Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, SITE, IPSJ-IOT [detail] |
2024-03-13 14:05 |
Okinawa |
Miyakojima City Future Creation Center (Primary: On-site, Secondary: Online) |
Perceptual Hashing Based on CNN Node Responses Yusei Sugawara, Kaito Hosono, Tetsuya Morizumi, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2023-101 IA2023-107 |
As technology advances, unauthorized duplication of images has become a serious issue related to copyright infringement.... [more] |
SITE2023-101 IA2023-107 pp.203-210 |
IA, SITE, IPSJ-IOT [detail] |
2023-03-16 15:35 |
Gunma |
Maebashi Institute of Technology (Primary: On-site, Secondary: Online) |
Model compression by pruning of CNN based on perceptual hashes Shota Mishina, Tetsuya Morizumi, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2022-59 IA2022-82 |
Message digests that identify images are indispensable for secure and convenient copyright management of digital content... [more] |
SITE2022-59 IA2022-82 pp.28-34 |
SITE |
2019-12-06 13:00 |
Kanagawa |
|
Analysis of an intermediate layer for perceptual hashing using a convolutional neural network Ken Nakatani, Meng Zhaoxiong, Tetsuya Morizumi, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2019-80 |
This research aims to improve the digital watermark technology that embeds evidence information by using content redunda... [more] |
SITE2019-80 pp.1-6 |
EA, EMM |
2015-11-13 10:00 |
Kumamoto |
Kumamoto Univ. |
Robust detection to frequency-scale modification for audio watermarking based on amplitude modulation Akira Nishimura (Tokyo Univ. Info. Sci.) EA2015-32 EMM2015-53 |
An audio watermarking system based on amplitude modulation (AM) is tested under the evaluation criteria proposed by the ... [more] |
EA2015-32 EMM2015-53 pp.47-52 |
IE, EMM, LOIS, IEE-CMN, ITE-ME [detail] |
2014-09-18 16:30 |
Kochi |
|
Reversible and robust audio watermarking based on spread spectrum and amplitude expansion in the integer-MDCT domain Akira Nishimura (Tokyo Univ. of Information Sciences) LOIS2014-22 IE2014-35 EMM2014-52 |
The present study proposes a novel reversible and robust technique
for hiding data in audio. It is perfectly reversib... [more] |
LOIS2014-22 IE2014-35 EMM2014-52 pp.47-52 |
NS, IN (Joint) |
2012-03-09 12:00 |
Miyazaki |
Miyazaki Seagia |
An Application of Content Management on Named Data Networking Kei Kusunoki, Yoshihiro Kawahara, Tohru Asami (Tokyo Univ.) IN2011-183 |
Named Data Networking (NDN) designed for a large scale content
distribution has a similar problem like P2P, i.e. diffic... [more] |
IN2011-183 pp.275-280 |
SITE, IPSJ-EIP |
2008-05-30 14:25 |
Tochigi |
Utsunomiya University |
[Invited Talk]
Derivative work management for video sharing archive based on persistent usage scenario association technology Tadashi Nakanishi (NTT) |
'Curated Consumption' infrastructure prototyping and its evaluation for video sharing archive content based on persisten... [more] |
SITE2008-4 pp.17-24 |
ISEC |
2007-12-19 10:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Integration Method of Incomplete Cryptographic System and Spread Spectrum Encoder Ta Minh Thanh, Munetoshi Iwakiri (NDA) ISEC2007-115 |
Digital contents can be copied without degradation, so that problems of illegal distribution of contents occur. Digital ... [more] |
ISEC2007-115 pp.19-24 |
ISEC |
2007-12-19 11:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Applied Method of AES algorithm to Incomplete Cryptographic System. Ta Minh Thanh, Munetoshi Iwakiri (NDA) ISEC2007-116 |
This report proposes a Digital Rights Management (DRM) technique with an applied method of AES algorithm to incomplete c... [more] |
ISEC2007-116 pp.25-31 |
SITE, IPSJ-EIP |
2007-05-25 16:55 |
Tokyo |
|
[Invited Talk]
Analysis and Future of Digital Rights Management Technology
-- Governance of Digital Society: Toward the Harmonization of Technology and Society -- Noboru Sonehara, Hitoshi Okada, Katsuya Watanabe (NII) SITE2007-9 |
e-Japan strategy has accelerated up realization of a digital society. The digital society ideals revolve around the high... [more] |
SITE2007-9 pp.47-54 |
RECONF |
2006-09-15 14:45 |
Kumamoto |
Kumamoto Univ. |
Content protection system based on partial reconfiguration of FPGA Hiroyuki Yokoyama (KDDI Labs.), Yohei Hori, Kenji Toda (AIST) |
We study the content protection system based on partial reconfiguration of FPGA. The key component is the hardware secur... [more] |
RECONF2006-34 pp.43-48 |
RECONF, CPSY, VLD, IPSJ-SLDM |
2006-01-17 13:00 |
Kanagawa |
|
Implimentation of high speed audiofingerprint system using FPGAs Hisashi Isonaga, Yasushi Inoguchi (JAIST) |
In recent year illegal music distribution via network with the file exchange software in recent years becomes a serious ... [more] |
VLD2005-88 CPSY2005-44 RECONF2005-77 pp.1-6 |