IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 15 of 15  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
SIS 2020-03-05
13:10
Saitama Saitama Hall
(Cancelled but technical report was issued)
An Improvement on Data Hiding in the Copyright- and Privacy-Protected Image Trading System
Kazuaki Takahashi, Masaaki Fujiyoshi (Tokyo Metro. Univ.), Wannida Sae-tang (KMUTNB), Hitoshi Kiya (Tokyo Metro. Univ.) SIS2019-39
This paper improves the data hiding performance in the copyright- and privacy-protected image trading system. In the sys... [more] SIS2019-39
pp.13-18
IT, ISEC, WBS 2019-03-08
11:15
Tokyo University of Electro-Communications A Lower Bound of the Joint Capacity of Digital Fingerprinting Codes against a Mixed Attack
Tatsuya Sekine, Hiroki Koga (U. Tsukuba) IT2018-119 ISEC2018-125 WBS2018-120
Digital fingerprinting codes are embedded in digital contents for protecting copyrights of the digital contents against m... [more] IT2018-119 ISEC2018-125 WBS2018-120
pp.269-274
EMM 2017-01-30
16:15
Miyagi Tohoku University (Miyagi) On Some Variations of Information Hiding Strategies Based on Complete Complementary Codes
Tetsuya Kojima (NIT, Tokyo College) EMM2016-79
Complete complementary code (CCC) is a spread spectrum sequence family with good correlation properties. Information hid... [more] EMM2016-79
pp.31-36
IT, ISEC, WBS 2016-03-10
13:15
Tokyo The University of Electro-Communications Improvement in detection performance of Tardos's fingerprinting code using detailed score distribution
Ryo Inoue, Kazuhiko Yamaguchi (UEC) IT2015-113 ISEC2015-72 WBS2015-96
Tardos proposed c-secure code based on randomness with certain distribution (Tardos’s code). The code is shorter than Bo... [more] IT2015-113 ISEC2015-72 WBS2015-96
pp.75-80
ISEC, IT, WBS 2014-03-11
15:40
Aichi Nagoya Univ., Higashiyama Campus On the Performance of Probabilistic Digital Fingerprinting Codes Generated from Nonstationary Distribution
Kouhei Kanai, Hiroki Koga (Univ. of Tsukuba) IT2013-94 ISEC2013-123 WBS2013-83
Illegal copies of digital contents are spreading due to the development
of the Internet. Digital fingerprinting codes p... [more]
IT2013-94 ISEC2013-123 WBS2013-83
pp.255-260
IA, IPSJ-IOT, SITE [detail] 2014-02-28
15:35
Ishikawa Hotel Rurikoh Fingerprinting in Executable Files for Tracking Illegal Uploaders
Masayuki Tsubouchi, Yasuo Okabe (Kyoto Univ.) SITE2013-74 IA2013-99
Nowadays illegal uploading of digital contents is a serious problem. Some software venders have solved this issue by aut... [more] SITE2013-74 IA2013-99
pp.189-193
IT 2012-07-19
14:15
Aichi Toyota Technological Institute A Tracing Algorithm for the Boneh-Shaw Code under a Probabilistic Attack Model
Kouhei Kanai, Hiroki Koga (Tsukuba Univ) IT2012-10
Illegal copies of digital contents is spreading due to the development of the Internet.A digital finger- printing code p... [more] IT2012-10
pp.7-12
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
11:20
Hokkaido   On Information Hiding Technologies Based on Complete Complementary Codes
Tetsuya Kojima (Tokyo Natl. Coll. Tech.), Ryusuke Mayuzumi (Univ. of Electro-Comm.), Naoki Ohtani (NHK Media Tech.) ISEC2012-11 SITE2012-7 ICSS2012-13 EMM2012-3
Complete complemenary code (CCC) is a spread spectrum sequence family with good correlation properties. A digital waterm... [more] ISEC2012-11 SITE2012-7 ICSS2012-13 EMM2012-3
pp.17-22
PRMU 2011-02-17
16:00
Saitama   Accurate Content-Based Copy Detection Scheme Using Global/Local Visual Features and Audio Features
Yusuke Uchida, Shigeyuki Sakazawa (KDDI Labs) PRMU2010-216
In recent years, Content-Based Copy Detection (CBCD) technology, more generally referred to as digital fingerprinting, h... [more] PRMU2010-216
pp.49-54
PRMU, IE, MI 2009-05-29
13:30
Gifu Gifu Univ. Performance Evaluation on Content-Based Copy Detection Based on Color Layout Descriptor
Yusuke Uchida, Masaru Sugano, Masayuki Hashimoto, Akio Yoneyama (KDDI R&D Labs) IE2009-38 PRMU2009-29 MI2009-29
Recently, Content-Based Copy Detection (CBCD), sometimes referred to as fingerprinting, attracts considerable attention ... [more] IE2009-38 PRMU2009-29 MI2009-29
pp.159-164
ICM 2008-05-08
14:35
Kagoshima Kagoshima Public Access Center Construction and Evaluation of Live Video Streaming System with Broadcast Encryption over IP Multicast
Yoshitaka Morimura, Tetsutaro Uehara, Shuhui Hou, Michihiko Minoh (Kyoto Univ.) ICM2008-6
We constructed a live video streaming system over IP Multicast, which uses SRTP and delivers the decryption key with bro... [more] ICM2008-6
pp.29-34
IT 2007-05-18
16:15
Yamagata Denkoku-No-Mori (Yonezawa) Shortened and concatenated collusion-secure codes for digital fingerprinting
Hideki Yagi, Toshiyasu Matsushima, Shigeichi Hirasawa (Waseda Univ.) IT2007-6
Digital fingerprinting, which is employed in contents distribution systems to deter illegal use of digital contents, is ... [more] IT2007-6
pp.31-36
ISEC, SITE, IPSJ-CSEC 2006-07-21
13:25
Okayama Okayama Univ. Fingerprinting Protocol Equipping Electronic Payment System
Shinya Yamane, Minoru Kuribayashi, Masakatu Morii (Kobe Univ.)
On digital contents distribution system fingerprinting protocols enable sellers to trace the buyer who redistributed a c... [more] ISEC2006-53
pp.99-106
IT 2006-05-24
14:50
Nara Nara-ken new public hall A New Class of Traceability Codes for Digital Fingerprinting
Hideki Yagi, Toshiyasu Matsushima, Shigeichi Hirasawa (Waseda Univ.)
In this paper, we discuss collusion-secure traceability codes for digital fingerprinting which is a technique for copyri... [more] IT2006-9
pp.13-18
WBS, IT, ISEC 2006-03-16
17:10
Aichi Nagoya Univ. An Algorithm for Computing the Hiding Capacity of Information Hiding
Kensuke Yasui, Tota Suko, Toshiyasu Matsushima (Waseda Univ.)
There are digital watermarking and fingerprinting (generically calling information hiding) as technique to protect illeg... [more] IT2005-94 ISEC2005-151 WBS2005-108
pp.177-182
 Results 1 - 15 of 15  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan