Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, SITE, IPSJ-IOT [detail] |
2024-03-13 14:05 |
Okinawa |
Miyakojima City Future Creation Center (Primary: On-site, Secondary: Online) |
Perceptual Hashing Based on CNN Node Responses Yusei Sugawara, Kaito Hosono, Tetsuya Morizumi, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2023-101 IA2023-107 |
As technology advances, unauthorized duplication of images has become a serious issue related to copyright infringement.... [more] |
SITE2023-101 IA2023-107 pp.203-210 |
KBSE, SC |
2023-11-17 13:50 |
Miyagi |
Sento Kaikan |
Implementation and validation of content data ownership management system for open metaverse platform Yuki Sasaki, Shinya Kitajima (Fujitsu), Akira Iwata, Tetsuya Imamura (JP GAMES) KBSE2023-34 SC2023-17 |
Recently, the virtual space called metaverse has attracted attention. Several studies suggest that blockchain is an appr... [more] |
KBSE2023-34 SC2023-17 pp.13-18 |
ICSS, IPSJ-SPT |
2023-03-13 16:10 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Evaluation of Copy Protection Technology Using Web Font Kazuki Nomoto (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT/RIKEN AIP) ICSS2022-61 |
This study proposes and evaluates Fonty, a copy protection technology for text content. First, Fonty encrypts text conte... [more] |
ICSS2022-61 pp.79-84 |
SITE |
2019-12-06 13:00 |
Kanagawa |
|
Analysis of an intermediate layer for perceptual hashing using a convolutional neural network Ken Nakatani, Meng Zhaoxiong, Tetsuya Morizumi, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2019-80 |
This research aims to improve the digital watermark technology that embeds evidence information by using content redunda... [more] |
SITE2019-80 pp.1-6 |
EMM |
2019-03-14 09:15 |
Okinawa |
TBD |
[Invited Talk]
Copyright Protection Technology in a UGC Era without Depending on DRM Masaki Inamura (TDU) EMM2018-111 |
The concept of UGC (User Generated Content) has appeared, and the era of creation/distribution of multimedia contents by... [more] |
EMM2018-111 pp.105-110 |
SITE, IPSJ-EIP |
2018-05-31 11:20 |
Kanagawa |
|
A Consideration of Draft Revision of the Copyright Law Regarding Education and Forecasted Issues
-- Revision proposal of Article 35 - Focusing on the Copyright Levy Framework for Public Transmission with the Purpose of Use in the Course of the Lesson -- Takahiro Haga (GSGU) SITE2018-1 |
On January 22, 2018, the Ministry of Education announced the "draft bill to amend part of the copyright law" as a "draft... [more] |
SITE2018-1 pp.15-21 |
IN |
2018-01-23 13:00 |
Aichi |
WINC AICHI |
[Invited Talk]
Media Fingerprinting Technologies Supporting Digital Media Contents Distribution and those Applications Takahito Kawanishi, Hidehisa Nagano, Minoru Mori, Xiaomeng Wu, Yasunori Oishi, Kaoru Hiramatsu, Kunio Kashino (NTT) IN2017-85 |
Media fingerprinting is a technique which identify a media sample or quickly locate similar parts in large media databas... [more] |
IN2017-85 p.83 |
IA, SITE, IPSJ-IOT [detail] |
2017-03-03 13:50 |
Okinawa |
Culture Resort Festone (Okinawa) |
On the Rights Clearance necessary for the Contents Production of Online Courses Haruo Kodama (OUJ/SOKENDAI) SITE2016-66 IA2016-96 |
This paper discusses rights clearance practiced at the Open University of Japan during the production of contents for it... [more] |
SITE2016-66 IA2016-96 pp.33-36 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 15:20 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Consistency between Moral Rights and Economic Rights in Digital Rights Management of Webcasting Contents Haruo Kodama (NIME) ISEC2008-25 SITE2008-19 |
It is necessary to construct Digital Rights Management(DRM) systems to promote webcasting contents. There are problems o... [more] |
ISEC2008-25 SITE2008-19 pp.67-72 |
ISEC |
2007-12-19 10:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Integration Method of Incomplete Cryptographic System and Spread Spectrum Encoder Ta Minh Thanh, Munetoshi Iwakiri (NDA) ISEC2007-115 |
Digital contents can be copied without degradation, so that problems of illegal distribution of contents occur. Digital ... [more] |
ISEC2007-115 pp.19-24 |
ISEC |
2007-12-19 11:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Applied Method of AES algorithm to Incomplete Cryptographic System. Ta Minh Thanh, Munetoshi Iwakiri (NDA) ISEC2007-116 |
This report proposes a Digital Rights Management (DRM) technique with an applied method of AES algorithm to incomplete c... [more] |
ISEC2007-116 pp.25-31 |
CQ, LOIS, IE, IEE-CMN, ITE-ME |
2007-09-27 13:50 |
Tokushima |
The university of Tokushima |
Examination of Watermarking Method Using Moire Patterns Kunihiko Miyoshi, Seok Kang, Yuji Sakamoto (Hokkaido Univ.) CQ2007-45 OIS2007-35 IE2007-42 |
By the spread of the digital camera and the information infrastructure, many objects of shooting came to be circulated e... [more] |
CQ2007-45 OIS2007-35 IE2007-42 pp.51-55 |
SITE, IPSJ-EIP |
2007-05-25 16:55 |
Tokyo |
|
[Invited Talk]
Analysis and Future of Digital Rights Management Technology
-- Governance of Digital Society: Toward the Harmonization of Technology and Society -- Noboru Sonehara, Hitoshi Okada, Katsuya Watanabe (NII) SITE2007-9 |
e-Japan strategy has accelerated up realization of a digital society. The digital society ideals revolve around the high... [more] |
SITE2007-9 pp.47-54 |
VLD, CPSY, RECONF, IPSJ-SLDM |
2007-01-18 15:20 |
Tokyo |
Keio Univ. Hiyoshi Campus |
Design and Implementation of Self Run-time Partial Reconfiguration System Yohei Hori (AIST), Hiroyuki Yokoyama (KDDI Labs.), Hirofumi Sakane, Kenji Toda (AIST) |
We describe a design approach and its application of an FPGA-based system that utilizes self run-time partial reconfigur... [more] |
VLD2006-104 CPSY2006-75 RECONF2006-75 pp.61-68 |
LOIS |
2005-03-11 15:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Study of Efficient Content Distribution for Synchronous Playback on Multiple Clients Keiichi Hirota, Noburou Taniguchi, Kazuo Mogi, Osamu Shionoiri (NTT), Noboru Sonehara (NII), Masao Kasahara (Osaka Gakuin Univ.) |
Some kinds of contents require synchronous playback on multiple clients at various locations.There have been known some ... [more] |
OIS2004-107 pp.71-76 |