Communication-Communication Systems(Date:2012/07/12)

Presentation
表紙

,  

[Date]2012/7/12
[Paper #]
目次

,  

[Date]2012/7/12
[Paper #]
Reevaluation of Threshold Levels for Judging Complexity Boundary Using Distributions of Complexity in BPCS Steganography Technique

Syouhei HARADA,  Seok KANG,  Yuji SAKAMOTO,  

[Date]2012/7/12
[Paper #]ISEC2012-9,SITE2012-5,ICSS2012-11,EMM2012-1
Hybrid Additive-Multiplicative Watermarking for General Embedding Domains

Seigo IKEDA,  Maki YOSHIDA,  Toru FUJIWARA,  

[Date]2012/7/12
[Paper #]ISEC2012-10,SITE2012-6,ICSS2012-12,EMM2012-2
On Information Hiding Technologies Based on Complete Complementary Codes

Tetsuya KOJIMA,  Ryusuke MAYUZUMI,  Naoki OHTANI,  

[Date]2012/7/12
[Paper #]ISEC2012-11,SITE2012-7,ICSS2012-13,EMM2012-3
A data hiding method for binary images based on a pixel block feature and position of connected component

Hiroo IWANAGA,  Hirohisa HIOKI,  

[Date]2012/7/12
[Paper #]ISEC2012-12,SITE2012-8,ICSS2012-14,EMM2012-4
Performance evaluation of digital watermarking model with image restoration : image restoration using 2D Ising model

Masaki KAWAMURA,  Tatsuya UEZU,  Masato OKADA,  

[Date]2012/7/12
[Paper #]ISEC2012-13,SITE2012-9,ICSS2012-15,EMM2012-5
Design of a Realtime Watermarking FPGA

Atsushi KATAYAMA,  Susumu YAMAMOTO,  Shingo ANDO,  Ken TSUTSUGUCHI,  Yukinobu TANIGUCHI,  

[Date]2012/7/12
[Paper #]ISEC2012-14,SITE2012-10,ICSS2012-16,EMM2012-6
A Hiding Technique of Copy-Disturbance Noises Based on Temporal Scrambling of Narrow-band Components : "G-encoder Mark for COPY PROTECT"

Toshio MODEGI,  Shin-ichi MIYAZAKI,  Goh SEKIGUCHI,  Yuuji KOSUDA,  

[Date]2012/7/12
[Paper #]ISEC2012-15,SITE2012-11,ICSS2012-17,EMM2012-7
Evaluation of a Visualization System to Assess the Risk of Websites

Tomoko KAJIYAMA,  Isao ECHIZEN,  

[Date]2012/7/12
[Paper #]ISEC2012-16,SITE2012-12,ICSS2012-18,EMM2012-8
Quantitative Evaluation on Effectiveness of Privacy Protection for Facial Images

Yuta NAKASHIMA,  Tomoaki IKENO,  Noboru BABAGUCHI,  

[Date]2012/7/12
[Paper #]ISEC2012-17,SITE2012-13,ICSS2012-19,EMM2012-9
A Possibility of Value Creation Based on Information Hiding

Naofumi AOKI,  

[Date]2012/7/12
[Paper #]ISEC2012-18,SITE2012-14,ICSS2012-20,EMM2012-10
A Study on Cybersecurity Information Discovery Mechanisms over the Internet

Takeshi TAKAHASHI,  Youki KADOBAYASHI,  Yuuki TAKANO,  

[Date]2012/7/12
[Paper #]ISEC2012-19,SITE2012-15,ICSS2012-21,EMM2012-11
Identifying the Code to be Analyzed with Taing Tags

Yuhei KAWAKOYA,  Makoto IWAMURA,  Takeo HARIU,  

[Date]2012/7/12
[Paper #]ISEC2012-20,SITE2012-16,ICSS2012-22,EMM2012-12
An Efficient Certificate Management Method for Improving Traffic Flow of Certificates in Mobile Communications

Norihito YOSAKA,  Tomoyuki NAGASE,  

[Date]2012/7/12
[Paper #]ISEC2012-21,SITE2012-17,ICSS2012-23,EMM2012-13
TSP Solution Based on Clustering nodes in Ad-hoc networks

Xiaoji LI,  Tomoyuki NAGASE,  

[Date]2012/7/12
[Paper #]ISEC2012-22,SITE2012-18,ICSS2012-24,EMM2012-14
A Fast Privacy-Preserving Collaborative Filtering Scheme with Transferring Statistical Values

Toru NAKAMURA,  Shinsaku KIYOMOTO,  Ryu WATANABE,  Yutaka MIYAKE,  

[Date]2012/7/12
[Paper #]ISEC2012-23,SITE2012-19,ICSS2012-25,EMM2012-15
Detecting Invalid Control Flow with Pseudo-Dispersion of Program Code

Eitaro SHIOJI,  Yuhei KAWAKOYA,  Makoto IWAMURA,  Takeo HARIU,  

[Date]2012/7/12
[Paper #]ISEC2012-24,SITE2012-20,ICSS2012-26,EMM2012-16
Architecture Design for Visualizing Risks and Implementing Adequate Security

Shinichiro MATSUO,  Akira KANAOKA,  Takeshi TAKAHASHI,  Shinsuke MIWA,  Tadashi MINOWA,  

[Date]2012/7/12
[Paper #]ISEC2012-25,SITE2012-21,ICSS2012-27,EMM2012-17
The Diversity of Color Vision and Its Application to Communication

Kazunori ASADA,  

[Date]2012/7/12
[Paper #]ISEC2012-26,SITE2012-22,ICSS2012-28,EMM2012-18
123>> 1-20hit(53hit)