IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 50 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCS, NS
(Joint)
2013-12-20
09:00
Kagawa Sunport Hall Takamatsu Wireless Steganography using Spectrum Spreading Technique
Akihito Takai, Hideichi Sasaoka, Hisato Iwai (Doshisha Univ.) RCS2013-240
As the countermeasures to information tapping in wireless communications, wireless steganography technique has been prop... [more] RCS2013-240
pp.195-200
IT 2013-07-25
13:25
Tokyo Nishi-Waseda campus, Waseda University Steganography using Coding with Cost Function
Sho Gohda, Shun Watanabe, Kazuyuki Matsumoto, Minoru Yoshida, Kenji Kita (Tokushima Univ.) IT2013-12
In recent years, the techniques that make communication safety are getting important as network communication advances. ... [more] IT2013-12
pp.5-9
EMM 2013-05-25
09:00
Kochi Kochijyo Hall [Tutorial Lecture] Information Hiding for Digital Images -- Hiding message into JPEG images --
Michiharu Niimi (Kyushu Inst. of Tech.) EMM2013-9
Information hiding for digital images is a technique to embed
message into image data. The researches for information ... [more]
EMM2013-9
pp.49-54
EMM 2013-03-08
11:15
Kyoto   Reversible data hiding using linear prediction and error-expansion for audio signals
Akira Nishimura (Tokyo Univ. of Information Sciences.) EMM2012-117
Reversible data hiding is a technique where hidden data are embedded
in host data such that the consistency of the ho... [more]
EMM2012-117
pp.59-64
SIS 2013-03-07
10:00
Shizuoka Create Hamamatsu Study of image enlargement method using steganography techniques.
Yuko Ishida, Hiroshi Yasukawa (Aichi Prefectural Univ.)
Most image enlargement method are based on the estimation of frequency components from the low-resolution image.However ... [more] SIS2012-46
pp.5-10
EMM 2013-01-30
14:40
Miyagi Tohoku Univ. Evaluation on Judging Methods of Complexity Boundary in BPCS Steganography Technique
Syouhei Harada, Shingo Shimaura, Seok Kang, Yuji Sakamoto (Hokkaido Univ.) EMM2012-105
It is necessary to reduce two variance values of a degradation level of stego images and an embedding rate in steganogra... [more] EMM2012-105
pp.83-88
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
10:30
Hokkaido   Reevaluation of Threshold Levels for Judging Complexity Boundary Using Distributions of Complexity in BPCS Steganography Technique
Syouhei Harada, Seok Kang, Yuji Sakamoto (Hokkaido Univ.) ISEC2012-9 SITE2012-5 ICSS2012-11 EMM2012-1
In this paper, we propose a technique reducing two dispersion values of a degradation level of stego images and a embedd... [more] ISEC2012-9 SITE2012-5 ICSS2012-11 EMM2012-1
pp.1-8
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
11:20
Hokkaido   On Information Hiding Technologies Based on Complete Complementary Codes
Tetsuya Kojima (Tokyo Natl. Coll. Tech.), Ryusuke Mayuzumi (Univ. of Electro-Comm.), Naoki Ohtani (NHK Media Tech.) ISEC2012-11 SITE2012-7 ICSS2012-13 EMM2012-3
Complete complemenary code (CCC) is a spread spectrum sequence family with good correlation properties. A digital waterm... [more] ISEC2012-11 SITE2012-7 ICSS2012-13 EMM2012-3
pp.17-22
ITE-ME, EMM, IE, LOIS, IEE-CMN [detail] 2011-09-20
16:05
Ehime   A Reversible and Tampering Detective Steganography for Probative Acoustic Data Using Lossless Compression
Xuping Huang (SOKENDAI), Akira Nishimura (Tokyo Univ. of Information Sciences), Isao Echizen (SOKENDAI/NII) LOIS2011-22 IE2011-55 EMM2011-33
A reversible and verifiable tampering detection steganographic method is described for probative acoustic data that uses... [more] LOIS2011-22 IE2011-55 EMM2011-33
pp.41-46
EMM 2011-05-30
13:10
Tokyo National Inst. of Info. [Invited Talk] Information Hiding Using Side Information
Hideki Noda (Kyushu Inst. Tech.) EMM2011-1
In information hiding such as watermarking and steganography, most of embedding methods ignore the available information... [more] EMM2011-1
pp.1-6
ICSS 2011-03-25
13:25
Tokyo Suspended Consideration on hidden-communication channel in the Internet communication device.
Tomoki Murota (Univ. of Tokyo), Khin Thida Latt (JAIST), Katsuhiro Horiba (Keio Univ.), Hiroaki Hazeyama (NAIST), Akira Kato (Keio Univ.) ICSS2010-60
Since the Internet became the society infrastructure, it is necessary to verify the vulnerability of network equip-
men... [more]
ICSS2010-60
pp.23-28
IT 2010-01-08
13:55
Overseas Univ. of Hawaii On Properties of a Digital Watermarking Scheme Based on Complete Complementary Codes
Tetsuya Kojima, Yoshiya Horii, Naoki Ohtani, Thierno Sene (Tokyo Nat. Coll. of Tech.) IT2009-66
It has been shown that complete complementary codes can be applied into some communication systems like CDMA because of ... [more] IT2009-66
pp.81-86
CS 2009-11-06
10:55
Hokkaido Hokkaido Shikotsuko Lossless Steganography Techniques for IP Telephony Speech
Naofumi Aoki (Hokkaido Univ.) CS2009-53
This study investigates lossless steganography techniques for IP telephony speech. Exploiting the redundancy of the fold... [more] CS2009-53
pp.65-70
AP 2009-09-04
15:15
Aomori Hachinohe Inst. of Tech. A Study on Signal Hiding in Secret Communication System Using Multi-Antenna Transmission
Takayasu Kitano, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.)
As a communication hiding scheme for wireless systems, we have proposed wireless steganography in which the secret infor... [more] AP2009-101
pp.125-130
IT 2009-07-23
14:45
Osaka Kwansei Gakuin Univ. (Umeda campus) Robust Audio Data Hiding Based on Information Dispersal in Wavelet Domain
Sandra Hernandez-Garay (National Polytechnic Inst.), Raul Martinez-Noriega (Univ. of Electro-Comm.), Ruben Vazquez-Medina (National Polytechnic Inst.), Kazuhiko Yamaguchi (Univ. of Electro-Comm.) IT2009-13
The proposed scheme is based on the use of information dispersal for guarantee security, and the manipulation of the coe... [more] IT2009-13
pp.43-48
SIS 2009-03-05
11:20
Tokyo   High Capacity Data Embedding Method for Palette-Based Images
Go Tanaka, Noriaki Suetake (Yamaguchi Univ.), Eiji Uchino (Yamaguchi Univ/Fazzy Logic Systems Inst.)
As one of the steganographic methods for palette-based images, there is the method which has been proposed by J. Fridric... [more] SIS2008-73
pp.13-16
EA 2008-08-05
11:15
Miyagi   Performance evaluation of the system for displaying Karaoke lyrics using audio watermark
Akira Nishimura (TUIS), Shinichi Sakamoto (Otodesigners) EA2008-59
A watermarking technique based on amplitude modulation was applied
to a system that displays Karaoke lyrics synchrono... [more]
EA2008-59
pp.83-88
NLP 2008-02-01
09:20
Hokkaido   A Lossless Steganography Technique for Speech Codec Based on Nonlinear Quantization
Naofumi Aoki (Hokkaido Univ.) NLP2007-141
This study proposes a technique of lossless steganography for G.711, the most common codec for digital speech communicat... [more] NLP2007-141
pp.1-4
IE, IPSJ-AVM, CS, ITE-BCT 2007-12-13
12:30
Aichi Nagoya Univ. On the relations of parameters in the steganography by the discrete cosine transformed images
Minoru Watanabe, Akira Hayashi (KIT) CS2007-30 IE2007-113
Performance of steganography using discrete cosine transformed images depends on various factors and parameters. We inve... [more] CS2007-30 IE2007-113
pp.1-5
CAS, SIP, VLD 2007-06-22
15:30
Hokkaido Hokkaido Tokai Univ. (Sapporo) A Study on Lossless Steganography for G.711
Naofumi Aoki (Hokkaido Univ.) CAS2007-33 VLD2007-49 SIP2007-63
This study proposes a technique of lossless steganography for G.711, the most common codec for digital speech communicat... [more] CAS2007-33 VLD2007-49 SIP2007-63
pp.85-87
 Results 21 - 40 of 50 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan