Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EA, EMM, ASJ-H |
2022-11-22 13:00 |
Online |
Online |
[Fellow Memorial Lecture]
Security and Privacy Preservation for Speech Signal
-- Approach from speech information hiding technology -- Masashi Unoki (JAIST) EA2022-60 EMM2022-60 |
Non-authentic but skillfully fabricated artificial replicas of authentic media in the real world are known as “media clo... [more] |
EA2022-60 EMM2022-60 pp.99-104 |
EMM |
2022-03-07 15:55 |
Online |
(Primary: Online, Secondary: On-site) (Primary: Online, Secondary: On-site) |
[Poster Presentation]
Video Forgery Detection Using a Robust Hashing Algorithm Shoko Niwa, Miki Tanaka, Hitoshi Kiya (Tokyo Metro. Univ.) EMM2021-102 |
In this paper, we propose a method to detect the editing of video signals using a robust hashing algorithm. The assumed ... [more] |
EMM2021-102 pp.58-63 |
EMM, EA, ASJ-H |
2021-11-15 09:00 |
Online |
Online |
[Poster Presentation]
Speech Manipulation Detection Method Using Audio Watermarking
-- Frame Synchronization Method -- Kota Muroi, Kazuhiro Kondo (Yamagata Univ.) EA2021-33 EMM2021-60 |
The tampering detection method using digital watermarking in interrogation audio has a problem that many false positives... [more] |
EA2021-33 EMM2021-60 pp.37-42 |
EMM |
2021-03-04 14:45 |
Online |
Online |
[Poster Presentation]
Improvement of Video Forgery Detection Using Generative Adversarial Networks Yutaro Osako (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Noboru Babaguchi (Osaka Univ.) EMM2020-72 |
Our work aims to detect tampered objects in the spatial domain of videos with high accuracy. We target videos, including... [more] |
EMM2020-72 pp.28-33 |
SIS, ITE-BCT |
2020-10-01 13:20 |
Online |
Online |
Robustness Evaluation of Detectinon methods for Image manipulation with GANs Miki Tanaka, Hitoshi Kiya (Tokyo Metropolitan Univ.) SIS2020-14 |
Recent rapid advances in image manipulation tools and deep image synthesis techniques, such as Generative Adversarial Ne... [more] |
SIS2020-14 pp.23-28 |
ISEC |
2020-05-20 13:30 |
Online |
Online |
[Invited Talk]
Almost Optimal Cheating-Detectable (2,2,n) Ramp Secret Sharing Scheme (from CANDAR 2019) Tomoki Agematsu (NEC), Satoshi Obana (Hosei univ) ISEC2020-6 |
In this research, we consider a strong ramp secret sharing scheme (SSS for short) that can detect cheating. A cheating-d... [more] |
ISEC2020-6 p.27 |
IE, IMQ, MVE, CQ (Joint) [detail] |
2020-03-06 14:25 |
Fukuoka |
Kyushu Institute of Technology (Cancelled but technical report was issued) |
Image Tampering Detection and Self-Recovery by Using Robust Digital Watermark against JPEG Compression Shuhei Ohara, Masayuki Kurosaki, Ochi Hiroshi (Kyutech) IMQ2019-38 IE2019-120 MVE2019-59 |
Recently, with the tremendous diffuser of smartphones, the SNS users rate has increased to 74.7 %
in 2018. Users can ea... [more] |
IMQ2019-38 IE2019-120 MVE2019-59 pp.115-120 |
EMM |
2020-03-05 16:45 |
Okinawa |
(Cancelled but technical report was issued) |
[Poster Presentation]
Detection of Video Alterations using Machine Learning with High-Frequency Features Hiroki Ueda (Tokyo Univ. of Sci.), Hyunho Kang (NIT, Tokyo College), Keiichi Iwamura (Tokyo Univ. of Sci.) EMM2019-120 |
Recently, security cameras have been installed in various places such as the lobby of a building, an urban area, and a d... [more] |
EMM2019-120 pp.97-100 |
EMM |
2020-03-05 16:45 |
Okinawa |
(Cancelled but technical report was issued) |
[Poster Presentation]
Video Forgery Detection Using Generative Adversarial Networks Shoken Ohshiro (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Noboru Babaguchi (Osaka Univ.) EMM2019-122 |
The purpose of our work is to detect the regions of tampered objects in the spatial domain of videos by passive approach... [more] |
EMM2019-122 pp.107-112 |
CS, CQ (Joint) |
2019-04-18 09:20 |
Osaka |
Osaka Univ. Library |
Dynamic Redundancy Switching Method of Network Paths for Tamper-Tolerant Networked Control Kento Aida, Kenta Yamada, Ryosuke Hotchi, Ryogo Kubo (Keio Univ.) CS2019-1 |
According to the growing of information and communication technology (ICT), various kinds of things are connected to the... [more] |
CS2019-1 pp.1-6 |
EMM |
2019-03-13 15:15 |
Okinawa |
TBD |
[Poster Presentation]
A Consideration on Spatio-Temporal Feature Learning for Video Forgery Detection Shoken Ohshiro (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Noboru Babaguchi (Osaka Univ.) EMM2018-104 |
The purpose of our work is to detect objects tampered in the spatial domain of videos including dynamic scenes such as a... [more] |
EMM2018-104 pp.67-72 |
IT, ISEC, WBS |
2019-03-07 14:30 |
Tokyo |
University of Electro-Communications |
A Study on the System of Detecting Falsification for Conference Records Using Echo Spread Method and Octave Similarity Shoya Ogaki (Univ. Kitakyushu), Shunsuke Araki (Kyutech), Takeru Miyazaki, Satoshi Uehara (Univ. Kitakyushu), Yasuyuki Nogami (Okayama Univ.) IT2018-84 ISEC2018-90 WBS2018-85 |
In this paper, we propose strengthen the robustness against tampering of audio data for conference recording using audio... [more] |
IT2018-84 ISEC2018-90 WBS2018-85 pp.57-64 |
IN, NS (Joint) |
2019-03-05 09:40 |
Okinawa |
Okinawa Convention Center |
Tampering Detection Method for Video Using Semi-fragile Digital Watermarking Junya Yamamoto, Masaki Bandai (Sophia Univ.) NS2018-239 |
In this paper, we propose a tampering detection method for video using semi-fragile digital watermarking. In the convent... [more] |
NS2018-239 pp.273-276 |
EA, ASJ-H, EMM, IPSJ-MUS [detail] |
2018-11-21 13:30 |
Ishikawa |
Hotel Koshuen |
[Poster Presentation]
Video Forgery Detection Using Spatio-Temporal Convolutional Neural Network Shoken Ohshiro (Osaka Univ), Kazuhiro Kono (Kainsai Univ), Noboru Babaguchi (Osaka Univ) EA2018-71 EMM2018-71 |
It is easy to tamper with videos due to the improvement of video editing technology.We need to develop forgery detection... [more] |
EA2018-71 EMM2018-71 pp.49-52 |
ISEC |
2018-09-07 11:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries Ryo Kikuchi (NTT) ISEC2018-54 |
In this invited talk, we introduce the paper ``Fast Large-Scale Honest-Majority MPC for Malicious Adversaries'' by Koji ... [more] |
ISEC2018-54 p.25 |
EMM |
2018-03-05 14:35 |
Kagoshima |
Naze Community Center (Amami-Shi, Kagoshima) |
[Poster Presentation]
Video Forgery Detection Considering Spatio-Temporal Consistency Takaaki Yoshida (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Noboru Babaguchi (Osaka Univ.) EMM2017-81 |
This paper proposes a video forgery detection method in dynamic scenes such as dynamic background or dynamic perspective... [more] |
EMM2017-81 pp.23-28 |
CQ (2nd) |
2017-08-26 15:00 |
Saitama |
Nippon Institute of Technology |
[Poster Presentation]
Tamper detection method based on histogram shift of audio data Yuya Nakayama, Masanori Kimoto (NIT) |
Digital audio watermark is a technique for hiding information in audio data so that it cannot be recognized by humans.Au... [more] |
|
SIS |
2017-06-02 10:40 |
Oita |
Housen-Sou (Beppu) |
Scalable Copyright Protection using Lossless Information Hiding Koichi Araki, Tsubasa Sonezaki, Masayuki Kurosaki, Hiroshi Ochi (Kyutech) SIS2017-14 |
This paper proposes a copyright protection method based on lossless information hiding which realizes resolution scalabi... [more] |
SIS2017-14 pp.71-76 |
CQ |
2016-08-29 13:55 |
Ibaraki |
Tsukubasan |
Impact Assessment of Tamper Signal Characteristics in Secure Control Systems with Tamper Detection Observer Jin Hoshino, Hitoshi Kojima, Takahiro Funakoshi, Ryusuke Imai, Ryogo Kubo (Keio Univ.) CQ2016-55 |
Today, networked control systems (NCSs) have become popular in many areas of studies, due to the growth of information a... [more] |
CQ2016-55 pp.39-44 |
EMM |
2016-03-02 14:30 |
Kagoshima |
Yakushima Environ. and Cultural Vill. Center |
[Poster Presentation]
Video Forgery Detection Using a Time Series Model in Dynamic Scenes Shigeki Karita (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Noboru Babaguchi (Osaka Univ.) EMM2015-80 |
This paper proposes a robust video forgery detection method in dynamic scenes such as dynamic background or camera jitte... [more] |
EMM2015-80 pp.25-30 |