IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 115, Number 37

Information Theory

Workshop Date : 2015-05-21 - 2015-05-22 / Issue Date : 2015-05-14

[PREV] [NEXT]

[TOP] | [2012] | [2013] | [2014] | [2015] | [2016] | [2017] | [2018] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

IT2015-1
On a Lower Bound on the Capacity of Digital Fingerprinting Codes with Codewords Generated by Using a Continuous Distribution
Hiroki Koga, Kaoru Itabashi (U. Tsukuba)
pp. 1 - 6

IT2015-2
Feasible regions of symmetric capacity and Gallager's $E_{0}$ functions for discrete memoryless channels under a uniform input distribution
Yuta Sakai, Ken-ichi Iwata (Univ. of Fukui)
pp. 7 - 12

IT2015-3
Analysis on Reliability Function and Strong Converse of Discrete Memoryless Biometrical Identification Systems
Yachongka Vamoua, Hideki Yagi (Univ. of Electro-Comm.)
pp. 13 - 18

IT2015-4
New Classes of Public Key Cryptosystems Constructed Based on Cyclic Codes, K(XV)SE(1)PKC and K(XVI)SE(1)PKC
Masao Kasahara (Waseda Univ./Chuo Univ.)
pp. 19 - 24

IT2015-5
Design and Evaluation of LDPC Code Decoder Using Generalized BP Algorithm
Akiyoshi Hashimoto, Harumi Morino (Hitachi)
pp. 25 - 30

IT2015-6
A Note on Correlation Properties of Periodic Sequences over Extension Fields from a Cyclic Difference Set
Takayasu Kaida (Kinki Univ.), Junru Zheng (Kyushu Women's Univ.), Keiichi Takahashi (Kinki Univ.)
pp. 31 - 34

IT2015-7
Generating Protected Eigenface Templates Using an Unitary Transformaion
Ibuki Nakamura (Tokyo Metropolitan Univ.), Yoshihide Tonomura (NTT), Hitoshi Kiya (Tokyo Metropolitan Univ.)
pp. 35 - 40

IT2015-8
Readout of copyright information hidden in objects fabricated with 3-D printers
Piyarat Silapasuphakornwong, Masahiro Suzuki, Kazutake Uehira (Kanagawa Inst. Tech.), Youichi Takashima (NTT), Hiroshi Unno (Kanagawa Inst. Tech.)
pp. 41 - 44

IT2015-9
A study on speaker conversion using speech and expression features for video chatting
Yuuki Saito, Takashi Nose (Tohoku Univ.), Takahiro Shinozaki (Tokyo Institute of Technology), Akinori Ito (Tohoku Univ.)
pp. 45 - 50

IT2015-10
Data Anonymization for Information Recommendation Based on TF-IDF Method
Kensuke Arai (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Noboru Babaguchi (Osaka Univ.)
pp. 51 - 56

IT2015-11
On the Computational Complexity of Information Flow Problem with Hierarchy Constraint
Yuki Takeda, Yuichi Kaji, Minoru Ito (NAIST)
pp. 57 - 62

IT2015-12
Evaluation of Symmetric Mutual Information of Simplified TDMR Channel Model
Tadashi Wadayama (Nitech)
pp. 63 - 68

IT2015-13
[Invited Talk] Trade-off between resiliency and efficiency of cryptographic protocols -- The case of information theoretical security --
Maki Yoshida (NICT)
pp. 69 - 74

IT2015-14
An Audio Secret Sharing Scheme Easy to Reproduce Secret Physically
Yuuki Tokushige, Yuto Misawa, Fumiaki Yoshida, Masaya Uwatoko, Mitsugu Iwamoto, Kazuo Ohta (UEC)
pp. 75 - 80

IT2015-15
Robust Audio Watermarking Based on Dynamic Phase Coding and Error Control Coding
Ngo Nhut Minh, Brian M. Kurkoski, Masashi Unoki (JAIST)
pp. 81 - 86

IT2015-16
[Invited Talk] Complete Complementary Codes and Its Applications
Tetsuya Kojima (NIT, Tokyo College)
pp. 87 - 92

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan