Thu, May 21 AM 10:15 - 11:30 |
(1) |
10:15-10:40 |
On a Lower Bound on the Capacity of Digital Fingerprinting Codes with Codewords Generated by Using a Continuous Distribution |
Hiroki Koga, Kaoru Itabashi (U. Tsukuba) |
(2) |
10:40-11:05 |
Feasible regions of symmetric capacity and Gallager's $E_{0}$ functions for discrete memoryless channels under a uniform input distribution |
Yuta Sakai, Ken-ichi Iwata (Univ. of Fukui) |
(3) |
11:05-11:30 |
Analysis on Reliability Function and Strong Converse of Discrete Memoryless Biometrical Identification Systems |
Yachongka Vamoua, Hideki Yagi (Univ. of Electro-Comm.) |
|
11:30-13:00 |
Lunch Break ( 90 min. ) |
Thu, May 21 PM 13:00 - 14:15 |
(4) |
13:00-13:25 |
New Classes of Public Key Cryptosystems Constructed Based on Cyclic Codes, K(XV)SE(1)PKC and K(XVI)SE(1)PKC |
Masao Kasahara (Waseda Univ./Chuo Univ.) |
(5) |
13:25-13:50 |
Design and Evaluation of LDPC Code Decoder Using Generalized BP Algorithm |
Akiyoshi Hashimoto, Harumi Morino (Hitachi) |
(6) |
13:50-14:15 |
A Note on Correlation Properties of Periodic Sequences over Extension Fields from a Cyclic Difference Set |
Takayasu Kaida (Kinki Univ.), Junru Zheng (Kyushu Women's Univ.), Keiichi Takahashi (Kinki Univ.) |
|
14:15-14:30 |
Break ( 15 min. ) |
Thu, May 21 PM 14:30 - 16:10 |
(7) |
14:30-14:55 |
Generating Protected Eigenface Templates Using an Unitary Transformaion |
Ibuki Nakamura (Tokyo Metropolitan Univ.), Yoshihide Tonomura (NTT), Hitoshi Kiya (Tokyo Metropolitan Univ.) |
(8) |
14:55-15:20 |
Readout of copyright information hidden in objects fabricated with 3-D printers |
Piyarat Silapasuphakornwong, Masahiro Suzuki, Kazutake Uehira (Kanagawa Inst. Tech.), Youichi Takashima (NTT), Hiroshi Unno (Kanagawa Inst. Tech.) |
(9) |
15:20-15:45 |
A study on speaker conversion using speech and expression features for video chatting |
Yuuki Saito, Takashi Nose (Tohoku Univ.), Takahiro Shinozaki (Tokyo Institute of Technology), Akinori Ito (Tohoku Univ.) |
(10) |
15:45-16:10 |
Data Anonymization for Information Recommendation Based on TF-IDF Method |
Kensuke Arai (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Noboru Babaguchi (Osaka Univ.) |
Fri, May 22 AM 10:00 - 10:50 |
(11) |
10:00-10:25 |
On the Computational Complexity of Information Flow Problem with Hierarchy Constraint |
Yuki Takeda, Yuichi Kaji, Minoru Ito (NAIST) |
(12) |
10:25-10:50 |
Evaluation of Symmetric Mutual Information of Simplified TDMR Channel Model |
Tadashi Wadayama (Nitech) |
|
10:50-11:05 |
Break ( 15 min. ) |
Fri, May 22 AM 11:05 - 11:55 |
(13) |
11:05-11:55 |
[Invited Talk]
Trade-off between resiliency and efficiency of cryptographic protocols
-- The case of information theoretical security -- |
Maki Yoshida (NICT) |
|
11:55-13:40 |
Lunch Break ( 105 min. ) |
Fri, May 22 PM 13:40 - 14:30 |
(14) |
13:40-14:05 |
An Audio Secret Sharing Scheme Easy to Reproduce Secret Physically |
Yuuki Tokushige, Yuto Misawa, Fumiaki Yoshida, Masaya Uwatoko, Mitsugu Iwamoto, Kazuo Ohta (UEC) |
(15) |
14:05-14:30 |
Robust Audio Watermarking Based on Dynamic Phase Coding and Error Control Coding |
Ngo Nhut Minh, Brian M. Kurkoski, Masashi Unoki (JAIST) |
|
14:30-14:45 |
Break ( 15 min. ) |
Fri, May 22 PM 14:45 - 15:35 |
(16) |
14:45-15:35 |
[Invited Talk]
Complete Complementary Codes and Its Applications |
Tetsuya Kojima (NIT, Tokyo College) |