kang (NIT, Tokyo College), Keiichi Iwamura (TUS) CS2022-52 IE2022-40
We investigate a watermarking method that rapidly embeds primary and secondly information into each frame of videos at t... [more] CS2022-52 IE2022-40
pp.21-26
EA, EMM, ASJ-H 2022-11-22
13:00
Online Online [Fellow Memorial Lecture] Security and Privacy Preservation for Speech Signal -- Approach from speech information hiding technology --
Masashi Unoki (JAIST) EA2022-60 EMM2022-60
Non-authentic but skillfully fabricated artificial replicas of authentic media in the real world are known as “media clo... [more] EA2022-60 EMM2022-60
pp.99-104
IE, IMQ, MVE, CQ
(Joint) [detail]
2020-03-06
14:25
Fukuoka Kyushu Institute of Technology
(Cancelled but technical report was issued)
Image Tampering Detection and Self-Recovery by Using Robust Digital Watermark against JPEG Compression
Shuhei Ohara, Masayuki Kurosaki, Ochi Hiroshi (Kyutech) IMQ2019-38 IE2019-120 MVE2019-59
Recently, with the tremendous diffuser of smartphones, the SNS users rate has increased to 74.7 %
in 2018. Users can ea... [more]
IMQ2019-38 IE2019-120 MVE2019-59
pp.115-120
CS, CQ
(Joint)
2019-04-18
09:20
Osaka Osaka Univ. Library Dynamic Redundancy Switching Method of Network Paths for Tamper-Tolerant Networked Control
Kento Aida, Kenta Yamada, Ryosuke Hotchi, Ryogo Kubo (Keio Univ.) CS2019-1
According to the growing of information and communication technology (ICT), various kinds of things are connected to the... [more] CS2019-1
pp.1-6
IN, NS
(Joint)
2019-03-05
09:40
Okinawa Okinawa Convention Center Tampering Detection Method for Video Using Semi-fragile Digital Watermarking
Junya Yamamoto, Masaki Bandai (Sophia Univ.) NS2018-239
In this paper, we propose a tampering detection method for video using semi-fragile digital watermarking. In the convent... [more] NS2018-239
pp.273-276
CQ
(2nd)
2017-08-26
15:00
Saitama Nippon Institute of Technology [Poster Presentation] Tamper detection method based on histogram shift of audio data
Yuya Nakayama, Masanori Kimoto (NIT)
Digital audio watermark is a technique for hiding information in audio data so that it cannot be recognized by humans.Au... [more]
SIS 2017-06-02
10:40
Oita Housen-Sou (Beppu) Scalable Copyright Protection using Lossless Information Hiding
Koichi Araki, Tsubasa Sonezaki, Masayuki Kurosaki, Hiroshi Ochi (Kyutech) SIS2017-14
This paper proposes a copyright protection method based on lossless information hiding which realizes resolution scalabi... [more] SIS2017-14
pp.71-76
EA, EMM 2016-11-18
09:40
Oita Compal Hall (Oita) Singular-Spectrum-Analysis-Based Speech Watermarking for Tampering Detection
Jessada Karnjana, Masashi Unoki (JAIST) EA2016-57 EMM2016-63
This paper proposes a novel speech-tampering-detection scheme by using the semi-fragile watermarking based on the singul... [more] EA2016-57 EMM2016-63
pp.55-60
CQ 2016-08-29
13:55
Ibaraki Tsukubasan Impact Assessment of Tamper Signal Characteristics in Secure Control Systems with Tamper Detection Observer
Jin Hoshino, Hitoshi Kojima, Takahiro Funakoshi, Ryusuke Imai, Ryogo Kubo (Keio Univ.) CQ2016-55
Today, networked control systems (NCSs) have become popular in many areas of studies, due to the growth of information a... [more] CQ2016-55
pp.39-44
EMM 2015-03-12
14:10
Okinawa   [Poster Presentation] A tamper detection scheme for JPEG2000 coded images using reversible data hiding
Takeshi Ogasawara, Shoko Imaizumi, Naokazu Aoki, Hiroyuki Kobayashi (Chiba Univ.) EMM2014-82
This paper proposes an efficient tamper detection scheme for JPEG2000 coded images.
Marker codes that delimit a JPEG20... [more]
EMM2014-82
pp.31-36
EMM 2015-03-12
14:10
Okinawa   A Study on Tamper Detection and Image Restoration by Embedding Similar Region Information
Yuto Aomori, Kazuki Yamato, Kazuma Shinoda, Madoka Hasegawa, Shigeo Kato (Utsunomiya Univ.) EMM2014-86
Recently, many researchers have proposed various watermarking methods which can detect image tampering and restore tampe... [more] EMM2014-86
pp.55-60
EMM 2014-03-07
15:00
Ishikawa JAIST [Poster Presentation] Compatible 2d-code having tamper detection system with QR-code
Takayuki Ishihara, Michiharu Niimi, Hideki Noda (Kyushu Inst. of Tech.) EMM2013-106
The matrix barcodes known as Quick Response
(QR) codes, which are enable us to import printed digital information
int... [more]
EMM2013-106
pp.39-44
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-18
15:40
Hokkaido   Study on Speech Watermarking Based on Modifications to LSFs for Tampering Detection
Shengbei Wang, Masashi Unoki (JAIST) ISEC2013-32 SITE2013-27 ICSS2013-37 EMM2013-34
Digital watermarking for speech signals can effectively protect speech signals from malicious tampering. This paper prop... [more] ISEC2013-32 SITE2013-27 ICSS2013-37 EMM2013-34
pp.233-238
EMM 2013-03-07
13:30
Kyoto   Information hiding for QR-code using Wet Paper Code
Michiharu Niimi, Hideki Noda (Kyushu Inst. of Tech.) EMM2012-107
The matrix barcodes known as Quick Response
(QR) codes, which are enable us to import printed digital information
int... [more]
EMM2012-107
pp.1-6
EMM 2013-03-08
11:15
Kyoto   Reversible data hiding using linear prediction and error-expansion for audio signals
Akira Nishimura (Tokyo Univ. of Information Sciences.) EMM2012-117
Reversible data hiding is a technique where hidden data are embedded
in host data such that the consistency of the ho... [more]
EMM2012-117
pp.59-64
EMM 2013-01-30
13:00
Miyagi Tohoku Univ. Detection of Tampering in Speech Signals with Digital-Audio Watermarking Technique based on Cochlear delay
Masashi Unoki, Shengbei Wang, Ryota Miyauchi (JAIST) EMM2012-102
There have recently been serious social issues involved in multimedia signal processing such as malicious attacks and ta... [more] EMM2012-102
pp.65-70
IT, ISEC, WBS 2012-03-02
17:00
Kanagawa   Image Authentication Based on Interleaving and Cyclic Hamming Code
Hiroaki Fujimoto, Ryuji Hamabe (FIT) IT2011-77 ISEC2011-104 WBS2011-78
In this paper, we propose a fragile watermarking scheme for image authentication. Generally, in image authentication, th... [more] IT2011-77 ISEC2011-104 WBS2011-78
pp.195-200
ITE-ME, EMM, IE, LOIS, IEE-CMN [detail] 2011-09-20
16:05
Ehime   A Reversible and Tampering Detective Steganography for Probative Acoustic Data Using Lossless Compression
Xuping Huang (SOKENDAI), Akira Nishimura (Tokyo Univ. of Information Sciences), Isao Echizen (SOKENDAI/NII) LOIS2011-22 IE2011-55 EMM2011-33
A reversible and verifiable tampering detection steganographic method is described for probative acoustic data that uses... [more] LOIS2011-22 IE2011-55 EMM2011-33
pp.41-46
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-01
13:50
Aomori Hirosaki University Image Authentication with Access Control Based on Reversible Data Hiding
Kenta Watanabe, Masaaki Fujiyoshi, Hitoshi Kiya (Tokyo Metro. Univ.) ISEC2010-19 SITE2010-15 ICSS2010-25
This paper proposes an image authentication with access control based on reversible data hiding. The proposed method gen... [more] ISEC2010-19 SITE2010-15 ICSS2010-25
pp.81-86
SIS 2008-03-13
14:45
Tokyo Musashi Institute of Technology(Setagaya) A Tamper Detection Method for RFID Tag Data Using Tag Private Memory
Akira Yamamoto, Shigeya Suzuki, Hisakazu Hada, Jin Mitsugi, Fumio Teraoka, Osamu Nakamura (Keio Univ.) SIS2007-75
Recently, storing not only ID but also useful data onto RFID tag is expected as a new RFID system service. One of the ma... [more] SIS2007-75
pp.41-46
 Results 1 - 20 of 25  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan