Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM |
2015-03-12 13:00 |
Okinawa |
|
[Invited Talk]
The structure of decentralized virtual currency and its institutional design
-- The control regulation and applied approach of the coreless currency -- Hitoshi Okada (NII) EMM2014-77 |
Bitcoin is a decentralized virtual currency based on P2P technology, which enables the unique distribution of electronic... [more] |
EMM2014-77 pp.1-6 |
EMM |
2015-03-12 14:10 |
Okinawa |
|
[Poster Presentation]
A Selective Encryption Scheme for JPEG2000 Coded Images Using ROI Yuya Nakao, Shoko Imaizumi, Naokazu Aoki, Hiroyuki Kobayashi (Chiba Univ.) EMM2014-78 |
This paper proposes a selective encryption scheme for JPEG2000 coded images using the Tile-partition function. JPEG2000 ... [more] |
EMM2014-78 pp.7-12 |
EMM |
2015-03-12 14:10 |
Okinawa |
|
[Poster Presentation]
Improvement of Multibit Information Embedding Scheme for Palette-Based Images Kazuma Motegi, Shoko Imaizumi, Naokazu Aoki, Hiroyuki Kobayashi (Chiba Univ.) EMM2014-79 |
We propose a new approach of embedding multibit information for palette-based images in this paper. The secret informati... [more] |
EMM2014-79 pp.13-17 |
EMM |
2015-03-12 14:10 |
Okinawa |
|
[Poster Presentation]
Near Lossless Data Hinding Using Sparsity of Image Histogram Ryo Oishi, Masaaki Fujiyoshi, Hitoshi Kiya (Tokyo Metro. Univ.) EMM2014-80 |
This paper proposes a near-lossless data hiding scheme for images. The proposed method first quantizes an image in accor... [more] |
EMM2014-80 pp.19-24 |
EMM |
2015-03-12 14:10 |
Okinawa |
|
[Poster Presentation]
An extension of the unitary transformation-based template protection method for biometrics and its application Yuko Saito, Ibuki Nakamura, Sayaka Shiota (Tokyo Metro. Univ.), Yoshihide Tonomura (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) EMM2014-81 |
Since biometric features are personal and irrevocable data, some schemes to protect the features (templates) extracted f... [more] |
EMM2014-81 pp.25-30 |
EMM |
2015-03-12 14:10 |
Okinawa |
|
[Poster Presentation]
A tamper detection scheme for JPEG2000 coded images using reversible data hiding Takeshi Ogasawara, Shoko Imaizumi, Naokazu Aoki, Hiroyuki Kobayashi (Chiba Univ.) EMM2014-82 |
This paper proposes an efficient tamper detection scheme for JPEG2000 coded images.
Marker codes that delimit a JPEG20... [more] |
EMM2014-82 pp.31-36 |
EMM |
2015-03-12 14:10 |
Okinawa |
|
Consideration of watermarking method embedding surrounding region of SIFT feature Kouta Uchida, Masaki Kawamura (Yamaguchi Univ.) EMM2014-83 |
We considered a watermarking method embedding surrounding regions of SIFT feature points. In digital watermarking, it is... [more] |
EMM2014-83 pp.37-42 |
EMM |
2015-03-12 14:10 |
Okinawa |
|
[Poster Presentation]
Proposal for Motegoe voice changer providing enriched speech communication
-- automatic modification of Brisk voice, thankful voice and apology voice -- Saori Yano, Michiharu Niimi, Mitsunori Mizumachi (KIT) EMM2014-84 |
This paper proposes an enriched speech communication tool, which is named as ``Motegoe voice changer.'' Modetego voice c... [more] |
EMM2014-84 pp.43-48 |
EMM |
2015-03-12 14:10 |
Okinawa |
|
Recoverable original video for mosaic system Yuichi Kusama, Hyunho Kang, Keiichi Iwamura (TUS) EMM2014-85 |
Video surveillance has been applied to many field. Specifically in the detection of suspicious activity in public- place... [more] |
EMM2014-85 pp.49-54 |
EMM |
2015-03-12 14:10 |
Okinawa |
|
A Study on Tamper Detection and Image Restoration by Embedding Similar Region Information Yuto Aomori, Kazuki Yamato, Kazuma Shinoda, Madoka Hasegawa, Shigeo Kato (Utsunomiya Univ.) EMM2014-86 |
Recently, many researchers have proposed various watermarking methods which can detect image tampering and restore tampe... [more] |
EMM2014-86 pp.55-60 |
EMM |
2015-03-12 16:00 |
Okinawa |
|
[Poster Presentation]
An Application of Error Correcting Codes for Disaster Prevention Broadcasting Using Audio Data Hiding Ryosuke Mishima, Tetsuya Kojima (NIT, Tokyo College) EMM2014-87 |
A disaster prevention broadcasting method has been proposed based on audio data hiding using complete complementary code... [more] |
EMM2014-87 pp.61-66 |
EMM |
2015-03-12 16:00 |
Okinawa |
|
[Poster Presentation]
A Fundamental Study on Watermark Design for Replication Detection of Two-Dimensional Barcodes by Coevolutionary Optimization Takeru Maehara, Kazunari Minami, Satoshi Ono (Kagoshima Univ) EMM2014-88 |
2D codes have become increasingly popular for the quick verification of items such as airplane boarding passes, train ti... [more] |
EMM2014-88 pp.67-72 |
EMM |
2015-03-12 16:00 |
Okinawa |
|
[Poster Presentation]
On the Qualities of Stego Siren Sounds for Disaster Prevention Broadcasting Using Audio Data Hiding Akihiro Oizumi, Tetsuya Kojima (NIT, Tokyo College) EMM2014-89 |
A disaster prevention broadcasting based on audio data hiding using complete complementary code has been proposed. In th... [more] |
EMM2014-89 pp.73-78 |
EMM |
2015-03-12 16:00 |
Okinawa |
|
Development of dynamical invisible watermarking embedding system for PDF document Takuya Iwamoto, Masaki Kawamura (Yamaguchi Univ.) EMM2014-90 |
We developed dynamical embedding system of invisible digitalwatermarking for PDF documents.The PDF is one of popular doc... [more] |
EMM2014-90 pp.79-84 |
EMM |
2015-03-12 16:00 |
Okinawa |
|
Relations of Compression Ratio and the Most Suitable Parameter of Additive Watermarking under the IHC Criteria Hironobu Tozuka (Osaka Univ.), Maki Yoshida (NICT), Toru Fujiwara (Osaka Univ.) EMM2014-91 |
In this paper, we show relations of the compression ratio and the optimum parameter, which maximizes the performance of ... [more] |
EMM2014-91 pp.85-90 |
EMM |
2015-03-12 16:00 |
Okinawa |
|
[Poster Presentation]
Generation Methods of Secret Sharing QR Codes Masaki Kuramoto (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Yoshimichi Ito (Osaka Electro-Communication Univ.), Noboru Babaguchi (Osaka Univ.) EMM2014-92 |
This paper proposes methods for generating a set of multiple QR codes, in which each QR code contains a share of secret ... [more] |
EMM2014-92 pp.91-96 |
EMM |
2015-03-12 16:00 |
Okinawa |
|
[Poster Presentation]
Usability Evaluation of Multi-Touch Actions Considering the Structure of Hand-Fingers and Its Constraints on Movement Kumi Nakamura (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Yoshimichi Ito (OECU), Noboru Babaguchi (Osaka Univ.) EMM2014-93 |
In this paper, we evaluate the usability of multi-touch actions, which are actions using several fingers, in order to f... [more] |
EMM2014-93 pp.97-102 |
EMM |
2015-03-12 16:00 |
Okinawa |
|
[Poster Presentation]
Proposal of an application supporting cook named Oryouri-kareshi
-- cooking action classification using audio data -- Aiko Kishino, Michiharu Niimi, Mitsunori Mizumachi (KIT) EMM2014-94 |
This paper proposes an application on smart phones which is able to provaide cooking navigation and make encourage cook,... [more] |
EMM2014-94 pp.103-108 |
EMM |
2015-03-13 09:30 |
Okinawa |
|
Fuzzy Number Input Approximate Reasoning Using Lukasiewicz t-norm Takashi Mitsuishi (UMDS) EMM2014-95 |
In this study, the fuzzy approximate reasoning using t-norm calculation is analysed.
The input of the If-THEN rules is ... [more] |
EMM2014-95 pp.109-112 |
EMM |
2015-03-13 09:55 |
Okinawa |
|
Two-dimensional coefficient histogram expansion method for reversible data hiding Kazuki Yamato, Kazuma Shinoda, Madoka Hasegawa, Shigeo Kato (Utsunomiya Univ.) EMM2014-96 |
In this paper, we propose a reversible data hiding method using a two-dimensional wavelet coefficient histogram.Firstly,... [more] |
EMM2014-96 pp.113-118 |