Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCS, NS (Joint) |
2013-12-20 09:00 |
Kagawa |
Sunport Hall Takamatsu |
Wireless Steganography using Spectrum Spreading Technique Akihito Takai, Hideichi Sasaoka, Hisato Iwai (Doshisha Univ.) RCS2013-240 |
As the countermeasures to information tapping in wireless communications, wireless steganography technique has been prop... [more] |
RCS2013-240 pp.195-200 |
IT |
2013-07-25 13:25 |
Tokyo |
Nishi-Waseda campus, Waseda University |
Steganography using Coding with Cost Function Sho Gohda, Shun Watanabe, Kazuyuki Matsumoto, Minoru Yoshida, Kenji Kita (Tokushima Univ.) IT2013-12 |
In recent years, the techniques that make communication safety are getting important as network communication advances. ... [more] |
IT2013-12 pp.5-9 |
EMM |
2013-05-25 09:00 |
Kochi |
Kochijyo Hall |
[Tutorial Lecture]
Information Hiding for Digital Images
-- Hiding message into JPEG images -- Michiharu Niimi (Kyushu Inst. of Tech.) EMM2013-9 |
Information hiding for digital images is a technique to embed
message into image data. The researches for information ... [more] |
EMM2013-9 pp.49-54 |
EMM |
2013-03-08 11:15 |
Kyoto |
|
Reversible data hiding using linear prediction and error-expansion for audio signals Akira Nishimura (Tokyo Univ. of Information Sciences.) EMM2012-117 |
Reversible data hiding is a technique where hidden data are embedded
in host data such that the consistency of the ho... [more] |
EMM2012-117 pp.59-64 |
SIS |
2013-03-07 10:00 |
Shizuoka |
Create Hamamatsu |
Study of image enlargement method using steganography techniques. Yuko Ishida, Hiroshi Yasukawa (Aichi Prefectural Univ.) |
Most image enlargement method are based on the estimation of frequency components from the low-resolution image.However ... [more] |
SIS2012-46 pp.5-10 |
EMM |
2013-01-30 14:40 |
Miyagi |
Tohoku Univ. |
Evaluation on Judging Methods of Complexity Boundary in BPCS Steganography Technique Syouhei Harada, Shingo Shimaura, Seok Kang, Yuji Sakamoto (Hokkaido Univ.) EMM2012-105 |
It is necessary to reduce two variance values of a degradation level of stego images and an embedding rate in steganogra... [more] |
EMM2012-105 pp.83-88 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 10:30 |
Hokkaido |
|
Reevaluation of Threshold Levels for Judging Complexity Boundary Using Distributions of Complexity in BPCS Steganography Technique Syouhei Harada, Seok Kang, Yuji Sakamoto (Hokkaido Univ.) ISEC2012-9 SITE2012-5 ICSS2012-11 EMM2012-1 |
In this paper, we propose a technique reducing two dispersion values of a degradation level of stego images and a embedd... [more] |
ISEC2012-9 SITE2012-5 ICSS2012-11 EMM2012-1 pp.1-8 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 11:20 |
Hokkaido |
|
On Information Hiding Technologies Based on Complete Complementary Codes Tetsuya Kojima (Tokyo Natl. Coll. Tech.), Ryusuke Mayuzumi (Univ. of Electro-Comm.), Naoki Ohtani (NHK Media Tech.) ISEC2012-11 SITE2012-7 ICSS2012-13 EMM2012-3 |
Complete complemenary code (CCC) is a spread spectrum sequence family with good correlation properties. A digital waterm... [more] |
ISEC2012-11 SITE2012-7 ICSS2012-13 EMM2012-3 pp.17-22 |
ITE-ME, EMM, IE, LOIS, IEE-CMN [detail] |
2011-09-20 16:05 |
Ehime |
|
A Reversible and Tampering Detective Steganography for Probative Acoustic Data Using Lossless Compression Xuping Huang (SOKENDAI), Akira Nishimura (Tokyo Univ. of Information Sciences), Isao Echizen (SOKENDAI/NII) LOIS2011-22 IE2011-55 EMM2011-33 |
A reversible and verifiable tampering detection steganographic method is described for probative acoustic data that uses... [more] |
LOIS2011-22 IE2011-55 EMM2011-33 pp.41-46 |
EMM |
2011-05-30 13:10 |
Tokyo |
National Inst. of Info. |
[Invited Talk]
Information Hiding Using Side Information Hideki Noda (Kyushu Inst. Tech.) EMM2011-1 |
In information hiding such as watermarking and steganography, most of embedding methods ignore the available information... [more] |
EMM2011-1 pp.1-6 |
ICSS |
2011-03-25 13:25 |
Tokyo |
Suspended |
Consideration on hidden-communication channel in the Internet communication device. Tomoki Murota (Univ. of Tokyo), Khin Thida Latt (JAIST), Katsuhiro Horiba (Keio Univ.), Hiroaki Hazeyama (NAIST), Akira Kato (Keio Univ.) ICSS2010-60 |
Since the Internet became the society infrastructure, it is necessary to verify the vulnerability of network equip-
men... [more] |
ICSS2010-60 pp.23-28 |
IT |
2010-01-08 13:55 |
Overseas |
Univ. of Hawaii |
On Properties of a Digital Watermarking Scheme Based on Complete Complementary Codes Tetsuya Kojima, Yoshiya Horii, Naoki Ohtani, Thierno Sene (Tokyo Nat. Coll. of Tech.) IT2009-66 |
It has been shown that complete complementary codes can be applied into some communication systems like CDMA because of ... [more] |
IT2009-66 pp.81-86 |
CS |
2009-11-06 10:55 |
Hokkaido |
Hokkaido Shikotsuko |
Lossless Steganography Techniques for IP Telephony Speech Naofumi Aoki (Hokkaido Univ.) CS2009-53 |
This study investigates lossless steganography techniques for IP telephony speech. Exploiting the redundancy of the fold... [more] |
CS2009-53 pp.65-70 |
AP |
2009-09-04 15:15 |
Aomori |
Hachinohe Inst. of Tech. |
A Study on Signal Hiding in Secret Communication System Using Multi-Antenna Transmission Takayasu Kitano, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) |
As a communication hiding scheme for wireless systems, we have proposed wireless steganography in which the secret infor... [more] |
AP2009-101 pp.125-130 |
IT |
2009-07-23 14:45 |
Osaka |
Kwansei Gakuin Univ. (Umeda campus) |
Robust Audio Data Hiding Based on Information Dispersal in Wavelet Domain Sandra Hernandez-Garay (National Polytechnic Inst.), Raul Martinez-Noriega (Univ. of Electro-Comm.), Ruben Vazquez-Medina (National Polytechnic Inst.), Kazuhiko Yamaguchi (Univ. of Electro-Comm.) IT2009-13 |
The proposed scheme is based on the use of information dispersal for guarantee security, and the manipulation of the coe... [more] |
IT2009-13 pp.43-48 |
SIS |
2009-03-05 11:20 |
Tokyo |
|
High Capacity Data Embedding Method for Palette-Based Images Go Tanaka, Noriaki Suetake (Yamaguchi Univ.), Eiji Uchino (Yamaguchi Univ/Fazzy Logic Systems Inst.) |
As one of the steganographic methods for palette-based images, there is the method which has been proposed by J. Fridric... [more] |
SIS2008-73 pp.13-16 |
EA |
2008-08-05 11:15 |
Miyagi |
|
Performance evaluation of the system for displaying Karaoke lyrics using audio watermark Akira Nishimura (TUIS), Shinichi Sakamoto (Otodesigners) EA2008-59 |
A watermarking technique based on amplitude modulation was applied
to a system that displays Karaoke lyrics synchrono... [more] |
EA2008-59 pp.83-88 |
NLP |
2008-02-01 09:20 |
Hokkaido |
|
A Lossless Steganography Technique for Speech Codec Based on Nonlinear Quantization Naofumi Aoki (Hokkaido Univ.) NLP2007-141 |
This study proposes a technique of lossless steganography for G.711, the most common codec for digital speech communicat... [more] |
NLP2007-141 pp.1-4 |
IE, IPSJ-AVM, CS, ITE-BCT |
2007-12-13 12:30 |
Aichi |
Nagoya Univ. |
On the relations of parameters in the steganography by the discrete cosine transformed images Minoru Watanabe, Akira Hayashi (KIT) CS2007-30 IE2007-113 |
Performance of steganography using discrete cosine transformed images depends on various factors and parameters. We inve... [more] |
CS2007-30 IE2007-113 pp.1-5 |
CAS, SIP, VLD |
2007-06-22 15:30 |
Hokkaido |
Hokkaido Tokai Univ. (Sapporo) |
A Study on Lossless Steganography for G.711 Naofumi Aoki (Hokkaido Univ.) CAS2007-33 VLD2007-49 SIP2007-63 |
This study proposes a technique of lossless steganography for G.711, the most common codec for digital speech communicat... [more] |
CAS2007-33 VLD2007-49 SIP2007-63 pp.85-87 |