Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 10:30 |
Hokkaido |
|
Reevaluation of Threshold Levels for Judging Complexity Boundary Using Distributions of Complexity in BPCS Steganography Technique Syouhei Harada, Seok Kang, Yuji Sakamoto (Hokkaido Univ.) ISEC2012-9 SITE2012-5 ICSS2012-11 EMM2012-1 |
In this paper, we propose a technique reducing two dispersion values of a degradation level of stego images and a embedd... [more] |
ISEC2012-9 SITE2012-5 ICSS2012-11 EMM2012-1 pp.1-8 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 10:55 |
Hokkaido |
|
Hybrid Additive-Multiplicative Watermarking for General Embedding Domains Seigo Ikeda, Maki Yoshida, Toru Fujiwara (Osaka Univ.) ISEC2012-10 SITE2012-6 ICSS2012-12 EMM2012-2 |
[more] |
ISEC2012-10 SITE2012-6 ICSS2012-12 EMM2012-2 pp.9-16 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 11:20 |
Hokkaido |
|
On Information Hiding Technologies Based on Complete Complementary Codes Tetsuya Kojima (Tokyo Natl. Coll. Tech.), Ryusuke Mayuzumi (Univ. of Electro-Comm.), Naoki Ohtani (NHK Media Tech.) ISEC2012-11 SITE2012-7 ICSS2012-13 EMM2012-3 |
Complete complemenary code (CCC) is a spread spectrum sequence family with good correlation properties. A digital waterm... [more] |
ISEC2012-11 SITE2012-7 ICSS2012-13 EMM2012-3 pp.17-22 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 13:05 |
Hokkaido |
|
A data hiding method for binary images based on a pixel block feature and position of connected component Hiroo Iwanaga, Hirohisa Hioki (Kyoto Univ.) ISEC2012-12 SITE2012-8 ICSS2012-14 EMM2012-4 |
Designing high capacity and quality-preserving data hiding methods for binary images is more difficult than for multi-va... [more] |
ISEC2012-12 SITE2012-8 ICSS2012-14 EMM2012-4 pp.23-28 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 13:30 |
Hokkaido |
|
Performance evaluation of digital watermarking model with image restoration
-- image restoration using 2D Ising model -- Masaki Kawamura (Yamaguchi Univ.), Tatsuya Uezu (Nara Women's Univ.), Masato Okada (Univ. Tokyo) ISEC2012-13 SITE2012-9 ICSS2012-15 EMM2012-5 |
We evaluate the decoding performance in the case that the prior probability is given by 2D Ising model in a spread spect... [more] |
ISEC2012-13 SITE2012-9 ICSS2012-15 EMM2012-5 pp.29-34 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 13:55 |
Hokkaido |
|
Design of a Realtime Watermarking FPGA Atsushi Katayama, Susumu Yamamoto, Shingo Ando, Ken Tsutsuguchi, Yukinobu Taniguchi (NTT) ISEC2012-14 SITE2012-10 ICSS2012-16 EMM2012-6 |
We reported watermark technique for movie which made a camera equipped cellular phone could detect watermark data in 20... [more] |
ISEC2012-14 SITE2012-10 ICSS2012-16 EMM2012-6 pp.35-42 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 14:35 |
Hokkaido |
|
A Hiding Technique of Copy-Disturbance Noises Based on Temporal Scrambling of Narrow-band Components
-- G-encoder Mark for COPY PROTECT -- Toshio Modegi, Shin'ichi Miyazaki (DNP), Goh Sekiguchi, Yuji Kosuda (DAC) ISEC2012-15 SITE2012-11 ICSS2012-17 EMM2012-7 |
We are developing a novel noise hiding technique, which can make audible copy disturbance noises embedded in the acousti... [more] |
ISEC2012-15 SITE2012-11 ICSS2012-17 EMM2012-7 pp.43-49 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 15:00 |
Hokkaido |
|
Evaluation of a Visualization System to Assess the Risk of Websites Tomoko Kajiyama (Aoyama Gakuin Univ.), Isao Echizen (NII) ISEC2012-16 SITE2012-12 ICSS2012-18 EMM2012-8 |
A prototype visualization system for helping children learn to assess website features and use them to identify risky we... [more] |
ISEC2012-16 SITE2012-12 ICSS2012-18 EMM2012-8 pp.51-57 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 15:25 |
Hokkaido |
|
Quantitative evaluation on effectiveness of privacy protection for facial images Yuta Nakashima (NAIST), Tomoaki Ikeno, Noboru Babaguchi (Osaka Univ.) ISEC2012-17 SITE2012-13 ICSS2012-19 EMM2012-9 |
Images and videos usually contain privacy sensitive information (PSI) such as faces; therefore, publishing such images a... [more] |
ISEC2012-17 SITE2012-13 ICSS2012-19 EMM2012-9 pp.59-66 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 15:50 |
Hokkaido |
|
A Possibility of Value Creation Based on Information Hiding Naofumi Aoki (Hokkaido Univ.) ISEC2012-18 SITE2012-14 ICSS2012-20 EMM2012-10 |
Discovering secret information may potentially satisfy the curiosity of consumer. This viewpoint can be a technique for ... [more] |
ISEC2012-18 SITE2012-14 ICSS2012-20 EMM2012-10 pp.67-70 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 13:05 |
Hokkaido |
|
A Study on Cybersecurity Information Discovery Mechanisms over the Internet Takeshi Takahashi, Youki Kadobayashi, Yuuki Takano (NICT) ISEC2012-19 SITE2012-15 ICSS2012-21 EMM2012-11 |
This paper prposes a scheme that links assorted structured cybersecurity information over networks and discovers them in... [more] |
ISEC2012-19 SITE2012-15 ICSS2012-21 EMM2012-11 pp.71-76 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 13:30 |
Hokkaido |
|
Identifying the Code to be Analyzed with Taint Tags Yuhei Kawakoya, Makoto Iwamura, Takeo Hariu (NTT) ISEC2012-20 SITE2012-16 ICSS2012-22 EMM2012-12 |
[more] |
ISEC2012-20 SITE2012-16 ICSS2012-22 EMM2012-12 pp.77-82 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 13:55 |
Hokkaido |
|
An Efficient Certificate Management Method for Improving Traffic Flow of Certificates in Mobile Communications Norihito Yosaka, Tomoyuki Nagase (Hirosaki Univ.) ISEC2012-21 SITE2012-17 ICSS2012-23 EMM2012-13 |
[more] |
ISEC2012-21 SITE2012-17 ICSS2012-23 EMM2012-13 pp.83-90 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 14:35 |
Hokkaido |
|
TSP Solution Based on Clustering nodes in Ad-hoc networks XIiaoji Li (DLUT), Tomoyuki Nagase (Hirosaki Uni.) ISEC2012-22 SITE2012-18 ICSS2012-24 EMM2012-14 |
[more] |
ISEC2012-22 SITE2012-18 ICSS2012-24 EMM2012-14 pp.91-96 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 15:00 |
Hokkaido |
|
A Fast Privacy-Preserving Collaborative Filtering Scheme with Transferring Statistical Value Toru Nakamura, Shinsaku Kiyomoto, Ryu Watanabe, Yutaka Miyake (KDDI R&D Labs) ISEC2012-23 SITE2012-19 ICSS2012-25 EMM2012-15 |
The goal of this study is to provide more accurate recommendation to
users with sharing user information among service ... [more] |
ISEC2012-23 SITE2012-19 ICSS2012-25 EMM2012-15 pp.97-102 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 15:25 |
Hokkaido |
|
Detecting Invalid Control Flow with Pseudo-Dispersion of Program Code Eitaro Shioji, Yuhei Kawakoya, Makoto Iwamura, Takeo Hariu (NTT) ISEC2012-24 SITE2012-20 ICSS2012-26 EMM2012-16 |
Attacks that modify the control flow of a running program by corrupting memory address pointers have been a major threat... [more] |
ISEC2012-24 SITE2012-20 ICSS2012-26 EMM2012-16 pp.103-108 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 15:50 |
Hokkaido |
|
Architecture Design for Visualizing Risks and Implementing Adequate Security Shin'ichiro Matsuo, Akira Kanaoka, Takeshi Takahashi, Shinsuke Miwa, Tadashi Minowa (NICT) ISEC2012-25 SITE2012-21 ICSS2012-27 EMM2012-17 |
[more] |
ISEC2012-25 SITE2012-21 ICSS2012-27 EMM2012-17 pp.109-114 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 16:30 |
Hokkaido |
|
[Invited Talk]
The Diversity of Color Vision and Its Applications to Communication Kazunori Asada ISEC2012-26 SITE2012-22 ICSS2012-28 EMM2012-18 |
People who have various types of color vision exist all over the world. The proportion of the distribution of congenital... [more] |
ISEC2012-26 SITE2012-22 ICSS2012-28 EMM2012-18 pp.115-120 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-20 09:00 |
Hokkaido |
|
Keystroke Authentication Using the Technique of Quality engineering Hitoshi Osaka, Koya Yano (Nihon Univ.) ISEC2012-27 SITE2012-23 ICSS2012-29 EMM2012-19 |
The personal authentication by a keystroke is the biometrics using the Characteristics of the action that imitation by a... [more] |
ISEC2012-27 SITE2012-23 ICSS2012-29 EMM2012-19 pp.121-126 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-20 09:25 |
Hokkaido |
|
Spoofing detection in biometric authentication system Tomoaki Matsunami, Ken Kamakura (Fujitsu Lab.) ISEC2012-28 SITE2012-24 ICSS2012-30 EMM2012-20 |
[more] |
ISEC2012-28 SITE2012-24 ICSS2012-30 EMM2012-20 pp.127-134 |