Information and Systems-Enriched Multimedia(Date:2015/03/05)

Presentation
表紙

,  

[Date]2015/3/5
[Paper #]
目次

,  

[Date]2015/3/5
[Paper #]
The structure of decentralized virtual currency and its institutional design : The control regulation and applied approach of the coreless currency

Hitoshi OKADA,  

[Date]2015/3/5
[Paper #]EMM2014-77
A Selective Encryption Scheme for JPEG2000 Coded Images Using ROI

Yuya NAKAO,  Shoko IMAIZUMI,  Naokazu AOKI,  Hiroyuki KOBAYASHI,  

[Date]2015/3/5
[Paper #]EMM2014-78
Improvement of Multibit Information Embedding Scheme for Palette-Based Images

Kazuma MOTEGI,  Shoko IMAIZUMI,  Naokazu AOKI,  Hiroyuki KOBAYASHI,  

[Date]2015/3/5
[Paper #]EMM2014-79
Near Lossless Data Hining Using Sparsity of Image Histogram

Ryo OISHI,  Masaaki FUJIYOSHI,  Hitoshi KIYA,  

[Date]2015/3/5
[Paper #]EMM2014-80
An extension of the unitary transformation-based template protection method for biometrics and its application

Yuko SAITO,  Ibuki NAKAMURA,  Sayaka SHIOTA,  Yoshihide TONOMURA,  Hitoshi KIYA,  

[Date]2015/3/5
[Paper #]EMM2014-81
A tamper detection scheme for JPEG2000 coded images using reversible data hiding

Takeshi OGASAWARA,  Shoko IMAIZUMI,  Naokazu AOKI,  Hiroyuki KOBAYASHI,  

[Date]2015/3/5
[Paper #]EMM2014-82
Consideration of watermarking method embedding surrounding region of SIFT feature

Kouta UCHIDA,  Masaki KAWAMURA,  

[Date]2015/3/5
[Paper #]EMM2014-83
Proposal for Motegoe voice changer providing enriched speech communication : automatic modification of Brisk voice, thankful voice and apology voice

Saori YANO,  Michiharu NIIMI,  Mitsunori MIZUMACHI,  

[Date]2015/3/5
[Paper #]EMM2014-84
Recoverable original video for mosaic system

Yuichi KUSAMA,  Hyunho KANG,  Keiichi IWAMURA,  

[Date]2015/3/5
[Paper #]EMM2014-85
A Study on Tamper Detection and Image Restoration by Embedding Similar Region Information

Yuto AOMORI,  Kazuki YAMATO,  Kazuma SHINODA,  Madoka HASEGAWA,  Shigeo KATO,  

[Date]2015/3/5
[Paper #]EMM2014-86
An Application of Error Correcting Codes for Disaster Prevention Broadcasting Using Audio Data Hiding

Ryosuke Mishima,  Tetsuya Kojima,  

[Date]2015/3/5
[Paper #]EMM2014-87
A Fundamental Study on Watermark Design for Replication Detection of Two-Dimensional Barcodes by Coevolutionary Optimization

Takeru MAEHARA,  Kazunari MINAMI,  Satoshi ONO,  

[Date]2015/3/5
[Paper #]EMM2014-88
On the Qualities of Stego Siren Sounds for Disaster Prevention Broadcasting Using Audio Data Hiding

Akihiro OIZUMI,  Tetsuya KOJIMA,  

[Date]2015/3/5
[Paper #]EMM2014-89
Development of dynamical invisible watermarking embedding system for PDF document

Takuya IWAMOTO,  Masaki KAWAMURA,  

[Date]2015/3/5
[Paper #]EMM2014-90
Relations of Compression Ratio and the Most Suitable Parameter of Additive Watermarking under the IHC Criteria

Hironobu TOZUKA,  Maki YOSHIDA,  Toru FUJIWARA,  

[Date]2015/3/5
[Paper #]EMM2014-91
Generation Methods of Secret Sharing QR Codes

Masaki KURAMOTO,  Kazuhiro KONO,  Yoshimichi ITO,  Noboru BABAGUCHI,  

[Date]2015/3/5
[Paper #]EMM2014-92
Usability Evaluation of Multi-Touch Actions Considering the Structure of Hand-Fingers and Its Constraints on Movement

Kumi NAKAMURA,  Kazuhiro KONO,  Yoshimichi ITO,  Noboru BABAGUCHI,  

[Date]2015/3/5
[Paper #]EMM2014-93
Proposal of an application supporting cook named Oryouri-kareshi

Aiko KISHINO,  Michiharu NIIMI,  Mitsunori MIZUMACHI,  

[Date]2015/3/5
[Paper #]EMM2014-94
12>> 1-20hit(32hit)