IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Enriched MultiMedia (EMM)  (Searched in: 2013)

Search Results: Keywords 'from:2013-07-18 to:2013-07-18'

[Go to Official EMM Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 20 of 40  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-18
10:40
Hokkaido   Study of CAPTCHA suitable for smartphones
Mayumi Takaya (Akita Univ.), Yusuke Tsuruta (System Research), Hikari Kato, Takeshi Komatsubara, Yusuke Watanabe, Akihiro Yamamura (Akita Univ.) ISEC2013-11 SITE2013-6 ICSS2013-16 EMM2013-13
 [more] ISEC2013-11 SITE2013-6 ICSS2013-16 EMM2013-13
pp.7-12
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-18
11:05
Hokkaido   Proposal of the Support System at the Time of Introduction of User Applications in Android OS
Yuuki Komatu, Eiichiro Kodama, Jiahong Wang, Toyoo Takata (Iwate Prefectural Univ.) ISEC2013-12 SITE2013-7 ICSS2013-17 EMM2013-14
High-performance mobile phone, called the smartphone is beginning to spread regardless of age in recent years. As a matt... [more] ISEC2013-12 SITE2013-7 ICSS2013-17 EMM2013-14
pp.13-18
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-18
11:30
Hokkaido   Assessment of Self-Modifying-Based Tamper Resistant Technology in Smart Phone Platform
Naoki Yoshida, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ISEC2013-13 SITE2013-8 ICSS2013-18 EMM2013-15
The spread of smartphones in recent years demands superior technologies to improve tamper resistance of applications run... [more] ISEC2013-13 SITE2013-8 ICSS2013-18 EMM2013-15
pp.19-26
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-18
12:55
Hokkaido   Examination of IDS Log Analysis using Discrete Wavelet Transform
Satoshi Kimura, Hiroyuki Inaba (Kyoto Inst. of Tech.) ISEC2013-14 SITE2013-9 ICSS2013-19 EMM2013-16
With the spread of the Internet, the illegal access to the network is increasing. To overcome this prob-
lem, various t... [more]
ISEC2013-14 SITE2013-9 ICSS2013-19 EMM2013-16
pp.27-32
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-18
13:20
Hokkaido   Engineering Ethics Education with world cafe discussion
Michio Nakanishi (Osaka Inst. of Tech.) ISEC2013-15 SITE2013-10 ICSS2013-20 EMM2013-17
The world café style discussion was introduced in the subject “Information technology and ethics” in Graduate School of ... [more] ISEC2013-15 SITE2013-10 ICSS2013-20 EMM2013-17
pp.33-38
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-18
13:45
Hokkaido   Ethical Problems Concerning the Digital Archiving and Content Delivery of Video and Audio Recordings of Classroom Interactions in Elementary and Junior High Schools
Takahiro Haga (Gifu Shotoku Gakuen Univ.), Takushi Otani (Kibi Internationla Univ.) ISEC2013-16 SITE2013-11 ICSS2013-21 EMM2013-18
The purpose of this paper is to determine the conditions that need to be met to ethically and legally justify the digita... [more] ISEC2013-16 SITE2013-11 ICSS2013-21 EMM2013-18
pp.39-46
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-18
14:10
Hokkaido   The Concept of "Group Privacy" in the Information Age: -- Can We Ethically Restrict the Use of Social Media to Publicize Communication Within a Group? --
Takushi Otani (Kibi International Univ.) ISEC2013-17 SITE2013-12 ICSS2013-22 EMM2013-19
This paper explores whether we can justify the restriction and prohibition of using social media to publicize communicat... [more] ISEC2013-17 SITE2013-12 ICSS2013-22 EMM2013-19
pp.47-52
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-18
14:50
Hokkaido   Evaluation Method for Arbiter PUF on FPGA and Its Vulnerability
Takanori Machida, Toshiki Nakasone, Kazuo Sakiyama (UEC) ISEC2013-18 SITE2013-13 ICSS2013-23 EMM2013-20
Among Physical Unclonable Functions~(PUFs), Arbiter PUF is one of the delay-based PUFs that uses signal-delay time diffe... [more] ISEC2013-18 SITE2013-13 ICSS2013-23 EMM2013-20
pp.53-58
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-18
15:15
Hokkaido   A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256
Jiageng Chen (JAIST), Shoichi Hirose (Univ. of Fukui), Hidenori Kuwakado (Kansai Univ.), Atsuko Miyaji (JAIST) ISEC2013-19 SITE2013-14 ICSS2013-24 EMM2013-21
This paper presents the first collision attack on the double-block-length compression function presented at FSE 2006 ins... [more] ISEC2013-19 SITE2013-14 ICSS2013-24 EMM2013-21
pp.59-66
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-18
15:40
Hokkaido   Higher Order Differential Attack on HyRAL using Control Transform and Observation Transform
Naoki Shibayama (JASDF), Yasutaka Igarashi (Kagoshima Univ.), Toshinobu Kaneko (Tokyo Univ. of Science) ISEC2013-20 SITE2013-15 ICSS2013-25 EMM2013-22
HyRAL is a 128-bit block cipher proposed by Hirata in 2010. It has been reported that 14-round HyRAL with 256-bit secret... [more] ISEC2013-20 SITE2013-15 ICSS2013-25 EMM2013-22
pp.67-74
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-18
16:05
Hokkaido   On the Standardization of Information Security -- ISO/IEC JTC1/SC27/WG2 Report on the Nice Meeting in April,2013 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Hajime Watanabe (AIST), Shin'ichiro Matsuo (NICT), Kenji Ohkuma (Toshiba/IPA) ISEC2013-21 SITE2013-16 ICSS2013-26 EMM2013-23
Secure information systems are absolutely required in the various situations. The international standardization is one ... [more] ISEC2013-21 SITE2013-16 ICSS2013-26 EMM2013-23
pp.75-84
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-18
09:10
Hokkaido   An Evaluation on Controlling File Size Increase in the Image Partial Scrambling Technique Enabled Quantitative Degradation Degree Control by Exchanging DCT Coefficients
Shingo Shimaura, Syouhei Harada, Seok Kang, Yuji Sakamoto (Hokkaido Univ.) ISEC2013-22 SITE2013-17 ICSS2013-27 EMM2013-24
The partial scrambling which is performed before variable length coding enables quantitative degradation degree control ... [more] ISEC2013-22 SITE2013-17 ICSS2013-27 EMM2013-24
pp.167-172
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-18
09:35
Hokkaido   Optimization and Information Hiding Techniques of PDF files for Electronic Display Devices
Toshio Modegi (DNP) ISEC2013-23 SITE2013-18 ICSS2013-28 EMM2013-25
These days, reading on an electronic display device such as a tablet computer is popular. One of the typical document fo... [more] ISEC2013-23 SITE2013-18 ICSS2013-28 EMM2013-25
pp.173-180
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-18
10:15
Hokkaido   Wonder Search: An iPhone application for Application Search Based on an improved Ring-structured Graphical Search Interface
Tomoko Kajiyama (Aoyama Gakuin Univ.) ISEC2013-24 SITE2013-19 ICSS2013-29 EMM2013-26
We improved a ring-structured graphical search interface and developed an iPhone application for application search name... [more] ISEC2013-24 SITE2013-19 ICSS2013-29 EMM2013-26
pp.181-185
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-18
10:40
Hokkaido   [Panel Discussion] Education for IT Engineers from the Viewpoint of Information Security
Naofumi Aoki (Hokkaido Univ.), Kumi Mitani, Manami Fujimaru, Takahisa Kishiya, Junpei Tsuji, Tomohiro Takahashi ISEC2013-25 SITE2013-20 ICSS2013-30 EMM2013-27
Problems related to information securities, such as cyber-terrorism, are becoming serious social issues. IT engineers ar... [more] ISEC2013-25 SITE2013-20 ICSS2013-30 EMM2013-27
pp.187-192
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-18
12:55
Hokkaido   A Hierarchical Access Control Method by the Secret Sharing Scheme
Takashi Kurakami, Masaaki Fujiyoshi, Hitoshi Kiya (Tokyo Metropolitan Univ.) ISEC2013-26 SITE2013-21 ICSS2013-31 EMM2013-28
 [more] ISEC2013-26 SITE2013-21 ICSS2013-31 EMM2013-28
pp.193-198
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-18
13:20
Hokkaido   A Content Protection Method Using Secret Sharing and Attribute-Based Encryption
Katsuma Takimoto, Masaaki Fujiyoshi (Tokyo Metropolitan Univ.), Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metropolitan Univ.) ISEC2013-27 SITE2013-22 ICSS2013-32 EMM2013-29
 [more] ISEC2013-27 SITE2013-22 ICSS2013-32 EMM2013-29
pp.199-204
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-18
13:45
Hokkaido   Implementation and Evaluation of an error correction code suitable for the information hiding method using the single-dot method
Hiroyasu Kitazawa, Kitahiro Kaneda, Keiichi Iwamura (Tokyo Univ. of Science), Isao Echizen (NII) ISEC2013-28 SITE2013-23 ICSS2013-33 EMM2013-30
There is no doubt that paper media is an important media in current electronic proceeded .However, studies of protection... [more] ISEC2013-28 SITE2013-23 ICSS2013-33 EMM2013-30
pp.205-212
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-18
14:10
Hokkaido   Study of an artificial fiber pattern in Augmented Reality system
Tomoki Inui, Kitahiro Kaneda, Keiichi Iwamura (Tokyo Univ. of Science), Isao Echizen (NII) ISEC2013-29 SITE2013-24 ICSS2013-34 EMM2013-31
The technology behind augmented reality (Augmented Reality, AR or later) can be divided into sensor types based on the u... [more] ISEC2013-29 SITE2013-24 ICSS2013-34 EMM2013-31
pp.213-220
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-18
14:50
Hokkaido   Image Restoration Using Embedding of Similar Region Information
Kazuki Yamato, Kazuma Shinoda, Madoka Hasegawa, Shigeo Kato (Utsunomiya Univ.), Yuichi Tanaka (Tokyo Univ. of of Agriculture and Tech.) ISEC2013-30 SITE2013-25 ICSS2013-35 EMM2013-32
Baroumand et. al proposed the method called WDBM for restoring a corrupted image by using the correlation within the ima... [more] ISEC2013-30 SITE2013-25 ICSS2013-35 EMM2013-32
pp.221-226
 Results 1 - 20 of 40  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan