Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, IT |
2017-05-22 13:00 |
Yamagata |
Yamagata University(Yonezawa Campus) |
A Data Embedding Method based on the JavaScript Encoder jjencode Hirohisa Hioki, Takayuki Matsushita (Kyoto Univ.) IT2017-1 EMM2017-1 |
We have been implemented a data hiding method for JavaScript programs based on an obfuscator called jjencode. We can emb... [more] |
IT2017-1 EMM2017-1 pp.1-6 |
EMM, IT |
2017-05-22 13:25 |
Yamagata |
Yamagata University(Yonezawa Campus) |
Digital watermark detection method based on feature point matching using RANSAC algorithm Yo Kitaoka, Kazuhiko Yamaguchi (UEC) IT2017-2 EMM2017-2 |
The geometrical attack easily remove watermark data for the still image. We miss the synchronization of embedding positi... [more] |
IT2017-2 EMM2017-2 pp.7-12 |
EMM, IT |
2017-05-22 14:05 |
Yamagata |
Yamagata University(Yonezawa Campus) |
Watermarking Scheme with Large Capacity Considering the Internal Structure of PDF File Takuya Fukushima, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) IT2017-3 EMM2017-3 |
PDF files are popular format of digital documents that can be displayed on digital devices such as PC, tablet, and smart... [more] |
IT2017-3 EMM2017-3 pp.13-18 |
EMM, IT |
2017-05-22 14:30 |
Yamagata |
Yamagata University(Yonezawa Campus) |
A Proposal of Fingerprinting System for Protection of Sensitive Data from Internal Leakage Takahiro Ueda, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) IT2017-4 EMM2017-4 |
Due to the development of electrical system in organizations such as companies and government, the sensitive data such ... [more] |
IT2017-4 EMM2017-4 pp.19-24 |
EMM, IT |
2017-05-22 15:10 |
Yamagata |
Yamagata University(Yonezawa Campus) |
An Application of Universal FV Codes to Source Coding Allowing Errors Shigeaki Kuzuoka (Wakayama Univ.) IT2017-5 EMM2017-5 |
[more] |
IT2017-5 EMM2017-5 pp.25-30 |
EMM, IT |
2017-05-22 15:35 |
Yamagata |
Yamagata University(Yonezawa Campus) |
Introduction to Anharmonic Fourier Series Tetsuo Sakai (DRL) IT2017-6 EMM2017-6 |
Abstract To obtain a flow of heat (temperature) Fourier introduced the Fourier series as a solution of the diffusion equ... [more] |
IT2017-6 EMM2017-6 pp.31-36 |
EMM, IT |
2017-05-22 16:00 |
Yamagata |
Yamagata University(Yonezawa Campus) |
Higher Order Differential Property of Few Naoki Shibayama (Japan Air Self-Defense Force), Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science) IT2017-7 EMM2017-7 |
Few is a 64-bit block cipher proposed by Manoj et.al in 2014. The designer evaluated its strength against differential c... [more] |
IT2017-7 EMM2017-7 pp.37-42 |
EMM, IT |
2017-05-22 16:40 |
Yamagata |
Yamagata University(Yonezawa Campus) |
[Invited Talk]
Frontier of intelligent information processing
-- - Sparse modeling vs Deep learning - -- Masayuki Ohzeki (Tohoku Univ.) |
[more] |
|
EMM, IT |
2017-05-23 10:00 |
Yamagata |
Yamagata University(Yonezawa Campus) |
Detection of anti-forensics by elimination and disguise of electrical network frequency in audio recordings Akira Nishimura (Tokyo Univ. Info. Sci.) IT2017-8 EMM2017-8 |
he electrical network frequency (ENF) criterion is used to address
digital audio authentication. The ENF fluctuates i... [more] |
IT2017-8 EMM2017-8 pp.43-48 |
EMM, IT |
2017-05-23 10:25 |
Yamagata |
Yamagata University(Yonezawa Campus) |
On a wind noise countermeasure for bicycle Augmented Reality Audio systems Toya Kitagawa, Kazuhiro Kondo (Yamagata Univ) IT2017-9 EMM2017-9 |
We propose a speech navigation system using augmented acoustic reality for bicycle. For that, an audio presentation devi... [more] |
IT2017-9 EMM2017-9 pp.49-54 |
EMM, IT |
2017-05-23 10:50 |
Yamagata |
Yamagata University(Yonezawa Campus) |
A speech Manipulation Detection Method using Speech Fingerprinting and Watermark Shinnya Takahashi, Kazuhiro Kondo (Yamagata Univ.) IT2017-10 EMM2017-10 |
[more] |
IT2017-10 EMM2017-10 pp.55-59 |
EMM, IT |
2017-05-23 11:30 |
Yamagata |
Yamagata University(Yonezawa Campus) |
Digital signature type QR code with personal identification function Ken-ichi Sakina (QR Tech.) IT2017-11 EMM2017-11 |
In this study, we propose a digital signature type QR code (DSQR code) that incorporates an elliptic curve digital signa... [more] |
IT2017-11 EMM2017-11 pp.61-66 |
EMM, IT |
2017-05-23 11:55 |
Yamagata |
Yamagata University(Yonezawa Campus) |
Investigation on the Effect of Error Correction by RS Code on Pattern Masking of Double Encoded Two-dimensional Code Nobuyuki Teraura (TCRI), Keiichi Iwamura (TUS), Isao Echizen (NII), Kouichi Sakurai (kyushu Univ.) IT2017-12 EMM2017-12 |
The black cell of a two dimensional code is coded in normal black ink (infrared absorption) and special black ink (infra... [more] |
IT2017-12 EMM2017-12 pp.67-72 |
EMM, IT |
2017-05-23 14:00 |
Yamagata |
Yamagata University(Yonezawa Campus) |
Construction of Parallel RIO Codes using Coset Coding with Hamming Codes Akira Yamawaki, Hiroshi Kamabe, Shan Lu (Gifu Univ.) IT2017-13 EMM2017-13 |
Random I/O (RIO) code is a coding scheme that enables to read one logical page using a single read threshold in multilev... [more] |
IT2017-13 EMM2017-13 pp.73-78 |
EMM, IT |
2017-05-23 14:25 |
Yamagata |
Yamagata University(Yonezawa Campus) |
A Dynamic Programming Algorithm to Construct Optimal Code Trees of Binary AIFV-m Codes Takaya Kawai, Ken-ichi Iwata (Univ. of Fukui), Hirosuke Yamamoto (The Univ. of Tokyo) IT2017-14 EMM2017-14 |
Yamamoto, Tsuchihashi, and Honda proposed binary almost instantaneous fixed-to-variable length (AIFV) codes, which allow... [more] |
IT2017-14 EMM2017-14 pp.79-84 |
EMM, IT |
2017-05-23 14:50 |
Yamagata |
Yamagata University(Yonezawa Campus) |
A Construction of a Progressive (3,n)-Threshold Visual Cryptography Scheme Using a BIBD and Its Optimality Koutaro Okada, Hiroki Koga (Univ. of Tsukuba) IT2017-15 EMM2017-15 |
In the $(t,n)$-threshold visual cryptography scheme ($(t,n)$-VCS for short), a secret black-white image is encoded to $n... [more] |
IT2017-15 EMM2017-15 pp.85-90 |