Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SIS |
2020-03-05 13:10 |
Saitama |
Saitama Hall (Cancelled but technical report was issued) |
An Improvement on Data Hiding in the Copyright- and Privacy-Protected Image Trading System Kazuaki Takahashi, Masaaki Fujiyoshi (Tokyo Metro. Univ.), Wannida Sae-tang (KMUTNB), Hitoshi Kiya (Tokyo Metro. Univ.) SIS2019-39 |
This paper improves the data hiding performance in the copyright- and privacy-protected image trading system. In the sys... [more] |
SIS2019-39 pp.13-18 |
IT, ISEC, WBS |
2019-03-08 11:15 |
Tokyo |
University of Electro-Communications |
A Lower Bound of the Joint Capacity of Digital Fingerprinting Codes against a Mixed Attack Tatsuya Sekine, Hiroki Koga (U. Tsukuba) IT2018-119 ISEC2018-125 WBS2018-120 |
Digital fingerprinting codes are embedded in digital contents for protecting copyrights of the digital contents against m... [more] |
IT2018-119 ISEC2018-125 WBS2018-120 pp.269-274 |
EMM |
2017-01-30 16:15 |
Miyagi |
Tohoku University (Miyagi) |
On Some Variations of Information Hiding Strategies Based on Complete Complementary Codes Tetsuya Kojima (NIT, Tokyo College) EMM2016-79 |
Complete complementary code (CCC) is a spread spectrum sequence family with good correlation properties. Information hid... [more] |
EMM2016-79 pp.31-36 |
IT, ISEC, WBS |
2016-03-10 13:15 |
Tokyo |
The University of Electro-Communications |
Improvement in detection performance of Tardos's fingerprinting code using detailed score distribution Ryo Inoue, Kazuhiko Yamaguchi (UEC) IT2015-113 ISEC2015-72 WBS2015-96 |
Tardos proposed c-secure code based on randomness with certain distribution (Tardos’s code). The code is shorter than Bo... [more] |
IT2015-113 ISEC2015-72 WBS2015-96 pp.75-80 |
ISEC, IT, WBS |
2014-03-11 15:40 |
Aichi |
Nagoya Univ., Higashiyama Campus |
On the Performance of Probabilistic Digital Fingerprinting Codes Generated from Nonstationary Distribution Kouhei Kanai, Hiroki Koga (Univ. of Tsukuba) IT2013-94 ISEC2013-123 WBS2013-83 |
Illegal copies of digital contents are spreading due to the development
of the Internet. Digital fingerprinting codes p... [more] |
IT2013-94 ISEC2013-123 WBS2013-83 pp.255-260 |
IA, IPSJ-IOT, SITE [detail] |
2014-02-28 15:35 |
Ishikawa |
Hotel Rurikoh |
Fingerprinting in Executable Files for Tracking Illegal Uploaders Masayuki Tsubouchi, Yasuo Okabe (Kyoto Univ.) SITE2013-74 IA2013-99 |
Nowadays illegal uploading of digital contents is a serious problem. Some software venders have solved this issue by aut... [more] |
SITE2013-74 IA2013-99 pp.189-193 |
IT |
2012-07-19 14:15 |
Aichi |
Toyota Technological Institute |
A Tracing Algorithm for the Boneh-Shaw Code under a Probabilistic Attack Model Kouhei Kanai, Hiroki Koga (Tsukuba Univ) IT2012-10 |
Illegal copies of digital contents is spreading due to the development of the Internet.A digital finger- printing code p... [more] |
IT2012-10 pp.7-12 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 11:20 |
Hokkaido |
|
On Information Hiding Technologies Based on Complete Complementary Codes Tetsuya Kojima (Tokyo Natl. Coll. Tech.), Ryusuke Mayuzumi (Univ. of Electro-Comm.), Naoki Ohtani (NHK Media Tech.) ISEC2012-11 SITE2012-7 ICSS2012-13 EMM2012-3 |
Complete complemenary code (CCC) is a spread spectrum sequence family with good correlation properties. A digital waterm... [more] |
ISEC2012-11 SITE2012-7 ICSS2012-13 EMM2012-3 pp.17-22 |
PRMU |
2011-02-17 16:00 |
Saitama |
|
Accurate Content-Based Copy Detection Scheme Using Global/Local Visual Features and Audio Features Yusuke Uchida, Shigeyuki Sakazawa (KDDI Labs) PRMU2010-216 |
In recent years, Content-Based Copy Detection (CBCD) technology, more generally referred to as digital fingerprinting, h... [more] |
PRMU2010-216 pp.49-54 |
PRMU, IE, MI |
2009-05-29 13:30 |
Gifu |
Gifu Univ. |
Performance Evaluation on Content-Based Copy Detection Based on Color Layout Descriptor Yusuke Uchida, Masaru Sugano, Masayuki Hashimoto, Akio Yoneyama (KDDI R&D Labs) IE2009-38 PRMU2009-29 MI2009-29 |
Recently, Content-Based Copy Detection (CBCD), sometimes referred to as fingerprinting, attracts considerable attention ... [more] |
IE2009-38 PRMU2009-29 MI2009-29 pp.159-164 |
ICM |
2008-05-08 14:35 |
Kagoshima |
Kagoshima Public Access Center |
Construction and Evaluation of Live Video Streaming System with Broadcast Encryption over IP Multicast Yoshitaka Morimura, Tetsutaro Uehara, Shuhui Hou, Michihiko Minoh (Kyoto Univ.) ICM2008-6 |
We constructed a live video streaming system over IP Multicast, which uses SRTP and delivers the decryption key with bro... [more] |
ICM2008-6 pp.29-34 |
IT |
2007-05-18 16:15 |
Yamagata |
Denkoku-No-Mori (Yonezawa) |
Shortened and concatenated collusion-secure codes for digital fingerprinting Hideki Yagi, Toshiyasu Matsushima, Shigeichi Hirasawa (Waseda Univ.) IT2007-6 |
Digital fingerprinting, which is employed in contents distribution systems to deter illegal use of digital contents, is ... [more] |
IT2007-6 pp.31-36 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 13:25 |
Okayama |
Okayama Univ. |
Fingerprinting Protocol Equipping Electronic Payment System Shinya Yamane, Minoru Kuribayashi, Masakatu Morii (Kobe Univ.) |
On digital contents distribution system fingerprinting protocols enable sellers to trace the buyer who redistributed a c... [more] |
ISEC2006-53 pp.99-106 |
IT |
2006-05-24 14:50 |
Nara |
Nara-ken new public hall |
A New Class of Traceability Codes for Digital Fingerprinting Hideki Yagi, Toshiyasu Matsushima, Shigeichi Hirasawa (Waseda Univ.) |
In this paper, we discuss collusion-secure traceability codes for digital fingerprinting which is a technique for copyri... [more] |
IT2006-9 pp.13-18 |
WBS, IT, ISEC |
2006-03-16 17:10 |
Aichi |
Nagoya Univ. |
An Algorithm for Computing the Hiding Capacity of Information Hiding Kensuke Yasui, Tota Suko, Toshiyasu Matsushima (Waseda Univ.) |
There are digital watermarking and fingerprinting (generically calling information hiding) as technique to protect illeg... [more] |
IT2005-94 ISEC2005-151 WBS2005-108 pp.177-182 |