Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT, EMM |
2016-05-19 10:15 |
Hokkaido |
Otaru Economic Center |
Additional Data Hiding Technique for Specified Regions of JPEG Image Yasutoshi Miura, Xuefei Li, Kang Seok, Yuji Sakamoto (Hokkaido Univ.) IT2016-1 EMM2016-1 |
[more] |
IT2016-1 EMM2016-1 pp.1-6 |
IT, EMM |
2016-05-19 10:40 |
Hokkaido |
Otaru Economic Center |
Codestream Level Secure Identification for JPEG 2000 Images Kenta Iida, Hitoshi Kiya (Tokyo Metropolitan Univ.) IT2016-2 EMM2016-2 |
[more] |
IT2016-2 EMM2016-2 pp.7-12 |
IT, EMM |
2016-05-19 11:05 |
Hokkaido |
Otaru Economic Center |
Evaluation of scanned image tolerance by using spread spectrum digital watermarking with regression analysis Jinjing Ma, Masaki Kawamura (Yamaguchi Univ.) IT2016-3 EMM2016-3 |
In order to detect watermarks from a scanned image, we investigated color change between the stego-image and the scanned... [more] |
IT2016-3 EMM2016-3 pp.13-18 |
IT, EMM |
2016-05-19 13:15 |
Hokkaido |
Otaru Economic Center |
A Note on Support Recovery of Sparse Signals using Belief Propagation Shunsuke Horii, Toshiyasu Matsushima, Shigeichi Hirasawa (Waseda Univ.) IT2016-4 EMM2016-4 |
In this paper, we propose a new support recovery algorithm from noisy measurements based on the belief propagation (BP) ... [more] |
IT2016-4 EMM2016-4 pp.19-24 |
IT, EMM |
2016-05-19 13:40 |
Hokkaido |
Otaru Economic Center |
A Consideration on Relationships between Correlation of Information Stored on Nodes and Coding Efficiency for Cooperative Regenerating Codes Takahiro Yoshida (Yokohama College of Commerce), Toshiyasu Matsushima (Waseda Univ.) IT2016-5 EMM2016-5 |
In this study, we consider cooperative regenerating codes for distributed storage systems.
Cooperative regenerating cod... [more] |
IT2016-5 EMM2016-5 pp.25-30 |
IT, EMM |
2016-05-19 14:05 |
Hokkaido |
Otaru Economic Center |
An Optimal Construction of Visual Secret Sharing Schemes for General Access Structures Using Integer Programming and its Application Kuya Nishizumi, Hiroki Koga (Univ. Tsukuba) IT2016-6 EMM2016-6 |
In a visual secret sharing scheme for black-white images, a secret image is encoded to $n$ shares by using $n times m$ B... [more] |
IT2016-6 EMM2016-6 pp.31-36 |
IT, EMM |
2016-05-19 14:45 |
Hokkaido |
Otaru Economic Center |
Simulation of error-correcting code using LDPC code with Sum-Product method for a single-dot pattern method Kitahiro Kaneda (Osaka Prefecture Univ.), Yasuyuki Anezaki, Keiichi Iwamura (TUS), Isao Echizen (NII) IT2016-7 EMM2016-7 |
We have proposed a single dot information hiding method for printed matter. In this paper, we try to apply LDPC error co... [more] |
IT2016-7 EMM2016-7 pp.37-42 |
IT, EMM |
2016-05-19 15:10 |
Hokkaido |
Otaru Economic Center |
Study of Photo-realistic Face Moving Image Generation from the Text Using the Facial Feature Kazuki Sato, Takashi Nose, Akinori Ito (Tohoku Univ.) IT2016-8 EMM2016-8 |
In this paper, we propose face moving image synthesis technique based on Hidden Markov model (HMM) using the facial feat... [more] |
IT2016-8 EMM2016-8 pp.43-48 |
IT, EMM |
2016-05-19 15:35 |
Hokkaido |
Otaru Economic Center |
Multimodal User Authentication Focusing on Long-term Heart Rate Sequences from Wearable Devices Takaaki Yoshida (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Babaguchi Noboru (Osaka Univ.) IT2016-9 EMM2016-9 |
This paper proposes a multimodal authentication system for smartphones
by using two sequences of different measurement ... [more] |
IT2016-9 EMM2016-9 pp.49-54 |
IT, EMM |
2016-05-19 16:15 |
Hokkaido |
Otaru Economic Center |
[Invited Talk]
Data Compression for Computing Functions
-- An Approach from a Dichotomy of Functions -- Shigeaki Kuzuoka (Wakayama Univ.) IT2016-10 EMM2016-10 |
Let us consider the problem of computing a function of several data
which are observed separately. A naive scheme is t... [more] |
IT2016-10 EMM2016-10 pp.55-61 |
IT, EMM |
2016-05-20 10:15 |
Hokkaido |
Otaru Economic Center |
A Sharp Bound Between Two Arimoto's Conditional Renyi Entropies with Distinct Positive Orders Yuta Sakai, Ken-ichi Iwata (Univ. of Fukui) IT2016-11 EMM2016-11 |
In information theory, information measures for random variables, such as the Shannon entropy and the Rényi entropy, are... [more] |
IT2016-11 EMM2016-11 pp.63-68 |
IT, EMM |
2016-05-20 10:40 |
Hokkaido |
Otaru Economic Center |
A Grammar-Based Data Compression Algorithm Using Chomsky Normal Form of Context Free Grammar Mitsuharu Arimura (Shonan Inst. Tech.) IT2016-12 EMM2016-12 |
This paper proposes a new class of grammar-based lossless source code. For the simplicity, a Semi-Chomsky Normal Form (s... [more] |
IT2016-12 EMM2016-12 pp.69-74 |
IT, EMM |
2016-05-20 11:05 |
Hokkaido |
Otaru Economic Center |
Construction of A Two-Step Universal VV Code Using a Sufficient Statistic Extracted from a VF Code Mitsuharu Arimura (Shonan Inst. Tech.), Hiroshi Nagaoka (Univ. of Electro-Communications) IT2016-13 EMM2016-13 |
In this paper, some theorems which give relationships between a sufficient statistic and the universality of a VV source... [more] |
IT2016-13 EMM2016-13 pp.75-80 |
IT, EMM |
2016-05-20 13:15 |
Hokkaido |
Otaru Economic Center |
A Novel Data Hiding Scheme into Musical Pieces by Utilizing Musical Characteristics Kan Kamada, Tetsuya Kojima (NIT, Tokyo College) IT2016-14 EMM2016-14 |
Data hiding schemes using complete complementary codes (CCC) have been developed for image and audio signals. It has bee... [more] |
IT2016-14 EMM2016-14 pp.81-86 |
IT, EMM |
2016-05-20 13:40 |
Hokkaido |
Otaru Economic Center |
Improvement of the embedding capacity for audio watermarking method using non-negative matrix factorization Harumi Murata (Chukyo Univ.), Akio Ogihara (Kindai Univ.) IT2016-15 EMM2016-15 |
For audio signals, we propose a method focused on a chord of music theory and embed the watermarks in consonance with ho... [more] |
IT2016-15 EMM2016-15 pp.87-92 |
IT, EMM |
2016-05-20 14:05 |
Hokkaido |
Otaru Economic Center |
Technique for Reading Information Embedded Inside Gypsum Objects Fabricated With 3-D Printers Kosuke Nakamura, Masahiro Suzuki (Kanagawa Inst. Tech.), Youichi Takashima (NTT), Hideyuki Torii, Kazutake Uehira (Kanagawa Inst. Tech.) IT2016-16 EMM2016-16 |
We evaluated our previously proposed technique for protecting copyrights of digital data for 3-D printing. The proposed ... [more] |
IT2016-16 EMM2016-16 pp.93-97 |
IT, EMM |
2016-05-20 14:30 |
Hokkaido |
Otaru Economic Center |
Possibility of Pure Data for Multimedia Programming Naofumi Aoki, Keisuke Ai (Hokkaido Univ.) IT2016-17 EMM2016-17 |
Pure Data is a visual programming language that allows programmers to make programs by drawing block diagrams on the com... [more] |
IT2016-17 EMM2016-17 pp.99-102 |
IT, EMM |
2016-05-20 15:10 |
Hokkaido |
Otaru Economic Center |
Optimization for the average performance of five-state system with probabilistic transition Ken-ichi Iwata, Takato Kimura (Univ. of Fukui), Hirosuke Yamamoto (The Univ. of Tokyo) IT2016-18 EMM2016-18 |
We consider an optimization problem for the average performance of a probabilistic transition system with n states. Supp... [more] |
IT2016-18 EMM2016-18 pp.103-108 |
IT, EMM |
2016-05-20 15:35 |
Hokkaido |
Otaru Economic Center |
Iterative Erasure Correcting Algorithm for q-ary Reed-Muller Codes base on Local Correctability Shinya Fukumoto, Tadashi Wadayama (NIT) IT2016-19 EMM2016-19 |
[more] |
IT2016-19 EMM2016-19 pp.109-114 |
IT, EMM |
2016-05-20 16:00 |
Hokkaido |
Otaru Economic Center |
Analysis of Rank-Modulation Rewriting Codes by a Group Action Tomoharu Shibuya, Takeru Sudo (Sophia Univ.) IT2016-20 EMM2016-20 |
In this paper, we study rank-modulation (RM) rewriting codes based on dominating sets. By introducing a special class of... [more] |
IT2016-20 EMM2016-20 pp.115-120 |