|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT, ISEC, WBS |
2007-03-15 16:55 |
Gunma |
Gunma Univ. (Kiryu Campus) |
Wireless Steganography by Embed Predistortion Spectrum Spread Signal in Digital Mobile Communication Takayasu Kitano, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) |
As the countermeasure for eavesdropping in wireless communication, this paper proposes a new scheme of wireless steganog... [more] |
IT2006-83 ISEC2006-138 WBS2006-80 pp.129-134 |
IT, ISEC, WBS |
2007-03-16 15:40 |
Gunma |
Gunma Univ. (Kiryu Campus) |
Information-Hiding Schemes Based on the Algorithm of gzip Satoshi Tomioka, Hiroki Koga (Univ. of Tsukuba) |
Gzip is a lossless data compression software which is often used in
UNIX operating systems.
In this paper, we propose... [more] |
IT2006-119 ISEC2006-174 WBS2006-116 pp.203-208 |
ISEC |
2006-09-13 10:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
The Real-Time Steganography Based on Audio-to-Audio Data Bit Steam Xuping Huang, Ryota Kawashima, Norihisa Segawa, Yoshihiko Abe (Iwate Pref Univ.) |
In recent years, it is common that the privacy is got by the third party in an illegal way. Steganography has focused t... [more] |
ISEC2006-74 pp.15-22 |
IT |
2006-07-27 14:20 |
Chiba |
Univ. of Tokyo |
An Information-Spectrum Approach to Steganography Isao Nakano, Hiroki Koga (Univ. Tsukuba) |
A model of information-theoretic steganography is proposed by Cachin.
In Cachin's model, covertexts are assumed to be ... [more] |
IT2006-30 pp.31-36 |
MoNA, IPSJ-MBL |
2006-05-19 10:00 |
Okinawa |
|
Privacy Protection with Customized Java Sandbox Architecture Md. Nurul Huda (SOKEN-DAI), Eiji Kamioka, Shigeki Yamada (NII) MoMuC2006-18 |
Multi-party cooperative problem solving techniques require multiple inputs from multiple participants. The participants ... [more] |
MoMuC2006-18 pp.97-102 |
ITS, IE, ITE-ME, ITE-AIT, ITE-HI |
2006-02-20 16:05 |
Hokkaido |
Hokkaido Univ. |
Information Hiding Technique Based on Morphing Technology Satoshi Kondo, Qiangfu Zhao (Aizu Univ.), Hideyuki Takagi (Kyushu Univ.) |
This paper proposes a new technique for information hiding based on morphing technology. In the proposed technique, the ... [more] |
ITS2005-72 IE2005-279 pp.145-150 |
MI |
2005-09-22 09:30 |
Overseas |
Korea Univ. Kuro Hospital |
Embedding of DICOM image based on steganography techniques Hyoungseop Kim, Ramu Ohnishi, Seiji Ishikawa (Kyushu Institute of Tech.), Shigehiko Katsuragawa (Kumamoto Univ.), Michiharu Niimi (Kyushu Institute of Tech.), Akiyoshi Yamamoto (Kyoaikai Tobata Kyoritsu Hospital) |
Recently, internet and information technology provide us high quality of life in modern life. To protect secret informat... [more] |
MI2005-36 pp.31-34 |
IE |
2005-05-12 13:50 |
Kyoto |
|
Reversible Information Hiding based on BPCS-Steganography Michiharu Niimi, Tetsuji Nakamura, Hideki Noda (KIT) |
This paper proposed a method to apply BPCS-Steganography to the
reversible information hiding that is able to complete... [more] |
IE2005-13 pp.13-18 |
IE, SIP |
2005-04-22 10:25 |
Tokyo |
|
JPEG Steganography Which Preserves Histograms of DCT Coefficients Yohsuke Tsukamizu, Hideki Noda, Michiharu Niimi (Kyushu Inst. Tech.) |
This paper presents two histogram preserving JPEG steganographic methods aiming at secure JPEG steganography against his... [more] |
SIP2005-2 IE2005-2 pp.7-12 |
IT |
2004-09-16 14:55 |
Osaka |
Osaka Sangyo Univ. |
Steganography based on the variance like a measurement of complexity segmentation Silvia Torres Maya, Brian Kurkoski, Kazuhiko Yamaguchi (Univ. of Electro-Comm.), Mariko Nakano Miyatake, RubenVazquez Medina (IPN) |
This paper presents a steganographical algorithm based on bit complexity segmentation(BPCS), which permits to implement ... [more] |
IT2004-34 pp.15-20 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|