IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Enriched MultiMedia (EMM)  (Searched in: 2014)

Search Results: Keywords 'from:2015-03-12 to:2015-03-12'

[Go to Official EMM Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 20 of 26  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM 2015-03-12
13:00
Okinawa   [Invited Talk] The structure of decentralized virtual currency and its institutional design -- The control regulation and applied approach of the coreless currency --
Hitoshi Okada (NII) EMM2014-77
Bitcoin is a decentralized virtual currency based on P2P technology, which enables the unique distribution of electronic... [more] EMM2014-77
pp.1-6
EMM 2015-03-12
14:10
Okinawa   [Poster Presentation] A Selective Encryption Scheme for JPEG2000 Coded Images Using ROI
Yuya Nakao, Shoko Imaizumi, Naokazu Aoki, Hiroyuki Kobayashi (Chiba Univ.) EMM2014-78
This paper proposes a selective encryption scheme for JPEG2000 coded images using the Tile-partition function. JPEG2000 ... [more] EMM2014-78
pp.7-12
EMM 2015-03-12
14:10
Okinawa   [Poster Presentation] Improvement of Multibit Information Embedding Scheme for Palette-Based Images
Kazuma Motegi, Shoko Imaizumi, Naokazu Aoki, Hiroyuki Kobayashi (Chiba Univ.) EMM2014-79
We propose a new approach of embedding multibit information for palette-based images in this paper. The secret informati... [more] EMM2014-79
pp.13-17
EMM 2015-03-12
14:10
Okinawa   [Poster Presentation] Near Lossless Data Hinding Using Sparsity of Image Histogram
Ryo Oishi, Masaaki Fujiyoshi, Hitoshi Kiya (Tokyo Metro. Univ.) EMM2014-80
This paper proposes a near-lossless data hiding scheme for images. The proposed method first quantizes an image in accor... [more] EMM2014-80
pp.19-24
EMM 2015-03-12
14:10
Okinawa   [Poster Presentation] An extension of the unitary transformation-based template protection method for biometrics and its application
Yuko Saito, Ibuki Nakamura, Sayaka Shiota (Tokyo Metro. Univ.), Yoshihide Tonomura (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) EMM2014-81
Since biometric features are personal and irrevocable data, some schemes to protect the features (templates) extracted f... [more] EMM2014-81
pp.25-30
EMM 2015-03-12
14:10
Okinawa   [Poster Presentation] A tamper detection scheme for JPEG2000 coded images using reversible data hiding
Takeshi Ogasawara, Shoko Imaizumi, Naokazu Aoki, Hiroyuki Kobayashi (Chiba Univ.) EMM2014-82
This paper proposes an efficient tamper detection scheme for JPEG2000 coded images.
Marker codes that delimit a JPEG20... [more]
EMM2014-82
pp.31-36
EMM 2015-03-12
14:10
Okinawa   Consideration of watermarking method embedding surrounding region of SIFT feature
Kouta Uchida, Masaki Kawamura (Yamaguchi Univ.) EMM2014-83
We considered a watermarking method embedding surrounding regions of SIFT feature points. In digital watermarking, it is... [more] EMM2014-83
pp.37-42
EMM 2015-03-12
14:10
Okinawa   [Poster Presentation] Proposal for Motegoe voice changer providing enriched speech communication -- automatic modification of Brisk voice, thankful voice and apology voice --
Saori Yano, Michiharu Niimi, Mitsunori Mizumachi (KIT) EMM2014-84
This paper proposes an enriched speech communication tool, which is named as ``Motegoe voice changer.'' Modetego voice c... [more] EMM2014-84
pp.43-48
EMM 2015-03-12
14:10
Okinawa   Recoverable original video for mosaic system
Yuichi Kusama, Hyunho Kang, Keiichi Iwamura (TUS) EMM2014-85
Video surveillance has been applied to many field. Specifically in the detection of suspicious activity in public- place... [more] EMM2014-85
pp.49-54
EMM 2015-03-12
14:10
Okinawa   A Study on Tamper Detection and Image Restoration by Embedding Similar Region Information
Yuto Aomori, Kazuki Yamato, Kazuma Shinoda, Madoka Hasegawa, Shigeo Kato (Utsunomiya Univ.) EMM2014-86
Recently, many researchers have proposed various watermarking methods which can detect image tampering and restore tampe... [more] EMM2014-86
pp.55-60
EMM 2015-03-12
16:00
Okinawa   [Poster Presentation] An Application of Error Correcting Codes for Disaster Prevention Broadcasting Using Audio Data Hiding
Ryosuke Mishima, Tetsuya Kojima (NIT, Tokyo College) EMM2014-87
A disaster prevention broadcasting method has been proposed based on audio data hiding using complete complementary code... [more] EMM2014-87
pp.61-66
EMM 2015-03-12
16:00
Okinawa   [Poster Presentation] A Fundamental Study on Watermark Design for Replication Detection of Two-Dimensional Barcodes by Coevolutionary Optimization
Takeru Maehara, Kazunari Minami, Satoshi Ono (Kagoshima Univ) EMM2014-88
2D codes have become increasingly popular for the quick verification of items such as airplane boarding passes, train ti... [more] EMM2014-88
pp.67-72
EMM 2015-03-12
16:00
Okinawa   [Poster Presentation] On the Qualities of Stego Siren Sounds for Disaster Prevention Broadcasting Using Audio Data Hiding
Akihiro Oizumi, Tetsuya Kojima (NIT, Tokyo College) EMM2014-89
A disaster prevention broadcasting based on audio data hiding using complete complementary code has been proposed. In th... [more] EMM2014-89
pp.73-78
EMM 2015-03-12
16:00
Okinawa   Development of dynamical invisible watermarking embedding system for PDF document
Takuya Iwamoto, Masaki Kawamura (Yamaguchi Univ.) EMM2014-90
We developed dynamical embedding system of invisible digitalwatermarking for PDF documents.The PDF is one of popular doc... [more] EMM2014-90
pp.79-84
EMM 2015-03-12
16:00
Okinawa   Relations of Compression Ratio and the Most Suitable Parameter of Additive Watermarking under the IHC Criteria
Hironobu Tozuka (Osaka Univ.), Maki Yoshida (NICT), Toru Fujiwara (Osaka Univ.) EMM2014-91
In this paper, we show relations of the compression ratio and the optimum parameter, which maximizes the performance of ... [more] EMM2014-91
pp.85-90
EMM 2015-03-12
16:00
Okinawa   [Poster Presentation] Generation Methods of Secret Sharing QR Codes
Masaki Kuramoto (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Yoshimichi Ito (Osaka Electro-Communication Univ.), Noboru Babaguchi (Osaka Univ.) EMM2014-92
This paper proposes methods for generating a set of multiple QR codes, in which each QR code contains a share of secret ... [more] EMM2014-92
pp.91-96
EMM 2015-03-12
16:00
Okinawa   [Poster Presentation] Usability Evaluation of Multi-Touch Actions Considering the Structure of Hand-Fingers and Its Constraints on Movement
Kumi Nakamura (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Yoshimichi Ito (OECU), Noboru Babaguchi (Osaka Univ.) EMM2014-93
In this paper, we evaluate the usability of multi-touch actions, which are actions using several fingers, in order to f... [more] EMM2014-93
pp.97-102
EMM 2015-03-12
16:00
Okinawa   [Poster Presentation] Proposal of an application supporting cook named Oryouri-kareshi -- cooking action classification using audio data --
Aiko Kishino, Michiharu Niimi, Mitsunori Mizumachi (KIT) EMM2014-94
This paper proposes an application on smart phones which is able to provaide cooking navigation and make encourage cook,... [more] EMM2014-94
pp.103-108
EMM 2015-03-13
09:30
Okinawa   Fuzzy Number Input Approximate Reasoning Using Lukasiewicz t-norm
Takashi Mitsuishi (UMDS) EMM2014-95
In this study, the fuzzy approximate reasoning using t-norm calculation is analysed.
The input of the If-THEN rules is ... [more]
EMM2014-95
pp.109-112
EMM 2015-03-13
09:55
Okinawa   Two-dimensional coefficient histogram expansion method for reversible data hiding
Kazuki Yamato, Kazuma Shinoda, Madoka Hasegawa, Shigeo Kato (Utsunomiya Univ.) EMM2014-96
In this paper, we propose a reversible data hiding method using a two-dimensional wavelet coefficient histogram.Firstly,... [more] EMM2014-96
pp.113-118
 Results 1 - 20 of 26  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan