Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
CCS |
2024-03-27 16:50 |
Hokkaido |
RUSUTSU RESORT |
JPEG Compression Quality Setting Considering Image Quality and Information Loss for Correlated Steganography Mariiko Aikawa, Sumiko Miyata (SIT), Kaito Hosono, Hirotsugu Kinoshita (KU) CCS2023-50 |
As more and more confidential information, including personal information, is transmitted and received over the Internet... [more] |
CCS2023-50 pp.64-69 |
EMM |
2024-03-02 14:00 |
Overseas |
Day1:JEJU TECHNOPARK, Day2:JEJU Business Agency |
[Poster Presentation]
Improved Ultimate Link without markers for projective transformation Keiji Yamadera, Michiharu Niimi (KIT) EMM2023-90 |
We propose a method that links character string having a certain semantic meaning on papers in real world to the digital... [more] |
EMM2023-90 pp.7-12 |
EMM |
2023-01-26 14:00 |
Miyagi |
Tohoku Univ. (Primary: On-site, Secondary: Online) |
Improving Frame Synchronization in Blind Speech Watermarking Method based on Spread-Spectrum using Linear Prediction Residue Takuto Isoyama (JAIST), Tetsuya Kojima (NIT, Tokyo College), Masashi Unoki (JAIST) EMM2022-66 |
We previously proposed a blindly-detectable direct-spread spectrum (DSS) method using linear prediction (LP) residue. Th... [more] |
EMM2022-66 pp.26-31 |
EA, EMM, ASJ-H |
2022-11-22 13:00 |
Online |
Online |
[Fellow Memorial Lecture]
Security and Privacy Preservation for Speech Signal
-- Approach from speech information hiding technology -- Masashi Unoki (JAIST) EA2022-60 EMM2022-60 |
Non-authentic but skillfully fabricated artificial replicas of authentic media in the real world are known as “media clo... [more] |
EA2022-60 EMM2022-60 pp.99-104 |
EMM |
2022-03-08 09:15 |
Online |
(Primary: Online, Secondary: On-site) (Primary: Online, Secondary: On-site) |
[Poster Presentation]
Ultimate Link for multiple letters with robust for print and scan Takahiro Muta, Michiharu Niimi (KIT), Yukiharu Yamauchi (National Inst. of Tech., Kitakyushu Col.) EMM2021-108 |
In out laboratory, we are proposing an Ultimate Link technology that maps semantic coherence in the real world to inform... [more] |
EMM2021-108 pp.86-90 |
EMM, EA, ASJ-H |
2021-11-15 13:30 |
Online |
Online |
[Poster Presentation]
Study on frame synchronization in spread-spectrum based speech information hiding method by using linear prediction residue Takuto Isoyama, Masashi Unoki (JAIST) EA2021-40 EMM2021-67 |
Our previous study proposed a blindly-detectable direct-spread spectrum (DSS) method using linear prediction (LP) residu... [more] |
EA2021-40 EMM2021-67 pp.74-79 |
SP, IPSJ-SLP, IPSJ-MUS |
2021-06-19 13:00 |
Online |
Online |
Study on the background cancellation system for speech privacy Jiangning Huang, Akinori Ito (Tohoku Univ.) SP2021-14 |
Evacuation centers at the time of disaster do not have sufficient sound insulation to maintain sound privacy. In this st... [more] |
SP2021-14 pp.57-62 |
CQ, CBE (Joint) |
2021-01-21 16:00 |
Online |
Online |
[Poster Presentation]
Experimental Study for Effect of Video Media in Tele-conference Services Shunta Sasaki, Tatsuya Yamazaki (Niigata Univ.), Takumi Miyoshi (Shibaura Inst. of Tech.) CQ2020-82 |
In these days, spread of telework and prevention of infectious diseases have led to a rapid increase in demand for tele-... [more] |
CQ2020-82 pp.78-83 |
EMM |
2020-03-05 15:35 |
Okinawa |
(Cancelled but technical report was issued) |
[Poster Presentation]
Comics Enrichment using Ultimate Link Shion Moriyoshi, Yukiharu Yamauchi (KCT), Michiharu Niimi (KIT) EMM2019-111 |
This paper reports a prototype system that is enable us to display an additional information of a serif on electric comi... [more] |
EMM2019-111 pp.53-58 |
EA, EMM |
2019-11-22 14:00 |
Ishikawa |
Kanazawa Institute of Technology |
[Poster Presentation]
Visible video watermarking using visual effects based on QR code Ryo Tabata, Kento Akimoto, Yo Horiuchi, Tetsuya Kojima (NIT, Tokyo College) EA2019-55 EMM2019-83 |
It is expected that 5G technologies accelerate the spreading use of the communication medhods based on visual media suc... [more] |
EA2019-55 EMM2019-83 pp.15-18 |
EMM |
2019-03-13 14:05 |
Okinawa |
TBD |
[Poster Presentation]
A Visible Video Data Hiding Based on Spacial and Temporal Synchronization and Its Application to Information Communications Yuya Hirata, Tetsuya Kojima (NIT, Tokyo College) EMM2018-98 |
Research on information transmission using digital contents has attracted much attention as an application of data hidin... [more] |
EMM2018-98 pp.33-38 |
SP |
2019-01-26 16:25 |
Ishikawa |
Kanazawa-Harmonie |
[Fellow Memorial Lecture]
Machine, human and sound communication Akinori Ito (Tohoku Univ.) SP2018-55 |
Speech is the most important modality for human-human communication. From invention of electrical speech communication, ... [more] |
SP2018-55 p.19 |
EA, ASJ-H, EMM, IPSJ-MUS [detail] |
2018-11-21 13:30 |
Ishikawa |
Hotel Koshuen |
Study on spread-spectrum based speech watermarking method by using linear prediction residual Reiya Namikawa, Masashi Unoki (JAIST) EA2018-68 EMM2018-68 |
Direct spread spectrum (DSS) method is well-known as a robust audio information-hiding method.
However, this method has... [more] |
EA2018-68 EMM2018-68 pp.31-36 |
EA, ASJ-H, EMM, IPSJ-MUS [detail] |
2018-11-21 16:10 |
Ishikawa |
Hotel Koshuen |
[Invited Talk]
Audio Information-Hiding Techniques based on Human Auditory Characteristics Masashi Unoki (JAIST) EA2018-78 EMM2018-78 |
For the audio content security such like the audio content protection as well as speech tampering detection, audio infor... [more] |
EA2018-78 EMM2018-78 pp.153-156 |
CQ, ICM, NS, NV (Joint) |
2018-11-16 13:45 |
Ishikawa |
|
Information Hiding for Networked Control Systems Using Steganography Kenta Yamada, Ryosuke Hotchi, Ryogo Kubo (Keio Univ.) CQ2018-73 |
According to the growing of the Internet, secure communication methods have been actively reserached. The mainly used se... [more] |
CQ2018-73 pp.55-60 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 09:30 |
Hokkaido |
Sapporo Convention Center |
Some tips for information hiding from the viewpoint of magic trick Naofumi Aoki (Hokkaido Univ.) ISEC2018-32 SITE2018-24 HWS2018-29 ICSS2018-35 EMM2018-31 |
Besides some industrial applications such as steganography and digital watermarking, the concept of information hiding i... [more] |
ISEC2018-32 SITE2018-24 HWS2018-29 ICSS2018-35 EMM2018-31 pp.225-227 |
NC, IBISML, IPSJ-BIO, IPSJ-MPS [detail] |
2018-06-13 16:15 |
Okinawa |
Okinawa Institute of Science and Technology |
Decoding Covert Spatial Attention using Privacy-preserving Sparse Coding Takayuki Nakachi, Hiroyuki Ishihara (NTT), Hitoshi Kiya (Tokyo Metro. Univ.) NC2018-8 |
Brain-machine interface (BMI) has attracted much attention not only in biomedical engineering fields but also in ICT hum... [more] |
NC2018-8 pp.15-20 |
WBS, IT, ISEC |
2018-03-08 10:50 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
Digital watermark using deep-learning classification Mashu Sakai, Taiki Shigeta, Hikaru Morita (Kanagawa Univ.) IT2017-121 ISEC2017-109 WBS2017-102 |
Digital watermarking is a technique of embedding information in an original image without being noticed or disclosed to ... [more] |
IT2017-121 ISEC2017-109 WBS2017-102 pp.103-106 |
EMM |
2018-03-05 15:45 |
Kagoshima |
Naze Community Center (Amami-Shi, Kagoshima) |
[Poster Presentation]
Technique of Embedding Information inside 3-D Printed Objects With Metal-like Resin Kousuke Nakamura (Kanagawa Inst. of Tech.), Tomohisa Matsumoto (Chuo Univ.), Masahiro Suzuki (Tokiwa Univ.), Hideyuki Torii, Kazutake Uehira (Kanagawa Inst. of Tech.) EMM2017-85 |
We proposed and evaluated a new technique of invisibly embedding information inside a 3-D printed object with metal-like... [more] |
EMM2017-85 pp.41-44 |
EMM |
2018-03-05 15:45 |
Kagoshima |
Naze Community Center (Amami-Shi, Kagoshima) |
[Poster Presentation]
Improvement of Emergency Broadcasting System Based on Audio Data Hiding Youki Sada, Tetsuya Kojima (NIT, Tokyo College) EMM2017-88 |
The authors have proposed a disaster prevention broadcasting system based on audio data hiding scheme. In this system, m... [more] |
EMM2017-88 pp.55-60 |