Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 14:15 |
Hokkaido |
San-Refure Hakodate |
Evaluation of a Classification Table for Invasion of Privacy in SNSs Using Normalized Rank Method Shimon Machida (SOKENDAI), Tomoko Kajiyama (Aoyama Gakuin Univ.), Shigeru Shimada (AIIT), Isao Echizen (NII) ISEC2014-23 SITE2014-18 ICSS2014-27 EMM2014-23 |
By posting a message to Social Networking Service(SNS) unintentionally, the message, including personal information, is ... [more] |
ISEC2014-23 SITE2014-18 ICSS2014-27 EMM2014-23 pp.145-148 |
HCS, HIP, HI-SIGCOASTER [detail] |
2014-05-29 14:55 |
Okinawa |
Okinawa Industry Support Center |
Color and Symbol Extraction for Creating a Book Cover Image that Reflects Reader Impressions Mitsuhiro Makino, Tomoko Kajiyama, Noritomo Ouchi (Aoyama Gakuin Univ.), Isao Echizen (NII) HCS2014-10 HIP2014-10 |
Book cover images give users not only impressions of contents intuitively but also clues for search and browsing before ... [more] |
HCS2014-10 HIP2014-10 pp.89-94 |
EMM |
2014-03-07 15:00 |
Ishikawa |
JAIST |
[Poster Presentation]
Surveillance camera system to achieve both crime prevention and privacy protection Kento Kobayashi, Keiichi Iwamura (Tokyo Univ. of Science), Isao Echizen (NII) EMM2013-103 |
Recently, cases to be taken up for privacy and personal information has increased, but there is no rule for privacy on s... [more] |
EMM2013-103 pp.21-26 |
EMM |
2014-03-07 15:00 |
Ishikawa |
JAIST |
[Poster Presentation]
Prototype Implementation of Adaptive Disclosure Controls by Detecting Sensitive Data Leaks Shimon Machida (SOKENDAI), Tomoko Kajiyama (Aoyama Gakuin Univ.), Shigeru Shimada (AIIT), Isao Echizen (NII) EMM2013-108 |
By posting a message to Social Networking Service(SNS) unintentionally, the message, including personal information, is ... [more] |
EMM2013-108 pp.51-56 |
EMM |
2014-03-07 15:00 |
Ishikawa |
JAIST |
[Poster Presentation]
Feasible and content protection system at the same time edit control with signature inheritance Katsuma Koga, Keiichi Iwamura, Masaki Inamura (Tokyo Univ. of Science), Isao Echizen (NII) EMM2013-111 |
In the draft, it is insufficient in the market of Ntentsu circulation technology for copyright protection of current, we... [more] |
EMM2013-111 pp.69-74 |
EMM |
2014-03-08 13:20 |
Ishikawa |
JAIST |
Mathematical Model and Evalution for Artificial Fiber Pattern Kenta Kawabata, Kitahiro Kaneda, Keiichi Iwamura (Tokyo Univ of Science), Isao Echizen (NII) EMM2013-116 |
We have proposed so called “Artificial Fiber Pattern” which enables to embed information in the background of printed ma... [more] |
EMM2013-116 pp.99-104 |
EMM |
2014-03-08 13:50 |
Ishikawa |
JAIST |
Novel proposal and evaluation of information extraction from Artificial Fiber Pattern using a camera Shunsuke Oda, Kitahiro Kaneda, Keiichi Iwamura (Tokyo Univ. of Science), Isao Echizen (NII) EMM2013-117 |
We have proposed a new information hiding method using an Artificial Fiber Pattern. Artificial Fiber pattern is integrat... [more] |
EMM2013-117 pp.105-110 |
EMM, EA |
2013-11-14 14:45 |
Hiroshima |
Prefectural University of Hiroshima, Satellite Campus Hiroshima |
Novel proposal of information hiding technology and its robustness by utilizing an artificial fiber pattern for an augmented reality system Tomoki Inui, Kitahiro Kaneda, Keiichi Iwamura (Tokyo Univ. of Science), Isao Echizen (NII) EA2013-71 EMM2013-71 |
The technology behind augmented reality (Augmented Reality, AR or later) can be divided into sensor types based on the u... [more] |
EA2013-71 EMM2013-71 pp.19-24 |
IE, EMM, LOIS, IEE-CMN, ITE-ME [detail] |
2013-09-12 15:40 |
Kumamoto |
|
Access Control by Detecting Privacy Leaks on Digital Private Documents Shimon Machida (GUAS), Shigeru Shimada (AIIT), Isao Echizen (NII) LOIS2013-15 IE2013-36 EMM2013-58 |
Recently, many people are enjoying Social Networking Services using mobile devices such as Smartphones, Posting messages... [more] |
LOIS2013-15 IE2013-36 EMM2013-58 pp.31-36 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-18 13:45 |
Hokkaido |
|
Implementation and Evaluation of an error correction code suitable for the information hiding method using the single-dot method Hiroyasu Kitazawa, Kitahiro Kaneda, Keiichi Iwamura (Tokyo Univ. of Science), Isao Echizen (NII) ISEC2013-28 SITE2013-23 ICSS2013-33 EMM2013-30 |
There is no doubt that paper media is an important media in current electronic proceeded .However, studies of protection... [more] |
ISEC2013-28 SITE2013-23 ICSS2013-33 EMM2013-30 pp.205-212 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-18 14:10 |
Hokkaido |
|
Study of an artificial fiber pattern in Augmented Reality system Tomoki Inui, Kitahiro Kaneda, Keiichi Iwamura (Tokyo Univ. of Science), Isao Echizen (NII) ISEC2013-29 SITE2013-24 ICSS2013-34 EMM2013-31 |
The technology behind augmented reality (Augmented Reality, AR or later) can be divided into sensor types based on the u... [more] |
ISEC2013-29 SITE2013-24 ICSS2013-34 EMM2013-31 pp.213-220 |
HIP, HCS, HI-SIGCOASTER [detail] |
2013-05-30 10:50 |
Okinawa |
Okinawa Industry Support Center |
The relationships between product impressions and user evaluation by comparing colors of movie posters with colors extracted from reviews Yuta Yagi, Tomoko Kajiyama, Noritomo Ouchi (Aoyama Gakuin Univ.), Isao Echizen (NII) HCS2013-3 HIP2013-3 |
We have proposed a color extraction method from text with a database expressing the relationships between adjectives and... [more] |
HCS2013-3 HIP2013-3 pp.13-18 |
EMM |
2013-05-24 13:00 |
Kochi |
Kochijyo Hall |
[Tutorial Lecture]
Novel approach of information hiding for enriched media
-- Cutting-edge applications of information hiding -- Isao Echizen (NII) EMM2013-1 |
Thanks to an earnest attempt to Cyber Physical System (CPS), information hiding has a crucial role to convey information... [more] |
EMM2013-1 pp.1-5 |
EMM |
2013-05-24 14:00 |
Kochi |
Kochijyo Hall |
A Recommendation System for Anonymous Fingerprinting of Text Posted on Social Networks HoangQuoc Nguyen-Son (SOKENDAI), Hiroshi Yoshiura (Univ. of Electro-Comm.), Noboru Sonehara, Isao Echizen (NII) EMM2013-6 |
Sensitive information about a user can be disclosed by the user's Online Social Networks (OSNs) friends. This makes it u... [more] |
EMM2013-6 pp.31-36 |
EMM |
2013-01-29 13:30 |
Miyagi |
Tohoku Univ. |
Evaluation of privacy visor to prevent face recognition from camera image Takayuki Yamada (NII), Seiichi Gohshi (Kogakuin University), Isao Echizen (NII) EMM2012-92 |
A method is proposed for preventing privacy invasion through unintentional capture of facial images. Prevention methods ... [more] |
EMM2012-92 pp.7-12 |
EMM |
2013-01-29 14:00 |
Miyagi |
Tohoku Univ. |
The First Competition of Image and Video by IHC Seiichi Gohshi (Kogakuin Univ.), Minoru Kuribayashi (Kobe Univ.), Hirohisa Takeshita (Kogakuin Univ.), Isao Echizen (NII), Motoi Iwata (Osaka Prefecture Univ.), Keiichi Iwamura (Tokyo University of Science) EMM2012-93 |
[more] |
EMM2012-93 pp.13-18 |
EMM |
2013-01-29 16:00 |
Miyagi |
Tohoku Univ. |
[Panel Discussion]
Discussing the future possibility of the information processing research area through planning road map Noboru Babaguchi (Osaka Univ.), Yo-iti Suzuki (Tohoku Univ.), Isao Echizen (NII), Hirohisa Hioki (Kyoto Univ.), Naofumi Aoki (Hokkaido Univ.) EMM2012-95 |
Technical Committee on Enriched Multimedia (EMM) prepared its roadmap about the research direction in the future. Based ... [more] |
EMM2012-95 pp.25-30 |
EA, EMM |
2012-11-17 09:55 |
Oita |
OITA Univ. |
Improvement of embedding capacity and quality of reversible watermarking Ryo Sugimura, Keiichi Iwamura (TUS), Isao Echizen (NII) EA2012-98 EMM2012-80 |
Recently, a digital watermarking is proposed in the application to prevent the medical accident by embedding information... [more] |
EA2012-98 EMM2012-80 pp.99-104 |
EA, EMM |
2012-11-17 10:20 |
Oita |
OITA Univ. |
A Mosaic processing scheme for JPEG images using reversible watermarking Junya Yamazaki, Yoshio Kakizaki, Keiichi Iwamura (TUS), Isao Echizen (NII) EA2012-99 EMM2012-81 |
In a security camera, photographing images, such as a person, occurs privacy issues.We can think to hide the face with m... [more] |
EA2012-99 EMM2012-81 pp.105-110 |
EA, EMM |
2012-11-17 10:55 |
Oita |
OITA Univ. |
Evaluation of information extraction from Artificial Fiber Pattern using a camera Shunsuke Oda, Kitahiro Kaneda, Keiichi Iwamura (TUS), Isao Echizen (NII) EA2012-100 EMM2012-82 |
We have proposed a new information hiding method using an Artificial Fiber Pattern. Artificial Fiber pattern is integrat... [more] |
EA2012-100 EMM2012-82 pp.111-116 |