Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
CS, IE, IPSJ-AVM, ITE-BCT [detail] |
2022-11-24 14:05 |
Aichi |
Nagoya Institute of Technology (Primary: On-site, Secondary: Online) |
Video watermarking method of embedding multiplexed watermark information and tampering detection patterns Eri Odaira (TUS), Naoto Kawamura (Kawamura Techno Lab.), Hyunho Kang (NIT, Tokyo College), Keiichi Iwamura (TUS) CS2022-52 IE2022-40 |
We investigate a watermarking method that rapidly embeds primary and secondly information into each frame of videos at t... [more] |
CS2022-52 IE2022-40 pp.21-26 |
EA, EMM, ASJ-H |
2022-11-22 13:00 |
Online |
Online |
[Fellow Memorial Lecture]
Security and Privacy Preservation for Speech Signal
-- Approach from speech information hiding technology -- Masashi Unoki (JAIST) EA2022-60 EMM2022-60 |
Non-authentic but skillfully fabricated artificial replicas of authentic media in the real world are known as “media clo... [more] |
EA2022-60 EMM2022-60 pp.99-104 |
IE, IMQ, MVE, CQ (Joint) [detail] |
2020-03-06 14:25 |
Fukuoka |
Kyushu Institute of Technology (Cancelled but technical report was issued) |
Image Tampering Detection and Self-Recovery by Using Robust Digital Watermark against JPEG Compression Shuhei Ohara, Masayuki Kurosaki, Ochi Hiroshi (Kyutech) IMQ2019-38 IE2019-120 MVE2019-59 |
Recently, with the tremendous diffuser of smartphones, the SNS users rate has increased to 74.7 %
in 2018. Users can ea... [more] |
IMQ2019-38 IE2019-120 MVE2019-59 pp.115-120 |
CS, CQ (Joint) |
2019-04-18 09:20 |
Osaka |
Osaka Univ. Library |
Dynamic Redundancy Switching Method of Network Paths for Tamper-Tolerant Networked Control Kento Aida, Kenta Yamada, Ryosuke Hotchi, Ryogo Kubo (Keio Univ.) CS2019-1 |
According to the growing of information and communication technology (ICT), various kinds of things are connected to the... [more] |
CS2019-1 pp.1-6 |
IN, NS (Joint) |
2019-03-05 09:40 |
Okinawa |
Okinawa Convention Center |
Tampering Detection Method for Video Using Semi-fragile Digital Watermarking Junya Yamamoto, Masaki Bandai (Sophia Univ.) NS2018-239 |
In this paper, we propose a tampering detection method for video using semi-fragile digital watermarking. In the convent... [more] |
NS2018-239 pp.273-276 |
CQ (2nd) |
2017-08-26 15:00 |
Saitama |
Nippon Institute of Technology |
[Poster Presentation]
Tamper detection method based on histogram shift of audio data Yuya Nakayama, Masanori Kimoto (NIT) |
Digital audio watermark is a technique for hiding information in audio data so that it cannot be recognized by humans.Au... [more] |
|
SIS |
2017-06-02 10:40 |
Oita |
Housen-Sou (Beppu) |
Scalable Copyright Protection using Lossless Information Hiding Koichi Araki, Tsubasa Sonezaki, Masayuki Kurosaki, Hiroshi Ochi (Kyutech) SIS2017-14 |
This paper proposes a copyright protection method based on lossless information hiding which realizes resolution scalabi... [more] |
SIS2017-14 pp.71-76 |
EA, EMM |
2016-11-18 09:40 |
Oita |
Compal Hall (Oita) |
Singular-Spectrum-Analysis-Based Speech Watermarking for Tampering Detection Jessada Karnjana, Masashi Unoki (JAIST) EA2016-57 EMM2016-63 |
This paper proposes a novel speech-tampering-detection scheme by using the semi-fragile watermarking based on the singul... [more] |
EA2016-57 EMM2016-63 pp.55-60 |
CQ |
2016-08-29 13:55 |
Ibaraki |
Tsukubasan |
Impact Assessment of Tamper Signal Characteristics in Secure Control Systems with Tamper Detection Observer Jin Hoshino, Hitoshi Kojima, Takahiro Funakoshi, Ryusuke Imai, Ryogo Kubo (Keio Univ.) CQ2016-55 |
Today, networked control systems (NCSs) have become popular in many areas of studies, due to the growth of information a... [more] |
CQ2016-55 pp.39-44 |
EMM |
2015-03-12 14:10 |
Okinawa |
|
[Poster Presentation]
A tamper detection scheme for JPEG2000 coded images using reversible data hiding Takeshi Ogasawara, Shoko Imaizumi, Naokazu Aoki, Hiroyuki Kobayashi (Chiba Univ.) EMM2014-82 |
This paper proposes an efficient tamper detection scheme for JPEG2000 coded images.
Marker codes that delimit a JPEG20... [more] |
EMM2014-82 pp.31-36 |
EMM |
2015-03-12 14:10 |
Okinawa |
|
A Study on Tamper Detection and Image Restoration by Embedding Similar Region Information Yuto Aomori, Kazuki Yamato, Kazuma Shinoda, Madoka Hasegawa, Shigeo Kato (Utsunomiya Univ.) EMM2014-86 |
Recently, many researchers have proposed various watermarking methods which can detect image tampering and restore tampe... [more] |
EMM2014-86 pp.55-60 |
EMM |
2014-03-07 15:00 |
Ishikawa |
JAIST |
[Poster Presentation]
Compatible 2d-code having tamper detection system with QR-code Takayuki Ishihara, Michiharu Niimi, Hideki Noda (Kyushu Inst. of Tech.) EMM2013-106 |
The matrix barcodes known as Quick Response
(QR) codes, which are enable us to import printed digital information
int... [more] |
EMM2013-106 pp.39-44 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-18 15:40 |
Hokkaido |
|
Study on Speech Watermarking Based on Modifications to LSFs for Tampering Detection Shengbei Wang, Masashi Unoki (JAIST) ISEC2013-32 SITE2013-27 ICSS2013-37 EMM2013-34 |
Digital watermarking for speech signals can effectively protect speech signals from malicious tampering. This paper prop... [more] |
ISEC2013-32 SITE2013-27 ICSS2013-37 EMM2013-34 pp.233-238 |
EMM |
2013-03-07 13:30 |
Kyoto |
|
Information hiding for QR-code using Wet Paper Code Michiharu Niimi, Hideki Noda (Kyushu Inst. of Tech.) EMM2012-107 |
The matrix barcodes known as Quick Response
(QR) codes, which are enable us to import printed digital information
int... [more] |
EMM2012-107 pp.1-6 |
EMM |
2013-03-08 11:15 |
Kyoto |
|
Reversible data hiding using linear prediction and error-expansion for audio signals Akira Nishimura (Tokyo Univ. of Information Sciences.) EMM2012-117 |
Reversible data hiding is a technique where hidden data are embedded
in host data such that the consistency of the ho... [more] |
EMM2012-117 pp.59-64 |
EMM |
2013-01-30 13:00 |
Miyagi |
Tohoku Univ. |
Detection of Tampering in Speech Signals with Digital-Audio Watermarking Technique based on Cochlear delay Masashi Unoki, Shengbei Wang, Ryota Miyauchi (JAIST) EMM2012-102 |
There have recently been serious social issues involved in multimedia signal processing such as malicious attacks and ta... [more] |
EMM2012-102 pp.65-70 |
IT, ISEC, WBS |
2012-03-02 17:00 |
Kanagawa |
|
Image Authentication Based on Interleaving and Cyclic Hamming Code Hiroaki Fujimoto, Ryuji Hamabe (FIT) IT2011-77 ISEC2011-104 WBS2011-78 |
In this paper, we propose a fragile watermarking scheme for image authentication. Generally, in image authentication, th... [more] |
IT2011-77 ISEC2011-104 WBS2011-78 pp.195-200 |
ITE-ME, EMM, IE, LOIS, IEE-CMN [detail] |
2011-09-20 16:05 |
Ehime |
|
A Reversible and Tampering Detective Steganography for Probative Acoustic Data Using Lossless Compression Xuping Huang (SOKENDAI), Akira Nishimura (Tokyo Univ. of Information Sciences), Isao Echizen (SOKENDAI/NII) LOIS2011-22 IE2011-55 EMM2011-33 |
A reversible and verifiable tampering detection steganographic method is described for probative acoustic data that uses... [more] |
LOIS2011-22 IE2011-55 EMM2011-33 pp.41-46 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-01 13:50 |
Aomori |
Hirosaki University |
Image Authentication with Access Control Based on Reversible Data Hiding Kenta Watanabe, Masaaki Fujiyoshi, Hitoshi Kiya (Tokyo Metro. Univ.) ISEC2010-19 SITE2010-15 ICSS2010-25 |
This paper proposes an image authentication with access control based on reversible data hiding. The proposed method gen... [more] |
ISEC2010-19 SITE2010-15 ICSS2010-25 pp.81-86 |
SIS |
2008-03-13 14:45 |
Tokyo |
Musashi Institute of Technology(Setagaya) |
A Tamper Detection Method for RFID Tag Data Using Tag Private Memory Akira Yamamoto, Shigeya Suzuki, Hisakazu Hada, Jin Mitsugi, Fumio Teraoka, Osamu Nakamura (Keio Univ.) SIS2007-75 |
Recently, storing not only ID but also useful data onto RFID tag is expected as a new RFID system service. One of the ma... [more] |
SIS2007-75 pp.41-46 |