IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
... (for ESS/CS/ES/ISS)
Tech. Rep. Archives
... (for ES/CS)
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 141件中 21~40件目 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
NC, IBISML, IPSJ-BIO, IPSJ-MPS [detail] 2018-06-13
16:15
Okinawa Okinawa Institute of Science and Technology Decoding Covert Spatial Attention using Privacy-preserving Sparse Coding
Takayuki Nakachi, Hiroyuki Ishihara (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) NC2018-8
Brain-machine interface (BMI) has attracted much attention not only in biomedical engineering fields but also in ICT hum... [more] NC2018-8
pp.15-20
SIS, IPSJ-AVM, ITE-3DIT [detail] 2018-06-07
10:00
Hokkaido Jozankei View Hotel SVM Computing Using EtC Images in the Encrypted Domain
Ayana Kawamura, Takahiro Maekawa, Yuma Kinoshita, Hitoshi Kiya (Tokyo Metro. Univ.) SIS2018-1
In this paper, we propose a SVM computing scheme with EtC images, and evaluate the effectiveness of the proposed scheme,... [more] SIS2018-1
pp.1-6
SIS, IPSJ-AVM, ITE-3DIT [detail] 2018-06-07
10:20
Hokkaido Jozankei View Hotel Secure Computation of Sparse Coding for Privacy Protection
Takayuki Nakachi (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) SIS2018-2
Sparse coding represents observed signals effectively as a linear combination of a small number of bases which are chose... [more] SIS2018-2
pp.7-12
SIP, EA, SP, MI
(Joint) [detail]
2018-03-19
13:00
Okinawa   [Poster Presentation] Speaker verification based on non-linear bandwidth extension considering aliasing artifacts for super-wideband applications
Haruna Miyamoto, Sayaka Shiota, Hitoshi Kiya (Tokyo Metropolitan Univ.) EA2017-110 SIP2017-119 SP2017-93
This paper has two aims that are to propose a novel bandwidth extension (BWE) method considering aliasing artifacts, and... [more] EA2017-110 SIP2017-119 SP2017-93
pp.51-55
SIP, EA, SP, MI
(Joint) [detail]
2018-03-19
13:00
Okinawa   [Poster Presentation] Text-dependent voice liveness detection based on pop-noise detector considering speaker-dependent phoneme information for speaker verification
Shihono Mochizuki, Sayaka Shiota, Hitoshi Kiya (Tokyo Metropolitan Univ.) EA2017-111 SIP2017-120 SP2017-94
This paper proposes a pop-noise (PN) detection method considering speaker-dependent phoneme information for text-depende... [more] EA2017-111 SIP2017-120 SP2017-94
pp.57-62
SIP, EA, SP, MI
(Joint) [detail]
2018-03-19
15:10
Okinawa   A Multi-Exposure Image Fusion Scheme based on Automatic Exposure Compensation
Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya (Tokyo Metro. Univ.) EA2017-136 SIP2017-145 SP2017-119
This paper proposes a novel luminance adjustment method based on automatic exposure compensation for multi-exposure imag... [more] EA2017-136 SIP2017-145 SP2017-119
pp.191-196
EMM 2018-03-05
14:35
Kagoshima Naze Community Center (Amami-Shi, Kagoshima) [Poster Presentation] A Block-Permutation-Based Image Encryption Allowing Hierarchical Decryption
Yusuke Izawa, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metro. Univ.) EMM2017-77
This paper proposes a permutation-based image encryption scheme, which allows decrypting only a particular area in the e... [more] EMM2017-77
pp.1-6
EMM 2018-03-06
13:00
Kagoshima Naze Community Center (Amami-Shi, Kagoshima) A Generation Scheme of Encrypted JPEG Images with Unchanged File Sizes in the Bitstream Domain
Hiroyuki Kobayashi (Tokyo Metro. College of Industrial Tech.), Hitoshi Kiya (Tokyo Metro. Univ.) EMM2017-91
 [more] EMM2017-91
pp.73-77
ITS, IE, ITE-MMS, ITE-HI, ITE-ME, ITE-AIT [detail] 2018-02-16
11:00
Hokkaido Hokkaido Univ. Image contrast enhancement based on noise aware shadow-up function
Chiencheng Chien, Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya (Tokyo Metro. Univ.) ITS2017-81 IE2017-113
This paper proposes a novel image contrast enhancement method based on a noise aware shadow-up
function. Images taken b... [more]
ITS2017-81 IE2017-113
pp.245-250
ITS, IE, ITE-MMS, ITE-HI, ITE-ME, ITE-AIT [detail] 2018-02-16
11:15
Hokkaido Hokkaido Univ. High quality image generation in high dynamic scenes from dual-ISO sensor readout
Chihiro Go, Chien Chiencheng, Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya (Tokyo Metro. Univ.) ITS2017-82 IE2017-114
 [more] ITS2017-82 IE2017-114
pp.251-256
SIS, IPSJ-AVM 2017-10-12
13:00
Nara Todaiji Culture Center Effect of Contrast Enhancement in Tone Mapping Operation for HDR images
Ayumi Sada, Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya (Tokyo Metro. Univ.) SIS2017-21
This paper proposes a new tone mapping operation for HDR images with
biased intensity distribution. In conventional to... [more]
SIS2017-21
pp.1-6
SIS, IPSJ-AVM 2017-10-12
13:20
Nara Todaiji Culture Center A JPEG-Friendly Image Encryption Scheme
Ayana Kawamura, Tatsuya Chuman, Kenta Iida, Hitoshi Kiya (Tokyo Metropolitan Univ.) SIS2017-22
Conventional secure image transmission systems are based on Compression-then-Encryption systems, where image encryption ... [more] SIS2017-22
pp.7-12
SIS, IPSJ-AVM 2017-10-12
15:00
Nara Todaiji Culture Center Avoiding checkerboard artifact in convolutional neural networks including upsampling layers
Yusuke Sugawara, Sayaka Shiota, Hitoshi Kiya (Tokyo Metro. Univ.) SIS2017-25
 [more] SIS2017-25
pp.23-28
EMM, IE, LOIS, IEE-CMN, ITE-ME [detail] 2017-09-04
13:00
Kyoto Kyoto Univ. (Clock Tower Centennial Hall) Image Manipulation Analysis on Social Networking Service for Encryption-then-Compression Systems
Tatsuya Chuman, Kenta Iida, Hitoshi Kiya (Tokyo Metro. Univ.) LOIS2017-13 IE2017-34 EMM2017-42
Encryption-then-Compression (EtC) systems have been proposed to securely transmit images through an untrusted channel pr... [more] LOIS2017-13 IE2017-34 EMM2017-42
pp.1-6
EMM, IE, LOIS, IEE-CMN, ITE-ME [detail] 2017-09-04
13:25
Kyoto Kyoto Univ. (Clock Tower Centennial Hall) An Image Identification Scheme for Double-Compressed JPEG Images and Its Application to SNSs
Kenta Iida, Tatsuya Chuman, Hitoshi Kiya (Tokyo Metropolitan Univ.) LOIS2017-14 IE2017-35 EMM2017-43
 [more] LOIS2017-14 IE2017-35 EMM2017-43
pp.7-12
EMM, IE, LOIS, IEE-CMN, ITE-ME [detail] 2017-09-04
13:50
Kyoto Kyoto Univ. (Clock Tower Centennial Hall) Privacy-preserving SVM processing by using random unitary transformation
Takahiro Maekawa, Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya (Tokyo Metro.Univ.) LOIS2017-15 IE2017-36 EMM2017-44
In this paper,we propose a privacy-preserving SVM processing method with templates protected by using a random unitary t... [more] LOIS2017-15 IE2017-36 EMM2017-44
pp.13-18
SP 2017-08-30
11:00
Kyoto Kyoto Univ. [Poster Presentation] Nonlinear artificial bandwidth extension and filter design for i-vector based speaker verification
Ryota Kaminishi, Sayaka shiota, Hitoshi kiya (Tokyo Metro. Univ.) SP2017-25
 [more] SP2017-25
pp.29-32
IE 2017-06-29
13:45
Okinawa   Pseudo Multi-Exposure Image Fusion Based on a Single Image
Yuma Kinoshita (Tokyo Metro. Univ.), Taichi Yoshida (Nagaoka Univ. of Tech.), Sayaka Shiota, Hitoshi Kiya (Tokyo Metro. Univ.) IE2017-26
This paper proposes a novel pseudo multi-exposure image fusion based on a single image.Multi-exposure image fusion is a ... [more] IE2017-26
pp.7-12
EMM 2017-03-06
15:40
Okinawa Miyakojima Marin Terminal Building (Okinawa) [Poster Presentation] A Permutation-Based Image Encryption Scheme with Resistance against Some Attacks and Its Key Management
Takeshi Ogasawara, Shoko Imaizumi (Chiba Univ), Hitoshi Kiya (TMU) EMM2016-91
This paper proposes a permutation-based image encryption scheme that improves resistance against brute force attacks and... [more] EMM2016-91
pp.31-36
IE, ITS, ITE-AIT, ITE-HI, ITE-ME, ITE-MMS, ITE-CE [detail] 2017-02-20
10:15
Hokkaido Hokkaido Univ. Privacy Protection in Social Networking Services based on an Encryption-then-Compression System for the JPEG Standard
Takahiro Maekawa, Kenta Kurihara, Hitoshi Kiya (Tokyo Metro.Univ.) ITS2016-43 IE2016-101
Conventional secure image transmision is based on a Compression-then-Encryption system where image compression has to be... [more] ITS2016-43 IE2016-101
pp.7-12
 141件中 21~40件目 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (No. 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan