Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM |
2014-03-07 13:00 |
Ishikawa |
JAIST |
[Invited Talk]
Video Semantic Indexing: Current Trends and Issues Koichi Shinoda (Tokyo Inst. of Tech.) EMM2013-99 |
Recently, many studies have been done for video semantic indexing from a huge amount of consumer video on the Internet. ... [more] |
EMM2013-99 pp.1-2 |
EMM |
2014-03-07 15:00 |
Ishikawa |
JAIST |
[Poster Presentation]
A High-Capacity Data Embedding Scheme Based on Human Vision System for Palette-Based Images Kanichi Taniguchi, Shoko Imaizumi, Naokazu Aoki, Hiroyuki Kobayashi (Chiba Univ.) EMM2013-100 |
[more] |
EMM2013-100 pp.3-8 |
EMM |
2014-03-07 15:00 |
Ishikawa |
JAIST |
[Poster Presentation]
Comparison of error correction capability between LDPC and Sourlas codes suitable for digital watermarking Nobuhiro Hirata, Masaki Kawamura (Yamaguchi Univ.) EMM2013-101 |
We compare error correction capability between LDPC and Sourlas codes for image digital watermarking. In the case of emb... [more] |
EMM2013-101 pp.9-14 |
EMM |
2014-03-07 15:00 |
Ishikawa |
JAIST |
[Poster Presentation]
Watermark Design for Two-Dimensional Barcodes by Evolutionary Multi-Objective Optimization Satoshi Ono, Takeru Maehara, Kentaro Nakai, Ryo Ikeda, Koutarou Taniguchi, Shigeru Nakayama (Kagoshima Univ.) EMM2013-102 |
[more] |
EMM2013-102 pp.15-20 |
EMM |
2014-03-07 15:00 |
Ishikawa |
JAIST |
[Poster Presentation]
Surveillance camera system to achieve both crime prevention and privacy protection Kento Kobayashi, Keiichi Iwamura (Tokyo Univ. of Science), Isao Echizen (NII) EMM2013-103 |
Recently, cases to be taken up for privacy and personal information has increased, but there is no rule for privacy on s... [more] |
EMM2013-103 pp.21-26 |
EMM |
2014-03-07 15:00 |
Ishikawa |
JAIST |
[Poster Presentation]
A Mobile Application for Disaster Prevention Broadcasting System Based on Audio Data Hiding Yoshimasa Yamaguchi, Akihiro Oizumi, Toru Tachikawa, Tetsuya Kojima (Tokyo Natl. Coll. Tech.) EMM2013-104 |
The data hiding is a technique to protect the copyright information, avoid the illegal copies of the multimedia contents... [more] |
EMM2013-104 pp.27-32 |
EMM |
2014-03-07 15:00 |
Ishikawa |
JAIST |
[Poster Presentation]
Development of Navigation system for inside Buildings using Augumented Reality Akinori Fujimoto, Michiharu Niimi, Hideki Noda (Kyushu Inst. of Tech.) EMM2013-105 |
Many kinds of applications for smart phone or tablet terminal have been
developping.
An example of them is a navigat... [more] |
EMM2013-105 pp.33-38 |
EMM |
2014-03-07 15:00 |
Ishikawa |
JAIST |
[Poster Presentation]
Compatible 2d-code having tamper detection system with QR-code Takayuki Ishihara, Michiharu Niimi, Hideki Noda (Kyushu Inst. of Tech.) EMM2013-106 |
The matrix barcodes known as Quick Response
(QR) codes, which are enable us to import printed digital information
int... [more] |
EMM2013-106 pp.39-44 |
EMM |
2014-03-07 15:00 |
Ishikawa |
JAIST |
[Poster Presentation]
Proposal of embedding method for digital watermarking by replacing basis images Raita Kanamori, Masaki Kawamura (Yamaguchi Univ.) EMM2013-107 |
We propose embedding method for digital watermarking by replacing basis
images. Images can be represented as linear com... [more] |
EMM2013-107 pp.45-50 |
EMM |
2014-03-07 15:00 |
Ishikawa |
JAIST |
[Poster Presentation]
Prototype Implementation of Adaptive Disclosure Controls by Detecting Sensitive Data Leaks Shimon Machida (SOKENDAI), Tomoko Kajiyama (Aoyama Gakuin Univ.), Shigeru Shimada (AIIT), Isao Echizen (NII) EMM2013-108 |
By posting a message to Social Networking Service(SNS) unintentionally, the message, including personal information, is ... [more] |
EMM2013-108 pp.51-56 |
EMM |
2014-03-07 15:00 |
Ishikawa |
JAIST |
[Poster Presentation]
Study on scramble method for speech signal by using random bit shift of quantization Zhi Zhu, Katsuhiko Yamamoto, Masashi Unoki (JAIST), Naofumi Aoki (Hokkaido Univ.) EMM2013-109 |
Speech scrambling aims to eliminate the intelligibility of original speech in order to preventing eavesdropping and copy... [more] |
EMM2013-109 pp.57-62 |
EMM |
2014-03-07 15:00 |
Ishikawa |
JAIST |
[Poster Presentation]
Comparative Evaluations of Inaudible and Robust Watermarking Methods for Digital-Audio Signals Jessada Karnjana, Masashi Unoki, Shengbei Wang, Nhut Minh Ngo, Ryota Miyauchi (JAIST) EMM2013-110 |
[more] |
EMM2013-110 pp.63-68 |
EMM |
2014-03-07 15:00 |
Ishikawa |
JAIST |
[Poster Presentation]
Feasible and content protection system at the same time edit control with signature inheritance Katsuma Koga, Keiichi Iwamura, Masaki Inamura (Tokyo Univ. of Science), Isao Echizen (NII) EMM2013-111 |
In the draft, it is insufficient in the market of Ntentsu circulation technology for copyright protection of current, we... [more] |
EMM2013-111 pp.69-74 |
EMM |
2014-03-08 10:00 |
Ishikawa |
JAIST |
Digital watermarking for JPEG images using uniform color space Kenta Eguchi, Motoi Iwata, Koichi Kise (Osaka Prefecture Univ.) EMM2013-112 |
The problems for practical applications of digital watermarking are reducing the degradation in image quality by embedd... [more] |
EMM2013-112 pp.75-80 |
EMM |
2014-03-08 10:30 |
Ishikawa |
JAIST |
Performance Evaluation of Additive Watermarking under the IHC Criteria Hironobu Tozuka (Osaka Univ.), Maki Yoshida (NICT), Toru Fujiwara (Osaka Univ.) EMM2013-113 |
In this paper, the performance of additive watermarking scheme is evaluated on the criteria developed by the IEICE-ISS I... [more] |
EMM2013-113 pp.81-86 |
EMM |
2014-03-08 11:00 |
Ishikawa |
JAIST |
On Inaudibility of Cochlear-Delay-based Watermarking Method with Blind Detection Nhut M. Ngo, Masashi Unoki (JAIST) EMM2013-114 |
This paper reports an investigation on inaudibility of watermarking method based on cochlear delay. The proposed waterma... [more] |
EMM2013-114 pp.87-92 |
EMM |
2014-03-08 11:30 |
Ishikawa |
JAIST |
Simplified Tracing Algorithm of Fingerprinting Code Against Averaging Attack Minoru Kuribayashi (Kobe Univ.) EMM2013-115 |
When a binary fingerprinting codeword is embedded into digital contents using a robust spread-spectrum(SS) watermarking ... [more] |
EMM2013-115 pp.93-98 |
EMM |
2014-03-08 13:20 |
Ishikawa |
JAIST |
Mathematical Model and Evalution for Artificial Fiber Pattern Kenta Kawabata, Kitahiro Kaneda, Keiichi Iwamura (Tokyo Univ of Science), Isao Echizen (NII) EMM2013-116 |
We have proposed so called “Artificial Fiber Pattern” which enables to embed information in the background of printed ma... [more] |
EMM2013-116 pp.99-104 |
EMM |
2014-03-08 13:50 |
Ishikawa |
JAIST |
Novel proposal and evaluation of information extraction from Artificial Fiber Pattern using a camera Shunsuke Oda, Kitahiro Kaneda, Keiichi Iwamura (Tokyo Univ. of Science), Isao Echizen (NII) EMM2013-117 |
We have proposed a new information hiding method using an Artificial Fiber Pattern. Artificial Fiber pattern is integrat... [more] |
EMM2013-117 pp.105-110 |
EMM |
2014-03-08 14:20 |
Ishikawa |
JAIST |
Generating surround sound signals for headphone listening with high sense of reality by means of constrained weighted least squares Ryouichi Nishimura (NICT), Kotaro Sonoda (Nagasaki Univ.) EMM2013-118 |
Considering that people watch video clips often on mobile terminals, we propose a method for surround sound mixing. In t... [more] |
EMM2013-118 pp.111-116 |