IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Enriched MultiMedia (EMM)  (Searched in: 2017)

Search Results: Keywords 'from:2017-05-22 to:2017-05-22'

[Go to Official EMM Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 16 of 16  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM, IT 2017-05-22
13:00
Yamagata Yamagata University(Yonezawa Campus) A Data Embedding Method based on the JavaScript Encoder jjencode
Hirohisa Hioki, Takayuki Matsushita (Kyoto Univ.) IT2017-1 EMM2017-1
We have been implemented a data hiding method for JavaScript programs based on an obfuscator called jjencode. We can emb... [more] IT2017-1 EMM2017-1
pp.1-6
EMM, IT 2017-05-22
13:25
Yamagata Yamagata University(Yonezawa Campus) Digital watermark detection method based on feature point matching using RANSAC algorithm
Yo Kitaoka, Kazuhiko Yamaguchi (UEC) IT2017-2 EMM2017-2
The geometrical attack easily remove watermark data for the still image. We miss the synchronization of embedding positi... [more] IT2017-2 EMM2017-2
pp.7-12
EMM, IT 2017-05-22
14:05
Yamagata Yamagata University(Yonezawa Campus) Watermarking Scheme with Large Capacity Considering the Internal Structure of PDF File
Takuya Fukushima, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) IT2017-3 EMM2017-3
PDF files are popular format of digital documents that can be displayed on digital devices such as PC, tablet, and smart... [more] IT2017-3 EMM2017-3
pp.13-18
EMM, IT 2017-05-22
14:30
Yamagata Yamagata University(Yonezawa Campus) A Proposal of Fingerprinting System for Protection of Sensitive Data from Internal Leakage
Takahiro Ueda, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) IT2017-4 EMM2017-4
Due to the development of electrical system in organizations such as companies and government, the sensitive data such ... [more] IT2017-4 EMM2017-4
pp.19-24
EMM, IT 2017-05-22
15:10
Yamagata Yamagata University(Yonezawa Campus) An Application of Universal FV Codes to Source Coding Allowing Errors
Shigeaki Kuzuoka (Wakayama Univ.) IT2017-5 EMM2017-5
 [more] IT2017-5 EMM2017-5
pp.25-30
EMM, IT 2017-05-22
15:35
Yamagata Yamagata University(Yonezawa Campus) Introduction to Anharmonic Fourier Series
Tetsuo Sakai (DRL) IT2017-6 EMM2017-6
Abstract To obtain a flow of heat (temperature) Fourier introduced the Fourier series as a solution of the diffusion equ... [more] IT2017-6 EMM2017-6
pp.31-36
EMM, IT 2017-05-22
16:00
Yamagata Yamagata University(Yonezawa Campus) Higher Order Differential Property of Few
Naoki Shibayama (Japan Air Self-Defense Force), Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science) IT2017-7 EMM2017-7
Few is a 64-bit block cipher proposed by Manoj et.al in 2014. The designer evaluated its strength against differential c... [more] IT2017-7 EMM2017-7
pp.37-42
EMM, IT 2017-05-22
16:40
Yamagata Yamagata University(Yonezawa Campus) [Invited Talk] Frontier of intelligent information processing -- - Sparse modeling vs Deep learning - --
Masayuki Ohzeki (Tohoku Univ.)
 [more]
EMM, IT 2017-05-23
10:00
Yamagata Yamagata University(Yonezawa Campus) Detection of anti-forensics by elimination and disguise of electrical network frequency in audio recordings
Akira Nishimura (Tokyo Univ. Info. Sci.) IT2017-8 EMM2017-8
he electrical network frequency (ENF) criterion is used to address
digital audio authentication. The ENF fluctuates i... [more]
IT2017-8 EMM2017-8
pp.43-48
EMM, IT 2017-05-23
10:25
Yamagata Yamagata University(Yonezawa Campus) On a wind noise countermeasure for bicycle Augmented Reality Audio systems
Toya Kitagawa, Kazuhiro Kondo (Yamagata Univ) IT2017-9 EMM2017-9
We propose a speech navigation system using augmented acoustic reality for bicycle. For that, an audio presentation devi... [more] IT2017-9 EMM2017-9
pp.49-54
EMM, IT 2017-05-23
10:50
Yamagata Yamagata University(Yonezawa Campus) A speech Manipulation Detection Method using Speech Fingerprinting and Watermark
Shinnya Takahashi, Kazuhiro Kondo (Yamagata Univ.) IT2017-10 EMM2017-10
 [more] IT2017-10 EMM2017-10
pp.55-59
EMM, IT 2017-05-23
11:30
Yamagata Yamagata University(Yonezawa Campus) Digital signature type QR code with personal identification function
Ken-ichi Sakina (QR Tech.) IT2017-11 EMM2017-11
In this study, we propose a digital signature type QR code (DSQR code) that incorporates an elliptic curve digital signa... [more] IT2017-11 EMM2017-11
pp.61-66
EMM, IT 2017-05-23
11:55
Yamagata Yamagata University(Yonezawa Campus) Investigation on the Effect of Error Correction by RS Code on Pattern Masking of Double Encoded Two-dimensional Code
Nobuyuki Teraura (TCRI), Keiichi Iwamura (TUS), Isao Echizen (NII), Kouichi Sakurai (kyushu Univ.) IT2017-12 EMM2017-12
The black cell of a two dimensional code is coded in normal black ink (infrared absorption) and special black ink (infra... [more] IT2017-12 EMM2017-12
pp.67-72
EMM, IT 2017-05-23
14:00
Yamagata Yamagata University(Yonezawa Campus) Construction of Parallel RIO Codes using Coset Coding with Hamming Codes
Akira Yamawaki, Hiroshi Kamabe, Shan Lu (Gifu Univ.) IT2017-13 EMM2017-13
Random I/O (RIO) code is a coding scheme that enables to read one logical page using a single read threshold in multilev... [more] IT2017-13 EMM2017-13
pp.73-78
EMM, IT 2017-05-23
14:25
Yamagata Yamagata University(Yonezawa Campus) A Dynamic Programming Algorithm to Construct Optimal Code Trees of Binary AIFV-m Codes
Takaya Kawai, Ken-ichi Iwata (Univ. of Fukui), Hirosuke Yamamoto (The Univ. of Tokyo) IT2017-14 EMM2017-14
Yamamoto, Tsuchihashi, and Honda proposed binary almost instantaneous fixed-to-variable length (AIFV) codes, which allow... [more] IT2017-14 EMM2017-14
pp.79-84
EMM, IT 2017-05-23
14:50
Yamagata Yamagata University(Yonezawa Campus) A Construction of a Progressive (3,n)-Threshold Visual Cryptography Scheme Using a BIBD and Its Optimality
Koutaro Okada, Hiroki Koga (Univ. of Tsukuba) IT2017-15 EMM2017-15
In the $(t,n)$-threshold visual cryptography scheme ($(t,n)$-VCS for short), a secret black-white image is encoded to $n... [more] IT2017-15 EMM2017-15
pp.85-90
 Results 1 - 16 of 16  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan