Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, SITE, IPSJ-IOT [detail] |
2024-03-13 14:05 |
Okinawa |
Miyakojima City Future Creation Center (Primary: On-site, Secondary: Online) |
Perceptual Hashing Based on CNN Node Responses Yusei Sugawara, Kaito Hosono, Tetsuya Morizumi, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2023-101 IA2023-107 |
As technology advances, unauthorized duplication of images has become a serious issue related to copyright infringement.... [more] |
SITE2023-101 IA2023-107 pp.203-210 |
ICSS |
2023-11-17 15:25 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Secure Iris Recognition with Linear Hashing Mitsuhide Tenryaku (Chiba Univ.) ICSS2023-68 |
Biometrics represents one of the most robust methods for securing individual information. Due to its high accuracy, the ... [more] |
ICSS2023-68 pp.120-125 |
IA, ICSS |
2023-06-21 09:30 |
Saga |
Saga Univ. (Primary: On-site, Secondary: Online) |
A Precise Approach of Software Vulnerability Detection Using Set Similarity Calculation Algorithm Reika Arakawa, Yo Kanemoto, Eitaro Shioji, Mitsuaki Akiyama (NTT) IA2023-7 ICSS2023-7 |
(To be available after the conference date) [more] |
IA2023-7 ICSS2023-7 pp.32-39 |
IA, SITE, IPSJ-IOT [detail] |
2023-03-16 15:35 |
Gunma |
Maebashi Institute of Technology (Primary: On-site, Secondary: Online) |
Model compression by pruning of CNN based on perceptual hashes Shota Mishina, Tetsuya Morizumi, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2022-59 IA2022-82 |
Message digests that identify images are indispensable for secure and convenient copyright management of digital content... [more] |
SITE2022-59 IA2022-82 pp.28-34 |
SIP, BioX, IE, MI, ITE-IST, ITE-ME [detail] |
2022-05-20 14:00 |
Kumamoto |
Kumamoto University Kurokami Campus (Primary: On-site, Secondary: Online) |
Hadamard-Coded Supervised Discrete Hashing on Quaternion Domain Manabu Sueyasu (The Univ. Kitakyushu), Seisuke Kyochi (Kogakuin Univ.), Gou Koutaki (Kumamoto Univ.) SIP2022-23 BioX2022-23 IE2022-23 MI2022-23 |
This paper extends Hadamard-coded supervised discrete hashing on real domain (termed as $mathbb{R}$-HCSDH) using a real-... [more] |
SIP2022-23 BioX2022-23 IE2022-23 MI2022-23 pp.117-122 |
PRMU |
2020-09-02 16:15 |
Online |
Online |
Pseudo Perfect Coding for Discrete Cross-modal Hashing Yusuke Masuda, Gou Koutaki (Kumamoto Univ.) PRMU2020-16 |
Recently, cross-modal hashing has attracted attention in the field of image processing.
Compressing data which have di... [more] |
PRMU2020-16 pp.53-57 |
IN, IA (Joint) |
2019-12-19 14:25 |
Hiroshima |
Satellite Campus Hiroshima |
An experimental analysis of LoRa transmission using Long-term measurement data Takuya Takahashi, Kazuya Suzuki (Akita Prefectural Univ.) IA2019-48 |
In recent years, a wireless communication technology called LPWA has emerged and started to be used for the use case of ... [more] |
IA2019-48 pp.1-5 |
SITE |
2019-12-06 14:15 |
Kanagawa |
|
A Scheme of Digital Copyright Management System Based on Blockchain and Digital Watermarking
-- Research on Improvement Method of Perceptual Hashing based on Machine Learning -- Zhaoxiong Meng, Tetsuya Morizumi (KU), Sumiko Miyata (SIT), Hirotsugu Kinoshita (KU) SITE2019-83 |
In this study, in order to search for a new digital content copyright management method that achieves both safety and co... [more] |
SITE2019-83 pp.21-27 |
SANE |
2019-11-01 10:40 |
Overseas |
KOREA (Jeju) |
Aircraft Image Classification using Perceptual Hashing Riku Noguchi, Makoto Tanaka (Tokai Univ.) SANE2019-64 |
In this paper, we propose new method of aircraft classification using perceptual hashing. Many studies have been conduct... [more] |
SANE2019-64 pp.83-85 |
SIP, EA, SP, MI (Joint) [detail] |
2018-03-20 10:40 |
Okinawa |
|
[Invited Talk]
Progress of Research on Cross-modal Scene Analysis Kunio Kashino (NTT) EA2017-166 SIP2017-175 SP2017-149 |
The problem of scene analysis means to understand, or describe, various external objects or events associated with spati... [more] |
EA2017-166 SIP2017-175 SP2017-149 p.353 |
SS |
2018-03-07 12:00 |
Okinawa |
|
A Determination Method of Locality Sensitive Hashing Parameters for Code Clone Detection Shogo Tokui (Osaka Univ.), Norihiro Yoshida (Nagoya Univ.), Eunjong Choi (NAIST), Katsuro Inoue (Osaka Univ.) SS2017-74 |
LSH (Locality-Sensitive Hashing) is a near neighbor search algorithm that performs probabilistic hashing of high-dimensi... [more] |
SS2017-74 pp.57-62 |
NS, IN (Joint) |
2018-03-02 13:10 |
Miyazaki |
Phoenix Seagaia Resort |
Query Routing Method and its Performance Evaluation in Distributed Key-Value Stores using OpenFlow Switches Yosuke Shimajiri, Taiju Mikoshi, Katunori Oyama, Toshihiro Nishizono (Nihon Univ) NS2017-221 |
We have proposed a scheme to improve data retrieval performance of distributed key value stores by using OpenFlow switch... [more] |
NS2017-221 pp.301-304 |
PRMU, IE, MI, SIP |
2017-05-26 11:30 |
Aichi |
|
Improvement of LLAH by high-speed character area estimation in captured document image
-- Fast estimation of characters and noise and image normalization -- Kohei Miyamoto, Masakazu Iwamura, Koichi Kise (Osaka Pref. Univ.) SIP2017-23 IE2017-23 PRMU2017-23 MI2017-23 |
(To be available after the conference date) [more] |
SIP2017-23 IE2017-23 PRMU2017-23 MI2017-23 pp.119-124 |
IE, ITE-ME, ITE-AIT [detail] |
2016-10-06 11:00 |
Fukuoka |
|
The Proposal of Encoding Marker using Local Feature for Posture Estimation Norimasa Kobori (Toyota), Daisuke Deguchi, Ichiro Ide, Hiroshi Murase (Nagoya) IE2016-65 |
The proposed marker has the following three aspects, (i) the marker is easy-to-find under a cluttered background (ii) th... [more] |
IE2016-65 pp.1-5 |
NS |
2015-10-16 09:25 |
Akita |
Akita Univ. |
The Performance Simulation of Effective Load Rebalancing on Distributed Servers
-- NetroSphere: Towards the Transformation of Carrier Networks -- Atsushi Toyama (NTT) NS2015-104 |
Situations that calculation is difficult to settle or recalculation is necessary are caused by conventional methods in l... [more] |
NS2015-104 pp.89-92 |
IT |
2015-09-04 10:15 |
Ishikawa |
Hakusan Shobutei |
Nested Lattice Hashing Scheme for Similarity Search Applications Thanh Xuan Nguyen, Ricardo Antonio Parrao Hernandez, Brian Michael Kurkoski (JAIST) IT2015-37 |
This research targets improving similarity search efficiency using a nested lattice hashing scheme. Similarity search ha... [more] |
IT2015-37 pp.19-24 |
NS, IN (Joint) |
2015-03-03 13:00 |
Okinawa |
Okinawa Convention Center |
Implementation of Data Access Function for Distributed Key-Value Stores Using OpenFlow Switches Hiroyuki Sugimura, Katsunori Oyama, Toshihiro Nishizono (Nihon Univ) NS2014-245 |
This paper proposes implementation of data access functions for distributed key-value store based on consistent hashing.... [more] |
NS2014-245 pp.397-402 |
CAS |
2015-01-30 10:25 |
Tokyo |
Tokyo Metropolitan University (Akihabara Satellite Campus) |
Fast Search Method of Isomorphic Polygons Using Geometric Invariant Feature Value
-- Polygon Search Method Applying Geometric Hashing -- Shuji Shoji (Yamagata Univ.), Hiroaki Yamamoto (Shinshu Univ.), Akio Koyama (Yamagata Univ.) CAS2014-113 |
A large number of isomorphic polygons are included in design data of large scale integrated circuit. Fast searching and ... [more] |
CAS2014-113 pp.43-48 |
ICD, CPSY |
2014-12-01 15:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Poster Presentation]
A Scalable Hardware Architecture of Locality-Sesitive Hashing for similarity Search Tsunaki Sadahisa, Kasho Yamamoto, Dahoo Kim, Eric S. Fukuda, Tetsuya Asai, Masato Motomura (Hokkaido Univ.) ICD2014-83 CPSY2014-95 |
Locality-Sensitive Hashing (LSH) is a hash function that projects similar data into memory closely. In similarity search... [more] |
ICD2014-83 CPSY2014-95 p.45 |
IT |
2014-05-16 09:50 |
Oita |
Beppu International Convention Center |
Efficiency Tricks for Hashing and Blooming in Streaming Algorithms Marat Zhanikeev (Kyushu Inst. of Tech.) IT2014-1 |
Streaming algorithms, also known as data streaming, are a realtime/online alternative to offline processing of data stor... [more] |
IT2014-1 pp.1-4 |