Engineering Sciences/NOLTA-Information Theory(Date:2016/05/19)

Presentation
Additional Data Hiding Technique for Specified Regions of JPEG Image

Yasutoshi Miura(Hokkaido Univ.),  Xuefei Li(Hokkaido Univ.),  Kang Seok(Hokkaido Univ.),  Yuji Sakamoto(Hokkaido Univ.),  

[Date]2016-05-19
[Paper #]IT2016-1,EMM2016-1
A Note on Support Recovery of Sparse Signals using Belief Propagation

Shunsuke Horii(Waseda Univ.),  Toshiyasu Matsushima(Waseda Univ.),  Shigeichi Hirasawa(Waseda Univ.),  

[Date]2016-05-19
[Paper #]IT2016-4,EMM2016-4
[Invited Talk] Data Compression for Computing Functions

Shigeaki Kuzuoka(Wakayama Univ.),  

[Date]2016-05-19
[Paper #]IT2016-10,EMM2016-10
Evaluation of scanned image tolerance by using spread spectrum digital watermarking with regression analysis

Jinjing Ma(Yamaguchi Univ.),  Masaki Kawamura(Yamaguchi Univ.),  

[Date]2016-05-19
[Paper #]IT2016-3,EMM2016-3
Codestream Level Secure Identification for JPEG 2000 Images

Kenta Iida(Tokyo Metropolitan Univ.),  Hitoshi Kiya(Tokyo Metropolitan Univ.),  

[Date]2016-05-19
[Paper #]IT2016-2,EMM2016-2
A Consideration on Relationships between Correlation of Information Stored on Nodes and Coding Efficiency for Cooperative Regenerating Codes

Takahiro Yoshida(Yokohama College of Commerce),  Toshiyasu Matsushima(Waseda Univ.),  

[Date]2016-05-19
[Paper #]IT2016-5,EMM2016-5
Simulation of error-correcting code using LDPC code with Sum-Product method for a single-dot pattern method

Kitahiro Kaneda(Osaka Prefecture Univ.),  Yasuyuki Anezaki(TUS),  Keiichi Iwamura(TUS),  Isao Echizen(NII),  

[Date]2016-05-19
[Paper #]IT2016-7,EMM2016-7
An Optimal Construction of Visual Secret Sharing Schemes for General Access Structures Using Integer Programming and its Application

Kuya Nishizumi(Univ. Tsukuba),  Hiroki Koga(Univ. Tsukuba),  

[Date]2016-05-19
[Paper #]IT2016-6,EMM2016-6
Study of Photo-realistic Face Moving Image Generation from the Text Using the Facial Feature

Kazuki Sato(Tohoku Univ.),  Takashi Nose(Tohoku Univ.),  Akinori Ito(Tohoku Univ.),  

[Date]2016-05-19
[Paper #]IT2016-8,EMM2016-8
Multimodal User Authentication Focusing on Long-term Heart Rate Sequences from Wearable Devices

Takaaki Yoshida(Osaka Univ.),  Kazuhiro Kono(Kansai Univ.),  Babaguchi Noboru(Osaka Univ.),  

[Date]2016-05-19
[Paper #]IT2016-9,EMM2016-9
Iterative Erasure Correcting Algorithm for q-ary Reed-Muller Codes base on Local Correctability

Shinya Fukumoto(NIT),  Tadashi Wadayama(NIT),  

[Date]2016-05-20
[Paper #]IT2016-19,EMM2016-19
A Sharp Bound Between Two Arimoto's Conditional Renyi Entropies with Distinct Positive Orders

Yuta Sakai(Univ. of Fukui),  Ken-ichi Iwata(Univ. of Fukui),  

[Date]2016-05-20
[Paper #]IT2016-11,EMM2016-11
A Grammar-Based Data Compression Algorithm Using Chomsky Normal Form of Context Free Grammar

Mitsuharu Arimura(Shonan Inst. Tech.),  

[Date]2016-05-20
[Paper #]IT2016-12,EMM2016-12
Technique for Reading Information Embedded Inside Gypsum Objects Fabricated With 3-D Printers

Kosuke Nakamura(Kanagawa Inst. Tech.),  Masahiro Suzuki(Kanagawa Inst. Tech.),  Youichi Takashima(NTT),  Hideyuki Torii(Kanagawa Inst. Tech.),  Kazutake Uehira(Kanagawa Inst. Tech.),  

[Date]2016-05-20
[Paper #]IT2016-16,EMM2016-16
A Novel Data Hiding Scheme into Musical Pieces by Utilizing Musical Characteristics

Kan Kamada(NIT, Tokyo College),  Tetsuya Kojima(NIT, Tokyo College),  

[Date]2016-05-20
[Paper #]IT2016-14,EMM2016-14
Possibility of Pure Data for Multimedia Programming

Naofumi Aoki(Hokkaido Univ.),  Keisuke Ai(Hokkaido Univ.),  

[Date]2016-05-20
[Paper #]IT2016-17,EMM2016-17
Construction of A Two-Step Universal VV Code Using a Sufficient Statistic Extracted from a VF Code

Mitsuharu Arimura(Shonan Inst. Tech.),  Hiroshi Nagaoka(Univ. of Electro-Communications),  

[Date]2016-05-20
[Paper #]IT2016-13,EMM2016-13
Optimization for the average performance of five-state system with probabilistic transition

Ken-ichi Iwata(Univ. of Fukui),  Takato Kimura(Univ. of Fukui),  Hirosuke Yamamoto(The Univ. of Tokyo),  

[Date]2016-05-20
[Paper #]IT2016-18,EMM2016-18
Analysis of Rank-Modulation Rewriting Codes by a Group Action

Tomoharu Shibuya(Sophia Univ.),  Takeru Sudo(Sophia Univ.),  

[Date]2016-05-20
[Paper #]IT2016-20,EMM2016-20
Improvement of the embedding capacity for audio watermarking method using non-negative matrix factorization

Harumi Murata(Chukyo Univ.),  Akio Ogihara(Kindai Univ.),  

[Date]2016-05-20
[Paper #]IT2016-15,EMM2016-15