Thu, Mar 5 PM EMM-1 12:30 - 13:20 |
(1) |
12:30-12:55 |
Biometric authentication based on temperature change of the facial region caused by heartbeat |
Shutaro Yoshizawa, Hiroshi Yoshiura, Masatsugu Ichino (UEC) |
(2) |
12:55-13:20 |
A Study on Extraction of Preference Information in Apparel Supply Chains
-- About Imagination Gap -- |
Nobuki Kasai, Takaaki Hasegawa (Saitama Univ.) |
Thu, Mar 5 PM 13:20 - 14:10 |
(3) |
13:20-13:25 |
|
(4) |
13:25-14:10 |
|
|
14:10-14:25 |
Break ( 15 min. ) |
Thu, Mar 5 PM 14:25 - 15:25 |
(5) |
14:25-15:25 |
[Poster Presentation]
Physical Unclonable Function Using Carbon Resistor |
Ryota Soga, Hyunho Kang (NITTC) |
(6) |
14:25-15:25 |
[Poster Presentation]
Proposal of BSS-based video watermarking method using similarity between frames |
Akane Yokota, Masaki Kawamura (Yamaguchi Univ.) |
(7) |
14:25-15:25 |
[Poster Presentation]
DM-QIM Watermarking for Weights of Deep Neural Network |
Takuro Tanaka, Tatsuya Yasui, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) |
(8) |
14:25-15:25 |
[Poster Presentation]
A Reversible Data Hiding Method for Stereoscopic Images with 2D/3D Viewing |
Ikuma Yasukawa, Shoko Imaizumi (Chiba Univ.) |
(9) |
14:25-15:25 |
[Poster Presentation]
A Steganographic Method for Pixel Arts and its Application to 2D Code |
Satoshi Murata, Hirohisa Hioki (Kyoto Univ) |
(10) |
14:25-15:25 |
[Poster Presentation]
Extended EtC images for flexible data hiding and extracting |
Ryoichi Hirasawa, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metropolitan Univ.) |
|
15:25-15:35 |
Break ( 10 min. ) |
Thu, Mar 5 PM 15:35 - 16:35 |
(11) |
15:35-16:35 |
[Poster Presentation]
Dangerous Object Detection Using Machine Learning |
Rio Tajima, Hyunho Kang (NITTC) |
(12) |
15:35-16:35 |
[Poster Presentation]
Comics Enrichment using Ultimate Link |
Shion Moriyoshi, Yukiharu Yamauchi (KCT), Michiharu Niimi (KIT) |
(13) |
15:35-16:35 |
[Poster Presentation]
Face Anti-spoofing Against 3D Mask Attack Using User`s Cheek |
Reo Kudo, Hyunho Kang (NITTC) |
(14) |
15:35-16:35 |
[Poster Presentation]
Reproduction of Takigi Noh Based on Anisotropic Reflection Rendering of Noh Costume with Dynamic Illumination |
Shiro Tanaka, Hiromi T. Tanaka (Ritsumeikan Univ.) |
(15) |
15:35-16:35 |
[Poster Presentation]
An Adjustment Method of Camera Parameters Using Image Features in the Location Search System |
Hideo Nagashima, Tetsuya Suzuki (SIT) |
(16) |
15:35-16:35 |
[Poster Presentation]
Personalized font system
-- beautiful character generation with hand writing style -- |
Yuto Yamamoto, Michiharu Niimi (KIT) |
(17) |
15:35-16:35 |
[Poster Presentation]
A proposal for cooking asist system : Meal finder
-- food recognition in refrigerator -- |
Masahiro Sudo, Michiharu Niimi (KIT) |
|
16:35-16:45 |
Break ( 10 min. ) |
Thu, Mar 5 PM 16:45 - 17:45 |
(18) |
16:45-17:45 |
[Poster Presentation]
GAN application for autonomous moving robot systems using image processing |
Shu Ohmura, Hyunho Kang (NITTC) |
(19) |
16:45-17:45 |
[Poster Presentation]
Investigation of associative memory models for improving error correcting capability in digital watermarking scheme |
Kazuma Fukata, Masaki Kawamura (Yamaguchi Univ.) |
(20) |
16:45-17:45 |
[Poster Presentation]
CNN-based Analysis on Editing History of JPEG File Using Histogram of DCT Coefficients |
Keitaro Oura, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) |
(21) |
16:45-17:45 |
[Poster Presentation]
Detection of Video Alterations using Machine Learning with High-Frequency Features |
Hiroki Ueda (Tokyo Univ. of Sci.), Hyunho Kang (NIT, Tokyo College), Keiichi Iwamura (Tokyo Univ. of Sci.) |
(22) |
16:45-17:45 |
[Poster Presentation]
Detection of Illegal Movies Captured by Video Camera from Display Device |
Kodai Kamakari, Kento Kawata, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) |
(23) |
16:45-17:45 |
[Poster Presentation]
Video Forgery Detection Using Generative Adversarial Networks |
Shoken Ohshiro (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Noboru Babaguchi (Osaka Univ.) |
(24) |
16:45-17:45 |
[Poster Presentation]
Detecting Adversarial Examples Based on Sensitivities to Lossy Compression Algorithms |
Akinori Higashi, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.), Huy Hong Nguyen, Isao Echizen (NII) |
Fri, Mar 6 AM 09:15 - 10:30 |
(25) |
09:15-09:40 |
Implementation and evaluation of information embedding method for movie by using flicker pattern |
Takuya Shimada, Yutaro Shimomura, Ryuya Kirihara, Takeshi Kumaki (Ritsumeikan Univ.) |
(26) |
09:40-10:05 |
Utilization of Medium frequency bands for Digital Watermarking Using max-Plus algebra-Based Morphological Wavelet Transform and its applications |
Katsuya Maeyama, Tomohiro Fujita, Takeshi Ogura (Ritsumeikan Univ.), Venugopala P.S (NMAMIT), Takeshi Kumaki (Ritsumeikan Univ.) |
(27) |
10:05-10:30 |
Watermark Embedding Method for Mean Value Attack Restraint Scheme by Seam Carving |
Makoto Fujimura (Nagasaki Univ.), Kousuke Imamura (Kanazawa Univ.), Hideo Kuroda (Nagasaki Univ.) |
|
10:30-10:40 |
Break ( 10 min. ) |
Fri, Mar 6 AM 10:40 - 11:55 |
(28) |
10:40-11:05 |
The relationship between oscillation emphasis illusion and a time frequency characteristics in human vision |
Koki Otaka (NIT Hiroshima Col.), Kazuya Ogawa, Atsushi Osa (Yamaguchi Univ.) |
(29) |
11:05-11:30 |
|
|
(30) |
11:30-11:55 |
Steganalysis of audio data hiding which results in an additive whitened spectrum |
Akira Nishimura (Tokyo Univ. Info. Sci.) |
Fri, Mar 6 AM 11:55 - 14:00 |
(31) |
11:55-14:00 |
|